Engoulou et al., 2019 - Google Patents
A decentralized reputation management system for securing the internet of vehiclesEngoulou et al., 2019
- Document ID
- 729502576031305063
- Author
- Engoulou R
- Bellaiche M
- Halabi T
- Pierre S
- Publication year
- Publication venue
- 2019 International Conference on Computing, Networking and Communications (ICNC)
External Links
Snippet
The evolution of the Internet of Vehicles (IoV) paradigm has recently attracted a lot of researchers and industries. Vehicular Ad Hoc Networks (VANET) is the networking model that lies at the heart of this technology. It enables the vehicles to exchange relevant …
- 238000004891 communication 0 abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1087—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving cross functional networking aspects
- H04L67/1093—Some peer nodes performing special functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/12—Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mirsadeghi et al. | A trust infrastructure based authentication method for clustered vehicular ad hoc networks | |
Kerrache et al. | Trust management for vehicular networks: An adversary-oriented overview | |
Li et al. | ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks | |
Bißmeyer et al. | Central misbehavior evaluation for VANETs based on mobility data plausibility | |
Sharma et al. | A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions | |
Engoulou et al. | A decentralized reputation management system for securing the internet of vehicles | |
Xing et al. | Trust-evaluation-based intrusion detection and reinforcement learning in autonomous driving | |
Kumar et al. | An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing | |
CN111064800B (en) | Block chain technology-based safe vehicle contact social network construction method | |
Hatzivasilis et al. | MobileTrust: Secure knowledge integration in VANETs | |
Haddaji et al. | Blockchain-based multi-levels trust mechanism against sybil attacks for vehicular networks | |
Liu et al. | A byzantine-tolerant distributed consensus algorithm for connected vehicles using proof-of-eligibility | |
Kerrache et al. | RITA: RIsk‐aware Trust‐based Architecture for collaborative multi‐hop vehicular communications | |
Souissi et al. | Trust management in vehicular ad hoc networks: a survey | |
Hu et al. | Vtrust: a robust trust framework for relay selection in hybrid vehicular communications | |
Tangade et al. | Trust management scheme in VANET: Neighbour communication based approach | |
Coussement et al. | Decision support protocol for intrusion detection in VANETs | |
Sireesha et al. | A survey of VANET security models and its issues on node level data transmission | |
Najafi et al. | Decentralized reputation model based on bayes' theorem in vehicular networks | |
Dhurandher et al. | Securing vehicular networks: a reputation and plausibility checks-based approach | |
Du et al. | Security assessment in vehicular networks | |
Begriche et al. | Bayesian-based model for a reputation system in vehicular networks | |
Agrawal et al. | Vehicular ad hoc network: Overview, characteristics, and applications | |
Molina-Gil et al. | Countermeasures to Prevent Misbehaviour in VANETs. | |
Zhang et al. | An introduction to trust management in internet of vehicles |