메뉴 건너뛰기




Volumn 4325 LNCS, Issue , 2006, Pages 543-554

Secure relative location determination in vehicular network

Author keywords

Secure vehicular relative location; Security; Vehicular networks

Indexed keywords

ANALYSIS AND SIMULATION; CRYPTOGRAPHIC KEY; LOCATION VERIFICATION; RELATIVE LOCATION; RELATIVE POSITIONING; SECURITY; SECURITY REQUIREMENTS; VEHICULAR NETWORKS;

EID: 84886003757     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11943952_46     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 1
    • 84886058588 scopus 로고    scopus 로고
    • Fatality analysis reporting system (FARS) web-based encyclopedia. http://www-fars.nhtsa.dot.gov/.
  • 3
    • 0033872896 scopus 로고    scopus 로고
    • RADAR: An in-building RF-based user location and tracking system
    • P. Bahl and V. N. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In IEEE Infocom 2000, Volume 2, pages 775-784, 2000.
    • (2000) IEEE Infocom 2000 , vol.2 , pp. 775-784
    • Bahl, P.1    Padmanabhan, V.N.2
  • 4
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • S. Brands and D. Chaum. Distance-bounding protocols. In EUROCRYPT '93, pages 344-359, 1994.
    • (1994) EUROCRYPT '93 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 5
    • 0034291601 scopus 로고    scopus 로고
    • GPS-less low cost outdoor localization for very small devices
    • October
    • N. Bulusu, J. Heidemann, and D. Estrin. GPS-less low cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 7(5):28-34, October 2000.
    • (2000) IEEE Personal Communications Magazine , vol.7 , Issue.5 , pp. 28-34
    • Bulusu, N.1    Heidemann, J.2    Estrin, D.3
  • 6
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In IEEE INFOCOM, 2005.
    • (2005) IEEE INFOCOM
    • Capkun, S.1    Hubaux, J.-P.2
  • 7
    • 84945536849 scopus 로고    scopus 로고
    • A probabilistic room location service for wireless networked environments
    • P. Castro, P. Chiu, T. Kremenek, and R. R. Muntz. A probabilistic room location service for wireless networked environments. In UbiComp '01, pages 18-34, 2001.
    • (2001) UbiComp '01 , pp. 18-34
    • Castro, P.1    Chiu, P.2    Kremenek, T.3    Muntz, R.R.4
  • 10
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. In MobiCom '02, pages 12-23, 2002.
    • (2002) MobiCom '02 , pp. 12-23
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 12
    • 84931321948 scopus 로고    scopus 로고
    • Design of a system solution for relative positioning of vehicles using vehicle-to-vehicle radio communications during gps outages
    • 2:1313-1317, October
    • Kukshya, V.; Krishnan, H.; Kellum, C. Design of a system solution for relative positioning of vehicles using vehicle-to-vehicle radio communications during gps outages. Vehicular Technology Conference 2005, 2:1313-1317, October 2005.
    • (2005) Vehicular Technology Conference 2005
    • Kukshya, V.1    Krishnan, H.2    Kellum, C.3
  • 13
    • 84866469313 scopus 로고    scopus 로고
    • SeRLoc: Robust localization for wireless sensor networks
    • L. Lazos and R. Poovendran. SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73-100, 2005.
    • (2005) ACM Trans. Sen. Netw. , vol.1 , Issue.1 , pp. 73-100
    • Lazos, L.1    Poovendran, R.2
  • 14
    • 33144467903 scopus 로고    scopus 로고
    • Attack-resistant location estimation in wireless sensor networks
    • Los Angeles, California, USA
    • D. Liu, P. Ning, and W. Du. Attack-resistant location estimation in wireless sensor networks. In IPSN '05, pages 99-106, Los Angeles, California, USA, 2005.
    • (2005) IPSN '05 , pp. 99-106
    • Liu, D.1    Ning, P.2    Du, W.3
  • 15
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In MobiCom '00, pages 255-265, 2000.
    • (2000) MobiCom '00 , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 16
    • 33847179697 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis and defenses
    • Apr.
    • J. Newsome, R. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis and defenses. In IPSN '04), Apr. 2004.
    • (2004) IPSN '04)
    • Newsome, J.1    Shi, R.2    Song, D.3    Perrig, A.4
  • 17
    • 3142585395 scopus 로고    scopus 로고
    • A secure and private system for subscription-based remote services
    • P. Persiano and I. Visconti. A secure and private system for subscription-based remote services. ACM Trans. Inf. Syst. Secur., 6(4):472-500, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.4 , pp. 472-500
    • Persiano, P.1    Visconti, I.2
  • 19
    • 84885978004 scopus 로고    scopus 로고
    • Qualnet Network Simulator. http://www.qualnet.com/.
  • 20
    • 84976664565 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 26(1):96-99, 1983.
    • (1983) Commun. ACM , vol.26 , Issue.1 , pp. 96-99
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 21
    • 1542317849 scopus 로고    scopus 로고
    • Secure verification of location claims
    • New York, NY, USA
    • N. Sastry, U. Shankar, and D. Wagner. Secure verification of location claims. In WiSe '03, pages 1-10, New York, NY, USA, 2003.
    • (2003) WiSe '03 , pp. 1-10
    • Sastry, N.1    Shankar, U.2    Wagner, D.3
  • 24
    • 33751533670 scopus 로고    scopus 로고
    • A defense against wormhole attacks in wireless ad hoc networks
    • San Francisco, CA, USA
    • Y. Hu, A. Perrig, and D. Johnson. A defense against wormhole attacks in wireless ad hoc networks. In Proc. of INFOCOM 2003, San Francisco, CA, USA, 2003.
    • (2003) Proc. of INFOCOM 2003
    • Hu, Y.1    Perrig, A.2    Johnson, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.