2008 IEEE Globecom Workshops 2008
DOI: 10.1109/glocomw.2008.ecp.54
|View full text |Cite
|
Sign up to set email alerts
|

Service Discovery and Service Access in Wireless Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Signaling cost for SHI-RQ messages is expressed as Wired link cost for domain interconnection Data access processing cost C 1 OBU data access processing cost C 2 SP data access processing cost C 3 RSU data access processing cost C 4 SM data access processing cost C 5 SEC data access processing cost C 6 BNKG data access processing cost Cryptographic cost S ES Encryption cost by using public keys S ET Decryption cost by using private keys S DS Encryption cost by using secret shared keys S DT Decryption cost by using secret shared keys S y Related cost for validating signatures S x Related cost for generating signatures S z Related cost for generating pseudonyms…”
Section: Analytical Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Signaling cost for SHI-RQ messages is expressed as Wired link cost for domain interconnection Data access processing cost C 1 OBU data access processing cost C 2 SP data access processing cost C 3 RSU data access processing cost C 4 SM data access processing cost C 5 SEC data access processing cost C 6 BNKG data access processing cost Cryptographic cost S ES Encryption cost by using public keys S ET Decryption cost by using private keys S DS Encryption cost by using secret shared keys S DT Decryption cost by using secret shared keys S y Related cost for validating signatures S x Related cost for generating signatures S z Related cost for generating pseudonyms…”
Section: Analytical Modelmentioning
confidence: 99%
“…A service architecture in such context must offer secure and scalable access to roadside services. In this paper we classify different access protocols based on the service architecture we proposed in Reference [3], which is intended to offer secure service provisioning for spontaneous ondemand service requests on the road. The architecture is based on the premise that vehicles may request services anytime, anywhere and without being attached to any sort of home network.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, most of the works such as [1], [2], [9] apply cryptography techniques to prevent external attackers penetrating the network.…”
Section: Introductionmentioning
confidence: 99%