[go: up one dir, main page]

Engoulou et al., 2019 - Google Patents

A decentralized reputation management system for securing the internet of vehicles

Engoulou et al., 2019

Document ID
729502576031305063
Author
Engoulou R
Bellaiche M
Halabi T
Pierre S
Publication year
Publication venue
2019 International Conference on Computing, Networking and Communications (ICNC)

External Links

Snippet

The evolution of the Internet of Vehicles (IoV) paradigm has recently attracted a lot of researchers and industries. Vehicular Ad Hoc Networks (VANET) is the networking model that lies at the heart of this technology. It enables the vehicles to exchange relevant …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • H04L67/1087Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving cross functional networking aspects
    • H04L67/1093Some peer nodes performing special functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks

Similar Documents

Publication Publication Date Title
Mirsadeghi et al. A trust infrastructure based authentication method for clustered vehicular ad hoc networks
Kerrache et al. Trust management for vehicular networks: An adversary-oriented overview
Li et al. ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks
Bißmeyer et al. Central misbehavior evaluation for VANETs based on mobility data plausibility
Sharma et al. A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions
Engoulou et al. A decentralized reputation management system for securing the internet of vehicles
Xing et al. Trust-evaluation-based intrusion detection and reinforcement learning in autonomous driving
Kumar et al. An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
CN111064800B (en) Block chain technology-based safe vehicle contact social network construction method
Hatzivasilis et al. MobileTrust: Secure knowledge integration in VANETs
Haddaji et al. Blockchain-based multi-levels trust mechanism against sybil attacks for vehicular networks
Liu et al. A byzantine-tolerant distributed consensus algorithm for connected vehicles using proof-of-eligibility
Kerrache et al. RITA: RIsk‐aware Trust‐based Architecture for collaborative multi‐hop vehicular communications
Souissi et al. Trust management in vehicular ad hoc networks: a survey
Hu et al. Vtrust: a robust trust framework for relay selection in hybrid vehicular communications
Tangade et al. Trust management scheme in VANET: Neighbour communication based approach
Coussement et al. Decision support protocol for intrusion detection in VANETs
Sireesha et al. A survey of VANET security models and its issues on node level data transmission
Najafi et al. Decentralized reputation model based on bayes' theorem in vehicular networks
Dhurandher et al. Securing vehicular networks: a reputation and plausibility checks-based approach
Du et al. Security assessment in vehicular networks
Begriche et al. Bayesian-based model for a reputation system in vehicular networks
Agrawal et al. Vehicular ad hoc network: Overview, characteristics, and applications
Molina-Gil et al. Countermeasures to Prevent Misbehaviour in VANETs.
Zhang et al. An introduction to trust management in internet of vehicles