IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Route Maintenance in a Wireless Mobile Ad Hoc Network
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Ontology-Based Structured Cosine Similarity in Speech Document Summarization
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Towards a Security Architecture for Vehicular Ad Hoc Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Detection and localization of sybil nodes in VANETs
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Improved security in geographic ad hoc routing through autonomous position verification
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Efficient secure aggregation in VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Emergency related video streaming in VANET using network coding
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
Multi-object adaptive cruise control
HSCC'03 Proceedings of the 6th international conference on Hybrid systems: computation and control
Influence of falsified position data on geographic ad-hoc routing
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
An asymmetric security mechanism for navigation signals
IH'04 Proceedings of the 6th international conference on Information Hiding
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
IEEE Journal on Selected Areas in Communications
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
VWCA: An efficient clustering algorithm in vehicular ad hoc networks
Journal of Network and Computer Applications
Data fusion for location integrity in vehicle ad hoc networks
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing
Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks
Multimedia Tools and Applications
Mobile Networks and Applications
Hi-index | 0.24 |
Vehicle position is one of the most valuable pieces of information in a Vehicular Ad hoc Network (VANET). The main contribution of this work is a novel approach to enhancing position security in VANETs. We achieve local security by enlisting the help of on-board radar to detect neighboring vehicles and to confirm their announced coordinates. Local security is extended to achieve global security by using preset position-based groups to create a communication network and by using a dynamic challenging mechanism to confirm remote position information. Our solution is predicated on the widely accepted assumption that the vast majority of vehicles are honest and behave responsibly. Extensive simulations confirm the quality of the proposed solution by measuring how fast compromised vehicles can be detected under various conditions.