2018
DOI: 10.1016/j.icte.2017.12.002
|View full text |Cite
|
Sign up to set email alerts
|

Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 7 publications
1
11
0
Order By: Relevance
“…Reviewing the past years' researches shows that game theory has been used in a few projects for VANET security . The majority of the works done depend on MANETs.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Reviewing the past years' researches shows that game theory has been used in a few projects for VANET security . The majority of the works done depend on MANETs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There exist numerous articles presenting a classification of attacks in VANETs based on the stack of network layers. On the basis of the layer used by attackers, that attack is classified . For instance, the eavesdropping vehicle, by physical and data link layers, can jam the communicating channel through transmitting unimportant messages that congest the traffic and gain high load over that channel.…”
Section: The Proposed Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…A game can be chosen to be cooperative or non-cooperative game according to the attack type and the expected penalty. In [24], the authors presented a comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. Classification of game theoretic techniques is illustrated in Figure 1.…”
Section: Classification Of Game Theoretic Techniquesmentioning
confidence: 99%