2017
DOI: 10.3103/s0146411617080120
|View full text |Cite
|
Sign up to set email alerts
|

Architectures for building secure vehicular networks based on SDN technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 4 publications
0
15
0
Order By: Relevance
“…With time, new frameworks are developed to improve existing schemes. In [ 7 ], Sadio et al proposed a topology-based routing protocol using SDN technology. This scheme consists of a routing algorithm through which path is selected, and flow tables are created based on path selection, which is accomplished with the help of the predicted topology.…”
Section: Related Workmentioning
confidence: 99%
“…With time, new frameworks are developed to improve existing schemes. In [ 7 ], Sadio et al proposed a topology-based routing protocol using SDN technology. This scheme consists of a routing algorithm through which path is selected, and flow tables are created based on path selection, which is accomplished with the help of the predicted topology.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, as the based sending plane advances Interest/Data packets without realizing who is mentioned or who will serve, these types of attacks may not influence SDN-based VANETs even by reporting that they have the best course. In any case, as the based sending plane uses various leveled names to distinguish substances and administrations, a malevolent hub can, without much of a stretch, screen the sending framework and channel dependent on content names the permitted and denied parcels, which make these types of attacks hard to tackle in such cases particularly when a gathering of pernicious vehicles dispatches the attacks [92,93].…”
Section: Black Hole and Gray Hole Attacksmentioning
confidence: 99%
“…In addition, the majority of attacks that are custom fitted against vehicular networks are assiduous on the SDN-based VANET structures; for example, on-board altering, sticking, and application and program based attacks. The attacks as the replay, denial of service (DoS), the Sybil, the sink-gap, the malware injection, security infringement, falsification, and conveyed DoS are persevered in the SDN, VANETs, and SDN-based VANETs, yet with various prerequisites and effect on every innovation [92]. A few threats bargain sending, control, and application layers [58].…”
Section: Future Directionsmentioning
confidence: 99%
“…This feature also enables VENUE to serve as a validation platform until almost the final integration with the hardware devices where the services will be installed (in fact, this hardware can also be directly attached to the platform to validate this phase too as it will be seen). Finally, (iii) the necessity to support 5G softwarization technologies, such as NFV and SDN [35]- [37]. These technologies are being introduced into the UAVs field as innovative alternatives to be able to support flexible (and agile) service provisioning (with NFV) but also as a possibility to evolve current ad hoc networks routing protocols adapting them to the particularities of FANETs (with SDN).…”
Section: Venue Design and Implementationmentioning
confidence: 99%