2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST) 2009
DOI: 10.1109/itst.2009.5399276
|View full text |Cite
|
Sign up to set email alerts
|

Trusted routing for VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…Thus, selfish nodes decrease the network performance. In order to detect the selfish nodes, security based encryption and authentication mechanism is used that consumes more energy, making it infeasible to use in mobile devices [18]. In black hole attack, selfish node advertises the better route through it, and then drops all the data as shown in Fig.…”
Section: B Attacks On Routing Protocols and Its Solutionsmentioning
confidence: 99%
“…Thus, selfish nodes decrease the network performance. In order to detect the selfish nodes, security based encryption and authentication mechanism is used that consumes more energy, making it infeasible to use in mobile devices [18]. In black hole attack, selfish node advertises the better route through it, and then drops all the data as shown in Fig.…”
Section: B Attacks On Routing Protocols and Its Solutionsmentioning
confidence: 99%
“…The basic idea of link verification is that a node must provide evidence from its neighbour proving that it links to this neighbour [26]. In the LVO, each en-route node encrypts the PS of the previous node, which confirms the connection between two nodes.…”
Section: A Anonymity Trust and Security Analysismentioning
confidence: 99%
“…But the complexity is high since security parameters carried in RREQ is broadcasted and more energy is consumed. So we will use reactive geographic routing protocol to reduce the complexity and reduce energy consumption [1] WirelessMesh systems have the consequent attributes:…”
Section: Introductionmentioning
confidence: 99%