VANET vulnerabilities classification and countermeasures: a review

G Reddy - Majlesi Journal of Electrical Engineering, 2022 - oiccpress.com
Information is the driving force in vehicular ad hoc networks (VANET) since vehicles share
information (emergency, general, and multimedia). VANET communicates between vehicles …

Secure WSN Architecture Utilizing Hybrid Encryption with DKM to Ensure Consistent IoV Communication

UK Lilhore, S Simaiya, S Dalal, YK Sharma… - Wireless Personal …, 2024 - Springer
Reliable communication is essential in the Internet of Vehicles (IoV) framework, where the
efficient transmission of important information is required to ensure vehicle safety and smart …

[PDF][PDF] Efficient detection and mitigation of rushing attacks in VANET using RAID: a novel intrusion detection system

VK Kapu, GR Karri - J Comput Sci, 2023 - researchgate.net
The vehicle manufacturing hub has evolved over the last decade with the emergence of self-
driving vehicles and human-driven vehicles that use the concept of Artificial Intelligence (AI) …

APKI: An anonymous authentication scheme based on PKI for VANET

S Jiang, X Chen, Y Cao, T Xu, J He… - 2022 7th International …, 2022 - ieeexplore.ieee.org
Ehicular ad-hoc network (VANET) as the core of Intelligent Transportation System (ITS)
enables transfer of data which consists of private information of VANETs users such as exact …

EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET

J Ren, Y Cheng, S Xu - Peer-to-Peer Networking and Applications, 2022 - Springer
With the ever-growing development of the Internet of Things (IoTs), the Vehicular ad-hoc
Network (VANET) is widely utilized in terms of vehicle communication. In the past decade …

SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios

Y Cheng, S Xu, Y Cao, Y He, K Xiao - International Conference on …, 2022 - Springer
Abstract Unmanned Aerial Vehicles (UAVs) are widely utilized for wireless communication
services, promoting the emergence of promising UAV-assisted vehicle networks. However …

[PDF][PDF] A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture.

YB Cao, XB Chen, YF He, LX Liu… - … Materials & Continua, 2024 - cdn.techscience.cn
Due to the rapid advancements in network technology, blockchain is being employed for
distributed data storage. In the Internet of Things (IoT) scenario, different participants …

Lattice based ring signature scheme for secure cloud-based EMR sharing

W Hu, Y Chai, X Chen, C Zheng - 2022 7th International …, 2022 - ieeexplore.ieee.org
Advances in medical science and technology continue to drive the development of e-
healthcare, with Electronic Medical Records (EMRs) consisting of medical information such …

CA-Free Real-Time Fuzzy Digital Signature Scheme

Y Yan, S Xu - … Conference on Wireless Algorithms, Systems, and …, 2022 - Springer
Digital signature has been playing a very important role in electronic money transactions
while memorizing and storing keys for digital signatures brings a great burden to users. In …