[go: up one dir, main page]

Haidar et al., 2021 - Google Patents

Experimentation and assessment of pseudonym certificate management and misbehavior detection in C-ITS

Haidar et al., 2021

View PDF
Document ID
13466687937577016737
Author
Haidar F
Makassikis M
Sall M
Bakhti H
Kaiser A
Lonc B
Publication year
Publication venue
IEEE Open Journal of Intelligent Transportation Systems

External Links

Snippet

In Cooperative Intelligent Transportation Systems (C-ITS), vehicles can communicate with one another and with the infrastructure. The openness of the transportation system to new functionalities and use cases may create new vulnerabilities that must be taken into account …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Sheikh et al. Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey
Hasan et al. Securing vehicle-to-everything (V2X) communication platforms
Raya et al. The security of vehicular ad hoc networks
Masood et al. Security and privacy challenges in connected vehicular cloud computing
Raya et al. Securing vehicular ad hoc networks
Van Der Heijden et al. Survey on misbehavior detection in cooperative intelligent transportation systems
Sampigethaya et al. AMOEBA: Robust location privacy scheme for VANET
Schmidt et al. Vehicle behavior analysis to enhance security in vanets
Sampigethaya et al. CARAVAN: Providing location privacy for VANET
Sharma et al. A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions
Razzaque et al. Security and privacy in vehicular ad-hoc networks: survey and the road ahead
CN106209777A (en) A kind of automatic driving car on-vehicle information interactive system and safety communicating method
Al Mamun et al. Deployment of cloud computing into vanet to create ad hoc cloud network architecture
Grover et al. Attack models and infrastructure supported detection mechanisms for position forging attacks in vehicular ad hoc networks
Kolandaisamy et al. Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks: R. Kolandaisamy et al.
Zhao et al. Security challenges for the intelligent transportation system
Triki et al. A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks
Bhargava et al. A Systematic Approach for Attack Analysis and Mitigation in V2V Networks.
Haidar et al. Experimentation and assessment of pseudonym certificate management and misbehavior detection in C-ITS
Didouh et al. Blockchain-based collaborative certificate revocation systems using clustering
Da Silva et al. Examining privacy in vehicular ad-hoc networks
Stübing Multilayered security and privacy protection in Car-to-X networks: solutions from application down to physical layer
Kaur et al. Comprehensive view of security practices in vehicular networks
Yakan et al. A novel AI security application function of 5G core network for V2X C-ITS facilities layer
Yadav et al. Security in vehicular ad hoc networks