2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP) 2020
DOI: 10.1109/icicsp50920.2020.9232047
|View full text |Cite
|
Sign up to set email alerts
|

Review of Prevention schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…The attacker often uses false information, such as message fabrication, alternation, and relay to perform this attack. Replay attack [23] also causes similar consequences.…”
Section: Introduction 1vanet Security Challengesmentioning
confidence: 93%
“…The attacker often uses false information, such as message fabrication, alternation, and relay to perform this attack. Replay attack [23] also causes similar consequences.…”
Section: Introduction 1vanet Security Challengesmentioning
confidence: 93%
“…A robustness scheme should withstand common attacks such as replay [27], modification [28], impersonation, and Man-In-The-Middle (MITM) attacks [29], [30].…”
Section: • Traceability and Revocationmentioning
confidence: 99%
“…The majority of Internet users utilise the Internet to conduct many of their usual daily activities, including routine work, social interactions, and personal leisure. Nearly all Internet users claim that their everyday activities and routines would be altered if they lost access to the Internet [1][2][3][4][5][6][7][8]. Our lives have altered in every way because to the internet and communication technologies.…”
Section: Introductionmentioning
confidence: 99%
“…The most pervasive and significant threat to computing assets among the various types of malicious software is posed by botnets. The increasing dependence on the internet over the past few decades has made it difficult to manage the integrity, confidentiality, and security of user data and computing resources [14][15][16][17][18][19]. This is due to the fact that the majority of cyber-security-related problems are caused by malicious software that is operating undetected on user computers and may jeopardise the security of the user's data, especially in critical infrastructure, government, business, and academic settings [20].…”
Section: Introductionmentioning
confidence: 99%