[HTML][HTML] Classification and comparison of ad hoc networks: A review

R Agrawal, N Faujdar, CAT Romero, O Sharma… - Egyptian Informatics …, 2023 - Elsevier
The study of ad hoc networks and their different varieties, including wireless sensor
networks, wireless mesh networks, and mobile ad hoc networks, is discussed in this paper …

A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022 - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Highly accurate sybil attack detection in vanet using extreme learning machine with preserved location

A Balaram, SA Nabi, KS Rao, N Koppula - Wireless Networks, 2023 - Springer
Due to the development of transportation technology, the number of vehicles on the road
has been exponential over the years. Road safety is one of the crucial tasks of the …

Towards misbehavior intelligent detection using guided machine learning in vehicular ad-hoc networks (VANET)

O Slama, B Alaya, S Zidi - Inteligencia Artificial, 2022 - journal.iberamia.org
Abstract C-ITS (Cooperative Intelligent Transport Systems) est une nouvelle technologie qui
contribue à la réduction des accidents de la circulation et à l'amélioration de la sécurité …

A survey on 802.11 MAC industrial standards, architecture, supporting emergency traffic and security: Future directions

SK Memon, M Hanafi Ahmad Hijazi, K Nisar… - Journal of Industrial …, 2022 - ray.yorksj.ac.uk
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Developing an optimized routing protocol with rumor riding technique for detection of Sybil attack in VANET environment

VR Navinkumar… - International Journal of …, 2024 - Wiley Online Library
An attack on VANET known as a Sybil attack involves the attacker claiming or stealing
multiple identities with the intent of causing havoc on the network's operation by …

Sybil Attack Detection on ITS-V2X System using a Realistic Traffic Model-based Approach

A Afdhal, A Ahmadiar, R Adriman - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The V2X system is a vehicular communication network developed for ITS based-on
information technology. The ITS-V2X system can enable the provision of reliable and real …

A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions

A Shahid Khan, M Ali Sattar, K Nisar, AAA Ibrahim… - Applied …, 2022 - ray.yorksj.ac.uk
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Enhancing privacy-preserving in vehicular cloud through an incentive-based strategy

H Mistareeh, M Tennyson, HB Salameh - 2024 - digitallibrary.aau.ac.ae
The literature has extensively explored vehicle ad hoc networks (VANETs) and vehicular
clouds, with a common assumption in these studies being incorporating onboard units …

Tackling Sybil Attacks in Intelligent connected vehicles: A Review of Machine Learning and Deep Learning Techniques

Y Zhong, B Yang, Y Li, H Yang, X Li… - 2023 8th International …, 2023 - ieeexplore.ieee.org
Intelligent connected vehicles (ICVs) have become increasingly prevalent in recent years,
offering improved safety and efficiency. However, they are also vulnerable to various …