2018
DOI: 10.1109/access.2018.2875104
|View full text |Cite
|
Sign up to set email alerts
|

A Software Defined Networking-Oriented Security Scheme for Vehicle Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(21 citation statements)
references
References 23 publications
0
21
0
Order By: Relevance
“…e VANETs architecture contains the OBU, RSU, and TA. ere are two types of communication technologies in VANETs architecture, i.e., (1) vehicle to vehicle (V2V) and (2) vehicle to infrastructure (V2I) communication as shown in Figure 1. V2V contact vehicles converse with one another and exchange the traffic-related information inside the cities; hence, a massive number of nodes can be dynamically added or adjusted into the system [9,10].…”
Section: Overview Of Vanetsmentioning
confidence: 99%
See 2 more Smart Citations
“…e VANETs architecture contains the OBU, RSU, and TA. ere are two types of communication technologies in VANETs architecture, i.e., (1) vehicle to vehicle (V2V) and (2) vehicle to infrastructure (V2I) communication as shown in Figure 1. V2V contact vehicles converse with one another and exchange the traffic-related information inside the cities; hence, a massive number of nodes can be dynamically added or adjusted into the system [9,10].…”
Section: Overview Of Vanetsmentioning
confidence: 99%
“…is algorithm might help to find the shortest route by giving connectivity among the vehicular nodes [69]. [68] is also known as disruption tolerant network [1], delaytolerant network, and store-carry-and-forward processbased network. Most of the current VANETs protocol had been proposed for immobile destinations.…”
Section: Nondelay Tolerant Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Blockchain and ML-based approaches such as deep Q-learning have recently been envisioned as an essential part of VANETs [139][140][141][142][143] with the aim of guaranteeing immutability and authentication in the information interchanged, and satisfying the demand for center-less trust. Most, if not all, recent works leverage a simulations environment to introduce these security enhancements, which highlights yet another vertical side of SDVNs lacking experimentation on real devices.…”
Section: E Security and Privacymentioning
confidence: 99%
“…Anomaly identification checks for abnormal behavior from the state of the physical process and a multi-layer response model prevent unauthorized packet communication, thereby generating a strategy to mitigate attacks to protect the physical process. Geng et al [29] have suggested dual security strategies for vehicle network. Initially, the network hierarchy was composed of software-defined concept to normalize the network management.…”
Section: Introductionmentioning
confidence: 99%