2022 IEEE Wireless Communications and Networking Conference (WCNC) 2022
DOI: 10.1109/wcnc51071.2022.9771705
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preservation and security management in VANET based to Software Defined Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…This system can intelligently detect based on two phases {response requested and response to the request}. Asfara et al [59] proposed a solution to secure communication between vehicles in a VANET environment with the presence of an SDN Controller and its advantages. The nodes in this topology reacted with the controller as a trusted Public Key Generator (PKG) entity and the RSUs as there are switches.…”
Section: Security Issues Of Vanetsmentioning
confidence: 99%
“…This system can intelligently detect based on two phases {response requested and response to the request}. Asfara et al [59] proposed a solution to secure communication between vehicles in a VANET environment with the presence of an SDN Controller and its advantages. The nodes in this topology reacted with the controller as a trusted Public Key Generator (PKG) entity and the RSUs as there are switches.…”
Section: Security Issues Of Vanetsmentioning
confidence: 99%
“…However, the "i State Grid" platform is restricted by its own conditions [5][6][7]. Its application and data are still subject to many risks.…”
Section: Introductionmentioning
confidence: 99%
“…Also, privacy in SDN systems is high. However, it is low [6] in SDVN basically due to close interaction with drivers' location information and due to the high mobility of the system. In SDVNs, the data plane is made of vehicular devices instead of static switches due to the need for multi-hop data forwarding.…”
Section: Introductionmentioning
confidence: 99%
“…{πœ† 𝑖𝑑,𝐻 𝑀 (𝑑 + 1), πœ† 𝑖𝑑,𝐿 𝑀 (𝑑 + 1), πœ† 𝑖𝑑,𝐻𝑆 (𝑑 + 1), πœ† 𝑖𝑑,𝐿𝑆 (𝑑 + 1), πœ† 𝑖𝑑, 𝐴𝑒𝑑 β„Ž (𝑑 + 1)} = {πœ† 𝑖𝑑,𝐻 𝑀 (𝑑), πœ† 𝑖𝑑,𝐿 𝑀 (𝑑), πœ† 𝑖𝑑,𝐻𝑆 (𝑑), πœ† 𝑖𝑑,𝐿𝑆 (𝑑), πœ† 𝑖𝑑, 𝐴𝑒𝑑 β„Ž (𝑑) * 𝑀 𝑝 𝑖𝑑 } (6). …”
mentioning
confidence: 99%