2017 11th International Conference on Intelligent Systems and Control (ISCO) 2017
DOI: 10.1109/isco.2017.7855995
|View full text |Cite
|
Sign up to set email alerts
|

A survey on multi-constrained optimal path selection schemes and authentication schemes for VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Since the VANET uses open-featured wireless links to transmit traffic-related messages, attackers can launch various attacks against the VANET through eavesdropping and tampering. In the VANET environment, attackers are mainly divided into the external attacker and internal attacker [28]. The external attacker can eavesdrop or modify all the exchanged information in VANET.…”
Section: Attacker Modelmentioning
confidence: 99%
“…Since the VANET uses open-featured wireless links to transmit traffic-related messages, attackers can launch various attacks against the VANET through eavesdropping and tampering. In the VANET environment, attackers are mainly divided into the external attacker and internal attacker [28]. The external attacker can eavesdrop or modify all the exchanged information in VANET.…”
Section: Attacker Modelmentioning
confidence: 99%
“…The authors state that considering multi-constraints or multiple objectives for finding optimal path is not feasible approach due to underlying complexity of the problem and contradiction among constraints or objective functions. Another brief survey article [10] addresses the multi constrained optimal path selection approaches in Vehicular Ad Hoc Networks (VANET) domain. However, it requires a thorough investigation to determine the suitability of those algorithms in the mobility context of visually impaired people.…”
Section: Machine Learning Approaches To Robotic Path-planning [8]mentioning
confidence: 99%
“…Naive broadcast sends messages to all vehicles in the front direction and ignores messages coming from the back. Intelligent broadcast sends a limited number of messages for an event and stops broadcasting when a vehicle receives a message in a controlled manner [44]. Second is the V2I communications, which permit vehicles to communicate with RSUs [45], [46].…”
Section: Introductionmentioning
confidence: 99%