2010
DOI: 10.1109/tvt.2010.2045014
|View full text |Cite
|
Sign up to set email alerts
|

Design and Performance of Secure Geocast for Vehicular Communication

Abstract: Abstract-The characteristics of vehicular communication environments and their networking and application requirements have led to the development of unique networking protocols. They enable vehicle-to-vehicle and vehicle-to-infrastructure communication based on the IEEE 802.11 technology, ad hoc principles, and wireless multihop techniques using geographical positions. These protocols, which are commonly referred to as Geocast, greatly support the vehicular communication and applications but necessitate a tai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(21 citation statements)
references
References 26 publications
0
21
0
Order By: Relevance
“…Divecha et al (2007) [80] compare the effects of various mobility models on the DSR (Johnson and Maltz, 2007, [81]) and Destination-Sequenced Distance Vector (DSDV) (Perkins and Bhagwat, 1994, [24]) routing protocols, using ns-2 developed and extended for the Monarch Project (nS2, nd). Festag and colleagues (2010) [82] use ns-2 to evaluate their new secure Geocast solution. Papageorgiou'et al (2012) discuss an implementation, which adds on a module for ns-2 to provide more realistic mobility models.…”
Section: Ns-2 and Ns-3 In Mobile Ad Hoc Network Researchmentioning
confidence: 99%
“…Divecha et al (2007) [80] compare the effects of various mobility models on the DSR (Johnson and Maltz, 2007, [81]) and Destination-Sequenced Distance Vector (DSDV) (Perkins and Bhagwat, 1994, [24]) routing protocols, using ns-2 developed and extended for the Monarch Project (nS2, nd). Festag and colleagues (2010) [82] use ns-2 to evaluate their new secure Geocast solution. Papageorgiou'et al (2012) discuss an implementation, which adds on a module for ns-2 to provide more realistic mobility models.…”
Section: Ns-2 and Ns-3 In Mobile Ad Hoc Network Researchmentioning
confidence: 99%
“…We used VANET-SIM simulator for vehicle mobility coupled with ns-3 simulator for network simulation [32]. We further set our scenario based on the IEEE 802.11p VANET platform range which is 2.56 Mbps in highly populated street such as highways that use DSRC, to a maximum transmission range of 6 Mbps.…”
Section: Simulationmentioning
confidence: 99%
“…We emphasize we are not concerned here with the validity of the message content, e.g., the correctness of a location or an alert about emergency braking; those are orthogonal and can be addressed by relevant consistency checking ( [6], [7]) and data-centric security schemes [9]. Here, we are concerned with incorrectly signed (with arbitrary content) messages, and the attempt to legitimize them by improper, adversarial use of our scheme.…”
Section: Security Analysismentioning
confidence: 99%