2022
DOI: 10.1007/s11277-022-09997-0
|View full text |Cite
|
Sign up to set email alerts
|

ARPVP: Attack Resilient Position-Based VANET Protocol Using Ant Colony Optimization

Abstract: The position-based routing of Vehicular Ad hoc Network (VANET) vulnerable to various security attacks because of dependency on computing, control, and communication technologies. The Internet of Things (IoT)-enabled VANET application leads to the challenges such as integrity, access control, availability, privacy protection, non-repudiation, and confidentiality. Several security solutions have been introduced for two decades in two categories as cryptography-based and trust-based. Due to the high computation c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 46 publications
(35 reference statements)
0
1
0
Order By: Relevance
“…Based on secondary data or alerts that are generated in response to primary alerts for PCN application, researchers [16] have detected misbehavior in VANETs. Concept of a data-centric misbehavior detection method program was utilized in a brand-new misbehavior detection scheme that was presented by [17]. [18] devised a VARM mechanism that gathers information from neighbor transmissions at a single vehicle in order to locate the malicious vehicle.…”
Section: Related Workmentioning
confidence: 99%
“…Based on secondary data or alerts that are generated in response to primary alerts for PCN application, researchers [16] have detected misbehavior in VANETs. Concept of a data-centric misbehavior detection method program was utilized in a brand-new misbehavior detection scheme that was presented by [17]. [18] devised a VARM mechanism that gathers information from neighbor transmissions at a single vehicle in order to locate the malicious vehicle.…”
Section: Related Workmentioning
confidence: 99%
“…This method uses the travel time information measured by the vehicles and is sent through multi-hop communications to calculate the shortest routes. While in [3], the importance of security in the routing layer in IoT networks, including Vanet networks, is discussed. Different solutions for secure routing in IoT networks have been proposed, such as cryptography-based methods and trust-based mechanisms.…”
Section: Routing In Vehicular Ad Hoc Network (Vanet)mentioning
confidence: 99%