Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vehicular Ad-hoc Network
biblio
Elliptic Curve Cryptography for Security in Connected Vehicles
Submitted by grigby1 on Fri, 07/14/2023 - 3:18pm
Internet of Things
privacy
signal processing
pubcrawl
Metrics
resilience
Resiliency
security
Scalability
5G mobile communication
Ad hoc networks
Vehicular Ad-hoc Network
Elliptic curve cryptography
Signal processing algorithms
connected vehicles
biblio
Comparative Study of Emerging Internet-of-Things in Traffic Management System
Submitted by aekwall on Fri, 02/04/2022 - 10:31am
vehicular ad hoc networks
Repudiation
Vehicular Ad-hoc Network
traffic system
traffic management system
Traffic congestion
sensors
IoT-based traffic management system
road safety
Market research
IoT
Safety
Industries
composability
Human behavior
Resiliency
Metrics
pubcrawl
Wireless communication
privacy
biblio
A Multidimensional Trust Model for Vehicular Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 12:18pm
Ad Hoc Network Security
Ad hoc networks
Compositionality
Computational modeling
Conferences
fault tolerance
Fault tolerant systems
malicious nodes
Metrics
pubcrawl
Resiliency
security
trust
VANET
Vehicular Ad-hoc Network
Wireless communication
biblio
Security methods against Black Hole attacks in Vehicular Ad-Hoc Network
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
security
Scalability
Resiliency
pubcrawl
Routing
vehicular ad hoc networks
Communication system security
Routing protocols
Intrusion Detection
Heuristic algorithms
Black hole attacks
black hole
Vehicular Ad-hoc Network
biblio
Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)
Submitted by aekwall on Tue, 03/09/2021 - 12:36pm
Packet loss
ns2
normal network conditions
largest remaining energy
flooding attack AODV routing protocol
Flooding Attack
energy-efficient AODV
energy parameters
different network conditions
Black hole attacks
Vehicular Ad-hoc Network
Performance analysis
wireless technology
Black hole attack
Energy
AODV
Scalability
data communication
Blackhole attack
Throughput
VANET
quality of service
delays
Energy Efficiency
Wireless communication
vehicular ad hoc networks
malicious nodes
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
Conditional Anonymity enabled Blockchain-based Ad Dissemination in Vehicular Ad-hoc Network
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
resilience
Human behavior
in-vehicle service
internal attacker scenarios
malicious users
message authentication
Metrics
monitoring authority
privacy
pubcrawl
fake ads
Resiliency
vehicle-to-infrastructure communication
vehicle-to-vehicle communication
vehicular ad hoc networks
Vehicular Ad-hoc Network
vehicular network
zero-knowledge proof of knowledge
ZKPoK
certification authority
advertisement sharing
advertising
anonymity
authenticated users
behavioural privacy leakage
blockchain
blockchain-based ad dissemination
certificate-less cryptography
ad dissemination
composability
conditional anonymity
cryptocurrencies
Cryptography
data privacy
delays
Distributed databases
fair incentive mechanism
biblio
CUIF: Control of Useless Interests Flooding in Vehicular Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
safety related applications
content name
Control of Useless Interests Flooding
CUIF scheme
data
efficient communication environment
Interest forwarding storm
outgoing Interest packets
Producer vehicle
NDN
traditional host centric approach
vehicle address
Vehicular Ad-hoc Network
vehicular information network technology
Vehicular Named Data Network
Vehicular Named Data networks
VNDN
Named Data Network Security
Roads
Scalability
Servers
security
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
IP networks
VANETs
vehicular ad hoc networks
internet
VANET
Interest
named data networks
vehicular
biblio
A Secure Blockchain-Based Group Mobility Management Scheme in VANETs
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
Security analysis
Protocols
pubcrawl
resilience
Resiliency
Safe Coding
safe transportation
secure blockchain-based group mobility management scheme
secure group mobility management scheme
security
policy-based governance
security functionalities
significant overload
smooth handovers
telecommunication security
VANET
VANETs
vehicular ad hoc networks
Vehicular Ad-hoc Network
high mobility
blockchain
collaboration
Distributed Mobility Management
distributed mobility management protocol
DMM solutions
frequent handovers
group communication scenario
Handover
handover authentication
authentication
Human behavior
Human Factors
message authentication
Metrics
mobility management (mobile radio)
network architecture
network entities
next generation mobile network
biblio
A Comparative Analysis of Trust Models for Safety Applications in IoT-Enabled Vehicular Networks
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
reliable trusted information dissemination
end-to-end delays
entity-oriented trust models
event detection probabilities
false information dissemination
false positive rates
hybrid trust models
Intelligent Transportation Systems
IoT-enabled vehicular networks
network entities
quality-of-service related benchmarks
received information
data oriented trust models
safety applications
secure environment
secure trusted network
smart cities
steep-curve warnings
surrounding infrastructure
transportation technology
Trust management
Trust models
vehicular nodes
false trust
probability
Safety
Computational modeling
resilience
pubcrawl
Resiliency
Scalability
Data models
information dissemination
computer network security
network nodes
Internet-of-Things
Internet of Things
VANET
vehicular ad hoc networks
sensitive information
Comparative Analysis
policy-based governance
collaboration
Vehicular Ad-hoc Network
authentic trusted information dissemination
black ice
comfortable driving experience
compromised information dissemination
biblio
Prevention of Timing Attack in Software Defined Named Data Network with VANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
telecommunication network topology
pubcrawl
Resiliency
Safety
Scalability
SDN
Software
Software Defined Network
software defined networking
Software Defined Networks
TAP protocol
Protocols
timing
Timing Attack Prevention protocol
V2I communication
V2V communication
VANET
vehicle to infrastructure communication
vehicle-to-vehicle communication
vehicular
vehicular ad hoc networks
Vehicular Ad-hoc Network
IPv4 addressing problems
attacker vehicles
composability
computer network security
content
data network
Human behavior
Interest
internet
Internet technique
IP networks
attack
MANET
MANET Attack Mitigation
Metrics
mobile computing
named data networking
named data networks
Named Data Network Security
NDN techniques
Peer-to-peer computing
1
2
next ›
last »