EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Sampling algorithms: lower bounds and applications
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
TrafficView: traffic data dissemination using car-to-car communication
ACM SIGMOBILE Mobile Computing and Communications Review
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Probabilistic counting of large digital signature collections
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Probabilistic aggregation for data dissemination in VANETs
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Providing VANET security through active position detection
Computer Communications
Data aggregation and roadside unit placement for a vanet traffic information system
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Data aggregation in VANETs: the VESPA approach
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Resilient secure aggregation for vehicular networks
IEEE Network: The Magazine of Global Internetworking
Résumé de flux d'événements dans les réseaux inter-véhiculaires
Proceedings of the 5th French-Speaking Conference on Mobility and Ubiquity Computing
Vehicular telematics over heterogeneous wireless networks: A survey
Computer Communications
Secure traffic data propagation in Vehicular Ad Hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
VWCA: An efficient clustering algorithm in vehicular ad hoc networks
Journal of Network and Computer Applications
A reputation system for traffic safety event on vehicular ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on enabling Wireless Technologies for Green Pervasive Computing
Data aggregation based on fuzzy logic for VANETs
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Journal of Network and Computer Applications
APPA: aggregate privacy-preserving authentication in vehicular Ad Hoc networks
ISC'11 Proceedings of the 14th international conference on Information security
Secure Distributed Data Aggregation
Foundations and Trends in Databases
Using Fuzzy Logic for Data Aggregation in Vehicular Networks
DS-RT '12 Proceedings of the 2012 IEEE/ACM 16th International Symposium on Distributed Simulation and Real Time Applications
SeDyA: secure dynamic aggregation in VANETs
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks
Multimedia Tools and Applications
Aggregation and probabilistic verification for data authentication in VANETs
Information Sciences: an International Journal
Review: Information management in vehicular ad hoc networks: A review
Journal of Network and Computer Applications
Hi-index | 0.00 |
Vehicular ad-hoc networks present great opportunity for information exchange and equal opportunity for abuse. Validating traffic information without imposing significant communication overheads is a hard problem. In this paper, we propose a solution for validating aggregated data. The main idea is to use random checks to probabilistically catch the attacker, and thereby discourage attacks in the network. Our solution relies on PKI based authentication and assumes a tamper-proof service in each car to carry out certain secure operations such as signing and timestamping. We try to keep the set of secure operations as small as possible, in accordance with the principle of economy of mechanism. We show that our solution provides security without significant communication overheads.