Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
The vulnerability of published vehicle traces is a focus issue for vehicle ad hoc network. Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. Also ability of an...
Saved in:
Main Authors: | Wei-dong YANG, Yun-hua HE, Li-min SUN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.032/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Routing algorithm based on characteristics analysis of vehicle trace in vehicular ad hoc network
by: Hua TAO, et al.
Published: (2016-06-01) -
Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
by: Sujash Naskar, et al.
Published: (2025-01-01) -
Study on Minimum Contention Window Size Adjustment Algorithm Based on Neighbor Nodes Number Estimation in Vehicular Ad Hoc Network
by: Dapeng Li, et al.
Published: (2013-06-01) -
Routing optimization method based on GPCR for vehicular Ad Hoc network
by: Zhiru GU, et al.
Published: (2020-07-01) -
Research on video streaming media cooperative downloading in vehicular ad hoc network
by: Liang CHEN, et al.
Published: (2019-01-01)