2015 International Conference on Computer, Communication and Control (IC4) 2015
DOI: 10.1109/ic4.2015.7375676
|View full text |Cite
|
Sign up to set email alerts
|

RSA algorithm based encryption on secure intelligent traffic system for VANET using Wi-Fi IEEE 802.11p

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Different encryption algorithms and methods like PKI, symmetric encryption, hybrid encryption, and group key (temporary key for the session derived from the master key) have been used to stop each attack that we have discussed earlier. Schemes in this connection include the previous works 18,21,24,25,35,41,44,48,53,54,56,58,60,6678.…”
Section: Survey Resultsmentioning
confidence: 99%
“…Different encryption algorithms and methods like PKI, symmetric encryption, hybrid encryption, and group key (temporary key for the session derived from the master key) have been used to stop each attack that we have discussed earlier. Schemes in this connection include the previous works 18,21,24,25,35,41,44,48,53,54,56,58,60,6678.…”
Section: Survey Resultsmentioning
confidence: 99%
“…Figure 6 shows the entire process flow that is being followed for efficient traffic police distribution. Traffic data is available from several sources like surveillance roadside cameras, 23,26 fixed roadside sensors, 27,28 mobile phones. 24,25,27,29 So, whenever traffic density increases at some junction, it can be captured using one of the above technologies or simply using RSUs and mobile sensors.…”
Section: Discussionmentioning
confidence: 99%
“…Traffic data is available from several sources like surveillance roadside cameras, 23,26 fixed roadside sensors, 27,28 mobile phones. 24,25,27,29 So, whenever traffic density increases at some junction, it can be captured using one of the above technologies or simply using RSUs and mobile sensors. The relevant data is collected from these sources and stored optimistically using several machine learning techniques like Kalman filter, 26 KNN-ANN, 28 CNN, 23 5G, SDN, and MEC.…”
Section: Discussionmentioning
confidence: 99%
“…The weakness is that this scheme limits the scope of message sharing only to one RSU. Nema et al [ 14 ] proposed an RSA-algorithm-based encryption and decryption approach to provide message confidentiality in VANETs. However, all of the above schemes do not consider the fine-grained access control of the transmitted message.…”
Section: Related Workmentioning
confidence: 99%