2013 8th International Conference on Communications and Networking in China (CHINACOM) 2013
DOI: 10.1109/chinacom.2013.6694582
|View full text |Cite
|
Sign up to set email alerts
|

An optimized adaptive algorithm for authentication of safety critical messages in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…The experts at the Institute of Electrical and Electronic Engineers (IEEE) predict that autonomous cars will comprise 75% of total traffic on the road by the year 2040. 1 The emergence of such vehicles and their networks will impose new requirements for applications and services, such as safety messaging [1], traffic monitoring [2], lane changing [3], and intersection management [4]. Some of the important challenges facing vehicular networking are due to the high-mobility nature of vehicular commutations, randomness in channel dynamics, and link interferences.…”
Section: Introductionmentioning
confidence: 99%
“…The experts at the Institute of Electrical and Electronic Engineers (IEEE) predict that autonomous cars will comprise 75% of total traffic on the road by the year 2040. 1 The emergence of such vehicles and their networks will impose new requirements for applications and services, such as safety messaging [1], traffic monitoring [2], lane changing [3], and intersection management [4]. Some of the important challenges facing vehicular networking are due to the high-mobility nature of vehicular commutations, randomness in channel dynamics, and link interferences.…”
Section: Introductionmentioning
confidence: 99%
“…The second case shows how the DoS attack is discovered during the communication phase. Note that the data used in the transmission and reception process has been encrypted at this stage by using Hash function SHA-256 [20][21][22][23][24][25][26]. Figure 16 shows a successful communication process between the first vehicle Vn (A) and the second vehicle Vn+1 (D).…”
Section: Case Studies Of Communication and Dos Attack Detection Resultsmentioning
confidence: 99%
“…e combination of p2p and ECDSA along with VANET can improve the efficiency of the algorithm and also minimizes the message delay. Smitha et al [109] proposed a new method, classification of critical safety message and provided an adaptive way to authenticate the message based on Merkle tree and ECDSA. is scheme discussed the DOS, man-in-the-middle, and phishing attacks.…”
Section: Asymmetric Cryptographymentioning
confidence: 99%