Skip to main content
. 2018 Nov 20;18(11):4040. doi: 10.3390/s18114040

Figure 3.

Figure 3

Illustration of Passive and Active MITM Attacks in VANET.