VANET security and privacy-an overview

MB Mansour, C Salama, HK Mohamed… - International Journal of …, 2018 - papers.ssrn.com
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet
they raise many challenges where the security and privacy concerns are the most critical …

Identifying ecus using inimitable characteristics of signals in controller area networks

W Choi, HJ Jo, S Woo, JY Chun… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As the functions of vehicles are more computerized for the safety and convenience of
drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have …

NERA: A new and efficient RSU based authentication scheme for VANETs

M Bayat, M Pournaghi, M Rahimi, M Barmshoory - Wireless networks, 2020 - Springer
In vehicular ad-hoc networks (VANETs), the correctness of a message requires
authentication of the origin vehicle. In this paper, we introduce a novel authentication …

Enabling civil–military collaboration for disaster relief operations in smart city environments

L Campioni, F Poltronieri, C Stefanelli, N Suri… - Future Generation …, 2023 - Elsevier
To address the aftermath of ever more frequent natural disasters striking highly-populated
urban areas, Humanitarian Assistance and Disaster Relief (HADR) operations increasingly …

Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks

I Memon, L Chen, QA Arain, H Memon… - International journal of …, 2018 - Wiley Online Library
In road network, vehicles' location may be identified, and their transmissions may even
tracked by eavesdrops (eg, safety messages) that contain sensitive personal information …

Anonymous three-factor authenticated key agreement for wireless sensor networks

Y Lu, G Xu, L Li, Y Yang - Wireless Networks, 2019 - Springer
Secure information exchange in wireless sensor networks (WSN) is a continuing issue since
the resource-constrained sensors generally deployed over an unattended environment. To …

Impact of energy consumption, economic growth, and FDI through environmental Kuznets Curve: Perspective from belt and road initiative and Pakistan

A Zubedi, Z Jianqiu, Q Ali, I Memon… - Mathematical Problems …, 2022 - Wiley Online Library
A significant corridor under the “Belt and Road Initiative” is announced by the government of
China for numerous transport and energy projects. China focuses greatly on the …

Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding

D Menaga, S Revathi - IET Information Security, 2018 - Wiley Online Library
Privacy preserving data mining (PPDM) is a well‐known research area, which can analyse
the database ensuring privacy such that it does not expose the confidential details. This …

Location privacy protection scheme for LBS in IoT

H Li, X Xue, Z Li, L Li, J Xiong - Wireless Communications and …, 2021 - Wiley Online Library
The widespread use of Internet of Things (IoT) technology has promoted location‐based
service (LBS) applications. Users can enjoy various conveniences brought by LBS by …

Pseudonym changing strategy with mix zones based authentication protocol for location privacy in road networks

I Memon, H Memon, QA Arain - Wireless Personal Communications, 2021 - Springer
A great advancement has been made in intelligent transportation system and
communication technologies in order to exchange secure information between automobiles …