A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Threats to Security in DSRC/WAVE
[chapter]
2006
Lecture Notes in Computer Science
To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. ...
We also discuss possible countermeasures to the most critical threats. ...
security threats specific to the DSRC/WAVE architecture. ...
doi:10.1007/11814764_22
fatcat:4pynv7ttkbg2rexulc5nu4prli
Outlines of Vehicular Ad-Hoc networks
2021
Transportation Research Procedia
In the past years, autonomous and self-configured Vehicular Ad-Hoc Network (VANET) has become the key research topic due to the increasing demand for road safety and management. ...
In the past years, autonomous and self-configured Vehicular Ad-Hoc Network (VANET) has become the key research topic due to the increasing demand for road safety and management. ...
DSRC/ WAVE spectrum allocation In the EU, the DSRC/ WAVE networks use for communication seven channels with 10 MHz bandwidth of each. The channel plan is shown in figure 3 . ...
doi:10.1016/j.trpro.2021.07.115
fatcat:hw2ybxrxxzehbbf5yzuc4sl6bq
Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective
2018
Journal of Information
Article History Keywords Vehicular Ad-Hoc networks (VANETs) Intelligent Transport System (ITS) Road-Side Units (RSUs) OBU DSRC WAVE Node Bandwidth Security and privacy threats Attackers. ...
The shared wireless medium is accessible to both legitimate and illegitimate users; and this has raise formidable research challenges to providing security for this network. ...
Section 2 of this paper gives a further overview of VANET; other related works were reviewed in section 3, Section 4 shows the new derived perspective to security and privacy attacks in VANET and section ...
doi:10.18488/journal.104.2018.41.1.9
fatcat:r3cwzekemfaujjjdqo2fdcreba
Autonomous Haulage Systems in the Mining Industry: Cybersecurity, Communication and Safety Issues and Challenges
2021
Electronics
Consequently, the presence of secure and reliable communications is crucial in making AHS mines safer, productive, and sustainable. ...
The current advancement of robotics, especially in Cyber-Physical Systems (CPS), leads to a prominent combination between the mining industry and connected-embedded technologies. ...
Abbreviations The following abbreviations are used in this manuscript: ...
doi:10.3390/electronics10111357
fatcat:nmdxrrrxj5hhlfpady6q5kx4fi
AVoD: Advanced Verify-on-Demand for Efficient Authentication against DoS Attacks in V2X Communication
2021
Security and Communication Networks
Security Credential Management System (SCMS) has been proposed as one of these elements, but it is vulnerable to denial-of-service (DoS) attacks due to message authentication costs. ...
However, security factors should be considered during communication. ...
As shown in Figure 1 , the attacker sends a large number of BSMs to the target vehicle. Vehicles within the attacker's DSRC/WAVE transmission range become the target vehicle. ...
doi:10.1155/2021/2890132
fatcat:3bcdc4y2zzeafnpvz5lwgmabr4
Safeguarding unmanned aerial systems: an approach for identifying malicious aerial nodes
2020
IET Communications
The rudimentary step towards an end-to-end secure UAS is not only safeguarding communication paths but also securing the overall environment which makes up the platform. ...
Malicious code could exploit the zero-day vulnerability to bypass security controls and hit the aerial vehicle. ...
the
middle, unauthorised access, rogue
access point, DoD, DDoS, replay,
session hijacking
OFDM, SOFDMA, QPSK, BPSK, 16-QAM
IEEE 1609 1
Km
1609.2, 1609.3, 1609.4, 1609.12
DSRC, WAVE, VANET
signed ...
doi:10.1049/iet-com.2020.0073
fatcat:guulooew3baf7ptqv6xwimd7ta
A Survey on Vanet Technologies
2015
International Journal of Computer Applications
physical security, limited bandwidth, energy and power constraints [1]. ...
The nodes included in a MANET ought to coordinate with one another and convey among themselves . ...
to physical security threats. ...
doi:10.5120/21637-4965
fatcat:zm4mjnts2jfrxbv7zgaqp56dyy
Preliminary Results for Secure Traffic Regulation
2018
Proceedings of the 15th International Conference on Informatics in Control, Automation and Robotics
Thus, an important issue is to ensure a robust and secure communication between the different components able to resist to hypothetic hacker's attacks. ...
In this paper, we propose a solution for traffic regulation in Intelligent Transportation Systems (ITS). ...
WAVE and DSRC standards are defined in IEEE 1609.1-4 and 802.11p respectively. The U.S. ...
doi:10.5220/0006904504290434
dblp:conf/icinco/BelbachirBPF18
fatcat:2vryolp675bado4aewjyrnq6zu
Traceable Anonymous Authentication Scheme for Vehicular Ad-hoc Networks
2011
2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops
In this paper, we proposed a novel anonymous authentication scheme in VANETs. Our scheme provides message authentication, anonymity, unlinkability, and traceability of an end-user simultaneously. ...
Compared with the existing work, we claim that our scheme has better performance in terms of storage, computation, and communication overhead. ...
DSRC/WAVE systems fill a niche in the wireless infrastructure by facilitating low latency, geographically local, high data rate, and high mobility communications. X. ...
doi:10.1109/ispaw.2011.67
fatcat:g2ukbmn5znfsvorzltuoug5wae
Sustainable Adoption of Connected Vehicles in the Brazilian Landscape: Policies, Technical Specifications and Challenges
2019
Transactions on Environment and Electrical Engineering
This review addresses the intervehicular communication in Connected Vehicles (CV) by emphasizing V2V (vehicle-to-vehicle) and V2I (vehicle-to-infrastructure) communications in terms of evolution, current ...
This review is based on studies conducted from 2009 to 2019, government reports about the sustainable deployment of these technologies and their adoption in the Brazilian automotive market. ...
Therefore, a DSRC/WAVE offers [8] , [54] , [56] , [57] : 1. ...
doi:10.22149/teee.v3i1.130
fatcat:fsiz7ljy3rcz3jtwlwxuma5stq
A Comprehensive Survey on VANET Security Services in Traffic Management System
2019
Wireless Communications and Mobile Computing
Secondly, we discuss the detailed analysis of security schemes and the possible measures to provide secure communication in VANETs. ...
Then, we comprehensively cover the authentication schemes, which is able to protect the vehicular network from malicious nodes and fake messages. Thus, it provides security in VANETs. ...
Figure 2 :Figure 3 : 23 Channel diagram of DSRC. WAVE layout [39] .
Figure 4 : 4 VANET security services.
Figure 5 : 5 Categories of authentication in VANETs. ...
doi:10.1155/2019/2423915
fatcat:4dool3bba5ea7h6muysjtzpxfq
Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks
2009
EURASIP Journal on Wireless Communications and Networking
In attributing an attack message to its perpetrator by localizing the signal source, we can make no presumptions regarding the type of radio equipment used by a malicious transmitter, including the transmitting ...
power utilized to carry out an exploit. ...
An IEEE standard has been proposed for securing vehicular communications in the Dedicated Short Range Communications Wireless Access in Vehicular Environments (DSRC/WAVE) [12] . ...
doi:10.1155/2009/128679
fatcat:jvyxmh5knjf67bwdkwbhyxyidq
Conceptual Model for Connected Vehicles Safety and Security using Big Data Analytics
2020
International Journal of Advanced Computer Science and Applications
To address this gap, this research aims to determine the basic components of safety and security for CVs implementation and propose a conceptual model for safety and security in CVs by applying the machine ...
The proposed model is highly correlated to safety and security and could be applied in congestion and collision prediction. ...
ACKNOWLEDGMENT The authors would like to thank all experts especially Associate Prof Dr. Suzaimah Ramli and Prof Ir. Dr. ...
doi:10.14569/ijacsa.2020.0111136
fatcat:mbkdp23rm5h77c43f2khoae37q
A Survey on the Current Security Landscape of Intelligent Transportation Systems
2021
IEEE Access
Finally, this survey presents key challenges in the field, and discusses recent trends that must be factored in by researchers, implementers, and car manufactures to improve the security of ITS. ...
However, this raises new security issues that make the whole system prone to cybersecurity attacks that threaten both the safety and privacy of all road-users. ...
ACKNOWLEDGMENT The authors would like to thank the editors and the anonymous reviewers for their valuable and enriching comments and suggestions to improve the content of this article. ...
doi:10.1109/access.2021.3050038
fatcat:wagonasxpbetxdlrhxzadnpkw4
An Effective Data Sharing Scheme Based on Blockchain in Vehicular Social Networks
2021
Electronics
Adversaries are able to violate the privacy of the vehicle based on the collected data, thereby threatening the security of the entire network. ...
In VSNs, vehicles can upload the necessary data in the cloud service provider (CSP) and other vehicles can query the data they are interested in through CSP, which enables VSNs to provide more user-friendly ...
In the United States, the standards of V2V and V2I (DSRC/WAVE) are formulated by the Institute of electrical and electronics engineers. ...
doi:10.3390/electronics10020114
fatcat:sp5boe2vjrc2zb6mnvtrkzu6ga
« Previous
Showing results 1 — 15 out of 58 results