Providing VANET security through active position detection
Computer Communications
Report on the "secure vehicular communications: results and challenges ahead" workshop
ACM SIGMOBILE Mobile Computing and Communications Review
SAT: situation-aware trust architecture for vehicular networks
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
Design and analysis of a lightweight certificate revocation mechanism for VANET
Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking
Removal of misbehaving insiders in anonymous VANETs
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
A proposal for secure vehicular communications
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
MAAC: message authentication acceleration protocol for vehicular ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure traffic data propagation in Vehicular Ad Hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Privacy in inter-vehicular networks: why simple pseudonym change is not enough
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
VWCA: An efficient clustering algorithm in vehicular ad hoc networks
Journal of Network and Computer Applications
Complementing public key infrastructure to secure vehicular ad hoc networks
IEEE Wireless Communications
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
A reputation system for traffic safety event on vehicular ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on enabling Wireless Technologies for Green Pervasive Computing
Security in vehicular adhoc networks: a survey
Proceedings of the 2011 International Conference on Communication, Computing & Security
Journal of Network and Computer Applications
Policy Management for Secure Data Access Control in Vehicular Networks
Journal of Network and Systems Management
Preserving security and privacy in large-scale VANETs
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Misbehavior detection based on ensemble learning in VANET
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Central misbehavior evaluation for VANETs based on mobility data plausibility
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
Secure and privacy-preserving, timed vehicular communications
International Journal of Ad Hoc and Ubiquitous Computing
Examining privacy in vehicular ad-hoc networks
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Trust modeling for message relay control and local action decision making in VANETs
Security and Communication Networks
Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks
Multimedia Tools and Applications
WEVAN - A mechanism for evidence creation and verification in VANETs
Journal of Systems Architecture: the EUROMICRO Journal
Hi-index | 0.07 |
Vehicular networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor and a significant challenge to be met. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment. Existing networks rely mainly on node certificate revocation for attacker eviction, but the lack of an omnipresent infrastructure in VNs may unacceptably delay the retrieval of the most recent and relevant revocation information; this will especially be the case in the early deployment stages of such a highly volatile and large-scale system. In this paper, we address this specific problem. We propose protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system. We tailor our design to the VN characteristics and analyze our system. Our results show that the distributed approach to contain nodes and contribute to their eviction is efficiently feasible and achieves a sufficient level of robustness.