127
Views
0
CrossRef citations to date
0
Altmetric
Articles

A Secured Zobrist Hash Symmetric Sentinel List Based Malicious Attack Detection in Vanet

&

References

  • S. A. Alfadhli, S. Lu, A. Fatani, H. Al-Fedhly, and M. Ince, “SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs,” Hum.-centric Comput. Inf. Sci., Vol. 10, no. 1, pp. 1–25, 2020. doi:10.1186/s13673-020-00241-x
  • I. Ali, and F. Li, “An efficient conditional privacy-preserving authentication scheme for vehicle-To-Infrastructure communication in VANETs,” Veh. Commun., Vol. 22, pp. 100228, 2020.
  • J. Pan, J. Cui, L. Wei, Y. Xu, and H. Zhong, “Secure data sharing scheme for VANETs based on edge computing,” EURASIP J. Wirel. Commun. Netw., no. 1, pp. 1–11, 2019.
  • O. S. Al-Heety, Z. Zakaria, M. Ismail, M. M. Shakir, S. Alani, and H. Alsariera, “A comprehensive survey: benefits, services, recent works, challenges, security, and Use cases for SDN-VANET,” IEEE. Access., Vol. 8, pp. 91028–91047, 2020. doi:10.1109/ACCESS.2020.2992580
  • J. Cui, W. Xu, Y. Han, J. Zhang, and H. Zhong, “Secure mutual authentication with privacy preservation in vehicular ad hoc networks,” Veh. Commun., Vol. 21, pp. 100200, 2020.
  • A. K. Jadoon, L. Wang, T. Li, and M. A. Zia, “Lightweight cryptographic techniques for automotive cybersecurity,” Wirel. Commun. Mob. Comput. 2018.
  • Z. Lu, G. Qu, and Z. Liu, “A survey on recent advances in vehicular network security, trust, and privacy,” IEEE Trans. Intell. Transp. Syst., Vol. 20, no. 2, pp. 760–776, 2018. doi:10.1109/TITS.2018.2818888
  • F. Qu, Z. Wu, F.-Y. Wang, and W. Cho, “A security and privacy review of VANETs,” IEEE Trans. Intell. Transp. Syst., Vol. 16, no. 6, pp. 2985–2996, 2015. doi:10.1109/TITS.2015.2439292
  • A. M. Nasser, and D. Ma, “Secmonq: An HSM based security monitoring approach for protecting AUTOSAR safety-critical systems,” Veh. Commun., Vol. 21, pp. 100201, 2020.
  • I. Rasheed, F. Hu, and L. Zhang, “Deep reinforcement learning approach for autonomous vehicle systems for maintaining security and safety using LSTM-GAN,” Veh. Commun., 100266, 2020.
  • M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,” Internet Things, Vol. 7, pp. 100059, 2019. doi:10.1016/j.iot.2019.100059
  • H. M. Song, J. Woo, and H. K. Kim, “In-vehicle network intrusion detection using deep convolutional neural network,” Veh. Commun., Vol. 21, pp. 100198, 2020.
  • X. Lu, L. Xiao, T. Xu, Y. Zhao, Y. Tang, and W. Zhuang, “Reinforcement learning based PHY authentication for VANETs,” IEEE Trans. Veh. Technol., Vol. 69, no. 3, pp. 3068–3079, 2020. doi:10.1109/TVT.2020.2967026
  • W. Benrhaiem, and A. S. Hafid, “Bayesian networks based reliable broadcast in vehicular networks,” Veh. Commun., Vol. 21, pp. 100181, 2020.
  • D. Manivannan, S. S. Moni, and S. Zeadally, “Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs),” Veh. Commun., Vol. 25, pp. 100247, 2020.
  • M. Han, S. Liu, S. Ma, and A. Wan, “Anonymous-authentication scheme based on fog computing for VANET,” PLoS one, Vol. 15, no. 2, pp. e0228319, 2020.
  • K. Adhikary, S. Bhushan, S. Kumar, and K. Dutta, “Decision tree and neural network based hybrid algorithm for detecting and preventing ddos attacks in VANETS,” Int. J. Innov. Technol. Explor. Eng. (IJITEE), Vol. 9, no. Issue-5, March 2020. ISSN: 2278-3075.
  • R. Sadakale, N. V. K. Ramesh, and R. Patil, “TAD-HOC Routing Protocol for efficient VANET and infrastructure-oriented communication network,” J. Eng. Hindawi Jul 2020.
  • R. Shrestha, R. Bajracharya, A. P. Shrestha, and S. Y. Nam, “A new type of blockchain for secure message exchange in VANET,” Digit. Commun. Netw., Vol. 6, no. 2, pp. 177–186, 2020. doi:10.1016/j.dcan.2019.04.003
  • L. Benarous, B. Kadri, S. Bitam, and A. Mellouk, “Privacy-preserving authentication scheme for on-road on-demand refilling of pseudonym in VANET,” Int. J. Commun Syst, e4087, 2019.
  • Z. Lu, G. Qu, and Z. Liu, “A survey on recent advances in vehicular network security, trust, and privacy,” IEEE Trans. Intell. Transp. Syst., Vol. 20, no. 2, pp. 760–776, 2018. doi:10.1109/TITS.2018.2818888

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.