My Account Log in

1 option

Cryptographic Verification Method for an Emergency Vehicle to Non-Emergency Vehicle Communication SRM Institute of Science and Technology

SAE Technical Papers (1906-current) Available online

View online
Format:
Book
Conference/Event
Author/Creator:
Ansari, Asadullah, author.
Contributor:
Adlagadda, Divakar
Aziz, Mohammad
D H, Sharath
P.C., Karthik
Uddin, Saif
Conference Name:
WCX SAE World Congress Experience (2022-04-05 : Detroit & Online, Michigan, United States)
Language:
English
Physical Description:
1 online resource cm
Place of Publication:
Warrendale, PA SAE International 2022
Summary:
An emergency vehicle is one of the critical vehicles designed by the Original Equipment Manufacturers (OEMs) to support the emergency assistance and maintenance for different emergency situations such as fire, health, et cetera These vehicles are provided a special provision by the legal authorities to bypass the road traffic scenarios and guidelines. The special provisions mainly include a co-operation of the non-emergency vehicles on the road for providing a smooth provision for the emergency vehicles to move, bypassing of traffic signals, et cetera Sometimes, the intruders utilize these provisions to hide their original identities by utilizing the emergency vehicles for their transportation. The vehicles utilized by intruders for this purpose are the illegitimate ones, which are carried by attackers for illegal purposes, but they possess the same external appearances and special alerting system as the legitimate emergency vehicles. Hence, these fake vehicles pose a serious challenge to the legal authorities as well as the other vehicles on the road who got fooled by assisting them using their special co-operative assistance system. In this regard, here an approach is proposed to detect these emergency fake emergency vehicles using the cryptography verification associated vehicular communication system. In the proposed system, the non-emergency vehicles verify the authenticity with the emergency vehicles using the cryptographic verification over the Vehicle to Vehicle (V2V) channel before assisting them for emergency movement. Finally, the proposed system help the non-emergency vehicles by not assisting the intruder emergency vehicles and by assisting the legitimate vehicles on the road infrastructure
Notes:
Vendor supplied data
Publisher Number:
2022-01-0118
Access Restriction:
Restricted for use by site license

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account