메뉴 건너뛰기




Volumn 53, Issue 10, 2010, Pages 1996-2004

A framework of physical layer technique assisted authentication for vehicular communication networks

Author keywords

authentication; physical layer; public key infrastructure; vehicular ad hoc networks

Indexed keywords


EID: 77956430509     PISSN: 10092757     EISSN: 18622836     Source Type: Journal    
DOI: 10.1007/s11432-010-4065-y     Document Type: Article
Times cited : (4)

References (17)
  • 1
    • 77956430517 scopus 로고    scopus 로고
    • Task Group p. IEEE P802. 11p: Draft standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements, Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. USA IEEE Computer Society, 2009.
  • 2
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • Hubaux J P. The security and privacy of smart vehicles. IEEE Secur Priv, 2004, 2: 49-55.
    • (2004) IEEE Secur Priv , vol.2 , pp. 49-55
    • Hubaux, J.P.1
  • 3
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • Raya M, Hubaux J P. Securing vehicular ad hoc networks. J Comput Secur, 2007, 15: 39-68.
    • (2007) J Comput Secur , vol.15 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 4
    • 77956432047 scopus 로고    scopus 로고
    • Dotzer F. Privacy issues in vehicular ad hoc networks. In: Proceeding of ACM Workshop on Vehicular Ad Hoc Networks, Los Angeles, California, USA, 2006. 45-52.
  • 5
    • 33745950446 scopus 로고    scopus 로고
    • Moustafa H, Bourdon G, Gourhant Y. AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. In: Proceeding of ACM Workshop on Vehicular Ad hoc Networks, Cologne, Germany, 2005. 79-80.
  • 6
    • 51449098979 scopus 로고    scopus 로고
    • Zhang C, Lu R, Lin X, et al. An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceeding of IEEE Infocom, Phoenix, AZ, USA, 2008. 246-250.
  • 7
    • 58149123333 scopus 로고    scopus 로고
    • TSVC: Timed efficient and secure vehicular communications with privacy preserving
    • Lin X D, Sun X T, Wang X Y, et al. TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wirel Commun, 2009, 7: 4987-4998.
    • (2009) IEEE Trans Wirel Commun , vol.7 , pp. 4987-4998
    • Lin, X.D.1    Sun, X.T.2    Wang, X.Y.3
  • 8
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Hero A O. Secure space-time communication. IEEE Trans Inf Theory, 2003, 49: 3235-3249.
    • (2003) IEEE Trans Inf Theory , vol.49 , pp. 3235-3249
    • Hero, A.O.1
  • 9
    • 51849132358 scopus 로고    scopus 로고
    • Using antenna array redundancy and channel diversity for secure wireless transmissions
    • Li X H, Hwu J. Using antenna array redundancy and channel diversity for secure wireless transmissions. J Commun, 2007, 2: 24-32.
    • (2007) J Commun , vol.2 , pp. 24-32
    • Li, X.H.1    Hwu, J.2
  • 11
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • Xiao L, Greenstein L, Mandayam N, et al. Using the physical layer for wireless authentication in time-variant channels. IEEE Trans Wirel Commun, 2008, 7: 2571-2579.
    • (2008) IEEE Trans Wirel Commun , vol.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3
  • 12
    • 51249120889 scopus 로고    scopus 로고
    • Xiao L, Greenstein L, Mandayam N, et al. A physical-layer technique to enhance authentication for mobile terminals. In: Proceeding of IEEE International Conference on Communications, Beijing, China, 2008. 1520-1524.
  • 13
    • 70350350932 scopus 로고    scopus 로고
    • Ciphertext verification security of symmetric encryption schemes
    • Hu Z Y, Sun FC, Jiang J C. Ciphertext verification security of symmetric encryption schemes. Sci China Ser F-Inf Sci, 2009, 52: 1617-1631.
    • (2009) Sci China Ser F-Inf Sci , vol.52 , pp. 1617-1631
    • Hu, Z.Y.1    Sun, F.C.2    Jiang, J.C.3
  • 14
    • 70349235705 scopus 로고    scopus 로고
    • Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
    • Wang S B, Cao Z F, Cheng Z H, et al. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Sci China Ser F-Inf Sci, 2009, 52: 1358-1370.
    • (2009) Sci China Ser F-Inf Sci , vol.52 , pp. 1358-1370
    • Wang, S.B.1    Cao, Z.F.2    Cheng, Z.H.3
  • 15
    • 0032114467 scopus 로고    scopus 로고
    • OFDM channel estimation by singular value decomposition
    • Edfors O, Sandell M, van J J, et al. OFDM channel estimation by singular value decomposition. IEEE Trans Commun, 1998, 46: 931-939.
    • (1998) IEEE Trans Commun , vol.46 , pp. 931-939
    • Edfors, O.1    Sandell, M.2    Van, J.J.3
  • 16
    • 0031381109 scopus 로고    scopus 로고
    • Hoeher P, Kaiser S, Robertson P. Pilot-symbol-aided channel estimation in time and frequency. In: Proceeding of IEEE Global Telecommunication, Arizons, USA, 1997. 90-96.
  • 17
    • 0032118152 scopus 로고    scopus 로고
    • Robust channel estimation for OFDM systems with rapid dispersive fading channels
    • Li Y, Cimini Leonard J. Robust channel estimation for OFDM systems with rapid dispersive fading channels. IEEE Trans Commun, 1998, 46: 902-915.
    • (1998) IEEE Trans Commun , vol.46 , pp. 902-915
    • Li, Y.1    Cimini Leonard, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.