The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The traffic control system proposed in this article has as its main objectives the security, the reliability and the anonymity of the vehicle access to traffic-restricted urban zones. The aim of these zones is to reduce atmospheric pollution in urban centers. The presented approach makes use of smartphones as a communication device between the user and the virtual barrier, which acts as electronic...
With the number of Electric Vehicles (EVs) increasing, there is a growing need to schedule the charging of EVs in order to optimize grid load and improve stability. Charging scheduling involves several communications between the EV and the charging station (state of charge and time of arrival) happening either immediately before charging or at some earlier point in time. On account of privacy concerns...
In the near future, beacon dissemination base stations will be deployed in shopping mall, supermarkets, stadiums, museums, and theatres to send advertisements offering services and products to the customers with mobile devices. Today, an example of this concept of business model is the Apple's iBeacon. Borrowing this concept from mobile computing, we envision a new opportunity for business modeling...
Privacy in Vehicular Ad-hoc NETworks (VANETs) is one of the most important issues to attract users to this new technology. In this paper we propose a novel protocol that allows vehicles using the same application in a VANET to agree on an encryption key to exchange confidential data while preserving the privacy. We do this by combining the Elliptic Curve Integrated Encryption Scheme (ECIES) with ring...
With the advantages of vehicle networks, cloud computing, Vehicle Cloud Computing (VCC) has emerged, wins a lot of interests. In this paper, we propose an attack detection scheme in the VCC, that can detect the potential attacks launched by malicious vehicles, while preserving benign vehicles' privacy. First of all, we propose a distributed secret key distribution scheme, where multiple authorities...
Requirement of safety, roadway capacity and efficiency in vehicular network, which makes autonomous driving concept continue to be of interest. To achieve automated cooperative driving, vehicles form a platoon. For the authentication in vehicular platoons, efficiency and security are the two things of great significance. Cooperative authentication is a way to help recognize false identities and messages...
Carpooling, as an effective and eco-friendly travel mode, becomes a kind of public spontaneous behavior with multiple travellers sharing a vehicle to reduce individuals' travel cost, carbon emissions and traffic congestion. Although ubiquitous network access offers great convenience for travellers to find carpools, the safety becomes a big obstacle for them to accept this emerging travel mode. To...
In vehicular networks (VN), the response time is critical, whereas, an autonomous and efficient way of preventing hazardous situations on roads plays an important role in the successful deployment of the system. Trust or reputation models often need to be integrated with inter-vehicle communication protocols in use to avoid selfish or malicious behavior by the vehicles exploiting the system. Existing...
Vehicular ad hoc network (VANET) allows vehicles to communicate on the road and is becoming a potential solution to improve the traffic safety. Both trust management and privacy protection play critical roles in VANET but there needs to be a trade-off between them. Existing works only focus on each issue separately or resolve both issues with a lack-of-security proposal. In this paper, we propose...
Controller Area Network (CAN) bus in the vehicles is a de facto standard for serial communication to provide an efficient, reliable and economical link between Electronic Control Units (ECU). However, CAN bus does not have enough security features to protect itself from inside or outside attacks. Intrusion Detection System (IDS) is one of the best ways to enhance the vehicle security level. Unlike...
We are proposing a layered and scalable WAVE (Wireless Access for Vehicular Environments) security structure for VANET (Vehicular Ad hoc Network) network. The scalability and variable message delivery are provided by using both asymmetric and symmetric encryption algorithm. The whole region is divided into different security domains and the security related load of each domain is distributed evenly...
In order to better manage the premiums and encourage safe driving, many commercial insurance companies (e.g., Geico, Progressive) are providing options for their customers to install sensors on their vehicles which collect individual vehicle's traveling data. The driver's insurance is linked to his/her driving behavior. At the other end, through analyzing the historical traveling data from a large...
The paper deals with the cryptographic design and experimental implementation of a scheme for (but not limited to) vehicular ad-hoc networks (VANETs). In contrast to existing solutions, our scheme does not need any complex infrastructure (like costly road-side units or special on-board devices) and is based just on users' smart-phones and Internet connection. We call this simplified concept SVANETs...
Most modern metropolitan cities have suffered from increasing traffic accidents and jams. Vehicular ad hoc network (VANET), consisting of information collecting, processing and transmitting units embedded in vehicles assisted by roadside infrastructures, has been proposed as one the most promising solution to problems introduced by the increasing number of vehicles in modern cities. To achieve the...
As the cornerstone of the future intelligent transportation system, vehicular ad hoc networks (VANETs) have attracted intensive attention from the academic and industrial research communities in recent years. For widespread deployment of VANETs, security and privacy issues must be addressed properly. In this paper, we introduce the notion of pseudonym-based cryptography, and present a provable secure...
Wireless communication capabilities of Vehicular Ad Hoc Networks (VANETs) have been utilized in various cutting-edge applications such as Vehicular Social Networks (VSNs). One of the benefits of VSNs is sharing of common-interest information among vehicle drivers. Drivers may benefit from identifying neighbors that have interest common with them along with the extent of their interest. However, there...
Electric vehicle is the automobile that powered by electrical energy stored in batteries. Due to the frequent recharging, vehicles need to be connected to the recharging infrastructure while they are parked. This may disclose drivers' privacy, such as their location that drivers may want to keep secret. In this paper, we propose a scheme to enhance the privacy of the drivers using anonymous credential...
Vehicular ad hoc networks (VANETs) are advanced instances of mobile ad hoc networks with the aim of enhancing the safety and efficiency of road traffic. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. Traffic accident notifications) to other vehicles and remind drivers to change their routes immediately or slow down to avoid dangers. However, some concerns on security...
Messages spreading inside vehicular ad hoc networks (VANETs) generally need to achieve the property of verifiability and content integrity, while preserving user privacy. Otherwise, VANETs will either fall into chaos, or prevent users from embracing it. To achieve this goal, we propose a protocol, which contains a priori and posteriori countermeasures, to guarantee these features. The a priori process...
Location privacy remains an open issue in VANETs. Although, frequently pseudonym changing is commonly accepted as solution to protect privacy in VANETs, many studies have been shown its weakness to provide the required level of privacy protection. In this paper, we propose a practical pseudonym changing strategy, called Silence & Swap at Signalized Intersection (S2SI). S2SI consists of two...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.