Probabilistic counting algorithms for data base applications
Journal of Computer and System Sciences
Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Group signatures with verifier-local revocation
Proceedings of the 11th ACM conference on Computer and communications security
TrafficView: traffic data dissemination using car-to-car communication
ACM SIGMOBILE Mobile Computing and Communications Review
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Towards a Security Architecture for Vehicular Ad Hoc Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Detection and localization of sybil nodes in VANETs
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Efficient secure aggregation in VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Secure Anonymous Broadcasting in Vehicular Networks
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
How to protect privacy in floating car data systems
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Catch-up: a data aggregation scheme for vanets
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Certificate revocation list distribution in vehicular communication systems
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Maximizing anonymity of a vehicle through pseudonym updation
Proceedings of the 4th Annual International Conference on Wireless Internet
A fuzzy logic based approach for structure-free aggregation in vehicular ad-hoc networks
Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking
A fundamental scalability criterion for data aggregation in VANETs
Proceedings of the 15th annual international conference on Mobile computing and networking
IEEE Communications Magazine
TACKing together efficient authentication, revocation, and privacy in VANETs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Resilient secure aggregation for vehicular networks
IEEE Network: The Magazine of Global Internetworking
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Quasi-efficient revocation of group signatures
FC'02 Proceedings of the 6th international conference on Financial cryptography
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Privacy in inter-vehicular networks: why simple pseudonym change is not enough
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Foundations of group signatures: the case of dynamic groups
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
IEEE Journal on Selected Areas in Communications
VEACON: A Vehicular Accident Ontology designed to improve safety on the roads
Journal of Network and Computer Applications
Toward a secure batch verification with group testing for VANET
Wireless Networks
Cooperative pseudonym change scheme based on the number of neighbors in VANETs
Journal of Network and Computer Applications
Prevention of DoS Attacks in VANET
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
This article is a position paper on the current security issues in Vehicular Ad hoc Networks (VANETs). VANETs face many interesting research challenges in multiple areas, from privacy and anonymity to the detection and eviction of misbehaving nodes and many others in between. Multiple solutions have been proposed to address those issues. This paper surveys the most relevant while discussing its benefits and drawbacks. The paper explores the newest trends in privacy, anonymity, misbehaving nodes, the dissemination of false information and secure data aggregation, giving a perspective on how we foresee the future of this research area. First, the paper discusses the use of Public Key Infrastructure (PKI) (and certificates revocation), location privacy, anonymity and group signatures for VANETs. Then, it compares several proposals to identify and evict misbehaving and faulty nodes. Finally, the paper explores the differences between syntactic and semantic aggregation techniques, cluster and non-cluster based with fixed and dynamic based areas, while presenting secure as well as probabilistic aggregation schemes.