2022
DOI: 10.1007/s13369-022-06753-1
|View full text |Cite
|
Sign up to set email alerts
|

TREE: Trust-Based Authenticated and Secure Dissemination of Emergency Event Information for the Network of Connected Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 55 publications
0
7
0
Order By: Relevance
“…In the above equation the coordinates of the sender and receiver are represented as (YRZR$$ {Y}_R-{Z}_R $$) and false(YSZSfalse)$$ \left({Y}_S-{Z}_S\right) $$, respectively 22 …”
Section: Proposed Designmentioning
confidence: 99%
See 1 more Smart Citation
“…In the above equation the coordinates of the sender and receiver are represented as (YRZR$$ {Y}_R-{Z}_R $$) and false(YSZSfalse)$$ \left({Y}_S-{Z}_S\right) $$, respectively 22 …”
Section: Proposed Designmentioning
confidence: 99%
“…In the above equation the coordinates of the sender and receiver are represented as (Y R − Z R ) and (Y S − Z S ), respectively. 22 Node R uses the below equation to calculate the D RSS to node S through node M.…”
Section: Distance-based Location Verificationmentioning
confidence: 99%
“…Any robotic network made with compromised bot or machine running a malicious software using the command driven by a botmaster is other named a Botnet [58]. It is a malicious act with damaging intentions carried out on IOT devices and IOT networks to achieve various purposes such as keylogging attack, email spam delivery, distributed denial of services attack, cryptocurrency attack, password cracking [7][37].…”
Section: The Botnet Atackmentioning
confidence: 99%
“…TREE. In the publication denoted as [77], the authors have formulated a trust-based message propagation scheme for a vehicular network for the purpose of discerning the issue of fraudulent nodes transmitting spurious alarm messages. Initially, they have contrived a trust-based mechanism to assess the credibility of the node through the node's message transmission pace and event notifcation execution to validate the veritable emergency warning messages.…”
Section: Saodv (Secure Ad-hoc On-demand Distance Vector)mentioning
confidence: 99%