Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Detection and surveillance technologies: privacy-related requirements and protection schemes
International Journal of Electronic Security and Digital Forensics
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
Computer Standards & Interfaces
Providing VANET security through active position detection
Computer Communications
New PKI Protocols Using Tamper Resistant Hardware
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Experimental Study on Secure Data Collection in Vehicular Sensor Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Distributed misbehavior detection in VANETs
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
A security framework with strong non-repudiation and privacy in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
SeGCom: secure group communication in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Using TPMs to secure vehicular ad-hoc networks (VANETs)
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Detection of radio interference attacks in VANET
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure traffic data propagation in Vehicular Ad Hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Mutual identificatiol1 and key exchange scheme in secure VANETs based on group signature
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
An ID-based aggregate signature scheme with constant pairing computations
Journal of Systems and Software
A novel defense mechanism against sybil attacks in VANET
Proceedings of the 3rd international conference on Security of information and networks
Distributed certificate and application architecture for VANETs
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Defense against Sybil attack in vehicular ad hoc network based on roadside unit support
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
P2-CTM: privacy preserving collaborative traffic monitoring
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Security and privacy in emerging wireless networks
IEEE Wireless Communications
Journal of Network and Computer Applications
Multi-objective optimal combination queries
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
Blind Position Location via Geometric Loci Construction
Wireless Personal Communications: An International Journal
On batch verification with group testing for vehicular communications
Wireless Networks
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
Journal of Network and Computer Applications
Application of secondary information for misbehavior detection in VANETs
NETWORKING'10 Proceedings of the 9th IFIP TC 6 international conference on Networking
EDA for secure and dependable cybercars: challenges and opportunities
Proceedings of the 49th Annual Design Automation Conference
Effective and efficient security policy engines for automotive on-board networks
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
Identification, authentication and tracking algorithm for vehicles using VIN in distributed VANET
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Examining privacy in vehicular ad-hoc networks
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Unified security architecture and protocols using third party identity in V2V and V2I networks
Wireless Communications & Mobile Computing
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs
International Journal of Information Security and Privacy
Decision support protocol for intrusion detection in VANETs
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Trust assurance levels of cybercars in v2x communication
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Hi-index | 0.00 |
The road to a successful introduction of vehicular communications has to pass through the analysis of potential security threats and the design of a robust security architecture able to cope with these threats. In this article we undertake this challenge. In addition to providing a survey of related academic and industrial efforts, we also outline several open problems