2022
DOI: 10.1007/s11277-022-09974-7
|View full text |Cite
|
Sign up to set email alerts
|

Improved Security of the Data Communication in VANET Environment Using ASCII-ECC Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…(19,20) Developed a drone-supporting block chain-based trust mechanism to prevent the reporting of fraudulent data in the IoT. (21) Proposed an ASCII ECC method for a cryptography-based system. Additionally, there is still a problem with how to monitor the misbehavior of entities (such CAs and RSUs) while avoiding frequent online contacts with the certificate services.…”
Section: Methodsmentioning
confidence: 99%
“…(19,20) Developed a drone-supporting block chain-based trust mechanism to prevent the reporting of fraudulent data in the IoT. (21) Proposed an ASCII ECC method for a cryptography-based system. Additionally, there is still a problem with how to monitor the misbehavior of entities (such CAs and RSUs) while avoiding frequent online contacts with the certificate services.…”
Section: Methodsmentioning
confidence: 99%
“…(Ajjaj et al, 2022;Dhanaraj et al, 2022;Malik et al, 2022). Researchers worldwide focus much of their efforts on enhancing security and creating novel approaches and algorithms for identifying different known and unknown VANET attacks (Sajini et al, 2023;Bangui et al, 2021b;Bensaid and Boukli-Hacene, 2019;Theodore et al, 2021;Canto et al, 2023). The remaining paragraphs in this section provide a quick overview of the detection techniques proposed by the various authors who have worked to develop technologies that can detect security leaks in VANETs early on.…”
Section: Detection Mechanisms In Vanetmentioning
confidence: 99%
“…Sajini et al. proposed the ASCII‐ECC algorithm to enhance data transmission security within the context of VANETs [14]. The approach employed by the authors involves the utilization of ASCII encoding and Elliptic Curve Cryptography (ECC) to guarantee the secure transmission of information.…”
Section: Background and Literature Surveymentioning
confidence: 99%
“…This effectively thwarts attempts to exploit location-based vulnerabilities and unauthorized tracking. [14]. The approach employed by the authors involves the utilization of ASCII encoding and Elliptic Curve Cryptography (ECC) to guarantee the secure transmission of information.…”
Section: Traditional Vanet Security Approachmentioning
confidence: 99%