Privacy vs. authenticity
Communications of the ACM
Medium access and radio resource management for ad hoc networks based on UTRA TDD
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Software Implementation of the NIST Elliptic Curves Over Prime Fields
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Secure Broadcast Communication in Wired and Wireless Networks
Secure Broadcast Communication in Wired and Wireless Networks
Tradeoffs in certificate revocation schemes
ACM SIGCOMM Computer Communication Review
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Vehicle-to-vehicle safety messaging in DSRC
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
The Threat of Intelligent Collisions
IT Professional
An asymmetric security mechanism for navigation signals
IH'04 Proceedings of the 6th international conference on Information Hiding
Detection and localization of sybil nodes in VANETs
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Efficient secure aggregation in VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
An identity-based security framework For VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Analysis of multi-hop emergency message propagation in vehicular ad hoc networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Secure broadcast for inter vehicle communications
International Journal of High Performance Computing and Networking
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
Computer Standards & Interfaces
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks
Computer Communications
Providing VANET security through active position detection
Computer Communications
A novel secure communication scheme in vehicular ad hoc networks
Computer Communications
How to protect privacy in floating car data systems
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Pervasive and Mobile Computing
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks
Transactions on Computational Science IV
Efficient user revocation for privacy-aware PKI
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
LoBa128, a Lorenz-based PRNG for wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Probabilistic adaptive anonymous authentication in vehicular networks
Journal of Computer Science and Technology
Design and analysis of a lightweight certificate revocation mechanism for VANET
Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking
Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Removal of misbehaving insiders in anonymous VANETs
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
TACKing together efficient authentication, revocation, and privacy in VANETs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Survivable keying for wireless ad hoc networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Reliable and secure broadcast communication over resource constrained systems
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
A security framework with strong non-repudiation and privacy in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
SeGCom: secure group communication in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Piggyback cooperative repetition for reliable broadcasting of safety messages in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Performance of broadcast authentication for secure V2V safety applications: a holistic view
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
The UMTS-AKA protocols for intelligent transportation systems
EURASIP Journal on Wireless Communications and Networking
Research on vehicular ad hoc networks
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Security in service-oriented vehicular networks
IEEE Wireless Communications
Mobile Networks and Applications
REP: Location Privacy for VANETs Using Random Encryption Periods
Mobile Networks and Applications
On the efficiency of secure beaconing in VANETs
Proceedings of the third ACM conference on Wireless network security
Vehicular telematics over heterogeneous wireless networks: A survey
Computer Communications
On the feasibility of UMTS-based Traffic Information Systems
Ad Hoc Networks
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Using TPMs to secure vehicular ad-hoc networks (VANETs)
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Analysis of ECDSA authentication processing in VANETs
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
FRAME: an innovative incentive scheme in vehicular networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure traffic data propagation in Vehicular Ad Hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Privacy in inter-vehicular networks: why simple pseudonym change is not enough
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
VANET alert endorsement using multi-source filters
Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking
Efficient CRL search in vehicular network PKIS
Proceedings of the 6th ACM workshop on Digital identity management
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks
Electronic Commerce Research
Formal analysis of privacy for vehicular mix-zones
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Security and privacy in emerging wireless networks
IEEE Wireless Communications
Ubiquitous verification of ubiquitous systems
SEUS'10 Proceedings of the 8th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems
TrafficNet: a L2 network architecture for road-to-vehicle communication
Proceedings of the Third international EURO-NGI network of excellence conference on Wireless systems and mobility in next generation internet
Short paper: a practical view of "mixing" identities in vehicular networks
Proceedings of the fourth ACM conference on Wireless network security
Privacy protection on Vehicular Ad hoc NETworks
International Journal of Ad Hoc and Ubiquitous Computing
Timing attack in vehicular network
Proceedings of the 15th WSEAS international conference on Computers
Journal of Network and Computer Applications
Blind Position Location via Geometric Loci Construction
Wireless Personal Communications: An International Journal
APPA: aggregate privacy-preserving authentication in vehicular Ad Hoc networks
ISC'11 Proceedings of the 14th international conference on Information security
A survey on privacy problems and solutions for VANET based on network model
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Preserving security and privacy in large-scale VANETs
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Threats to security in DSRC/WAVE
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
Journal of Network and Computer Applications
Impact of pseudonym changes on geographic routing in VANETs
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
The UNESCO chair in data privacy research in vehicular networks
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Efficient and multi-level privacy-preserving communication protocol for VANET
Computers and Electrical Engineering
Security and Communication Networks
Modeling and simulation of WAVE 1609.4-based multi-channel vehicular ad hoc networks
Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques
Toward revocation data handling efficiency in VANETs
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
Secure and privacy-preserving, timed vehicular communications
International Journal of Ad Hoc and Ubiquitous Computing
Unified security architecture and protocols using third party identity in V2V and V2I networks
Wireless Communications & Mobile Computing
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy
Security and Communication Networks
Mechanism for Privacy Preservation in VANETS
International Journal of Grid and High Performance Computing
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing
RSU-based message authentication for vehicular ad-hoc networks
Multimedia Tools and Applications
Securing vehicular ad hoc networks with mean field game theory
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Efficient communication scheme with confidentiality and privacy for vehicular networks
Computers and Electrical Engineering
PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks
Computer Standards & Interfaces
A Secure Ambulance Communication Protocol for VANET
Wireless Personal Communications: An International Journal
Mutual authentication in self-organized VANETs
Computer Standards & Interfaces
BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs
Mobile Information Systems
Certificate-free ad hoc anonymous authentication
Information Sciences: an International Journal
Hi-index | 0.00 |
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness, and we carry out a quantitative assessment of the proposed solution.