Detection of intrusions in clustered vehicle networks using invasive weed optimization using a deep wavelet neural networks
Tài liệu tham khảo
Aghabagherloo, 2022, An efficient and physically secure privacy-preserving authentication scheme for Vehicular Ad-hoc NETworks (VANETs), IEEE Access, 10, 93831, 10.1109/ACCESS.2022.3203580
Liu, 2019, A blockchain-based trust management with conditional privacy-preserving announcement scheme for VANETs, IEEE Internet Things J., 7, 4101, 10.1109/JIOT.2019.2957421
Zhong, 2017, Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks, IEEE Access, 6, 2241, 10.1109/ACCESS.2017.2782672
Cui, 2020, Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme, IEEE J. Sel. Area. Commun., 38, 1191, 10.1109/JSAC.2020.2986617
Jo, 2017, Reliable cooperative authentication for vehicular networks, IEEE Trans. Intell. Transport. Syst., 19, 1065, 10.1109/TITS.2017.2712772
Mehrabian, 2006, A novel numerical optimization algorithm inspired from weed colonization, Ecol. Inf., 1, 355, 10.1016/j.ecoinf.2006.07.003
Guo, 2017, Deep wavelet prediction for image super-resolution, 104
Khan, 2019, Secure trust-based blockchain architecture to prevent attacks in VANET, Sensors, 19, 4954, 10.3390/s19224954
Maheswari, 2021, A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks, Wireless Pers. Commun., 118, 1535, 10.1007/s11277-021-08101-2
B Murali Krishna M, 2021, “Intrusion detection system for energy efficient cluster based vehicular Adhoc Networks”, Int. J. Adv. Compu. Sci.Appl.(IJACSA), 12
Vijayakumar, 2017, Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks, Cluster Comput., 20, 2439, 10.1007/s10586-017-0848-x
Chim, 2011, SPECS: secure and privacy enhancing communications schemes for VANETs, Ad Hoc Netw., 9, 189, 10.1016/j.adhoc.2010.05.005
Hu, 2016, REPLACE: a reliable trust-based platoon service recommendation scheme in VANET, IEEE Trans. Veh. Technol., 66, 1786, 10.1109/TVT.2016.2565001
Diro, 2018, Leveraging LSTM networks for attack detection in fog-to-things communications, IEEE Commun. Mag., 56, 124, 10.1109/MCOM.2018.1701270
Omar, 2021, Application of sliding window deep learning for intrusion detection in fog computing, 1
Zhang, 2021, V2V routing in VANET based on fuzzy logic and reinforcement learning, Int. J. Comput. Commun. Control, 16, 10.15837/ijccc.2021.1.4123
Wei, 2020, Blockchain data-based cloud data integrity protection mechanism, Future Generat. Comput. Syst., 102, 902, 10.1016/j.future.2019.09.028
Subba, 2018, A game theory based multi layered intrusion detection framework for VANET, Future Generat. Comput. Syst., 82, 12, 10.1016/j.future.2017.12.008
Prateek, 2022, 2022
Mejri, 2014, Survey on VANET security challenges and possible cryptographic solutions, Veh. Commun., 1, 53
Khan, 2019, Secure trust-based blockchain architecture to prevent attacks in VANET, Sensors, 19, 4954, 10.3390/s19224954
Englund, 2015, Future applications of VANETs, 525