Art
J-GLOBAL ID:202302279556297016   Reference number:23A0859043

Security Measures with Enhanced Behavior Processing and Footprint Algorithm against Sybil and Bogus Attacks in Vehicular Ad Hoc Network

車両アドホックネットワークにおけるSybilおよびBogus攻撃に対する強化行動処理およびフットプリントアルゴリズムによるセキュリティ対策【JST・京大機械翻訳】
Author (2):
Material:
Volume: 21  Issue: 10  Page: 3538  Publication year: 2021 
JST Material Number: U7015A  ISSN: 1424-8220  CODEN: SENSC9  Document type: Article
Article type: 原著論文  Country of issue: Switzerland (CHE)  Language: ENGLISH (EN)
Abstract/Point:
Abstract/Point
Japanese summary of the article(about several hundred characters).
All summary is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
Vehicular ad hoc networks (VAN...
   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=23A0859043&from=J-GLOBAL&jstjournalNo=U7015A") }}
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
, 【Automatic Indexing@JST】
JST classification (1):
JST classification
Category name(code) classified by JST.
Computer networks 
Reference (49):
  • Douceur, J.R. The Sybil attack. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS’ 02), Cambridge, MA, USA, 7-8 March 2002; pp. 251-260.
  • Sengupta, J.; Ruj, S.; Bit, S.D. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481.
  • Lalitha, R.V.S.; JayaSuma, D.G. A Contemporary Solution to Ferret Out and Obviate the Fake Messages in Vehicular Ad Hoc Networks by not Percolating through Web Server. In Proceedings of the International Conference on Advanced Computing Technologies and Applications (ICACTA-2015), Mumbai, India, 26-27 March 2015.
  • Liang, J.; Ma, M.; Sadiq, M.; Yeung, K. A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology. Knowl. Based Syst. 2019, 163, 611-623.
  • Subba, B.; Biswas, S.; Karmakar, S. A game theory based multi layered intrusion detection framework for VANET. Future Gener. Comput. Syst. 2018, 82, 12-28.
more...
Terms in the title (5):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page