Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems 2018
DOI: 10.5220/0006784004950500
|View full text |Cite
|
Sign up to set email alerts
|

Signaling Game-based Approach to Improve Security in Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…• MAC access [75]- [78] • Ppower control [72], [73], [79], [80] • VEC [81]- [87] • HetNET [88], [89] • UAV networks [90], [ • Form clusters to detect or prevent misbehavior nodes [119]- [122] • Cluster-based routing [71], [123], [124] • Resource allocation or sharing [125]- [128] √ √ √ √…”
Section: Nementioning
confidence: 99%
See 3 more Smart Citations
“…• MAC access [75]- [78] • Ppower control [72], [73], [79], [80] • VEC [81]- [87] • HetNET [88], [89] • UAV networks [90], [ • Form clusters to detect or prevent misbehavior nodes [119]- [122] • Cluster-based routing [71], [123], [124] • Resource allocation or sharing [125]- [128] √ √ √ √…”
Section: Nementioning
confidence: 99%
“…Firstly, it has advantages using in the clusterbased routing [71], [123], [124] where vehicles form clusters and only the selected vehicle in each cluster can broadcast so that to alleviate the broadcast storm. Moreover, using coalitional games, vehicles can form clusters or groups to prevent selfish or malicious behaviors and thus guarantee the security [119], privacy [120], and trust levels of the communication [121], [122]. Besides, coalitional games are used for resources allocation or sharing problems in VNs where players in the same coalition can share the resources [126]- [128].…”
Section: Initial:mentioning
confidence: 99%
See 2 more Smart Citations
“…The features of VNs may result in security vulnerabilities that make the communication suffer from various kinds of internal and external attacks, which have caused three main concerns in the design of secure VNs: security, privacy and trust. This section introduces the use of GT in intrusion or misbehavior detection [35], [36], [64], [65], [75], [89],…”
Section: B Game Theory For Security Protection In Vnsmentioning
confidence: 99%