The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Efficient secure aggregation in VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
An identity-based security framework For VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
WNS2 '06 Proceeding from the 2006 workshop on ns-2: the IP network simulator
WNS2 '06 Proceeding from the 2006 workshop on ns-2: the IP network simulator
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Security certificate revocation list distribution for vanet
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Maximizing anonymity of a vehicle through pseudonym updation
Proceedings of the 4th Annual International Conference on Wireless Internet
A proposal for secure vehicular communications
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
IEEE Communications Magazine
TACKing together efficient authentication, revocation, and privacy in VANETs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Roadcast: a popularity aware content sharing scheme in VANETs
ACM SIGMOBILE Mobile Computing and Communications Review
REP: Location Privacy for VANETs Using Random Encryption Periods
Mobile Networks and Applications
DESCV--A Secure Wireless Communication Scheme for Vehicle ad hoc Networking
Mobile Networks and Applications
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
This article describes a scheme which to the best of our knowledge is the first one to use user signatures to share information about Points of Interest in Vehicular Ad hoc Networks. In this scheme, users rate restaurants, hotels, etc. and sign those rates with their private key. Then, they broadcast that information and other vehicles store it for future use. When another user needs a Point of Interest recommendation he queries the system for the other users stored reviews and after he visits that Points of Interest for himself, he evaluates it and his level of trust in the reviewers with rates similar to his own increases. In the end, a user will be able to request to his vehicle information on a certain Point of Interest category and it will respond with the recommendations made by other users, prioritizing the ones in the user's Web of Trust. poiSim is the tool designed to simulate this scheme. It processes a 24h mobility trace produced by a Multi-Agent Traffic Simulator, which realistically simulates public and private traffic over regional maps of Switzerland. The result is a Chains of Trust simulation with over 260,000 nodes, which shows that the proposed scheme performs satisfactorily in a realistic scenario.