2019
DOI: 10.1016/j.adhoc.2018.11.006
|View full text |Cite
|
Sign up to set email alerts
|

Trust management for secure cognitive radio vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…Such works have attempted to enhance connectivity through heavily mobility-oriented approaches, where the position, speed, and acceleration of vehicles and traffic network topology are substantial elements in their models. Complementarily, we have observed steep advancements in communication technologies; for instance, cognitive radio has become a key enabling technology of dynamic spectrum access to achieve better exploitation of radio spectrum [11,12]. As a result, even though mobility is an important influencing factor to connectivity, urban environments are more comprehensive and contain many more opportunities for devices and vehicles to connect over multiple media, following V2V, V2I, and V2X communication methods.…”
Section: Discussionmentioning
confidence: 99%
“…Such works have attempted to enhance connectivity through heavily mobility-oriented approaches, where the position, speed, and acceleration of vehicles and traffic network topology are substantial elements in their models. Complementarily, we have observed steep advancements in communication technologies; for instance, cognitive radio has become a key enabling technology of dynamic spectrum access to achieve better exploitation of radio spectrum [11,12]. As a result, even though mobility is an important influencing factor to connectivity, urban environments are more comprehensive and contain many more opportunities for devices and vehicles to connect over multiple media, following V2V, V2I, and V2X communication methods.…”
Section: Discussionmentioning
confidence: 99%
“…is method required large amount of computational time because of checking the authenticity of message content. He et al [103] proposed a unified trust management scheme for dealing with spectrum sensing and data transmission process in cognitive radio VANETs. In this method, the weighted consensus spectrum is applied to protect the sensing process and also improve the security of data transmission process by utilizing the trust value in CR-VANETs.…”
Section: Different Trust Establishment Modelmentioning
confidence: 99%
“…Second, the channel availability is required for computing the propagation time and the queueing time, which is an important part for implementing the low-latency forwarding scheme. In our scheme, we use Z m and Z m + 1 to compute equations ( 18)- (20), equations ( 22)- (24), and equations ( 27)-(29), which can ensure that the output routing solution can achieve the objective.…”
Section: Contributionmentioning
confidence: 99%
“…They measure the road weight and use it to select the relay node. Y He et al 20 adopt a common framework to enhance the security for both spectrum sensing and data transmission processes in CR-VANETs. They utilize the unified trust management scheme to protect the spectrum sensing process and apply the trust value derived from the unified trust model to enhance the security of the data transmission process.…”
Section: Forwarding Schemes In Cr-enabled Vehicular Networkmentioning
confidence: 99%