The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We lay ground for a comprehensive investigation of “traffic-related” threats to vehicular networks. While current research in the vehicular networks security area has done a good job in recognizing standard security and cryptographic threats, detailed modeling and analysis of threats that are specific to vehicle traffic are rarely considered in the literature. In this paper we study the problem of...
A self-certified implicit certificate has desirable features which are suitable for use in constrained environments such as in vehicular communication networks. An implicit certificate is shorter in length than an explicit certificate. A self-certified implicit certificate scheme allows a user to generate its private key and the associated public key. It is also desirable in vehicular communication...
Safety is the only way home. Broadcasting techniques have been applied widely to improve the traffic safety, especially pileup crash avoidance by sending the emergency messages to alert drivers; however, such application often suffers from the broadcast storm, hidden node, interference, and contention problem. In the paper a novel area-based broadcast protocol was proposed. Its relaying model running...
The security of Vehicular Ad Hoc Networks (VANET) has mostly directed the attention of today research efforts, while comprehensive solutions to protect the network from adversary and attacks still need to be improved, trying to reach a satisfactory level, for the driver and manufacturer to achieve safety of life and infotainment. The need for a robust VANET networks is strongly dependent on their...
In vehicular ad hoc networks (VANETs), the malicious messages and tampered messages threat other drivers' life or confuse the traffic order possibly. The anonymity has to be traceable when the law enforcement authority wants to figure out the accountabilities about the anonymity. We describe the problem that characterizes the privacy of VANETs and proposes a new anonymous key mechanism with a system...
Vehicular ad hoc networks (VANETs) require a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A public key infrastructure (PKI) can provide this functionality using certificates and fixed public keys. However, fixed keys allow an eavesdropper to associate a key with a vehicle and a location, violating drivers' privacy. In this work we propose a VANET...
Vehicular networking (VN) has reached a high level of maturity, but security mechanisms have only recently been explored. The nature of VNs requires that nodes not behaving as expected should be detected without delay and eliminated to avoid possibly fatal traffic accidents. This paper redefines and explores the problem of estimating the vulnerability window as the time it takes to detect and eliminate...
Recently, Vehicular Ad-hoc Networks (VANETs) employing a combination of Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) wireless communication have been proposed to alert drivers about different traffic events. NOTICE, a secure and privacy-aware architecture for the Notification Of Traffic InCidEnts that provides drivers with up-to-the-minute notification about highway conditions, is...
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infrastructure is needed that ensures security requirements like message integrity, confidentiality, and availability. After giving more details on our security infrastructure we discuss privacy issues and especially the problem...
An emerging trend among automobile manufacturers is to introduce wireless technology in the vehicles. By allowing wireless communication, real-time information exchange between vehicles as well as between infrastructure and vehicles becomes a reality. This communication allows for road condition reporting, decision making, and remote diagnostics and firmware updates over-the-air, creating a complex...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.