265 Hits in 5.2 sec

Bring Your Own Reputation: A Feasible Trust System for Vehicular Ad Hoc Networks

Ricardo Mühlbauer, João Kleinschmidt
2018 Journal of Sensor and Actuator Networks  
The quantitative analysis of simulated scenarios showed the combination of the central reputation scheme with an appropriate vehicular decision mechanism achieved a total of correct decisions superior  ...  The vehicles periodically come in contact with certification and traffic control authorities to update their reputation levels, which are determined by the validation of their behavior on the network.  ...  in two-way traffic.  ... 
doi:10.3390/jsan7030037 fatcat:6lmpxhvpm5dbjdwmajqgkagqd4

Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs

Alexey Vinel, Xiaomin Ma, Dijiang Huang
2016 IEEE Transactions on Dependable and Secure Computing  
Cooperative driving applications are based on an underlying vehicular-WiFi extension (i.e., ITS-G5/DSRC) known for its unreliability and unbounded delay.  ...  The aim of this Special Issue is to encompass research advances in all areas of reliability and security in VANETs.  ...  The authors analyze the security of the proposed scheme under varying vehicular network scenarios.  ... 
doi:10.1109/tdsc.2015.2505361 fatcat:4fceblhgsbhizdoaotk7uhqvxu

Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not Enough

Mohammad Khodaei, Panos Papadimitratos
2020 IEEE Internet of Things Journal  
pseudonyms during rush hours after vehicles change their pseudonyms in a mix-zone.  ...  Such vehicles cooperatively disseminate decoy traffic without affecting safety-critical operations: with 50% of vehicles as relaying vehicles, the probability of linking pseudonyms (for the entire interval  ...  To mitigate such inference attacks, we introduce cooperative dissemination of decoy traffic: vehicles and RSUs emulate a non-existing vehicle by broadcasting decoy traffic in order to generate sufficiently  ... 
doi:10.1109/jiot.2020.3043640 fatcat:27cks2rjirekddad3tljpfxnym

Privacy Preservation through Uniformity

Mohammad Khodaei, Hamid Noroozi, Panos Papadimitratos
2018 Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '18  
In this poster, we show how one can link pseudonyms of a given vehicle by simply looking at the timing information of pseudonym transition processes.  ...  However, exactly because vehicles can in principle change their pseudonyms asynchronously, an adversary that eavesdrops (pseudonymously) signed messages, could link pseudonyms based on the times of pseudonym  ...  Even though pseudonymous authentication is a promising approach, an adversary, eavesdropping all traffic in an area, could link successive pseudonymously authenticated messages; more precisely, an attacker  ... 
doi:10.1145/3212480.3226101 dblp:conf/wisec/KhodaeiNP18 fatcat:ewxsr3dcqvd3hfrxv53azgxgk4

Impact of V2X privacy strategies on Intersection Collision Avoidance systems

Stephanie Lefevre, Jonathan Petit, Ruzena Bajcsy, Christian Laugier, Frank Kargl
2013 2013 IEEE Vehicular Networking Conference  
We simulate traffic scenarios at a road intersection and compare the ability of a collision avoidance system to avoid collisions for different pseudonym change schemes.  ...  In particular, methods relying on the use of temporary pseudonyms and silent periods have proved their ability to confuse attackers who would attempt to track vehicles.  ...  CONCLUSION AND FUTURE WORK Privacy is crucial in vehicular communications in order to ensure acceptance by users.  ... 
doi:10.1109/vnc.2013.6737592 dblp:conf/vnc/LefevrePBLK13 fatcat:qwdad4mwujdptjk5iscllemmm4

SlotSwap: strong and affordable location privacy in intelligent transportation systems

David Eckhoff, Reinhard German, Christoph Sommer, Falko Dressler, Tobias Gansen
2011 IEEE Communications Magazine  
In addition, we allow the exchange of pseudonyms between vehicles, eliminating the mapping between vehicles and pseudonyms even for the ITS operator.  ...  In general, neither users nor operators should be able to track a given individual.  ...  Exchanges of future pseudonyms per node in the urban scenario with resulting traffic overhead Measurements for neighborship relations and resulting traffic overhead in the urban scenario.  ... 
doi:10.1109/mcom.2011.6069719 fatcat:2hckcypuwfcs5oxos6q4vqqrdm

The scrambler attack: A robust physical layer attack on location privacy in vehicular networks

Bastian Bloessl, Christoph Sommer, Falko Dressier, David Eckhoff
2015 2015 International Conference on Computing, Networking and Communications (ICNC)  
., in the transmitted signal) reveal the link between two messages with different pseudonyms. In this paper, we present such a fingerprinting technique: the scrambler attack.  ...  Vehicular networks provide the basis for a wide range of both safety and non-safety applications.  ...  We generated vehicular mobility in both scenarios using the microscopic traffic simulator SUMO and kept the number of vehicles constant throughout the simulation: for every vehicle that left the scenario  ... 
doi:10.1109/iccnc.2015.7069376 dblp:conf/iccnc/BloesslSDE15 fatcat:rzaym2axi5cxpgvak5lni2avwy

Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles

Christian Vaas, Mohammad Khodaei, Panos Papadimitratos, Ivan Martinovic
2018 2018 IEEE Vehicular Networking Conference (VNC)  
In vehicular communication systems, cooperative awareness messages provide contextual information required for transportation safety and efficiency applications.  ...  This greatly improves privacy protection in situations with inherently low traffic density, e.g., suburban areas, and during low traffic periods.  ...  Consequently, user privacy is degraded under low traffic density, e.g., in a highway scenario [31] .  ... 
doi:10.1109/vnc.2018.8628449 dblp:conf/vnc/VaasKPM18 fatcat:cp7x26owobgaxc3supem5dwr5y

Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks

Mahmoud Hashem Eiza, Qiang Ni, Qi Shi
2016 IEEE Transactions on Vehicular Technology  
We show the feasibility and the fulfilment of the proposed reporting service in 5G enabled vehicular networks in terms of security, privacy and efficiency.  ...  However, the security and privacy of such services in 5G enabled vehicular networks need to be addressed first.  ...  in the aforementioned three scenarios.  ... 
doi:10.1109/tvt.2016.2541862 fatcat:cnvmne4vlbemxdyb7mfudvwmku

A survey on security challenges and malicious vehicle detection in vehicular ad hoc networks

Neha Roy, Y. Bevish Jinila
2015 Contemporary Engineerng Sciences  
In Vehicular Ad hoc Networks (VANETs), vehicles periodically broadcast messages for every 100 to 300 milli seconds. Such messages are used to report a safety or non-safety application.  ...  Authentication on such safety messages assures the end users in the network.  ...  Also, an attacker who has knowledge about the current scenario and traffic can compromise the RSU and can trace the vehicles. Reza  ... 
doi:10.12988/ces.2015.5121 fatcat:zv7e2ayldbhxrakziyqohqpryq

Emerging Technologies for Urban Traffic Management [chapter]

Antonio Guerrero-Ibanez, Carlos Flores-Cortes, Pedro Damian-Reyes, M. Andrade-Arechiga, J. R. G. Pulido
2012 Urban Development  
technologies, it is possible summarizes vehicular networking scenarios as shown in figure 2.Fig. 2.  ...  Finally, pseudonymous authentication is a technique widely accepted in vehicular networks. Its main use is anonymous authentication.  ... 
doi:10.5772/37760 fatcat:suza4qntkbeqzel7iam42ps4uu

Strengthening Privacy Protection in VANETs

Mike Burmester, Emmanouil Magkos, Vassilis Chrissikopoulos
2008 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications  
Another challenge is how to satisfy privacy in the presence of an adversary that has access to all communication (a global observer), and that can perform traffic analysis in order to link messages and  ...  Furthermore, we examine techniques for location privacy against adversaries that perform a Bayesian traffic analysis, and propose a strategy to strengthen location privacy in VANETs.  ...  This mode covers scenarios where two or more vehicles decide to establish a more permanent relation, (e.g., cooperative driving, platooning etc).  ... 
doi:10.1109/wimob.2008.32 dblp:conf/wimob/BurmesterMC08 fatcat:kyqjglrg6fawbgdfvonbou5p2a

Improved Key Based Security Framework for Vehicular Ad Hoc Networks

Satyam Bestaramunboena, Srinivas Sandiri
2014 IOSR Journal of Computer Engineering  
This implies that node movement is restricted by factors like road course, encompassing traffic and traffic regulations.  ...  We derive a set of encryption keys that are used to encrypt the next packet from part of the data in the current packet.  ...  The vulnerability lies in the periodic and frequent vehicular network traffic: Safety and traffic management messages, transaction based communications (e.g., automated payments).  ... 
doi:10.9790/0661-16578692 fatcat:t4fy5vnrdnbrzdyb3n6tsholse

Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures

Philip Asuquo, Haitham Cruickshank, Jeremy Morley, Chibueze P. Anyigor Ogah, Ao Lei, Waleed Hathal, Shihan Bao, Zhili Sun
2018 IEEE Internet of Things Journal  
In this article, we analyse the security and privacy requirements for LBS in vehicular and mobile networks.  ...  In spite of the desirable features provided by LBS, the geographic locations of users are not adequately protected. Location privacy is one of the major challenges in vehicular and mobile networks.  ...  They argue that even though the cost of location privacy is reduced by selfish nodes, it can also threaten the efficiency achieved by multiple pseudonyms in non-cooperative scenarios.  ... 
doi:10.1109/jiot.2018.2820039 fatcat:y2gdcllac5fbpdd2nnxn4tib2i

Report on the "Secure Vehicular Communications: Results and Challenges Ahead" Workshop [article]

Panos Papadimitratos, Jean-Pierre Hubaux
2008 arXiv   pre-print
This is a report and a collection of abstracts from the Feb. 2008 Lausanne Workshop on Secure Vehicular Communication Systems.  ...  solutions in the planned operational field tests of cooperative vehicular systems.  ...  Typical communications scenarios include: Traffic advisory or WSA multicast from RSE -requires authentication.  ... 
arXiv:0808.2654v1 fatcat:vdf25fk3ovez7ofy2v6327n2hy
« Previous Showing results 1 — 15 out of 265 results