A scalable location service for geographic ad hoc routing
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
SAT: situation-aware trust architecture for vehicular networks
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
RoadSpeak: enabling voice chat on roadways using vehicular social networks
Proceedings of the 1st Workshop on Social Network Systems
Establishing email-based social network trust for vehicular networks
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication
SOSE '10 Proceedings of the 2010 Fifth IEEE International Symposium on Service Oriented System Engineering
Policy Management for Secure Data Access Control in Vehicular Networks
Journal of Network and Systems Management
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
Secure vehicular communication systems: implementation, performance, and research challenges
IEEE Communications Magazine
Improved access control mechanism in vehicular ad hoc networks
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Hi-index | 0.25 |
We present a new trust architecture -- Situation-Aware Trust -- to address several important trust issues in vehicular networks. SAT includes three main components: an attributebased policy control model for highly dynamic communication environments, a proactive trust model to build trust among vehicles, and prevent the breakage of existing trust, and an emailbased social network trust system to enhance trust and to allow the set up of a decentralized trust framework. To deploy SAT, we utilize identity-based cryptography to integrate entity trust, data trust, security policy enforcement, and social network trust, allocating a unique identity, and a set of attributes for each entity. We conclude by presenting research challenges and potential research directions that extend this work.