메뉴 건너뛰기




Volumn 6811 LNCS, Issue , 2011, Pages 191-205

Improved access control mechanism in vehicular ad hoc networks

Author keywords

Access control; Access policies; Bilinear maps; Decentralized attribute based encryption; Vehicular networks

Indexed keywords

ACCESS CONTROL MECHANISM; ACCESS POLICIES; ACCESS STRUCTURE; BILINEAR MAP; COMMUNICATION RANGE; CONTROL FRAMEWORK; CONTROL STRUCTURE; DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION; VEHICLE TYPES; VEHICULAR AD HOC NETWORKS; VEHICULAR NETWORKS;

EID: 79960367690     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22450-8_15     Document Type: Conference Paper
Times cited : (26)

References (35)
  • 1
    • 79960341369 scopus 로고    scopus 로고
    • http://crypto.stanford.edu/pbc/
  • 3
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • IEEE Computer Society, Los Alamitos
    • Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Computer Society, Los Alamitos (2007)
    • (2007) IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 5
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 515-534
    • Chase, M.1
  • 7
    • 85024290278 scopus 로고
    • Group signatures
    • Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
    • Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 8
    • 77956961737 scopus 로고    scopus 로고
    • Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption
    • Chen, N., Gerla, M., Hong, D.H.X.: Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. In: Ad Hoc Networking Workshop, Med-Hoc-Net, pp. 1-8 (2010)
    • (2010) Ad Hoc Networking Workshop, Med-Hoc-Net , pp. 1-8
    • Chen, N.1    Gerla, M.2    Hong, D.H.X.3
  • 9
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil Attack
    • Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. Springer, Heidelberg
    • Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 10
    • 73849107877 scopus 로고    scopus 로고
    • A taxonomy of pairing-friendly elliptic curves
    • Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. J. Cryptology 23(2), 224-280 (2010)
    • (2010) J. Cryptology , vol.23 , Issue.2 , pp. 224-280
    • Freeman, D.1    Scott, M.2    Teske, E.3
  • 11
    • 77953316394 scopus 로고    scopus 로고
    • On the age of pseudonyms in mobile ad hoc networks
    • IEEE, Los Alamitos
    • Freudiger, J., Manshaei, M.H., Boudec, J.-Y.L., Hubaux, J.-P.: On the age of pseudonyms in mobile ad hoc networks. In: INFOCOM, pp. 1577-1585. IEEE, Los Alamitos (2010)
    • (2010) INFOCOM , pp. 1577-1585
    • Freudiger, J.1    Manshaei, M.H.2    Boudec, J.-Y.L.3    Hubaux, J.-P.4
  • 12
    • 78649284515 scopus 로고    scopus 로고
    • Detecting misbehaviors in vanet with integrated root-cause analysis
    • Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in vanet with integrated root-cause analysis. Ad Hoc Networks 8(7), 778-790 (2010)
    • (2010) Ad Hoc Networks , vol.8 , Issue.7 , pp. 778-790
    • Ghosh, M.1    Varghese, A.2    Gupta, A.3    Kherani, A.A.4    Muthaiah, S.N.5
  • 15
    • 78149431890 scopus 로고    scopus 로고
    • Situation-aware trust architecture for vehicular networks
    • Huang, D., Hong, X., Gerla, M.: Situation-aware trust architecture for vehicular networks. Topics In Automotive Networking 48(11), 128-135 (2010)
    • (2010) Topics in Automotive Networking , vol.48 , Issue.11 , pp. 128-135
    • Huang, D.1    Hong, X.2    Gerla, M.3
  • 16
    • 67650409731 scopus 로고    scopus 로고
    • ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks
    • Huang, D., Verma, M.: ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks 7(8), 1526-1535 (2009)
    • (2009) Ad Hoc Networks , vol.7 , Issue.8 , pp. 1526-1535
    • Huang, D.1    Verma, M.2
  • 18
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing Attribute-Based Encryption
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg eprint.iacr.org/2010/351.pdf (last accessed February 22, 2011)
    • Lewko, A., Waters, B.: Decentralizing Attribute-Based Encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568-588. Springer, Heidelberg (2011), eprint.iacr.org/2010/351.pdf (last accessed February 22, 2011)
    • (2011) LNCS , vol.6632 , pp. 568-588
    • Lewko, A.1    Waters, B.2
  • 20
    • 77951463026 scopus 로고    scopus 로고
    • Defense against sybil attack in vehicular ad hoc network based on roadside unit support
    • Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: MILCOM, pp. 1-7 (2009)
    • (2009) MILCOM , pp. 1-7
    • Park, S.1    Aslam, B.2    Turgut, D.3    Zou, C.C.4
  • 21
    • 33845753044 scopus 로고    scopus 로고
    • Challenges in security vehicular networks
    • Parno, B., Perrig, A.: Challenges in security vehicular networks. In: HotNets-IV (2005)
    • (2005) HotNets-IV
    • Parno, B.1    Perrig, A.2
  • 23
    • 51349155690 scopus 로고    scopus 로고
    • On data-centric trust establishment in ephemeral ad hoc networks
    • IEEE, Los Alamitos
    • Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.-P.: On data-centric trust establishment in ephemeral ad hoc networks. In: INFOCOM, pp. 1238-1246. IEEE, Los Alamitos (2008)
    • (2008) INFOCOM , pp. 1238-1246
    • Raya, M.1    Papadimitratos, P.2    Gligor, V.D.3    Hubaux, J.-P.4
  • 24
    • 77952348271 scopus 로고    scopus 로고
    • On the tradeoff between trust and privacy in wireless ad hoc networks
    • Wetzel, S., Nita-Rotaru, C., Stajano, F. (eds.) ACM, New York
    • Raya, M., Shokri, R., Hubaux, J.-P.: On the tradeoff between trust and privacy in wireless ad hoc networks. In: Wetzel, S., Nita-Rotaru, C., Stajano, F. (eds.) WISEC, pp. 75-80. ACM, New York (2010)
    • (2010) WISEC , pp. 75-80
    • Raya, M.1    Shokri, R.2    Hubaux, J.-P.3
  • 26
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 29
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 31
    • 77956735087 scopus 로고    scopus 로고
    • An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
    • Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. on Vehicular Technology 59(7), 3589-3603 (2010)
    • (2010) IEEE Trans. on Vehicular Technology , vol.59 , Issue.7 , pp. 3589-3603
    • Sun, Y.1    Lu, R.2    Lin, X.3    Shen, X.4    Su, J.5
  • 32
    • 67249107220 scopus 로고    scopus 로고
    • Ecmv: Efficient certificate management scheme for vehicular networks
    • IEEE, Los Alamitos
    • Wasef, A., Jiang, Y., Shen, X.: Ecmv: Efficient certificate management scheme for vehicular networks. In: GLOBECOM, pp. 639-643. IEEE, Los Alamitos (2008)
    • (2008) GLOBECOM , pp. 639-643
    • Wasef, A.1    Jiang, Y.2    Shen, X.3
  • 34
    • 79952071204 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • Yu, S., Ren, K., Lou, W.: FDAC: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 22(4), 673-686 (2011)
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.4 , pp. 673-686
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 35
    • 50249168206 scopus 로고    scopus 로고
    • Privacy-preserving detection of sybil attacks in vehicular ad hoc networks
    • IEEE, Los Alamitos
    • Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: Privacy-preserving detection of sybil attacks in vehicular ad hoc networks. In: MobiQuitous, pp. 1-8. IEEE, Los Alamitos (2007)
    • (2007) MobiQuitous , pp. 1-8
    • Zhou, T.1    Choudhury, R.R.2    Ning, P.3    Chakrabarty, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.