2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) 2016
DOI: 10.1109/scopes.2016.7955781
|View full text |Cite
|
Sign up to set email alerts
|

Trusit centric approach based on similarity in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The last stage involves training and evaluating the selected features over a dual weight updation-based optimal deep belief network (DWU-ODBN) classification system to detect and classify attacks [28]. Semisupervised classification algorithms, in contrast to supervised classification techniques, are capable of coping with adversarial attacks as well as uncertain attacks, which makes them more robust.…”
Section: Classificationmentioning
confidence: 99%
“…The last stage involves training and evaluating the selected features over a dual weight updation-based optimal deep belief network (DWU-ODBN) classification system to detect and classify attacks [28]. Semisupervised classification algorithms, in contrast to supervised classification techniques, are capable of coping with adversarial attacks as well as uncertain attacks, which makes them more robust.…”
Section: Classificationmentioning
confidence: 99%
“…• Some approaches assess the reliability of the vehicles through a reputation system that relies on a centralized entity, which collects the opinions of neighboring nodes [44][45][46][47]. In scenarios of high mobility, these approaches struggle to collect sufficient information to calculate the reputation scores for each node; furthermore, the centralized entity represents a single point of failure.…”
Section: Reliability and Traceability Of Data In Vanetsmentioning
confidence: 99%
“…(i) Entity-oriented trust models, which evaluate the trustworthiness levels of vehicle nodes to identify selfish or malicious nodes [ 2 , 3 ]. (ii) Data-oriented trust models, which detect malicious nodes by evaluating the trustworthiness of messages [ 4 ]. (iii) Hybrid trust models, which combine both entity-oriented and data-oriented methods [ 5 ].…”
Section: Introductionmentioning
confidence: 99%