Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and. (English)In: VANET’ PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS. CiteSeerX – Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): Effective and robust operations, as well as security and privacy are critical for the .
|Published (Last):||22 March 2010|
|PDF File Size:||16.84 Mb|
|ePub File Size:||11.29 Mb|
|Price:||Free* [*Free Regsitration Required]|
Download PDF Cite this paper. Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks VANETs. Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology.
In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication. We design mechanisms that reduce the security overhead for safety beaconing, and retain robustness for transportation safety, even in adverse network settings.
Moreover, we show how to enhance the availability and usability of privacy-enhancing VANET mechanisms: Our proposal enables vehicle on-board units to generate their own pseudonyms, without affecting the system security. Computer network Computer security Computer science Wireless ad hoc network Robustness computer science Software deployment Usability Authentication Vehicular ad hoc network Wireless.
Efficient and robust pseudonymous authentication in VANET
Challenges in Securing Vehicular Networks. Bryan Parno 30 Estimated H-index: Yih Chun Hu 20 Estimated H-index: Security Issues in a Future Vehicular Network. Magda El Zarki 13 Estimated H-index: Panagiotis Papadimitratos 36 Estimated H-index: Michael Brown 4 Estimated H-index: Stealth attacks in vehicular technologies.
Markus Jakobsson 42 Estimated H-index: Group Principals and the Formalization of Anonymity. Syverson 20 Estimated H-index: Pseudonymous PKI for ubiquitous computing.
Ke Zeng 1 Estimated H-index: Krishna Sampigethaya 15 Estimated H-index: Pseudohymous Torrent-Moreno 16 Estimated H-index: Anup Kumar Bhattacharya 1 Estimated H-index: Hang Dok 2 Estimated H-index: Ref 14 Source Add To Collection. Conditional privacy through ring signature in vehicular ad-hoc networks.
Brijesh Kumar Chaurasia 9 Estimated H-index: Ref 13 Source Add To Collection. Location privacy in emerging network-based applications.
Loren Schwiebert 22 Estimated H-index: Ahren Studer 17 Estimated Pseudonymkus Ref 28 Source Add To Collection. Subir Biswas 8 Estimated H-index: Other Papers By First Author.
Dependability in Wireless Networks: Can We Rely on WiFi? Secure vehicular communication systems: On the Performance of Secure Vehicular Communication Systems ieee transactions on dependable and secure computing. Are you looking for