2015
DOI: 10.11648/j.iotcc.s.2015030601.14
|View full text |Cite
|
Sign up to set email alerts
|

Research on Innovating and Applying Cryptography Algorithms for Security Routing in Service Based Routing

Abstract: Abstract:In Cryptography, there are two kinds of methods for encryption and decryption. They are symmetric cryptography and asymmetric cryptography. In symmetric cryptography, it uses a single key for encryption and decryption. In asymmetric cryptography, it uses both public key and private key for encryption and decryption. In MANET (mobile ad-hoc network) every node usually moves and has limited energy, so network link is not stable and has low bandwidth. Therefore it is very carefully to choose the cryptogr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…For example, Sun, Y, through security and privacy protection protocols and technologies, solve the problems of information security and privacy protection encountered by the Internet of Vehicles in the process of intelligent transportation [2]. Long, N. T. et al proposed a security protection system for the Internet of Vehicles based on the case of security incidents of the Internet of Vehicles [3]. After analyzing the characteristics of the transmission channel of the Internet of Vehicles, Yu-Mei analyzed vehicle privacy and location privacy, and proposed schemes based on roadside nodes and mutual cooperation between vehicles [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, Sun, Y, through security and privacy protection protocols and technologies, solve the problems of information security and privacy protection encountered by the Internet of Vehicles in the process of intelligent transportation [2]. Long, N. T. et al proposed a security protection system for the Internet of Vehicles based on the case of security incidents of the Internet of Vehicles [3]. After analyzing the characteristics of the transmission channel of the Internet of Vehicles, Yu-Mei analyzed vehicle privacy and location privacy, and proposed schemes based on roadside nodes and mutual cooperation between vehicles [4].…”
Section: Introductionmentioning
confidence: 99%
“…Within the domain of high-speed mobility of vehicles, a noteworthy progressions have been made, with later considering the application of encryption algorithms in Internet of Vehicles (IoVs) to address security challenges. For instance, Wang et al [3,4] proposed an enhancement strategy based on large traveler vulnerability to moderate the impacts of expansive traveler stream on high-speed mobility of vehicle frameworks. Xu, B et al [6] further explored the application of encryption technology in e-commerce which is further combined with the study of encryption in aviation by Liu, J. et al [7] Whereas these studies the effectiveness of improving safety and effectiveness, they don't broadly address the security concerns for IoVs.…”
Section: Introductionmentioning
confidence: 99%