2013 International Conference on Computer Communication and Informatics 2013
DOI: 10.1109/iccci.2013.6466118
|View full text |Cite
|
Sign up to set email alerts
|

Defensive mechanism for VANET security in game theoretic approach using heuristic based ant colony optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…A Defensive mechanism for VANET security in game‐theoretic approach using heuristic‐based ANT colony optimization (ACO) has been proposed in 130 . Known and unknown opponents in the game model are identified using the heuristic‐based ACO.…”
Section: Optimization and Bio‐inspired Techniques For Enhancing Security In Vanetsmentioning
confidence: 99%
“…A Defensive mechanism for VANET security in game‐theoretic approach using heuristic‐based ANT colony optimization (ACO) has been proposed in 130 . Known and unknown opponents in the game model are identified using the heuristic‐based ACO.…”
Section: Optimization and Bio‐inspired Techniques For Enhancing Security In Vanetsmentioning
confidence: 99%
“…The second is that existing research has not given a specific quantitative analysis on the game‐based large amount of data transmission issues, that is, multimedia data access. Game theory has been exploited to address the competition among the vehicles in VANETs, for example, content distribution , security , selfish behaviors , and multimedia transmission . However, the slow convergence rate of iterative Nash Equilibrium Point (NEP) computation results in the low practicability of the distributed game algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…The technique in [15] employs hardware that integrates both asymmetric and symmetric cryptography modules for safety messaging and used hybrid approach that takes advantage of both asymmetric and symmetric cryptographic schemes. In [16] a technique is proposed as an essential complements to the passive mechanisms of encryption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…By this process communication between vehicles and nearby road-side infrastructure technology can be made possible and this whole procedure occurs because of the availability of wireless sensing device that has been installed in the vehicle [2]. New opportunities and related technologies such as commercial application for traffic congestion, accident control and weather updates have been emerged with the commencement of study on VANET [3]. But it must be known that; ad-hoc network does not based on centralized administration, and it does not depend on any pre-established infrastructure due to the fact that the nodes are relying on each other for keeping the network connected.…”
Section: Introductionmentioning
confidence: 99%