2012
DOI: 10.4103/0256-4602.93141
|View full text |Cite
|
Sign up to set email alerts
|

Toward Secure Vehicular Ad-hoc Networks: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(22 citation statements)
references
References 22 publications
0
21
0
1
Order By: Relevance
“…Adversary Model. In literature, different types of adversaries [19] are considered such as a global passive adversary (GPA), the restricted passive adversary (RPA), and local active adversary (LAA). The GPA and LAA are considered to be exterior observers which use a spectrum analyzer or angle of arrival to overhear the communication.…”
Section: Source Location Privacy In Vanetsmentioning
confidence: 99%
“…Adversary Model. In literature, different types of adversaries [19] are considered such as a global passive adversary (GPA), the restricted passive adversary (RPA), and local active adversary (LAA). The GPA and LAA are considered to be exterior observers which use a spectrum analyzer or angle of arrival to overhear the communication.…”
Section: Source Location Privacy In Vanetsmentioning
confidence: 99%
“…Several studies have maintained that 60% of the accidents that occur on motorways could be avoided if warning messages were provided to the drivers just few seconds prior to moment of crash [1] [2].…”
Section: Introductionmentioning
confidence: 99%
“…According to the valid measurements judged by (4), and are calculated with each CV. Equation (9) is given: …”
Section: Coefficients Self-adaption Based On Batch Estimationmentioning
confidence: 99%
“…In VANETs scenarios, each participating vehicle or fixed roadside infrastructure is transformed into a wireless message transmitter or sensing terminal. Some studies indicate that the security of data could seriously influence the performance of VANETs in practice [3,4]. In these security attacks, the malicious data injection attack can harm intelligent traffic systems.…”
Section: Introductionmentioning
confidence: 99%