Qureshi et al., 2021 - Google Patents
Egyptian Informatics JournalQureshi et al., 2021
View PDF- Document ID
- 9999563899151854460
- Author
- Qureshi K
- Sandila M
- Javed I
- Margaria T
- Aslam L
- Publication year
External Links
Snippet
abstract New and advanced technologies have introduced amazing areas like the Internet of Vehicles (IoV) and Unmanned Aerial Vehicle (UAV). These two technologies are emerged to facilitate the ground users by providing more fast and convenient data communication …
- 238000000034 method 0 abstract description 37
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | Recent advances and challenges in security and privacy for V2X communications | |
Tu et al. | Secure Internet of Vehicles (IoV) with decentralized consensus blockchain mechanism | |
Bojjagani et al. | Secure authentication and key management protocol for deployment of Internet of Vehicles (IoV) concerning intelligent transport systems | |
Chuang et al. | TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks | |
Karim et al. | Architecture, protocols, and security in IoV: Taxonomy, analysis, challenges, and solutions | |
US20220094546A1 (en) | Authentication method and system | |
Tanveer et al. | RUAM-IoD: A robust user authentication mechanism for the Internet of Drones | |
Qureshi et al. | Authentication scheme for unmanned aerial vehicles based internet of vehicles networks | |
Bhoi et al. | SIR: a secure and intelligent routing protocol for vehicular ad hoc network | |
CN109362062B (en) | Anonymous authentication system and method for VANETs based on ID-based group signature | |
Mahmood et al. | A provably secure mobile user authentication scheme for big data collection in IoT-enabled maritime intelligent transportation system | |
Goudarzi et al. | A systematic review of security in vehicular ad hoc network | |
Wazid et al. | TACAS-IoT: Trust aggregation certificate-based authentication scheme for edge-enabled IoT systems | |
Chen et al. | A summary of security techniques‐based Blockchain in IoV | |
Wang et al. | An Efficient Data Sharing Scheme for Privacy Protection Based on Blockchain and Edge Intelligence in 6G‐VANET | |
Varshney et al. | Security protocol for VANET by using digital certification to provide security with low bandwidth | |
Mohammed et al. | HAFC: Handover authentication scheme based on fog computing for 5G-assisted vehicular blockchain networks | |
Chavhan et al. | Edge-enabled blockchain-based V2X scheme for secure communication within the smart city development | |
Aljumaili et al. | A review on secure authentication protocols in iov: Algorithms, protocols, and comparisons | |
Bouassida | Authentication vs. Privacy within Vehicular Ad Hoc Networks. | |
Feraudo et al. | DIVA: A DID-based reputation system for secure transmission in VANETs using IOTA | |
Almulla et al. | An efficient k‐Means authentication scheme for digital certificates revocation validation in vehicular ad hoc networks | |
Karthick et al. | Formalization and analysis of a resource allocation security protocol for secure service migration | |
Sharma et al. | Secure authentication and session key management scheme for Internet of Vehicles | |
Alotaibi et al. | A lightweight and fog-based authentication scheme for internet-of-vehicles |