Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
VANET
biblio
RSSI Sequence and Vehicle Driving Matrix Based Sybil Nodes Detection in VANET
Submitted by grigby1 on Mon, 03/02/2020 - 1:38pm
resource allocation mechanisms
vehicular ad hoc networks
vehicle driving matrix - RSDM
VANET infrastructure
VANET
telecommunication security
sybil nodes detection
sybil attacks
Sybil attack
serious damages
RSSI sequence
composability
resource allocation
Resiliency
resilience
reputation models
pubcrawl
Protocols
neighbor nodes
Metrics
driving matrix
detection method
biblio
Analysis of Realistic Attack Scenarios in Vehicle Ad-Hoc Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
resilience
vehicular ad hoc networks
vehicle connectivity
vehicle ad-hoc networks
VANET
V2V
unprecedented security concerns
telecommunication security
technological development
sybil nodes
sybil attacks
Sybil attack
security countermeasures
security
Resiliency
advanced attacks
replay attack
realistic attack scenarios
pubcrawl
OMNeT++ simulation environment
OMNET++
Metrics
inter-vehicular communication
Driver assistance systems
disruptive innovations
composability
common attacks
Autonomous Driving
automotive transportation
attacks
biblio
Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
key escrow problem
certificateless aggregate signature scheme
certificateless public key cryptography
digital signature schemes
hierarchical organization
hierarchical trusted authority based VANET
hierarchical trusted authority privacy
high vehicle density scenarios
identity based cryptography
certificateless aggregate message authentication
message forgeability attack
multiple trusted authorities
neighboring vehicles
OBU device
side channel attacks
traditional PKC concept
Repudiation
digital signatures
telecommunication security
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
Metrics
message authentication
data privacy
public key cryptography
VANET
RSU
Aggregate Signature
aggregate verification
beacon messages
certificate management overhead
biblio
Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
pseudonyms
symmetric cryptography
public key infrastructure
Asymmetric
hybrid
Hybrid Cryptography
OBU
privacy-preservation
privacy-preserving authentication protocol
computational overhead
RSU
symmetric
symmetric key encryption
TA
VANET communication
vehicles
Repudiation
security
VANET
public key cryptography
attacks
authentication
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
Cryptography
biblio
A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System
Submitted by aekwall on Mon, 12/30/2019 - 12:15pm
UBP
privacy
pubcrawl
Resiliency
Scalability
secure vehicular platform
security mechanism
Traffic congestion
traffic engineering computing
Prediction algorithms
user behavior profiling
VANET
VCC
vehicle computing service requests
vehicle storing service requests
vehicular cloud computing
vehicular cloud servers
Vehicular fog computing
edge computing
security
Cloud Computing
computer architecture
data privacy
Data processing
data servers
Decoy technology
distributed processing
Fog computing
encryption
energy consumption reduction
Fog Computing and Security
fog computing architecture
fog computing system
Monitoring
power aware computing
biblio
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
privacy preservation
vehicular ad-hoc networks
vehicular ad hoc networks
VANET
Trust management
telecommunication security
security services
Scalability
revocation transparency
Resiliency
reputation system
public key infrastructure
public key cryptography
Public key
pubcrawl
privacy protection
authentication protocol
privacy
PKI Trust Models
Metrics
message authentication
internal vehicles
Human behavior
forged message broadcasting
distributed trust management
data privacy
Data models
Cryptographic Protocols
blockchain-based anonymous reputation system
blockchain
Bars
biblio
A Comparative Analysis of Trust Models for Safety Applications in IoT-Enabled Vehicular Networks
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
reliable trusted information dissemination
end-to-end delays
entity-oriented trust models
event detection probabilities
false information dissemination
false positive rates
hybrid trust models
Intelligent Transportation Systems
IoT-enabled vehicular networks
network entities
quality-of-service related benchmarks
received information
data oriented trust models
safety applications
secure environment
secure trusted network
smart cities
steep-curve warnings
surrounding infrastructure
transportation technology
Trust management
Trust models
vehicular nodes
false trust
probability
Safety
Computational modeling
resilience
pubcrawl
Resiliency
Scalability
Data models
information dissemination
computer network security
network nodes
Internet-of-Things
Internet of Things
VANET
vehicular ad hoc networks
sensitive information
Comparative Analysis
policy-based governance
collaboration
Vehicular Ad-hoc Network
authentic trusted information dissemination
black ice
comfortable driving experience
compromised information dissemination
biblio
Prevention of Timing Attack in Software Defined Named Data Network with VANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
telecommunication network topology
pubcrawl
Resiliency
Safety
Scalability
SDN
Software
Software Defined Network
software defined networking
Software Defined Networks
TAP protocol
Protocols
timing
Timing Attack Prevention protocol
V2I communication
V2V communication
VANET
vehicle to infrastructure communication
vehicle-to-vehicle communication
vehicular
vehicular ad hoc networks
Vehicular Ad-hoc Network
IPv4 addressing problems
attacker vehicles
composability
computer network security
content
data network
Human behavior
Interest
internet
Internet technique
IP networks
attack
MANET
MANET Attack Mitigation
Metrics
mobile computing
named data networking
named data networks
Named Data Network Security
NDN techniques
Peer-to-peer computing
biblio
A security architecture of VANET based on blockchain and mobile edge computing
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
Network Security Architecture
Vehicular Ad-hoc Network
vehicular ad hoc networks
VANET data
VANET
trusted central entity
service layer
security of data
security architecture
security
Resiliency
pubcrawl
perception layer
blockchain
Mobile Edge Computing
mobile computing
edge computing layer
edge computing
edge cloud services
Distributed databases
Data Security
computer architecture
Cloud Computing
blockchain technology
blockchain security
biblio
On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
privacy preserving
vehicular ad hoc networks (VANETs)
vehicular ad hoc networks
VANET
Trusted Authority range
security requirements
security
Scalability
Resiliency
resilience
replay attack
Receivers
Public key
pubcrawl
Protocols
anonymity
message modification attack
message authentication
impersonation attack
high computational communication overhead
Electrical Engineering
EAAP protocol
Cryptographic Protocols
conditional privacy-preserving scheme
computational overhead
authorisation
authentication protocol
authentication
anonymous messaging
anonymous authentication scheme
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »