The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with...
Privacy in Vehicular Ad-hoc NETworks (VANETs) is one of the most important issues to attract users to this new technology. In this paper we propose a novel protocol that allows vehicles using the same application in a VANET to agree on an encryption key to exchange confidential data while preserving the privacy. We do this by combining the Elliptic Curve Integrated Encryption Scheme (ECIES) with ring...
Cognitive radio (CR) networks are becoming an increasingly important part of the wireless networking landscape due to the ever-increasing scarcity of spectrum resources throughout the world. Nowadays CR media is becoming popular wireless communication media for disaster recovery communication network. Although the operational aspects of CR are being explored vigorously, its security aspects have gained...
Caching systems have been proposed for MANETs to increase data availability and reduce data access delays. Every caching system is composed of three main components. The first component is requesting the data items from the server into the caching system. The second component is publishing the cached items in the network (or advertising them). While, the third component relates to nodes requesting...
In this paper we present a security protocol to be used in inter-vehicle communication. We propose an architecture for inter-vehicle networks along with protocols that can be used to establish security. In our architecture we use cellular networks to enhance the security of inter-vehicle networks.
Mobile Ad hoc Networks (MANETs) have become increasingly popular with the rapid emergence of hand-held devices and advanced communication technologies. As a result, several MANET applications have been proposed one of which is the data access application. To enhance the performance of this application cache management systems have been suggested; however, they have been designed regardless of the...
Vehicular ad hoc networks (VANETs) have recently attract extensive attentions as a promising technology for improving traffic safety and efficiency. To make VANETs practical, security, privacy and efficiency are important issues. Anonymity preserving of group signature and lower overhead in verification of batch signature make these two kinds of signatures right tools to design VANET communication...
Vehicular Ad hoc Networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number etc, VANET is vulnerable to be affected by a variety of security threats. In this paper, we firstly introduce the system architecture, applications and categories of attacks in VANET....
For Car-to-X (C2X) communication, group signature based protocols can provide privacy and authentication for vehicles that are members of the respective group. Current group approaches all rely on a centralized group key generation and distribution. We propose a novel decentralized approach based on n-party Diffie-Hellman key establishment. The proposed protocol implies a low latency for key establishment...
For telematics applications, entity authentication between vehicles and roadside units (RSUs) with vehicle anonymity plays an important role on providing security and privacy. In 2009, Yim, Choi, and Kim proposed an anonymous authentication protocol in Vehicular Ad-hoc Networks (VANETs) for communications between vehicles and RSUs. The Yim-Choi-Kim scheme employs a traceable ring signature with t-times...
In mobile ad hoc networks, the security enforcement and its implementation becoming increasingly difficult due to quasi-static nature of the mobile nodes (wireless communication devices), no fixed network topology and more importantly absence of centralized authority. In such networks, communication links between nodes may be bandwidth constrained, messages typically roamed in multi-hoped fashion,...
Public acceptance, and thus the economical success of Vehicular Ad Hoc Networks (VANETs), is highly dependent on the quality of deployed privacy mechanisms. Neither users nor operators should be able to track a given individual. One approach to facilitate this is the usage of pseudonym pools, which allow vehicles to autonomously switch between different identities. We extend this scheme with that...
The paper presents verification of privacy preserving authentication protocol for VANETs using SPIN tool. The authentication process involves authentication of the moving vehicle and the corresponding road side unit (RSU) by a fixed infrastructure from (CTA) through RSU. The whole process needs only one request and reply between different entities. The work described the impact of known attack on...
VANETs continue to mature and their installation is becoming a reality. Many ideas have been exchanged on how best to balance privacy and security. The use of pseudonyms has been almost universally accepted as a critical part of this equation. Simulated results, using ns-3, demonstrate the need for more than a single road side unit (RSU) contact for pseudonym refill due to the limited number of certificates...
Privacy and security are two important issues in vehicular networks. Users wish to maintain location privacy and anonymity, meaning the identity, location/direction of move of their vehicles remains unknown to everybody with possible exception law enforcement authorities responsible by law to know and maintain such private information. In this paper, we propose a Pre-broadcast based Time Efficient...
In order to deploy vehicular communication system, security and privacy issues have to be resolved. In this paper, for achieving secure and privacy preserving communications, an easily implementable PKI-based protocol is proposed. Security requirements for vehicular communications are defined and a detailed definition of the scheme, which uses shared asymmetric keys and PKI techniques to provide anonymous...
Communications through road side units in Vehicular Ad hoc Networks (VANETs) can be used to track the location of vehicles, which makes serious threat on users' privacy. In this paper, we propose and evaluate a novel location privacy enhancement protocol for VANETs. Firstly, we propose an Anonymous Online Service Access (AOSA) protocol. Secondly, we analytically evaluate the anonymity and the unlinkability...
Before the deployment of any vehicular communication system, security and privacy issues have to be resolved. In this paper, for achieving secure and privacy preserving communications, an easily implementable PKI-based protocol is proposed. Security requirements for vehicular communications are defined and a detailed definition of the scheme, which uses shared asymmetric keys and PKI techniques to...
In this paper, we propose a secure data downloading protocol with privacy preservation in vehicular ad hoc networks (VANETs). In the data downloading application, vehicles send requests, such as where is the nearest gas station, at a road side unit (RSU) and receive the corresponding responses from application servers via current or the following RSUs. It would be easy for eavesdroppers to get vehicles'...
This paper introduces an efficient and spontaneous privacy-preserving protocol for vehicular ad-hoc networks based on revocable ring signature. The proposed protocol has three appealing characteristics: First, it offers conditional privacy-preservation: while a receiver can verify that a message issuer is an authorized participant in the system only a trusted authority can reveal the true identity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.