Autonomous navigation system based on a dynamic access control architecture for the internet of vehicles

被引:5
作者
Ramkumar, M. P. [1 ]
Ponnan, Suresh [2 ]
Shelly, Siddharth [3 ]
Hussain, Md. Zair [4 ]
Ashraf, Mohd [5 ]
Haldorai, Anandakumar [6 ]
机构
[1] Thiagarajar Coll Engn, Dept Comp Sci & Engn, Madurai 625015, India
[2] Veltech Rangarajan Dr Sagunthala R&D Inst Sci & Te, Dept ECE, Chennai 600062, Tamil Nadu, India
[3] Mar Athanasius Coll Engn Kothamnagalam, Dept Elect & Commun Engn, Kothamangalam 686666, Kerala, India
[4] Maulana Azad Natl Urdu Univ, Sch Technol, Informat Technol, Hyderabad, TS, India
[5] Maulana Azad Natl Urdu Univ, Sch Technol, Comp Sci & Engn, Hyderabad, TS, India
[6] Sri Eshwar Coll Engn, Dept Comp Sci & Engn, Coimbatore 641202, Tamil Nadu, India
关键词
Dynamic access control; Autonomous decision control; IoV navigation; Control architecture;
D O I
10.1016/j.compeleceng.2022.108037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Vehicles (IoV) ability to monitor the surrounding environment promotes autonomous activities like determining a trajectory and responding accordingly. Security and transportation are vital components of today's technology-driven society. In addition to search and rescue, it may also be used for planetary exploration and material management. So, the Internet of Vehicles must drive independently in various dynamic situations. Unlocking the potential of the IoV navigation process, a dynamic access control architecture-based autonomous navigation system is proposed. It can perform assigned tasks while also reacting quickly to unexpected situations. The efficiency of AI-based IoV navigation is compared and studied using autonomous decision control systems.
引用
收藏
页数:9
相关论文
共 24 条
[1]  
Atmadja W, 2014, 2014 INTERNATIONAL CONFERENCE ON INDUSTRIAL AUTOMATION, INFORMATION AND COMMUNICATIONS TECHNOLOGY (IAICT), P22, DOI 10.1109/IAICT.2014.6922109
[2]  
Baltzakis H., 2004, HYBRID FRAMEWORK MOB
[3]  
Gutierrez S. V., REAL TIME LINUX COMM
[4]   An Efficient and Unique TF/IDF Algorithmic Model-Based Data Analysis for Handling Applications with Big Data Streaming [J].
Iwendi, Celestine ;
Ponnan, Suresh ;
Munirathinam, Revathi ;
Srinivasan, Kathiravan ;
Chang, Chuan-Yu .
ELECTRONICS, 2019, 8 (11)
[5]   On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique [J].
Iwendi, Celestine ;
Uddin, Mueen ;
Ansere, James A. ;
Nkurunziza, P. ;
Anajemba, J. H. ;
Bashir, Ali Kashif .
IEEE ACCESS, 2018, 6 :47258-47267
[6]   CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU [J].
Javed, Abdul Rehman ;
Rehman, Saif Ur ;
Khan, Mohib Ullah ;
Alazab, Mamoun ;
Reddy, Thippa G. .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02) :1456-1466
[7]  
Jin T. S., 2004, IFAC P VOLUMES, V37, P203
[8]   RETRACTED: Statistical-model based voice activity identification for human-elephant conflict mitigation (Retracted Article) [J].
Leonid, T. Thomas ;
Jayaparvathy, R. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (05) :5269-5275
[9]  
Li K., 2016, AUTOBUS REV, P170, DOI [10.5772/58900, DOI 10.5772/58900]
[10]  
Macesanu G, 2010, B TRANSILVANIA U BRA, V3