The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For telematics applications, entity authentication between vehicles and roadside units (RSUs) with vehicle anonymity plays an important role on providing security and privacy. In 2009, Yim, Choi, and Kim proposed an anonymous authentication protocol in Vehicular Ad-hoc Networks (VANETs) for communications between vehicles and RSUs. The Yim-Choi-Kim scheme employs a traceable ring signature with t-times...
The paper presents verification of privacy preserving authentication protocol for VANETs using SPIN tool. The authentication process involves authentication of the moving vehicle and the corresponding road side unit (RSU) by a fixed infrastructure from (CTA) through RSU. The whole process needs only one request and reply between different entities. The work described the impact of known attack on...
Privacy and security are two important issues in vehicular networks. Users wish to maintain location privacy and anonymity, meaning the identity, location/direction of move of their vehicles remains unknown to everybody with possible exception law enforcement authorities responsible by law to know and maintain such private information. In this paper, we propose a Pre-broadcast based Time Efficient...
In VANETs(Vehicular Ad Hoc Networks), moving from one RSU's coverage region to another will bring reauthentication in the new security domain, which can be named security handover problem. In this paper, based on mobility predictability, we propose a novel anonymous communication scheme called SCPT to address the security handover problem. It uses hash chain for vehicle's anonymous authentication...
VANET has appeared as an interesting but challenging domain where lots of researches are going on. The most important research challenge is the authentication of VANET messages with less communication as well as storage overhead. In this paper, we introduce an infrastructure oriented (RSU-aided or road side unit aided) message authentication scheme named IOMAS with less communication and storage overhead...
Message authentication, to ensure the receiving message is true and coming from the claimed source, is a key issue in vehicular ad hoc network (VANET) because the message may be life-critical, traffic information, or emergence message transmitted by the strange sources. Due to the nature of realtime and high mobility in VANET message, the traditional PKI security schemes are not suitable for VANET...
Wireless communication between vehicles, known as Vehicular Ad hoc NETworking (VANET), will allow providing drivers with information to increase safety, efficiency and comfort in road travel. In this type of networks, warning messages affect decisions taken by drivers so that any wrong message could lead to loss of drivers' time, high money expenditure on fuel, and in the worst-case scenario, traffic...
Vehicular ad hoc network (VANET) has attracted much attention from academia and industries in recent years. Security remains the major concern for VANET application due to innate time constrains. Researchers have proposed a number of solutions to counter such attacks and also to improve certain aspects of security i.e. authentication, privacy, non-repudiation etc. Some of the solutions are based on...
This paper introduces an efficient and spontaneous privacy-preserving protocol for vehicular ad-hoc networks based on revocable ring signature. The proposed protocol has three appealing characteristics: First, it offers conditional privacy-preservation: while a receiver can verify that a message issuer is an authorized participant in the system only a trusted authority can reveal the true identity...
This paper describes a novel idea for distributing certificate revocation lists (CRLs) in a vehicular ad hoc network (VANET) scenario. The idea, Most Pieces Broadcast (MPB), takes advantage of the two distinct channel types in VANETs while reducing contention for the wireless medium. Broadcast methods that reduce wireless medium contention in VANETs are highly desirable to assist in keeping the medium...
To achieve high safety levels in vehicular ad-hoc networks (VANETs), the Dedicated Short Range Communication (DSRC) implies each vehicle to periodically broadcast a safety beacon message. Many safety-related applications in VANET are based on the safety beacon messages. To ensure secure communications, the message authentication and integrity must be verified by respectively verifying the public key...
Vehicular ad hoc networks (VANETs) adopt the public key infrastructure (PKI) and certificate revocation lists (CRLs) to reliably secure the network. In any PKI system, the authentication of a received message is performed by checking that the certificate of the sender is not included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we...
Many results have been published in the literature based on performance measurements obtained from simulations of vehicular networks (VANETs). These simulations use as input traces of vehicle movements that have been generated by traffic simulators which are based on traffic theory models. To our knowledge, no one has published any work based on actual large-scale recordings of vehicle movements....
Intelligent Transportation system (ITS) using wireless and mobile ad-hoc sensor network has inspired many autonomous applications. Vehicular Ad-hoc network (VANET) is an emerging technology where vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communicate wirelessly using dedicated short-range communication band. In sensor based VANET (S-VANET) issues like response time, data aging, bandwidth,...
In vehicular adhoc network (VANET), applications are involved with sensitive and secret information. We address a location-based encryption method that not only ensures messages confidentiality but also authenticates identity and location of communication peers. The authentication of location means that a message can only decrypted by the receiver which is ldquophysicallyrdquo present inside a decryption...
In this paper, we present a novel security solution known as global public key algorithm based on bilinear pairing cryptography concept, for location service in vehicular ad-hoc networks (VANETs). Indeed, many geographic routing protocols used in VANET need location service for obtaining destination position. The location service makes way for major security concern in VANETs. We design an efficient...
Vehicular ad hoc network (VANET) is an emerging type of networks to allow vehicles on roads to communicate for driving safety. An vehicle can broadcast messages (e.g. accident information) to other vehicles. These messages may have impact on other vehicles as well as the traffic control system, so all messages must be signed and authenticated. On the other hand, privacy should be enforced while the...
Vehicular ad hoc networks (VANETs) require a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A public key infrastructure (PKI) can provide this functionality using certificates and fixed public keys. However, fixed keys allow an eavesdropper to associate a key with a vehicle and a location, violating drivers' privacy. In this work we propose a VANET...
Vehicular communications by means of exchanging safety message considerably reduces life and property damage. So securing this message is essential. In this paper, we focus on protocols based on a fixed key infrastructure that establish stronger security in comparison with dynamic structures. These protocols have some problems in terms of implementation issues. In effect, a very important issue is...
Vehicular ad hoc networks (VANETs) are promising approach for facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers.However, it is subject to various malicious abuses and security attacks which hinder it from practical implementation.Effective and robust solutions for addressing security and privacy issues are critical for the wide-spread adoption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.