Learn More
Extensive work has been done for optimal management of scratch-pad memory (SPM) all assuming that the SPM is assigned a fixed address space. The main target objects to be placed on the SPM have been code and global memory since their sizes and locations are not changed dynamically. We propose a novel idea of dynamic address mapping of SPM with the(More)
In this paper, we propose a timestamp series approach to defend against Sybil attack in a vehicular ad hoc network (VANET) based on roadside unit support. The proposed approach targets the initial deployment stage of VANET when basic roadside unit (RSU) support infrastructure is available and a small fraction of vehicles have network communication(More)
A vehicular ad hoc network (VANET) allows vehicles to share traffic information and to alert each other of emergency events. To achieve this goal, a security mechanism must be designed to guarantee that no malicious vehicles can intercept, manipulate, or modify the traffic information without being detected. In this paper, we present two novel approaches to(More)
In this paper we propose a dynamic code overlay technique of synchronous data-flow (SDF) –modeled program for low-end embedded systems which lack MMU-support. With this technique, the system can utilize expensive SRAM memory more efficiently by using flash memory as code storage. SRAM is divided into several regions called overlay slots. A data-flow block(More)
—In this paper, we propose two certificate mechanisms for preventing the Sybil attack in a vehicular ad hoc network (VANET): the timestamp series approach and the temporary certificate approach. We focus on an early-stage VANET when the number of smart vehicles is only a small fraction of the vehicles on the road and the only infrastructure components(More)
Architectures of electronic surveillance of various types of P2P-based VoIP services are described in this paper. There are kinds of architectures of P2P based VoIP service according to the telecommunication networks used including PSTN, mobile network, and VoIP network. In other words, appropriate architecture and points of electronic surveillance of P2P(More)
A vehicular ad hoc network (VANET) allows vehicles share traffic information and alerting each other any emergency events. To achieve this goal, a security mechanism must be designed to guarantee that no malicious vehicles can intercept, manipulate, or modify the traffic information without being detected. In this chapter, we present two novel approaches to(More)
  • 1