Edge-computing architectures for internet of things applications: A survey

S Hamdan, M Ayyash, S Almajali - Sensors, 2020 - mdpi.com
The rapid growth of the Internet of Things (IoT) applications and their interference with our
daily life tasks have led to a large number of IoT devices and enormous sizes of IoT …

[HTML][HTML] A survey of trust management in the internet of vehicles

SA Siddiqui, A Mahmood, QZ Sheng, H Suzuki, W Ni - Electronics, 2021 - mdpi.com
Over the past decade, the groundbreaking technological advancements in the Internet of
Vehicles (IoV) coupled with the notion of trust have attracted increasing attention from …

A novel mechanism for misbehavior detection in vehicular networks

EP Valentini, GP Rocha Filho, RE De Grande… - IEEE …, 2023 - ieeexplore.ieee.org
Intelligent Transport Systems (ITS) have provided new technologies to protect human life,
speed up assistance, and improve traffic, to aid drivers, passengers, and pedestrians …

Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm

M Maleknasab Ardakani, MA Tabarzad… - The Journal of …, 2022 - Springer
In vehicular ad hoc networks (VANETs), Sybil attacks are serious security problems that can
seriously affect the operations of the VANETs by producing fake identities and routes. To …

Is it really easy to detect sybil attacks in c-its environments: a position paper

B Hammi, YM Idir, S Zeadally… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS)
represent one of the main use case scenarios that aim to improve peoples' daily lives. Thus …

Detecting Sybil attacks in vehicular fog networks using RSSI and Blockchain

S Benadla, OR Merad-Boudia… - … on Network and …, 2022 - ieeexplore.ieee.org
Vehicular Fog Computing (VFC) is a paradigm of vehicular networks that has a set of
advantages such as agility, efficiency, and reduced latency. The VFC is vulnerable to a …

Malicious node detection in vehicular ad-hoc network (vanet) using enhanced beacon trust management with clustering protocol (ebtm-cp)

C Gupta, L Singh, R Tiwari - Wireless Personal Communications, 2023 - Springer
Vehicular ad hoc networks (VANETs) are susceptible to information threat, wherein an
aggressor aims to pose duplicate information or reprise the present information. Every …

Sybil attack detection in ultra-dense VANETs using verifiable delay functions

Y Rajendra, V Subramanian, SK Shukla - Peer-to-Peer Networking and …, 2024 - Springer
Abstract Vehicular Ad Hoc Networks (VANETs) play a critical role in the future development
of Intelligent Transportation Systems (ITS). These networks facilitate communication …

Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC

NC Velayudhan, A Anitha, M Madanan - Journal of Ambient Intelligence …, 2023 - Springer
Vehicular ad-hoc networks (VANET) technology, which is an open-access network, renders
a quick, simple to deploy, and cheap solution for intelligent traffic control as well as traffic …

[HTML][HTML] Cognitive radio and machine learning modalities for enhancing the smart transportation system: A systematic literature review

MYI Idris, I Ahmedy, TK Soon, M Yahuza, AB Tambuwal… - ICT Express, 2024 - Elsevier
Smart transportation systems implemented through vehicular ad hoc networks (VANET) offer
significant potential to improve safety. However, the network faces critical challenges related …