Signaling Game-Inspired Model for Ubiquitous Security in VANETs

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Engineering for VANETs

The ”Secure Vehicle Communication” project (SEVECOM) has the aim to develop a future proof security solution for vehicular communication (VC). As there are no clear scenarios and standardized protocols for VC yet, traditional approaches for security engineering fail, as they usually consider a specific scenario and system. At the same time, VC encompasses dozens of potential applications with v...

متن کامل

A microbial inspired routing protocol for VANETs

We present a bio-inspired unicast routing protocol for vehicular Ad Hoc Networks which uses the cellular attractor selection mechanism to select next hops. The proposed unicast routing protocol based on attractor selecting (URAS) is an opportunistic routing protocol, which is able to change itself adaptively to the complex and dynamic environment by routing feedback packets. We further employ a...

متن کامل

Routing Improvement for Vehicular Ad Hoc Networks (VANETs) Using Nature Inspired Algorithms

are a subset of MANETs in which vehicles are considered as network clients. These networks have been created to communicate between vehicles and traffic control on the roads. have similar features to MANETs and their main special property is the high-speed node mobility which makes a quick change of the network. The rapid change of network topology is a major challenge in routing. One of the we...

متن کامل

Security for Ubiquitous Computing

Ubiquitous computing, over a decade in the making, has finally graduated from whacky buzzword through fashionable research topic to something that is definitely and inevitably happening. This will mean revolutionary changes in the way computing affects our society: changes of the same magnitude and scope as those brought about by the World Wide Web. When throw-away computing capabilities are em...

متن کامل

Security for Ubiquitous Computing

Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2019

ISSN: 1877-0509

DOI: 10.1016/j.procs.2019.11.009