5G The next (5th) Generation AI Artificial Intelligence ACC Adaptive Cruise Control AMOS Analysis of Moment Structure ANOVA Analysis of Variance AGFI Adjusted Goodness of Fit Index API Application Programming Interface AWS Amazon Web Services ADEPT Autonomous Decentralized Peer-to-Peer Telemetry BCT Blockchain Technology BG Byzantine Generals CA Certificate Authority CACC Cooperative Adaptive Cruise Control CE Competitive Edge CFA Confirmatory Factor Analysis CFI Comparative Fit Index CP Compliance Policy C-DAC Center for Development of Advanced Computing CSS Cross-Site Scripting CP Compliance Policy CPU Central Processing Unit CoAP Constrained Application Protocol DApp Decentralized Application DHT Distributed Hash Table DPoS Delegated Proof of Stake dBFT Delegated Byzantine Fault Tolerance DLT Distributed Ledger Technology DNS Domain Name System DOSN Distributed Online Social Network DoS Denial of Service DDoS Distributed Denial of Service DTSL Datagram Transport Layer Security DSRC Dedicated Short-Range Communications EVM Ethereum Virtual Machine ECDSA Elliptic Curve Digital Signature Algorithm EHR Electronic Health Record ERP Enterprise Resource Planning EMR Electronic Medical Record FIR First Information Report FP Fiscal Policy GFI Goodness of Fit Index GUID Global Unique Identification HDAC Hyundai Digital Access Currency HTTP Hypertext Transfer Protocol HTML Hypertext Markup Language HD High Definition IANA Internet Assigned Numbers Authority IB Investment Banks ICT Information and Communications Technology IoT Internet of Things IPFS InterPlanetary File System I2V Infrastructure-to-Vehicle IP Internet Protocol IPv6 Internet Protocol version 6 IT Information Technology ICO Initial Coin Offering IoV Internet of Value IPO Initial Public Offering JSP Java Server Pages KYC Know Your Customer LPoS Leased Proof-of-Stake LoWPAN Low-Power Wireless Personal Area Networks LWM2M Lightweight M2M M2M Machine to Machine MBD Misbehavior Detection MQTT Message Queuing Telemetry Transport NAV Net Asset Value NIFTY National Stock Exchange Index NFI Normed Fit Index NHTSA National Highway Transportation Safety Agency NSA National Security Agency OBC Open Blockchain OS Operating System OBM Original Brand Manufacturing PKI Public Key Infrastructure PHP Hypertext Preprocessor PC Personal Computer P2P Peer to Peer PoW Proof of Work PoS Proof of Stake PBFT Practical Byzantine Fault Tolerance PoET Proof of Elapsed Time PoA Proof of Activity PoB Proof of Burn PL Platoon Leader RMSEA Root Mean Square Error of Approximation RMR Root Mean Square Residential RF1 Statutory Impact RF2 Compliance policy RF3 Competitive edge RF4 Fiscal Policy RF5 Service Level agreement RFW Regulatory Framework REST Representational State Transfer RPC Remote Procedure Call RSU Road-Side Units RAT Radio Access Technology RPL Routing Protocol for Low-Power and Lossy Networks RFID Radio Frequency Identification RBAC Role-Based Access Management SIS Susceptible, Infected, Susceptible Model SEIR Susceptible, Exposed, Infected and Recovered SEI Susceptible Exposed Infected SC Smart Contract SCMS Security Credential Management System SIR Susceptible, Infected, Recovered SI Statutory Impact SLA Service Level Agreement S&P Standard & Poor’s (Index) SEM Structural Equation Model SQL Structured Query Language SSL Secure Sockets Layer SCP Stellar Consensus Protocol SO Social Overlay SHA Secure Hash Algorithm TA Trusted Authority TCS Tata Consultancy Service TSL Transport Layer Security TCP Transmission Control Protocol UGV Unmanned Ground Vehicle UI User Interaction URL Uniform Resource Locator UTXO Unspent Transaction Output UNL Unique Node List VANET Vehicular Ad-Hoc Networks VVP Virus-Vulnerable and Protected V2X Vehicle-to-Everything V2V Vehicle-to-Vehicle V2I Vehicle-to-Infrastructure XHTML Extensible Hypertext Markup Language XMPP Extensible Messaging and Presence Protocol XAMP X-Cross Platform XSS Cross-Site Scripting W3C World Wide Web Consortium WAVE Wireless Access in Vehicular Environment WSN Wireless Sensor Network