2018 International Conference on Information , Communication, Engineering and Technology (ICICET) 2018
DOI: 10.1109/icicet.2018.8533712
|View full text |Cite
|
Sign up to set email alerts
|

Providing Security in Vehicular Adhoc Network using Cloud Computing by secure key Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…In Fig 2, the first step (1) shows that vehicles get registered with MA by providing their personal details such as vehicles identity, drivers details etc which are available in its TPD. MA generates Unique User Identity (UID) and sends it back to the vehicle as in step two (2). The first two steps are processed in the Registration phase.…”
Section: Fig2 Pseudonyms Generation Phasesmentioning
confidence: 99%
See 1 more Smart Citation
“…In Fig 2, the first step (1) shows that vehicles get registered with MA by providing their personal details such as vehicles identity, drivers details etc which are available in its TPD. MA generates Unique User Identity (UID) and sends it back to the vehicle as in step two (2). The first two steps are processed in the Registration phase.…”
Section: Fig2 Pseudonyms Generation Phasesmentioning
confidence: 99%
“…In VANETs [1] it is very important to provide flexibility to the drivers by providing the information regarding the traffic jam, accidents, lane change, security information etc by using Dedicated Short Range Communication (DSRC). The information exchange between the vehicles is crucial, hence Security [2] is the major issue in VANETS, as there are many internal and external attacks [3] from the other nodes.…”
Section: Introductionmentioning
confidence: 99%
“…In 2018, Halgaonkar et al [22] discussed the traffic and the security issue in vehicular adhoc network (VANET). They have used algorithm-I is used for detecting malicious node in VANET.…”
Section: Related Workmentioning
confidence: 99%
“…In 2018, Halgaonkar et al [22] suggested security issues in case of vehicular adhoc network (VANET). They have discussed VANET in terms of cloud computing.…”
Section: Literature Surveymentioning
confidence: 99%