[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Malhi et al., 2020 - Google Patents

Security of vehicular ad-hoc networks: A comprehensive survey

Malhi et al., 2020

Document ID
17329275626796687190
Author
Malhi A
Batra S
Pannu H
Publication year
Publication venue
Computers & Security

External Links

Snippet

Vehicles equipped with significant computing, communication and sensing (also known as “smart” vehicles), are being focused by Intelligent Transportation Systems (ITS). The primitive target of Vehicular Ad-Hoc Networks (VANETs) is to deliver safer and efficient traffic …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Similar Documents

Publication Publication Date Title
Malhi et al. Security of vehicular ad-hoc networks: A comprehensive survey
Sheikh et al. Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey
Mirsadeghi et al. A trust infrastructure based authentication method for clustered vehicular ad hoc networks
Lamssaggad et al. A survey on the current security landscape of intelligent transportation systems
Ghosal et al. Security issues and challenges in V2X: A survey
Hasrouny et al. VANet security challenges and solutions: A survey
Sheikh et al. A comprehensive survey on VANET security services in traffic management system
Grover Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review
Tanwar et al. A systematic review on security issues in vehicular ad hoc network
Van Der Heijden et al. Survey on misbehavior detection in cooperative intelligent transportation systems
Raya et al. Securing vehicular ad hoc networks
Razzaque et al. Security and privacy in vehicular ad-hoc networks: survey and the road ahead
Quyoom et al. Security attacks and challenges of VANETs: a literature survey
Babaghayou et al. Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey
Junejo et al. A privacy‐preserving attack‐resistant trust model for internet of vehicles ad hoc networks
Goumidi et al. Vehicular cloud computing security: A survey
Ahmed et al. [Retracted] A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks
Xu et al. Comprehensive review on misbehavior detection for vehicular ad hoc networks
Galaviz-Mosqueda et al. Multi-hop broadcast message dissemination in vehicular ad hoc networks: A security perspective review
Sleem et al. Towards a secure ITS: Overview, challenges and solutions
Grover et al. Sybil attack in vanets
Sutradhar et al. A survey on privacy-preserving authentication protocols for secure vehicular communication
Anwar et al. Cloud-based Sybil attack detection scheme for connected vehicles
Premasudha et al. A Review of Security Threats, Solutions and Trust Management in VANETs.
Pattanayak et al. A novel approach to detection of and protection from Sybil attack in VANET