메뉴 건너뛰기




Volumn 62, Issue 2, 2013, Pages 536-551

A framework for secure and efficient data acquisition in vehicular ad Hoc networks

Author keywords

Anonymity; hierarchal password based key derivation ( HARDY) function; key derivation; roadside units (RSUs); security; service oriented vehicular ad hoc networks (VANETs)

Indexed keywords

ACCIDENT PREVENTION; DATA ACQUISITION; INTERNET; ROADSIDES; VIDEO STREAMING;

EID: 84873898187     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2012.2226613     Document Type: Article
Times cited : (98)

References (42)
  • 1
    • 80052406758 scopus 로고    scopus 로고
    • ID-based safety message authentication for security and trust in vehicular networks
    • Minneapolis, MN, Jun
    • S. Biswas, J. Misic, and V. Misic, "ID-based safety message authentication for security and trust in vehicular networks," in Proc. 31st ICDCSW, Minneapolis, MN, Jun. 2011, pp. 323-331.
    • (2011) Proc. 31st ICDCSW , pp. 323-331
    • Biswas, S.1    Misic, J.2    Misic, V.3
  • 2
    • 84873921215 scopus 로고    scopus 로고
    • Brute-force attack
    • [Online]. Available
    • "Brute-force attack," Wikipedia. [Online]. Available: http://en.wikipedia. org/wiki/Brute-force-attack
    • Wikipedia
  • 3
    • 81055137605 scopus 로고    scopus 로고
    • Short-lived key management for secure communications in VANETs
    • Russia, Aug
    • S. Busanelli, G. Ferrari, and L. Veltri, "Short-lived key management for secure communications in VANETs," in Proc. ITST, St. Petersburg, Russia, Aug. 2011, pp. 613-618.
    • (2011) Proc. ITST, St. Petersburg , pp. 613-618
    • Busanelli, S.1    Ferrari, G.2    Veltri, L.3
  • 4
    • 38149010558 scopus 로고    scopus 로고
    • On the effectiveness of changing pseudonyms to provide location privacy in VANETs
    • Cambridge, U.K Jul
    • L. Buttyan, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in VANETs," in Proc. ESAS, Cambridge, U.K., Jul. 2007, pp. 129-141.
    • (2007) Proc. ESAS , pp. 129-141
    • Buttyan, L.1    Holczer, T.2    Vajda, I.3
  • 5
    • 37849048533 scopus 로고    scopus 로고
    • Efficient and robust pseudonymous authentication in VANET
    • Montreal, QC, Canada, Sep
    • G. Calandriello, P. Papadimitratos, A. Lioy, and J. P. Hubaux, "Efficient and robust pseudonymous authentication in VANET," in Proc. ACM Mobicom, Montreal, QC, Canada, Sep. 2007, pp. 19-28.
    • (2007) Proc. ACM Mobicom , pp. 19-28
    • Calandriello, G.1    Papadimitratos, P.2    Lioy, A.3    Hubaux, J.P.4
  • 6
    • 84873909797 scopus 로고    scopus 로고
    • Sumo-Simulation of Urban Mobility, Inst. of Transp. Res., German Aerosp. Centre, Berlin, Germany. [Online]. Available
    • Centre for Appl. Inf. (ZAIK). (2011). Sumo-Simulation of Urban Mobility, Inst. of Transp. Res., German Aerosp. Centre, Berlin, Germany. [Online]. Available: http://sumo.sourceforge.net/
    • (2011) Centre for Appl. Inf. (ZAIK)
  • 7
    • 85024290278 scopus 로고
    • Group signatures
    • D. Chaum and E. van Heyst, "Group signatures," in Proc. EUROCRYPT, 1991, vol. 547, pp. 257-265.
    • (1991) Proc. EUROCRYPT , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 8
    • 77957259997 scopus 로고    scopus 로고
    • SPECS: Secure and privacy enhancing communications schemes for VANETs
    • Mar.
    • T. W. Chim, S. M. Yiu, L. Hui, and V. Li, "SPECS: Secure and privacy enhancing communications schemes for VANETs," Ad Hoc Netw., vol. 9, no. 2, pp. 189-203, Mar. 2011.
    • (2011) Ad Hoc Netw. , vol.9 , Issue.2 , pp. 189-203
    • Chim, T.W.1    Yiu, S.M.2    Hui, L.3    Li, V.4
  • 9
    • 62949186729 scopus 로고    scopus 로고
    • Service discovery and service access in wireless vehicular networks
    • E. Coronado and S. Cherkaoui, "Service discovery and service access in wireless vehicular networks," in Proc. IEEE GLOBECOM Workshops, 2008, pp. 1-6.
    • (2008) Proc. IEEE GLOBECOM Workshops , pp. 1-6
    • Coronado, E.1    Cherkaoui, S.2
  • 10
    • 84873935169 scopus 로고    scopus 로고
    • Crypto++ 5.6.1 Library Apr 2011. [Online]. Available
    • Crypto++ 5.6.1 Library, Apr. 2011. [Online]. Available: http://www. cryptopp.com/
  • 11
    • 79951900587 scopus 로고    scopus 로고
    • EP2DF: An efficient privacy-preserving data-forwarding scheme for service-oriented vehicular ad hoc networks
    • Feb.
    • X. Dong, L. Wei, H. Zhu, Z. Cao, and L. Wang, "EP2DF: An efficient privacy-preserving data-forwarding scheme for service-oriented vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 60, no. 2, pp. 580-591, Feb. 2011.
    • (2011) IEEE Trans. Veh. Technol , vol.60 , Issue.2 , pp. 580-591
    • Dong, X.1    Wei, L.2    Zhu, H.3    Cao, Z.4    Wang, L.5
  • 12
    • 78650085090 scopus 로고    scopus 로고
    • A light architecture for opportunistic vehicle-to-infrastructure communications
    • Turkey, Oct
    • F. El Ali and B. Ducourthial, "A light architecture for opportunistic vehicle-to-infrastructure communications," in Proc. MobiWac, Bodrum, Turkey, Oct. 2010, pp. 60-67.
    • (2010) Proc. MobiWac, Bodrum , pp. 60-67
    • El Ali, F.1    Ducourthial, B.2
  • 14
    • 84873934972 scopus 로고    scopus 로고
    • GeoNet Project. [Online] Available
    • GeoNet Project. [Online]. Available: http://www.geonet-project.eu
  • 15
    • 79951975426 scopus 로고    scopus 로고
    • A distributed key management framework with cooperative message authentication in VANETs
    • Mar.
    • Y. Hao, Y. Cheng, C. Zhou, and W. Song, "A distributed key management framework with cooperative message authentication in VANETs," IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 616-629, Mar. 2011.
    • (2011) IEEE J. Sel. Areas Commun , vol.29 , Issue.3 , pp. 616-629
    • Hao, Y.1    Cheng, Y.2    Zhou, C.3    Song, W.4
  • 16
    • 24944489750 scopus 로고    scopus 로고
    • Enhancing wireless location privacy using silent period
    • New Orleans, LA
    • L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," in Proc. IEEE WCNC, New Orleans, LA, 2005, pp. 1187-1192.
    • (2005) Proc. IEEE WCNC , pp. 1187-1192
    • Huang, L.1    Matsuura, K.2    Yamane, H.3    Sezaki, K.4
  • 17
    • 78751657441 scopus 로고    scopus 로고
    • ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
    • Jan.
    • J. L. Huang, L. Y. Yeh, and H. Y. Chien, "ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 248-262, Jan. 2011.
    • (2011) IEEE Trans. Veh. Technol , vol.60 , Issue.1 , pp. 248-262
    • Huang, J.L.1    Yeh, L.Y.2    Chien, H.Y.3
  • 18
    • 84873910041 scopus 로고    scopus 로고
    • ITSSv6 Project. [Online]. Available
    • ITSSv6 Project. [Online]. Available: http://www.lara.prd.fr/projects/ itssv6
  • 19
    • 84873918929 scopus 로고    scopus 로고
    • "Key size," Wikipedia. [Online]. Available
    • "Key size," Wikipedia. [Online]. Available: http://en.wikipedia.org/wiki/Key-size
  • 20
    • 33745725717 scopus 로고    scopus 로고
    • An anonymous communication technique using dummies for location-based services
    • Jul
    • H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services," in Proc. ICPS, Santorini, Greece, Jul. 2005, pp. 88-97.
    • (2005) Proc. ICPS, Santorini, Greece , pp. 88-97
    • Kido, H.1    Yanagisawa, Y.2    Satoh, T.3
  • 21
    • 33749643165 scopus 로고    scopus 로고
    • Threats to security in DSRC/WAVE
    • C. Laurendeau and M. Barbeau, "Threats to security in DSRC/WAVE," in Proc. ADHOC-NOW, 2006, vol. 4104, pp. 266-279.
    • (2006) Proc. ADHOC-NOW , vol.4104 , pp. 266-279
    • Laurendeau, C.1    Barbeau, M.2
  • 22
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • Jul
    • C. T. Li, M. S. Hwang, and Y. P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Comput. Commun., vol. 31, no. 12, pp. 2803-2814, Jul. 2008.
    • (2008) Comput. Commun , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 23
    • 59249090296 scopus 로고    scopus 로고
    • Data aggregation and roadside unit placement for a VANET traffic information system
    • San Francisco, CA, Sep
    • C. Lochert, B. Scheuermann, C. Wewetzer, A. Luebke, and M. Mauve, "Data aggregation and roadside unit placement for a VANET traffic information system," in Proc. 5th ACM Int. Workshop VANET, San Francisco, CA, Sep. 2008, pp. 58-65.
    • (2008) Proc. 5th ACM Int. Workshop VANET , pp. 58-65
    • Lochert, C.1    Scheuermann, B.2    Wewetzer, C.3    Luebke, A.4    Mauve, M.5
  • 24
    • 58149135996 scopus 로고    scopus 로고
    • Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications
    • Calgary, AB, Canada, Sep
    • Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications," in Proc. IEEE 68th Veh. Technol. Conf., Calgary, AB, Canada, Sep. 2008, pp. 1-5.
    • (2008) Proc. IEEE 68th Veh. Technol. Conf. , pp. 1-5
    • Ma, Z.1    Kargl, F.2    Weber, M.3
  • 25
    • 84856548328 scopus 로고    scopus 로고
    • ROAMER: Roadside Units as message routers in VANETs
    • May
    • K. Mershad, H. Artail, and M. Gerla, "ROAMER: Roadside Units as message routers in VANETs," Ad Hoc Netw., vol. 10, no. 3, pp. 479-496, May 2012.
    • (2012) Ad Hoc Netw , vol.10 , Issue.3 , pp. 479-496
    • Mershad, K.1    Artail, H.2    Gerla, M.3
  • 26
    • 84864248417 scopus 로고    scopus 로고
    • SCORE: Data scheduling at roadside units in vehicle ad hoc networks
    • Lebanon, Apr
    • K. Mershad and H. Artail, "SCORE: Data scheduling at roadside units in vehicle ad hoc networks," in Proc. ICT, Jounieh, Lebanon, Apr. 2012, pp. 1-6.
    • (2012) Proc. ICT, Jounieh , pp. 1-6
    • Mershad, K.1    Artail, H.2
  • 27
    • 67049134643 scopus 로고    scopus 로고
    • ABSRP-A service discovery approach for vehicular ad hoc networks
    • Yilan, Taiwan, Dec
    • B. Mohandas, A. Nayak, K. Naik, and N. Goel, "ABSRP-A service discovery approach for vehicular ad hoc networks," in Proc. IEEE 3rd APSCC, Yilan, Taiwan, Dec. 2008, pp. 1590-1594.
    • (2008) Proc. IEEE 3rd APSCC , pp. 1590-1594
    • Mohandas, B.1    Nayak, A.2    Naik, K.3    Goel, N.4
  • 28
    • 83655202567 scopus 로고    scopus 로고
    • A novel sender authentication scheme based on hash chain for vehicular ad hoc networks
    • Malaysia, Sep
    • N. V. Vighnesh, N. Kavita, S. R. Urs, and S. Sampalli, "A novel sender authentication scheme based on hash chain for vehicular ad hoc networks," in Proc. IEEE ISWTA, Langkawi, Malaysia, Sep. 2011, pp. 96-101.
    • (2011) Proc. IEEE ISWTA, Langkawi , pp. 96-101
    • Vighnesh, N.V.1    Kavita, N.2    Urs, S.R.3    Sampalli, S.4
  • 30
    • 84868349605 scopus 로고    scopus 로고
    • Stronger key derivation via sequential memory-hard functions
    • May
    • C. Percival, "Stronger key derivation via sequential memory-hard functions," in Proc. BSDCan, Ottawa, ON, Canada, May 2009, pp. 1-16.
    • (2009) Proc. BSDCan, Ottawa, ON, Canada , pp. 1-16
    • Percival, C.1
  • 31
    • 79951473393 scopus 로고    scopus 로고
    • Analysis of authentication overhead in vehicular networks
    • Hungary, Oct
    • J. Petit and Z. Mammeri, "Analysis of authentication overhead in vehicular networks," in Proc. WMNC, Budapest, Hungary, Oct. 2010, pp. 1-6.
    • (2010) Proc. WMNC, Budapest , pp. 1-6
    • Petit, J.1    Mammeri, Z.2
  • 33
    • 33745948310 scopus 로고    scopus 로고
    • The security of vehicular ad hoc networks
    • Nov
    • M. Raya and J. P. Hubaux, "The security of vehicular ad hoc networks," in Proc. SASN, Alexandria, VA, Nov. 2005, pp. 11-21.
    • (2005) Proc. SASN, Alexandria, VA , pp. 11-21
    • Raya, M.1    Hubaux, J.P.2
  • 34
    • 35348977820 scopus 로고    scopus 로고
    • Eviction of misbehaving and faulty nodes in vehicular networks
    • Oct
    • M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J. P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks," IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1557-1568, Oct. 2007.
    • (2007) IEEE J. Sel. Areas Commun , vol.25 , Issue.8 , pp. 1557-1568
    • Raya, M.1    Papadimitratos, P.2    Aad, I.3    Jungels, D.4    Hubaux, J.P.5
  • 35
    • 79959852755 scopus 로고    scopus 로고
    • Analytical comparison of cryptographic techniques for resource-constrained wireless security
    • Jul
    • M. Razvi Doomun and K. M. S. Soyjaudah, "Analytical comparison of cryptographic techniques for resource-constrained wireless security," Int. J. Netw. Sec., vol. 9, no. 1, pp. 82-94, Jul. 2009.
    • (2009) Int. J. Netw. Sec , vol.9 , Issue.1 , pp. 82-94
    • Razvi Doomun, M.1    Soyjaudah, K.M.S.2
  • 36
    • 84873922802 scopus 로고    scopus 로고
    • SafeSpot Project. [Online] Available
    • SafeSpot Project. [Online]. Available: http://www.safespot-eu.org/
  • 38
    • 84873895457 scopus 로고    scopus 로고
    • SeVeCom Project. [Online] Available
    • SeVeCom Project. [Online]. Available: http://www.sevecom.org/
  • 39
    • 77955385286 scopus 로고    scopus 로고
    • Roadside units deployment for efficient short-time certificate updating in VANETs
    • South Africa, May
    • Y. Sun, X. Lin, R. Lu, X. Shen, and J. Su, "Roadside units deployment for efficient short-time certificate updating in VANETs," in Proc. IEEE ICC, Cape Town, South Africa, May 2010, pp. 1-5.
    • (2010) Proc. IEEE ICC, Cape Town , pp. 1-5
    • Sun, Y.1    Lin, X.2    Lu, R.3    Shen, X.4    Su, J.5
  • 40
    • 74149086091 scopus 로고    scopus 로고
    • Planning roadside infrastructure for information dissemination in intelligent transportation systems
    • Mar.
    • O. Trullols, M. Fiore, C. Casetti, C. Chiasserini, and J. Ordinas, "Planning roadside infrastructure for information dissemination in intelligent transportation systems," Comput. Commun., vol. 33, no. 4, pp. 432-442, Mar. 2010.
    • (2010) Comput. Commun , vol.33 , Issue.4 , pp. 432-442
    • Trullols, O.1    Fiore, M.2    Casetti, C.3    Chiasserini, C.4    Ordinas, J.5
  • 41
    • 33748564921 scopus 로고    scopus 로고
    • A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
    • Dec
    • C. Xenakis, N. Laoutaris, L. Merakos, and I. Stavrakakis, "A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms," Comput. Netw., vol. 50, no. 17, pp. 3225-3241, Dec. 2006.
    • (2006) Comput. Netw , vol.50 , Issue.17 , pp. 3225-3241
    • Xenakis, C.1    Laoutaris, N.2    Merakos, L.3    Stavrakakis, I.4
  • 42
    • 70350330400 scopus 로고    scopus 로고
    • Security in service-oriented vehicular networks
    • Aug
    • H. Zhu, R. Lu, X. Shen, and X. Lin, "Security in service-oriented vehicular networks," IEEE Wireless Commun., vol. 16, no. 4, pp. 16-22, Aug. 2009.
    • (2009) IEEE Wireless Commun , vol.16 , Issue.4 , pp. 16-22
    • Zhu, H.1    Lu, R.2    Shen, X.3    Lin, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.