Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Towards a Security Architecture for Vehicular Ad Hoc Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
An identity-based security framework For VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
Computer Standards & Interfaces
A novel secure communication scheme in vehicular ad hoc networks
Computer Communications
A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A cross-layer partner-assisted handoff scheme for hierarchical mobile IPv6 in IEEE 802.16e systems
Wireless Communications & Mobile Computing
Mobility and handoff management in vehicular networks: a survey
Wireless Communications & Mobile Computing
Communication protocols for vehicular ad hoc networks
Wireless Communications & Mobile Computing
Measuring the performance of movement-assisted certificate revocation list distribution in VANET
Wireless Communications & Mobile Computing
An improved network mobility service for intelligent transportation systems
Wireless Communications & Mobile Computing
Cross-layer design vehicle-aided handover scheme in VANETs
Wireless Communications & Mobile Computing
Proactive key distribution using neighbor graphs
IEEE Wireless Communications
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Security in vehicular ad hoc networks
IEEE Communications Magazine
Hi-index | 0.00 |
VANETs have been developed to improve the safety and efficiency of transportation systems (V2V communications) and to enable various mobile services for the traveling public (V2I communications). For VANET technologies to be widely available, security issues concerning several essential requirements should be addressed. The existing security architectures and mechanisms have been studied separately in V2V and V2I networks, which results in duplicated efforts, security modules, and more complex security architectures. In this paper, we propose a unified security architecture and its corresponding security protocols that achieve essential security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality. To the best of our knowledge, this paper is the first study that deals with the security protocol in V2V as well as the handover authentication in V2I communications. Our proposal is characterized by a low-complexity security framework, owing to the design and unification of the security architectures and modules. Furthermore, the evaluation of the proposed protocols proves them to be more secure and efficient than existing schemes. Copyright © 2010 John Wiley & Sons, Ltd.