2006
DOI: 10.1109/wc-m.2006.250352
|View full text |Cite
|
Sign up to set email alerts
|

Securing Vehicular Communications

Abstract: Initiatives to create safer and more efficient driving conditions have recently begun to draw strong support. Vehicular communications (VC) will play a central role in this effort, enabling a variety of applications for safety, traffic efficiency, driver assistance, and infotainment. For example, warnings for environmental hazards (e.g., ice on the pavement) or abrupt vehicle kinetic changes (e.g., emergency braking), traffic and road conditions (e.g., congestion or construction sites), and tourist information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
311
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 547 publications
(311 citation statements)
references
References 5 publications
0
311
0
Order By: Relevance
“…Deploying a public key infrastructure for individual vehicles (VPKI) is the most common solution for defending against Sybil attack [22] [23].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Deploying a public key infrastructure for individual vehicles (VPKI) is the most common solution for defending against Sybil attack [22] [23].…”
Section: Related Workmentioning
confidence: 99%
“…This can contribute to a more fluent traffic, as well as the improved road safety by advance warning about accidents and specific threats to safety. The security considerations in VANETs [14][21] [22] [23] are of exceptionally high importance, as a malicious attacker can trigger traffic jams or even accidents by injecting false information in the system.…”
Section: Introductionmentioning
confidence: 99%
“…This allows them to include their time and location information in any outgoing reports. Source authentication, required to prevent Sybil attacks, is achieved by digital signatures according to both industrial and academic proposals [2], [21]. In this example, source authentication identifies the type of the report sender and enables the assignment of default trustworthiness, as explained in Sec.…”
Section: A Secure Vehicular Communications Systemmentioning
confidence: 99%
“…Most researchers ( [2,11,12]) propose a PKI solution, with anonymous or pseudonymous certificates issued by the CA. This solutions add digital signatures to each message and do not provide encryption of messages.…”
Section: Evaluation and Related Workmentioning
confidence: 99%