A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks
As Vehicular Ad-hoc Networks (VANETs) bring fantastic revolution to intelligent
transportation systems, their own security has become an important research topic …
transportation systems, their own security has become an important research topic …
Review of prevention schemes for replay attack in vehicular ad hoc networks (vanets)
Vehicular Ad hoc Networks (VANETs) are self-organizing wireless communication networks
that allow vehicles to exchange traffic-related messages automatically with neigh-boring …
that allow vehicles to exchange traffic-related messages automatically with neigh-boring …
Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …
[PDF][PDF] NE-CPPA: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (VANETs)
MA Al-shareeda, M Anbar, S Manickam… - Appl …, 2020 - naturalspublishing.com
Vehicular ad-hoc networks (VANETs) are the fundamental technology for the Intelligent
Transportation System (ITS) that provides drivers with a safe and comfortable driving …
Transportation System (ITS) that provides drivers with a safe and comfortable driving …
Evaluating Security of MQTT Protocol in Internet of Things
The Internet of Things (IoT) has revolutionized the way people interact, communicate, and
perform daily activities in various domains ranging from households to industries and cities …
perform daily activities in various domains ranging from households to industries and cities …
Ndpsec: neighbor discovery protocol security mechanism
Internet Protocol version 6 (IPv6) is envisioned as the cornerstone for future internet
connectivity and information technology (IT) expansion. Due to its enormous address pool …
connectivity and information technology (IT) expansion. Due to its enormous address pool …
An IPv6 internet accessing architecture and approach for industrial wireless network
M Wei, C Li, C Li - 2020 14th International Conference on …, 2020 - ieeexplore.ieee.org
Industrial wireless devices are expected to connect to the IP internet seamlessly. There are
several industrial wireless technologies such as LoRa, NB-IoT, WIA-PA, WirelessHART and …
several industrial wireless technologies such as LoRa, NB-IoT, WIA-PA, WirelessHART and …
A New Technique to Mitigate DHCPv6 Starvation Attack and Authenticate Clients using DUID
A Jony, MN Islam - … on Advancement in Electrical and Electronic …, 2024 - ieeexplore.ieee.org
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is susceptible to DHCPv6
starvation attack due to the lack of authentication and security mechanisms. RSA …
starvation attack due to the lack of authentication and security mechanisms. RSA …
[PDF][PDF] IPv6 cryptographically generated address: Analysis, optimization and protection
In networking, one major difficulty that nodes suffer from is the need for their addresses to be
generated and verified without relying on a third party or public authorized servers. To …
generated and verified without relying on a third party or public authorized servers. To …
基于密钥协商的防范DHCP 中间人攻击方案
姚志强, 竺智荣, 叶帼华 - 通信学报, 2021 - infocomm-journal.com
为应对动态主机设置协议在使用过程中遇到的中间人攻击问题, 提出一种轻量的解决方案.
引入公钥密码技术, 设计新的密钥协商算法并产生相关密钥, 以减轻密钥存储负担; …
引入公钥密码技术, 设计新的密钥协商算法并产生相关密钥, 以减轻密钥存储负担; …