Papers by charles gabriel
A Survey on Possible Attacks in Vehicular Ad Hoc Network, 2019
In this research a survey is conducted that looks into the architecture of VANETs and their areas... more In this research a survey is conducted that looks into the architecture of VANETs and their areas of application. The architecture is broadly discussed in the introductory part, which also outlines the key role players. The paper also keenly focuses on the various security and privacy concerns that are experienced in the implementation of VANETs. Privacy and security issues found to affect VANET are based on integrity, confidentiality, availability, and reliability of data and information exchanged in VANETs. Attacks are major security concerns that are thoroughly surveyed in this work. Some of the means that attackers use in VANET include DoS attack, masquerade, eavesdropping, jamming, and others. Some of the popular means through which these attacks can be controlled include cryptographic means such as encryption. Other security measures that can be practiced to control the attacks include authentication and others that are broadly discussed in the paper. There is more to be done in the future to increase capabilities, security, and privacy of VANETs.
In this research a survey is conducted that looks into the architecture of VANETs and their areas... more In this research a survey is conducted that looks into the architecture of VANETs and their areas of application. The architecture is broadly discussed in the introductory part, which also outlines the key role players. The paper also keenly focuses on the various security and privacy concerns that are experienced in the implementation of VANETs. Privacy and security issues found to affect VANET are based on integrity, confidentiality, availability, and reliability of data and information exchanged in VANETs. Attacks are major security concerns that are thoroughly surveyed in this work. Some of the means that attackers use in VANET include DoS attack, masquerade, eavesdropping, jamming, and others. Some of the popular means through which these attacks can be controlled include cryptographic means such as encryption. Other security measures that can be practiced to control the attacks include authentication and others that are broadly discussed in the paper. There is more to be done in the future to increase capabilities, security, and privacy of VANETs. Fig 1: VATEN communication illustration [3]. As illustrated in the image above, VANETs are fitted with sensors and other components involved n sending and receiving signals in cars and on roadsides. As indicated in the image, three types of communication take place. These are the vehicle to vehicle (V2V) communication and Vehicle to roadside unity (V2I) communication. The third type is the cluster to cluster (C2C) communication. This type of communication takes place where the VANETs are divided into different clusters. Each cluster contains a given number of vehicles. Cunha et al. (2016) explains that VANETs are then integrated with vehicle mechanism that allows the vehicle to respond to communication signals automatically [3]
Case study on the following...
1. Do some Internet research on Chevron’s use of seismic imaging t... more Case study on the following...
1. Do some Internet research on Chevron’s use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs.
2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize the major security concerns associated with these systems and steps than can be taken to enhance their security.
3. Discuss the pros and cons of moving enterprise-wide applications that have traditionally been supported on premises to the cloud.
4. Do some Internet research on identify management and single sign on systems. Briefly explain how these work and why they are important in business intranets and extranets.
5. Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate?
One thing that is known to Europeans is how they colonized other countries and used their people ... more One thing that is known to Europeans is how they colonized other countries and used their people for slavery and forced labor. Various things made the Europeans consider themselves to be ahead of the other people or rather as superiors are the fact that they were able to have technological innovations and inventions that other nations did not have. Some of the
Uploads
Papers by charles gabriel
1. Do some Internet research on Chevron’s use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs.
2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize the major security concerns associated with these systems and steps than can be taken to enhance their security.
3. Discuss the pros and cons of moving enterprise-wide applications that have traditionally been supported on premises to the cloud.
4. Do some Internet research on identify management and single sign on systems. Briefly explain how these work and why they are important in business intranets and extranets.
5. Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate?
1. Do some Internet research on Chevron’s use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs.
2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize the major security concerns associated with these systems and steps than can be taken to enhance their security.
3. Discuss the pros and cons of moving enterprise-wide applications that have traditionally been supported on premises to the cloud.
4. Do some Internet research on identify management and single sign on systems. Briefly explain how these work and why they are important in business intranets and extranets.
5. Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate?