A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks

S Dong, H Su, Y Xia, F Zhu, X Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As Vehicular Ad-hoc Networks (VANETs) bring fantastic revolution to intelligent
transportation systems, their own security has become an important research topic …

Review of prevention schemes for replay attack in vehicular ad hoc networks (vanets)

MA Al-shareeda, M Anbar, IH Hasbullah… - 2020 IEEE 3rd …, 2020 - ieeexplore.ieee.org
Vehicular Ad hoc Networks (VANETs) are self-organizing wireless communication networks
that allow vehicles to exchange traffic-related messages automatically with neigh-boring …

Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network

AK Al-Ani, M Anbar, A Al-Ani, DR Ibrahim - IEEE Access, 2020 - ieeexplore.ieee.org
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …

[PDF][PDF] NE-CPPA: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (VANETs)

MA Al-shareeda, M Anbar, S Manickam… - Appl …, 2020 - naturalspublishing.com
Vehicular ad-hoc networks (VANETs) are the fundamental technology for the Intelligent
Transportation System (ITS) that provides drivers with a safe and comfortable driving …

Evaluating Security of MQTT Protocol in Internet of Things

A Al-Ani, WK Shen, AK Al-Ani… - 2023 IEEE Canadian …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) has revolutionized the way people interact, communicate, and
perform daily activities in various domains ranging from households to industries and cities …

Ndpsec: neighbor discovery protocol security mechanism

A Al-Ani, AK Al-Ani, SA Laghari, S Manickam… - IEEE …, 2022 - ieeexplore.ieee.org
Internet Protocol version 6 (IPv6) is envisioned as the cornerstone for future internet
connectivity and information technology (IT) expansion. Due to its enormous address pool …

An IPv6 internet accessing architecture and approach for industrial wireless network

M Wei, C Li, C Li - 2020 14th International Conference on …, 2020 - ieeexplore.ieee.org
Industrial wireless devices are expected to connect to the IP internet seamlessly. There are
several industrial wireless technologies such as LoRa, NB-IoT, WIA-PA, WirelessHART and …

A New Technique to Mitigate DHCPv6 Starvation Attack and Authenticate Clients using DUID

A Jony, MN Islam - … on Advancement in Electrical and Electronic …, 2024 - ieeexplore.ieee.org
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is susceptible to DHCPv6
starvation attack due to the lack of authentication and security mechanisms. RSA …

[PDF][PDF] IPv6 cryptographically generated address: Analysis, optimization and protection

AS Ahmed, R Hassan, F Qamar… - CMC Comput. Mater …, 2021 - cdn.techscience.cn
In networking, one major difficulty that nodes suffer from is the need for their addresses to be
generated and verified without relying on a third party or public authorized servers. To …

基于密钥协商的防范DHCP 中间人攻击方案

姚志强, 竺智荣, 叶帼华 - 通信学报, 2021 - infocomm-journal.com
为应对动态主机设置协议在使用过程中遇到的中间人攻击问题, 提出一种轻量的解决方案.
引入公钥密码技术, 设计新的密钥协商算法并产生相关密钥, 以减轻密钥存储负担; …