Privacy vs. authenticity
Communications of the ACM
Medium access and radio resource management for ad hoc networks based on UTRA TDD
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Vehicle-to-vehicle safety messaging in DSRC
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Efficient secure aggregation in VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
The Threat of Intelligent Collisions
IT Professional
An asymmetric security mechanism for navigation signals
IH'04 Proceedings of the 6th international conference on Information Hiding
A survey on position-based routing in mobile ad hoc networks
IEEE Network: The Magazine of Global Internetworking
VANET-based approach for parking space availability
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
A secure and resilient WSN roadside architecture for intelligent transport systems
WiSec '08 Proceedings of the first ACM conference on Wireless network security
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
Computer Standards & Interfaces
A mechanism to enforce privacy in vehicle-to-infrastructure communication
Computer Communications
A novel secure communication scheme in vehicular ad hoc networks
Computer Communications
SAT: situation-aware trust architecture for vehicular networks
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
Batch Verification of Short Signatures
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks
Transactions on Computational Science IV
Practical Short Signature Batch Verification
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
About efficiency in wireless communication frameworks on vehicular networks
The First International Workshop on Wireless Networking for Intelligent Transportation Systems
BAT: a robust signature scheme for vehicular networks using binary authentication tree
IEEE Transactions on Wireless Communications
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET
Information Security Applications
Research on vehicular ad hoc networks
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Improvement of vehicular communications by using 3G capabilities to disseminate control information
IEEE Network: The Magazine of Global Internetworking
Integrated system for smart transport services
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
Vehicular telematics over heterogeneous wireless networks: A survey
Computer Communications
Hide-and-Lie: enhancing application-level privacy in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
PPAA: peer-to-peer anonymous authentication
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Using TPMs to secure vehicular ad-hoc networks (VANETs)
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Preventing unauthorized messages in DTN based mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A novel framework for message authentication in vehicular communication networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
MAAC: message authentication acceleration protocol for vehicular ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
ASIC: Aggregate signatures and certificates verification scheme for vehicular networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A generic security API for symmetric key management on cryptographic devices
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Anonymous group implicit certificate scheme
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
An ID-based aggregate signature scheme with constant pairing computations
Journal of Systems and Software
A novel defense mechanism against sybil attacks in VANET
Proceedings of the 3rd international conference on Security of information and networks
Defense against Sybil attack in vehicular ad hoc network based on roadside unit support
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Efficient CRL search in vehicular network PKIS
Proceedings of the 6th ACM workshop on Digital identity management
VWCA: An efficient clustering algorithm in vehicular ad hoc networks
Journal of Network and Computer Applications
Complementing public key infrastructure to secure vehicular ad hoc networks
IEEE Wireless Communications
Sybil attack detection based on signature vectors in VANETs
International Journal of Critical Computer-Based Systems
Secure and efficient protocol for vehicular ad hoc network with privacy preservation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Journal of Network and Computer Applications
Efficient and secure threshold-based event validation for VANETs
Proceedings of the fourth ACM conference on Wireless network security
Comprehensive experimental analyses of automotive attack surfaces
SEC'11 Proceedings of the 20th USENIX conference on Security
Timing attack in vehicular network
Proceedings of the 15th WSEAS international conference on Computers
Flooding-resilient broadcast authentication for VANETs
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Securing location-aware services based on online/offline signatures in VANETs
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Multi-objective optimal combination queries
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
Policy Management for Secure Data Access Control in Vehicular Networks
Journal of Network and Systems Management
On batch verification with group testing for vehicular communications
Wireless Networks
APPA: aggregate privacy-preserving authentication in vehicular Ad Hoc networks
ISC'11 Proceedings of the 14th international conference on Information security
A survey on trust management for intelligent transportation system
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science
Privacy preserving neighborhood awareness in vehicular ad hoc networks
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
A sybil attack detection approach using neighboring vehicles in VANET
Proceedings of the 4th international conference on Security of information and networks
Preserving security and privacy in large-scale VANETs
ICICS'11 Proceedings of the 13th international conference on Information and communications security
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
Journal of Network and Computer Applications
Coordination, conventions and the self-organisation of sustainable institutions
PRIMA'11 Proceedings of the 14th international conference on Agents in Principle, Agents in Practice
Efficient and multi-level privacy-preserving communication protocol for VANET
Computers and Electrical Engineering
Efficient HMAC-based secure communication for VANETs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security and Communication Networks
Misbehavior detection based on ensemble learning in VANET
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Security solutions for highly dynamic car2x networks in the KoFAS initiative
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
Secure and privacy-preserving, timed vehicular communications
International Journal of Ad Hoc and Ubiquitous Computing
Specifying and implementing an eventual leader service for dynamic systems
International Journal of Web and Grid Services
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section: Extended Version of SASO 2011 Best Paper
Detection of incorrect position information using speed and time span verification in VANET
Proceedings of the Fifth International Conference on Security of Information and Networks
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy
Security and Communication Networks
Practical privacy for value-added applications in vehicular ad hoc networks
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
Trust Management for VANETs: Challenges, Desired Properties and Future Directions
International Journal of Distributed Systems and Technologies
Mechanism for Privacy Preservation in VANETS
International Journal of Grid and High Performance Computing
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs
International Journal of Information Security and Privacy
A simplified privacy preserving message delivery protocol in VDTNs
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Minimax control for cyber-physical systems under network packet scheduling attacks
Proceedings of the 2nd ACM international conference on High confidence networked systems
Short-Term linkable group signatures with categorized batch verification
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Toward a secure batch verification with group testing for VANET
Wireless Networks
Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks
Multimedia Tools and Applications
Privacy representation in VANET
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Efficient communication scheme with confidentiality and privacy for vehicular networks
Computers and Electrical Engineering
How to build vehicular ad-hoc networks on smartphones
Journal of Systems Architecture: the EUROMICRO Journal
An in-depth analysis on traffic flooding attacks detection and system using data mining techniques
Journal of Systems Architecture: the EUROMICRO Journal
Secure Handover Authentication Protocol Based on Bilinear Pairings
Wireless Personal Communications: An International Journal
Prevention of DoS Attacks in VANET
Wireless Personal Communications: An International Journal
Reconfigurable and parallelized network coding decoder for VANETs
Mobile Information Systems
An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks
Computers and Electrical Engineering
Hi-index | 0.01 |
Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness and efficiency.