메뉴 건너뛰기




Volumn 8, Issue 2, 2014, Pages 384-394

Vehicular security through reputation and plausibility checks

Author keywords

Geocasting systems; malicious attacks; plausibility checks; security through reputation; vehicular ad hoc networks (VANETs)

Indexed keywords

NETWORK SECURITY; VEHICLE TO VEHICLE COMMUNICATIONS;

EID: 84902243588     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2013.2245971     Document Type: Article
Times cited : (60)

References (21)
  • 4
    • 76649103482 scopus 로고    scopus 로고
    • Illusion attack on VANET applications-A message plausibility problem
    • Nov.
    • N.-W. Lo and H.-C. Tsai, "Illusion attack on VANET applications-A message plausibility problem," in Proc. 2nd IEEE Workshop Autom. Netw. Appl., Nov. 2007, pp. 1-8.
    • (2007) Proc. 2nd IEEE Workshop Autom. Netw. Appl , pp. 1-8
    • Lo, N.-W.1    Tsai, H.-C.2
  • 5
    • 84907706128 scopus 로고    scopus 로고
    • Reputation propagation and agreement in mobile ad hoc networks
    • Y. Liu and Y. R. Yang, "Reputation propagation and agreement in mobile ad hoc networks," in Proc. IEEE Wireless Commun. Netw. Conf., 2003, pp. 1510-1515.
    • (2003) Proc. IEEE Wireless Commun. Netw. Conf. , pp. 1510-1515
    • Liu, Y.1    Yang, Y.R.2
  • 7
    • 84902270510 scopus 로고    scopus 로고
    • [Online]
    • [Online]. Available: http://www.scalable-networks.com/
  • 8
    • 51349156734 scopus 로고    scopus 로고
    • ECPP : Efficient condition privacy preservation protocol for secure vehicular communication
    • Apr.
    • R. Lu, X. Lin, H. Zhu, P. H. Ho, and X. Shen, "ECPP : Efficient condition privacy preservation protocol for secure vehicular communication," in Proc. IEEE 27th Conf. Comput. Commun., Apr. 2008, pp. 1229-1237.
    • (2008) Proc. IEEE 27th Conf. Comput. Commun , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.H.4    Shen, X.5
  • 10
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007.
    • (2007) J. Comput. Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 11
    • 42549130522 scopus 로고    scopus 로고
    • Roadside-aided routing (RAR)in vehicular networks
    • Jun.
    • Y. Peng, Z. Abichar, and J. M. Chang, "Roadside-aided routing (RAR)in vehicular networks," in Proc. IEEE Int. Conf. Commun., vol. 8. Jun. 2006, pp. 3602-3607.
    • (2006) Proc. IEEE Int. Conf. Commun. , vol.8 , pp. 3602-3607
    • Peng, Y.1    Abichar, Z.2    Chang, J.M.3
  • 13
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Jan.-Mar.
    • A. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Comput., vol. 2, no. 1, pp. 46-55, Jan.-Mar. 2003.
    • (2003) IEEE Pervasive Comput. , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 16
    • 12744252918 scopus 로고    scopus 로고
    • Scalable Network Technologies, Inc., Los Angeles, CA, USA
    • QualNet User's Manual, version 3.6, Scalable Network Technologies, Inc., Los Angeles, CA, USA, 2003.
    • (2003) QualNet User's Manual, Version 3.6
  • 19
    • 83755205297 scopus 로고    scopus 로고
    • Inter-vehicular communications: Security and reliability issues
    • Sep. 28-30
    • V. Paruchuri, "Inter-vehicular communications: Security and reliability issues," in Proc. Int. Conf. ICT Convergence, Sep. 28-30, 2011, pp. 737-741.
    • (2011) Proc. Int. Conf. ICT Convergence , pp. 737-741
    • Paruchuri, V.1
  • 20
    • 77958084781 scopus 로고    scopus 로고
    • Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]
    • Oct.
    • A. Wasef, L. Rongxing, L. Xiaodong, and S. Xuemin, "Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]," IEEE Wireless Commun., vol. 17, no. 5, pp. 22-28, Oct. 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.5 , pp. 22-28
    • Wasef, A.1    Rongxing, L.2    Xiaodong, L.3    Xuemin, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.