Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks 2006
DOI: 10.1145/1161064.1161075
|View full text |Cite
|
Sign up to set email alerts
|

Improved security in geographic ad hoc routing through autonomous position verification

Abstract: Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to other MANETs, these so called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
83
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 123 publications
(83 citation statements)
references
References 23 publications
(27 reference statements)
0
83
0
Order By: Relevance
“…In Reference [12], we have proposed a set of autonomous and cooperative mechanisms that enable position verification. The autonomous mechanisms have been studied in detail in Reference [13]. In this work, we provide a complete view on the problem and our proposed solution and we complement previous work with more details on cooperative sensors.…”
mentioning
confidence: 98%
“…In Reference [12], we have proposed a set of autonomous and cooperative mechanisms that enable position verification. The autonomous mechanisms have been studied in detail in Reference [13]. In this work, we provide a complete view on the problem and our proposed solution and we complement previous work with more details on cooperative sensors.…”
mentioning
confidence: 98%
“…Moreover, a strict registration may lead to serious privacy troubles. In position verification [26], the position of nodes will be verified. The goal is to make certain that each physical node refers to one and only one identity.…”
Section: Sybil Attackmentioning
confidence: 99%
“…Leinmüller et al [10] proposed a method to secure position information by using hard thresholds to detect false locations. Vehicles monitor data to verify the reported position.…”
Section: Related Workmentioning
confidence: 99%
“…Second, radar does not work and it cannot harm the system. In the scenario without radar, we can apply the method proposed by Leinmüller [10]. They detect radio signals and use a hard threshold to determine the compromised vehicles.…”
Section: Possible Attacksmentioning
confidence: 99%
See 1 more Smart Citation