2018 2nd International Conference on Inventive Systems and Control (ICISC) 2018
DOI: 10.1109/icisc.2018.8399033
|View full text |Cite
|
Sign up to set email alerts
|

Security aware routing scheme in Vehicular Adhoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In this paper [10], they discuss the secure scheme in VANET which can help the network to maintain a reliable secure connectivity among nodes (vehicles) and its significant role of routing protocol and attacks for vehicular ad hoc networks. The important aspect of VANET is computation and control to improve safety, security comfort of everybody life by reducing accidents, congestion control, fuel in traveling.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this paper [10], they discuss the secure scheme in VANET which can help the network to maintain a reliable secure connectivity among nodes (vehicles) and its significant role of routing protocol and attacks for vehicular ad hoc networks. The important aspect of VANET is computation and control to improve safety, security comfort of everybody life by reducing accidents, congestion control, fuel in traveling.…”
Section: Literature Surveymentioning
confidence: 99%
“…Perennially varying Topology, elevated Mobility, and Self-Administration are exceptional traits of Vehicular Ad-Hoc Networks (VANETs) (Mansour et al, 2018). Despite having these remarkable qualities, they also possess some confrontations (Jadhao and Chaudhari, 2018;Li, Song, 2015) . The benefits provided by this networking strategy may degrade its quality deliverance with improper Routing practices (Jadhao and Chaudhari, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Despite having these remarkable qualities, they also possess some confrontations (Jadhao and Chaudhari, 2018;Li, Song, 2015) . The benefits provided by this networking strategy may degrade its quality deliverance with improper Routing practices (Jadhao and Chaudhari, 2018). The Routing processes which occur between the nodes within the network are normally governed by the Protocols (Patel and Jhaveri, 2015).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The main security aims (authentication, integrity and potential non-repudiation) are suitable for the potential needs of secure VANET routing [1]. Since the security and the privacy of the nodes are of major importance, the verification of the routing messages is a big challenge in VANETs [2][3]. Indeed, each vehicle is required to check the authenticity of any received routing message, thus making sure that it was sent from an authentic vehicle.…”
Section: Introductionmentioning
confidence: 99%