메뉴 건너뛰기




Volumn 25, Issue 8, 2007, Pages 1557-1568

Eviction of misbehaving and faulty nodes in vehicular networks

Author keywords

Certificate revocation; Misbehavior detection; Vehicular networks

Indexed keywords

CERTIFICATE REVOCATION; MISBEHAVIOR DETECTION; VEHICULAR NETWORKS;

EID: 35348977820     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2007.071006     Document Type: Article
Times cited : (356)

References (38)
  • 1
    • 1342281463 scopus 로고    scopus 로고
    • The threat of intelligent collisions
    • Jan.-Feb
    • J. Blum and A. Eskandarian, "The threat of intelligent collisions," IT Professional, vol. 6, no. 1, pp. 24-29, Jan.-Feb. 2004.
    • (2004) IT Professional , vol.6 , Issue.1 , pp. 24-29
    • Blum, J.1    Eskandarian, A.2
  • 4
    • 84888735687 scopus 로고    scopus 로고
    • IEEE P1609.2 Version 1 - Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, In development, 2006.
    • "IEEE P1609.2 Version 1 - Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages," In development, 2006.
  • 5
    • 33845580544 scopus 로고    scopus 로고
    • VaneSe - An approach to VANET security
    • M. Gerlach, "VaneSe - An approach to VANET security," in V2VCOM, 2005.
    • (2005) V2VCOM
    • Gerlach, M.1
  • 6
    • 14944342986 scopus 로고    scopus 로고
    • Efficient attribute authentication, with applications to ad hoc networks
    • M. Jakobsson and S. Wetzel, "Efficient attribute authentication, with applications to ad hoc networks," in Proceedings of VANET'04, 2004.
    • (2004) Proceedings of VANET'04
    • Jakobsson, M.1    Wetzel, S.2
  • 11
    • 84888750543 scopus 로고    scopus 로고
    • Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ASTM E2213-03, 2003.
    • "Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications," ASTM E2213-03, 2003.
  • 14
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 15
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Feb
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Communications, vol. 11, no. 1, pp. 48-60, Feb. 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 16
    • 34247376546 scopus 로고    scopus 로고
    • Improved security in geographic ad hoc routing through autonomous position verification
    • T. Leinmüller, C. Maihöfer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," in Proceedings of VANET06, 2006.
    • (2006) Proceedings of VANET06
    • Leinmüller, T.1    Maihöfer, C.2    Schoch, E.3    Kargl, F.4
  • 17
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-Service attack-detection techniques
    • Jan.-Feb
    • G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-Service attack-detection techniques," IEEE Internet Computing, vol. 10, no. 1, pp. 82-89, Jan.-Feb. 2006.
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.3    Rai, S.4
  • 20
    • 84893405732 scopus 로고    scopus 로고
    • Data clustering: A review
    • A. Jain, M. Murty, and P. Flynn, "Data clustering: a review," ACM Comput. Surv., vol. 31, no. 3, pp. 264-323, 1999.
    • (1999) ACM Comput. Surv , vol.31 , Issue.3 , pp. 264-323
    • Jain, A.1    Murty, M.2    Flynn, P.3
  • 22
    • 79952067130 scopus 로고    scopus 로고
    • A certificate revocation scheme for wireless ad hoc networks
    • C. Crépeau and C. Davis, "A certificate revocation scheme for wireless ad hoc networks," in Proceedings of SASN'03, 2003.
    • (2003) Proceedings of SASN'03
    • Crépeau, C.1    Davis, C.2
  • 23
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • S. Zhong, J. Chen, and Y. Yang, "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proceedings of Infocom'03, 2003.
    • (2003) Proceedings of Infocom'03
    • Zhong, S.1    Chen, J.2    Yang, Y.3
  • 24
    • 14844324732 scopus 로고    scopus 로고
    • A robust reputation system for P2P and mobile ad-hoc networks
    • S. Buchegger and J.-Y. L. Boudec, "A robust reputation system for P2P and mobile ad-hoc networks," in Proceedings of P2PEcon'04, 2004.
    • (2004) Proceedings of P2PEcon'04
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 27
    • 84888682468 scopus 로고    scopus 로고
    • http://ivc.epfl.ch.
  • 28
    • 3242880752 scopus 로고    scopus 로고
    • Digital certificates: A survey of revocation methods
    • P. Wohlmacher, "Digital certificates: a survey of revocation methods," in Proceedings of Multimedia'00, 2000.
    • (2000) Proceedings of Multimedia'00
    • Wohlmacher, P.1
  • 29
    • 33645797144 scopus 로고    scopus 로고
    • Tradeoffs in certificate revocation schemes
    • P. Zheng, "Tradeoffs in certificate revocation schemes," SIGCOMM Computing Communication Review, vol. 33, no. 2, pp. 103-112, 2003.
    • (2003) SIGCOMM Computing Communication Review , vol.33 , Issue.2 , pp. 103-112
    • Zheng, P.1
  • 34
    • 33750956035 scopus 로고    scopus 로고
    • An application of information theory to intrusion detection
    • E. Eiland and L. Liebrock, "An application of information theory to intrusion detection," in Proceedings of IWIA'06, 2006.
    • (2006) Proceedings of IWIA'06
    • Eiland, E.1    Liebrock, L.2
  • 37
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.