메뉴 건너뛰기




Volumn , Issue , 2011, Pages 193-204

Flooding-resilient broadcast authentication for VANETs

Author keywords

broadcast authentication; flooding resilience; signatures; VANETs

Indexed keywords

BROADCAST AUTHENTICATION; BROADCAST COMMUNICATION; COMPUTATIONAL RESOURCES; DEPLOYMENT PLANS; DYNAMIC TOPOLOGIES; ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM; EXPERIMENTAL EVALUATION; MULTIHOP; NON-REPUDIATION; NS-2 SIMULATIONS; NUMBER OF VEHICLES; REAL TRAFFIC; SECURITY PRIMITIVES; SIGNATURE VERIFICATION; SIGNATURES; SINGLE-HOP; VANETS; VEHICULAR AD HOC NETWORKS;

EID: 80053607874     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2030613.2030635     Document Type: Conference Paper
Times cited : (87)

References (38)
  • 2
    • 44649195976 scopus 로고    scopus 로고
    • Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective
    • BAI, F., KRISHNAN, H., SADEKAR, V., HOLLAND, G., AND ELBATT, T. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE AutoNet (2006).
    • Proceedings of IEEE AutoNet (2006)
    • Bai, F.1    Krishnan, H.2    Sadekar, V.3    Holland, G.4    Elbatt, T.5
  • 3
    • 78649279855 scopus 로고    scopus 로고
    • Toward understanding characteristics of dedicated short range communications from a perspective of vehicular network engineers
    • BAI, F., STANCIL, D. D., AND KRISHNAN, H. Toward understanding characteristics of dedicated short range communications from a perspective of vehicular network engineers. In Proceedings of ACM MobiCom (2010).
    • Proceedings of ACM MobiCom (2010)
    • Bai, F.1    Stancil, D.D.2    Krishnan, H.3
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • BLOOM, B. H. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7 (1970), 422-426.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 7
    • 37749010823 scopus 로고    scopus 로고
    • Cross-layer jamming detection and mitigation in wireless broadcast networks
    • CHIANG, J. T., AND HU, Y.-C. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proceedings of ACM MobiCom (2007).
    • Proceedings of ACM MobiCom (2007)
    • Chiang, J.T.1    Hu, Y.-C.2
  • 14
    • 84938015047 scopus 로고
    • A method for the construction of minimum-redundancy codes
    • September
    • HUFFMAN, D. A. A method for the construction of minimum-redundancy codes. Institute of Radio Engineers 40, 9 (September 1952), 1098-1101.
    • (1952) Institute of Radio Engineers , vol.40 , Issue.9 , pp. 1098-1101
    • Huffman, D.A.1
  • 16
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
    • JUNG, J., KRISHNAMURTHY, B., AND RABINOVICH, M. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In Proceedings of ACM WWW (2002).
    • Proceedings of ACM WWW (2002)
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 17
  • 23
    • 77953306472 scopus 로고    scopus 로고
    • Randomized differential DSSS: Jamming-resistant wireless broadcast communication
    • LIU, Y., NING, P., DAI, H., AND LIU, A. Randomized differential DSSS: jamming-resistant wireless broadcast communication. In Proceedings of IEEE INFOCOM (2010).
    • Proceedings of IEEE INFOCOM (2010)
    • Liu, Y.1    Ning, P.2    Dai, H.3    Liu, A.4
  • 25
    • 85027170386 scopus 로고
    • Reliable broadband communication using a burst erasure correcting code
    • MCAULEY, A. J. Reliable broadband communication using a burst erasure correcting code. SIGCOMM Comput. Commun. Rev. 20, 4 (1990), 297-306.
    • (1990) SIGCOMM Comput. Commun. Rev. , vol.20 , Issue.4 , pp. 297-306
    • Mcauley, A.J.1
  • 27
    • 0002586876 scopus 로고    scopus 로고
    • A digital signature based on a conventional encryption function
    • MERKLE, R. C. A digital signature based on a conventional encryption function. In Proceedings of CRYPTO (1987).
    • Proceedings of CRYPTO (1987)
    • Merkle, R.C.1
  • 28
    • 26844519980 scopus 로고    scopus 로고
    • Efficient certificate revocation system implementation: Huffman merkle hash tree (HuffMHT)
    • MUÑOZ, J. L., FORNÉ, J., ESPARZA, O., AND REY, M. Efficient certificate revocation system implementation: Huffman merkle hash tree (HuffMHT). Trust, Privacy and Security in Digital Business 3592 (2005), 119-127.
    • (2005) Trust, Privacy and Security in Digital Business , vol.3592 , pp. 119-127
    • Muñoz, J.L.1    Forné, J.2    Esparza, O.3    Rey, M.4
  • 30
    • 0035752112 scopus 로고    scopus 로고
    • The BiBa one-time signature and broadcast authentication protocol
    • PERRIG, A. The BiBa one-time signature and broadcast authentication protocol. In Proceedings of ACM CCS (2001).
    • Proceedings of ACM CCS (2001)
    • Perrig, A.1
  • 32
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • RAYA, M., AND HUBAUX, J.-P. Securing vehicular ad hoc networks. JCS-SASN (2007).
    • (2007) JCS-SASN
    • Raya, M.1    Hubaux, J.-P.2
  • 33
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • REED, I., AND SOLOMON, G. Polynomial codes over certain finite fields. J. SIAM 8, 2 (1960), 300-304.
    • (1960) J. SIAM , vol.8 , Issue.2 , pp. 300-304
    • Reed, I.1    Solomon, G.2
  • 38
    • 37849012001 scopus 로고    scopus 로고
    • Containing denial-of-service attacks in broadcast authentication in sensor networks
    • WANG, R., DU, W., AND NING, P. Containing denial-of-service attacks in broadcast authentication in sensor networks. In Proceedings of ACM MobiHoc (2007).
    • Proceedings of ACM MobiHoc (2007)
    • Wang, R.1    Du, W.2    Ning, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.