2023
DOI: 10.1016/j.jnca.2022.103569
|View full text |Cite
|
Sign up to set email alerts
|

A transparent distributed ledger-based certificate revocation scheme for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…By redefining the dynamics of VANET connections, this method aims to provide a network infrastructure that is more transparent, efficient, and safe. [78], [41]. DLTs are considered a huge step forward regarding digital exchanges and data management [56], [86], [24], [43], [52].…”
Section: E Enhancing Robustness and Privacy-preserving Data Sharing W...mentioning
confidence: 99%
“…By redefining the dynamics of VANET connections, this method aims to provide a network infrastructure that is more transparent, efficient, and safe. [78], [41]. DLTs are considered a huge step forward regarding digital exchanges and data management [56], [86], [24], [43], [52].…”
Section: E Enhancing Robustness and Privacy-preserving Data Sharing W...mentioning
confidence: 99%
“…The diverse security requirements of connected, intelligent, and autonomous vehicles call for a systematic and robust approach that integrates and facilitates seamless interaction among solutions [11]. In contrast to today's widespread in-vehicle security measures, a hierarchical self-aware cybersecurity architecture consisting of real-time security monitoring, analysis, decision-making, and visualization layers is due for this transition.…”
Section: Research Objectives Motivation and Contributionsmentioning
confidence: 99%
“…Proceeding with these security measures follows the reporting measures that archive each decision taken to the BlackBox with the help of agents. The classified input data that pass the security checks proceed to the next decision phase visible in Algorithm 1, Lines (6)(7)(8)(9)(10)(11)(12)(13)(14). The outcome of this decision forwards data to the next phase or rejects/drops failed messages.…”
Section: System Incident Module-based Controllermentioning
confidence: 99%
See 1 more Smart Citation
“…However, it should be noted that some of the potential vulnerabilities identified by the automated scanning tool may not represent real vulnerabilities in the context of the system environment. The open and vulnerable nature of the ITS underlying communication infrastructure needs sophisticated security mechanisms to assure a safe real-life deployment [2]. Some of the common security vulnerabilities in toll collection systems include: 1.…”
Section: Introductionmentioning
confidence: 99%