2008
DOI: 10.1016/j.csi.2008.03.007
|View full text |Cite
|
Sign up to set email alerts
|

A privacy aware and efficient security infrastructure for vehicular ad hoc networks

Abstract: Abstract. VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infrastructure is needed that ensures security requirements like message integrity, confidentiality, and availability. After giving more details on the requirements we propose a security infrastructure that uses asymmetric as well as symmetric cryptography and tamper resistant hardware. While fulfilling the requirements, our pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 70 publications
(28 citation statements)
references
References 7 publications
0
25
0
Order By: Relevance
“…The need for confidentiality in specific scenarios of VANET implementations has also been discussed in recent works Kamat et al (2006); Li et al (2008); Plöβl & Federrath (2008); Wang et al (2008). Specifically in Wang et al (2008), the protocols of Raya & Hubaux (2007) are extended: session keys for pairs of vehicles are established by using the Diffie-Hellman key agreement protocol while group session keys are established using the key transfer approach.…”
Section: Confidentiality-oriented Schemementioning
confidence: 99%
See 3 more Smart Citations
“…The need for confidentiality in specific scenarios of VANET implementations has also been discussed in recent works Kamat et al (2006); Li et al (2008); Plöβl & Federrath (2008); Wang et al (2008). Specifically in Wang et al (2008), the protocols of Raya & Hubaux (2007) are extended: session keys for pairs of vehicles are established by using the Diffie-Hellman key agreement protocol while group session keys are established using the key transfer approach.…”
Section: Confidentiality-oriented Schemementioning
confidence: 99%
“…Confidentiality Kamat et al (2006); Li et al (2008); Plöβl & Federrath (2008); Wang et al (2008) Some research teams pointed out that the privacy of the communication content should be protected against unauthorized observers. While confidentiality of communicating message can be negligible in most cases, it is e.g.…”
Section: Threshold Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…Modern Intelligent Transportation Systems (ITS) equipments are based on embedded processors able to run complex computational tasks and provided with multithreading and networking capabilities. Consequently, they can expand their typical functionality to offer distributed services both to the traffic control centers and to citizens [2]. The final aim consists of transforming urban environments into smart urban environments, that is, "a small world where all kinds of smart devices are continuously working to make inhabitants' lives more comfortable" [1].…”
Section: Introductionmentioning
confidence: 99%