메뉴 건너뛰기




Volumn , Issue , 2010, Pages 166-173

Intrusion detection in VANETs through verification of vehicle movement data

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION APPROACHES; INTRUSION DETECTION METHOD; MOBILITY MODEL; MOVING VEHICLES; VEHICLE MOVEMENTS; VEHICULAR AD HOC NETWORKS;

EID: 79951781925     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VNC.2010.5698232     Document Type: Conference Paper
Times cited : (70)

References (19)
  • 1
    • 67650033286 scopus 로고    scopus 로고
    • "On the road" - Reflections on the security of vehicular communication systems
    • ICVES 2008. IEEE International Conference on sept.
    • P. Papadimitratos, ""On the Road" - Reflections on the security of vehicular communication systems," Vehicular Electronics and Safety, 2008. ICVES 2008. IEEE International Conference on, pp. 359-363, sept. 2008.
    • (2008) Vehicular Electronics and Safety, 2008 , pp. 359-363
    • Papadimitratos, P.1
  • 3
    • 74549123859 scopus 로고    scopus 로고
    • Location security in geographic ad hoc routing for VANETs
    • ICUMT '09. International Conference on, 12-14
    • Z. Ren, W. Li, Q. Yang, S. Wu, and L. Chen, "Location Security in Geographic Ad hoc Routing for VANETs," in Ultra Modern Telecommunications Workshops, 2009. ICUMT '09. International Conference on, 12-14 2009, pp. 1-6.
    • (2009) Ultra Modern Telecommunications Workshops, 2009 , pp. 1-6
    • Ren, Z.1    Li, W.2    Yang, Q.3    Wu, S.4    Chen, L.5
  • 5
    • 62949146441 scopus 로고    scopus 로고
    • GPS based vehicular collision warning system using IEEE 802.15.4 MAC/PHY standard
    • ITST 2008. 8th International Conference on, 24-24
    • D. Anurag, S. Ghosh, and S. Bandyopadhyay, "GPS Based Vehicular Collision Warning System using IEEE 802.15.4 MAC/PHY Standard," in ITS Telecommunications, 2008. ITST 2008. 8th International Conference on, 24-24 2008, pp. 154-159.
    • (2008) ITS Telecommunications, 2008 , pp. 154-159
    • Anurag, D.1    Ghosh, S.2    Bandyopadhyay, S.3
  • 8
    • 33845597602 scopus 로고    scopus 로고
    • Position verification approaches for vehicular ad hoc networks
    • DOI 10.1109/WC-M.2006.250353
    • T. Leinmüller, E. Schoch, and F. Kargl, "Position Verficiation Approaches for Vehicular Ad hoc Networks," Wireless Communications, IEEE, vol. 13, no. 5, pp. 16-21, october 2006. (Pubitemid 44934143)
    • (2006) IEEE Wireless Communications , vol.13 , Issue.5 , pp. 16-21
    • Leinmuller, T.1    Schoch, E.2    Kargl, F.3
  • 10
    • 46749099829 scopus 로고    scopus 로고
    • Providing VANET security through active position detection
    • mobility Protocols for ITS/VANET
    • "Providing VANET Security Through Active Position Detection," Computer Communications, vol. 31, no. 12, pp. 2883 - 2897, 2008, mobility Protocols for ITS/VANET.
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2883-2897
  • 13
    • 68949105568 scopus 로고    scopus 로고
    • Probabilistic localization and tracking of Malicious insiders using hyperbolic position bounding in vehicular networks
    • C. Laurendeau and M. Barbeau, "Probabilistic Localization and Tracking of Malicious Insiders using Hyperbolic Position Bounding in Vehicular Networks," EURASIP J. Wirel. Commun. Netw., vol. 2009, pp. 1-13, 2009.
    • (2009) EURASIP J. Wirel. Commun. Netw. , vol.2009 , pp. 1-13
    • Laurendeau, C.1    Barbeau, M.2
  • 15
    • 34247376546 scopus 로고    scopus 로고
    • Improved security in geographic ad hoc routing through autonomous position verification
    • DOI 10.1145/1161064.1161075, VANET - Proceedings of the Third ACM International Workshop on Vehicular Ad Hoc Networks
    • T. Leinmüller, C. Maihöfer, E. Schoch, and F. Kargl, "Improved Security in Geographic Ad hoc Routing through Autonomous Position Verification," in VANET '06: Proceedings of the 3rd international workshop on Vehicular ad hoc networks. New York, NY, USA: ACM, 2006, pp. 57-66. (Pubitemid 46634330)
    • (2006) VANET - Proceedings of the Third ACM International Workshop on Vehicular Ad Hoc Networks , vol.2006 , pp. 57-66
    • Leinmuller, T.1    Maihofer, C.2    Schoch, E.3    Kargl, F.4
  • 16
    • 72949119922 scopus 로고    scopus 로고
    • Extending Bayesian trust models regarding context-dependence and user friendly representation
    • New York, NY, USA: ACM
    • S. Ries, "Extending bayesian trust models regarding context-dependence and user friendly representation," in SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing. New York, NY, USA: ACM, 2009, pp. 1294-1301.
    • (2009) SAC '09: Proceedings of the 2009 ACM Symposium on Applied Computing , pp. 1294-1301
    • Ries, S.1
  • 17
    • 35248816893 scopus 로고    scopus 로고
    • Certain trust: A trust model for users and agents
    • DOI 10.1145/1244002.1244342, Proceedings of the 2007 ACM Symposium on Applied Computing
    • Ries, "Certain Trust: A Trust Model for Users and Agents," in SAC '07: Proceedings of the 2007 ACM symposium on Applied computing. New York, NY, USA: ACM, 2007, pp. 1599-1604. (Pubitemid 47568532)
    • (2007) Proceedings of the ACM Symposium on Applied Computing , pp. 1599-1604
    • Ries, S.1
  • 18
    • 44049103260 scopus 로고    scopus 로고
    • Analyzing the robustness of certain trust
    • Trust Management and Security, June 18-20 Trondheim, Norway, Y. Karabulut, J. Mitchell, P. Herrmann, and C. D. Jenson, Eds. Springer Boston, 2008
    • S. Ries and A. Heinemann, "Analyzing the Robustness of Certain Trust," in Trust Management II, Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway, Y. Karabulut, J. Mitchell, P. Herrmann, and C. D. Jenson, Eds., vol. 263. Springer Boston, 2008, pp. 51-67.
    • (2008) Trust Management II, Proceedings of IFIPTM 2008: Joint ITrust and PST Conferences on Privacy , vol.263 , pp. 51-67
    • Ries, S.1    Heinemann, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.