The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security in vehicular ad hoc networks (VANETs) is receiving a significant amount of attention in the field of wireless mobile networking because VANETs are vulnerable to malicious attacks. A number of secure authentication schemes based on asymmetric cryptography have been proposed to prevent such attacks. However, these schemes are not suitable for highly dynamic environments like VANETs, because...
Last few years, vehicular network has been taken more attention of researchers and automotive industries due to life saving factor. Vehicular Ad hoc Network (VANET) needs security to implement the wireless environment and serves users with safety and non safety applications. Attackers generate different attacks in this life saving vehicular network. In this paper, we propose five different classes...
Today's VANET applications are vastly focused towards fulfilling users' requirements on road and making their journey safe and comfortable. In particular, safety applications will provide secure information to users and introduce mechanisms to help reduce the death rate due to road accidents. The most important aspect in such environment is the integrity of this safety information; it must be at all...
A Vehicular Ad-Hoc Network (VANET) is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. The key operation in VANETs is the broadcast of messages. Its main goal is to improve safety and comfort for passengers, but it can also be used for commercial applications. In this latter case, it will be necessary to motivate...
Security plays an important role in the system design with the development of VANETs. Because of the unreliable communications in VANETs, security protocols need more considerations, such as privacy, authentication, and consistency of messages. However, efficiency has been overlooked before, because previous methods incur significant communication overhead. In this paper, we propose a novel security...
There is an urgent need of effective trust management for vehicular ad-hoc networks (VANETs), given the dire consequences of acting on false information sent out by malicious peers in this context. In this paper, we first discuss the challenges for trust management caused by the important characteristics of VANET environments. We then survey existing trust models in multi-agent systems, mobile ad-hoc...
Recent benchmarks indicate that the use of public key cryptography results in non-negligible verification times on platforms with limited processing power. In this paper, we focus on multi-hop Inter-Vehicle Communication and show that the increase in message processing time in vehicular nodes degrades network performance, by decreasing the number of messages that reach destinations. We propose Adaptive...
In recent years, eco-friendly transportation is becoming more and more important. Unmanned vehicle has attracted many researchers' attention from both the academia and industry of, notably, US, EU and Korea. Unmanned vehicle is widely accepted in many public places due to its reliability, security, pollution-free and low-speed. Under these circumstances, inter-vehicle communications has become an...
Security attributes of a Vehicular ad hoc network (VANET) include confidentiality, integrity, authentication, non-repudiation (liability), revocation and privacy. Privacy, having characteristics opposing to the rest of the attributes, makes design of a security architecture quite difficult. A commonly used solution is to have a large number of temporary certificates (i.e., pseudonyms) to achieve these...
A vehicular network must ensure a trust relationship among participating “smart vehicles” (vehicles installed with wireless network devices) and roadside infrastructure in order to maximize the benefit provided by the network. In this paper, we present practical ways to provide reliable reputation scores for vehicles in a vehicular network. Because in most of the time, the majority of people drive...
This paper proposes a system for digital investigation in Vehicular Adhoc Networks (VANets). A set of communicating and cooperating components, entitled observers, which are in charge of evidence collection, are integrated into the On-board and Road-Side units of the VANet. The analysis of evidences is performed at the Road-Side level, to identify occurred attacks and determine the identities and...
In this paper, we propose an efficient security scheme for position-based routing (ESPR) in vehicular ad hoc networks (VANETs). The ESPR scheme considers both digital signature and keyed Hash Message Authentication Code (HMAC), where the key used in calculating the HMAC is shared only between unrevoked On-Board Units (OBUs). In addition, the ESPR scheme uses a novel probabilistic key distribution,...
Vehicular communications are envisioned to play a substantial role in providing safety in transportation by means of safety message exchange. However, the deployment of vehicular networks is strongly dependent on security and privacy features. In this paper, we present a Protocol for Anonymous Authentication in Vehicular Networks (PAAVE) to address the issue of privacy preservation with authority...
PKI-based security in Vehicular Networks has to heavily rely on revoking the malicious user by adding his certificates to a Certificate Revocation List and broadcasting it to all the nodes. In a vehicular network with minimal infrastructure there is a need for a quick and reliable delivery or this CRL to all the nodes. While vehicle-to-vehicle or infrastructure-to-vehicle flooding could seem a natural...
Compared to traditional wireless network routing protocols, geographic routing provides superior scalability and thus is widely used in vehicular ad hoc networks (VANETs). However, it requires every vehicle to broadcast its location information to its neighboring nodes, and this process will compromise user's location privacy. Existing solutions to this problem can be categorized into two groups:...
Vehicle chatting is one of the most promising applications in VANETs, which allows like-minded vehicles to chat on the topics of common interest on the road. However, there exist some newly emerging privacy challenging issues in vehicle chatting application, such as how to find a like-minded vehicle on the road and how to prevent one's interest privacy (IP) from others who are not like-minded? In...
Vehicular safety communication promises to reduce accidents by assistance systems such as cross-traffic assistance. The information exchange is mostly foreseen to be handled via Dedicated Short Range Communication (DSRC). At intersections, DSRC reception is likely to be problematic due to Non-Line-Of-Sight reception conditions. Alternatively, the required information exchange could also be handled...
Acquiring and securing position information is of fundamental importance in vehicular ad hoc networks and their applications. Recently, it has been shown that securing position information can be achieved by enlisting the help of on-board radar devices that have seen a phenomenal penetration of the vehicular market. However, most on-board radar devices have a static range and this can cause a number...
In the near future, vehicles will exchange safety-critical information messages wirelessly with other vehicles on the road and with infrastructure. It is vital to provide secure mechanisms to validate the authenticity and integrity of these messages. The IEEE Standard 1609.2-2006 defines the format of secure messages and identifies security algorithms and mechanism for use in Wireless Access in Vehicular...
Privacy preserving in location-based service (LBS) has been an important issue in Vehicular Ad hoc Network (VANET). Traditional k-anonymity algorithm dealing with location privacy protecting problem does not consider vehicle's mobility and inner collaborator. In this paper, we propose a new algorithm which uses dynamic and mobile aware anonymous peer selecting algorithm to improve the anonymity and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.