Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Decentralized discovery of free parking places
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks
Computer Communications
TSVC: timed efficient and secure vehicular communications with privacy preserving
IEEE Transactions on Wireless Communications - Part 1
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
Secure vehicular communication systems: implementation, performance, and research challenges
IEEE Communications Magazine
Communication patterns in VANETs
IEEE Communications Magazine
Certificate revocation and certificate update
IEEE Journal on Selected Areas in Communications
Location-Aware Services over Vehicular Ad-Hoc Networks using Car-to-Car Communication
IEEE Journal on Selected Areas in Communications
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
Hi-index | 0.00 |
In this paper, we propose a secure multimedia resource trading system in a vehicular ad hoc network, leveraging a short-time self-certificate signature scheme. The short-time self-certificate signature does not need certificate verification overhead. Thus, it can significantly reduce computation and communication delay in the mobile environment. In addition, we present a promising and practical framework for the VANET-based entertainment service by deploying our secure trading system. The main advantage the framework is that it offers fair resource trading and complete transaction between vehicles without the mediation of a dedicated on-line trusted third party. Furthermore, the proposed scheme can prevent selfish vehicles and detect malicious vehicles trying to disguise themselves as resource sellers or repudiating receipt of multimedia resources. Our simulation results and analysis demonstrate validity and practicality of our framework.