Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Efficient secure aggregation in VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Accurate data aggregation for VANETs
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Resilient secure aggregation for vehicular networks
IEEE Network: The Magazine of Global Internetworking
REP: Location Privacy for VANETs Using Random Encryption Periods
Mobile Networks and Applications
IEEE Transactions on Wireless Communications
Discrete logarithm based additively homomorphic encryption and secure data aggregation
Information Sciences: an International Journal
A Survey on Trust Management for VANETs
AINA '11 Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications
Progress and challenges in intelligent vehicle area networks
Communications of the ACM
Information dissemination in self-organizing intervehicle networks
IEEE Transactions on Intelligent Transportation Systems
An efficient certificateless aggregate signature with constant pairing computations
Information Sciences: an International Journal
Hi-index | 0.07 |
Vehicular ad hoc networks are wireless networks in which traffic information is distributed from many sources to many destinations. Thus, their deployment requires data authentication mechanisms to detect any malicious behavior of users, such as modification or replay attacks. In this work we describe a new data aggregation protocol for such networks, which uses probabilistic verification to detect those attacks efficiently with minimal overhead and delay. The proposed algorithm also contains an additional security mechanism based on reactive groups created on demand, which ensures a priori that vehicles generate trustworthy information. This paper also provides a comprehensive analysis that includes NS2 simulations and a small-scale implementation with real devices, which show that the proposed protocol is robust.