Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 93 publications
(45 citation statements)
references
References 44 publications
0
45
0
Order By: Relevance
“…Moreover, it can be noticed that the computational time was a little bit improved in the case of a cloud–computing environment in the 5G network setting. Hence, cloud computing and 5G [ 199 , 200 , 201 , 202 ] networks play a vital role to increase the performance of DFD systems in a real–time setting. However, there is a dire need to test it in peak–time for mobile computing users.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, it can be noticed that the computational time was a little bit improved in the case of a cloud–computing environment in the 5G network setting. Hence, cloud computing and 5G [ 199 , 200 , 201 , 202 ] networks play a vital role to increase the performance of DFD systems in a real–time setting. However, there is a dire need to test it in peak–time for mobile computing users.…”
Section: Discussionmentioning
confidence: 99%
“…Domain (s) Surveyed Year [5] Authentication schemes for VANETs 2017 [6] VANet security challenges and solutions 2017 [7] Attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV 2017 [8] Security attacks in VANETs: Communication, applications and challenges 2019 [9] Recent Advances in Vehicular Network Security, Trust, and Privacy 2019 [10] Authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs) 2020 [11] Certificate Revocation Schemes in Vehicular Networks 2020 [12] Authentication and Privacy Schemes in VANET 2021 [13] Benefits, Services, Recent Works, Challenges, Security, and Use Cases for SDN-VANET 2020 [14] Authentication Techniques in VANETs 2020…”
Section: Papermentioning
confidence: 99%
“…Al-Shareeda et al [12] discussed the security and privacy issues and solutions based on the security and privacy requirement and also done comparison based on computational overhead and security threat. Finally, authors have provided open challenges in VANET.…”
Section: A Related Workmentioning
confidence: 99%
“…For instance, an attacker could impersonate an ambulance and request that traffic control allows it to pass by turning traffic lights green [6]. As a shared open medium, the wireless communication channel used by VANET transmits information that the users want to keep private without any protection [7,8].…”
Section: Introductionmentioning
confidence: 99%