메뉴 건너뛰기




Volumn , Issue , 2011, Pages 163-174

Efficient and secure threshold-based event validation for VANETs

Author keywords

Multi hop communication; Threshold based event validation; VANETs

Indexed keywords

ANALYSIS AND SIMULATION; EMERGENCY ALARM; MULTI HOP COMMUNICATION; NUMBER OF VEHICLES; THRESHOLD NUMBERS; THRESHOLD-BASED EVENT VALIDATION; VALIDATION PROTOCOLS; VANETS;

EID: 80051867757     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1998412.1998440     Document Type: Conference Paper
Times cited : (31)

References (37)
  • 1
    • 0033077324 scopus 로고    scopus 로고
    • The space complexity of approximating the frequency moments
    • Alon, N., Matias, Y., and Szegedy, M. The space complexity of approximating the frequency moments. Journal of Computer and System Sciences 58, 1 (1999), 137-147.
    • (1999) Journal of Computer and System Sciences , vol.58 , Issue.1 , pp. 137-147
    • Alon, N.1    Matias, Y.2    Szegedy, M.3
  • 2
    • 44649195976 scopus 로고    scopus 로고
    • Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective
    • Bai, F., Krishnan, H., Sadekar, V., Holland, G., and Elbatt, T. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE AutoNet (2006).
    • (2006) Proceedings of IEEE AutoNet
    • Bai, F.1    Krishnan, H.2    Sadekar, V.3    Holland, G.4    Elbatt, T.5
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B. H. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 7 (1970), 422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 5
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical in-network aggregation in sensor networks
    • Chan, H., Perrig, A., and Song, D. X. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of ACM CCS (2006).
    • (2006) Proceedings of ACM CCS
    • Chan, H.1    Perrig, A.2    Song, D.X.3
  • 6
    • 51349125793 scopus 로고    scopus 로고
    • Dynamic jamming mitigation for wireless broadcast networks
    • Chiang, J. T., and Hu, Y.-C. dynamic jamming mitigation for wireless broadcast networks. In Proceedings of IEEE INFOCOM (2008).
    • (2008) Proceedings of IEEE INFOCOM
    • Chiang, J.T.1    Hu, Y.-C.2
  • 9
    • 0020828424 scopus 로고
    • Probabilistic counting algorithms for data base applications
    • Flajolet, P., and Martin, G. N. Probabilistic counting algorithms for data base applications. Journal of Computer and System Sciences 31, 2 (1985), 182-209.
    • (1985) Journal of Computer and System Sciences , vol.31 , Issue.2 , pp. 182-209
    • Flajolet, P.1    Martin, G.N.2
  • 10
    • 84888171353 scopus 로고    scopus 로고
    • Relay attacks on passive keyless entry and start systems in modern cars
    • Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of NDSS (2011).
    • (2011) Proceedings of NDSS
    • Francillon, A.1    Danev, B.2    Capkun, S.3
  • 11
    • 56749178915 scopus 로고    scopus 로고
    • An efficient integrity-preserving scheme for hierarchical sensor aggregation
    • Frikken, K. B., and Joseph A. Dougherty, I. An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of ACM WiSec (2008).
    • (2008) Proceedings of ACM WiSec
    • Frikken, K.B.1    Joseph, A.2    Dougherty, I.3
  • 14
    • 84966477020 scopus 로고    scopus 로고
    • Trial-use standard for wireless access in vehicular environments-security services for applications and management messages
    • IEEE. 1609.2
    • IEEE. 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Standards, 2006.
    • (2006) IEEE Standards
  • 15
    • 59249094961 scopus 로고    scopus 로고
    • Optimal data rate selection for vehicle safety communications
    • Jiang, D., Chen, Q., and Delgrossi, L. Optimal data rate selection for vehicle safety communications. In Proceedings of ACM VANET (2008).
    • (2008) Proceedings of ACM VANET
    • Jiang, D.1    Chen, Q.2    Delgrossi, L.3
  • 19
    • 85084161724 scopus 로고    scopus 로고
    • Probabilistic counting of large digital signature collections
    • Kuhn, M. G. Probabilistic counting of large digital signature collections. In Proceedings of USENIX Security Symposium (2000).
    • (2000) Proceedings of USENIX Security Symposium
    • Kuhn, M.G.1
  • 28
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • Raya, M., and Hubaux, J.-P. Securing vehicular ad hoc networks. Journal of Computer Security 15 (2007), 39-68. (Pubitemid 46012642)
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 32
    • 0036377260 scopus 로고    scopus 로고
    • Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks
    • DOI 10.1109/71.980024
    • Stojmenovic, I., Seddigh, M., and Zunic, J. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Transactions on Paral lel and Distributed Systems 13, 1 (2002), 14-25. (Pubitemid 35037238)
    • (2002) IEEE Transactions on Parallel and Distributed Systems , vol.13 , Issue.1 , pp. 14-25
    • Stojmenovic, I.1    Seddigh, M.2    Zunic, J.3
  • 33
    • 70449565205 scopus 로고    scopus 로고
    • TACKing together efficient authentication, revocation, and privacy in vanets
    • Studer, A., Shi, E., Bai, F., and Perrig, A. TACKing together efficient authentication, revocation, and privacy in vanets. In Proceedings of IEEE SECON (2009).
    • (2009) Proceedings of IEEE SECON
    • Studer, A.1    Shi, E.2    Bai, F.3    Perrig, A.4
  • 36
    • 33748089962 scopus 로고    scopus 로고
    • SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
    • Yang, Y., Wang, X., Zhu, S., and Cao, G. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of ACM MobiHoc (2006).
    • (2006) Proceedings of ACM MobiHoc
    • Yang, Y.1    Wang, X.2    Zhu, S.3    Cao, G.4
  • 37
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity-based batch verification scheme for vehicular sensor networks
    • Zhang, C., Lu, R., Lin, X., Ho, P.-H., and Shen, X. An efficient identity-based batch verification scheme for vehicular sensor networks. In Proceedings of IEEE INFOCOM (2008).
    • (2008) Proceedings of IEEE INFOCOM
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.