2016
DOI: 10.1007/s12243-016-0551-6
|View full text |Cite
|
Sign up to set email alerts
|

Attacks and countermeasures in the internet of vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
31
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 75 publications
(33 citation statements)
references
References 71 publications
0
31
0
Order By: Relevance
“…The "physical safety" theme highlights that the coupling of cyber and physical components together in increasingly complex IoT systems will result -and in fact, is already resulting inthe expansion of the cyberattack surface to include potentially life-threatening consequences [27]. This risk is connected with IoT's potential to experience inadvertent system incompatibilities or weaknesses between sub-systems [28].…”
Section: Emerging Risks In the Iotmentioning
confidence: 99%
“…The "physical safety" theme highlights that the coupling of cyber and physical components together in increasingly complex IoT systems will result -and in fact, is already resulting inthe expansion of the cyberattack surface to include potentially life-threatening consequences [27]. This risk is connected with IoT's potential to experience inadvertent system incompatibilities or weaknesses between sub-systems [28].…”
Section: Emerging Risks In the Iotmentioning
confidence: 99%
“…YunchuanSun et al [3] have classified Sybil attack as one of the attacks on authentication in which they had not proposed any pin punted mechanism but given its countermeasures in form of Threat models, Intrusion detection system and key management .…”
Section: Related Workmentioning
confidence: 99%
“…However, the cluster security becomes a key issue for VCPS [40,41,42], especially when nodes in clusters become malicious with the intention to get more bandwidth. Such a black deed will affect the spread of the traffic information on the road or occupy the bandwidth allocated to other users for entertainment.…”
Section: Reputation-based Incentive and Penalty Mechanismmentioning
confidence: 99%