Filters








416 Hits in 3.3 sec

A comprehensive survey on mobile data offloading in heterogeneous network

Tong Wang, Pengcheng Li, Xibo Wang, Yunfeng Wang, Tianhao Guo, Yue Cao
2017 Wireless networks  
A survey of applications based on safety messages in VANETs is presented in [31] .  ...  Centralized Schemes Certificate revocation schemes can be categorized into Centralized Schemes and Decentralized Schemes as shown in Fig.4 .  ... 
doi:10.1007/s11276-017-1576-0 fatcat:felzvqpfwverjb545flnyczcdu

A Survey on Security in Vehicular Ad Hoc Networks [chapter]

Saira Gillani, Farrukh Shahzad, Amir Qayyum, Rashid Mehmood
2013 Lecture Notes in Computer Science  
In this paper, we review the various dimensions of VANETs security including security threats, challenges in providing security in vehicular networks environment, requirements and attributes of security  ...  Security of vehicular networks remains the most significant concern in VANETs deployment -if we are to assure public and transportation safety.  ...  In first step, a certificate-based signature scheme is proposed. This scheme employs bilinear pairing in signature scheme that further consists of five algorithms.  ... 
doi:10.1007/978-3-642-37974-1_5 fatcat:3cqgkwnp4ngwrjfdobsaq4jdfe

Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey

Taimur Khan, Naveed Ahmad, Yue Cao, Syed Asim Jalal, Muhammad Asif, Sana ul Haq, Haitham Cruichshank
2017 Science China Information Sciences  
A survey of applications based on safety messages in VANETs is presented in [31] .  ...  Centralized Schemes Certificate revocation schemes can be categorized into Centralized Schemes and Decentralized Schemes as shown in Fig.4 .  ... 
doi:10.1007/s11432-017-9203-x fatcat:buh7ximm6fhzrbl6mlorle5joa

A survey on vehicular cloud computing

Md Whaiduzzaman, Mehdi Sookhak, Abdullah Gani, Rajkumar Buyya
2014 Journal of Network and Computer Applications  
We describe a key management method to provide a secure communication channel in the vehicular network. Furthermore, we categorize the vehicular networks based on the security issues and solutions.  ...  This paper presents the state-of-theart survey of vehicular cloud computing.  ...  The Certificate Revocation List (CLR) (Housley et al. , 2002) that is proposed by Housley et al. is the most important revocation methods in a vehicular network.  ... 
doi:10.1016/j.jnca.2013.08.004 fatcat:7bh5x3a775bqpm367xtatxjvwy

Security of Vehicular Ad-Hoc Networks (VANET): A survey

Zehra Afzal, Manoj Kumar
2020 Journal of Physics, Conference Series  
In the previous couple of years, various types of researchers concentrate on Vehicular Ad-hoc networks (VANET) field due to various facilities it provides.  ...  VANET a subgroup of mobile ad-hoc network (MANET), refers to a group of intelligent nodes i.e. (vehicles) on the road.  ...  In recent years Vehicular ad hoc networks i.e.  ... 
doi:10.1088/1742-6596/1427/1/012015 fatcat:f3ozuk7lkfgszho23kpep2mrty

A Survey on Sybil Attack in Vehicular Ad-hoc Network

Deepak Kushwaha, Piyush Kumar Shukla, Raju Baraskar
2014 International Journal of Computer Applications  
We give an overview of some defense schemes based on first two categories. We also give a summary of the techniques given in this paper, which is based on some parameters used in those techniques.  ...  In this work we briefly explain those defense techniques, given recently. We categorize these techniques as trusted certificates base, resource testing based and social network based.  ...  And in section IV we conclude our work. SURVEY ON SYBIL ATTACK Bo Yu et al. [5] presented an integrated scheme to detect Sybil attack in vehicular ad-hoc network.  ... 
doi:10.5120/17262-7614 fatcat:z3hjucc3prbj3kajk6jv7ax5ka

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim
2017 IEEE Communications Surveys and Tutorials  
With this survey, readers can have a more thorough understanding of research trends in privacy-preserving schemes for ad hoc social networks.  ...  In this paper, we review the state of the art of privacy-preserving schemes for ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs).  ...  In this survey, we focus on two types of ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs). Tab.  ... 
doi:10.1109/comst.2017.2718178 fatcat:pmlbjv3dnvfclfoqg2pnxlc7mi

A Survey on Effective Way of Message Authentication Using Proxy Vehicle in Vehicular Ad-Hoc Network

2017 International Journal of Science and Research (IJSR)  
Authentication of any message is performed by first checking if the sender's certificate is included in the current Certificate Revocation List.  ...  A PKI use in VANET for authentication .Superior vehicular communication is the necessity of regular life, because it provides reduction of message loss.  ...  a) Expedite Message Authentication Protocol(EMAP) This is protocol to overcome the problem of the long delay incurred in checking the revocation status of a certificate using a CRL.EMAP employs keyed Hash  ... 
doi:10.21275/23121604 fatcat:f5mf4bz5yzggtacbs4drjwch6i

Cryptographic Key Management in Delay Tolerant Networks: A Survey

Sofia Anna Menesidou, Vasilios Katos, Georgios Kambourakis
2017 Future Internet  
, and (c) key revocation.  ...  To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment  ...  To improve security and counter network disruptions, they also propose a distributed way to store public key certificates and certificate revocation list (CRL).  ... 
doi:10.3390/fi9030026 fatcat:fmacr4hrjrd27efi677m7cja7m

A Survey on Security challenges in Vehicular cloud computing

P. Rajeshwari
2016 International Journal Of Scientific Research And Education  
Vehicle Cloud Computing is a technology is the combination of different networks such as mobile ad hoc networks, wireless sensor networks, vehicular ad hoc networks, and cloud computing to provide better  ...  In the last group, some security challenges of VC and the applicable solutions to overcome these challenges are surveyed.  ...  The Certificate Revocation List (CLR) that is proposed by Housley et al. is the most important revocation methods in a vehicular network.  ... 
doi:10.18535/ijsre/v4i01.13 fatcat:cratnr224jcxzpwcpha3exyqwy

Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey

Akash Vaibhav, Dilendra Shukla, Sanjoy Das, Subrata Sahana, Prashant Johri
2017 International Journal of Wireless and Microwave Technologies  
37 Ad Hoc Network-A Survey side units to Road side units' communications located along the Road [3] .  ...  Greater advancement in technologies have enabled many vehicles to have GPS and Wi-Fi device to promote inter-vehicular communication forming a vehicular ad-hoc network that is called VANET [1].  ...  Ad Hoc Network-A Survey Applications of VANET There are a number of Applications to which vehicular ad hoc network VANETS can be put into.  ... 
doi:10.5815/ijwmt.2017.03.04 fatcat:w5hdnxyk4vagfloikm2xxgrb7m

Privacy-preserving authentication schemes for vehicular ad hoc networks: a survey

Huang Lu, Jie Li
2014 Wireless Communications and Mobile Computing  
In this paper, we specifically provide a survey on the privacy-preserving authentication (PPA) schemes proposed for VANETs.  ...  Vehicular Ad hoc Networks (VANETs) are expected in improving road safety and traffic conditions, in which security is essential.  ...  INTRODUCTION A Vehicular Ad hoc Network (VANET) is a mobile network that employs moving vehicles as nodes to provide communications among vehicles and nearby fixed Road Side Units (RSUs) [1] .  ... 
doi:10.1002/wcm.2558 fatcat:rk46vcanjbgajbim6567vu322u

Security Models in Vehicular Ad-hoc Networks: A Survey

José María de Fuentes, Lorena González-Manzano, Ana Isabel González-Tablas, Jorge Blasco
2014 IETE Technical Review  
Index Terms-Vehicular ad-hoc networks (VANETs), security model, trust.  ...  This paper presents a survey on the underlying security models of 41 recent proposals.  ...  His main research interests are digital evidences management, non-repudiation issues and secure message distribution in vehicular environments.  ... 
doi:10.1080/02564602.2014.890844 fatcat:naluqdmyinay7mlusnrgxzdwh4

A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks [chapter]

Uzma Khan, Shikha Agrawal, Sanjay Silakari
2015 Advances in Intelligent Systems and Computing  
Communication in Vehicular ad hoc Network relies on exchange of information among different vehicular nodes in the network.  ...  This paper presents a detailed survey on some of the important research works proposed on detecting misbehavior and malicious nodes in VANETs.  ...  The result shows that the proposed scheme is better than ECMV [12] , LEAVE [13] , Hybrid [14] and PASS [15] schemes in terms of communication overhead involved in sending the CRL (Certificate Revocation  ... 
doi:10.1007/978-81-322-2250-7_2 fatcat:trropau3dvci5lb5s363miv2zy

A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

Mohammad Masdari, Sam Jabbehdari, Mohammad Reza Ahmadi, Seyyed Mohsen Hashemi, Jamshid Bagherzadeh, Ahmad Khadem-Zadeh
2011 EURASIP Journal on Wireless Communications and Networking  
Certificate authorities (CAs) are the main components of PKI that enable us for providing basic security services in wired networks and Internet.  ...  But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs).  ...  The DCA approach has also been proposed in Wireless Mesh and Vehicular Networks and a number of schemes have been devised for these.  ... 
doi:10.1186/1687-1499-2011-112 fatcat:sxk6axdqqzchrk7dp3kvgp2zti
« Previous Showing results 1 — 15 out of 416 results