International Conference on Cyberspace Technology (CCT 2013) 2013
DOI: 10.1049/cp.2013.2080
|View full text |Cite
|
Sign up to set email alerts
|

A hierarchical security architecture of VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…For vehicle-to-vehicle correspondence, Dedicated Short Range Communication (DSRC) is required [11]. In VANET, common life alongside property security is unquestionably protected scarcely when both security and transportation are guaranteed [12]. It is approved that the design of the security framework goes about as a defensive make preparation for generally speaking perils by featuring the desperation and complicacy in settling the stress of VANET by the framework.…”
Section: ░ 2 Literature Surveymentioning
confidence: 99%
“…For vehicle-to-vehicle correspondence, Dedicated Short Range Communication (DSRC) is required [11]. In VANET, common life alongside property security is unquestionably protected scarcely when both security and transportation are guaranteed [12]. It is approved that the design of the security framework goes about as a defensive make preparation for generally speaking perils by featuring the desperation and complicacy in settling the stress of VANET by the framework.…”
Section: ░ 2 Literature Surveymentioning
confidence: 99%
“…VANET security is a well-researched topic, with solutions ranging from the most common and traditional Public Key Infrastructure (PKI) [10][11][12][13][14] to others, such as IDbased or situation-modeling approaches [15]. However, the approach using IDSs, more precisely, intelligent IDSs, is more recent, with interest growing since 2010 [8].…”
Section: Related Workmentioning
confidence: 99%
“…Regardless of whether it is an attack, the message is relayed to the upper level (10). The next level will then decipher the message (11), verify if it is an attack (12), and add it to the dataset (13). If an attack is detected, a system-wide warning is triggered (14).…”
Section: Upstream Communicationmentioning
confidence: 99%