2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) 2015
DOI: 10.1109/wmnc.2015.27
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Eco-Routing Protocol against Malicious Data in Vehicular Networks

Abstract: Vehicular networks have a diverse range of applications that vary from safety, to traffic management and comfort. Vehicular communications (VC) can assist in the ecorouting of vehicles in order to reduce the overall mileage and CO2 emissions by the exchange of data among vehicle-entities. However, the trustworthiness of these data is crucial as false information can heavily affect the performance of applications. Hence, the devising of mechanisms that reassure the integrity of the exchanged data is of utmost i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…as backbone to receive the real/predicted status of the traffic flow. In addition, the predicted data of the traffic flow offer advantages not only for the individual vehicles, but accuracy of these data will optimise also the performance of the other VANET applications such as, prediction that can be a basis for clustering and routing of packets (Maglaras and Katsaros, 2016), intrusion detection data in VANET networks (Maglaras and Katsaros, 2016); Basaras et al, 2015), prediction of the road risk and other accuracy data for mobile collaborative applications (Guetmi and Imine, 2017).…”
Section: Traffic Data Collectionmentioning
confidence: 99%
“…as backbone to receive the real/predicted status of the traffic flow. In addition, the predicted data of the traffic flow offer advantages not only for the individual vehicles, but accuracy of these data will optimise also the performance of the other VANET applications such as, prediction that can be a basis for clustering and routing of packets (Maglaras and Katsaros, 2016), intrusion detection data in VANET networks (Maglaras and Katsaros, 2016); Basaras et al, 2015), prediction of the road risk and other accuracy data for mobile collaborative applications (Guetmi and Imine, 2017).…”
Section: Traffic Data Collectionmentioning
confidence: 99%
“…In this regard, both specification-based and anomaly-based treatments (Müter et al, 2010) have been investigated. Moreover, an attempt to deflect attacks using honeypots has been described in Verendel et al (2008), while other novel techniques for filtering out tweaked data have been recently developed (Basaras et al, 2015).…”
mentioning
confidence: 99%
“…an attempt to deflect attacks using honeypots has been described in [162]. Finally, new techniques for filtering out tweaked data have been recently developed [28].…”
Section: Blocking the Outspread Of Undesired Data In Vehicular Networkmentioning
confidence: 99%