Signaling Game-Inspired Model for Ubiquitous Security in VANETs
نویسندگان
چکیده
منابع مشابه
Security Engineering for VANETs
The ”Secure Vehicle Communication” project (SEVECOM) has the aim to develop a future proof security solution for vehicular communication (VC). As there are no clear scenarios and standardized protocols for VC yet, traditional approaches for security engineering fail, as they usually consider a specific scenario and system. At the same time, VC encompasses dozens of potential applications with v...
متن کاملA microbial inspired routing protocol for VANETs
We present a bio-inspired unicast routing protocol for vehicular Ad Hoc Networks which uses the cellular attractor selection mechanism to select next hops. The proposed unicast routing protocol based on attractor selecting (URAS) is an opportunistic routing protocol, which is able to change itself adaptively to the complex and dynamic environment by routing feedback packets. We further employ a...
متن کاملRouting Improvement for Vehicular Ad Hoc Networks (VANETs) Using Nature Inspired Algorithms
are a subset of MANETs in which vehicles are considered as network clients. These networks have been created to communicate between vehicles and traffic control on the roads. have similar features to MANETs and their main special property is the high-speed node mobility which makes a quick change of the network. The rapid change of network topology is a major challenge in routing. One of the we...
متن کاملSecurity for Ubiquitous Computing
Ubiquitous computing, over a decade in the making, has finally graduated from whacky buzzword through fashionable research topic to something that is definitely and inevitably happening. This will mean revolutionary changes in the way computing affects our society: changes of the same magnitude and scope as those brought about by the World Wide Web. When throw-away computing capabilities are em...
متن کاملSecurity for Ubiquitous Computing
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2019
ISSN: 1877-0509
DOI: 10.1016/j.procs.2019.11.009