2022
DOI: 10.5815/ijwmt.2022.04.01
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-resilient Routing for Internet of Vehicles Networks During Black Hole Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Additionally, various hole attacks [ 57 , 61 ] such as blackhole, sinkhole, wormhole, and greyhole, exploit network protocols to disrupt the routing of packets, leading to information loss or delay. GPS deception attacks [ 62 ], masquerading attacks [ 56 ], wormhole attacks [ 61 ], cookie theft attacks [ 63 ], channel interference attacks [ 62 ], and route modification attacks [ 56 ] gave become even more cunning and deceitful at the application layer, which interfaces directly with the user. Injection attacks [ 61 ] compromise the system by inserting malicious data into a stream of legitimate data.…”
Section: Vehicular Network: Backgroundmentioning
confidence: 99%
“…Additionally, various hole attacks [ 57 , 61 ] such as blackhole, sinkhole, wormhole, and greyhole, exploit network protocols to disrupt the routing of packets, leading to information loss or delay. GPS deception attacks [ 62 ], masquerading attacks [ 56 ], wormhole attacks [ 61 ], cookie theft attacks [ 63 ], channel interference attacks [ 62 ], and route modification attacks [ 56 ] gave become even more cunning and deceitful at the application layer, which interfaces directly with the user. Injection attacks [ 61 ] compromise the system by inserting malicious data into a stream of legitimate data.…”
Section: Vehicular Network: Backgroundmentioning
confidence: 99%
“…The aim of connected and autonomous vehicles is to improve traffic flow, reduce fatalities on the road, and reduce the environmental impact of modern mobility, among others [1]. Vehicle-to-Everything (V2X) communication enables the sharing of various types of information (such as traffic, safety and entertainment) with other vehicles, infrastructures and pedestrians using the road through wired and wireless networks.…”
Section: Introductionmentioning
confidence: 99%
“…In order to facilitate minimum latency V2X communications, 3GPP release version 15 added two additional sidelink transmission modes, Mode 3, and Mode 4 (shown in Figure 1) [7]. In addition to C-V2X Modes 3 and 4, two more sidelink resource allocation NR Modes (1,2) are now available. In the Release 16 by 3GPP, Mode 1 refers to the network-controlled allocation of Radio Resources (RR)s for sidelink communications.…”
Section: Introductionmentioning
confidence: 99%