32nd IEEE Conference on Local Computer Networks (LCN 2007) 2007
DOI: 10.1109/lcn.2007.37
|View full text |Cite
|
Sign up to set email alerts
|

Secure Anonymous Broadcasting in Vehicular Networks

Abstract: Vehicular networks face a typical quandary in their requirement for communications that are at once secure and private. While the messages broadcast between vehicles and between vehicles and the supporting infrastructure must be authentic and non repudiable, they must also ensure the vehicle driver's anonymity. The Dedicated Short Range Communications (DSRC) framework's Wireless Access in Vehicular Environments (WAVE) application development architecture mandates the use of Public Key Infrastructure (PKI) mech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(19 citation statements)
references
References 17 publications
0
19
0
Order By: Relevance
“…However in multiplicative probabilities, if two receiver pairs agree with confidence 0.95 that a transmitter is located in a particular area, then that area is assigned confidence 0.95 2 . If four receiver pairs agree, then the confidence drops to 0.95 4 . We require a scheme to assign a probability distribution to the possible transmitter location where agreement from multiple receivers compounds the probability inside the intersecting hyperbolic areas without redistributing it outside the intersections.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…However in multiplicative probabilities, if two receiver pairs agree with confidence 0.95 that a transmitter is located in a particular area, then that area is assigned confidence 0.95 2 . If four receiver pairs agree, then the confidence drops to 0.95 4 . We require a scheme to assign a probability distribution to the possible transmitter location where agreement from multiple receivers compounds the probability inside the intersecting hyperbolic areas without redistributing it outside the intersections.…”
Section: Discussionmentioning
confidence: 99%
“…However, in vehicular applications where messages may be signed but not encrypted, digital signatures have been deemed a critical threat to privacy for facilitating location tracking [3]. The current trend in securing this type of message in vehicular networks circumvents the use of individualized digital certificates for each node [4][5][6]. In a revocation scheme based solely on the originator's logical identity or other falsifiable credential, the network cannot attribute the source of an attack message directly to the rogue, nor can it prevent the attacker from using a new identity in subsequent attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Dynamic nature of group managers due to consecutive position change of members and lack of supervision for members are challenges exist in this method. In [4], a hybrid key infrastructure is used to maintain the security aspects. Authentication is satisfied by a shared symmetric key in every region, so anonymity and privacy are also gained simultaneously.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we propose an applicable approach based on SAB 1 protocol [4] that is one of the static methods. In the proposed schema, we count three challenges of this method and resolve them.…”
Section: The Proposed Schemamentioning
confidence: 99%
See 1 more Smart Citation