Please enable javascript in your browser.
Page
of
0
چالش ها و مسایل امنیتی در شبکه های خودرویی
فیض، محمد مهدی Feiz, Mohammad Mehdi
Cataloging brief
چالش ها و مسایل امنیتی در شبکه های خودرویی
پدیدآور اصلی :
فیض، محمد مهدی Feiz, Mohammad Mehdi
ناشر :
صنعتی شریف
سال انتشار :
1388
موضوع ها :
امنیت Security شبکه خودجوش سیار Mobile Ad Hoc Network شبکه خودجوش خودرویی Vehicular Ad...
شماره راهنما :
52-40275
Find in content
sort by
page number
page score
Bookmark
List of Acronyms
(12)
Vehicular ad hoc Network (VANET)
(13)
Introduction
(13)
VANETs versus MANETs
(14)
Survey of VANET issues
(16)
Media Access Control (MAC)
(16)
Mobility Management
(17)
Data Aggregation
(18)
Data Validation
(19)
Data Dissemination
(20)
Routing
(21)
Network Congestion
(22)
Performance Analysis
(23)
Privacy and Security
(24)
Wireless Technologies for VANETs
(26)
WMANs
(27)
WLAN/WiFi
(27)
WPAN
(28)
DSRC/WAVE
(28)
Routing in MANET
(29)
Routing in MANET
(29)
Proactive routing protocols
(31)
Destination Sequenced Distance Vector (DSDV)
(31)
Optimized Link State Routing (OLSR)
(33)
Topology Dissemination Based on Reverse-Path Forwarding (TBRPF)
(35)
Reactive Routing Protocols
(37)
Ad hoc On-demand Distance Vector (AODV)
(37)
Dynamic Source Routing (DSR)
(42)
Hybrid Routing Protocols
(44)
Zone Routing Protocol (ZRP)
(44)
Position Based Routing
(47)
Location Services Block
(47)
Forwarding Strategies Block
(51)
Greedy Perimeter Stateless Routing Protocol (GPSR)
(53)
Hybrid Approach
(55)
Chapter Summary
(56)
Security in VANET
(57)
Related Work
(58)
Risk Analysis of Safety Message Routing
(62)
Minimalistic Vehicular Communication Model
(63)
Risk Analysis
(64)
Assets
(65)
Threats
(66)
Vulnerabilities
(68)
Attacks
(69)
Attacks in safety message routing divided into two main categories:
(69)
Attacks Against Safety Messages
(69)
Attacks Against Routing Messages
(71)
Risks
(75)
Secure Routing in VANET
(76)
Chapter Summary
(80)
Simulation Results
(83)
Compare AODV, DSR, DSDV in VANET Scenario
(83)
Effect of Mobile Speed
(84)
Effect of Connection Sessions
(87)
Comparing AODV and AODV with Malicious Node
(90)
Effect of Connection Sessions
(90)
Effect of Mobile Speed
(93)
Chapter Summary
(96)
Conclusion and Further research
(97)
Conclusion
(97)
Further Research
(98)
References
(99)