2016
DOI: 10.1109/access.2016.2645452
|View full text |Cite
|
Sign up to set email alerts
|

Trust Management for Vehicular Networks: An Adversary-Oriented Overview

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
109
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 177 publications
(109 citation statements)
references
References 69 publications
0
109
0
Order By: Relevance
“…Similar to most communication networks, V2X security requirements can be divided into five points: availability, data integrity, confidentiality, authenticity and non-repudiation (Kerrache et al (2016a)). However, in the V2X environment, attacks which targeting information availability are the most dangerous because they cause a serious effect on safety-critical situations.…”
Section: Threats Analysis For Ieee 80211p and Lte-v2xmentioning
confidence: 99%
See 1 more Smart Citation
“…Similar to most communication networks, V2X security requirements can be divided into five points: availability, data integrity, confidentiality, authenticity and non-repudiation (Kerrache et al (2016a)). However, in the V2X environment, attacks which targeting information availability are the most dangerous because they cause a serious effect on safety-critical situations.…”
Section: Threats Analysis For Ieee 80211p and Lte-v2xmentioning
confidence: 99%
“…They commonly are necessary against internal attackers which they own legitimate certificate. Also, they are mostly applied on distributed and semi-centralized network (Kerrache et al (2016a)). The weighted-sum method has some challenges such as setting the weights and trust threshold, however, it is considered a common and lightweight method for vehicular networks.…”
Section: The Considered Attacksmentioning
confidence: 99%
“…Trust is a complement to cryptography on some models where the latter fails to neutralize all potential attacks. In , a survey on existing trust models for cooperative vehicular networks is presented. The authors show existing trust models and how they are implemented in vehicular networks.…”
Section: Related Studiesmentioning
confidence: 99%
“…In order to effectively identify malicious vehicles and ensure reliable transmission of data between vehicles, the recently popular solutions are to apply trust mechanism to a few common routing protocols [5]. However, the trust prediction schemes used in the common trust models, such as analytic hierarchy process and Bayesian prediction, cannot accurately predict a vehicle's trust value based on this vehicle's historical trust values, especially when the sample set is small.…”
Section: Introductionmentioning
confidence: 99%