Haidar et al., 2021 - Google Patents
Experimentation and assessment of pseudonym certificate management and misbehavior detection in C-ITSHaidar et al., 2021
View PDF- Document ID
- 13466687937577016737
- Author
- Haidar F
- Makassikis M
- Sall M
- Bakhti H
- Kaiser A
- Lonc B
- Publication year
- Publication venue
- IEEE Open Journal of Intelligent Transportation Systems
External Links
Snippet
In Cooperative Intelligent Transportation Systems (C-ITS), vehicles can communicate with one another and with the infrastructure. The openness of the transportation system to new functionalities and use cases may create new vulnerabilities that must be taken into account …
- 238000001514 detection method 0 title abstract description 27
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sheikh et al. | Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey | |
| Hasan et al. | Securing vehicle-to-everything (V2X) communication platforms | |
| Raya et al. | The security of vehicular ad hoc networks | |
| Masood et al. | Security and privacy challenges in connected vehicular cloud computing | |
| Raya et al. | Securing vehicular ad hoc networks | |
| Van Der Heijden et al. | Survey on misbehavior detection in cooperative intelligent transportation systems | |
| Sampigethaya et al. | AMOEBA: Robust location privacy scheme for VANET | |
| Schmidt et al. | Vehicle behavior analysis to enhance security in vanets | |
| Sampigethaya et al. | CARAVAN: Providing location privacy for VANET | |
| Sharma et al. | A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions | |
| Razzaque et al. | Security and privacy in vehicular ad-hoc networks: survey and the road ahead | |
| CN106209777A (en) | A kind of automatic driving car on-vehicle information interactive system and safety communicating method | |
| Al Mamun et al. | Deployment of cloud computing into vanet to create ad hoc cloud network architecture | |
| Grover et al. | Attack models and infrastructure supported detection mechanisms for position forging attacks in vehicular ad hoc networks | |
| Kolandaisamy et al. | Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks: R. Kolandaisamy et al. | |
| Zhao et al. | Security challenges for the intelligent transportation system | |
| Triki et al. | A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks | |
| Bhargava et al. | A Systematic Approach for Attack Analysis and Mitigation in V2V Networks. | |
| Haidar et al. | Experimentation and assessment of pseudonym certificate management and misbehavior detection in C-ITS | |
| Didouh et al. | Blockchain-based collaborative certificate revocation systems using clustering | |
| Da Silva et al. | Examining privacy in vehicular ad-hoc networks | |
| Stübing | Multilayered security and privacy protection in Car-to-X networks: solutions from application down to physical layer | |
| Kaur et al. | Comprehensive view of security practices in vehicular networks | |
| Yakan et al. | A novel AI security application function of 5G core network for V2X C-ITS facilities layer | |
| Yadav et al. | Security in vehicular ad hoc networks |