2021
DOI: 10.1007/s11277-021-08717-4
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…The distributed ledger contains a record of every transaction that has been validated. Equation (15) provides the MAE: 15) where n represents the total sum of users and 𝑋𝑋 𝑖𝑖 represents the individual costs of communicating with and making a transaction with each user. Some specialised security attacks pose a threat to data providers if their customers' personal information is shared.…”
Section: Communication With Diagnosed Patientsmentioning
confidence: 99%
See 1 more Smart Citation
“…The distributed ledger contains a record of every transaction that has been validated. Equation (15) provides the MAE: 15) where n represents the total sum of users and 𝑋𝑋 𝑖𝑖 represents the individual costs of communicating with and making a transaction with each user. Some specialised security attacks pose a threat to data providers if their customers' personal information is shared.…”
Section: Communication With Diagnosed Patientsmentioning
confidence: 99%
“…14 Deep neural networks (DNNs) can identify malfunctions in virtualized communication networks with greater precision by learning to recognize typical data flows and rebuilding them. 15 However, a significant challenge with these models is that sophisticated DNNs in the core clouds require more time to train than currently available classical approaches. Therefore, finding new ways to reduce training time without sacrificing detection precision is essential.…”
Section: Introductionmentioning
confidence: 99%
“…In (Divya, et al, 2021), the authors proposed a Clustered Vehicle Location scheme using Hybrid Krill Herd and Bat Optimization (CVL-HKH-BO) method to detect and prevent black hole and wormhole attacks using an appropriate fitness function. For improving energy consumption and packet delay, the authors used the CVL method.…”
Section: Related Workmentioning
confidence: 99%
“…Particular attention is paid in this essay to the RPL protocol, which is vulnerable to routing attacks. Attacks against RPL may be broken down into two groups: those that are carried over from WSNs and those that are special to RPL and take advantage of its particular weaknesses [9]. This page details a variety of RPL assaults, such as Flood Attacks, Data-DoS/DDoS Attacks [10], which mostly target layer 3 of the OSI perfect.…”
Section: Introductionmentioning
confidence: 99%