Mershad et al., 2021 - Google Patents
Proof of accumulated trust: A new consensus protocol for the security of the IoVMershad et al., 2021
View PDF- Document ID
- 7536664601970840533
- Author
- Mershad K
- Cheikhrouhou O
- Ismail L
- Publication year
- Publication venue
- Vehicular Communications
External Links
Snippet
Abstract The Internet of Vehicles (IoV) is a distributed network that enables vehicles to connect to each other and to various infrastructure and smart devices, in order to exchange data and provide important services. The highly dynamic environment of the IoV offers a lot …
- 230000001010 compromised 0 abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
- H04L12/5695—Admission control; Resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mershad et al. | Proof of accumulated trust: A new consensus protocol for the security of the IoV | |
Xu et al. | SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles | |
Grover | Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review | |
Mirsadeghi et al. | A trust infrastructure based authentication method for clustered vehicular ad hoc networks | |
CN109462587B (en) | Block chain layered consensus method, block chain network system and block chain node | |
Kudva et al. | A scalable blockchain based trust management in VANET routing protocol | |
Shen et al. | Blockchain-based lightweight certificate authority for efficient privacy-preserving location-based service in vehicular social networks | |
Abbas et al. | Securing genetic algorithm enabled SDN routing for blockchain based Internet of Things | |
US20170359365A1 (en) | Detecting and evicting malicious vehicles in a vehicle communications network | |
Hatzivasilis et al. | MobileTrust: Secure knowledge integration in VANETs | |
Singh et al. | A cryptographic approach to prevent network incursion for enhancement of QoS in sustainable smart city using MANET | |
Kim et al. | Quick block transport system for scalable Hyperledger fabric blockchain over D2D-assisted 5G networks | |
Guo et al. | Fog service in space information network: Architecture, use case, security and challenges | |
Putra et al. | Toward blockchain-based trust and reputation management for trustworthy 6G networks | |
Mershad | PROACT: Parallel multi-miner proof of accumulated trust protocol for Internet of Drones | |
Chen et al. | A Summary of Security Techniques‐Based Blockchain in IoV | |
Kumar et al. | R-PBFT: A secure and intelligent consensus algorithm for Internet of vehicles | |
Akhter et al. | Blockchain in vehicular ad hoc networks: Applications, challenges and solutions | |
Wang et al. | Toward a trust evaluation framework against malicious behaviors of industrial iot | |
Mershad et al. | Blockchain model for environment/infrastructure monitoring in cloud-enabled high-altitude platform systems | |
Porkodi et al. | Integration of blockchain and internet of things | |
Liu et al. | Blockchain based trust management in vehicular networks | |
Xiong et al. | A blockchain-based and privacy-preserved authentication scheme for inter-constellation collaboration in Space-Ground Integrated Networks | |
Waseem et al. | Blockchain based intelligent transport system | |
Lu et al. | Distributed ledger technology based architecture for decentralized device-to-device communication network |