Security models in vehicular ad-hoc networks: A survey

JM De Fuentes, L González-Manzano… - IETE Technical …, 2014 - Taylor & Francis
… that they consider compatible security models. This study presents a survey of the underlying
security models of 41 recent proposals. Four key aspects in VANET security are studied, …

An adaptive and predictive security model for mobile ad hoc networks

S Alampalayam, A Kumar - Wireless Personal Communications, 2004 - Springer
… threats, there is a need to develop schemes, algorithms, and protocols for a secured ad hoc
… effective security model for mobile ad hoc networks. The proposed predictive security model

A distributed light-weight authentication model for ad-hoc networks

A Weimerskirch, G Thonet - Information Security and Cryptology—ICISC …, 2002 - Springer
… In this work we present a security model for low-value transactions in ad-hoc networks in …
to the ad-hoc networking paradigm we give a survey of various existing models and analyze …

[PDF][PDF] A systematic review of security in vehicular ad hoc network

S Goudarzi, AH Abdullah, S Mandala… - Proc. 2nd Symp …, 2013 - researchgate.net
… requirements (see Figure 3) and in order to relevance and comprehensiveness of discussion
presented in the articles, we selected the existing security models that focus on privacy and …

Security of vehicular ad-hoc networks: A comprehensive survey

AK Malhi, S Batra, HS Pannu - Computers & Security, 2020 - Elsevier
… In vehicular ad-hoc networks, it is vital to guard the network against malicious activity or …
security architecture. This is because wireless connection is usually quite difficult to secure. The …

A dynamic trust model for mobile ad hoc networks

Z Liu, AW Joy, RA Thompson - Proceedings. 10th IEEE …, 2004 - ieeexplore.ieee.org
… This security aware route determination is based upon the Bell LaPadula security model [13].
As a node behaves suspiciously, the neighboring IDSs will report the potential threat and …

On trust models for communication security in vehicular ad-hoc networks

N Fan, CQ Wu - Ad Hoc Networks, 2019 - Elsevier
… Particularly, we use the certain-factor model to measure the … Based on these trust models,
we further design an attribute-… We also design and incorporate a dynamic game model-based …

Towards provable security for ad hoc routing protocols

L Buttyán, I Vajda - … of the 2nd ACM workshop on Security of ad hoc and …, 2004 - dl.acm.org
… We demonstrate the usefulness of our approach by analyzing two “securead hoc routing
… Finally, we propose a new ad hoc routing protocol and prove it to be secure in our model. …

Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
… : security and privacy. Both properties are especially relevant if we focus on ad-hoc
wireless … and established wireless ad-hoc technologies and we highlight their security/privacy …

Adaptive threat modeling for secure ad hoc routing protocols

TR Andel, A Yasinsac - Electronic Notes in Theoretical Computer Science, 2008 - Elsevier
… too weak, we miss vital security flaws. If the attacker … model to evaluate route discovery
attacks against ad hoc routing protocols. Our approach enables us to evaluate trust in the ad hoc