Malicious node detection in vehicular ad-hoc network (vanet) using enhanced beacon trust management with clustering protocol (ebtm-cp)

C Gupta, L Singh, R Tiwari - Wireless Personal Communications, 2023 - Springer
Vehicular ad hoc networks (VANETs) are susceptible to information threat, wherein an
aggressor aims to pose duplicate information or reprise the present information. Every …

Malicious Node Detection in Vehicular Ad-hoc Network (VANET) using Enhanced Beacon Trust Management with Clustering Protocol (EBTM-CP)

C Gupta, L Singh, R Tiwari - Wireless Personal Communications, 2023 - dl.acm.org
Vehicular ad hoc networks (VANETs) are susceptible to information threat, wherein an
aggressor aims to pose duplicate information or reprise the present information. Every …

Malicious Node Detection in Vehicular Ad‑hoc Network (VANET) using Enhanced Beacon Trust Management with Clustering Protocol (EBTM‑CP)

C Gupta, L Singh, R Tiwari - researchgate.net
Vehicular ad hoc networks (VANETs) are susceptible to information threat, wherein an
aggressor aims to pose duplicate information or reprise the present information. Every …

Malicious Node Detection in Vehicular Ad-hoc Network (VANET) using Enhanced Beacon Trust Management with Clustering Protocol (EBTM-CP).

C Gupta, L Singh, R Tiwari - Wireless Personal …, 2023 - search.ebscohost.com
Vehicular ad hoc networks (VANETs) are susceptible to information threat, wherein an
aggressor aims to pose duplicate information or reprise the present information. Every …

Malicious Node Detection in Vehicular Ad‑hoc Network (VANET) using Enhanced Beacon Trust Management with Clustering Protocol (EBTM‑CP)

C Gupta, L Singh, R Tiwari - researchgate.net
Vehicular ad hoc networks (VANETs) are susceptible to information threat, wherein an
aggressor aims to pose duplicate information or reprise the present information. Every …