Proceedings of the 10th International Conference on Security of Information and Networks 2017
DOI: 10.1145/3136825.3136890
|View full text |Cite
|
Sign up to set email alerts
|

Network security architectures for VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The examination of a circulated SDN-based model by the focal controls model shows that the appropriated frameworks are progressively more responsive, quicker, and increasingly productive regarding enormous worldwide system zones. Nonetheless, in spite of the advantages of the dispersed SDN model, numerous difficulties must be defeated before the appropriated controller can be executed [21]. The mapping of the control plane and sending plane must be designed consequently rather than physically.…”
Section: Distributed Controller Modelmentioning
confidence: 99%
“…The examination of a circulated SDN-based model by the focal controls model shows that the appropriated frameworks are progressively more responsive, quicker, and increasingly productive regarding enormous worldwide system zones. Nonetheless, in spite of the advantages of the dispersed SDN model, numerous difficulties must be defeated before the appropriated controller can be executed [21]. The mapping of the control plane and sending plane must be designed consequently rather than physically.…”
Section: Distributed Controller Modelmentioning
confidence: 99%
“…Potential misuse of such sensitive data by LSP while user blindly agrees to the terms of use or even unauthorized tracking of the vehicle may occur when relying on the ITS positioning techniques. Note, that such situations appear even today and many security-related questions of said networks are still open [31]. For example, U.S.-based LocationSmart company was leaking the sensitive information about the positions of the smartphones operating under various cellular operators [32].…”
Section: Introductionmentioning
confidence: 99%