2019
DOI: 10.1016/j.cogsys.2019.01.008
|View full text |Cite
|
Sign up to set email alerts
|

Effect of security and trustworthiness for a fuzzy cluster management system in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(26 citation statements)
references
References 28 publications
0
26
0
Order By: Relevance
“…Further, security durability requires that the software at least works for a specified time period by strengthening the maintainability of security of software services, henceforth improving the trustworthiness of security. The term operational resilience, which strengthens trustworthiness of security, is a set of techniques that allows people, processes, and informational systems to adapt to changing patterns [37]. This term directly points out that the maintainability affects secure life span of software.…”
Section: Trustworthinessmentioning
confidence: 99%
“…Further, security durability requires that the software at least works for a specified time period by strengthening the maintainability of security of software services, henceforth improving the trustworthiness of security. The term operational resilience, which strengthens trustworthiness of security, is a set of techniques that allows people, processes, and informational systems to adapt to changing patterns [37]. This term directly points out that the maintainability affects secure life span of software.…”
Section: Trustworthinessmentioning
confidence: 99%
“…State of the art lowest ID clustering algorithm is proposed for the CH selection [1], highest degree clustering schemes [2], weighted clustering schemes [3], [4], Affinity propagation algorithm [5], and fuzzy logic-based algorithms [6], [7]. The earlier work has an issue with CH stability.…”
Section: Problem Statementmentioning
confidence: 99%
“…After received the useful information or data from the moving vehicles, the nodes generate useful information from them and transferred to other nodes. The nodes are free to join or leave the network in an open network [1]- [7].Due to the high vehicle mobility condition,…”
Section: Introductionmentioning
confidence: 99%
“…VANETs face many security challenges and issues in terms of authentication and privacy issues [18,19,20,21,22], and untrustworthy vehicles raise many security and communication issues [23]. In VANETs, the entire communication is an open access environment that makes VANETs more vulnerable to the attacks.…”
Section: Introductionmentioning
confidence: 99%