2016
DOI: 10.1016/j.future.2015.09.004
|View full text |Cite
|
Sign up to set email alerts
|

Secure clustering for efficient data dissemination in vehicular cyber–physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 103 publications
(27 citation statements)
references
References 30 publications
0
27
0
Order By: Relevance
“…In [126], the authors tried to solve the cascaded subnetworks' failures problem in CPS by obtaining an upper bound on the small clusters' size to mitigate networks' failure, especially when they are tightly coupled. In [127], the authors proposed a secure clustering method for vehicular CPS, where a trust metric is calculated for each vehicle based on their transmission characteristics in order to create secure clusters. Another secure clustering for vehicular CPS was proposed in [128], where the clustering problem is formulated as a coalition game taking into consideration the relative velocity, position and bandwidth of vehicles.…”
Section: Big Data Clusteringmentioning
confidence: 99%
“…In [126], the authors tried to solve the cascaded subnetworks' failures problem in CPS by obtaining an upper bound on the small clusters' size to mitigate networks' failure, especially when they are tightly coupled. In [127], the authors proposed a secure clustering method for vehicular CPS, where a trust metric is calculated for each vehicle based on their transmission characteristics in order to create secure clusters. Another secure clustering for vehicular CPS was proposed in [128], where the clustering problem is formulated as a coalition game taking into consideration the relative velocity, position and bandwidth of vehicles.…”
Section: Big Data Clusteringmentioning
confidence: 99%
“…To keep the integrity and authenticity in VANET, authors of proposed REST‐Net scheme, which detects the intrusion in VANETs. This scheme consists of dynamic detection engines to monitor and analyze the data being transmitted as messages.…”
Section: Countermeasures To Handle Attacks In Vanetmentioning
confidence: 99%
“…Authors in Reference proposed a scheme, where messages can be a secured using clustering algorithms, with trust establishment between the two parties . Here, the high trustworthy vehicular nodes were selected as CHs because they have high amount of connectivity.…”
Section: Countermeasures To Handle Attacks In Vanetmentioning
confidence: 99%
See 1 more Smart Citation
“…In the proposed work, the authors have used the concept of game theory to form different coalitions among the players. The concept of coalition has been also been used in VANETs in past also [24]. Using the game theory, calculations are performed based on which the coalition amongst vehicles is formed.…”
Section: Motivationmentioning
confidence: 99%