2008
DOI: 10.1109/mcom.2008.4689252
|View full text |Cite
|
Sign up to set email alerts
|

Secure vehicular communication systems: design and architecture

Abstract: Significant developments took place over the past few years in the area of vehicular communication (VC) systems. Now, it is well-understood in the community that security and protection of private user information are a prerequisite for the deployment of the technology. This is so exactly because the benefits of VC systems, with the mission to enhance transportation safety and efficiency, are at stake. Without the integration of strong and practical security and privacy enhancing mechanisms, VC systems could b… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
332
0
1

Year Published

2010
2010
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 432 publications
(334 citation statements)
references
References 12 publications
1
332
0
1
Order By: Relevance
“…On the other hand, a direct application of existing security solutions from the Internet domain is not desired as they cannot meet VC security and privacy requirements [13,14]. What we are after is a comprehensive security and privacy-preserving identity management that is a synthesis of the current VC and Internetbased standards ( Figure 1).…”
Section: V M O T I Vat I O N a N D D E S I G N C H O I C E Smentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, a direct application of existing security solutions from the Internet domain is not desired as they cannot meet VC security and privacy requirements [13,14]. What we are after is a comprehensive security and privacy-preserving identity management that is a synthesis of the current VC and Internetbased standards ( Figure 1).…”
Section: V M O T I Vat I O N a N D D E S I G N C H O I C E Smentioning
confidence: 99%
“…Communication modules operate either in an ad-hoc manner (i.e., IEEE Wireless Access in Vehicular Environments (WAVE) [9] 802.11p) or over the existing cellular infrastructure (i.e., over 3G/LTE networks). VC systems need strong and practical security and user privacy mechanisms to meet the rigid requirements of vehicular networking environments [13,14]. Standardization bodies and working groups such as the IEEE 1609 working group, the Car2Car Communication Consortium (C2C-CC) [15] and the European Telecommunications Standards Institute (ETSI) [5], have been releasing VC-related specifications for multi-channel wireless operations, message formats, as well as security and privacy-preserving architectures.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Kargl et al [1] discussed implementation, performance, and research challenges in VANET in detail. Similarly, Papadimatroits et al [11] outlined design and architectural issues in VANET. In other words, most of the research work on VANET is carried out from the security and privacy standpoint because those are the main obstacles in VANET deployment.…”
Section: State Of the Art Regarding Vanet And Vanet-based Cloudsmentioning
confidence: 99%
“…The second assumption is that a Secure Location Verification service is being executed by vehicles, to determine which ones are actually in its vicinity [9].…”
Section: Working Assumptionsmentioning
confidence: 99%