2016 Symposium on Colossal Data Analysis and Networking (CDAN) 2016
DOI: 10.1109/cdan.2016.7570944
|View full text |Cite
|
Sign up to set email alerts
|

A new technique for trust computation and routing in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…For example, when trustworthy interactions are established between vehicles in a specific road segment, then, the corresponding trust value for that location and time is increased. Dixit et al (2016) proposed a model for selecting the trusted location using Ad Hoc On Demand Distance Vector routing protocol where RSUs were responsible for controlling packets routing. However, as the number of malicious nodes increased, the vehicles may follow the wrong path.…”
Section: Behavior-based/trust-based Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, when trustworthy interactions are established between vehicles in a specific road segment, then, the corresponding trust value for that location and time is increased. Dixit et al (2016) proposed a model for selecting the trusted location using Ad Hoc On Demand Distance Vector routing protocol where RSUs were responsible for controlling packets routing. However, as the number of malicious nodes increased, the vehicles may follow the wrong path.…”
Section: Behavior-based/trust-based Solutionsmentioning
confidence: 99%
“…Behavior-based solutions designed to give the nodes ability to manage security model independently from the central unit. However, some models used central units for gathering trust values from vehicles such as (Rafique et al (2016); Sedjelmaci and Senouci (2015); Dixit et al (2016)). The main drawback in distributed structure is deficient in global knowledge about the network.…”
Section: The Model Structurementioning
confidence: 99%
“…In this layer, data moves from one vehicle to another. Each vehicle should decide whether to trust the received message or to reject it based on the evaluation of the: 1 sender's trustworthiness 2 message's trustworthiness 3 both of them (Alriyami et al, 2014;Dixit et al, 2016a;Huang et al, 2014).…”
Section: Overview Of Trust Levels In Vanetsmentioning
confidence: 99%