Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and. (English)In: VANET’ PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS. CiteSeerX – Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): Effective and robust operations, as well as security and privacy are critical for the .
|Published (Last):||19 June 2015|
|PDF File Size:||5.40 Mb|
|ePub File Size:||14.45 Mb|
|Price:||Free* [*Free Regsitration Required]|
Efficient and Robust Pseudonymous Authentication in VANET
Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology. Challenges in Securing Vehicular Networks. This paper has highly influenced 28 other papers.
Our proposal enables vehicle on-board units to generate their own pseudonyms, without affecting the system security. Group Principals and the Formalization of Anonymity.
Efficient and robust pseudonymous authentication in VANET
Download PDF Cite this paper. Skip to search form Efficien to main content. Dependability in Wireless Networks: Topics Discussed in This Paper. This paper has citations.
Moreover, we show how to enhance the availability and usability of privacy-enhancing VANET mechanisms: Showing of 4 references. Krishna Sampigethaya 15 Estimated H-index: Ref 13 Source Add To Collection. We design mechanisms that reduce the security overhead for safety beaconing, and retain robustness for transportation safety, even in adverse network settings.
Hang Dok 2 Estimated H-index: Yih Chun Hu 20 Estimated H-index: Bryan Parno 30 Estimated H-index: Ref 14 Source Add To Collection. Ahren Studer 17 Estimated H-index: Authentication Search for additional papers on this topic.
Stealth attacks in vehicular technologies. Secure vehicular communication systems: From This Paper Figures, tables, and topics from this paper.
Ke Zeng 1 Estimated H-index: Can We Rely on WiFi? In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication. On-board data handling Hoc programming language Software deployment. Pseudonymous PKI for ubiquitous computing.
Panagiotis Papadimitratos 36 Estimated H-index: Ref 28 Source Add To Collection. Magda El Zarki 13 Estimated H-index: Anup Kumar Bhattacharya 1 Estimated H-index: Showing of extracted citations. Location privacy in emerging network-based applications.
Citations Publications citing this paper. Syverson 20 Estimated H-index: Conditional privacy through ring signature in vehicular ad-hoc networks. Brijesh Kumar Chaurasia 9 Estimated H-index: Semantic Scholar estimates that this publication has citations based on the available data. Michael Brown 4 Estimated H-index: Markus Jakobsson 42 Estimated H-index: