A comprehensive survey on vehicular networks for smart roads: A focus on IP-based approaches

J Jeong, Y Shen, T Oh, S Céspedes, N Benamar… - Vehicular …, 2021 - Elsevier
In vehicular communications, the use of IP-based vehicular networking is expected to
enable the deployment of various road applications, namely for vehicle-to-infrastructure …

Medical cyber–physical systems: A solution to smart health and the state of the art

F Chen, Y Tang, C Wang, J Huang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
A medical cyber–physical system (MCPS) is a unique cyber–physical system (CPS), which
combines embedded software control devices, networking capabilities, and complex …

The sybil attack

JR Douceur - International workshop on peer-to-peer systems, 2002 - Springer
Large-scale peer-to-peer systems face security threats from faulty or hostile remote
computing elements. To resist these threats, many such systems employ redundancy …

[图书][B] 6LoWPAN: The wireless embedded Internet

Z Shelby, C Bormann - 2011 - books.google.com
" It is stunningly thorough and takes readers meticulously through the design, configuration
and operation of IPv6-based, low-power, potentially mobile radio-based networking."—Vint …

Cryptographically generated addresses (CGA)

T Aura - International Conference on Information Security, 2003 - Springer
Cryptographically generated addresses (CGA) are IPv6 addresses some address bits are
generated by hashing the address owner's public key. The address owner uses the …

Network hygiene, incentives, and regulation: deployment of source address validation in the internet

M Luckie, R Beverly, R Koga, K Keys, JA Kroll… - Proceedings of the …, 2019 - dl.acm.org
The Spoofer project has collected data on the deployment and characteristics of IP source
address validation on the Internet since 2005. Data from the project comes from participants …

Defending against hitlist worms using network address space randomization

S Antonatos, P Akritidis, EP Markatos… - Proceedings of the …, 2005 - dl.acm.org
Worms are self-replicating malicious programs that represent a major security threat for the
Internet, as they can infect and damage a large number of vulnerable hosts at timescales …

Enhancing wireless location privacy using silent period

L Huang, K Matsuura, H Yamane… - IEEE Wireless …, 2005 - ieeexplore.ieee.org
The advance of ISM-band radio-based tracking systems (for example, wireless LAN-based
tracking system) extends the application of location-based services (LBS), but it also …

Security protocols and privacy issues into 6LoWPAN stack: A synthesis

C Hennebert, J Dos Santos - IEEE Internet of Things Journal, 2014 - ieeexplore.ieee.org
With the emergence of the Internet of Things (IoT), many devices organized into network,
communicate by themselves on the Internet, and send data or private information on the …

Mt6d: A moving target ipv6 defense

M Dunlop, S Groat, W Urbanski… - 2011-MILCOM 2011 …, 2011 - ieeexplore.ieee.org
The Internet Protocol version 6 (IPv6) brings with it a seemingly endless supply of network
addresses. It does not, however, solve many of the vulnerabilities that existed in Internet …