[go: nahoru, domu]

Mershad et al., 2021 - Google Patents

Proof of accumulated trust: A new consensus protocol for the security of the IoV

Mershad et al., 2021

View PDF
Document ID
7536664601970840533
Author
Mershad K
Cheikhrouhou O
Ismail L
Publication year
Publication venue
Vehicular Communications

External Links

Snippet

Abstract The Internet of Vehicles (IoV) is a distributed network that enables vehicles to connect to each other and to various infrastructure and smart devices, in order to exchange data and provide important services. The highly dynamic environment of the IoV offers a lot …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/56Packet switching systems
    • H04L12/5695Admission control; Resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer

Similar Documents

Publication Publication Date Title
Mershad et al. Proof of accumulated trust: A new consensus protocol for the security of the IoV
Xu et al. SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles
Grover Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review
Mirsadeghi et al. A trust infrastructure based authentication method for clustered vehicular ad hoc networks
CN109462587B (en) Block chain layered consensus method, block chain network system and block chain node
Kudva et al. A scalable blockchain based trust management in VANET routing protocol
Shen et al. Blockchain-based lightweight certificate authority for efficient privacy-preserving location-based service in vehicular social networks
Abbas et al. Securing genetic algorithm enabled SDN routing for blockchain based Internet of Things
US20170359365A1 (en) Detecting and evicting malicious vehicles in a vehicle communications network
Hatzivasilis et al. MobileTrust: Secure knowledge integration in VANETs
Singh et al. A cryptographic approach to prevent network incursion for enhancement of QoS in sustainable smart city using MANET
Kim et al. Quick block transport system for scalable Hyperledger fabric blockchain over D2D-assisted 5G networks
Guo et al. Fog service in space information network: Architecture, use case, security and challenges
Putra et al. Toward blockchain-based trust and reputation management for trustworthy 6G networks
Mershad PROACT: Parallel multi-miner proof of accumulated trust protocol for Internet of Drones
Chen et al. A Summary of Security Techniques‐Based Blockchain in IoV
Kumar et al. R-PBFT: A secure and intelligent consensus algorithm for Internet of vehicles
Akhter et al. Blockchain in vehicular ad hoc networks: Applications, challenges and solutions
Wang et al. Toward a trust evaluation framework against malicious behaviors of industrial iot
Mershad et al. Blockchain model for environment/infrastructure monitoring in cloud-enabled high-altitude platform systems
Porkodi et al. Integration of blockchain and internet of things
Liu et al. Blockchain based trust management in vehicular networks
Xiong et al. A blockchain-based and privacy-preserved authentication scheme for inter-constellation collaboration in Space-Ground Integrated Networks
Waseem et al. Blockchain based intelligent transport system
Lu et al. Distributed ledger technology based architecture for decentralized device-to-device communication network