메뉴 건너뛰기




Volumn 59, Issue 2, 2010, Pages 559-573

Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications

Author keywords

Group signature; Information security; Network security; Protocol design; Vehicular communication

Indexed keywords

APRIORI; DISTINCTIVE FEATURES; GROUP SIGNATURES; IN-VEHICLE; MESSAGE PROCESSING; POSTERIORI; PRIVACY PRESERVING; SIMULATION RESULT; SYSTEM DESIGN; TRAFFIC CONDITIONS; TRAFFIC SAFETY; VEHICULAR AD HOC NETWORKS; VEHICULAR COMMUNICATIONS;

EID: 77249157951     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2009.2034669     Document Type: Article
Times cited : (211)

References (41)
  • 1
    • 70349126577 scopus 로고    scopus 로고
    • Car talk
    • Oct.
    • J. Blau, "Car talk," IEEE Spectr., vol.45, no.10, p. 16, Oct. 2008.
    • (2008) IEEE Spectr. , vol.45 , Issue.10 , pp. 16
    • Blau, J.1
  • 3
    • 33746097415 scopus 로고    scopus 로고
    • Privacy issues in vehicular ad hoc networks
    • Proc. PET
    • F. Dötzer, "Privacy issues in vehicular ad hoc networks," in Proc. PET, vol.3856, Lecture Notes in Computer Science, 2005, pp. 197-209.
    • (2005) Lecture Notes in Computer Science , vol.3856 , pp. 197-209
    • Dötzer, F.1
  • 4
    • 48649088209 scopus 로고    scopus 로고
    • A group signature based secure and privacy-preserving vehicular communication framework
    • J. Guo, J. P. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework," in Proc. Mobile Netw. Veh. Environ., 2007, pp. 103-108.
    • (2007) Proc. Mobile Netw. Veh. Environ. , pp. 103-108
    • Guo, J.1    Baugh, J.P.2    Wang, S.3
  • 5
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy preserving protocol for vehicular communications
    • Nov.
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy preserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol.56, no.6, pp. 3442-3456, Nov. 2007.
    • (2007) IEEE Trans. Veh. Technol. , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 6
    • 33845564340 scopus 로고    scopus 로고
    • Securing vehicular communications
    • Oct.
    • M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing vehicular communications," Wireless Commun., vol.13, no.5, pp. 8-15, Oct. 2006.
    • (2006) Wireless Commun. , vol.13 , Issue.5 , pp. 8-15
    • Raya, M.1    Papadimitratos, P.2    Hubaux, J.-P.3
  • 7
    • 44949112970 scopus 로고    scopus 로고
    • Cross-layer privacy enhancement and non-repudiation in vehicular communication
    • Bern, Switzerland, Mar.
    • F. Armknecht, A. Festag, D. Westhoff, and K. Zeng, "Cross-layer privacy enhancement and non-repudiation in vehicular communication," in Proc. 4th WMAN, Bern, Switzerland, Mar. 2007.
    • (2007) Proc. 4th WMAN
    • Armknecht, F.1    Festag, A.2    Westhoff, D.3    Zeng, K.4
  • 11
    • 34247336902 scopus 로고    scopus 로고
    • Efficient secure aggregation in VANETs
    • M. Raya, A. Aziz, and J.-P. Hubaux, "Efficient secure aggregation in VANETs," in Proc. 3rd VANET, 2006, pp. 67-75.
    • (2006) Proc. 3rd VANET , pp. 67-75
    • Raya, M.1    Aziz, A.2    Hubaux, J.-P.3
  • 12
    • 34247368518 scopus 로고    scopus 로고
    • Probabilistic validation of aggregated data in vehicular ad-hoc networks
    • F. Picconi, N. Ravi, M. Gruteser, and L. Iftode, "Probabilistic validation of aggregated data in vehicular ad-hoc networks," in Proc. 3rd VANET, 2006, pp. 76-85.
    • (2006) Proc. 3rd VANET , pp. 76-85
    • Picconi, F.1    Ravi, N.2    Gruteser, M.3    Iftode, L.4
  • 17
    • 33750956035 scopus 로고    scopus 로고
    • An application of information theory to intrusion detection
    • E. Eiland and L. Liebrock, "An application of information theory to intrusion detection," in Proc. IWIA, 2006, pp. 119-134.
    • (2006) Proc. IWIA , pp. 119-134
    • Eiland, E.1    Liebrock, L.2
  • 19
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection," in Proc. IEEE Symp. Security Privacy, 2001, pp. 130-143.
    • (2001) Proc. IEEE Symp. Security Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 23
    • 66149136922 scopus 로고    scopus 로고
    • Trustworthy privacypreserving car-generated announcements in vehicular ad hoc networks
    • May
    • V. Daza, J. Domingo-Ferrer, F. Sebe, and A. Viejo, "Trustworthy privacypreserving car-generated announcements in vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol.58, no.4, pp. 1876-1886, May 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.4 , pp. 1876-1886
    • Daza, V.1    Domingo-Ferrer, J.2    Sebe, F.3    Viejo, A.4
  • 25
    • 70349115255 scopus 로고    scopus 로고
    • Safety and privacy in vehicular communications
    • Proc. Privacy Location-Based Appl., Berlin, Germany
    • J. Domingo-Ferrer and Q.Wu, "Safety and privacy in vehicular communications," in Proc. Privacy Location-Based Appl., vol.5599, Lecture Notes in Computer Science, Berlin, Germany, 2009, pp. 173-189.
    • (2009) Lecture Notes in Computer Science , vol.5599 , pp. 173-189
    • Domingo-Ferrer, J.1    Wu, Q.2
  • 26
    • 67549090302 scopus 로고    scopus 로고
    • Proving reliability of anonymous information in VANETs
    • Jul.
    • G. Kounga, T. Walter, and S. Lachmund, "Proving reliability of anonymous information in VANETs," IEEE Trans. Veh. Technol., vol.58, no.6, pp. 2977-2989, Jul. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.6 , pp. 2977-2989
    • Kounga, G.1    Walter, T.2    Lachmund, S.3
  • 27
    • 85024290278 scopus 로고
    • Group signatures
    • Proc. Eurocrypt, New York
    • D. Chaum and E. van Heyst, "Group signatures," in Proc. Eurocrypt, vol.547, Lecture Notes in Computer Science, New York, 1991, pp. 257-265.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 28
    • 0008352491 scopus 로고    scopus 로고
    • A linkable group signature and its application to secret voting
    • T. Nakanishi, T. Fujiwara, and H. Watanabe, "A linkable group signature and its application to secret voting," Trans. Inf. Process. Soc. Jpn., vol.40, no.7, pp. 3085-3096, 1999.
    • (1999) Trans. Inf. Process. Soc. Jpn. , vol.40 , Issue.7 , pp. 3085-3096
    • Nakanishi, T.1    Fujiwara, T.2    Watanabe, H.3
  • 31
    • 85029541173 scopus 로고
    • Towards practical public key systems secure against chosen ciphertext attacks
    • Proc. Crypto, New York
    • I. B. Damgård, "Towards practical public key systems secure against chosen ciphertext attacks," in Proc. Crypto, vol.576, Lecture Notes in Computer Science, New York, 1991, pp. 445-456.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 445-456
    • Damgård, I.B.1
  • 32
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Proc. Crypto
    • D. Chaum and T. P. Pedersen, "Wallet databases with observers," in Proc. Crypto, vol.740, Lecture Notes in Computer Science, 1992, pp. 89-105.
    • (1992) Lecture Notes in Computer Science , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 34
    • 33746042155 scopus 로고    scopus 로고
    • Compact group signatures without random oracles
    • Proc. Eurocrypt
    • X. Boyen and B. Waters, "Compact group signatures without random oracles," in Proc. Eurocrypt, vol.4004, Lecture Notes in Computer Science, 2006, pp. 427-444.
    • (2006) Lecture Notes in Computer Science , vol.4004 , pp. 427-444
    • Boyen, X.1    Waters, B.2
  • 37
    • 67349168446 scopus 로고    scopus 로고
    • BAT: A robust signature scheme for vehicular communications using Binary Authentication Tree
    • Apr.
    • Y. Jiang, M. Shi, X. Shen, and C. Lin, "BAT: A robust signature scheme for vehicular communications using Binary Authentication Tree," IEEE Trans. Wireless Commun., vol.8, no.4, pp. 1974-1983, Apr. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.3    Lin, C.4
  • 39
    • 62949149982 scopus 로고    scopus 로고
    • [Online]. Available
    • The Network Simulator-ns. [Online]. Available: http://nsnam.isi.edu/ nsnam/index.php/Main Page
    • The Network Simulator-ns
  • 40
    • 14944349351 scopus 로고    scopus 로고
    • Modeling mobility for vehicular ad hoc networks
    • A. K. Saha and D. B. Johnson, "Modeling mobility for vehicular ad hoc networks," in Proc. 1st VANET, 2004, pp. 91-92.
    • (2004) Proc. 1st VANET , pp. 91-92
    • Saha, A.K.1    Johnson, D.B.2
  • 41
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Dec.
    • D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," J. Cryptol., vol.13, no.3, pp. 361-396, Dec. 2000.
    • (2000) J. Cryptol. , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.