Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
REP: Location Privacy for VANETs Using Random Encryption Periods
Mobile Networks and Applications
MAAC: message authentication acceleration protocol for vehicular ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
IEEE Journal on Selected Areas in Communications
AMOEBA: Robust Location Privacy Scheme for VANET
IEEE Journal on Selected Areas in Communications
Security in vehicular adhoc networks: a survey
Proceedings of the 2011 International Conference on Communication, Computing & Security
Secure and privacy-preserving, timed vehicular communications
International Journal of Ad Hoc and Ubiquitous Computing
Implementation of SHA-1 and ECDSA for vehicular ad-hoc network using NS-3
Proceedings of the 2nd annual conference on Research in information technology
Secure smartphone-based registration and key deployment for vehicle-to-cloud communications
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
PPAS: privacy protection authentication scheme for VANET
Cluster Computing
Prevention of DoS Attacks in VANET
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Vehicular ad hoc networks are emerging as an effective technology for providing a wide range of safety applications to by-vehicle passengers. Ensuring secure operation is one of the prerequisites for deploying reliable VANETs. In this article we argue that public key infrastructure is the most viable mechanism for securing VANETs as it can meet most VANET security requirements. However, PKI cannot provide certain security requirements such as location privacy, efficient authentication, and distributed and fair revocation. To complement the security services provided by PKI, we introduce complementary security mechanisms that can meet the aforementioned security requirements. Since denial of service attacks have severe consequences on network availability, which is one of the VANET security requirements, we propose a mechanism for mitigating the effect of DoS attacks in VANETs. Simulation results show that the complementary mechanisms together with PKI can efficiently secure VANETs.