메뉴 건너뛰기




Volumn 31, Issue 12, 2008, Pages 2883-2897

Providing VANET security through active position detection

Author keywords

GPS; Position; Radar; Security; Sybil attack; VANET

Indexed keywords

COMPUTER NETWORKS; METROPOLITAN AREA NETWORKS; NETWORK PROTOCOLS; VEHICLES;

EID: 46749099829     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.01.009     Document Type: Article
Times cited : (221)

References (36)
  • 1
    • 46749155835 scopus 로고    scopus 로고
    • Car 2 Car Communication Consortium, Available from: .
    • Car 2 Car Communication Consortium, Available from: .
  • 2
    • 46749107088 scopus 로고    scopus 로고
    • US Department of Transportation, National Highway Traffic Safety Administration, Vehicle safety communications consortium, Available from: .
    • US Department of Transportation, National Highway Traffic Safety Administration, Vehicle safety communications consortium, Available from: .
  • 3
    • 0034482344 scopus 로고    scopus 로고
    • A. Takahashi, N. Asanuma, Introduction of Honda ASV-2 (Advanced Safety Vehicle-Phase 2), in: Proceedings of the IEEE Intelligent Vehicles Symposium, Detroit, USA, 2000, pp. 694-701.
    • A. Takahashi, N. Asanuma, Introduction of Honda ASV-2 (Advanced Safety Vehicle-Phase 2), in: Proceedings of the IEEE Intelligent Vehicles Symposium, Detroit, USA, 2000, pp. 694-701.
  • 4
    • 34247373106 scopus 로고    scopus 로고
    • J.-S. Park, U. Lee, S.Y. Oh, M. Gerla, D.S. Lun, Emergency related video streaming in VANET using network coding, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 102-103.
    • J.-S. Park, U. Lee, S.Y. Oh, M. Gerla, D.S. Lun, Emergency related video streaming in VANET using network coding, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 102-103.
  • 5
    • 46749087425 scopus 로고    scopus 로고
    • B. Parno, A. Perrig, Challenges in securing vehicular networks, in: Proceedings of ACM HotNets, 2005.
    • B. Parno, A. Perrig, Challenges in securing vehicular networks, in: Proceedings of ACM HotNets, 2005.
  • 7
    • 84947273682 scopus 로고    scopus 로고
    • J. Douceur, The Sybil attack, in: Lecture Notes in Computer Science: Revised Papers from the First International Workshop on Peer-to-Peer Systems, vol. 2429, 2002, pp. 251-260.
    • J. Douceur, The Sybil attack, in: Lecture Notes in Computer Science: Revised Papers from the First International Workshop on Peer-to-Peer Systems, vol. 2429, 2002, pp. 251-260.
  • 8
    • 14944372809 scopus 로고    scopus 로고
    • P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Philadelphia, PA, 2004, pp. 29-37.
    • P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Philadelphia, PA, 2004, pp. 29-37.
  • 9
    • 46749156658 scopus 로고    scopus 로고
    • T. Leinmüller, E. Schoch, Greedy routing in highway scenarios: the impact of position faking nodes, in: Proceedings of the Workshop on Intelligent Transportation (WIT), 2006.
    • T. Leinmüller, E. Schoch, Greedy routing in highway scenarios: the impact of position faking nodes, in: Proceedings of the Workshop on Intelligent Transportation (WIT), 2006.
  • 10
    • 34247376546 scopus 로고    scopus 로고
    • T. Leinmüller, E. Schoch, F. Kargl, C. Maihöfer, Improved security in geographic ad hoc routing through autonomous position verification, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 57-66.
    • T. Leinmüller, E. Schoch, F. Kargl, C. Maihöfer, Improved security in geographic ad hoc routing through autonomous position verification, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 57-66.
  • 11
    • 33745948310 scopus 로고    scopus 로고
    • M. Raya, J.-P. Hubaux, The security of vehicular ad hoc networks, in: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, 2005, pp. 11-21.
    • M. Raya, J.-P. Hubaux, The security of vehicular ad hoc networks, in: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, 2005, pp. 11-21.
  • 12
    • 46749112220 scopus 로고    scopus 로고
    • T. Leinmüller, E. Schoch, F. Kargl, C. Maihöfer, Influence of falsified position data on geographic ad-hoc routing, in: Proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), 2005.
    • T. Leinmüller, E. Schoch, F. Kargl, C. Maihöfer, Influence of falsified position data on geographic ad-hoc routing, in: Proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), 2005.
  • 13
    • 15544382860 scopus 로고    scopus 로고
    • S.-T. Yuan, J. Sun, Ontology-based structured cosine similarity in speech document summarization, in: Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, Washington, DC, USA, 2004, pp. 508-513.
    • S.-T. Yuan, J. Sun, Ontology-based structured cosine similarity in speech document summarization, in: Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, Washington, DC, USA, 2004, pp. 508-513.
  • 15
    • 34247336902 scopus 로고    scopus 로고
    • M. Raya, A. Aziz, J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 67-75.
    • M. Raya, A. Aziz, J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 67-75.
  • 17
    • 25844439422 scopus 로고    scopus 로고
    • S. Capkun, J.-P. Hubaux, Secure positioning of wireless devices with application to sensor networks, in: Proceedings of IEEE INFOCOM, vol. 3, 2005, pp. 1917-1928.
    • S. Capkun, J.-P. Hubaux, Secure positioning of wireless devices with application to sensor networks, in: Proceedings of IEEE INFOCOM, vol. 3, 2005, pp. 1917-1928.
  • 18
    • 35048826237 scopus 로고    scopus 로고
    • M.G. Kuhn, An asymmetric security mechanism for navigation signals, in: Proceedings of the Workshop on Information Hiding, Toronto, Canada, 2004, pp. 239-252.
    • M.G. Kuhn, An asymmetric security mechanism for navigation signals, in: Proceedings of the Workshop on Information Hiding, Toronto, Canada, 2004, pp. 239-252.
  • 19
    • 46749098569 scopus 로고    scopus 로고
    • F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-layer privacy enhancement and non-repudiation in vehicular communication, in: Proceedings of the Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland, 2007.
    • F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-layer privacy enhancement and non-repudiation in vehicular communication, in: Proceedings of the Workshop on Mobile Ad-Hoc Networks (WMAN), Bern, Switzerland, 2007.
  • 20
    • 36949010773 scopus 로고    scopus 로고
    • J.Y. Choi, P. Golle, M. Jakobsson, Tamper-evident digital signatures: Protecting certification authorities against malware, in: Proceedings of the IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), 2006, pp. 37-44.
    • J.Y. Choi, P. Golle, M. Jakobsson, Tamper-evident digital signatures: Protecting certification authorities against malware, in: Proceedings of the IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), 2006, pp. 37-44.
  • 21
    • 33750938846 scopus 로고    scopus 로고
    • K. Plößl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: Proceedings of the International Conference on Availability, Reliability and Security (ARES), Washington, DC, USA, 2006, pp. 374-381.
    • K. Plößl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: Proceedings of the International Conference on Availability, Reliability and Security (ARES), Washington, DC, USA, 2006, pp. 374-381.
  • 22
    • 24344445903 scopus 로고    scopus 로고
    • F. Dai, J. Wu, Proactive route maintenance in wireless ad hoc networks, in: Proceedings of the IEEE International Conference on Communications (ICC), vol. 2, 2005, pp. 1236-1240.
    • F. Dai, J. Wu, Proactive route maintenance in wireless ad hoc networks, in: Proceedings of the IEEE International Conference on Communications (ICC), vol. 2, 2005, pp. 1236-1240.
  • 23
    • 1542317849 scopus 로고    scopus 로고
    • N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: Proceedings of the ACM Workshop on Wireless Security (WiSe), San Diego, CA, 2003, pp. 1-10.
    • N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: Proceedings of the ACM Workshop on Wireless Security (WiSe), San Diego, CA, 2003, pp. 1-10.
  • 24
    • 33745453101 scopus 로고    scopus 로고
    • T. Suen, A. Yasinsac, Ad hoc network security: Peer identification and authentication using signal properties, in: Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005, pp. 432-433.
    • T. Suen, A. Yasinsac, Ad hoc network security: Peer identification and authentication using signal properties, in: Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005, pp. 432-433.
  • 25
    • 34247328623 scopus 로고    scopus 로고
    • B. Xiao, B. Yu, C. Gao, Detection and localization of Sybil nodes in VANETs, in: Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, CA, USA, 2006, pp. 1-8.
    • B. Xiao, B. Yu, C. Gao, Detection and localization of Sybil nodes in VANETs, in: Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, CA, USA, 2006, pp. 1-8.
  • 26
    • 3042785862 scopus 로고    scopus 로고
    • J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis & defenses, in: Proceedings of International Symposium on Information Processing in Sensor Networks (IPSN), Berkeley, CA, 2004, pp. 259-268.
    • J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis & defenses, in: Proceedings of International Symposium on Information Processing in Sensor Networks (IPSN), Berkeley, CA, 2004, pp. 259-268.
  • 27
    • 46749117954 scopus 로고    scopus 로고
    • C. Piro, C. Shields, B.N. Levine, Detecting the Sybil attack in mobile ad hoc network, in: Proceedings of the International Conference on Security and Privacy in Communication Networks, 2006, pp. 1-11.
    • C. Piro, C. Shields, B.N. Levine, Detecting the Sybil attack in mobile ad hoc network, in: Proceedings of the International Conference on Security and Privacy in Communication Networks, 2006, pp. 1-11.
  • 28
    • 46749118992 scopus 로고    scopus 로고
    • Sensor Technologies and Systems, Forward looking vehicle radar system (FLVRS), Available from: , 2006.
    • Sensor Technologies and Systems, Forward looking vehicle radar system (FLVRS), Available from: , 2006.
  • 29
    • 46749115986 scopus 로고    scopus 로고
    • Toyota, Pre-crash safety, Available from: , 2007.
    • Toyota, Pre-crash safety, Available from: , 2007.
  • 30
    • 46749121374 scopus 로고    scopus 로고
    • US Department of Transportation, National Highway Traffic Safety Administration, Event data recorders, Federal Motor Vehicle Safety Standards 215 Part 49, Code of Federal Regulations Part 563, 2006.
    • US Department of Transportation, National Highway Traffic Safety Administration, Event data recorders, Federal Motor Vehicle Safety Standards 215 Part 49, Code of Federal Regulations Part 563, 2006.
  • 31
    • 46749110379 scopus 로고    scopus 로고
    • US Department of Transportation, National Highway Traffic Safety Administration, Event Data Recorders Q&As, Available from: , August, 2006.
    • US Department of Transportation, National Highway Traffic Safety Administration, Event Data Recorders Q&As, Available from: , August, 2006.
  • 33
    • 0031381841 scopus 로고    scopus 로고
    • Z.J. Haas, A new routing protocol for the reconfigurable wireless networks, in: Proceedings of the IEEE Conference on Universal Personal Communications, vol. 2, 1997, pp. 562-566.
    • Z.J. Haas, A new routing protocol for the reconfigurable wireless networks, in: Proceedings of the IEEE Conference on Universal Personal Communications, vol. 2, 1997, pp. 562-566.
  • 34
    • 46749113436 scopus 로고    scopus 로고
    • M. Käsemann, H. Füler, H. Hartenstein,, M. Mauve, A reactive location service for mobile ad hoc networks, Tech. Rep. TR-02-014, Department of Computer Science, University of Mannheim, 2002.
    • M. Käsemann, H. Füler, H. Hartenstein,, M. Mauve, A reactive location service for mobile ad hoc networks, Tech. Rep. TR-02-014, Department of Computer Science, University of Mannheim, 2002.
  • 35
    • 34247368518 scopus 로고    scopus 로고
    • F. Picconi, N. Ravi, M. Gruteser, L. Iftode, Probabilistic validation of aggregated data in vehicular ad-hoc networks, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 76-85.
    • F. Picconi, N. Ravi, M. Gruteser, L. Iftode, Probabilistic validation of aggregated data in vehicular ad-hoc networks, in: Proceedings of the ACM Workshop on Vehicular Ad Hoc Networks (VANET), Los Angeles, CA, 2006, pp. 76-85.
  • 36
    • 0033714823 scopus 로고    scopus 로고
    • L. Tian, Y. Zhou, L. Tang, Improving GPS positioning precision by using optical encoders, in: Proceedings of Intelligent Transportation Systems, Dearborn, MI, 2000, pp. 293-298.
    • L. Tian, Y. Zhou, L. Tang, Improving GPS positioning precision by using optical encoders, in: Proceedings of Intelligent Transportation Systems, Dearborn, MI, 2000, pp. 293-298.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.