2022
DOI: 10.1016/j.comcom.2022.05.014
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(3 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…In response, the traffic light is controlled to reduce traffic congestion. Similarly, RFID-based traffic congestion control was presented in reference [14] for emergency vehicle routing applications. Anomaly detection began with the Principal Component Analysis (PCA) method, which required extensive prior knowledge of link observations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In response, the traffic light is controlled to reduce traffic congestion. Similarly, RFID-based traffic congestion control was presented in reference [14] for emergency vehicle routing applications. Anomaly detection began with the Principal Component Analysis (PCA) method, which required extensive prior knowledge of link observations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Avoiding potentially dangerous interactions with hostile vehicle users is made easier using the batch authentication and key exchange approach proposed by Poongodi et al [21]. A Public Key Infrastructure (PKI), an ID-based system, and a MAC-based system are also proposed.…”
Section: Related Workmentioning
confidence: 99%
“…We investigate the setting for the adversary network for the poison attack, the assumption, the first case, taken as perfect knowledge gained by the adversary on the target classifier ( P TC ) and known feature space t ( x ).The second case, is that adversaries gained the less or limited knowledge ( L TC ), target classifier. We assumed that attacker may have knowledge of features representation, but not the training dataset (Rathore et al, 2022; Poongodi, Bourouis et al, 2022; Ramesh, Lihore et al, 2022; Poongodi, Malviya, Hamdi et al, 2022; Poongodi, Malviya, Kumar et al, 2022; Poongodi, Hamdi, & Wang 2022; Poongodi et al, 2021; Ramesh, Vijayaragavan et al, 2022; Hamdi et al, 2022; Poongodi, Hamdi, Malviya et al, 2022; Kamruzzaman 2021; Hossain et al, 2022; Chen et al, 2019; Kamruzzaman 2013, 2014; Zhang et al, 2021; Hossain, Kamruzzaman et al, 2022; Sarker et al, 2021; Shi et al, 2020; Chen et al, 2020).…”
Section: Attack Modelsmentioning
confidence: 99%