scispace - formally typeset
Search or ask a question

Answers from top 9 papers

More filters
Papers (9)Insight
That is, messages may be tempered by malicious parties.
However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them.
Second, it is spontaneous: safety messages can be authenticated locally, without support from the roadside units or contacting other vehicles.
Open accessJournal ArticleDOI
05 Aug 2019-IEEE Access
15 Citations
For a cognitive mmWave wiretap network in which randomly located eavesdroppers may reside in the signal beam of the secondary network, confidential messages could still be wiretapped.
Preventive messages broadcast on radio or television may be determinative.
However, messages generated by vehicles may not be reliable.
If messages are relayed, the round-trip time increases and thus mafia fraud attacks can be detected.
Finally, we demonstrate that messages can be extracted successfully from either of the two transmission directions of the system.
Not only can unusual messages be detected, but sets of related messages can be detected as conversations, even when their endpoints have been obscured (by using transient email addresses, stolen cell phones and so on).