Author:
Bhati Akansha,Singh P. K.
Reference17 articles.
1. Ayyappan B, Kumar PM (2017) Security protocols in WSN: a survey. In: 2017 third international conference on science technology engineering & management (ICONSTEM). Chennai, pp 301–304.
https://doi.org/10.1109/iconstem.2017.8261297
2. Ali S, Khan MA, Ahmad J, Malik AW, ur Rehman A (2018) Detection and prevention of Black Hole attacks in IOT & WSN. In: 2018 third international conference on fog and mobile edge computing (FMEC). Barcelona, pp 217–226.
https://doi.org/10.1109/fmec.2018.8364068
3. Tian B, Hou KM, Shi H, Liu X, Chen Y, Chanet J-P, Application of modified RPL under VANET-WSN communication architecture. In: 2013 international conference, Blaise Pascal University Clermont-Ferrand, France, 978-0-7695-5004-6/13 © 2013 IEEE.
https://doi.org/10.1109/iccis.2013.387
4. Dak AY, Yahya S, Kassim M (2012) A literature survey on security challenges in VANETs. Int J Comput Theory Eng 4(6). Manuscript received August 1, 2012; revised September 2, 2012
5. Pathre A, Agrawal C, Jain A, A novel defense scheme against DDOS attack in VANET. 978-1-4673-5999-3/13/$31.00 ©2013 IEEE