Have a personal or library account? Click to login
State of the Art, Reliable, and Trusted Communication in Vehicle to Everything (V2X) Networks Cover

State of the Art, Reliable, and Trusted Communication in Vehicle to Everything (V2X) Networks

Open Access
|Aug 2024

References

  1. Xu, Q., Mak, T., Ko, J. and Sengupta, R. (2004). ‘Vehicle-to-vehicle safety messaging in DSRC’. In: Proceedings of 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET04), Philadelphia, PA, USA, pp. 19–28.
  2. Yang, L. and Guo, J. (2008). ‘ Increasing broadcast reliability by coded cooperative repetition in VANETs ‘. In: Proceedings of First International Conference on Wireless Access in Vehicular Environments, Dearborn, Michigan, USA, pp. 1–5.
  3. Wu, Y., Yang, L., Wu, G. and Guo, J. (2009). ‘An improved coded repetition scheme for safety messaging in VANETs’. In: Proceedings of 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom ’09), Beijing, China, pp. 1–4.
  4. Farnoud, F. and Valaee, S. (2008). ‘Repetition-based broadcast in vehicular ad hoc networks in Rician channel with capture’. In: Proceedings of IEEE INFOCOM Workshops, Phoenix, AZ, USA, pp. 1–6.
  5. Yang, L., Guo, J. and Wu, Y. (2009). ‘Piggyback cooperative repetition for reliable broadcasting of safety messages in VANETs’. In: Proceedings of 2009 6th IEEE Consumer Communications and Networking Conference (CCNC ’09), Las Vegas, NV, USA, pp. 1–5.
  6. Honarvar, A. and Valaee, S. (2010). ‘Selection of repetition codes for MAC in vehicular ad hoc networks’. In: Proceedings of 2010 IEEE Wireless Communication and Networking Conference, Sydney, Australia, pp. 1–6.
  7. Farnoud, H.F. and Valaee, S. (2009). ‘Reliable broadcast of safety messages in vehicular ad hoc networks’. In: Proceedings of IEEE INFOCOM 2009, Rio de Janeiro, Brazil, pp. 226–234.
  8. Dang, D.N.M., Nguyen, V., Chuan, P., Oo, T.Z. and Hong, C.S. (2014). ‘A reliable multi-hop safety message broadcast in vehicular ad hoc networks’. In: Proceedings of 2014 16th Asia-Pacific Conference on Network Operations and Management Symposium (APNOMS), Hsinchu, Taiwan, pp. 1–6.
  9. Singh, A., Mishra, R. and Kumar, R. (2016). ‘VANET security: issues, challenges and solutions’. International Conference on Electrical, Electronics, and Optimization Techniques, pp. 1050–1055.
  10. Ribagorda, A., de Fuentes, J.M. and GonzalezTablas, A.I. (2010). ‘Overview of security issues in vehicular ad hoc networks’. In: Handbook of Research on Mobility and Computing, IGI Global.
  11. Horng, S., Tzeng, S., Li, T., Wang, X., Huang, P. and Khan, M. (2015). ‘Enhancing security and privacy for identity-based batch verification scheme in VANET’. IEEE Transactions on Vehicular Technology, 66(4), pp. 3235–3248.
  12. Xiao, B., Yu, B. and Gao, C. (2006). ‘Detection and localization of Sybil nodes in VANETs’. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless ad Hoc Networks and Sensor Networks, pp. 1–8.
  13. Tong, Z., Choudhury, R.R., Peng, N. and Chakrabarty, K. (2011). ‘P2DAP: Sybil attacks detection in vehicular ad hoc networks’. IEEE Journal on Selected Areas in Communications, 22(3), pp. 582–594.
  14. Zhou, T., Choudhury, R.R., Ning, P. and Chakrabarty, K. (2009). ‘Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks’. Mobiquitous, Aug. 2009.
  15. Jyoti, G., Manoj, S.G. and Vijay, L. (2010). ‘A novel defense mechanism against Sybil attacks in VANET’. In: Proceedings of the 3rd International Conference on Security of Information and Networks (SIN ‘10), ACM, New York, NY, USA, pp. 249–255.
  16. Yong, H., Yu, C., Chi, Z. and Wei, S. (2011). ‘A distributed key management framework with cooperative message authentication in VANETs’. IEEE Journal on Selected Areas in Communications, 29(3), pp. 616–629.
  17. Park, S., Aslam, B., Turgut, D. and Zou, C.C. (2009). ‘Defense against Sybil attack in vehicular ad-hoc network - based on roadside units support’. In: Proceedings of the IEEE Military Communications Conference (MILCOM’09), Boston, MA, USA, pp. 1–5.
  18. Neng, W.W., Wueh, M.H. and We, M.C. (2008). ‘A novel secure communication scheme in vehicular ad hoc networks’. Computer Communications Archive, 31(12), pp. 2827–2837.
  19. Ameneh, D. and Ghaffar, P.R.A. (2019). ‘Detection of malicious vehicles (DMV) through monitoring in vehicular ad hoc networks’. Springer Multimedia Tools and Applications.
  20. Wenjia, L. and Anupam, J. (2009). ‘Outlier detection in ad hoc networks using Dempster-Shafer theory’. In: 10th International Conference on Mobile Data Management, pp. 112–121.
  21. Guo, J., Baugh, J.P. and Wang, S. (2007). ‘A group signature based secure and privacy-preserving vehicular communication framework’. In: Proceedings of the Mobile Networking for Vehicular Environments (MOVE) workshop in conjunction with IEEE INFOCOM, Anchorage, Alaska.
  22. Hawi, F.A., Yeun, C.Y. and Qutayti, M.A. (2009). The 4th International Conference on Information Technology (ICIT), pp. 3–5.
  23. Ghosh, M., Varghese, A., Kherani, A. and Gupta, A. (2009). ‘Distributed misbehavior detection in VANETs’. In: Proceedings of WCNC 2009, IEEE Wireless Communication and Networking Conference, Budapest, Hungary, IEEE Press.
  24. Roselin Mary, S., Maheshwari, M. and Thamaraiselvan, M. (2013). ‘Early detection of DoS attacks in VANET using attacked packet detection algorithm (APDA)’. In: Proceedings of IEEE International Conference on Information Communication and Embedded Systems, pp. 21–22.
  25. Singh, A. and Sharma, P. (2015). ‘A novel mechanism for detecting DoS attack in VANET using enhanced attacked packet detection algorithm (EAPDA)’. In: Proceedings of IEEE 2nd International Conference on Recent Advances in Engineering & Computational Sciences, pp. 21–22.
  26. Quyoom, A. and Sharma, H. (2015). ‘A novel mechanism of detection of denial of service attack (DoS) in VANET using malicious and irrelevant packet detection algorithm (MIPDA)’. In: Proceedings of IEEE International Conference on Computing, Communication & Automation, pp. 15–16.
  27. Kamboj, S. and Singh, K. (2018). ‘Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in VANETs’. In: Proceedings of IEEE 4th International Conference on Computing Sciences, pp. 30–31.
  28. Nidhal, M. and Ben-Othman, J. (2016). ‘GDVAN: a new greedy behavior attack detection algorithm for VANETs’. IEEE Transactions on Mobile Computing, 15(6), pp. 759–771.
  29. Pooja, B., Pai, M.M., Pai, R.M., Ajam, N. and Mouzna, J. (2014). ‘Mitigation of insider and outsider DoS attack against signature based authentication in VANETs’. In: Proceedings of IEEE Asia-Pacific Conference on Computer Aided System Engineering, pp. 10–12.
  30. Verma, K. and Hasbullah, H. (2014). ‘IP-CHOCK (filter)-based detection scheme for denial of service (DoS) attacks in VANET’. In: Proceedings of IEEE International Conference on Computer and Information Sciences, pp. 3–5.
  31. Guleria, C. and Verma, H.K. (2019). ‘Improved detection and mitigation of DDoS attack in vehicular ad hoc network’. In: Proceedings of IEEE 4th International Conference on Computing Communication and Automation, pp. 1–6.
  32. Hong, X., Huang, D., Gerla, M. and Cao, Z. (2008). ‘SAT: situation-aware trust architecture for vehicular networks’. In: Proceedings of the 3rd International Workshop on Mobility in the Evolving Internet Architecture, pp. 31–36.
  33. Hortelano, J., Ruiz, J.C. and Manzoni, P. (2010). ‘Evaluating the usefulness of watchdogs for intrusion detection in VANETs’. In: Communications Workshops (ICC), IEEE International Conference on, pp. 1–5.
  34. Biswas, S., Misic, J. and Misic, V. (2011). ‘ID-based safety message authentication for security and trust in vehicular networks’. In: Distributed Computing Systems Workshops (ICDCSW), 31st International Conference on, pp. 323–331.
  35. Wei, Y.C. and Chen, Y.M. (2012). ‘An efficient trust management system for balancing the safety and location privacy in VANETs’. In: Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 11th International Conference on, pp. 393–400.
  36. Wang, Z. and Chigan, C. (2007). ‘Countermeasure uncooperative behaviors with dynamic trust-token in VANETs’. In: Communications (ICC’07), IEEE International Conference on, pp. 3959–3964.
  37. Gómez Mármol, F. and Martínez Pérez, G. (2012). ‘TRIP: a trust and reputation infrastructure-based proposal for vehicular ad hoc networks’. Journal of Network and Computer Applications, 35(3), pp. 934–941.
  38. Gazdar, T., Benslimane, A. and Belghith, A. (2011). ‘Secure clustering scheme based keys management in VANETs’. In: Vehicular Technology Conference (VTC Spring), IEEE 73rd, pp. 1–5.
  39. Ding, Q., Li, X., Jiang, M. and Zhou, X.H. (2010). ‘Reputation-based trust model in vehicular ad hoc networks’. In: Wireless Communications and Signal Processing (WCSP), International Conference on, pp. 1–6.
  40. Wang, J., Liu, Y., Liu, X. and Zhang, J. (2009). ‘A trust propagation scheme in VANETs’. In: Intelligent Vehicles Symposium, IEEE, pp. 1067–1071.
  41. Gazdar, T., Benslimane, A., Rachedi, A. and Belghith, A. (2012). ‘A trust-based architecture for managing certificates in vehicular ad hoc networks’. In: Communications and Information Technology (ICCIT), International Conference on, pp. 180–185.
  42. Serna, J., Luna, J. and Medina, M. (2008). ‘Geolocation-based trust for VANET’s privacy’. In: Information Assurance and Security (ISIAS’08), Fourth International Conference on, pp. 287–290.
  43. Chen, Y.M. and Wei, Y.C. (2013). ‘A beacon-based trust management system for enhancing user centric location privacy in VANETs’. Journal of Communications and Networks, 15(2), pp. 153–163.
  44. Chen, C., Zhang, J., Cohen, R. and Ho, P.H. (2010). ‘Secure and efficient trust opinion aggregation for vehicular ad-hoc networks’. In: Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd, pp. 1–5.
  45. Sahoo, R.R., Panda, R., Behera, D.K. and Naskar, M.K. (2012). ‘A trust based clustering with ant colony routing in VANET’. In: Computing Communication & Networking Technologies (ICCCNT) Third International Conference on, pp. 1–8.
  46. Pooja, B., Pai, M.M., Pai, R.M., Ajam, N. and Mouzna, J. (2014). ‘Mitigation of insider and outsider DoS attack against signature based authentication in VANETs’. In: 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE), pp. 152–157.
  47. Kumar, P.V. and Maheshwari, M. (2014). ‘Prevention of Sybil attack and priority batch verification in VANETs’. In: International Conference on Information Communication and Embedded Systems (ICICES 2014), pp. 1–5.
  48. Ltifi, A., Zouinkhi, A. and Bouhlel, M.S. (2015). ‘Trust-based scheme for alert spreading in VANET’. Procedia Computer Science, 73, pp. 282–288.
  49. Li, W. and Song, H. (2016). ‘ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks’. IEEE Transactions on Intelligent Transportation Systems, 17(4), pp. 960–969.
  50. Kerrache, C.A., Lagraa, N., Calafate, C.T. and Lakas, A. (2016). ‘TFDD: a trust-based framework for reliable data delivery and DoS defense in VANETs’. Vehicular Communications, 9, pp. 254–267.
  51. Khan, F.A., Imran, M., Abbas, H. and Durad, M.H. (2017). ‘A detection and prevention system against collaborative attacks in mobile ad hoc networks’. Future Generation Computer Systems, 68, pp. 416–427.
DOI: https://doi.org/10.2478/ias-2024-0001 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 1 - 14
Published on: Aug 31, 2024
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2024 Wajid Ali, Shalini Z. Ninoria, Gulista Khan, Kamal Kumar Gola, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.