Secure Estimation in V2X Networks with Injection and Packet Drop Attacks.
Arpan ChattopadhyayUrbashi MitraErik G. StrömPublished in: ISWCS (2018)
Keyphrases
- security mechanisms
- cryptographic protocols
- secure routing
- stream cipher
- internet traffic
- security protocols
- chosen plaintext
- traffic analysis
- stepping stones
- security measures
- packet switching
- countermeasures
- security requirements
- security issues
- information leakage
- remote user authentication scheme
- network structure
- network resources
- security threats
- internet protocol
- watermarking algorithm