Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
The Threat of Intelligent Collisions
IT Professional
Some research questions for computational transportation science
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
A reputation system for traffic safety event on vehicular ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on enabling Wireless Technologies for Green Pervasive Computing
Timing attack in vehicular network
Proceedings of the 15th WSEAS international conference on Computers
Mobile Networks and Applications
Review: Information management in vehicular ad hoc networks: A review
Journal of Network and Computer Applications
Hi-index | 0.00 |
Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the messages exchanged between the vehicles and between the vehicles and specialized infrastructure be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. We rank the identified threats according to the European Telecommunications Standards Institute's (ETSI) threat analysis methodology. We also discuss possible countermeasures to the most critical threats.