High-Speed Network DDoS Attack Detection: A Survey

RMA Haseeb-Ur-Rehman, AHM Aman, MK Hasan… - Sensors, 2023 - mdpi.com
Having a large number of device connections provides attackers with multiple ways to attack
a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can …

Privacy protection scheme for the Internet of vehicles based on private set intersection

Q Zhou, Z Zeng, K Wang, M Chen - Cryptography, 2022 - mdpi.com
Performing location-based services in a secure and efficient manner that remains a huge
challenge for the Internet of Vehicles with numerous privacy and security risks. However …

An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder

L Yu, L Xu, X Jiang - Applied Sciences, 2023 - mdpi.com
The increasing prevalence of unknown-type attacks on the Internet highlights the importance
of developing efficient intrusion detection systems. While machine learning-based …

Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET

P Kumar, H Om - Vehicular Communications, 2024 - Elsevier
The rapid growth of Vehicular Ad-hoc Networks (VANET), fueled by advancements in the
Internet-of-Things, cloud computing, Intelligent Transportation Systems, and fog computing …

Bac-Crl: Blockchain-Assisted Coded Caching Certificate Revocation List for Authentication in Vanets

J Liang, M Sadiq, G Yang, D Cheng - Journal of Network and Computer …, 2023 - Elsevier
Abstract Vehicular Ad Hoc Networks (VANETs) are considered the technological upheaval
for improving road safety and traffic efficiency by enabling the wireless and network …

SPHA-VC: Secure passengers health assessment via vehicular communications

SA Lokhande, N Chauhan - Microprocessors and Microsystems, 2023 - Elsevier
Passenger health evaluation is a vital aspect of smart city applications. Remotely monitoring
driver and passenger health save lives. Vehicular Ad Hoc Network (VANET)-assisted …

An Efficient Approach for Tampering Attack Detection in WSN Using Blockchain

MR Yasin, HJ Syed, J Shuja - 2024 International Wireless …, 2024 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are vulnerable to a diverse selection of cyberattacks. A
cybercriminal may infiltrate some of the sensor nodes that make up a WSN and then tamper …

A secure lightweight authentication model with interference aware routing and attack detection approach in VANET

G Kaur, D Kakkar - Cluster Computing, 2025 - Springer
Abstract In Vehicular Ad Hoc network (VANET), security is one of the main concerns that are
required to be analysed seriously. In VANET, the nodes are movable and they communicate …

SGM: Strategic Game Model for Resisting Node Misbehaviour in IoT-Cloud Ecosystem

BUI Khan, F Anwar, FDBA Rahman, RF Olanrewaju… - Information, 2022 - mdpi.com
This paper introduces a computational strategic game model capable of mitigating the
adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments …

Blockchain-Enabled Security Model for VANETs: A Novel Approach to Authentication and Position

SM Faisal - 2024 - researchsquare.com
Abstract Vehicular Ad-hoc Networks (VANET) is infrastructure-less networks that does not
rely on a preexisting infrastructure and are inherently vulnerable to cyber-attacks due to their …