2013
DOI: 10.1002/sec.772
|View full text |Cite
|
Sign up to set email alerts
|

A secure cluster‐based architecture for certificates management in vehicular networks

Abstract: International audienceIn this paper, we propose a distributed and dynamic public key infrastructure for vehicular ad hoc networks. We aim to achieve the fundamental security requirements, particularly the authentication, the confidentiality, and a reliable vehicle-to-vehicle data exchange. To make the certification authority (CA) reachable by all vehicles, we distribute its role among a set of dynamically elected vehicles. The election of dynamic CAs is based on a clustering algorithm where the cluster heads w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 28 publications
(37 reference statements)
0
10
0
Order By: Relevance
“…An attacker can be a cloud member which can attack the user, i.e., in the traffic safety and management applications. To overcome this issue several works have been proposed in VANETs [120,121]. e main aim of VC is established, in which the member can join and leave the cloud anytime in the dynamic trustworthiness mechanism [29].…”
Section: Trustworthiness Between Vc Membersmentioning
confidence: 99%
See 1 more Smart Citation
“…An attacker can be a cloud member which can attack the user, i.e., in the traffic safety and management applications. To overcome this issue several works have been proposed in VANETs [120,121]. e main aim of VC is established, in which the member can join and leave the cloud anytime in the dynamic trustworthiness mechanism [29].…”
Section: Trustworthiness Between Vc Membersmentioning
confidence: 99%
“…Malicious nodes refer to the nodes which affect the performance of the vehicular network such as VANETs and VC. In the VANETs, several research works have been proposed to deal with these issues [86,121]. Also, several methods are proposed to detect the malicious node in the VC [122,123].…”
Section: Malicious Nodesmentioning
confidence: 99%
“…Along with dynamic certification registration authorities and sub cluster heads were also involved in this mechanism. Reference [21] was the extension of [17] as in [17] the issue was detected during the election of certification authorities in which denial of service was occurring. The issue was solved in [21] using VANET dynamic demilitarized zone that would handle the certificate request from the unknown vehicles and prohibit malicious communication between certification authority and nodes.…”
Section: Dynamic Demilitarized Zone Techniquementioning
confidence: 99%
“…Reference [21] was the extension of [17] as in [17] the issue was detected during the election of certification authorities in which denial of service was occurring. The issue was solved in [21] using VANET dynamic demilitarized zone that would handle the certificate request from the unknown vehicles and prohibit malicious communication between certification authority and nodes. Its additional feature was that each vehicle which was at 1-hop from other vehicles sent hello messages, as result the nodes which received that message saved the each and every record of the vehicle and thus response with a joint message to that node.…”
Section: Dynamic Demilitarized Zone Techniquementioning
confidence: 99%
See 1 more Smart Citation