An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Coopertive Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness
Informatik bewegt: Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik e.v. (GI)
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
GBR: Grid Based Random Key Predistribution for Wireless Sensor Network
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
Low-Latency routing in ad hoc wireless networks using finite horizons
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Practical pay-TV scheme using traitor tracing scheme for multiple channels
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Self-configurable key pre-distribution in mobile ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Securing communication trees in sensor networks
ALGOSENSORS'06 Proceedings of the Second international conference on Algorithmic Aspects of Wireless Sensor Networks
Hi-index | 0.00 |
In this paper the Vehicle Ad Hoc Network (VANET) is examined. As widely agreed VANETs must rely heavily on node-to-node communication while ease of access has to be assured at the same time. Beside the performance ensuring data authentication is another concern in VANETs. In our paper we focus on security aspects for the VANETs that aim to ensure data authentication and allow to ensure data secrecy. Ensuring data secrecy is not a standard feature of the VANETs since usually it is assumed that nodes in the network has to be able to receive all information send over the channel. However we think that it is necessary to ensure security against data eavesdrop and message forgery in some applications (e.g. police pursuits or military convoys).