12
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Using clustering scheme: Prevent reply attack in vehicular ad-hoc networks (VANET)

References

  • O. Piy and P.D. Roy, Vehicle Ad-Hoc Network (VANET): Security Challenges & Safety Benefits. Available at SSRN 2206077, (2018)
  • J.Z. Kim, K. Kim, J.S. Jeong, S. Park and J.H. Kim, Cybersecurity for autonomous VANET: Different Attacks and Defences for Review. Computers & Security, IEEE Access, vol. 8 p.102150, (2021).
  • K. Stępień. and P. Marańda and A. Padmani, Security Measurement with Different Behavior Processing and Footprint Algorithm against Sybil and Bogus Attacks in VANET, International conference of IEEE21(10), IEEE Access, vol. 18 p.3538, (2021).
  • A.S. Mahmood, A. Mohammed; H.I. Hasan; M. Selv; Hamdi and M.M. Maad, Review of Prevention schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs). IEEE 2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP), (2020).
  • Kamal, Pratibha and Singh, Nanhay, A new approach buffer-efficient disruption tolerant protocol in vehicular delay-tolerant network. Journal of Information and Science (1-11). doi:10.1080/02522667.2020.1809094, (2020)
  • Tian Liu; Xuchong Liu, Xiong Li, Ruhul Amin, Wei Liang, Meng-Yen Hsieh, RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system, Connection Science, (), –. doi:10.1080/09540091.2021.1901072, (2021)
  • Kumar, Ankit, and Sinha Madhavi, Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET. Journal of Statistics and Management Systems, 22(4), 753–761. doi:10.1080/09720510.2019.1609555, (2019).
  • Yasser, Ahmed Zorkany, M. Abdel Kader, Neamat; and Chen Kun, VANET routing protocol for V2V implementation: A suitable solution for developing countries. Cogent Engineering, 4(1), –.doi:10.1080/23311916.2017.1362802, (2017)

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.