In recent years more and more studies are focused on trust management of vehicle ad-hoc networks (VANETs). However, little attention has been given to the issue of location privacy of the existing trust methodologies in the literature. Although traffic safety remains to be the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither of them can be ignored. In this paper, we propose a trust scheme which aims to thwart internal attackers in privacy enhanced VANETS. In the proposed scheme a secure broadcast authentication protocol and beacon-based trust management system are being employed to maintain the trustworthiness of vehicles. We adopt Dempster-Shafer Theory to incorporate trustworthiness of event message with vehicle trustworthiness from multiple vehicles. In order to ensure the reliability of the proposed scheme, we evaluate the performance under alteration and denial-ofservice attack models. The simulation results show that the proposed system is highly resilient to adversary attacks no matter whether it is under fixed silent period (FSP) scheme or random silent period (RSP) location privacy enhancement scheme.
Recently, adopting open source software into software development has become a growing trend in the IT software industry. Unlike the general commercial software, open source software leverages the capability of the communities to improve the quality, but also reduce the cost of software development. This paper aims at analyzing the influence factors of applying open source software in software reuse. We begin by proposing our framework for enhancing the open source software usage and then set out to determine the influence factors of software reuse. A reuse system based on our proposed framework is implemented. For the assessment, a questionnaire survey and analysis of 20 software projects are carried out to evaluate our approach. There are 50 experienced corresponding project managers and developers participating in our experiments. The assessment shows that reuse factors of projects managers and developers influence the OSS reuse.
The ongoing e-Government Program in Taiwan started in 1997. It is based on the Government Service Network, which is the backbone infrastructure of the network transaction environment. During the first phase of this program in 1998, Taiwan established its first Certification Authority, namely, the Government Certification Authority (GCA), and this launched the electronic certification services in Taiwan. From 2001 to 2004, the Government Public Key Infrastructure (GPKI) has been established according to the planning set forth in the e-Government Program with the aim of strengthening electronic government infrastructure and establishing electronic certification and security applications for executive administration. Besides GPKI applications, PKI interoperability has become a major issue in Taiwan recently. Several interoperability schemes, such as strict hierarchy and Bridge Certificate Authority (BCA), have been deployed in different PKI domains. To achieve global PKI interoperability in Taiwan, BCA is being adapted as a major CA-CA interoperability engine, which will ensure trusted relationships between the different PKI domains.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.