Security improvements for connected vehicles position-based routing

A Silva, L Silva, A Oliveira… - International Journal of …, 2021 - search.proquest.com
The constant growing on the number of vehicles is increasing the complexity of traffic in
urban and highway environments. It is paramount to improve traffic management to …

Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment

Y Xin, X Feng - International Journal of Distributed Sensor …, 2019 - journals.sagepub.com
In vehicular ad hoc networks, attackers can disguise as replicas of legitimate vehicles by
cracking or colluding and then use the identity replicas in a malicious way. Not only the …

A Neuro-Genetic Security Framework for Misbehavior Detection in VANETs.

I Naqvi, A Chaudhary, A Kumar - International Journal of …, 2024 - search.ebscohost.com
Genetic Algorithm (GA) is an excellent optimization algorithm which has attracted the
attention of researchers in various fields. Many papers have been published on works done …

Analytical survey of existing research on anonymous communication technologies and directions for further study

MA Nia, A Ruiz-Martínez - International Journal of …, 2022 - search.proquest.com
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. Dur-ing …

An efficient trust based method for Sybil node detection in mobile wireless sensor network

V Sujatha, EA Anita - AIP Conference Proceedings, 2018 - pubs.aip.org
The major responsibilities of Wireless Sensor Networks to enforce security are
authentication of the node, nonrepudiation and mysterious communication. On the other …

SWATS: A lightweight VANET anonymous traceback system based on random superposition watermarking

X Wang, J Jiang, L Bai - … & Big Data Computing, Internet of …, 2018 - ieeexplore.ieee.org
Nowadays, anonymity based on privacy-preserving has attracted increasing attention in the
literature. A VANET is a key part of the intelligent transportation system (ITS) framework. In …

Three factors based sybil attack detection and RSU corruption detection in the VANET environment

VC Nitha, A Anitha, M Mukesh - AIP Conference Proceedings, 2023 - pubs.aip.org
Vehicular Ad-Hoc Networks (VANET) handles transferring data betwixt moving vehicles to
shun accidents and also render journey comfort along with traffic safety. However, the …

SCPP: Secure Credential Provisioning Protocol for Cellular Vehicles

MBM Mansour - 2019 International Symposium on Systems …, 2019 - ieeexplore.ieee.org
Recently, a special type of edge computing, known as Mobile Edge Computing (MEC), has
emerged to satisfy various demands of different user types with minimum latency and high …

IoT with Automation Clustering to Detect Power Losses with Energy Consumption and Survey of Defense Machinery against Attacks

AK Singh, V Pandey - Applied Soft Computing and Embedded …, 2021 - taylorfrancis.com
Losses or electricity loss is one of the results of the application of the historical electric power
reading system, AMR (Automatic Meter Reading). To detect the losses itself is still checking …

An overview of privacy preserving schemes for VANET

K Salunke, U Ragavendran - … Technologies and Internet of Things (ICICI) …, 2019 - Springer
In Vehicular ad-hoc networks (VANET) there is need to tackle various security concerns
before they employed. VANET provides safe journey with the help of various secure services …