Autonomous vehicles in the Internet of Vehicles (IoV) have the ability to generate their mobility pattern in advance and share it with other vehicles or a central location. This information enables traffic systems to be aware of future traffic flow. However, the current classical traffic systems barely consider the spatial dependency of traffic data, and more advanced systems suffer from storage limitations. These problems will be exacerbated by the falsification of traffic data through corresponding data attacks, such as position forging attacks. This, in turn, negatively impacts the performance of traffic management systems. This paper proposes a heuristic distributed scheme (HIDE) to validate the mobility pattern of vehicles by penalizin...
The Internet of Things plays a predominant role in automating all real-time applications. One such a...
Recent advances in the Internet of Things (IoT) and the adoption of IoT in vehicular networks have l...
Secure vehicular communication is a critical factor for secure traffic management. Perfect ...
In the Internet of Vehicle (IoV) networks, vehicles exchange periodic Basic Safety Messages (BSMs) c...
In an Internet of Vehicles (IoV) network, vehicles periodically broadcast Basic Safety Messages (BSM...
Most applications considered in Vehicular Ad-hoc Networks (VANETs) base their calculations on the lo...
Anomaly detection is critical for intelligent vehicle (IV) collaboration. Forming clusters/platoons,...
Trustworthy communication in vehicular ad-hoc networks is essential to provide functional and reliab...
International audienceVehicular environments still remain vulnerable to various potential attacks be...
Many Intrusion Detection approaches for Vehicular ad hoc networks (VANETs) are proposed. However, no...
With changing times, the need for security increases in all fields, whether we talk about cloud netw...
The concept of the Internet of Vehicles (IoV) enhances the VANETs by merging the VANETs with the Int...
International audienceVehicular environments are vulnerable to attacks because of the continuous int...
Internet of Vehicles (IoV) is regarded as an emerging paradigm for connected vehicles to exchange th...
Vehicular adhoc networks (VANETs) are made by applying the standards of mobile adhoc networks (MANET...
The Internet of Things plays a predominant role in automating all real-time applications. One such a...
Recent advances in the Internet of Things (IoT) and the adoption of IoT in vehicular networks have l...
Secure vehicular communication is a critical factor for secure traffic management. Perfect ...
In the Internet of Vehicle (IoV) networks, vehicles exchange periodic Basic Safety Messages (BSMs) c...
In an Internet of Vehicles (IoV) network, vehicles periodically broadcast Basic Safety Messages (BSM...
Most applications considered in Vehicular Ad-hoc Networks (VANETs) base their calculations on the lo...
Anomaly detection is critical for intelligent vehicle (IV) collaboration. Forming clusters/platoons,...
Trustworthy communication in vehicular ad-hoc networks is essential to provide functional and reliab...
International audienceVehicular environments still remain vulnerable to various potential attacks be...
Many Intrusion Detection approaches for Vehicular ad hoc networks (VANETs) are proposed. However, no...
With changing times, the need for security increases in all fields, whether we talk about cloud netw...
The concept of the Internet of Vehicles (IoV) enhances the VANETs by merging the VANETs with the Int...
International audienceVehicular environments are vulnerable to attacks because of the continuous int...
Internet of Vehicles (IoV) is regarded as an emerging paradigm for connected vehicles to exchange th...
Vehicular adhoc networks (VANETs) are made by applying the standards of mobile adhoc networks (MANET...
The Internet of Things plays a predominant role in automating all real-time applications. One such a...
Recent advances in the Internet of Things (IoT) and the adoption of IoT in vehicular networks have l...
Secure vehicular communication is a critical factor for secure traffic management. Perfect ...