2011 13th Asia-Pacific Network Operations and Management Symposium 2011
DOI: 10.1109/apnoms.2011.6077002
|View full text |Cite
|
Sign up to set email alerts
|

Beacon-based trust management for location privacy enhancement VANETs

Abstract: In recent years more and more studies are focused on trust management of vehicle ad-hoc networks (VANETs). However, little attention has been given to the issue of location privacy of the existing trust methodologies in the literature. Although traffic safety remains to be the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither of them can be ignored. In this paper, we propose a trust scheme which aims to thwart internal attackers in privacy enhanced VANETS. In the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 37 publications
(40 reference statements)
0
11
0
Order By: Relevance
“…Then, the problems of decision delay are discussed in the next subsection. Meanwhile, the adaptive decision‐making method is also introduced . The adapted model location privacy metric is discussed in this section and also how to obtain maximum service usability constraints by location privacy.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…Then, the problems of decision delay are discussed in the next subsection. Meanwhile, the adaptive decision‐making method is also introduced . The adapted model location privacy metric is discussed in this section and also how to obtain maximum service usability constraints by location privacy.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…First problem is that long time period during this interval may cause vehicles to receive malicious event messages. Another problem is time efficiency in decision making because pseudonym time will expire, so malicious vehicle cheats other vehicles more easily to receive malicious event messages rather than RS event messages which will have an effect on decision and adversely know the vehicle's exact identity …”
Section: Proposed Methodsmentioning
confidence: 99%
See 3 more Smart Citations