{"title":"A survey on multi-constrained optimal path selection schemes and authentication schemes for VANET","authors":"V. Kanimozhi, S. Karthik","doi":"10.1109/ISCO.2017.7855995","DOIUrl":null,"url":null,"abstract":"Vehicular ad hoc networks (VANETs) are intended to get better driver safety, avoid collisions, and offer traffic optimization. Recent years have behold an increasing interest in the security schemes for VANETs as well as improve multi-constrained optimal path selection for finding feasible routes. However, there are still several issues to be convey prior to such authentication mechanisms can be voluntarily and extensively used in real-life deployments. In this paper, we examine several authentication schemes and multi-constrained optimal path selection based on certain criteria like Qos constraints.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCO.2017.7855995","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Vehicular ad hoc networks (VANETs) are intended to get better driver safety, avoid collisions, and offer traffic optimization. Recent years have behold an increasing interest in the security schemes for VANETs as well as improve multi-constrained optimal path selection for finding feasible routes. However, there are still several issues to be convey prior to such authentication mechanisms can be voluntarily and extensively used in real-life deployments. In this paper, we examine several authentication schemes and multi-constrained optimal path selection based on certain criteria like Qos constraints.