Verification and Provisional Privacy- Preservation Message Framework for VANETs
Abstract
Full Text:
PDFReferences
S.Zeadally et al., “Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges,” Telecomm. Systems, vol. 50, no. 4, pp. 217-241, 2012.
F.Li and Y.Wang, “Routing in Vehicular Ad Hoc Networks: A Survey,” IEEE Vehicular Technology Magazine, vol. 2, no. 2, pp. 12- 22, June 2007.
M.Raya and J.Pierre, “Securing Vehicular Ad Hoc Networks,” J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
X.Lin, “TSVC: Timed Efficient and Secure Vehicular Communica- tions with Privacy Preserving,” IEEE Trans. Wireless Comm., vol. 7, no. 12, pp. 4987-4998, Dec. 2008.
A.Studer et al., “Flexible, Extensible, and Efficient VANET Authentication,” J. Comm. and Networks, vol. 11, no. 6, pp. 574-588, 2009.
“IEEE 1609 Family of Standards for Wireless Access in Vehicular Environments (WAVE),” U.S. Dept. Transportation, 2009.
N.-W.Wang, Y.-M. Huang, and W.-M. Chen, “A Novel Secure Communication Scheme in Vehicular Ad Hoc Networks,” Com- puter Comm., vol. 31, pp. 2827-2837, 2008.
R.Lu et al., “ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications,” Proc. IEEE INFOCOM, pp. 1229-1237, 2008.
Y.Sun et al., “An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications,” IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, Sept. 2010.
P.Kamat, A.Baliga, and W.Trappe, “An Identity-Based Security Framework for VANETs,” Proc. Third Int’l Workshop Vehicular Ad Hoc Networks (VANET), pp. 94-95, 2006.
B.Hoh et al., “Preserving Privacy in GPS Traces via UncertaintyAware Path Cloaking,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS), pp. 161-171, 2009.
J.M.D.Fuentes, A.I.Gonzalez-Tablas, and A.Ribagorda, “Overview of Security Issues in Vehicular Ad-Hoc Networks,” Handbook of Research on Mobility and Computing, pp. 894-911, IGI Global Snippet, 2011.
B.Wu et al., “A survey of attacks and countermeasures in mobile ad hoc networks,” Signals Commun. Technol.-Wireless Netw. Security, pp. 103–135, 2007.
M.Riley, K.Akkaya, and K.Fong, “A Survey of Authentication Schemes for Vehicular Ad Hoc Networks,” Security Comm. Networks, vol. 4, no. 10, pp. 1137-1152, 2011.
R.A. Mollin, “RSA and Public-Key Cryptography,” Discrete Math. and Its Applications. Chapman and Hall/CRC, 2002.
R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
J.Patarin, “Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms,” Proc. EUROCRYPT: 15th Ann. Int’l Conf. Theory and Application of Cryptographic Techniques, pp. 33-48, 1996.
DOI: https://doi.org/10.23956/ijarcsse.v7i12.509
Refbacks
- There are currently no refbacks.