Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Certificate revocation list distribution in vehicular communication systems
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
A security framework with strong non-repudiation and privacy in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Security in vehicular ad hoc networks
IEEE Communications Magazine
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
Hi-index | 0.00 |
Privacy, authentication, confidentiality and non repudiation are the most desired security attributes for all vehicular ad hoc network (VANET) applications. A lot of solutions have been presented to address these issues. However, they are mostly dependent on centralized certificate architecture and some sort of hardware-based security. These solutions are expensive to carry out and lack the incentive for both users and service providers to deploy, which make them especially difficult to be implemented during the important initial deployment stage of VANET. In this paper, we present a distributed security architecture for VANET that does not rest on expensive security hardware or elaborate security infrastructure. The architecture can be incrementally deployed, facilitating small companies to jump in the VANET business, and can fill the void during the VANET initial deployment phase. Our solution is based on spatial and temporal restricted certificates, which are issued upon user's request and can be used for various VANET applications. Due to the restricted nature of these certificates, the certificate revocation process is simple and efficient, which solves another drawback of existing solutions.