2009 IEEE Vehicular Networking Conference (VNC) 2009
DOI: 10.1109/vnc.2009.5416377
|View full text |Cite
|
Sign up to set email alerts
|

A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…A solution to prevent SRAAC attacks also mentioned by the authors, which involves making use of a certificate for trusted inter-vehicle communication (T-IVC) and this solution has been created on the basis of the tampering of the software embedded on the vehicles. G. Guette et al [10] proposed the solutions related to privacy and proposed solution is based on Trusted hardware security module i-e TPM. Their goal was to focus on cryptographic key management so that anonymity and security and in vehicle communication could be provided.…”
Section: Fig3 Components Of Trust In Vanetmentioning
confidence: 99%
See 2 more Smart Citations
“…A solution to prevent SRAAC attacks also mentioned by the authors, which involves making use of a certificate for trusted inter-vehicle communication (T-IVC) and this solution has been created on the basis of the tampering of the software embedded on the vehicles. G. Guette et al [10] proposed the solutions related to privacy and proposed solution is based on Trusted hardware security module i-e TPM. Their goal was to focus on cryptographic key management so that anonymity and security and in vehicle communication could be provided.…”
Section: Fig3 Components Of Trust In Vanetmentioning
confidence: 99%
“…In a vehicular environment, user privacy [10] is a very important factor and key security requirement. Once the users' privacy is lost, it is very difficult to re-establish it.…”
Section: Trusted Platform Module (Tpm) and Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…Trusted Application also communicates with application of the other vehicle using parameters such as Position, Signature and Credential. In [15], the author proposed TPM based security architecture to solve the issues of security and privacy for successful deployment of VANET technology. The main focus point is management of cryptographic keys to provide security and anonymity of vehicles communications.…”
Section: Related Workmentioning
confidence: 99%
“…Privacy Certification Authority (PCA) is trusted third party and its purpose is to issue the certificate for AIK and verify the AIK which are used in different types of applications in the network. Guette and Heen [15] proposed the memory stick (USB) for saving AIK certificates. So we are proposing the Direct Anonymous Attestation (DAA) scheme for achieving the vehicular web of trust.…”
Section: Direct Anonymous Attestation (Daa)mentioning
confidence: 99%