2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) 2014
DOI: 10.1109/apcase.2014.6924490
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of insider and outsider DoS attack against signature based authentication in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Moreover, this would lead to nodes unavailability, low packet delivery ratio and bogus messages in DTNs. However, the trivial mitigation algorithms in VANETs [65]- [69], Mobile Ad-hoc NETworks (MANETs) [70]- [73], Wireless Sensor Networks (WSNs) [74]- [77], TCP/IP [78]- [82] and UWSNs [83]- [86] are not applicable in DTNs, due to long delay and frequent intermittent connectivity.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, this would lead to nodes unavailability, low packet delivery ratio and bogus messages in DTNs. However, the trivial mitigation algorithms in VANETs [65]- [69], Mobile Ad-hoc NETworks (MANETs) [70]- [73], Wireless Sensor Networks (WSNs) [74]- [77], TCP/IP [78]- [82] and UWSNs [83]- [86] are not applicable in DTNs, due to long delay and frequent intermittent connectivity.…”
Section: Introductionmentioning
confidence: 99%
“…The second case shows how the DoS attack is discovered during the communication phase. Note that the data used in the transmission and reception process has been encrypted at this stage by using Hash function SHA-256 [20][21][22][23][24][25][26]. Figure 16 shows a successful communication process between the first vehicle Vn (A) and the second vehicle Vn+1 (D).…”
Section: Case Studies Of Communication and Dos Attack Detection Resultsmentioning
confidence: 99%
“…If the signature is found invalid, the node identification number is added to the table and also the threshold value of the car is incremented. If the threshold value of the car exceeds a certain defined threshold value, then the node is added to the blacklist table 101 …”
Section: Security Solutions To Attacks In Vanetmentioning
confidence: 99%