2022
DOI: 10.3390/math10203895
|View full text |Cite
|
Sign up to set email alerts
|

Improved Recurrent Neural Network Schema for Validating Digital Signatures in VANET

Abstract: Vehicular ad hoc networks (VANETs) allow communication between stationary or moving vehicles with the assistance of wireless technology. Among various existing issues in smart VANETs, secure communication is the key challenge in VANETs with a 5G network. Smart vehicles must communicate with a broad range of advanced road systems including traffic control and smart payment systems. Many security mechanisms are used in VANETs to ensure safe transmission; one such mechanism is cryptographic digital signatures bas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…The parameters determining the CHs are node mobility, node location, and the node's average residual energy (ARE). 11 For the duration of the sequence of operations, the selected CH remains the head. Clustering methods are classified into two types: those with a fixed cluster size and those with a variable cluster size.…”
Section: Clustering In Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…The parameters determining the CHs are node mobility, node location, and the node's average residual energy (ARE). 11 For the duration of the sequence of operations, the selected CH remains the head. Clustering methods are classified into two types: those with a fixed cluster size and those with a variable cluster size.…”
Section: Clustering In Iotmentioning
confidence: 99%
“…The CHs are chosen based on the node parameters. The parameters determining the CHs are node mobility, node location, and the node's average residual energy (ARE) 11 . For the duration of the sequence of operations, the selected CH remains the head.…”
Section: Introductionmentioning
confidence: 99%
“…Even with advanced technologies like blockchain, security remains a paramount concern. Arpit Jain and his team's research on vehicular ad hoc networks (VANETs) highlights the challenges of validating digital signatures in fast-moving scenarios [12]. While the study primarily focuses on VANETs, the concerns raised about the validation of digital signatures are relevant to the banking sector, especially in high-frequency trading environments.…”
Section: Security Concernsmentioning
confidence: 99%
“…A detailed description of the network traffic analysis is as follows: Datasets: Testing and assessing are the essential tasks of network traffic analysis for detecting the flow of traffic data. A standard Center for Applied Internet Data Analysis (CAIDA) [10] dataset is employed for computing the network traffic analysis for various network applications [11] . Preprocessing: Preprocessing is applied as the second phase for changing the real-world data into a reasonable format.…”
Section: Introductionmentioning
confidence: 99%
“…Datasets: Testing and assessing are the essential tasks of network traffic analysis for detecting the flow of traffic data. A standard Center for Applied Internet Data Analysis (CAIDA) [10] dataset is employed for computing the network traffic analysis for various network applications [11] .…”
Section: Introductionmentioning
confidence: 99%