Conference Paper

Blockchain-Enabled UAV-Assisted Unregistered Vehicle Identification using Mobile Edge Computing

Conference Paper

Blockchain-Enabled UAV-Assisted Unregistered Vehicle Identification using Mobile Edge Computing

If you want to read the PDF, try requesting it from the authors.

Abstract

Unregistered vehicle identification is one challenging issue to solve in the perspective of a smart city as it is responsible for different consequences like a traffic accident, vehicle hijacking, illegal drug transfer etc. A surveillance camera can try to capture the video and transfer it to the mobile edge computing (MEC) server for identification purpose based on the valid number plate of the vehicles. Unmanned aerial vehicle (UAV) can work together with the surveillance camera to increase the accuracy of the vehicle detection on the road. Blockchain technology can help to create a trusted network with the user information where third-party is unable to modify any data inside the network. MEC server can validate the identified vehicles using image processing techniques and send a notification to the user based on its registration information. If the vehicles are not identified successfully, the preventive measure will be taken by the authority to avoid any disruption on the road.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Conference Paper
Full-text available
Voting is a very important issue which can be beneficial in term of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounds with ballot forgery, coercion and multiple voting issues. Moreover, while giving votes, a person has to wait in a long queue and it is a very time-consuming process. Blockchain is a distributed database in which data are shared with the participant of the node and each participant holds the same copy of the data. Blockchain has properties like distributed, pseudonymity, data integrity etc. In the paper, a fully decentralized e-voting system based on blockchain technology is proposed. This protocol utilizes smart contract into the e-voting system to deal with security issues, accuracy and voters’ privacy during the vote. The protocol results in a transparent, non-editable and independently verifiable procedure that discards all the intended fraudulent activities occurring during the election process by removing the least participation of the third party and enabling voters’ right during the election. Both transparency and coercion are obtained at the same time.
Article
Full-text available
Owing to their dynamic and multidisciplinary characteristics, Unmanned Aerial Vehicles (UAVs), or drones, have become increasingly popular. However, the civil applications of this technology, particularly for traffic data collection and analysis, still need to be thoroughly explored. For this purpose, the authors previously proposed a detailed methodological framework for the automated UAV video processing in order to extract multi-vehicle trajectories at a particular road segment. In this paper, however, the main emphasis is on the comprehensive analysis of vehicle trajectories extracted via a UAV-based video processing framework. An analytical methodology is presented for: (i) the automatic identification of flow states and shockwaves based on processed UAV trajectories, and (ii) the subsequent extraction of various traffic parameters and performance indicators in order to study flow conditions at a signalized intersection. The experimental data to analyze traffic flow conditions was obtained in the city of Sint-Truiden, Belgium. The generation of simplified trajectories, shockwaves, and fundamental diagrams help in analyzing the interrupted-flow conditions at a signalized four-legged intersection using UAV-acquired data. The analysis conducted on such data may serve as a benchmark for the actual traffic-specific applications of the UAV-acquired data. The results reflect the value of flexibility and bird-eye view provided by UAV videos; thereby depicting the overall applicability of the UAV-based traffic analysis system. The future research will mainly focus on further extensions of UAV-based traffic applications.
Conference Paper
Trespassing in the marine area is a very critical issue. As a result, countries are losing revenue as well as it's a threat against the sovereignty of the country. As sea area is large, it's not always possible to monitor every part in real-time. Unmanned aerial vehicle (UAV) is a promising technology that can assist to alleviate this issue. However, communication between the control center and a UAV encircles with cyber threats as well as data in the surveillance may experience unauthorised modification. This paper represents a blockchain-empowered smart surveillance architecture in which UAV performs surveillance and uses a two-phase authentication process to verify the marine vehicles. The experimental result manifests that the proposed scheme is faster and consumes less energy than the existing authentication algorithms.
Conference Paper
With the advancement of technology, devices, which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising of such device can create a home IoT network. Such IoT devices are resource constrained and lack high-level security protocols. Thus, security becomes a major issue for such network systems. One way to secure the networks is through reliable authentication protocols and data transfer mechanism. As the household devices are controllable by the users remotely, they are accessed over the internet. Therefore, there should also be a method to make the communication over the internet between IoT devices and the users more secured. This paper proposes a two-phase authentication protocol for authentication purposes and a VPN based secure channel creation for the communication of the devices in the network. Furthermore, the paper discusses the Elliptic Curve Cryptography as a viable alternative to RSA for a more efficient Key exchange mechanism for low-powered IoT devices in the network.
A blockchainenabled CO2 controlling scheme with the assistance of the internet of things
  • M Masuduzzaman
  • A Islam
  • S Y Shin
M. Masuduzzaman, A. Islam, and S. Y. Shin, "A blockchainenabled CO2 controlling scheme with the assistance of the internet of things," Journal of the Korean Institute of Communication Sciences, pp. 114-115, 2020.
BUAG: A blockchain-empowered unmanned aerial vehicle-unmanned ground vehi-cle cooperative search and rescue scheme
  • A Islam
  • M Masuduzzaman
  • A Akter
  • S Y Shin
A. Islam, M. Masuduzzaman, A. Akter, and S. Y. Shin, "BUAG: A blockchain-empowered unmanned aerial vehicle-unmanned ground vehi-cle cooperative search and rescue scheme," Journal of the Korean Institute of Communication Sciences, pp. 116-117, 2020.