메뉴 건너뛰기




Volumn 7, Issue 8, 2009, Pages 1515-1525

Defense against misbehavior in anonymous vehicular ad hoc networks

Author keywords

Anonymity; Misbehavior; Privacy; Revocation; Vehicular ad hoc networks (VANETs)

Indexed keywords

ANONYMITY; MISBEHAVIOR; PRIVACY; REVOCATION; VEHICULAR AD HOC NETWORKS (VANETS);

EID: 67650383453     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2009.04.013     Document Type: Article
Times cited : (30)

References (33)
  • 3
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • special issue on Security of Ad Hoc and Sensor Networks
    • Raya M., and Hubaux J.-P. Securing vehicular ad hoc networks. Journal of Computer Security 15 1 (2007) 39-68 special issue on Security of Ad Hoc and Sensor Networks
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 4
    • 32144450457 scopus 로고    scopus 로고
    • J.Y. Choi, M. Jakobsson, S. Wetzel, Balancing auditability and privacy in vehicular networks, in: Proc. First ACM Int. Workshop on QoS and Security for Wireless and Mobile Networks, Q2SWinet'05, October 2005, pp. 79-87.
    • J.Y. Choi, M. Jakobsson, S. Wetzel, Balancing auditability and privacy in vehicular networks, in: Proc. First ACM Int. Workshop on QoS and Security for Wireless and Mobile Networks, Q2SWinet'05, October 2005, pp. 79-87.
  • 8
    • 47949086407 scopus 로고    scopus 로고
    • An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks
    • October
    • J. Sun, C. Zhang, Y. Fang, An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks, in: Proc. IEEE Military Communications Conf., October, 2007, pp. 1-7.
    • (2007) Proc. IEEE Military Communications Conf , pp. 1-7
    • Sun, J.1    Zhang, C.2    Fang, Y.3
  • 9
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: a secure and privacy-preserving protocol for vehicular communications
    • Lin X., Sun X., Ho P.-H., and Shen X. GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Vehicular Tech. 56 6 (2007) 3442-3456
    • (2007) IEEE Trans. Vehicular Tech. , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 10
    • 33645797144 scopus 로고    scopus 로고
    • Tradeoffs in certificate revocation schemes
    • Zheng P. Tradeoffs in certificate revocation schemes. SIGCOMM, Computing Communication Review 33 2 (2003) 103-112
    • (2003) SIGCOMM, Computing Communication Review , vol.33 , Issue.2 , pp. 103-112
    • Zheng, P.1
  • 13
    • 42649121690 scopus 로고    scopus 로고
    • Security in vehicular ad hoc networks
    • Lin X., et al. Security in vehicular ad hoc networks. IEEE Communications Magazine 46 4 (2008) 88-95
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 88-95
    • Lin, X.1
  • 16
    • 84946840347 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairings
    • Advances in Cryptology, Asiacrypt 2001, Springer-Verlag
    • D. Boneh, M. Franklin, Identity-based encryption from the weil pairings, in: Advances in Cryptology - Asiacrypt 2001, LNCS, vol. 2248, Springer-Verlag, 2001, pp. 514-532.
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Franklin, M.2
  • 17
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr C.-P. Efficient signature generation by smart cards. J. Cryptol 4 3 (1991) 161-174
    • (1991) J. Cryptol , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.-P.1
  • 18
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity-based signature schemes based on pairings
    • 2595, Springer-Verlag
    • F. Hess, Efficient identity-based signature schemes based on pairings, SAC 2002, LNCS, vol. 2595, Springer-Verlag, 2002, pp. 310-324.
    • (2002) LNCS , vol.SAC 2002 , pp. 310-324
    • Hess, F.1
  • 19
    • 67650388948 scopus 로고    scopus 로고
    • IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages, 2006. .
    • IEEE Std 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages, 2006. .
  • 21
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • CRYPTO, Springer-Verlag
    • J. Camenisch, A. Lysyanskaya, Dynamic accumulators and application to efficient revocation of anonymous credentials, in: CRYPTO 2002, LNCS, vol. 2442, Springer-Verlag, 2002, pp. 61-76.
    • (2002) LNCS , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 23
    • 85084161366 scopus 로고    scopus 로고
    • R. Dingledine, N. Mathewson, P. Syverson, Tor: the second-generation onion router, in: Proc. The 13th USENIX Security Symposium, August 2004, pp. 303-320.
    • R. Dingledine, N. Mathewson, P. Syverson, Tor: the second-generation onion router, in: Proc. The 13th USENIX Security Symposium, August 2004, pp. 303-320.
  • 25
    • 14944372809 scopus 로고    scopus 로고
    • P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Proc. First ACM Int. Workshop on Vehicular Ad Hoc Networks, VANET'04, October 2004, pp. 29-37.
    • P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Proc. First ACM Int. Workshop on Vehicular Ad Hoc Networks, VANET'04, October 2004, pp. 29-37.
  • 27
    • 33845597602 scopus 로고    scopus 로고
    • Position verification approaches for vehicular ad hoc networks
    • Leinmüller T., Schoch E., and Kargl F. Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications October (2006) 16-21
    • (2006) IEEE Wireless Communications , vol.October , pp. 16-21
    • Leinmüller, T.1    Schoch, E.2    Kargl, F.3
  • 28
    • 34247336902 scopus 로고    scopus 로고
    • M. Raya, A. Aziz, J.P. Hubaux, Efficient secure aggregation in VANETs, in Proc. Third ACM Int. Workshop on Vehicular Ad Hoc Networks, VANET'06, September 2006, pp. 67-75.
    • M. Raya, A. Aziz, J.P. Hubaux, Efficient secure aggregation in VANETs, in Proc. Third ACM Int. Workshop on Vehicular Ad Hoc Networks, VANET'06, September 2006, pp. 67-75.
  • 29
    • 51349100827 scopus 로고    scopus 로고
    • A security architecture achieving anonymity and traceability in wireless mesh networks
    • INFOCOM, April
    • J. Sun, C. Zhang, Y. Fang, A security architecture achieving anonymity and traceability in wireless mesh networks, in: IEEE Conf. on Computer Communications (INFOCOM), April 2008, pp. 1687-1695.
    • (2008) IEEE Conf. on Computer Communications , pp. 1687-1695
    • Sun, J.1    Zhang, C.2    Fang, Y.3
  • 30
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • CRYPTO, Springer-Verlag
    • P.S.L.M. Barreto, H.Y. Kim, B. Lynn, M. Scott, Efficient algorithms for pairing-based cryptosystems, in: CRYPTO 2002, LNCS, vol. 2442, Springer-Verlag, 2002, pp. 354-368.
    • (2002) LNCS , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 31
    • 27244454939 scopus 로고    scopus 로고
    • Efficient pairing computation on supersingular abelian varieties, Cryptology ePrint Archive
    • Report 2004/375, September, Available at
    • P.S.L.M. Barreto, S.D. Galbraith, C. ÓhÉigeartaigh, M. Scott, Efficient pairing computation on supersingular abelian varieties, Cryptology ePrint Archive, Report 2004/375, September 2005. Available at .
    • (2005)
    • Barreto, P.S.L.M.1    Galbraith, S.D.2    ÓhÉigeartaigh, C.3    Scott, M.4
  • 32
    • 33750710411 scopus 로고    scopus 로고
    • M. Scott, N. Costigan, W. Abdulwahab, Implementing cryptographic pairings on smartcards, in: L. Goubin, M. Matsui, CHES 2006, LNCS, 4249, Springer-Verlag, 2006.
    • M. Scott, N. Costigan, W. Abdulwahab, Implementing cryptographic pairings on smartcards, in: L. Goubin, M. Matsui, CHES 2006, LNCS, vol. 4249, Springer-Verlag, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.