Dynamic Ad-Hoc Networks 2013
DOI: 10.1049/pbte059e_ch3
|View full text |Cite
|
Sign up to set email alerts
|

Security in vehicular ad hoc networks

Abstract: Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness, and we carry out a quantitative assessment of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…The time to compute the Hash and the signature is TH, Ts is 0.09ms, 0.39ms. M.Rekik et al [21] proposed an enhancement to before work [22] which gives an answer for authentication problem as, dual authentication with key management. The enhancement achieved in this work is introducing extra authentication segment and a re-authentication phase, with the aid of retaining the amount of data required to compute for the authentication in a computationally environment friendly way.…”
Section: Tesla-based Authentication Schemesmentioning
confidence: 99%
“…The time to compute the Hash and the signature is TH, Ts is 0.09ms, 0.39ms. M.Rekik et al [21] proposed an enhancement to before work [22] which gives an answer for authentication problem as, dual authentication with key management. The enhancement achieved in this work is introducing extra authentication segment and a re-authentication phase, with the aid of retaining the amount of data required to compute for the authentication in a computationally environment friendly way.…”
Section: Tesla-based Authentication Schemesmentioning
confidence: 99%