You are on page 1of 8

Lightweight and Privacy-Preserving ID-as-a-Service

Provisioning in Vehicular Cloud Computing


T. Saravanan
Dept. of CSE
GITAM School of Technology, GITAM (Deemed to be University)
Bengaluru, India
tsaravcse@gmail.com
Abstract— Cloud computing is composed of different A type of organization access called distributed
circulating Cloud Computing that are constructed instantly by computing aims to openly and widely share a large number
skillfully fusing unused Cloud Computing resources like of registered assets. These are hired by a specialized
calculating power, stockpiling, etc. the variety of tools used to company to sophisticated clientele, typically online. Due to
access the data and services. We thus provide a lightweight the rising number of car accidents and the dissatisfaction of
identity-based authenticated data sharing protocol in this pedestrians in vehicular organizations, the main focus of the
research to enable safe data sharing across physically distant present solutions offered by clever transportation
clients and devices. The chosen-cipher-text attack (CCA)
frameworks is on ensuring traveler comfort and promoting
resistance of the suggested protocol is proved using the
decisional Strong Diffie-Hellman (SDH) problem's hardness
street wellbeing. By providing flexible arrangements (i.e.,
assumption. We compare the proposed protocol's efficiency elective courses, synchronization of traffic signals, etc.)
with that of the current data-sharing protocols in terms of required by various street security entertainers like police,
calculation costs, communication costs, and response times. We disaster and crisis managements, and fiasco and crisis
first provide an enhanced CPABE (cipher-text-strategy administrations, distributed computing innovations can
characteristic-based encryption). potentially further develop street wellbeing and travel
experience in ITSs. Another distributed computing
Keywords— Xxx, xxx, xxx, xxx, xxx architecture called VANET-Cloud used to vehicle
specifically appointed organizations is offered to further
I. INTRODUCTION improve traffic wellness and provide computational forms of
The coordination of dispersed processing and vehicular support to street customers. Different VANET- Cloud
associations known as vehicular conveyed figuring, or VCC, transportation services are examined, and a few areas for
is gaining attention for its potential to support a variety of further research are highlighted, including security and
cutting-edge, complex, and challenging applications for protection, information aggregation, energy efficiency,
improving traffic flow, energy efficiency, and driving safety, interoperability, and asset managers.
among other things. VCC may provide unique compact
vehicular cloud organizations for automobiles, similar to II. MOTIVATION & OVERVIEW OF THE RESEARCH
scattered processing providing cloud organizations. VCC VANETs will have unique requirements for
expert communities (VCCSP) usually demand the car's autonomous, highly adaptable, low- dormancy, running
obvious facts to support its requests, regardless of when a applications, and networks that might not be satisfied by
vehicle needs to arrive at VCC organizations. standard distributed computing. The convergence of mist
processing with the traditional cloud for VANETs is
The on-demand availability of PC structure resources,
therefore discussed as a plausible solution in both existing
particularly data accumulating (distributed capacity) and
and future VANETs. The addition of Software-Defined
computing power, without direct individual organization by
Network (SDN), which offers flexibility, programmability,
the consumer is known as circulated registering. The phrase
and global information on the company, may also improve
is frequently used to refer to server farms that are accessible
Mist registration.
to different clients online. Huge fogs that are oppressive
nowadays frequently have boundaries that are spread In order to provide a protected VANET information
throughout several locations by central workers. An edge sharing plan while preserving the security, adaptability, and
expert could be assigned if the relationship with the customer fine- granularity components of the original CP-ABE, we
is respectably close. Fogs might be accessible to a variety of develop a new multi authority CP- ABE plan. We provide a
affiliations or constrained to a single affiliation (attempt client renunciation approach and effective characteristic for
fogs) (public cloud). the multi-authority CP-ABE plot in a VANET. We
specifically examine some of the figure- focused encryption
and unscrambling processes, helping to significantly lessen
For coherence and scale economies, circulated the impact on resource-required OBU devices in
registration depends on resource sharing. Supporters of automobiles. For VANETs, we suggest a productive and
public and hybrid fogs point out that distributed accounting secure information-sharing strategy. introduced the ABE
enables organizations to avoid or limit upfront IT concept first. In the ABE plot, a predetermined authority
infrastructure investments. Advocates also make sure that generates a framework public key and framework ace key.
distributed processing encourages risk-takers to develop their A power that generates keys based on credits has to be
applications for activity faster, with more developed reason, predefined; as a result, the keys will have properties for use
and with less assistance, and that it engages IT groups to during encryption and unscrambling tasks in the future.
even more quickly change resources to satisfy varying and Numerous more refined ABE schemes were created after the
unexpected need, giving the burst enlisting capacity: high ABE conspiracy was initially unveiled.
figuring power at specific times of apex interest. Cloud
Real-time search engines and various mining tools are
providers often employ a "pay-all the more just as
emerging with millions of users worldwide to enable
expenditures arise" methodology, which, if chiefs are
individuals to follow the effect of events and news on social
unfamiliar with cloud-assessing methods, might result in
networking sites. Finding spammers on social networking
unexpected operating expenses. Improvement in circulating
sites is crucial. This chapter contains the overall structure of
figure has been prompted by the openness of high-limit
the present work. The following chapter, Review of
associations, easy PCs, and limit devices as well as the
Literature, lists the works that deal with spam detection.
specific collection of hardware virtualization, organization
coordinated plan, and autonomic and utility managing.
III. RELATED WORK storage device, businesses and users inevitably start to
worry about security. They worry that the data is actually
A. Light weight delegatable proofs of storage kept in the cloud but is still in the storage device or cannot
According to J. Xu, A. Yang, J. Zhou, and D. S. Wong et be accessed for a long time because the cloud server has
al., cloud storage is now widely used, which lessens the been removed or destroyed, which prevents users and
strain of users having to store their own data locally. businesses from accessing or restoring the data files in the
future. This project aims to investigate and build for proven
Researchers have also paid a great deal of attention to
cloud computing platforms for data storage. When data is
ways to guarantee the security and integrity of the
saved in the cloud, researchers and developers work to
outsourced data kept in a cloud storage server. The primary
create a secure and effective proof-storage protocol. Users
solution proposed to overcome this issue is proofs of storage
may also assign or permit others to publicly verify if the
(POS). Publicly verified POS considerably increases the
data is truly stored in cloud storage devices.
scalability of cloud services by enabling a third party to
validate the data integrity on the data owner's behalf. Due to C. Dynamic provable data possession
numerous expensive group exponentiation operations, the The proposal was made by C. Erway, A. Kupcu, C.
majority of publicly verifiable POS schemes in use today Papamanthou, et al. Data security has been given a lot more
compute authentication tags for all data blocks very slowly consideration in cloud storage environments than it did
—much more slowly than the typical upload speed of a previously. Important data files owned by users must be
network. As a result, this phase of the POS scheme's setup hosted on various cloud service providers in order to
becomes the bottleneck. We provide a brand-new alternative guarantee the dependability and availability of outsourced
formulation in this article termed "Delegable Proofs of data, increase catastrophe resilience, and improve data
Storage (DPOS)". Then, we build a simple privacy- recovery ability (CSPs). However, we are aware that CSP is
preserving DPOS scheme that is near to the features of never trustworthy. A new dynamic multiple-replica provable
publicly verifiable POS schemes on the one hand, and as data possession (DMR-PDP) approach is suggested in this
efficient as private POS schemes on the other. It also case to simultaneously check the integrity of replica files
supports third party auditors and may swap auditors at any saved by users on various CSPs. Additionally, we use vector
moment. We increase the tag creation process' speed by at dot products rather than the modular power calculation in
least several hundred times when compared to conventional the conventional PDP approach, which significantly
publicly verifiable POS systems, without losing any other decreases the calculation time and storage space utilization.
areas of efficiency. Due to the many advantages, it offers, This is done since the tag set is so important. Additionally,
such as reduced infrastructure costs, rapid scalability, and the divided address version mapping table (DAVMT), a
availability, LOUD computing has been widely adopted and brand-new dynamic data structure, is introduced and used to
used in our daily lives. As the need for local storage grows, address the issue of data dynamic operation. In the end, a
more and more individuals rely on cloud storage services. In real-world test confirms the viability of our suggested
particular, data is sent to a cloud server and made available strategy. Data integrity becomes a challenge in the cloud
for eventual demand-driven access. In the meanwhile, it is storage scenario because when a user uploads local data to
crucial to address how to guarantee the security and the cloud, control over the outsourced data may be
integrity of the outsourced data without preserving a local completely lost. The PDP plan [5] was put up in 2007 to
copy for data owners. Applying proofs of storage (POS), ensure the accuracy of the data that was outsourced.
also known as proofs of retrievability (POR) or proofs of According to the PDP system, the data owner (DO)
data possession (PDP), is one of the key solutions since it generates a set of homomorphic tags for the outsourced data,
allows one to verify the integrity of data kept on a cloud uploads them together with the encrypted file to the CSP,
server without having to download all of the data. The and then deletes the local file while retaining the secret key.
fundamental concept is to split the whole data file into The DO sends a challenge to the CSP, the CSP answers to
numerous blocks, each of which is used to create a the challenge, and the DO validates the response when they
homomorphic verifiable tag (HVT), which is then delivered need to confirm the accuracy of the data stored in the cloud.
together with the data file to the cloud server. Numerous The DO employs a sampling mechanism with probability in
attempts have been made since the original POR and PDP the integrity verification phase of the PDP system, which is
schemes were introduced in 2007 to create proofs of storage different from the conventional integrity verification
schemes with more sophisticated characteristics including scheme. Although other dynamic PDP methods have been
public key verifiability, data dynamics (i.e., presented, the PDP strategy in [5] is only applicable to static
changing/adding/deleting data blocks), numerous cloud data and cannot implement the data's dynamic activity (such
servers, and data sharing. We concentrate on the first two as update or append).
features: support for data dynamics and public verifiability.
MR-PDP: Multiple-replica provable data possession- R.
B. Hybrid provable data possession at untrusted stores in Burns, O. Khan, R. Curtmola, and others have proposed to
cloud computing enhance the availability and longevity of data on unreliable
R. Burns, R. Curtmola, and others have proposed Cloud storage systems, many storage systems rely on replication.
computing has steadily risen to the top of the Internet As of right now, these storage technologies offer no
services in recent years. In order to accomplish random conclusive proof that numerous copies of the data are truly
access, data collecting, cost reduction, and the ease of kept. Storage servers can work together to conceal the fact
sharing other services, businesses and users will store a that they are only storing one copy of the data while giving
massive quantity of data in remote cloud storage devices the impression that they are keeping multiple copies. By
once cloud computing settings are at their most ideal. using multiple-replica provable data possession (MR-PDP),
However, when data is kept for a long time in a cloud we solve this weakness: A provably secure scheme that
enables a client to store t replicas of a file in a storage E. Secure cloud storage public auditing with privacy
system to confirm via a challenge-response protocol that (2) preserving
the storage system uses t times the storage necessary to store By using cloud storage, users may store their data
a single replica and that (1) each unique replica can be remotely and take use of high-quality on-demand apps and
produced at the time of the challenge. In a client/server services from a shared pool of reconfigurable computing
storage system, the MR-PDP builds on earlier research on resources without having to worry about maintaining and
data possession proofs for a single copy of a file (Ateniese storing their data locally. However, since users no longer
et al., 2007). It is computationally considerably more physically hold the outsourced data, protecting its integrity
effective to store t replicas using MR-PDP than it is to store in the cloud is a challenging issue, particularly for users
t independent, unconnected files using a single-replica PDP with limited computer power. Additionally, users should not
approach (e.g., by encrypting each file separately prior to need to worry about checking the integrity of the cloud
storing it). Another benefit of MR-PDP is that when some of storage; they should just be able to utilize it as if it were
the current copies fail, it may quickly and cheaply construct local. Therefore, it is crucial to enable public auditability for
further replicas. cloud storage so that consumers may utilize a third-party
D. Privacy-preserving auditor (TPA) to verify the accuracy of outsourced data and
public auditing for shared data in the cloud be at ease. The auditing procedure should not present any
new risks to the privacy of user data or increase the user's
Data sharing across numerous users as well as cloud online workload in order to deploy a TPA safely. In this
storage are both prevalent with cloud storage providers. research, we provide a private public auditing mechanism
However, maintaining identity privacy while allowing for for a secure cloud storage system. We further expand our
public auditing of such shared data is still a difficulty. The finding such that the TPA may effectively and
first privacy-preserving technique that permits open auditing simultaneously conduct audits for a number of consumers.
of shared data kept in the cloud is proposed in this work. We The suggested techniques are provably secure and extremely
use ring signatures in particular to compute the verification effective, according to a thorough investigation of security
data required to audit the integrity of shared data. Our and performance. Our initial test, carried out on an Amazon
system allows a third-party auditor (TPA) to still check the EC2 instance, further confirms the design's quick
integrity of shared data without having to download the performance.
complete file while maintaining the privacy of the signer on
each block. Our experimental findings show how well our In this research, we provide a public auditing
suggested technique performs when auditing shared data. By mechanism for cloud computing data storage security that
using cloud storage, users may store their data remotely and protects privacy. In order to ensure that the TPA won't
take use of high-quality on-demand apps and services from discover any information about the data content stored on
a shared pool of reconfigurable computing resources the cloud server during the effective auditing process, we
without having to worry about maintaining and storing their use the homomorphic linear authenticator and random
data locally. However, since users no longer physically hold masking. This not only relieves the cloud user's burden of
the outsourced data, protecting its integrity in the cloud is a performing the time- consuming and potentially expensive
challenging issue, particularly for users with limited auditing task, but also allays the users' concerns about the
computer power. Additionally, users should not need to leakage of their outsourced data. We further expand our
worry about checking the integrity of the cloud storage; they privacy-preserving public auditing protocol into a multiuser
should just be able to utilize it as if it were local. Therefore, context, where the TPA may do numerous auditing jobs in a
it is crucial to enable public auditability for cloud storage so batch manner for greater speed. TPA may concurrently
that consumers may utilise a third-party auditor (TPA) to manage several audit sessions from various users for their
verify the accuracy of outsourced data and be at ease. The outsourced data files. Our methods are very effective and
auditing procedure should not present any new risks to the provably secure, according to extensive examination.
privacy of user data or increase the user's online workload in F. The applications of polynomials and constant- size
order to deploy a TPA safely. In this research, we provide a
commitments to polynomials
private public auditing mechanism for a secure cloud
storage system. We further expand our finding such that the Gregory M. Zaverucha, G. Aniket Kate, and others have
TPA may effectively and simultaneously conduct audits for suggested, Polynomial commitment systems are introduced,
a number of consumers. The suggested techniques are properly defined, and given two effective constructions. A
provably secure and extremely effective, according to a committer can commit to a polynomial using a polynomial
thorough investigation of security and performance. Our commitment scheme and a brief string that a verifier can use
initial test, carried out on an Amazon EC2 instance, further to validate the stated evaluations of the committed
confirms the design's quick performance. In this work, we polynomial. The magnitude of the commitments made by
suggest Oruta, the first public auditing tool for shared data the homomorphic commitment techniques described in the
in the cloud that protects privacy. With Oruta, the TPA can literature can be utilised to accomplish this purpose, but they
easily verify the consistency of shared data without being are linear in the degree of the committed polynomial. On the
able to see who signed each block, protecting user identify other hand, our schemes' polynomial obligations are always
privacy. How to effectively audit the integrity of shared data of the same magnitude (single elements). Initiating a
with dynamic groups while yet protecting the identity of the commitment has a continual overhead as well; even opening
signer on each block from the third-party auditor is an several assessments merely need a consistent level of
intriguing challenge that will be addressed in our future communication. Our techniques can thus be effective
work. instruments for lowering the communication expense in
cryptographic systems. Regarding that, we use our
polynomial commitment approaches to tackle four
cryptographic issues: verifiable secret sharing, zero- server component as well as in the car. Programming-
knowledge sets, credentials, and content extraction defined organizations may be set up automatically, allowing
signatures. Several cryptographic protocols are network administrators to create their own SDN projects to
fundamentally composed of commitment schemes. Using a design, manage, secure, and improve network assets using
commitment system, a committer can attach herself to a automated scripts. As we stated, an open and VANET
message (the binding) by publishing a value known as the strategy is needed for this. Open application programming
commitment (hiding). She may open the commitment later interfaces (APIs) provide the benefit of preventing server
and show the committed message to the verifier so they lock-in. Comparatively speaking to PCs, it doesn't matter
could see if it is in line with the commitment. We go what equipment is used throughout this discussion.
through three popular approaches a committer might use to
commit to a message. Give two random number generators C. Bilingual paring module
of the group G of prime order p, g and h. Simply by writing It has been noted that the most expensive operation in
Cg(m) = gm, the committer can commit to a message m R blending-based cryptographic standards is the computation
Zp. Under the premise that the discrete logarithm (DL) issue of bilinear pairings. For bilinear pairings in the two
is challenging in G, this technique is computationally untrusted programmer paradigm, we first provide an
concealing and unconditionally binding. The second efficient and safe re- appropriating calculation in this study.
strategy, often referred to as a Pedersen commitment [31], Our suggested calculation differs from the state- of-the-art
has the formula Cg,h(m, r) = gmhr, where r R Zp. Pedersen calculation in that the (asset- obligated) outsourcer is not
obligations are computationally enforceable and required to do any expensive operations, such as point
unconditionally hidden. This paper also has an expanded augmentations or exponentiations. Additionally, we
version [24]. Under the DL assumption, this study was implement a subroutine using this computation to
finished at the University of Waterloo. Third, for each one- accomplish reevaluating secure character-based encryptions
way function H, the committer may publish H(m) or H(m|| and markings.
r). A collision-resistant hash function is often employed in D. Module for data replication
practice. Commitment plans are covered in great length in a
survey by Damgard [16]. If the RSU in the vehicle adhoc network is more precise
and each RSU has its own adhoc module where the copy
IV. PROPOSED METHODOLOGY records are identified and the individual copy records are
broken down, information replication is possible in this
A. Suggestive methodology module. The information and the replication module will be
This computation is called Character Based distinguished by the records that are coordinated with the
Online/Offline Digital Signature (IBOOS). We employ a other rsu. The unique vehicle adhoc network is dealt with by
successful and beneficial tactic called grouping to construct each vehicle adhoc network in the rsu unit. The Database
the display of WSNs. Concerns concerning secure Replication module may be used to import data from
information transmission for cluster-based wireless sensor existing data sets. It is also possible to create complex
networks are raised in the evaluation (CWSN). We have mappings over many tables joins. You have the option of
introduced two new Secure and Efficient Data Transmission designing yourself or using Java.
(SET) protocols to achieve energy skill. By incorporating
the more advanced CP-ABE, the Identity-Based V. EXPERIMENTAL SETUP
Online/Offline Digital Signature (IBOOS) scheme, which is We calculate the square's runtime for each circle and
dependent on the Identity- Based Digital Signature (IBS) multiply it by the number of times the programmer will
plan, improves the present lightweight CP-ABE plot. This rehash the circle. All rings that grow according to the
scheme defies damnation man calculation. The data is amount of the information produce some direct memory
encoded using the developed recommended approach and complexity O(n). Time intricacy considers the number of
sent to the VC as code text to acknowledge secure access times an assertion is carried out; even if you circle through
clients. The interest in trusted authority is first reduced, 50% of the display, it is still O(n). Since that depends on
which might lower the correspondence burden on both several factors, such as the information, this will return in a
trusted power and each VC. There is a focal regulator that defined, constrained amount of time, the complexity of a
holds information about the content server, RSU (ROAD computation does not accurately reflect the actual time
SIDE UNIT), and vehicle. With the rsu, an unlimited required to run a particular code.
number of control servers may be created, and the visible
substance server id will be shown in the regarded
substructure. The rush can be connected to the substance
server as needed by the client, and the substructure will
show the intricacies of the vehicle hub. Given that the
nearest rsu is reachable, information replication in the car
should be doable.
B. Server of Central Control
The available substance server id, the reaching the
nearest vehicle using rsu, and all other rsu subtleties may be
tracked in the central regulator module. As the rsu passes Fig 1. Time.
beneath the substance server, the area id and the rsu id can
be observed and created in the server. This module holds as TABLE I. ALGORITHM AND TIME.
the focal point. Replication of information is carried out in a
Algorithm Time(ms) C. Communication Complexity
IBOOS 1250
The suggested conspires correspondence complexity
DEFFIE HELLMAN 2200
is contrasted with that of plots. In the suggested plot, n
gatherings only need to exchange messages twice, or 2
Iboos computation took the least amount of time to run rounds, as opposed to n times, or 1 round. Additionally,
in the aforementioned complexity, taking an average of
1250 MS, while Diffie Hellman took the most time. the correspondence complexity of plans had to have
been incorporated in order to communicate information
A. Cryptography Cost to other vehicles present in the group. The analysis of
Although encryption and decoding can be done the capacity overhead and correspondence complexity
simultaneously, encryption should be done sequentially. In
this way, bios encryption and decoding perform often faster shows that Ibos outcomes are more productive, as
than existing techniques on a VANET execution, resulting shown in fig 4.
CRYPTOGRAPHY
in less time spent with safety, as shown in fig 2.
COST(BYTES)
200 Communication
150
100
complexity (bits)
Cryptography
50 cost(bytes) 60
0 50
IBOOS DEFFIE 40 Communication
HELLMAN 30 complexity y
(bits)
20
10
0 IBOOS DEFFIE
Fig 2. Cryptography Cost. HELLMAN
Fig 4. Communication complexity.
TABLE II. ALGORITHM AND CRYPTOGRAPHY COST.
Algorithm Cryptography cost(bytes) TABLE IV. ALGORITHM AND COMMUNICATION COMPLEXITY.
IBOOS 145 Algorithm Communication complexity
DEFFIE HELLMAN 120 (bits)
B. Storage Overhead IBOOS 6
DEFFIE HELLMAN 49
The planned plot's capacity overhead is compared in the
section to significant VANETs proposals. Since the vehicle
In Fig.3 and Fig.3, each color represents traffic density
and RSU capacities are sufficient, this correlation just draws at that timestamp. It concludes that maximum traffic density
attention to the cloud server's capacity overhead. so that for Circle-Fix-02 occurs at 18:14:58 pm, whereas Nav
the capacity may be used effectively by the vehicle and Sandhkuva Circle-PTZ-01 occurs at 18:16:18 pm.
effectively, as shown in fig 3. The maximum traffic density difference between both
locations is 6.8% which happens at timestamp 18:14:58. The
riders can be redirected from Nav Sandhkuva Circle-Fix-02
(high traffic density region) to Nav Sandhkuva Circle-PTZ-
Storage 01(low traffic density region).
overhead VI. CONCLUSION
800
0
(bits) The In order to share information among multiple
application expert co-ops and distributed storage
frameworks for automobiles in a VANET, we suggested a
600
Storage convincing information access control CP- ABE plan in this
0 assignment. Our strategy offers disavowals of both clients
overhead
400 () and traits based on many criteria. Additionally, we made use
0 IBOOS DEFFIE of cloud process hubs to distribute the computational load
HELLMA associated with encryption and decoding in order to support
200 asset-reliant devices; this approach makes CP-ABE careful
Fig 3. 0Storage Overhead. N
the IBOOS more suitable for VANETs. We demonstrate the
0 effectiveness of our solution in maintaining client security
TABLE III. ALGORITHM AND STORAGE OVERHEAD.
as well as being secure against various attacks by the
Algorithm Storage overhead(bits) findings of the extensive security research and exploratory
IBOOS 500
DEFFIE HELLMAN 6789
City. In 2022 2nd International Conference on Advance Computing
and Innovative Technologies in Engineering (ICACITE) (pp. 1834-
1839). IEEE.
evaluation. Our strategy also guarantees adaptability and [15]. Liu, Y., Yao, L., Shi, Q., Ding, J., “Optical flow-based urban road
vehicle tracking”, 19th IEEE International Conference on
efficiency. In further work, we will evaluate our strategy in Computational Intelligence and Security, 2013.
a real environment and gauge the synchronization latencies [16]. Saravanan, T., & Saravanakumar, S. (2022, February). Modeling an
between components. Energy Efficient Clustering Protocol with Spider Cat Swarm
Optimization for WSN. In 2022 IEEE VLSI Device Circuit and
System (VLSI DCS) (pp. 188-193). IEEE.
[17]. M Lokanath, K Sai Kumar & E Sanath Keerthi, "Accurate object
classification and detection by faster-RCNN", IOP Conference Series
REFERENCES Materials Science and Engineering, Vol. 263(5):052028, November
2017.
[1]. T. Rawal and V. Devadas, “Intelligent Transportation System in
India- A Review,” Journal of Development Management and [18]. Saravanan, T., Saravanakumar, S., Rathinam, G. O. P. A. L.,
Communication, Volume II, No.3, pp: 299-308, July-September, Narayanan, M., Poongothai, T., Patra, PSK., & Sengan, Sudhakar.
2015. (2022). Malicious attack alleviation using improved time-based
dimensional traffic pattern generation in UWSN. Journal of
[2]. P Indhiradevi, P Saravanakumar, R Varsha, S Shahithya & S Naveen Theoretical and Applied Information Technology, 100(3).
Prabhu, "A Review on Smart Traffic Management System", IOP
Conference Series Materials Science and Engineering [19]. Zhao, Z.Q., Zheng, P., Xu, S.T., Wu, X., “Object detection with deep
1145(1):012090, 2021 learning: A review”, IEEE Transactions on Neural Networks and
Learning Systems, Vol.30(11), pp:3212-3232, 2018.
[3]. Handalage, Upulie & Kuganandamurthy, Lakshini.,“ Real-Time
Object Detection using YOLO: A review”. [20]. Saravanan, T., & Saravanakumar, S. (2021, December). Privacy
10.13140/RG.2.2.24367.66723, 2021. Preserving using Enhanced Shadow Honeypot technique for Data
Retrieval in Cloud Computing. In 2021 3rd International Conference
[4]. Saravanan, T., & Sasikumar, P. (2022). Automated Systems using AI
on Advances in Computing, Communication Control and Networking
in the Internet of Robotic Things: A New Paradigm for Robotics. (ICAC3N) (pp. 1151-1154). IEEE.
Machine Learning Methods for Engineering Application
Development, 127. [21]. Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C.Y.,
Berg, A.C., “SSD: Single shot multibox detector”, European
[5]. K. Zaatouri and T. Ezzedine, "A Self-Adaptive Traffic Light Control conference on computer vision, ECCV, pp. 21–37, 2016.
System Based on YOLO," International Conference on Internet of
Things, Embedded Systems and Communications (IINTEC), pp. 16- [22]. Saravanan, T., & Sasikumar, P. (2021). Assessment and analysis of
19, 2018. action degeneracy due to blackhole attacks in wireless sensor
networks. In Proceedings of 6th International Conference on Recent
[6]. Ministry of Road Transport & Highways, Government of India, Road Trends in Computing: ICRTC 2020 (pp. 345-355). Springer
Accidents in India - 2018, pp. 8, 2019. Singapore.
[7]. Saravanan, T., & Saravanakumar, S. (2022, August). Enhancing [23]. Hu, X., Xu, X., Xiao, Y., Hao, C., He, S., Jing, Q., Heng, P.A.,
reliable communication to improve network lifetime in Wireless “Sinet: A scale-insensitive convolutional neural network for fast
Sensor Networks by Displacement and Direction Conscious Adhoc vehicle detection”, IEEE Transactions on Intelligent Transportation
On-Demand Multipath Distance Vector routing protocol. In Systems, Vol (99), pp:1–10, 2018.
Proceedings of the 2022 Fourteenth International Conference on
Contemporary Computing (pp. 597-606). [24]. Saravanan, T., & Nithya, N. S. (2019). Modeling displacement and
direction aware ad hoc on-demand distance vector routing standard
[8]. W.-H. Lee and C.-Y. Chiu, “Design and Implementation of a Smart for mobile ad hoc networks. Mobile Networks and Applications, 24,
Traffic Signal Control System for Smart City Applications,” Sensors, 1804-1813.
vol. 20, no. 2, p. 508, Jan. 2020.
[25]. R. Girshick, “Fast R-CNN,” IEEE International Conference on
[9]. M. Gohar, M. Muzammal and A. U. Rahman, “SMART TSS: Computer Vision (ICCV), pp. 1440-1448, 2015.
Defining transportation system behavior using big data analytics in
smart cities,” Sustainable Cities and Society, vol.41, 2018. [26]. Saravanan, T., & Nithya, N. S. (2019). Design of Dynamic Source
Routing with the Aid of Fuzzy Logic for Cross Layered Mobile Ad
[10]. Al-Smadi, M., Abdulrahim, K., Salam, R.A., “Traffic surveillance: A Hoc Networks. International Journal of Engineering and Advanced
review of vision-based vehicle detection, recognition, and tracking”, Technology, 8(6), 4241-4247.
International Journal of Applied Engineering Research, Vol.11(1),
713–726, 2016. [27]. Bochkovskiy, Alexey & Wang, Chien-Yao & Liao, Hong-yuan.
(2020). YOLOv4: Optimal Speed and Accuracy of Object Detection.
[11]. Saravanan, T., & Rajulu, G. G. (2022, December). A Reliable and
efficient data transfer on wireless sensor networks by using [28]. A. Karnawat, "A Survey on Easy OCR Techniques used to build
Optimization algorithms. In 2022 4th International Conference on System for Visually Impaired People", Vol: 6, pp:1425-1429, January
Advances in Computing, Communication Control and Networking 2018.
(ICAC3N) (pp. 1774-1778). IEEE. [29]. T. Carneiro, R.V.M.D. Nobrega, T. Nepomuceno, G.-B. Bian,
[12]. Radhakrishnan, M., “Video object extraction by using background V.H.C.D. Albuquerque and P.P.R. Filho, “Performance Analysis of
subtraction techniques for sports applications”, Digital Image Google Colaboratory as a Tool for Accelerating Deep Learning
Processing, Vol.5(9), 91–97, 2016. Applications,” IEEE Access, pp. 1-1, 2018.
[13]. Qiu-Lin, L.I., & Jia-Feng, H.E., “Vehicles detection based on the [30]. Mohamed, Elhassan & Sirlantzis, Konstantinos & Howells, Gareth.
three-frame-difference method and cross-entropy threshold method” "Application of Transfer Learning for Object Detection on Manually
Computer Engineering, Vol. 37(4), 172–174, 2018. Collected Data”, Advances in Intelligent Systems and Computing vol:
1037, 2019.
[14]. Saravanan, T., Babu, M. D., Vinotha, D., & Saravanakumar, S. (2022,
April). Arduino Based Road Congestion Management System in a

You might also like