Malhi et al., 2020 - Google Patents
Security of vehicular ad-hoc networks: A comprehensive surveyMalhi et al., 2020
- Document ID
- 17329275626796687190
- Author
- Malhi A
- Batra S
- Pannu H
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
Vehicles equipped with significant computing, communication and sensing (also known as “smart” vehicles), are being focused by Intelligent Transportation Systems (ITS). The primitive target of Vehicular Ad-Hoc Networks (VANETs) is to deliver safer and efficient traffic …
- 238000004891 communication 0 abstract description 110
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Malhi et al. | Security of vehicular ad-hoc networks: A comprehensive survey | |
Sheikh et al. | Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey | |
Mirsadeghi et al. | A trust infrastructure based authentication method for clustered vehicular ad hoc networks | |
Lamssaggad et al. | A survey on the current security landscape of intelligent transportation systems | |
Ghosal et al. | Security issues and challenges in V2X: A survey | |
Hasrouny et al. | VANet security challenges and solutions: A survey | |
Sheikh et al. | A comprehensive survey on VANET security services in traffic management system | |
Grover | Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review | |
Tanwar et al. | A systematic review on security issues in vehicular ad hoc network | |
Van Der Heijden et al. | Survey on misbehavior detection in cooperative intelligent transportation systems | |
Raya et al. | Securing vehicular ad hoc networks | |
Razzaque et al. | Security and privacy in vehicular ad-hoc networks: survey and the road ahead | |
Quyoom et al. | Security attacks and challenges of VANETs: a literature survey | |
Babaghayou et al. | Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey | |
Junejo et al. | A privacy‐preserving attack‐resistant trust model for internet of vehicles ad hoc networks | |
Goumidi et al. | Vehicular cloud computing security: A survey | |
Ahmed et al. | [Retracted] A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks | |
Xu et al. | Comprehensive review on misbehavior detection for vehicular ad hoc networks | |
Galaviz-Mosqueda et al. | Multi-hop broadcast message dissemination in vehicular ad hoc networks: A security perspective review | |
Sleem et al. | Towards a secure ITS: Overview, challenges and solutions | |
Grover et al. | Sybil attack in vanets | |
Sutradhar et al. | A survey on privacy-preserving authentication protocols for secure vehicular communication | |
Anwar et al. | Cloud-based Sybil attack detection scheme for connected vehicles | |
Premasudha et al. | A Review of Security Threats, Solutions and Trust Management in VANETs. | |
Pattanayak et al. | A novel approach to detection of and protection from Sybil attack in VANET |