EFFICIENT AND ROBUST PSEUDONYMOUS AUTHENTICATION IN VANET PDF

Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and. (English)In: VANET’ PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS. CiteSeerX – Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): Effective and robust operations, as well as security and privacy are critical for the .

Author: Akilmaran Dagal
Country: Malaysia
Language: English (Spanish)
Genre: Technology
Published (Last): 19 June 2015
Pages: 226
PDF File Size: 5.40 Mb
ePub File Size: 14.45 Mb
ISBN: 950-1-68491-827-2
Downloads: 33815
Price: Free* [*Free Regsitration Required]
Uploader: Meztigami

Efficient and Robust Pseudonymous Authentication in VANET

Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology. Challenges in Securing Vehicular Networks. This paper has highly influenced 28 other papers.

Our proposal enables vehicle on-board units to generate their own pseudonyms, without affecting the system security. Group Principals and the Formalization of Anonymity.

Efficient and robust pseudonymous authentication in VANET

Download PDF Cite this paper. Skip to search form Efficien to main content. Dependability in Wireless Networks: Topics Discussed in This Paper. This paper has citations.

  BD240C DATASHEET PDF

Moreover, we show how to enhance the availability and usability of privacy-enhancing VANET mechanisms: Showing of 4 references. Krishna Sampigethaya 15 Estimated H-index: Ref 13 Source Add To Collection. We design mechanisms that reduce the security overhead for safety beaconing, and retain robustness for transportation safety, even in adverse network settings.

Are you looking for By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy PolicyTerms of Serviceand Dataset License. Other Papers By First Author. Citation Statistics Citations 0 20 40 60 ’09 ’12 ’15 ‘ Marc Torrent-Moreno 16 Estimated H-index: Subir Biswas 8 Estimated H-index: On the Performance of Secure Vehicular Communication Systems ieee transactions on dependable and secure computing. See our FAQ for additional information.

Hang Dok 2 Estimated H-index: Yih Chun Hu 20 Estimated H-index: Bryan Parno 30 Estimated H-index: Ref 14 Source Add To Collection. Ahren Studer 17 Estimated H-index: Authentication Search for additional papers on this topic.

Stealth attacks in vehicular technologies. Secure vehicular communication systems: From This Paper Figures, tables, and topics from this paper.

  HORMONAS HIPOFISIARIAS PDF

Ke Zeng 1 Estimated H-index: Can We Rely on WiFi? In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication. On-board data handling Hoc programming language Software deployment. Pseudonymous PKI for ubiquitous computing.

Panagiotis Papadimitratos 36 Estimated H-index: Ref 28 Source Add To Collection. Magda El Zarki 13 Estimated H-index: Anup Kumar Bhattacharya 1 Estimated H-index: Showing of extracted citations. Location privacy in emerging network-based applications.

Citations Publications citing this paper. Syverson 20 Estimated H-index: Conditional privacy through ring signature in vehicular ad-hoc networks. Brijesh Kumar Chaurasia 9 Estimated H-index: Semantic Scholar estimates that this publication has citations based on the available data. Michael Brown 4 Estimated H-index: Markus Jakobsson 42 Estimated H-index: