Academic literature on the topic 'Securing Vehicular'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Securing Vehicular.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Securing Vehicular"

1

Raya, Maxim, Panos Papadimitratos, and Jean-pierre Hubaux. "SECURING VEHICULAR COMMUNICATIONS." IEEE Wireless Communications 13, no. 5 (2006): 8–15. http://dx.doi.org/10.1109/wc-m.2006.250352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fernandez, Pedro J., Jose Santa, Fernando Bernal, and Antonio F. Skarmeta. "Securing Vehicular IPv6 Communications." IEEE Transactions on Dependable and Secure Computing 13, no. 1 (2016): 46–58. http://dx.doi.org/10.1109/tdsc.2015.2399300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moussaoui, Djilali, Mohamed Feham, Boucif Amar Bensaber, and Benamar Kadri. "Securing vehicular cloud networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4154. http://dx.doi.org/10.11591/ijece.v9i5.pp4154-4162.

Full text
Abstract:
<p>Vehicular Cloud Networks (VCN) is the network that ensures mobility and availability of resources allowing new services and applications like Network as a Service (NaaS), STorage as a Service (STaaS), Computation as a Service (CompaaS) and Cooperation as a Service (CaaS). In this paper, we propose a solution to secure the Vehicular Cloud Network (VCN). Our challenge in this work is to adapt the PKI architecture, which is mainly used in wired networks to be used in VCN. To propose a security solution for Vehicular Cloud Networks (VCN), our work is based on three steps; the first one is
APA, Harvard, Vancouver, ISO, and other styles
4

Raya, Maxim, and Jean-Pierre Hubaux. "Securing vehicular ad hoc networks." Journal of Computer Security 15, no. 1 (2007): 39–68. http://dx.doi.org/10.3233/jcs-2007-15103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saez, Y., X. Cao, L. B. Kish, and G. Pesti. "Securing Vehicle Communication Systems by the KLJN Key Exchange Protocol." Fluctuation and Noise Letters 13, no. 03 (2014): 1450020. http://dx.doi.org/10.1142/s0219477514500205.

Full text
Abstract:
We review the security requirements for vehicular communication networks and provide a critical assessment of some typical communication security solutions. We also propose a novel unconditionally secure vehicular communication architecture that utilizes the Kirchhoff-law–Johnson-noise (KLJN) key distribution scheme.
APA, Harvard, Vancouver, ISO, and other styles
6

Mei, Fang, Shengjie Liu, Jian Wang, Yuming Ge, and Tie Feng. "Negotiation-Free Encryption for Securing Vehicular Unicasting Communication." Applied Sciences 9, no. 6 (2019): 1121. http://dx.doi.org/10.3390/app9061121.

Full text
Abstract:
Thanks to the rapid development of vehicle-to-everything (V2X) and sensor technology, states of vehicles can be accurately measured and stored jointly in the cloud. These states can be viewed as a set of infinite attributes, such as the density around the motor vehicle, signal strength and so on. As such, the vehicle can be viewed as a moving object. The vehicle state can be measured, and its entropy is large. In vehicle networking, unicast communications between vehicles must be encrypted. The previous approach was to negotiate a session key through the Diffie-Hellman algorithm and then use t
APA, Harvard, Vancouver, ISO, and other styles
7

Trouli, Georgia-Irene, and George Kornaros. "Automotive Virtual In-sensor Analytics for Securing Vehicular Communication." IEEE Design & Test 37, no. 3 (2020): 91–98. http://dx.doi.org/10.1109/mdat.2020.2974914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rathee, Sharma, Iqbal, Aloqaily, Jaglan, and Kumar. "A Blockchain Framework for Securing Connected and Autonomous Vehicles." Sensors 19, no. 14 (2019): 3165. http://dx.doi.org/10.3390/s19143165.

Full text
Abstract:
Recently, connected vehicles (CV) are becoming a promising research area leading to the concept of CV as a Service (CVaaS). With the increase of connected vehicles and an exponential growth in the field of online cab booking services, new requirements such as secure, seamless and robust information exchange among vehicles of vehicular networks are emerging. In this context, the original concept of vehicular networks is being transformed into a new concept known as connected and autonomous vehicles. Autonomous vehicular use yields a better experience and helps in reducing congestion by allowing
APA, Harvard, Vancouver, ISO, and other styles
9

Shrestha, Rakesh, Seung Yeob Nam, Rojeena Bajracharya, and Shiho Kim. "Evolution of V2X Communication and Integration of Blockchain for Security Enhancements." Electronics 9, no. 9 (2020): 1338. http://dx.doi.org/10.3390/electronics9091338.

Full text
Abstract:
With the rapid evolution in wireless communications and autonomous vehicles, intelligent and autonomous vehicles will be launched soon. Vehicle to Everything (V2X) communications provides driving safety, traffic efficiency, and road information in real-time in vehicular networks. V2X has evolved by integrating cellular 5G and New Radio (NR) access technology in V2X communications (i.e., 5G NR V2X); it can fulfill the ever-evolving vehicular application, communication, and service demands of connected vehicles, such as ultra-low latency, ultra-high bandwidth, ultra-high reliability, and securit
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Jong-Hyouk, Jiefeng (Terence) Chen, and Thierry Ernst. "Securing mobile network prefix provisioning for NEMO based vehicular networks." Mathematical and Computer Modelling 55, no. 1-2 (2012): 170–87. http://dx.doi.org/10.1016/j.mcm.2011.02.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Securing Vehicular"

1

Ben, Jaballah Wafa. "Securing wireless sensor and vehicular networks." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0013/document.

Full text
Abstract:
Les Réseaux de Capteurs Sans Fils (RCSFs) et les réseaux véhiculaires sont de plus en plus répandus, et déployés dans des domaines d’applications variés tels que la santé, la surveillance environnementale, les applications d’alerte d’accident, et les applications militaires. Cependant, ces réseaux peuvent être sujets à des attaques, ce qui empêche leur utilisation à grande échelle. Cette thèse étudie la sécurité des communications pour les réseaux de capteurs sans fils, et les communications inter-véhiculaires. Dans ce but, nous abordons quatre aspects importants. La première étude porte sur l
APA, Harvard, Vancouver, ISO, and other styles
2

Aldabbas, Hamza. "Securing data dissemination in vehicular ad hoc networks." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7987.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) in which the mobile nodes are vehicles; these vehicles are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. This kind of network has the advantage of being able to be set-up and deployed anywhere and anytime because it has no infrastructure set-up and no central administration. Distributing information between these vehicles over long ranges in such networks, however, is a very challenging
APA, Harvard, Vancouver, ISO, and other styles
3

Mejri, Mohamed Nidhal. "Securing Vehicular Networks Against Denial of Service Attacks." Thesis, Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCD038/document.

Full text
Abstract:
Dans cette thèse nous nous sommes intéressés à sécuriser les réseaux véhiculaires ad hoc (VANETs) contre les attaques de déni de service (DoS) jugées comme étant les plus dangereuses pour ces réseaux. Notre travail peut être subdivisé en trois grandes parties.Dans un premier temps, nous avons étudié les différentes vulnérabilités auxquelles sont exposés les VANETs, spécialement les attaques DoS. Vu notre expertise en matière de la cryptographie, nous avons exploré, dégagé et classifié des solutions possibles à une grande panoplie de brèches de sécurité VANETs. En effet, nous avons montré que l
APA, Harvard, Vancouver, ISO, and other styles
4

Corser, George P. "Securing location privacy in vehicular applications and communications." Thesis, Oakland University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10169186.

Full text
Abstract:
<p> Vehicular communications systems may one day save lives, reduce fuel consumption, and advance connectivity, but they may also transmit information which could be deanonymized to obtain personal information. Vehicle location data are of special concern because they could be used maliciously. This dissertation presents a systematic study resulting in novel definitions, metrics and methods for evaluating and applying location privacy preserving protocols specifically in vehicular settings.</p><p> Previous work in vehicular network privacy has not thoroughly considered vehicular mobility pat
APA, Harvard, Vancouver, ISO, and other styles
5

Dadras, Soodeh. "Security of Vehicular Platooning." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7445.

Full text
Abstract:
Platooning concept involves a group of vehicles acting as a single unit through coordination of movements. While Platooning as an evolving trend in mobility and transportation diminishes the individual and manual driving concerns, it creates new risks. New technologies and passenger’s safety and security further complicate matters and make platooning attractive target for the malicious minds. To improve the security of the vehicular platooning, threats and their potential impacts on vehicular platooning should be identified to protect the system against security risks. Furthermore, algorithms
APA, Harvard, Vancouver, ISO, and other styles
6

Karthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.

Full text
Abstract:
The emerging concept of vehicular platooning with trust is a promising solution to deal with ever-growing computational and communication demands of connected vehicles. The most important concept introduced in any technology is trust, this has previously been imbibed into the platoon with the use of a centralized trust evaluating infrastructure. The introduction of trust evaluation using a decentralized model is not in widespread use, which makes it a challenging task to be included in the fast-varying feature of vehicular environment. This thesis discusses incorporation of a decentralized tr
APA, Harvard, Vancouver, ISO, and other styles
7

Gomes, Gonçalo Miguel Vieira. "Forwarding and security in vehicular networks." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/15927.

Full text
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações<br>The growing research in vehicular network solutions provided the rise of interaction in these highly dynamic environments in the market. The developed architectures do not usually focus, however, in security aspects. Common security strategies designed for the Internet require IP. Since nodes' addresses in a vehicular network are too dynamic, such solutions would require cumbersome negotiations, which would make them unsuitable to these environments. The objective of this dissertation is to develop, and test a scalable, lightweight, laye
APA, Harvard, Vancouver, ISO, and other styles
8

Duarte, Daniel Belém de Almeida. "Implementation of security services for vehicular communications." Master's thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/11677.

Full text
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações<br>Ao longo dos últimos anos tem existido uma enorme evolução nas redes veiculares com o objectivo de desenvolver protocolos e protótipos que satisfaçam os requisitos do sistema de transporte inteligente. Uma das normas desenvolvidas é a norma IEEE 802.11p que define a camada física para a criação de uma plataforma que permita a formação de uma rede veicular. A VANET (Vehicular Ad-Hoc Network) é uma rede criada pelos vários elementos da estrada, como carros e plataformas de prestação de serviços encontradas ao longo da estrada. Estas
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Shareeda, Sarah Yaseen Abdulrazzaq. "Enhancing Security, Privacy, and Efficiency of Vehicular Networks." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu150032914711847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lim, Kiho. "Secure and Authenticated Message Dissemination in Vehicular ad hoc Networks and an Incentive-Based Architecture for Vehicular Cloud." UKnowledge, 2016. http://uknowledge.uky.edu/cs_etds/48.

Full text
Abstract:
Vehicular ad hoc Networks (VANETs) allow vehicles to form a self-organized network. VANETs are likely to be widely deployed in the future, given the interest shown by industry in self-driving cars and satisfying their customers various interests. Problems related to Mobile ad hoc Networks (MANETs) such as routing, security, etc.have been extensively studied. Even though VANETs are special type of MANETs, solutions proposed for MANETs cannot be directly applied to VANETs because all problems related to MANETs have been studied for small networks. Moreover, in MANETs, nodes can move randomly. On
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Securing Vehicular"

1

Du, Suguo, and Haojin Zhu. Security Assessment in Vehicular Networks. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9357-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wolf, Marko. Security Engineering for Vehicular IT Systems. Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Xiaodong, and Rongxing Lu, eds. Vehicular Ad Hoc Network Security and Privacy. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119082163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jean, Michele. Conduire un vehicule de promenade. Publications du Quebec, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wolf, Marko. Security Engineering for Vehicular IT Systems: Improving the Trustworthiness and Dependability of Automotive IT Applications. Vieweg+Teubner Verlag / GWV Fachverlage GmbH, Wiesbaden, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Security Assessment In Vehicular Networks. Springer-Verlag New York Inc., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Xiaodong, and Rongxing Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Xiaodong, and Rongxing Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley-Interscience, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Xiaodong, and Rongxing Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rawat, Danda B., and Chandra Bajracharya. Vehicular Cyber Physical Systems: Adaptive Connectivity and Security. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Securing Vehicular"

1

Rawat, Danda B., and Chandra Bajracharya. "Securing VANETs for Vehicular CPS." In Vehicular Cyber Physical Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44494-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmed, Wedad, and Mourad Elhadef. "Securing Intelligent Vehicular Ad Hoc Networks: A Survey." In Advances in Computer Science and Ubiquitous Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7605-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Progga, Farhat Tasnim, Hossain Shahriar, Chi Zhang, and Maria Valero. "Securing Vehicular Network Using AI and Blockchain-Based Approaches." In Studies in Big Data. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74575-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jain, Vaishali, Rajendra Singh Kushwah, and Ranjeet Singh Tomar. "Named Data Network Using Trust Function for Securing Vehicular Ad Hoc Network." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0589-4_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Popescu-Zeletin, Radu, Ilja Radusch, and Mihai Adrian Rigani. "Security." In Vehicular-2-X Communication. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-540-77143-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hartong, Mark, Rajni Goel, and Duminda Wijesekera. "Security and Dependability in Train Control Systems." In Vehicular Networking. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470661314.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Papadimitratos, Panos. "Security and Privacy Mechanisms for Vehicular Networks." In Vehicular Networking. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470661314.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wolf, Marko. "Vehicular Security Technologies." In Security Engineering for Vehicular IT Systems. Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wolf, Marko. "Vehicular Security Mechanisms." In Security Engineering for Vehicular IT Systems. Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eckhoff, David. "Vehicular Privacy." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1529-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Securing Vehicular"

1

Liu, Xiaonan, Zhiyi Fang, and Lijun Shi. "Securing Vehicular Ad Hoc Networks." In 2007 2nd International Conference on Pervasive Computing and Applications. IEEE, 2007. http://dx.doi.org/10.1109/icpca.2007.4365481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Asplund, Mikael. "Poster: Securing vehicular platoon membership." In 2014 IEEE Vehicular Networking Conference (VNC). IEEE, 2014. http://dx.doi.org/10.1109/vnc.2014.7013324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mazilu, S., M. Teler, and C. Dobre. "Securing Vehicular Networks Based on Data-Trust Computation." In 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. IEEE, 2011. http://dx.doi.org/10.1109/3pgcic.2011.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vaszary, Mark, Andreas Slovacek, Yanyan Zhuang, and Sang-Yoon Chang. "Securing Tire Pressure Monitoring System for Vehicular Privacy." In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2021. http://dx.doi.org/10.1109/ccnc49032.2021.9369576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rawat, Danda B., Bhed Bahadur Bista, and Gongjun Yan. "Securing vehicular ad-hoc networks from data falsification attacks." In TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7847967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Eltayeb, Mohammed E., and Robert W. Heath. "Securing mmWave Vehicular Communication Links with Multiple Transmit Antennas." In 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 2018. http://dx.doi.org/10.1109/iccw.2018.8403556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Teler, Mihaela, and Valentin Cristea. "Securing Vehicular Networks Using Deterministic Schemes for Computing Trust." In 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2012. http://dx.doi.org/10.1109/incos.2012.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bermad, Nabila, Salah Zemmoudj, and Mawloud Omar. "Securing Vehicular Platooning against Vehicle Platooning Disruption (VPD) Attacks." In 2019 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN). IEEE, 2019. http://dx.doi.org/10.23919/pemwn47208.2019.8986956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Dhuraibi, Wedad Ahmed, and Mourad Elhadef. "Securing Vehicular Ad-Hoc Networks: A DDoS Case Study." In 2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE, 2021. http://dx.doi.org/10.1109/iccakm50778.2021.9357733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Amari, Houda, Wassef Louati, Lyes Khoukhi, and Lamia Hadrich Belguith. "Securing Software-Defined Vehicular Network Architecture against DDoS attack." In 2021 IEEE 46th Conference on Local Computer Networks (LCN). IEEE, 2021. http://dx.doi.org/10.1109/lcn52139.2021.9524953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!