The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Towards a Security Architecture for Vehicular Ad Hoc Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Efficient secure aggregation in VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Certificate revocation list distribution in vehicular communication systems
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Security certificate revocation list distribution for vanet
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Challenges of intervehicle ad hoc networks
IEEE Transactions on Intelligent Transportation Systems
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
IEEE Journal on Selected Areas in Communications
Prevention of DoS Attacks in VANET
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We present two novel approaches to provide reliable traffic information propagation: two-directional data verification, and time-based data verification. The traffic message is sent through two (spatially or temporally spaced) channels. A recipient vehicle verifies the message integrity by checking if data received from both channels are matched. Compared with the popular public-key based security systems, the proposed approaches are much simpler and cheaper to implement, especially during the initial transition stage when a mature VANET network infrastructure does not exist.