基于区块链的车联网安全机制研究任务书

 2021-10-19 22:38:29

1. 毕业设计(论文)的内容和要求

车联网在国外起步较早。

在20世纪60年代,日本就开始研究车间通信。

2000年左右,欧洲和美国也相继启动车联网系统多个车联网项目,旨在推动车间网联系统的发展。

剩余内容已隐藏,您需要先支付后才能查看该篇文章全部内容!

2. 参考文献

[1] H. Xiang, W. Zhou, M. Daneshmand, and M. Peng, Network slicing in fog radio access networks: Issues and challenges, IEEE Commun. Mag., vol. 55, no. 12, pp. 110116, Dec. 2017.[2] C. A. Kerrache, C. T. Calafate, J. C. Cano, N. Lagraa, and P. Manzoni, Trust management for vehicular networks: An adversary-oriented overview, IEEE Access, vol. 4, pp. 92939307, Dec. 2016.[3] B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, A survey of information-centric networking, IEEE Commun. Mag., vol. 50, no. 7, pp. 2636, July 2012. [4] I. Eyal, Blockchain technology: Transforming libertarian crypto-currency dreams to finance and banking realities, Computer, vol. 50, no. 9, pp. 3849, Sept. 2017. [5] L. S. Sankar, M. Sindhu, and M. Sethumadhavan, Survey of con-sensus protocols on blockchain applications, in Proc. 4th Int. Conf. Advanced Computing and Communication Systems (ICACCS), 2017, pp. 15. [6] K. Christidis and M. Devetsikiotis, Blockchains and smart con-tracts for the internet of things, IEEE Access, vol. 4, pp. 22922303, May 2016.[7] R. Rivera, J. G. Robledo, V. M. Larios, and J. M. Avalos, How digital identity on blockchain can contribute in a smart city environment, in Proc. IEEE Int. Smart Cities Conf. (ISC2), 2017, pp. 14.[8] S. Ahmed and K. Tepe, Misbehaviour detection in vehicular net-works using logistic trust, in Proc. IEEE Wireless Communications and Networking Conf. (WCNC), 2016, pp. 16.[9] V. Buterin. (2016, Dec. 30). A proof of stake design philosophy. Me-dium. [Online]. Available:https://medium.com/@VitalikButerin/a-proof-of-stake-design-philosophy-506585978d51[10] Hyperledger. (2017 ). Introduction to hyperledger business blockchain design philosophy and consensus. Hyperledger, [Online]. Available:https://www.hyperledger.org/wp-content/uploads/2017/08/Hyperledger_Arch_WG_Paper_1_Consensus.pdf[11] G. Edens and G. Scott, The packet protector, IEEE Spectr., vol. 54, no. 4, pp. 4248, Apr. 2017.[12] D. Kim, J. Kim, C. Moon, J. Choi, and I. Yeom, Efficient content de-livery in mobile ad-hoc networks using CCN, Ad Hoc Netw., vol. 36, pp. 8199, Jan. 2016. [13] S. Choi, K. Kim, S. Kim, and B. Roh, Threat of DoS by interest flood-ing attack in content-centric networking, in Proc. Int. Conf. Informa-tion Networking (ICOIN), 2013, pp. 315319.[14] H. Tullberg, P. Popovski, Z. Li, M. A. Uusitalo, etc. The METIS 5G system concept: Meeting the 5G requirements, IEEE Commun. Mag., vol. 54, no. 12, pp. 132139, Dec. 2016.

剩余内容已隐藏,您需要先支付 10元 才能查看该篇文章全部内容!立即支付

以上是毕业论文任务书,课题毕业论文、开题报告、外文翻译、程序设计、图纸设计等资料可联系客服协助查找。