Research on WiFi penetration testing with Kali Linux

HJ Lu, Y Yu - Complexity, 2021 - Wiley Online Library
Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi
penetration testing based on Kali Linux which is divided into four stages: preparation …

Blockchain-based trust management model for vehicular ad hoc networks

J Zhao, F Huang, L Liao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Although vehicular ad hoc networks (VANETs) significantly enhance traffic convenience, the
propagation of erroneous information by malicious vehicles remains a challenging issue. To …

Toward a distributed trust management system for misbehavior detection in the internet of vehicles

A Mahmood, QZ Sheng, WE Zhang, Y Wang… - ACM Transactions on …, 2023 - dl.acm.org
Recent considerable state-of-the-art advancements within the automotive sector, coupled
with an evolution of the promising paradigms of vehicle-to-everything communication and …

Dynamic pseudonyms trust-based model to protect attack scenario for internet of vehicle ad-hoc networks

I Memon, RA Shaikh, H Shaikh - Multimedia Tools and Applications, 2024 - Springer
The Intelligent transport systems (ITS) have evolved with the Internet of Vehicles (IoV) and
the growth of advanced wireless technology associated with billions of smart devices …

Blockchain-enabled vehicular ad hoc networks: A systematic literature review

M Saad, MK Khan, MB Ahmad - Sustainability, 2022 - mdpi.com
This systematic literature review provides an extensive categorization of the blockchain-
enabled applications across the domain of vehicular ad hoc networks (VANETs). Within the …

ODPV: An efficient protocol to mitigate data integrity attacks in intelligent transport systems

MA Javed, MZ Khan, U Zafar, MF Siddiqui… - IEEE …, 2020 - ieeexplore.ieee.org
Intelligent Transport Systems (ITS) require accurate information to be shared among
vehicles and infrastructure nodes for applications including accident information or pre …

A blockchain-based decentralized marketplace for trustworthy trade in developing countries

MP Lamela, J Rodríguez-Molina… - IEEE …, 2022 - ieeexplore.ieee.org
The possibilities that Distributed Ledger Technologies (DLTs) offer for cooperation,
development, and achievement of the Sustainable Development Goals (SDGs) are …

An IPS approach to secure V-RSU communication from blackhole and wormhole attacks in VANET

G Soni, K Chandravanshi, MK Jhariya… - Contemporary Issues in …, 2022 - Springer
Vehicles or nodes in Vehicular Ad hoc Network (VANET) are forwarding the traffic
information for validation route information. Attacker vehicles are sending false messages of …

Sensor network environments: A review of the attacks and trust management models for securing them

K Mannix, A Gorey, D O'Shea, T Newe - Journal of Sensor and Actuator …, 2022 - mdpi.com
Over the past decade, new technologies have driven the rise of what is being termed as the
fourth industrial revolution. The introduction of this new revolution is amalgamating the cyber …

Robustness evaluation of trust and reputation systems using a deep reinforcement learning approach

AJ Bidgoly, F Arabi - Computers & Operations Research, 2023 - Elsevier
One of the biggest challenges facing trust and reputation systems (TRSs) is evaluating their
ability to withstand various attacks, as these systems are vulnerable to multiple types of …