Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 24
Page No. 5038 - 5045

Hash Based Security for Malicious Attacks in Vanets

Authors : Y.S. Sardius Nithin and K.V.D. Kiran

References

Bouassida, M.S., G. Guette, M. Shawky and B. Ducourthial, 2009. Sybil nodes detection based on received signal strength variations within VANET. Int. J. Network Secur., 9: 22-33.
Direct Link  |  

Chang, S., Y. Qi, H. Zhu, J. Zhao and X. Shen, 2012. Footprint: detecting Sybil attacks in urban vehicular networks. IEEE. Trans. Paral. Distrib. Syst., 23: 1103-1114.
CrossRef  |  Direct Link  |  

Chuang, M.C. and J.F. Lee, 2014. TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks. IEEE. Syst. J., 8: 749-758.
CrossRef  |  Direct Link  |  

Guette, G. and C. Bryce, 2008. Using Tpms to Secure Vehicular Ad-Hoc Networks. In: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks. Jose, A.O., D. Sauveron, C. Serge, D. Gollmann and K. Markantonakis (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-79965-8, pp: 106-116.

Lu, R., X. Lin, H. Zhu, P.H. Ho and X. Shen, 2008. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. Proceedings of the IEEE INFOCOM 27th Conference on Computer Communications, April 13-18, 2008, IEEE, New York, USA., ISBN: 978-1-4244-2025-4, pp: 1229-1237.

Machiraju, S., H. Chen and J. Bolot, 2008. Distributed authentication for low-cost wireless networks. Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, February 25-26, 2008, ACM, Napa, California, ISBN: 978-1-60558-118-7, pp: 55-59.

Papadimitratos, P., L. Buttyan, T. Holczer, E. Schoch and J. Freudiger et al., 2008. Secure vehicular communication systems: design and architecture. IEEE. Commun. Magaz., 46: 100-109.
CrossRef  |  Direct Link  |  

Pires, W.R., F.T.H. Paula, H.C. Wong and A.A.F. Loureiro, 2004. Malicious node detection in wireless sensor networks. Proceedings of the 18th International Symposium on Parallel and Distributed Processing, April 26-30, 2004, IEEE, New York, USA., ISBN: 0-7695-2132-0, pp: 1-24.

Wagan, A.A., B.M. Mughal and H. Hasbullah, 2010. VANET security framework for trusted grouping using TPM hardware. Proceedings of the 2nd International Conference on Communication Software and Networks, February 26-28, 2010, Singapore, pp: 309-312.

Xiao, B., B. Yu and C. Gao, 2006. Detection and localization of sybil nodes in VANETs. Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, September 29-29, 2006, ACM, Los Angeles, California, ISBN: 1-59593-471-5, pp: 1-8.

Yu, H., M. Kaminsky, P.B. Gibbons and A. Flaxman, 2006. Sybilguard: Defending against sybil attacks via social networks. Proceedings of the ACM Conference on SIGCOMM Computer Communication Review, September 11, 2006, ACM, New York, USA., ISSN: 0146-4833, pp: 267-278.

Zhu, H., R. Lu, X. Shen and X. Lin, 2009. Security in service-oriented vehicular networks. IEEE. Wireless Commun., 16: 16-22.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved