메뉴 건너뛰기




Volumn 31, Issue 12, 2008, Pages 2803-2814

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks

Author keywords

Key establishment; Mutual authentication; Privacy; Security; Vehicular ad hoc networks

Indexed keywords

CANNING; COMMUNICATION; COMPUTER NETWORKS; FOOD PRESERVATION; METROPOLITAN AREA NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; REAL TIME SYSTEMS; ROADS AND STREETS; ROADSIDES; VEHICLES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 46749099079     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.12.005     Document Type: Article
Times cited : (230)

References (30)
  • 2
    • 46749134372 scopus 로고    scopus 로고
    • D. Chaum, Blind signature systems, in: Proceedings of Advances in Crypto'83, New York, USA, 1983, p. 153.
    • D. Chaum, Blind signature systems, in: Proceedings of Advances in Crypto'83, New York, USA, 1983, p. 153.
  • 3
    • 46749158359 scopus 로고    scopus 로고
    • An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
    • Das A.K. An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks. International Journal of Network Security 6 2 (2008) 134-144
    • (2008) International Journal of Network Security , vol.6 , Issue.2 , pp. 134-144
    • Das, A.K.1
  • 4
    • 46749113515 scopus 로고    scopus 로고
    • F. Dotzer, F. Kohlmayer, T. Kosch, M. Strassberger, Secure communication for intersection assistance, in: Proceedings of the 2nd International Workshop on Intelligent Transportation, Hamburg, Germany, 2005.
    • F. Dotzer, F. Kohlmayer, T. Kosch, M. Strassberger, Secure communication for intersection assistance, in: Proceedings of the 2nd International Workshop on Intelligent Transportation, Hamburg, Germany, 2005.
  • 5
    • 17144370965 scopus 로고    scopus 로고
    • S. Eichler, F. Dotzer, C. Schwingenschlogl, F.J.F. Caro, J. Eberspacher, Secure routing in a vehicular ad hoc network, in: IEEE 60th Vehicular Technology Conference, 2004, pp. 3339-3343.
    • S. Eichler, F. Dotzer, C. Schwingenschlogl, F.J.F. Caro, J. Eberspacher, Secure routing in a vehicular ad hoc network, in: IEEE 60th Vehicular Technology Conference, 2004, pp. 3339-3343.
  • 6
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31 4 (1985) 469-472
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 7
    • 46749139551 scopus 로고    scopus 로고
    • M. Gruteser, D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers, in: Proceedings of WMASH, San Diego, CA, 2003.
    • M. Gruteser, D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers, in: Proceedings of WMASH, San Diego, CA, 2003.
  • 8
    • 2542616812 scopus 로고    scopus 로고
    • The quest for personal control over mobile location privacy
    • He Q., Wu D., and Khosla P. The quest for personal control over mobile location privacy. IEEE Communications Magazine 42 5 (2004) 130-136
    • (2004) IEEE Communications Magazine , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 11
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • Lee C.-C., Li L.-H., and Hwang M.-S. A remote user authentication scheme using hash functions. ACM Operating Systems Review 36 4 (2002) 23-29
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.-C.1    Li, L.-H.2    Hwang, M.-S.3
  • 12
    • 34547877223 scopus 로고    scopus 로고
    • Secure communications for cluster-based ad hoc networks using node identities
    • Lee J.-S., and Chang C.-C. Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications 30 4 (2007) 1377-1396
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.4 , pp. 1377-1396
    • Lee, J.-S.1    Chang, C.-C.2
  • 13
    • 34247376546 scopus 로고    scopus 로고
    • T. Leinmüller, C. Maihöfer, E. Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, Los Angeles, USA, 2006, pp. 57-66.
    • T. Leinmüller, C. Maihöfer, E. Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, Los Angeles, USA, 2006, pp. 57-66.
  • 14
    • 33845597602 scopus 로고    scopus 로고
    • Position verification approaches for vehicular ad hoc networks
    • Leinmüller T., Schoch E., and Karql F. Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications 13 5 (2006) 16-21
    • (2006) IEEE Wireless Communications , vol.13 , Issue.5 , pp. 16-21
    • Leinmüller, T.1    Schoch, E.2    Karql, F.3
  • 15
    • 34547529829 scopus 로고    scopus 로고
    • T. Leinmüller, E. Schoch, C. Maihöfer, Security requirements and solution concepts in vehicular ad hoc networks, in: Proceedings of the 4th Annual Conference on Wireless on Demand Network Systems and Services, 2007, pp. 84-91.
    • T. Leinmüller, E. Schoch, C. Maihöfer, Security requirements and solution concepts in vehicular ad hoc networks, in: Proceedings of the 4th Annual Conference on Wireless on Demand Network Systems and Services, 2007, pp. 84-91.
  • 16
    • 0012132506 scopus 로고    scopus 로고
    • A non-interactive public-key distribution system
    • Maurer U.M., and Yacobi Y. A non-interactive public-key distribution system. Designs, Codes and Cryptography 9 3 (1996) 305-316
    • (1996) Designs, Codes and Cryptography , vol.9 , Issue.3 , pp. 305-316
    • Maurer, U.M.1    Yacobi, Y.2
  • 17
    • 33745950446 scopus 로고    scopus 로고
    • H. Moustafa, G. Bourdon, Y. Gourhant, Aaa in vehicular communication on highways with ad hoc networking support: a proposed architecture, in: Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks, 2005, pp. 79-80.
    • H. Moustafa, G. Bourdon, Y. Gourhant, Aaa in vehicular communication on highways with ad hoc networking support: a proposed architecture, in: Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks, 2005, pp. 79-80.
  • 18
    • 33750938846 scopus 로고    scopus 로고
    • K. Plossl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: The First International Conference on Availability, Reliability and Security, 2006.
    • K. Plossl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: The First International Conference on Availability, Reliability and Security, 2006.
  • 19
    • 46749118465 scopus 로고    scopus 로고
    • M. Raya, J.P. Hubaux, Security aspects of inter-vehicle communications, in: Proceedings of the 5th Swiss Transport Research Conference (STRC 2005), Ascona, Switzerland, 2005.
    • M. Raya, J.P. Hubaux, Security aspects of inter-vehicle communications, in: Proceedings of the 5th Swiss Transport Research Conference (STRC 2005), Ascona, Switzerland, 2005.
  • 20
    • 33745948310 scopus 로고    scopus 로고
    • M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, USA, 2005, pp. 11-21.
    • M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, USA, 2005, pp. 11-21.
  • 21
    • 46749090516 scopus 로고    scopus 로고
    • D. Jungels, M. Raya, P. Papadimitratos, I. Aad, J.P. Hubaux, Certificate revocation in vehicular ad hoc networks, Technical LCA-Report-2006-006, LCA, 2006.
    • D. Jungels, M. Raya, P. Papadimitratos, I. Aad, J.P. Hubaux, Certificate revocation in vehicular ad hoc networks, Technical LCA-Report-2006-006, LCA, 2006.
  • 22
    • 44549083472 scopus 로고    scopus 로고
    • Pulsing RoQ DDoS attacking and defense scheme in mobile ad hoc networks
    • Ren W. Pulsing RoQ DDoS attacking and defense scheme in mobile ad hoc networks. International Journal of Network Security 4 2 (2007) 227-234
    • (2007) International Journal of Network Security , vol.4 , Issue.2 , pp. 227-234
    • Ren, W.1
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21 2 (1978) 120-126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 25
    • 46749125818 scopus 로고    scopus 로고
    • Establishing authenticated channels and secure identifiers in ad-hoc networks
    • Sieka B., and Kshemkalyani A.D. Establishing authenticated channels and secure identifiers in ad-hoc networks. International Journal of Network Security 5 1 (2007) 51-61
    • (2007) International Journal of Network Security , vol.5 , Issue.1 , pp. 51-61
    • Sieka, B.1    Kshemkalyani, A.D.2
  • 27
    • 3042551124 scopus 로고    scopus 로고
    • Y.-M. Tseng, J.-K. Jan, ID-based cryptographic schemes using a non-interactive public-key distribution system, in: Proceedings of the 14th Annual Computer Security Applications Conference (IEEE ACSAC98), Phoenix, Arizona, December 1998, pp. 237-243.
    • Y.-M. Tseng, J.-K. Jan, ID-based cryptographic schemes using a non-interactive public-key distribution system, in: Proceedings of the 14th Annual Computer Security Applications Conference (IEEE ACSAC98), Phoenix, Arizona, December 1998, pp. 237-243.
  • 28
    • 34147173361 scopus 로고    scopus 로고
    • A survey on peer-to-peer key management for mobile ad hoc networks
    • van der Merwe J., Dawoud D., and Mcdonald S. A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys 39 1 (2007) 1-45
    • (2007) ACM Computing Surveys , vol.39 , Issue.1 , pp. 1-45
    • van der Merwe, J.1    Dawoud, D.2    Mcdonald, S.3
  • 29
    • 25844519837 scopus 로고    scopus 로고
    • A secure and efficient authentication protocol for anonymous channel in wireless communications
    • Yang C.-C., Tang Y.-L., Wang R.-C., and Yang H.-W. A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation 169 2 (2005) 1431-1439
    • (2005) Applied Mathematics and Computation , vol.169 , Issue.2 , pp. 1431-1439
    • Yang, C.-C.1    Tang, Y.-L.2    Wang, R.-C.3    Yang, H.-W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.