2007
DOI: 10.3233/jcs-2007-15103
|View full text |Cite
|
Sign up to set email alerts
|

Securing vehicular ad hoc networks

Abstract: Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
972
0
2

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 1,368 publications
(976 citation statements)
references
References 29 publications
2
972
0
2
Order By: Relevance
“…Despite the cryptographic measures already proposed for the information security in vehicular networks, the received data may still be wrong [Raya and Hubaux, (2007), especially p.65]. Reasons for this might be bad recognition capabilities or defect sensors at the sender, but also software virus infections or manipulations of the sending car.…”
Section: The Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…Despite the cryptographic measures already proposed for the information security in vehicular networks, the received data may still be wrong [Raya and Hubaux, (2007), especially p.65]. Reasons for this might be bad recognition capabilities or defect sensors at the sender, but also software virus infections or manipulations of the sending car.…”
Section: The Problem Statementmentioning
confidence: 99%
“…In contrast to reputation systems, which are already in discussion for intervehicular communication (e.g., Raya and Hubaux, 2007), the proposed model focuses on the individual car and its experiences. The opinion of others (that is, the reputation) is still considered, with lower priority though.…”
Section: Overview and Termsmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the CRL List is incredibly bulky, the time delay occurs in this system of message authentication. In [4] Raya et.al, have proposed of securing vehicular ad-hoc networks based on pseudonymous scheme, in which pseudonyms are used to hide the real identities of the vehicles. The pseudonyms have only a short life, so the vehicles should contain a large number of pseudonyms in the vehicle"s OBU.…”
Section: Related Workmentioning
confidence: 99%
“…In the recent years, various authors have proposed privacy preserving authentication schemes for secure message communication. The two most common privacy preserving authentication schemes are the pseudonyms based privacy preserving scheme [4][5][6][7][8][9][10][11][12]22, 24], the group signature based privacy preserving scheme [13][14][15][16][17]. Each scheme provides solution to the secure privacy preserving message communication problems in VANET but all of them have some drawbacks.…”
Section: Introductionmentioning
confidence: 99%