Skip to main content
. 2018 Nov 20;18(11):4040. doi: 10.3390/s18114040

Figure 2.

Figure 2

Man-In-The-Middle Attacks in VANET.