An Enhanced Vehicle to Cloud Communication by Prediction Based Machine Learning Approaches

Vehicle utilization as mobile sensor functions like as a catalyst for most of dense vehicle sensing based application like intelligent traffic control and heterogeneous vehicular networks. Moreover, extensive rise in Machine based communication (MC) extremely stress capacities of network infra-structure. With restricted resources in systems in networks and resource availability amongst mobile users and MC, huge amount of resource effectual channel accessing approaches are needed to enhance co-existence of diverse communication entities. In this investigation, a novel Machine learning (ML) based transmission strategy for user side opportunistic transmission is presented. Considering channel prediction characteristics and measured channel state, delay tolerance of vehicles are carried out to show resource efficiency. Anticipated model is measured with MATLAB in Long Term Evolution (LTE) networks; here the mean data rate is raised with the reduction of power consumption.

[1]  Xiong Li,et al.  A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..

[2]  Xiong Li,et al.  A new and secure authentication scheme for wireless sensor networks with formal proof , 2017, Peer-to-Peer Netw. Appl..

[3]  Rajendran Thavasimuthu,et al.  Recent Innovations in Soft Computing Applications , 2019, Current Signal Transduction Therapy.

[4]  Hari Om,et al.  Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.

[5]  Fan Wu,et al.  Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems , 2012, Journal of Medical Systems.

[6]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[7]  Xiong Li,et al.  An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.

[8]  Wei Liang,et al.  A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.

[9]  S. Manimurugan,et al.  A LS-compression scheme for grayscale images using pixel based technique , 2017, 2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT).

[10]  K. Porkumaran,et al.  A new fast and efficient visual cryptography scheme for medical images with forgery detection , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[11]  Fan Wu,et al.  Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care , 2015, Journal of Medical Systems.

[12]  Saad Almutairi,et al.  A new secure transmission scheme between senders and receivers using HVCHC without any loss , 2019, EURASIP J. Wirel. Commun. Netw..

[13]  Sungyoung Lee,et al.  An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.

[14]  H. T. Mouftah,et al.  Trustworthy Sensing for Public Safety in Cloud-Centric Internet of Things , 2014, IEEE Internet of Things Journal.

[15]  Pardeep Kumar,et al.  E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks , 2012, Sensors.

[16]  Jong Hyuk Park,et al.  Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..

[17]  S. Manimurugan,et al.  A NOVEL SECRET IMAGE HIDING TECHNIQUE FOR SECURE TRANSMISSION 1 , 2017 .

[18]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[19]  S. Manimurugan,et al.  A Grayscale Image Hiding Encode Scheme for Secure Transmission , 2019, Current Signal Transduction Therapy.

[20]  S. Deepa,et al.  Advanced Algorithms for Medical Image Processing , 2019 .

[21]  S. Manimurugan,et al.  A Lossless Compression Scheme for Grayscale Medical Images Using a P2-Bit Short Technique , 2017 .

[22]  K. Porkumaran,et al.  The new block pixel sort algorithm for TVC-encrypted medical image , 2014 .

[23]  Manimurugan Shanmuganathan,et al.  Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions , 2015, Int. J. Digit. Crime Forensics.

[24]  Daojing He,et al.  A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[25]  Tzonelih Hwang,et al.  BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.

[26]  Wei-Kuan Shih,et al.  A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .

[27]  Jong Hyuk Park,et al.  SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook , 2017, Appl. Soft Comput..