Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks 2005
DOI: 10.1145/1102219.1102223
|View full text |Cite
|
Sign up to set email alerts
|

The security of vehicular ad hoc networks

Abstract: Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness, and we carry out a quantitative assessment of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

2
498
0
1

Year Published

2006
2006
2013
2013

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 790 publications
(501 citation statements)
references
References 24 publications
2
498
0
1
Order By: Relevance
“…Security issues are discussed in [13] and [14]. In [13], the authors present a survey on many security aspects relating to automotive applications.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Security issues are discussed in [13] and [14]. In [13], the authors present a survey on many security aspects relating to automotive applications.…”
Section: Related Workmentioning
confidence: 99%
“…In [13], the authors present a survey on many security aspects relating to automotive applications. In contrast, in [14] the authors mainly focus on aspects strictly related to ad hoc networks for vehicles.…”
Section: Related Workmentioning
confidence: 99%
“…Most researchers ( [2,11,12]) propose a PKI solution, with anonymous or pseudonymous certificates issued by the CA. This solutions add digital signatures to each message and do not provide encryption of messages.…”
Section: Evaluation and Related Workmentioning
confidence: 99%
“…This implies that node movement is restricted by factors like road course, encompassing traffic and traffic regulations. Because of the restricted node movement it is a feasible assumption that the VANET will be supported by some fixed infrastructure that assists with some services and can provide access to stationary networks [2]. The fixed infrastructure will be deployed at critical locations like slip roads, service stations, dangerous intersections or places well-known for hazardous weather conditions.…”
Section: Introductionmentioning
confidence: 99%
“…Previous work such as [5], [6], [7], [8] suggests the use of randomly changing identifiers -so called pseudonyms -to prevent this kind of privacy intrusions. While it is still possible to collect data, associating it with identities over time gets much more complicated if node identifiers are used only for a short period of time.…”
mentioning
confidence: 99%