메뉴 건너뛰기




Volumn 29, Issue 1, 2012, Pages 80-89

Toward secure vehicular ad-hoc networks: A survey

Author keywords

Certificate based cryptosystem; Conditional privacy; Group signature; ID based signature; Location integrity confidentiality availability; Network security; Survey; Vehicular Ad hoc networks

Indexed keywords

GROUP SIGNATURES; ID BASED SIGNATURE; SECURITY ISSUES; SECURITY PROBLEMS; SECURITY REQUIREMENTS; WIRELESS COMMUNICATION SYSTEM;

EID: 84858185508     PISSN: 02564602     EISSN: 09745971     Source Type: Journal    
DOI: 10.4103/0256-4602.93141     Document Type: Review
Times cited : (44)

References (48)
  • 1
    • 79955828952 scopus 로고    scopus 로고
    • Information dissemination and information assurance in vehicular networks: A survey
    • Feb., Los Angeles
    • P. Krishnamurthy, "Information dissemination and information assurance in vehicular networks: A survey," in A Conference Poster in iConferenc 08, Los Angeles, Feb. 2008.
    • (2008) A Conference Poster in iConferenc 08
    • Krishnamurthy, P.1
  • 3
    • 33845564340 scopus 로고    scopus 로고
    • Securing vehicular communications
    • DOI 10.1109/WC-M.2006.250352
    • M. Raya, P. Papadimitratos, and J.P. Hubaux, "Securing vehicular communications," IEEE Wireless Communications, Vol. 13, pp. 8-15, Oct. 2006. (Pubitemid 44934142)
    • (2006) IEEE Wireless Communications , vol.13 , Issue.5 , pp. 8-15
    • Raya, M.1    Papadimitratos, P.2    Hubaux, J.-P.3
  • 4
    • 46749099829 scopus 로고    scopus 로고
    • Providing VANET security through active position detection
    • July
    • G. Yan, S. Olariu, and M.C. Weigle, "Providing VANET security through active position detection," Computer Communications, Vol. 31, pp. 2883-97, July. 2008.
    • (2008) Computer Communications , vol.31 , pp. 2883-2897
    • Yan, G.1    Olariu, S.2    Weigle, M.C.3
  • 5
    • 84858243388 scopus 로고    scopus 로고
    • Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks
    • Jan
    • L. Christine, and B. Michel, "Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks," EURASIP Journal on Wirless. Communications, Vol. 2009, pp. 1-13, Jan. 2009.
    • (2009) EURASIP Journal on Wirless. Communications , vol.2009 , pp. 1-13
    • Christine, L.1    Michel, B.2
  • 6
    • 70449565205 scopus 로고    scopus 로고
    • TACKing together efficient authentication, revocation, and privacy in VANETs
    • Mesh and Ad Hoc Communications and Networks, SECON '09, Rome, June
    • A. Studer, E. Shi, B. Fan, and A. Perrig, "TACKing together efficient authentication, revocation, and privacy in VANETs," in 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '09, Rome, pp. 1-9, June. 2009.
    • (2009) 6th Annual IEEE Communications Society Conference on Sensor , pp. 1-9
    • Studer, A.1    Shi, E.2    Fan, B.3    Perrig, A.4
  • 11
    • 62949127465 scopus 로고    scopus 로고
    • 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages
    • 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages," IEEE Standards, 2006.
    • (2006) IEEE Standards
  • 16
    • 33745453101 scopus 로고    scopus 로고
    • Ad hoc network security: Peer identification and authentication using signal properties
    • DOI 10.1109/IAW.2005.1495987, 1495987, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
    • T. Suen, and A. Yasinsac, "Ad hoc network security: Peer identification and authentication using signal properties," In Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, West Point, New York, pp. 432-3, Jun. 2005. (Pubitemid 43948757)
    • (2005) Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 , vol.2005 , pp. 432-433
    • Suen, T.1    Yasinsac, A.2
  • 18
    • 77956538118 scopus 로고    scopus 로고
    • Cross-layer location verification enhancement in vehicular networks
    • San Diego, CA., June
    • Y. Gongjun, S. Olariu, and M.C. Weigle, "Cross-layer location verification enhancement in vehicular networks," In IEEE Intelligent Vehicles Symposium (IV), San Diego, CA., pp. 95-100, June. 2010.
    • (2010) IEEE Intelligent Vehicles Symposium (IV) , pp. 95-100
    • Gongjun, Y.1    Olariu, S.2    Weigle, M.C.3
  • 21
    • 77951613883 scopus 로고    scopus 로고
    • MAAC: Message authentication acceleration protocol for vehicular Ad Hoc Networks
    • Honolulu, Hawaii, Nov
    • A. Wasef, and S. Xuemin, "MAAC: Message authentication acceleration protocol for vehicular Ad Hoc Networks," In IEEE Global Telecommunications Conference, GLOBECOM, Honolulu, Hawaii, pp. 1-6, Nov. 2009.
    • (2009) IEEE Global Telecommunications Conference, GLOBECOM , pp. 1-6
    • Wasef, A.1    Xuemin, S.2
  • 25
    • 78049388408 scopus 로고    scopus 로고
    • VANET security framework for trusted grouping using TPM hardware: Group formation and message dissemination
    • Kuala Lampur, Malaysia
    • A.A. Wagan, B.M. Mughal, and H. Hasbullah, "VANET security framework for trusted grouping using TPM hardware: Group formation and message dissemination," in International Symposium in Information Technology (ITSim), Kuala Lampur, Malaysia, pp. 607-11.
    • International Symposium in Information Technology (ITSim) , pp. 607-611
    • Wagan, A.A.1    Mughal, B.M.2    Hasbullah, H.3
  • 26
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • LNCS
    • A. Shamir, "Identity-based cryptosystems and signature schemes," Proc. CRYPTO'84, LNCS 1984.
    • (1984) Proc. CRYPTO'84
    • Shamir, A.1
  • 29
    • 77951572383 scopus 로고    scopus 로고
    • ASIC: Aggregate signatures and certificates verification scheme for vehicular networks
    • Honolulu, Hawaii, Nov
    • A. Wasef, and S. Xuemin, "ASIC: Aggregate signatures and certificates verification scheme for vehicular networks," In IEEE Global Telecommunications Conference, GLOBECOM, Honolulu, Hawaii, pp. 1-6, Nov 2009.
    • (2009) IEEE Global Telecommunications Conference, GLOBECOM , pp. 1-6
    • Wasef, A.1    Xuemin, S.2
  • 30
    • 77952515986 scopus 로고    scopus 로고
    • Secure vehicle-to-roadside communication protocol using certificate-based cryptosystem
    • Apr
    • Xiong Hu, Qin Zhiguang, and L. Fagen, "Secure vehicle-to-roadside communication protocol using certificate-based cryptosystem," IETE Technical Review, Vol. 27, pp. 214-9, Apr. 2010.
    • (2010) IETE Technical Review , vol.27 , pp. 214-219
    • Hu, X.1    Zhiguang, Q.2    Fagen, L.3
  • 32
    • 1542341270 scopus 로고    scopus 로고
    • Location-based authentication: Grounding cyberspace for better security
    • Feb
    • D.E. Denning, and P.F. MacDoran, "Location-based authentication: Grounding cyberspace for better security," Computer Fraud and Security, Vol. 1996, pp. 12-6, Feb. 1996.
    • (1996) Computer Fraud and Security , vol.1996 , pp. 12-16
    • Denning, D.E.1    MacDoran, P.F.2
  • 34
    • 77954982913 scopus 로고    scopus 로고
    • Resilient secure aggregation for vehicular networks
    • Jan
    • S. Dietzel, E. Schoch, B. Konings, M. Weber, and F. Kargl, "Resilient secure aggregation for vehicular networks," IEEE Network, Vol. 24, pp. 26-31, Jan. 2010.
    • (2010) IEEE Network , vol.24 , pp. 26-31
    • Dietzel, S.1    Schoch, E.2    Konings, B.3    Weber, M.4    Kargl, F.5
  • 37
    • 51249100419 scopus 로고    scopus 로고
    • RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks
    • Beijing, May
    • Z. Chenxi, L. Xiaodong, L. Rongxing, and H. Pin-Han, "RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks," In IEEE International Conference on Communications, Beijing, pp. 1451-7, May. 2008.
    • (2008) IEEE International Conference on Communications , pp. 1451-1457
    • Chenxi, Z.1    Xiaodong, L.2    Rongxing, L.3    Pin-Han, H.4
  • 38
    • 47949086407 scopus 로고    scopus 로고
    • An ID-based framework achieving privacy and non-repudiation in vehicular Ad Hoc networks
    • Orlando, FL, Oct
    • J. Sun, C. Zhang, and Y. Fang, "An ID-based framework achieving privacy and non-repudiation in vehicular Ad Hoc networks," in IEEE Military Communications Conference, MILCOM, Orlando, FL, Oct. 2007, pp. 1-7.
    • (2007) IEEE Military Communications Conference, MILCOM , pp. 1-7
    • Sun, J.1    Zhang, C.2    Fang, Y.3
  • 43
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • Jan
    • C.T. Li, M.S. Hwang, and Y.P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Computer Communications, Vol. 31, pp. 2803-14, Jan. 2008.
    • (2008) Computer Communications , vol.31 , pp. 2803-2814
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 44
    • 34547365680 scopus 로고    scopus 로고
    • Privacy in VANETs using changing pseudonyms - Ideal and real
    • DOI 10.1109/VETECS.2007.519, 4212947, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring
    • M. Gerlach, and F. Guttler, "Privacy in VANETs using changing pseudonyms -ideal and real," in IEEE 65th Vehicular Technology Conference, VTC, Dublin, pp. 2521-5, Apr. 2007. (Pubitemid 47134401)
    • (2007) IEEE Vehicular Technology Conference , pp. 2521-2525
    • Gerlach, M.1    Guttler, F.2
  • 47
    • 24944489750 scopus 로고    scopus 로고
    • Enhancing wireless location privacy using silent period
    • PHY53-4, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off
    • H. Leping, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," in IEEE Wireless Communications and Networking Conference, Nokia Res. Center Japan, Tokyo, Japan, pp. 1187-92, May. 2005. (Pubitemid 41311089)
    • (2005) IEEE Wireless Communications and Networking Conference, WCNC , vol.2 , pp. 1187-1192
    • Huang, L.1    Matsuura, K.2    Yamanet, H.3    Sezaki, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.