2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) 2020
DOI: 10.1109/icirca48905.2020.9182823
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 37 publications
0
12
0
Order By: Relevance
“…Table 1, shows the probability of dishonesty of vehicles. For each vector ⃗ X id = (x 1 , x 2 , x 3 ) in a period T, a probability of dishonesty corresponding to this vector is calculated via the Bayesian filter, which will be detailed in this section based on Equation (5). Then if the probability of dishonesty in the time interval t is above a fixed threshold, this value is equal to 1; otherwise, it is equal to 0.…”
Section: • Hsmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 1, shows the probability of dishonesty of vehicles. For each vector ⃗ X id = (x 1 , x 2 , x 3 ) in a period T, a probability of dishonesty corresponding to this vector is calculated via the Bayesian filter, which will be detailed in this section based on Equation (5). Then if the probability of dishonesty in the time interval t is above a fixed threshold, this value is equal to 1; otherwise, it is equal to 0.…”
Section: • Hsmentioning
confidence: 99%
“…4 However, these networks are always vulnerable F I G U R E 1 System model of vehicular network and prone to attacks due to the nature of wireless communication. We can classify attacks into six groups based on the protocol stack as follows: 5 1. Network layer (eg, Black hole attack, cooperative black hole attack, Sybil attack, Byzantine, and location disclosure attack).…”
Section: Introductionmentioning
confidence: 99%
“…Security and privacy issues posed by the underlying IP protocol stack in VANET [181][182][183] are naturally resolved by the core characteristics of NDN. However, new security and privacy challenges, specific for the underlying NDN architecture 54 still need to be tackled.…”
Section: Research Question (Rq3)-security Privacy and Trustmentioning
confidence: 99%
“…1. The data collection process begins by taking data from various incorporated sensors and then performing aggregation and compression to reduce communication cost and time, depending upon the protocol and adapted scheme [9]. Data collection protocols are designed by considering both predictable movement patterns and abrupt variation in speed.…”
Section: Introductionmentioning
confidence: 99%