IEEE Transactions on Software Engineering - Special issue on formal methods in software practice
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Wi-Fi in Ad Hoc Mode: A Measurement Study
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Modeling mobility for vehicular ad-hoc networks
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Supporting policy-driven behaviors in web services: experiences and issues
Proceedings of the 2nd international conference on Service oriented computing
WORDS '05 Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
A Robust Testing Framework for Verifying Web Services by Completeness and Consistency Analysis
SOSE '05 Proceedings of the IEEE International Workshop
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Trust for Vehicular Applications
ISADS '07 Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Providing VANET security through active position detection
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Policy-Based Information Sharing in Publish/Subscribe Middleware
POLICY '08 Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
Performance analysis of DRAMA: a distributed policy-based system for MANET management
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
IEEE Journal on Selected Areas in Communications
Situation-aware trust architecture for vehicular networks
IEEE Communications Magazine
Hi-index | 0.00 |
The state-of-the-art research in vehicular network security does not address the need for low latency message access control in vehicular applications with tight connection time and message delay requirements. In existing security solutions, the major limitation is that no trust establishment mechanisms that adapt to rapidly changing scenarios and highly mobile environments (mainly because of key management delay, processing overhead, and changing communication peers). To address this issue, we present a policy management framework for secure data access control in vehicular networks. Our solution address two interrelated research areas to achieve efficiency and scalability for data access control and policy management in highly dynamic vehicular networks. The main contributions are in two-fold: (a) efficient key management and group-based policy enforcement using attribute-based cryptography; and (b) dynamic security policy management framework and methodology to manage credentials based on role, time, location and other situation dependent attributes. Our solution utilizes efficient attribute-based cryptography algorithm to achieve unprecedented speedups in message processing time to meet the real-time requirement. To demonstrate the effectiveness of our proposed solution, a systematic and comprehensive evaluation is produced to valid our proposed solution.