The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020
DOI: 10.1109/access.2020.2973461
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Physical and Social Networks in IoV (CPSN-IoV): A Multimodal Architecture in Edge-Based Networks for Optimal Route Selection Using 5G Technologies

Abstract: Humans are blessed with the intelligence to create links, develop semantic metaphors and models for reasoning; construct rules for decision making; and to form bounded loops for interaction, socialization and knowledge sharing. But machines are inadequate with these extraordinary abilities rather, numerous algorithms and mathematical models can be used to connect physical resources with cyberspaces to control objects and, develop cognitive learning for optimal decision making. Connected users and devices in cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 94 publications
0
17
0
Order By: Relevance
“…FL has vast application in many fields and is getting attention due to the advantage of 4G technology. Arooj et al (2020) proposed a route selection model using 4G internet technology in which smart vehicles are connected to the central system that can automatically select and alter their route depending on the type of signal they have received from the central system. Some researchers have integrated FL with block chain technology ( Kim & Hong, 2019 ; Farooq, Khan & Abid, 2020 ; Majeed & Hong, 2019 ; Huang et al, 2020 ; Weng et al, 2019 ).…”
Section: Related Workmentioning
confidence: 99%
“…FL has vast application in many fields and is getting attention due to the advantage of 4G technology. Arooj et al (2020) proposed a route selection model using 4G internet technology in which smart vehicles are connected to the central system that can automatically select and alter their route depending on the type of signal they have received from the central system. Some researchers have integrated FL with block chain technology ( Kim & Hong, 2019 ; Farooq, Khan & Abid, 2020 ; Majeed & Hong, 2019 ; Huang et al, 2020 ; Weng et al, 2019 ).…”
Section: Related Workmentioning
confidence: 99%
“…Several issues of protecting the privacy of the data in Internet of Vehicles have emerged in recent years and the research on analyzing such problems have been carried out in both academics and industries to make life secure. The privacy protection of the identities of the vehicle can be done effectively with the help of various authentication approaches [18][19]. These authentication approaches are broadly classified into three types such as cryptography-based authentication technique [18][19][20][21][22][23][24], reputation evaluation-based technique [25][26][27][28][29][30], and hardware-based trust enhancement technique [31][32][33][34].…”
Section: Related Workmentioning
confidence: 99%
“…The privacy protection of the identities of the vehicle can be done effectively with the help of various authentication approaches [18][19]. These authentication approaches are broadly classified into three types such as cryptography-based authentication technique [18][19][20][21][22][23][24], reputation evaluation-based technique [25][26][27][28][29][30], and hardware-based trust enhancement technique [31][32][33][34]. Cryptography-based authentication technique deals only with the correct evidence holds by the vehicle.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This nimble network bandwidth named 5G with the smart system is going to rule on this world and ornament more crucial to its security which is a major agitation [4]. The consolidation of radio ideas in [5] such as ultra-dense networks, massive machine (MM) communications, massive Multiple-Input Multiple-Output (mMIMO), device-to-device (D2D) moving networks and ultra-reliable can allow 5G as in figure 2 to assist the anticipated growth in mobile data volume while developing the limit of application zone that mobile communications can assist on the far side 2021 [6]. Challenges are increased for 5G networks by merging Artificial Intelligence (AI) and network operator which can be one of the impressive results to address these complexities.…”
Section: Introductionmentioning
confidence: 99%