2010
DOI: 10.1504/ijahuc.2010.033823
|View full text |Cite
|
Sign up to set email alerts
|

Secure traffic data propagation in Vehicular Ad Hoc Networks

Abstract: Abstract:In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We present two novel approaches to provide reliable traffic information propagation: two-directional data verification, and time-based data verification. The traffic message is sent through two (spatially or temporally spaced) channels. A recipient vehicle verifies the message integrity by checking if data received from both channels a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 27 publications
(29 reference statements)
0
10
0
Order By: Relevance
“…Accurate and up-to-date membership views are needed in platoons for two main reasons, (1) reliable group communication (2) for the leader to make safe and appropriate driving decisions. The key challenges to implementing accurate membership for vehicular environments are the unreliable nature of wireless communication, the high level of dynamism in vehicle movements, interaction with non-automated vehicles [22], and the increased security risks associated with external communication interfaces.…”
Section: Introductionmentioning
confidence: 99%
“…Accurate and up-to-date membership views are needed in platoons for two main reasons, (1) reliable group communication (2) for the leader to make safe and appropriate driving decisions. The key challenges to implementing accurate membership for vehicular environments are the unreliable nature of wireless communication, the high level of dynamism in vehicle movements, interaction with non-automated vehicles [22], and the increased security risks associated with external communication interfaces.…”
Section: Introductionmentioning
confidence: 99%
“…Please check out the publisher version at http://tr.ietejournals.org/. Posted with permission of the Editor-in-Chief 11 [3] x [4] x [5] x [6] x x [7] x [8] x x [9] x [10] x [11] x [12] x [13] x [14] x x [15] NO [16] x [17] x [18] x [19] x [20] x x x [21] x [22] x [23] x [24] x [25] x [26] x x [27] x [28] x [29] x [30] x [31] x [32] x [33] x [34] x x [35] x x [36] x [37] x [38] x [39] x [40] x [41] x…”
Section: Discussionmentioning
confidence: 99%
“…When a vehicle makes a timestamp update request to R 3 , R 3 can create pseudo-ids about its adjacent RSUs, such as PID 1 for R1 and PID 2 for R 2 . Then, Cert_T 3 for V 1 includes {Content: "ATS 3 …”
Section: B Driver's Privacy Protectionmentioning
confidence: 99%
“…As the deployment of VANETs will be gradual, in early-stage VANETs, only a small fraction of the vehicles on the road will be smart vehicles with the capability to participate in the network [3] [20]. In such a system, neighboring-based Sybil attack defense [9][16] [27] may not be applicable.…”
Section: Introductionmentioning
confidence: 99%