메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 237-246

LSR: Mitigating zero-day sybil vulnerability in privacy-preserving vehicular peer-to-peer networks

Author keywords

Analytical models; Delays; local sybil resistance; Peer to peer computing; Privacy; privacy preserving; Roads; Security; Vehicles; Vehicular peer to peer network; zero day sybil vulnerability

Indexed keywords

ANALYTICAL MODELS; COMPUTER CRIME; DATA PRIVACY; DISTRIBUTED COMPUTER SYSTEMS; PEER TO PEER NETWORKS; VEHICLES;

EID: 84902197946     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.SUP.0513021     Document Type: Article
Times cited : (38)

References (30)
  • 1
    • 14944366290 scopus 로고    scopus 로고
    • Pavan: A policy framework for content availabilty in vehicular ad-hoc networks
    • S. Ghandeharizadeh, S. Kapadia, and B. Krishnamachari, "Pavan: A policy framework for content availabilty in vehicular ad-hoc networks," in Veh. Ad Hoc Netw., 2004, pp. 57-65.
    • (2004) Veh.Ad Hoc Netw. , pp. 57-65
    • Ghandeharizadeh, S.1    Kapadia, S.2    Krishnamachari, B.3
  • 2
    • 69949173672 scopus 로고    scopus 로고
    • Static replication strategies for content availability in vehicular ad-hoc networks
    • S. Kapadia, B. Krishnamachari, and S. Ghandeharizadeh, "Static replication strategies for content availability in vehicular ad-hoc networks," MONET, vol. 14, no. 5, pp. 590-610, 2009.
    • (2009) MONET , vol.14 , Issue.5 , pp. 590-610
    • Kapadia, S.1    Krishnamachari, B.2    Ghandeharizadeh, S.3
  • 3
    • 78649430054 scopus 로고    scopus 로고
    • Ppc: Privacy-preserving chatting in vehicular peer-to-peer networks
    • X. Liang, R. Lu, X. Lin, and X. Shen, "Ppc: Privacy-preserving chatting in vehicular peer-to-peer networks," in VTC Fall, 2010, pp. 1-5.
    • (2010) VTC Fall , pp. 1-5
    • Liang, X.1    Lu, R.2    Lin, X.3    Shen, X.4
  • 4
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007.
    • (2007) J. Comput. Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 5
    • 84930198714 scopus 로고    scopus 로고
    • "Carpool," [Online]. Available: http://en.wikipedia.org/wiki/Carpool.
    • Carpool
  • 6
    • 77953313061 scopus 로고    scopus 로고
    • Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
    • San Diego, CA, USA, Mar.
    • R. Lu, X. Lin, and X. Shen, "Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks," in INFOCOM 2010, San Diego, CA, USA, Mar. 2010, pp. 1-9.
    • (2010) INFOCOM 2010 , pp. 1-9
    • Lu, R.1    Lin, X.2    Shen, X.3
  • 7
    • 70349655467 scopus 로고    scopus 로고
    • Spark: A new vanet-based smart parking scheme for large parking lots
    • Rio de Janeiro, Brazil, Apr.
    • R. Lu, X. Lin, H. Zhu, and X. Shen, "Spark: A new vanet-based smart parking scheme for large parking lots," in INFOCOM 2009, Rio de Janeiro, Brazil, Apr. 2009, pp. 1-9.
    • (2009) INFOCOM 2009 , pp. 1-9
    • Lu, R.1    Lin, X.2    Zhu, H.3    Shen, X.4
  • 8
    • 84930208600 scopus 로고    scopus 로고
    • Securing vanets: Industry approaches and current research directions
    • New York, NY, USA: ACM
    • A. Perrig, "Securing vanets: Industry approaches and current research directions," in VANET '09. New York, NY, USA: ACM, 2009, pp. 1-2.
    • (2009) VANET '09 , pp. 1-2
    • Perrig, A.1
  • 9
    • 36749076982 scopus 로고    scopus 로고
    • Gsis: A secure and privacy-preserving protocol for vehicular communications
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "Gsis: A secure and privacy-preserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, 2007.
    • (2007) IEEE Trans. Veh. Technol. , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 10
    • 51349156734 scopus 로고    scopus 로고
    • Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications
    • Phoenix, AZ, USA, Apr.
    • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications," in INFOCOM 2008, Phoenix, AZ, USA, Apr. 2008.
    • (2008) INFOCOM 2008
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 11
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis & defenses
    • New York, NY, USA: ACM
    • J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis & defenses," in IPSN '04. New York, NY, USA: ACM, 2004, pp. 259-268.
    • (2004) IPSN '04 , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 12
    • 77953686613 scopus 로고    scopus 로고
    • Sybillimit: A near-optimal social network defense against sybil attacks
    • H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "Sybillimit: A near-optimal social network defense against sybil attacks," IEEE/ACM Trans. Netw., vol. 18, no. 3, pp. 885-898, 2010.
    • (2010) IEEE/ACM Trans.Netw. , vol.18 , Issue.3 , pp. 885-898
    • Yu, H.1    Gibbons, P.B.2    Kaminsky, M.3    Xiao, F.4
  • 13
    • 77953317298 scopus 로고    scopus 로고
    • Sybil attacks against mobile users: Friends and foes to the rescue
    • SanDiego, CA,USA,Mar.
    • D. Quercia and S. Hailes, "Sybil attacks against mobile users: Friends and foes to the rescue," in INFOCOM 2010, SanDiego, CA,USA,Mar. 2010, pp. 1-9.
    • (2010) INFOCOM 2010 , pp. 1-9
    • Quercia, D.1    Hailes, S.2
  • 14
    • 50249168206 scopus 로고    scopus 로고
    • Privacy-preserving detection of sybil attacks in vehicular ad hoc networks
    • Washington, DC, USA
    • T. Zhou, R. R. Choudhury, P. Ning, and K. Chakrabarty, "Privacy-preserving detection of sybil attacks in vehicular ad hoc networks," in MOBIQUITOUS '07, Washington, DC, USA, 2007, pp. 1-8.
    • (2007) MOBIQUITOUS '07 , pp. 1-8
    • Zhou, T.1    Choudhury, R.R.2    Ning, P.3    Chakrabarty, K.4
  • 15
    • 77951463026 scopus 로고    scopus 로고
    • Defense against sybil attack in vehicular ad-hoc network based on roadside units support
    • S. Park, B. Aslam, D. Turgut, and C. C. Zou, "Defense against sybil attack in vehicular ad-hoc network based on roadside units support," in MILCOM'09, 2009.
    • (2009) MILCOM'09
    • Park, S.1    Aslam, B.2    Turgut, D.3    Zou, C.C.4
  • 16
    • 70449565205 scopus 로고    scopus 로고
    • TACKing together efficient authentication, revocation, and privacy in vanets
    • A. Studer, E. Shi, F. Bai, and A. Perrig, "TACKing together efficient authentication, revocation, and privacy in vanets," in SECON'09, 2009.
    • (2009) SECON'09
    • Studer, A.1    Shi, E.2    Bai, F.3    Perrig, A.4
  • 17
    • 78649253198 scopus 로고    scopus 로고
    • Privacy vulnerabilities of published anonymous mobility traces
    • C. Ma, D. Yau, N. Yip, and N. Rao, "Privacy vulnerabilities of published anonymous mobility traces," in MobiCom 2010, 2010.
    • (2010) MobiCom 2010
    • Ma, C.1    Yau, D.2    Yip, N.3    Rao, N.4
  • 18
    • 77249157951 scopus 로고    scopus 로고
    • Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
    • Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.2 , pp. 559-573
    • Wu, Q.1    Domingo-Ferrer, J.2    Gonzalez-Nicolas, U.3
  • 19
    • 79951969637 scopus 로고    scopus 로고
    • Threshold anonymous announcement in vanets
    • L. Chen, S.-L. Ng, and G. Wang, "Threshold anonymous announcement in vanets," IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 605-615, 2011.
    • (2011) IEEE J. Sel. Areas Commun. , vol.29 , Issue.3 , pp. 605-615
    • Chen, L.1    Ng, S.-L.2    Wang, G.3
  • 21
    • 34247602959 scopus 로고    scopus 로고
    • Performance modeling of epidemic routing
    • X. Zhang, G. Neglia, J. Kurose, and D. Towsley, "Performance modeling of epidemic routing," Comput. Netw., vol. 51, no. 10, pp. 2867-2891, 2007.
    • (2007) Comput. Netw. , vol.51 , Issue.10 , pp. 2867-2891
    • Zhang, X.1    Neglia, G.2    Kurose, J.3    Towsley, D.4
  • 22
    • 14844309671 scopus 로고    scopus 로고
    • Group signatures with verifier-local revocation
    • New York, NY, USA: ACM
    • D. Boneh and H. Shacham, "Group signatures with verifier-local revocation," in CCS '04. New York, NY, USA: ACM, 2004, pp. 168-177.
    • (2004) CCS '04 , pp. 168-177
    • Boneh, D.1    Shacham, H.2
  • 23
    • 78650759659 scopus 로고    scopus 로고
    • Relays, base stations, and meshes: Enhancing mobile networks with infrastructure
    • San Francisco, USA
    • N. Banerjee, M. D. Corner, D. Towsley, and B. N. Levine, "Relays, base stations, and meshes: Enhancing mobile networks with infrastructure," in MobiCom 2008, San Francisco, USA, 2008, pp. 81-91.
    • (2008) MobiCom 2008 , pp. 81-91
    • Banerjee, N.1    Corner, M.D.2    Towsley, D.3    Levine, B.N.4
  • 24
    • 70350662582 scopus 로고    scopus 로고
    • Spatio-temporal variations of vehicle traffic in vanets: Facts and implications
    • F. Bai and B. Krishnamachari, "Spatio-temporal variations of vehicle traffic in vanets: Facts and implications," in VANET '09, pp. 43-52.
    • VANET '09 , pp. 43-52
    • Bai, F.1    Krishnamachari, B.2
  • 25
    • 77953309373 scopus 로고    scopus 로고
    • Recongnizing exponential inter-contact time in vanets
    • San Diego, CA, USA, Mar.
    • H. Zhu, L. Fu, G. Xue, Y. Zhu, M. Li, and L. Ni, "Recongnizing exponential inter-contact time in vanets," in INFOCOM 2010, San Diego, CA, USA, Mar. 2010, pp. 1-9.
    • (2010) INFOCOM 2010 , pp. 1-9
    • Zhu, H.1    Fu, L.2    Xue, G.3    Zhu, Y.4    Li, M.5    Ni, L.6
  • 26
    • 34548120584 scopus 로고    scopus 로고
    • Delay and resource analysis in manets in presence of throwboxes
    • M. Ibrahim, A. Al Hanbali, and P. Nain, "Delay and resource analysis in manets in presence of throwboxes," Performance Evaluation, vol. 64, no. 9-12, pp. 933-947, 2007.
    • (2007) Performance Evaluation , vol.64 , Issue.9-12 , pp. 933-947
    • Ibrahim, M.1    Al Hanbali, A.2    Nain, P.3
  • 28
    • 59249108565 scopus 로고    scopus 로고
    • Security certificate revocation list distribution for vanet
    • K. P. Laberteaux, J. J. Haas, and Y.-C. Hu, "Security certificate revocation list distribution for vanet," in VANET '08, pp. 88-89.
    • VANET '08 , pp. 88-89
    • Laberteaux, K.P.1    Haas, J.J.2    Hu, Y.-C.3
  • 29
    • 24144497473 scopus 로고    scopus 로고
    • The message delay in mobile ad hoc networks
    • R. Groenevelt, P. Nain, and G. Koole, "The message delay in mobile ad hoc networks," Perform. Eval., vol. 62, no. 1-4, pp. 210-228, 2005.
    • (2005) Perform. Eval. , vol.62 , Issue.1-4 , pp. 210-228
    • Groenevelt, R.1    Nain, P.2    Koole, G.3
  • 30
    • 0008352491 scopus 로고    scopus 로고
    • A linkable group signature and its application to secret voting
    • T. Nakanishi, T. Fujiwara, and H. Watanabe, "A linkable group signature and its application to secret voting," Trans. Inf. Process. Society Japan, vol. 40, no. 7, pp. 3085-3096, 1999.
    • (1999) Trans. Inf. Process. Society Japan , vol.40 , Issue.7 , pp. 3085-3096
    • Nakanishi, T.1    Fujiwara, T.2    Watanabe, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.