VANET security surveys
Vehicular ad hoc networks (VANETs), a subset of Mobile Ad hoc NETworks (MANETs), refer to a set of smart vehicles used on the road. These vehicles provide communication services among one another or with Road Side Infrastructure (RSU) based on wireless Local Area Network (LAN) technologies. The main...
Saved in:
Published in | Computer communications Vol. 44; pp. 1 - 13 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Kidlington
Elsevier B.V
15.05.2014
Elsevier |
Subjects | |
Online Access | Get full text |
ISSN | 0140-3664 1873-703X |
DOI | 10.1016/j.comcom.2014.02.020 |
Cover
Loading…
Abstract | Vehicular ad hoc networks (VANETs), a subset of Mobile Ad hoc NETworks (MANETs), refer to a set of smart vehicles used on the road. These vehicles provide communication services among one another or with Road Side Infrastructure (RSU) based on wireless Local Area Network (LAN) technologies.
The main benefits of VANETs are that they enhance road safety and vehicle security while protecting drivers’ privacy from attacks perpetrated by adversaries. Security is one of the most critical issues related to VANETs since the information transmitted is distributed in an open access environment.
VANETs face many challenges. This paper presents a survey of the security issues and the challenges they generate. The various categories of applications in VANETs are introduced, as well as some security requirements, threats and certain architectures are proposed to solve the security problem. Finally, global security architecture for VANETs is proposed. |
---|---|
AbstractList | Vehicular ad hoc networks (VANETs), a subset of Mobile Ad hoc NETworks (MANETs), refer to a set of smart vehicles used on the road. These vehicles provide communication services among one another or with Road Side Infrastructure (RSU) based on wireless Local Area Network (LAN) technologies.
The main benefits of VANETs are that they enhance road safety and vehicle security while protecting drivers’ privacy from attacks perpetrated by adversaries. Security is one of the most critical issues related to VANETs since the information transmitted is distributed in an open access environment.
VANETs face many challenges. This paper presents a survey of the security issues and the challenges they generate. The various categories of applications in VANETs are introduced, as well as some security requirements, threats and certain architectures are proposed to solve the security problem. Finally, global security architecture for VANETs is proposed. |
Author | Quintero, Alejandro Engoulou, Richard Gilles Pierre, Samuel Bellaïche, Martine |
Author_xml | – sequence: 1 givenname: Richard Gilles surname: Engoulou fullname: Engoulou, Richard Gilles email: richard.engoulou@polymtl.ca – sequence: 2 givenname: Martine surname: Bellaïche fullname: Bellaïche, Martine email: martine.bellaiche@polymtl.ca – sequence: 3 givenname: Samuel surname: Pierre fullname: Pierre, Samuel email: samuel.pierre@polymtl.ca – sequence: 4 givenname: Alejandro surname: Quintero fullname: Quintero, Alejandro email: Alejandro.quintero@polymtl.ca |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28417293$$DView record in Pascal Francis |
BookMark | eNqFkL1LAzEYxoNUsK2uTg5dHO_M513iIJRSP6DoUsUthOQNpLR3JbkW7r835cTBQeGBd3if3zP8JmjUtA0gdENwSTCp7jalbXc5JcWEl5jm4DM0JrJmRY3Z5wiN8wMXrKr4BZqktMEY87pmY3T9MX9drmcJ7CGGrp-lQzxCny7RuTfbBFffd4reH5frxXOxent6WcxXhWWs6gopLQgLRAnpmOSSCkVAOfDMEwfOO-9ZZQWlTijrpFEcqBTKGEkoNVywKboddvcmWbP10TQ2JL2PYWdir6nkpKaK5R4feja2KUXwPxWC9cmB3ujBgT450Jjm4Izd_8Js6EwX2qaLJmz_gx8GGLKAY4Cokw3QWHAhgu20a8PfA18T-XrI |
CitedBy_id | crossref_primary_10_1016_j_vehcom_2017_02_001 crossref_primary_10_1002_spy2_367 crossref_primary_10_1016_j_cose_2019_101664 crossref_primary_10_1016_j_comcom_2018_03_014 crossref_primary_10_1109_JSYST_2021_3116029 crossref_primary_10_1016_j_iot_2019_100071 crossref_primary_10_1016_j_jksuci_2024_101945 crossref_primary_10_4236_jcc_2016_416002 crossref_primary_10_1016_j_adhoc_2018_03_010 crossref_primary_10_1145_2817552 crossref_primary_10_1016_j_pmcj_2018_05_004 crossref_primary_10_1155_2022_4725805 crossref_primary_10_1016_j_adhoc_2023_103246 crossref_primary_10_1109_ACCESS_2019_2911924 crossref_primary_10_1109_ACCESS_2021_3104148 crossref_primary_10_1109_ACCESS_2021_3125521 crossref_primary_10_1109_TITS_2020_2994972 crossref_primary_10_1109_ACCESS_2020_2993553 crossref_primary_10_1109_ACCESS_2020_2966747 crossref_primary_10_1109_JSEN_2020_3021731 crossref_primary_10_1109_TIFS_2018_2812714 crossref_primary_10_1007_s12083_020_01010_4 crossref_primary_10_1016_j_eswa_2015_12_006 crossref_primary_10_1016_j_cosrev_2021_100411 crossref_primary_10_1109_TITS_2015_2494017 crossref_primary_10_3390_electronics13122372 crossref_primary_10_1109_TVT_2023_3287989 crossref_primary_10_1007_s11432_019_2835_4 crossref_primary_10_1109_ACCESS_2019_2915956 crossref_primary_10_1166_jctn_2020_9221 crossref_primary_10_1109_ACCESS_2023_3339192 crossref_primary_10_1007_s11235_016_0200_4 crossref_primary_10_1155_2019_2423915 crossref_primary_10_1016_j_vehcom_2022_100458 crossref_primary_10_3390_electronics9091358 crossref_primary_10_1109_ACCESS_2017_2717999 crossref_primary_10_1109_ACCESS_2017_2733225 crossref_primary_10_1002_spy2_349 crossref_primary_10_1109_JIOT_2021_3060751 crossref_primary_10_32604_iasc_2022_021467 crossref_primary_10_1016_j_vehcom_2018_07_001 crossref_primary_10_1016_j_comnet_2018_12_018 crossref_primary_10_1007_s13369_019_04094_0 crossref_primary_10_1007_s12083_016_0473_0 crossref_primary_10_3390_su151512003 crossref_primary_10_4018_IJCAC_300771 crossref_primary_10_1109_JIOT_2024_3363755 crossref_primary_10_1186_s13638_018_1237_8 crossref_primary_10_3390_su17062589 crossref_primary_10_1016_j_adhoc_2017_12_005 crossref_primary_10_1108_IJPCC_04_2022_0164 crossref_primary_10_1109_MCOM_2015_7120028 crossref_primary_10_3390_app11104682 crossref_primary_10_1016_j_dsp_2018_06_003 crossref_primary_10_1109_ACCESS_2019_2937182 crossref_primary_10_1016_j_comnet_2020_107099 crossref_primary_10_1109_ACCESS_2018_2800907 crossref_primary_10_25046_aj0506172 crossref_primary_10_1109_ACCESS_2022_3198656 crossref_primary_10_3390_app8101964 crossref_primary_10_3390_app13010217 crossref_primary_10_1016_j_comcom_2017_09_005 crossref_primary_10_1109_TITS_2024_3475952 crossref_primary_10_31185_wjcm_50 crossref_primary_10_1016_j_jcss_2016_05_006 crossref_primary_10_1109_ACCESS_2022_3205351 crossref_primary_10_1016_j_adhoc_2022_102782 crossref_primary_10_1080_24751839_2022_2040898 crossref_primary_10_3390_info10010027 crossref_primary_10_1002_wfs2_1324 crossref_primary_10_1109_TIFS_2020_3040876 crossref_primary_10_1016_j_comcom_2015_08_005 crossref_primary_10_1088_1757_899X_993_1_012102 crossref_primary_10_3390_s24010241 crossref_primary_10_3390_electronics4030380 crossref_primary_10_3390_su132313068 crossref_primary_10_1109_COMST_2017_2771522 crossref_primary_10_1109_ACCESS_2018_2837887 crossref_primary_10_1109_ACCESS_2016_2645452 crossref_primary_10_3390_s19224954 crossref_primary_10_1002_dac_4290 crossref_primary_10_1016_j_vehcom_2018_01_008 crossref_primary_10_1007_s12046_020_1320_9 crossref_primary_10_1109_JIOT_2023_3337136 crossref_primary_10_1145_3711681 crossref_primary_10_1007_s11227_016_1799_3 crossref_primary_10_3390_sym14061230 crossref_primary_10_3390_s22072810 crossref_primary_10_1051_matecconf_20166305020 crossref_primary_10_1109_ACCESS_2018_2866759 crossref_primary_10_1016_j_procs_2015_12_031 crossref_primary_10_1109_JIOT_2023_3259961 crossref_primary_10_1109_TITS_2021_3136548 crossref_primary_10_1109_TITS_2023_3266828 crossref_primary_10_1016_j_comcom_2018_07_008 crossref_primary_10_3390_app142210501 crossref_primary_10_1155_2020_5129620 crossref_primary_10_3390_s21093096 crossref_primary_10_1109_TVT_2014_2358633 crossref_primary_10_3390_s20216137 crossref_primary_10_1109_ACCESS_2020_2989870 crossref_primary_10_53759_7669_jmc202303003 crossref_primary_10_1016_j_comnet_2016_08_030 crossref_primary_10_1109_JIOT_2023_3277923 crossref_primary_10_1016_j_phycom_2022_101772 crossref_primary_10_1109_COMST_2016_2521642 crossref_primary_10_1109_TIV_2022_3186897 crossref_primary_10_1155_2022_1131479 crossref_primary_10_1109_TITS_2017_2653103 crossref_primary_10_1002_sec_1251 crossref_primary_10_1007_s42979_023_02122_3 crossref_primary_10_1088_1742_6596_1427_1_012015 crossref_primary_10_1109_ACCESS_2020_3014038 crossref_primary_10_1109_JPROC_2019_2915983 crossref_primary_10_1109_ACCESS_2020_3036044 crossref_primary_10_1109_ACCESS_2019_2931217 crossref_primary_10_1109_TIFS_2019_2955891 crossref_primary_10_1155_2022_8736531 crossref_primary_10_1109_ACCESS_2019_2936575 crossref_primary_10_1109_ACCESS_2021_3120626 crossref_primary_10_1142_S0218126624500531 crossref_primary_10_1109_ACCESS_2020_3041074 crossref_primary_10_7717_peerj_cs_2259 crossref_primary_10_3390_en12234527 crossref_primary_10_3390_fi16110395 crossref_primary_10_1109_TNSE_2021_3093435 crossref_primary_10_1002_dac_3893 crossref_primary_10_1155_2022_7239464 crossref_primary_10_1002_ett_4204 crossref_primary_10_1109_ACCESS_2020_2975110 crossref_primary_10_1080_08874417_2022_2103853 crossref_primary_10_1109_COMST_2021_3108466 crossref_primary_10_6109_jkiice_2016_20_3_590 crossref_primary_10_1016_j_csi_2023_103783 crossref_primary_10_1016_j_vehcom_2020_100286 crossref_primary_10_1186_s13638_018_1064_y crossref_primary_10_1016_j_vehcom_2020_100284 crossref_primary_10_1109_TITS_2017_2777990 crossref_primary_10_3390_fi14020031 crossref_primary_10_3233_JIFS_233527 crossref_primary_10_1016_j_procs_2019_09_449 crossref_primary_10_2139_ssrn_3179428 crossref_primary_10_3390_iot5010007 crossref_primary_10_1109_MITS_2019_2898973 crossref_primary_10_3390_electronics9010074 crossref_primary_10_1109_ACCESS_2019_2946632 crossref_primary_10_1016_j_comnet_2024_110869 crossref_primary_10_1109_COMST_2023_3264928 crossref_primary_10_1016_j_isatra_2022_02_046 crossref_primary_10_1016_j_matpr_2021_02_556 crossref_primary_10_3390_s20195719 crossref_primary_10_1016_j_adhoc_2017_03_006 crossref_primary_10_1155_2021_9997771 crossref_primary_10_4236_wet_2018_94007 crossref_primary_10_1080_19393555_2021_2007316 crossref_primary_10_1109_COMST_2022_3178081 crossref_primary_10_1016_j_vehcom_2017_12_003 crossref_primary_10_1002_itl2_323 crossref_primary_10_1109_TVT_2016_2621354 crossref_primary_10_1007_s11227_023_05620_6 crossref_primary_10_1109_ACCESS_2024_3437416 crossref_primary_10_1007_s11227_020_03520_7 crossref_primary_10_1016_j_cose_2020_102150 crossref_primary_10_1109_JSYST_2023_3279620 crossref_primary_10_1016_j_inffus_2021_03_003 crossref_primary_10_61186_jsdp_20_1_3 crossref_primary_10_1109_OJITS_2023_3347484 crossref_primary_10_1016_j_procs_2019_12_099 crossref_primary_10_1038_s41598_024_77992_5 crossref_primary_10_1016_j_adhoc_2018_12_006 crossref_primary_10_1007_s11227_021_03911_4 crossref_primary_10_3390_s20020330 crossref_primary_10_1109_MITS_2020_2985024 crossref_primary_10_1007_s11276_016_1294_z crossref_primary_10_1007_s11277_024_10962_2 crossref_primary_10_1155_2021_6638453 crossref_primary_10_1049_iet_its_2015_0228 crossref_primary_10_1109_OJCOMS_2023_3239115 crossref_primary_10_1016_j_vehcom_2018_09_001 crossref_primary_10_1007_s11276_016_1277_0 crossref_primary_10_1145_3718736 crossref_primary_10_11648_j_wcmc_20241102_13 crossref_primary_10_32604_iasc_2022_024687 crossref_primary_10_1007_s11227_021_03659_x crossref_primary_10_1109_TITS_2024_3495031 crossref_primary_10_1016_j_vehcom_2019_100164 crossref_primary_10_1177_1550147717700899 crossref_primary_10_1109_ACCESS_2021_3107467 crossref_primary_10_1155_2018_1640167 crossref_primary_10_1109_COMST_2017_2736886 crossref_primary_10_1016_j_jpdc_2021_02_024 crossref_primary_10_3390_info12110455 crossref_primary_10_1109_TITS_2024_3488184 crossref_primary_10_1109_TVT_2020_2981127 crossref_primary_10_3390_sym12040609 crossref_primary_10_1109_TITS_2015_2439292 crossref_primary_10_32604_iasc_2022_026331 crossref_primary_10_1177_0361198118799012 crossref_primary_10_1016_j_physa_2017_12_013 crossref_primary_10_1109_ACCESS_2024_3374216 crossref_primary_10_1109_TSC_2024_3422813 crossref_primary_10_1177_1550147718815054 crossref_primary_10_13089_JKIISC_2016_26_4_941 crossref_primary_10_3390_s23010555 crossref_primary_10_1109_ACCESS_2019_2949130 crossref_primary_10_1109_TITS_2018_2818888 crossref_primary_10_1016_j_vehcom_2016_11_009 crossref_primary_10_1109_JIOT_2020_3037098 crossref_primary_10_3390_electronics12010139 crossref_primary_10_1109_TITS_2019_2934481 crossref_primary_10_1016_j_vehcom_2017_01_002 crossref_primary_10_1109_OJCOMS_2022_3169500 crossref_primary_10_1016_j_adhoc_2021_102634 crossref_primary_10_1016_j_compeleceng_2024_109950 crossref_primary_10_1016_j_comcom_2024_02_024 crossref_primary_10_3390_s20154253 crossref_primary_10_1007_s11227_022_04526_z crossref_primary_10_1002_dac_6077 crossref_primary_10_1016_j_vehcom_2019_100182 crossref_primary_10_1002_spy2_433 crossref_primary_10_1109_ACCESS_2018_2868417 crossref_primary_10_1145_3014584 crossref_primary_10_3390_rs11232852 crossref_primary_10_1109_JIOT_2022_3199712 crossref_primary_10_1016_j_csi_2017_09_009 crossref_primary_10_3390_su132212513 crossref_primary_10_1016_j_jisa_2020_102637 crossref_primary_10_1109_COMST_2020_3012961 crossref_primary_10_1108_IJPCC_09_2021_0239 crossref_primary_10_1109_TII_2019_2948053 crossref_primary_10_1109_JIOT_2023_3279950 crossref_primary_10_1109_JIOT_2020_2975084 crossref_primary_10_1016_j_vehcom_2022_100531 crossref_primary_10_1016_j_vehcom_2015_08_001 crossref_primary_10_1109_TDSC_2022_3164740 crossref_primary_10_1007_s11042_016_3614_9 crossref_primary_10_1109_TITS_2020_2975226 crossref_primary_10_1007_s11042_016_4154_z crossref_primary_10_3390_electronics9091411 crossref_primary_10_1049_cmu2_12179 crossref_primary_10_3390_info15010014 crossref_primary_10_1111_mice_12416 crossref_primary_10_1002_dac_3936 crossref_primary_10_1016_j_adhoc_2019_102004 crossref_primary_10_1177_1550147717741263 crossref_primary_10_3390_s16122077 crossref_primary_10_3390_s19163589 crossref_primary_10_1155_2020_8505280 crossref_primary_10_3390_s22186934 crossref_primary_10_1109_ACCESS_2020_3017018 crossref_primary_10_1109_TGCN_2021_3110822 crossref_primary_10_1155_2022_5829607 crossref_primary_10_55529_ijrise_42_11_18 crossref_primary_10_1016_j_dcan_2021_09_010 crossref_primary_10_1016_j_icte_2024_05_008 crossref_primary_10_1016_j_comcom_2015_09_007 crossref_primary_10_1016_j_cosrev_2021_100392 crossref_primary_10_3390_s19020334 crossref_primary_10_1109_TVT_2021_3107524 crossref_primary_10_3233_JIFS_220460 crossref_primary_10_1520_JTE20230095 crossref_primary_10_1109_JIOT_2018_2812300 crossref_primary_10_1109_ACCESS_2019_2919973 crossref_primary_10_1016_j_future_2017_12_041 crossref_primary_10_1016_j_vehcom_2020_100281 crossref_primary_10_1016_j_comcom_2021_01_019 crossref_primary_10_1109_ACCESS_2018_2880984 crossref_primary_10_1109_TDSC_2022_3163752 crossref_primary_10_3390_s19040965 crossref_primary_10_7717_peerj_cs_1440 |
Cites_doi | 10.1109/GLOCOMW.2007.4437825 10.1109/TNET.2007.904002 10.1109/VETECF.2007.22 10.1007/11814764_22 10.1109/DSN.2004.1311881 10.1109/WMNC.2010.5678756 10.1109/TITS.2013.2264356 10.1145/1023875.1023881 10.1109/SAINTW.2003.1210183 10.1109/JSAC.2011.110310 10.1109/TITS.2011.2118754 10.1007/978-3-540-79966-5_8 10.1109/MVT.2009.932539 10.1016/j.comcom.2007.12.005 10.1109/WCNC.2007.467 10.1007/0-387-33406-8_6 10.1109/MOBIQ.2007.4451013 10.1007/978-3-540-79576-6_17 10.1109/ARES.2006.136 10.1002/9780470610893.ch12 10.1109/MCOM.2008.4539481 10.1109/TVT.2009.2034669 10.1109/MWC.2006.1632480 10.1109/ICETET.2009.198 10.1145/863965.863968 10.1109/ITST.2007.4295890 10.1109/MOBIQ.2004.1331717 10.1145/1102219.1102223 10.1109/SAHCNW.2009.5172962 10.1109/ICC.2009.5199041 10.1109/JCN.2009.6388411 10.5121/ijnsa.2011.3614 10.1109/MCOM.2008.4689252 10.1109/GLOCOM.2008.ECP.947 10.1109/NETAPPS.2010.17 10.1109/ICRTIT.2011.5972438 10.1109/JSAC.2007.071007 10.1109/ISCID.2012.184 10.1109/VETECS.2010.5494204 10.1109/ICVES.2008.4640905 10.1145/997150.997156 10.1109/MITP.2004.1265539 10.1109/INFOCOM.2007.179 10.1109/TVT.2009.2038222 10.1007/978-3-642-24861-0_20 10.3233/JCS-2007-15103 10.1109/GLOCOMW.2008.ECP.63 10.1109/CICSyN.2011.77 10.1109/TVT.2013.2277802 10.1007/978-3-642-04434-2_4 10.1109/icc.2011.5962947 10.1007/11767831_13 10.1109/BSC.2010.5473015 10.1109/ICNP.2008.4697044 10.1145/1161064.1161076 10.1145/1287748.1287752 10.1007/978-3-642-27201-1 10.1109/BWCCA.2011.12 10.4304/jnw.7.7.1106-1115 10.1109/WC-M.2006.250352 10.1201/EBK1439819197-13 10.1109/SYNASC.2010.9 10.1109/ISWTA.2011.6089388 10.1145/1080754.1080762 10.1109/GLOCOMW.2010.5700199 10.1109/COMST.2008.4483667 10.1109/ARTCom.2009.173 10.1049/iet-com.2009.0191 10.1109/GLOCOMW.2007.4437823 10.1109/COMST.2008.4625806 10.1145/1160972.1160974 |
ContentType | Journal Article |
Copyright | 2014 Elsevier B.V. 2015 INIST-CNRS |
Copyright_xml | – notice: 2014 Elsevier B.V. – notice: 2015 INIST-CNRS |
DBID | AAYXX CITATION IQODW |
DOI | 10.1016/j.comcom.2014.02.020 |
DatabaseName | CrossRef Pascal-Francis |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Applied Sciences |
EISSN | 1873-703X |
EndPage | 13 |
ExternalDocumentID | 28417293 10_1016_j_comcom_2014_02_020 S0140366414000863 |
GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 77K 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABFNM ABMAC ABXDB ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ IHE J1W JJJVA KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 RIG ROL RPZ RXW SDF SDG SDP SES SPC SPCBC SST SSV SSZ T5K WH7 ZMT ~G- 07C 29F AAQXK AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AI. AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN BNPGV CITATION F0J FEDTE FGOYB HLZ HVGLF HZ~ R2- SBC SEW SSH TAE UHS VH1 VOH WUQ XPP ZY4 ABTAH IQODW |
ID | FETCH-LOGICAL-c336t-88ce5ce1958d38482591e9def3f1dedfdff36c522d59cd8a94e2859aa8122a453 |
IEDL.DBID | .~1 |
ISSN | 0140-3664 |
IngestDate | Wed Apr 02 07:16:15 EDT 2025 Thu Apr 24 23:03:57 EDT 2025 Tue Jul 01 05:05:34 EDT 2025 Fri Feb 23 02:23:48 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | VANETs Security Malicious nodes Vehicular ad hoc networks Mobile ad hoc network Private life Wireless LAN Motor car Road infrastructure Open archives Open systems Traffic safety Wireless network Road traffic Ad hoc network Computer security Open access Mobile computing Computer attack |
Language | English |
License | CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c336t-88ce5ce1958d38482591e9def3f1dedfdff36c522d59cd8a94e2859aa8122a453 |
PageCount | 13 |
ParticipantIDs | pascalfrancis_primary_28417293 crossref_primary_10_1016_j_comcom_2014_02_020 crossref_citationtrail_10_1016_j_comcom_2014_02_020 elsevier_sciencedirect_doi_10_1016_j_comcom_2014_02_020 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2014-05-15 |
PublicationDateYYYYMMDD | 2014-05-15 |
PublicationDate_xml | – month: 05 year: 2014 text: 2014-05-15 day: 15 |
PublicationDecade | 2010 |
PublicationPlace | Kidlington |
PublicationPlace_xml | – name: Kidlington |
PublicationTitle | Computer communications |
PublicationYear | 2014 |
Publisher | Elsevier B.V Elsevier |
Publisher_xml | – name: Elsevier B.V – name: Elsevier |
References | G. Samara, W.A.H. Al-Salihy, R. Sures, Security analysis of vehicular ad hoc networks (VANET), in: Network Applications Protocols and Services (NETAPPS), 2010, pp. 55–60. H. Moustafa, G. Bourdon, Y. Gourhant, Providing authentication and access control in vehicular network environment, in: Security and Privacy in Dynamic Environments, vol. 201, Springer, New York, 2006, pp. 62–73. V. Pathak, D. Yao, L. Iftode, Securing location aware services over VANET using geographical secure path routing, in: IEEE International Conference on Vehicular Electronics and Safety, ICVES, 2008, pp. 346–353. J. Petit, Z. Mammeri, Analysis of authentication overhead in vehicular networks, in: Third Joint IFIP Wireless and Mobile Networking Conference (WMNC), 2010, pp. 1–6. C2C-CC, Car to Car Communication Consortium M. Koubek, S. Rea, D. Pesch, Event Suppression for safety message dissemination in VANETs, in: IEEE 71st Vehicular Technology Conference (VTC Spring), 2010, pp. 1–5. Qianhong, Domingo-Ferrer, Gonzalez-Nicolas (b0480) 2010; 59 G. Guette, C. Bryce, Using TPMS to secure vehicular ad-hoc networks (VANETS), in: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, 2008, pp. 106–116. Igure, Williams (b0365) 2008; 10 M. Torrent-Moreno, P. Santi, H. Hartenstein, Fair sharing of bandwidth in VANETs, in: Presented at the Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks, Cologne, Germany, 2005. P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Presented at the Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, 2004. G. Samara, W.A.H. Al-Salihy, R. Sures, Security issues and challenges of vehicular ad hoc networks (VANET), in: 4th International Conference on New Trends in Information Science and Service Science (NISS), 2010, pp. 393–398. G. Calandriello, P. Papadimitratos, J.-P. Hubaux, A. Lioy, Efficient and robust pseudonymous authentication in VANET, in: Presented at the Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc networks, Montreal, Quebec, Canada, 2007. Q. Yi, N. Moayeri, Design of secure and application-oriented VANETs, in: Vehicular Technology Conference. VTC Spring IEEE, 2008, pp. 2794–2799. F.K. Karnadi, M. Zhi Hai, L. Kun-chan, Rapid generation of realistic mobility models for VANET, in: Wireless Communications and Networking Conference, WCNC IEEE, 2007, pp. 2506–2511. C. Gosman, C. Dobre, V. Cristea, A security protocol for vehicular distributed systems, in: 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2010, pp. 321–327. Raya, Papadimitratos, Hubaux (b0120) 2006; 13 U. Delprato, M. Cristaldi, A. Gambardella, Sharing emergency information between emergency control centres: the project REACT, in: International Congress on Environmental Modelling and Software Integrating Sciences and Information Technology for Environmental Assessment and Decision Making, 2008. J.M.D. Fuentes, A.I. González-Tablas, A. Ribagorda, Overview of security issues in vehicular Ad-hoc networks, in: Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, 2011 K. Papapanagiotou, G.F. Marias, P. Georgiadis, A certificate validation protocol for VANETS, in: Globecom Workshops, IEEE, 2007, pp. 1–9. . TPM Main: Part 1 Design Principles, Trusted Computing Group, 2006 C. Laurendeau, M. Barbeau, Threats to Security in DSRC/WAVE, in: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006, pp. 266–279. K. Plossl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: The First International Conference on Availability, Reliability and Security, ARES, 2006, p. 8. IEEE 1609.2-2013. IEEE Standard for Wireless Access in Vehicular Environments — Security Services for Applications and Management Messages, ed, 2013. S.N. Pathak, U. Shrawankar, Secured communication in real time VANET, in: 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2009, pp. 1151–1155. Ben Salem, Hubaux (b0570) 2006; 13 Hartenstein, Laberteaux (b0530) 2008 Dresner, Stone (b0995) 2008; 31 Identify intelligent vehicle safety applications enabled by DSRC, US National Highway Traffic Safety Administration 2005. F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-layer privacy enhancement and non-repudiation in vehicular communication, in: Communication in Distributed Systems (KiVS), ITG-GI Conference, 2007, pp. 1–12. H. Hasbullah, I.A. Soomro, J.-L. Ab Manan, Denial of service (DOS) attack and its possible solution in VANET, WASET, 2010. S.U. Rahman, H. Falaki, Security and Privacy for DSRC-based Automotive Collision Reporting, ED, 2009 Aad, Hubaux, Knightly (b0235) 2008; 16 L. Nai-Wei, T. Hsiao-Chien, Illusion attack on VANET applications – a message plausibility problem, in: Globecom Workshops, IEEE, 2007, pp. 1–8. Sumra, Hasbullah, Jamalul-lail, Iskandar (b0585) 2011; 1 Wu, Cao, Ling, Liu, Sun (b0430) 2012; 7 A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, in: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003, pp. 99–110. M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Security in Ad Hoc and Sensor Networks (SASN), 2005. Zeadally, Hunt, Chen, Irwin, Hassan (b0535) 2010 C. Wei, Y. Jianding, L. Xiangjun, The design of electronic license plate recognition terminal system based on nRF24LE1, in: 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), 2012, pp. 127–129. A. Stampoulis, Z. Chai, A Survey of Security in Vehicular Networks, Project CPSC 534, 2007. A. Khalili, J. Katz, W.A. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings Symposium on Applications and the Internet Workshops, 2003, pp. 342–346. IEEE Standard 802. 16e. Amendment to IEEE Standard for Local and Metropolitan Area Networks, 2004 Kyunghwi, Jeongbeen, Wonjun (b0085) 2013; 14 Cheng, Shan, Zhuang (b0560) 2010 Toor, Muhlethaler, Laouiti, Fortelle (b0540) 2008; 10 M. Raya, A. Aziz, J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, 2006, pp. 67–75. K.V.N. Kavitha, A. Bagubali, L. Shalini, V2V wireless communication protocol for rear-end collision avoidance on highways with stringent propagation delay, in: International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom ‘09, 2009, pp. 661–663. Kim, Choi, Yoo (b0565) 2011 K. Priya, K. Karuppanan, Secure privacy and distributed group authentication for VANET, in: International Conference on Recent Trends in Information Technology (ICRTIT), 2011, pp. 301–306. J.P. Thompson, C.D. Wang, Apparatus and method for motion detection and tracking of objects in a region for collision avoidance utilizing a real-time adaptive probabilistic neural network, Google Patents, US5613039, 1997 Tuan-Duc, Berder, Sentieys (b0095) 2011; 12 F. Dötzer, Privacy issues in vehicular ad hoc networks, in: Privacy Enhancing Technologies, 2006, pp. 197–209. Toor, Muhlethaler, Laouiti (b0310) 2008; 10 F. Li, J. Wu, A winning-probability-based incentive scheme in vehicular networks, in: Proceedings of IEEE International Conference on Network Protocols (ICNP), Poster Abstract, 2008. T.W. Chim, S. Yiu, L.C. Hui, V.O. Li, Security and privacy issues for inter-vehicle communications in VANETs, in: 6th Annual Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON Workshops’ 09, 2009, pp. 1-3. B. Fouch, Crash Facts. Available F. Kargl, Z. Ma, E. Schoch, Security engineering for VANETs, in: 4th Workshop on Embedded Security in Cars, 2006. E. Fonseca, A. Festag, A survey of existing approaches for secure ad hoc routing and their applicability to VANETS, NEC Network Laboratories, 2006. T. Leinmuller, R.K. Schmidt, E. Schoch, A. Held, G. Schafer, Modeling roadside attacker behavior in VANETs, in: GLOBECOM Workshops, IEEE, New Orleans, LO, 2008, pp. 1–10. Raya, Hubaux (b0325) 2007; 15 Sampigethaya, Li, Huang, Poovendran (b0400) 2007; 25 Rahbari, Jamali (b0610) 2011 Zhang, Wu, Solanas, Domingo-Ferrer (b0450) 2010; 59 Mirkovic, Reiher (b0385) 2004; 34 Li, Hwang, Chu (b0225) 2008; 31 N. Vighnesh, N. Kavita, S.R. Urs, S. Sampalli, A novel sender authentication scheme based on hash chain for vehicular ad-hoc networks, in: IEEE Symposium on Wireless Technology and Applications (ISWTA), 2011, pp. 96–101. Meraihi, Senouci, Meddour, Jerbi (b0550) 2008 Issac, Zeadally, Camara (b0555) 2010; 4 Brooks, Sander, Juan, Taiber (b0395) 2009; 4 F. Dotzer, L. Fischer, P. Magiera, Vars: a vehicle ad-hoc network reputation system, in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM, 2005, pp. 454–456. G. Yan, B.B. Bista, D.B. Rawat, E.F. Shaner, General active position detectors protect VANET security, in: Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011, pp. 11–17. P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, M. Raya, Architecture for secure and private vehicular communications, in: 7th International Conference on ITS Telecommunications, ITST’07, 2007, pp. 1–6. X. Yang, L. Liu, N.H. Vaidya, F. Zhao, A vehicle-to-vehicle communication protocol for cooperative collision warning, in: The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004, pp. 114–123. Kapadia, Triandopoulos, Cornelius, Peebles, Kotz (b0600) 2008; 1 F. Sabahi, The security of vehicular ad hoc networks, in: Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2011, pp. 338–342. S. Biswas, J. Mišić, Proxy signature-based RSU message broadcasting in VANETs, in: 25th Biennial Symposium on Communications (QBSC), 2010, pp. 5–9. M. Schagrin, Vehicle-to-Infrastructure (V 10.1016/j.comcom.2014.02.020_b0135 10.1016/j.comcom.2014.02.020_b0410 10.1016/j.comcom.2014.02.020_b0255 10.1016/j.comcom.2014.02.020_b0375 Blum (10.1016/j.comcom.2014.02.020_b0245) 2004; 6 10.1016/j.comcom.2014.02.020_b0130 10.1016/j.comcom.2014.02.020_b0250 Sun (10.1016/j.comcom.2014.02.020_b0545) 2010; 21 Dresner (10.1016/j.comcom.2014.02.020_b0995) 2008; 31 10.1016/j.comcom.2014.02.020_b0380 10.1016/j.comcom.2014.02.020_b0305 10.1016/j.comcom.2014.02.020_b0425 10.1016/j.comcom.2014.02.020_b0300 10.1016/j.comcom.2014.02.020_b0025 10.1016/j.comcom.2014.02.020_b0145 10.1016/j.comcom.2014.02.020_b0420 10.1016/j.comcom.2014.02.020_b0020 10.1016/j.comcom.2014.02.020_b0140 Aad (10.1016/j.comcom.2014.02.020_b0235) 2008; 16 10.1016/j.comcom.2014.02.020_b0260 10.1016/j.comcom.2014.02.020_b0270 10.1016/j.comcom.2014.02.020_b0390 Qianhong (10.1016/j.comcom.2014.02.020_b0480) 2010; 59 Tuan-Duc (10.1016/j.comcom.2014.02.020_b0095) 2011; 12 Jyoti (10.1016/j.comcom.2014.02.020_b0520) 2010 Sampigethaya (10.1016/j.comcom.2014.02.020_b0400) 2007; 25 10.1016/j.comcom.2014.02.020_b0435 10.1016/j.comcom.2014.02.020_b0155 10.1016/j.comcom.2014.02.020_b0275 10.1016/j.comcom.2014.02.020_b0030 10.1016/j.comcom.2014.02.020_b0150 10.1016/j.comcom.2014.02.020_b0160 10.1016/j.comcom.2014.02.020_b0280 Ben Salem (10.1016/j.comcom.2014.02.020_b0570) 2006; 13 10.1016/j.comcom.2014.02.020_b0605 Igure (10.1016/j.comcom.2014.02.020_b0365) 2008; 10 10.1016/j.comcom.2014.02.020_b0445 10.1016/j.comcom.2014.02.020_b0200 10.1016/j.comcom.2014.02.020_b0320 10.1016/j.comcom.2014.02.020_b0440 10.1016/j.comcom.2014.02.020_b0285 10.1016/j.comcom.2014.02.020_b0040 10.1016/j.comcom.2014.02.020_b0050 Cheng (10.1016/j.comcom.2014.02.020_b0560) 2010 Zeadally (10.1016/j.comcom.2014.02.020_b0535) 2010 Segata (10.1016/j.comcom.2014.02.020_b0180) 2013; 62 Li (10.1016/j.comcom.2014.02.020_b0225) 2008; 31 Raya (10.1016/j.comcom.2014.02.020_b0325) 2007; 15 Zhang (10.1016/j.comcom.2014.02.020_b0450) 2010; 59 Sumra (10.1016/j.comcom.2014.02.020_b0585) 2011; 1 10.1016/j.comcom.2014.02.020_b0215 10.1016/j.comcom.2014.02.020_b0335 10.1016/j.comcom.2014.02.020_b0455 10.1016/j.comcom.2014.02.020_b0575 10.1016/j.comcom.2014.02.020_b0210 10.1016/j.comcom.2014.02.020_b0330 10.1016/j.comcom.2014.02.020_b0175 10.1016/j.comcom.2014.02.020_b0295 10.1016/j.comcom.2014.02.020_b0060 Toor (10.1016/j.comcom.2014.02.020_b0540) 2008; 10 Rahbari (10.1016/j.comcom.2014.02.020_b0610) 2011 Kim (10.1016/j.comcom.2014.02.020_b0565) 2011 10.1016/j.comcom.2014.02.020_b0505 Issac (10.1016/j.comcom.2014.02.020_b0555) 2010; 4 Raya (10.1016/j.comcom.2014.02.020_b0120) 2006; 13 10.1016/j.comcom.2014.02.020_b0105 10.1016/j.comcom.2014.02.020_b0500 10.1016/j.comcom.2014.02.020_b0345 Kyunghwi (10.1016/j.comcom.2014.02.020_b0085) 2013; 14 10.1016/j.comcom.2014.02.020_b0465 Liqun (10.1016/j.comcom.2014.02.020_b0460) 2011; 29 10.1016/j.comcom.2014.02.020_b0220 10.1016/j.comcom.2014.02.020_b0340 10.1016/j.comcom.2014.02.020_b0065 10.1016/j.comcom.2014.02.020_b0185 10.1016/j.comcom.2014.02.020_b0580 Toor (10.1016/j.comcom.2014.02.020_b0310) 2008; 10 Wu (10.1016/j.comcom.2014.02.020_b0430) 2012; 7 10.1016/j.comcom.2014.02.020_b0190 Brooks (10.1016/j.comcom.2014.02.020_b0395) 2009; 4 Kapadia (10.1016/j.comcom.2014.02.020_b0600) 2008; 1 10.1016/j.comcom.2014.02.020_b0515 Hartenstein (10.1016/j.comcom.2014.02.020_b0530) 2008 10.1016/j.comcom.2014.02.020_b0115 10.1016/j.comcom.2014.02.020_b0355 10.1016/j.comcom.2014.02.020_b0475 10.1016/j.comcom.2014.02.020_b0595 10.1016/j.comcom.2014.02.020_b0110 10.1016/j.comcom.2014.02.020_b0230 Wang (10.1016/j.comcom.2014.02.020_b0525) 2009 Meraihi (10.1016/j.comcom.2014.02.020_b0550) 2008 Mirkovic (10.1016/j.comcom.2014.02.020_b0385) 2004; 34 10.1016/j.comcom.2014.02.020_b0470 10.1016/j.comcom.2014.02.020_b0590 10.1016/j.comcom.2014.02.020_b0080 Papadimitratos (10.1016/j.comcom.2014.02.020_b0195) 2008; 46 10.1016/j.comcom.2014.02.020_b0405 10.1016/j.comcom.2014.02.020_b0125 10.1016/j.comcom.2014.02.020_b0485 10.1016/j.comcom.2014.02.020_b0360 10.1016/j.comcom.2014.02.020_b0490 10.1016/j.comcom.2014.02.020_b0090 |
References_xml | – reference: F. Li, J. Wu, A winning-probability-based incentive scheme in vehicular networks, in: Proceedings of IEEE International Conference on Network Protocols (ICNP), Poster Abstract, 2008. – reference: J. Petit, Z. Mammeri, Analysis of authentication overhead in vehicular networks, in: Third Joint IFIP Wireless and Mobile Networking Conference (WMNC), 2010, pp. 1–6. – reference: U. Delprato, M. Cristaldi, A. Gambardella, Sharing emergency information between emergency control centres: the project REACT, in: International Congress on Environmental Modelling and Software Integrating Sciences and Information Technology for Environmental Assessment and Decision Making, 2008. – volume: 62 start-page: 4150 year: 2013 end-page: 4161 ident: b0180 article-title: Automatic emergency braking: Realistic analysis of car dynamics and network performance publication-title: IEEE T. Veh. Technol. – volume: 31 start-page: 591 year: 2008 end-page: 656 ident: b0995 article-title: A multiagent approach to autonomous intersection management publication-title: J. Artif. Int. Res. – volume: 25 start-page: 1569 year: 2007 end-page: 1589 ident: b0400 article-title: Amoeba: robust location privacy scheme for VANET publication-title: IEEE J. Sel. Areas Commun. – year: 2009 ident: b0525 article-title: Vehicular Ad Hoc Networks – reference: C. Jung, C. Sur, Y. Park, K.-H. Rhee, A robust conditional privacy-preserving authentication protocol in VANET, in: Security and Privacy in Mobile Information and Communication Systems, vol. 17, Springer, Berlin Heidelberg, 2009, pp. 35–45. – volume: 59 start-page: 1606 year: 2010 end-page: 1617 ident: b0450 article-title: A scalable robust authentication protocol for secure vehicular communications publication-title: IEEE Trans. Veh. Technol. – reference: B. Xiao, B. Yu, C. Gao, Detection and localization of sybil nodes in VANETs, in: International Conference on Mobile Computing and Networking: Proceedings of the workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, 2006, pp. 1–8. – reference: C. Harsch, A. Festag, P. Papadimitratos, Secure position-based routing for VANETs, in: IEEE 66th Vehicular Technology Conference, VTC, 2007, pp. 26–30. – reference: M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Security in Ad Hoc and Sensor Networks (SASN), 2005. – reference: S.K. Dhurandher, M.S. Obaidat, A. Jaiswal, A. Tiwari, A. Tyagi, Securing vehicular networks: a reputation and plausibility checks-based approach, in: GLOBECOM Workshops (GC Wkshps), IEEE, 2010, pp. 1550–1554. – reference: K.V.N. Kavitha, A. Bagubali, L. Shalini, V2V wireless communication protocol for rear-end collision avoidance on highways with stringent propagation delay, in: International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom ‘09, 2009, pp. 661–663. – volume: 1 year: 2011 ident: b0585 article-title: Trust and trusted computing in VANET publication-title: Comput. Sci. – reference: C. Laurendeau, M. Barbeau, Threats to Security in DSRC/WAVE, in: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006, pp. 266–279. – volume: 13 start-page: 8 year: 2006 end-page: 15 ident: b0120 article-title: Securing vehicular communications publication-title: IEEE Wirel. Commun. – reference: J.M.D. Fuentes, A.I. González-Tablas, A. Ribagorda, Overview of security issues in vehicular Ad-hoc networks, in: Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, 2011, – volume: 1 start-page: 280 year: 2008 end-page: 297 ident: b0600 article-title: AnonySense: opportunistic and privacy-preserving context collection publication-title: Pervasive Comput. – reference: IEEE 1609.2-2013. IEEE Standard for Wireless Access in Vehicular Environments — Security Services for Applications and Management Messages, ed, 2013. – volume: 21 year: 2010 ident: b0545 article-title: An identity-based security system for user privacy in vehicular ad hoc networks publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 10 start-page: 6 year: 2008 end-page: 19 ident: b0365 article-title: Taxonomies of attacks and vulnerabilities in computer systems publication-title: IEEE Commun. Surv. Tutorials – volume: 4 start-page: 894 year: 2010 end-page: 903 ident: b0555 article-title: Security attacks and solutions for vehicular ad hoc networks publication-title: IET Commun. – volume: 29 start-page: 605 year: 2011 end-page: 615 ident: b0460 article-title: Threshold anonymous announcement in VANETs publication-title: IEEE J. Sel. Areas Commun. – reference: S. Biswas, J. Mišić, Proxy signature-based RSU message broadcasting in VANETs, in: 25th Biennial Symposium on Communications (QBSC), 2010, pp. 5–9. – reference: G. Samara, W.A.H. Al-Salihy, R. Sures, Security analysis of vehicular ad hoc networks (VANET), in: Network Applications Protocols and Services (NETAPPS), 2010, pp. 55–60. – volume: 13 start-page: 50 year: 2006 end-page: 55 ident: b0570 article-title: Securing wireless mesh networks publication-title: IEEE Wirel. Commun. – reference: K.S. Killourhy, R.A. Maxion, K.M. Tan, A defense-centric taxonomy based on attack manifestations, in: International Conference on Dependable Systems and Networks, 2004, pp. 102–111. – reference: T.W. Chim, S. Yiu, L.C. Hui, V.O. Li, Security and privacy issues for inter-vehicle communications in VANETs, in: 6th Annual Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON Workshops’ 09, 2009, pp. 1-3. – year: 2010 ident: b0520 publication-title: Security of Self-organizing Networks MANET, WSN, WMN, VANET – reference: E. Fonseca, A. Festag, A survey of existing approaches for secure ad hoc routing and their applicability to VANETS, NEC Network Laboratories, 2006. – reference: B. Fouch, Crash Facts. Available: < – year: 2010 ident: b0560 article-title: Infotainment and road safety service support in vehicular networking: from a communication perspective publication-title: Mech. Syst. Signal Process. – reference: B. Parno, A. Perrig, Challenges in securing vehicular networks, in: Workshop on Hot Topics in Networks (HotNets-IV), 2005. – volume: 14 start-page: 1500 year: 2013 end-page: 1509 ident: b0085 article-title: A MAC protocol using road traffic estimation for infrastructure-to-vehicle communications on highways publication-title: IEEE Trans. Intell. Transp. Syst. – reference: S.N. Pathak, U. Shrawankar, Secured communication in real time VANET, in: 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2009, pp. 1151–1155. – reference: C2C-CC, Car to Car Communication Consortium, – reference: F. Dötzer, Privacy issues in vehicular ad hoc networks, in: Privacy Enhancing Technologies, 2006, pp. 197–209. – volume: 6 start-page: 24 year: 2004 end-page: 29 ident: b0245 article-title: The threat of intelligent collisions publication-title: IT Prof. – reference: K. Papapanagiotou, G.F. Marias, P. Georgiadis, A certificate validation protocol for VANETS, in: Globecom Workshops, IEEE, 2007, pp. 1–9. – reference: F. Dotzer, L. Fischer, P. Magiera, Vars: a vehicle ad-hoc network reputation system, in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM, 2005, pp. 454–456. – volume: 15 start-page: 39 year: 2007 end-page: 68 ident: b0325 article-title: Securing vehicular ad hoc networks publication-title: J. Comput. Secur. – volume: 10 start-page: 74 year: 2008 end-page: 88 ident: b0310 article-title: Vehicle ad hoc networks: applications and related technical issues publication-title: IEEE Commun. Surv. Tutorials – reference: J.P. Thompson, C.D. Wang, Apparatus and method for motion detection and tracking of objects in a region for collision avoidance utilizing a real-time adaptive probabilistic neural network, Google Patents, US5613039, 1997, – reference: X. Yang, L. Liu, N.H. Vaidya, F. Zhao, A vehicle-to-vehicle communication protocol for cooperative collision warning, in: The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004, pp. 114–123. – volume: 46 start-page: 100 year: 2008 end-page: 109 ident: b0195 article-title: Secure vehicular communication systems: design and architecture publication-title: IEEE Commun. Mag. – reference: C. Gosman, C. Dobre, V. Cristea, A security protocol for vehicular distributed systems, in: 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2010, pp. 321–327. – reference: G. Calandriello, P. Papadimitratos, J.-P. Hubaux, A. Lioy, Efficient and robust pseudonymous authentication in VANET, in: Presented at the Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc networks, Montreal, Quebec, Canada, 2007. – reference: M. Koubek, S. Rea, D. Pesch, Event Suppression for safety message dissemination in VANETs, in: IEEE 71st Vehicular Technology Conference (VTC Spring), 2010, pp. 1–5. – reference: P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Presented at the Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, 2004. – reference: IEEE Standard 802. 16e. Amendment to IEEE Standard for Local and Metropolitan Area Networks, 2004, – reference: V. Pathak, D. Yao, L. Iftode, Securing location aware services over VANET using geographical secure path routing, in: IEEE International Conference on Vehicular Electronics and Safety, ICVES, 2008, pp. 346–353. – reference: K. El Defrawy, G. Tsudik, PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs), in: IEEE International Conference on Network Protocols, ICNP, 2008, pp. 258–267. – reference: TPM Main: Part 1 Design Principles, Trusted Computing Group, 2006, – reference: F. Kargl, Z. Ma, E. Schoch, Security engineering for VANETs, in: 4th Workshop on Embedded Security in Cars, 2006. – reference: A. Khalili, J. Katz, W.A. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings Symposium on Applications and the Internet Workshops, 2003, pp. 342–346. – year: 2010 ident: b0535 article-title: Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges – year: 2008 ident: b0530 article-title: A tutorial survey on vehicular ad hoc networks publication-title: IEEE Commun. Mag. – reference: L. Ertaul, S. Mullapudi, The security problems of vehicular ad hoc networks (VANETs) and proposed solutions in securing their operations, in: International Conference on Wireless Networks ICWN, 2009. – reference: N. Vighnesh, N. Kavita, S.R. Urs, S. Sampalli, A novel sender authentication scheme based on hash chain for vehicular ad-hoc networks, in: IEEE Symposium on Wireless Technology and Applications (ISWTA), 2011, pp. 96–101. – reference: A. Stampoulis, Z. Chai, A Survey of Security in Vehicular Networks, Project CPSC 534, 2007. – reference: V.S. Yadav, S. Misra, M. Afaque, Security of Wireless and Self-Organizing Networks: Security in Vehicular Ad Hoc Networks, CRC Press, 2010, pp. 227–250. – reference: F. Sabahi, The security of vehicular ad hoc networks, in: Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2011, pp. 338–342. – volume: 34 start-page: 39 year: 2004 end-page: 53 ident: b0385 article-title: A taxonomy of DDoS attack and DDoS defense mechanisms publication-title: ACM SIGCOMM Comput. Commun. Rev. – reference: M. Schagrin, Vehicle-to-Infrastructure (V2I) Communications for Safety, 2013. Available: < – volume: 31 start-page: 2803 year: 2008 end-page: 2814 ident: b0225 article-title: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks publication-title: Comput. Commun. – reference: H. Moustafa, G. Bourdon, Y. Gourhant, Providing authentication and access control in vehicular network environment, in: Security and Privacy in Dynamic Environments, vol. 201, Springer, New York, 2006, pp. 62–73. – reference: L. Nai-Wei, T. Hsiao-Chien, Illusion attack on VANET applications – a message plausibility problem, in: Globecom Workshops, IEEE, 2007, pp. 1–8. – reference: A.P. Bernia, Reliable and Secure Geocasting in VANETs, University of Ottawa, 2012. – year: 2011 ident: b0565 article-title: Secure and efficient protocol for vehicular ad hoc network with privacy preservation publication-title: EURASIP J. Wirel. Commun. Networking – volume: 59 start-page: 559 year: 2010 end-page: 573 ident: b0480 article-title: Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications publication-title: IEEE Trans. Veh. Technol. – reference: L. Zhang, Q.Q. Wu, Bo, J. Domingo-Ferrer, APPA: aggregate privacy-preserving authentication in vehicular ad hoc networks, in: Presented at the Proceedings of the 14th International Conference on Information security, Xi’an, China, 2011. – reference: D. Ren, S. Du, H. Zhu, A novel attack tree based risk assessment approach for location privacy preservation in the VANETs, in: IEEE International Conference on Communications (ICC), 2011, pp. 1–5. – reference: K. Plossl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: The First International Conference on Availability, Reliability and Security, ARES, 2006, p. 8. – reference: Identify intelligent vehicle safety applications enabled by DSRC, US National Highway Traffic Safety Administration 2005. – volume: 7 start-page: 1106 year: 2012 end-page: 1115 ident: b0430 article-title: Routing algorithm based on multi-community evolutionary game for VANET publication-title: J. Networks – reference: M. Torrent-Moreno, P. Santi, H. Hartenstein, Fair sharing of bandwidth in VANETs, in: Presented at the Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks, Cologne, Germany, 2005. – year: 2008 ident: b0550 article-title: Vehicle-to-vehicle communications: applications and perspectives publication-title: Wirel. Ad Hoc Sens. Networks – reference: R. Lu, X. Lin, H. Zhu, P.-H. Ho, X. Shen, ECPP: efficient conditional privacy preservation protocol for secure vehicular communications, in: The 27th Conference on Computer Communications INFOCOM, IEEE, 2008. – reference: S.U. Rahman, H. Falaki, Security and Privacy for DSRC-based Automotive Collision Reporting, ED, 2009 – volume: 4 start-page: 52 year: 2009 end-page: 64 ident: b0395 article-title: Automobile security concerns publication-title: IEEE Veh. Technol. Mag. – volume: 16 start-page: 791 year: 2008 end-page: 802 ident: b0235 article-title: Impact of denial of service attacks on ad hoc networks publication-title: IEEE/ACM Trans. Networking – reference: F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-layer privacy enhancement and non-repudiation in vehicular communication, in: Communication in Distributed Systems (KiVS), ITG-GI Conference, 2007, pp. 1–12. – reference: H. Hasbullah, I.A. Soomro, J.-L. Ab Manan, Denial of service (DOS) attack and its possible solution in VANET, WASET, 2010. – year: 2011 ident: b0610 article-title: Efficient detection of sybil attack based on cryptography in VANET publication-title: Int. J. Network Secur. Appl. (IJNSA) – reference: A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, in: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003, pp. 99–110. – reference: G. Yan, B.B. Bista, D.B. Rawat, E.F. Shaner, General active position detectors protect VANET security, in: Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011, pp. 11–17. – reference: P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, M. Raya, Architecture for secure and private vehicular communications, in: 7th International Conference on ITS Telecommunications, ITST’07, 2007, pp. 1–6. – reference: G. Guette, C. Bryce, Using TPMS to secure vehicular ad-hoc networks (VANETS), in: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, 2008, pp. 106–116. – reference: T. Zhou, R.R. Choudhury, P. Ning, K. Chakrabarty, Privacy-preserving detection of sybil attacks in vehicular ad hoc networks, in: Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. MobiQuitous, 2007, pp. 1–8. – reference: M. Raya, A. Aziz, J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, 2006, pp. 67–75. – reference: >. – reference: T. Leinmuller, R.K. Schmidt, E. Schoch, A. Held, G. Schafer, Modeling roadside attacker behavior in VANETs, in: GLOBECOM Workshops, IEEE, New Orleans, LO, 2008, pp. 1–10. – volume: 10 year: 2008 ident: b0540 article-title: Vehicle ad hoc networks: applications and related technical issues publication-title: IEEE Commun. – reference: C. Wei, Y. Jianding, L. Xiangjun, The design of electronic license plate recognition terminal system based on nRF24LE1, in: 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), 2012, pp. 127–129. – reference: . – reference: Y. Hao, Y. Cheng, K. Ren, Distributed key management with protection against RSU compromise in group signature based VANETs, in: IEEE GLOBECOM Global Telecommunications Conference, 2008, pp. 1–5. – reference: F.K. Karnadi, M. Zhi Hai, L. Kun-chan, Rapid generation of realistic mobility models for VANET, in: Wireless Communications and Networking Conference, WCNC IEEE, 2007, pp. 2506–2511. – volume: 12 start-page: 659 year: 2011 end-page: 668 ident: b0095 article-title: Energy-efficient cooperative techniques for infrastructure-to-vehicle communications publication-title: IEEE Trans. Intell. Transp. Syst. – reference: Q. Yi, N. Moayeri, Design of secure and application-oriented VANETs, in: Vehicular Technology Conference. VTC Spring IEEE, 2008, pp. 2794–2799. – reference: A. Studer, F. Bai, B. Bellur, A. Perrig, Flexible, extensible, and efficient VANET authentication, in: Proceedings of the 6th Annual Conference on Embedded Security in Cars, 2008. – reference: G. Samara, W.A.H. Al-Salihy, R. Sures, Security issues and challenges of vehicular ad hoc networks (VANET), in: 4th International Conference on New Trends in Information Science and Service Science (NISS), 2010, pp. 393–398. – reference: T. Leinmuller, R.K. Schmidt, E. Schoch, A. Held, G. Schafer, Modeling roadside attacker behavior in VANETs, in: 2008 IEEE GLOBECOM Workshops, 2008, pp. 1–10. – reference: K. Priya, K. Karuppanan, Secure privacy and distributed group authentication for VANET, in: International Conference on Recent Trends in Information Technology (ICRTIT), 2011, pp. 301–306. – ident: 10.1016/j.comcom.2014.02.020_b0590 doi: 10.1109/GLOCOMW.2007.4437825 – volume: 16 start-page: 791 year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0235 article-title: Impact of denial of service attacks on ad hoc networks publication-title: IEEE/ACM Trans. Networking doi: 10.1109/TNET.2007.904002 – ident: 10.1016/j.comcom.2014.02.020_b0270 doi: 10.1109/VETECF.2007.22 – ident: 10.1016/j.comcom.2014.02.020_b0215 – ident: 10.1016/j.comcom.2014.02.020_b0135 – ident: 10.1016/j.comcom.2014.02.020_b0485 – ident: 10.1016/j.comcom.2014.02.020_b0150 – ident: 10.1016/j.comcom.2014.02.020_b0340 doi: 10.1007/11814764_22 – year: 2009 ident: 10.1016/j.comcom.2014.02.020_b0525 – ident: 10.1016/j.comcom.2014.02.020_b0380 doi: 10.1109/DSN.2004.1311881 – ident: 10.1016/j.comcom.2014.02.020_b0605 doi: 10.1109/WMNC.2010.5678756 – volume: 14 start-page: 1500 year: 2013 ident: 10.1016/j.comcom.2014.02.020_b0085 article-title: A MAC protocol using road traffic estimation for infrastructure-to-vehicle communications on highways publication-title: IEEE Trans. Intell. Transp. Syst. doi: 10.1109/TITS.2013.2264356 – ident: 10.1016/j.comcom.2014.02.020_b0090 – ident: 10.1016/j.comcom.2014.02.020_b0200 doi: 10.1145/1023875.1023881 – ident: 10.1016/j.comcom.2014.02.020_b0515 doi: 10.1109/SAINTW.2003.1210183 – ident: 10.1016/j.comcom.2014.02.020_b0250 – volume: 29 start-page: 605 year: 2011 ident: 10.1016/j.comcom.2014.02.020_b0460 article-title: Threshold anonymous announcement in VANETs publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2011.110310 – volume: 12 start-page: 659 year: 2011 ident: 10.1016/j.comcom.2014.02.020_b0095 article-title: Energy-efficient cooperative techniques for infrastructure-to-vehicle communications publication-title: IEEE Trans. Intell. Transp. Syst. doi: 10.1109/TITS.2011.2118754 – ident: 10.1016/j.comcom.2014.02.020_b0320 doi: 10.1007/978-3-540-79966-5_8 – ident: 10.1016/j.comcom.2014.02.020_b0285 – ident: 10.1016/j.comcom.2014.02.020_b0155 – volume: 4 start-page: 52 year: 2009 ident: 10.1016/j.comcom.2014.02.020_b0395 article-title: Automobile security concerns publication-title: IEEE Veh. Technol. Mag. doi: 10.1109/MVT.2009.932539 – volume: 31 start-page: 2803 year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0225 article-title: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks publication-title: Comput. Commun. doi: 10.1016/j.comcom.2007.12.005 – ident: 10.1016/j.comcom.2014.02.020_b0125 doi: 10.1109/WCNC.2007.467 – ident: 10.1016/j.comcom.2014.02.020_b0230 doi: 10.1007/0-387-33406-8_6 – ident: 10.1016/j.comcom.2014.02.020_b0330 doi: 10.1109/MOBIQ.2007.4451013 – volume: 1 start-page: 280 year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0600 article-title: AnonySense: opportunistic and privacy-preserving context collection publication-title: Pervasive Comput. doi: 10.1007/978-3-540-79576-6_17 – ident: 10.1016/j.comcom.2014.02.020_b0220 doi: 10.1109/ARES.2006.136 – year: 2010 ident: 10.1016/j.comcom.2014.02.020_b0520 – year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0550 article-title: Vehicle-to-vehicle communications: applications and perspectives publication-title: Wirel. Ad Hoc Sens. Networks doi: 10.1002/9780470610893.ch12 – year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0530 article-title: A tutorial survey on vehicular ad hoc networks publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2008.4539481 – volume: 59 start-page: 559 year: 2010 ident: 10.1016/j.comcom.2014.02.020_b0480 article-title: Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2009.2034669 – year: 2010 ident: 10.1016/j.comcom.2014.02.020_b0535 – volume: 13 start-page: 50 year: 2006 ident: 10.1016/j.comcom.2014.02.020_b0570 article-title: Securing wireless mesh networks publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.2006.1632480 – ident: 10.1016/j.comcom.2014.02.020_b0030 doi: 10.1109/ICETET.2009.198 – ident: 10.1016/j.comcom.2014.02.020_b0185 – ident: 10.1016/j.comcom.2014.02.020_b0435 – ident: 10.1016/j.comcom.2014.02.020_b0375 doi: 10.1145/863965.863968 – ident: 10.1016/j.comcom.2014.02.020_b0420 doi: 10.1109/ITST.2007.4295890 – ident: 10.1016/j.comcom.2014.02.020_b0105 doi: 10.1109/MOBIQ.2004.1331717 – ident: 10.1016/j.comcom.2014.02.020_b0060 doi: 10.1145/1102219.1102223 – year: 2010 ident: 10.1016/j.comcom.2014.02.020_b0560 article-title: Infotainment and road safety service support in vehicular networking: from a communication perspective publication-title: Mech. Syst. Signal Process. – ident: 10.1016/j.comcom.2014.02.020_b0575 doi: 10.1109/SAHCNW.2009.5172962 – ident: 10.1016/j.comcom.2014.02.020_b0425 doi: 10.1109/ICC.2009.5199041 – ident: 10.1016/j.comcom.2014.02.020_b0490 doi: 10.1109/JCN.2009.6388411 – year: 2011 ident: 10.1016/j.comcom.2014.02.020_b0610 article-title: Efficient detection of sybil attack based on cryptography in VANET publication-title: Int. J. Network Secur. Appl. (IJNSA) doi: 10.5121/ijnsa.2011.3614 – volume: 1 year: 2011 ident: 10.1016/j.comcom.2014.02.020_b0585 article-title: Trust and trusted computing in VANET publication-title: Comput. Sci. – volume: 46 start-page: 100 year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0195 article-title: Secure vehicular communication systems: design and architecture publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2008.4689252 – ident: 10.1016/j.comcom.2014.02.020_b0345 doi: 10.1109/GLOCOM.2008.ECP.947 – ident: 10.1016/j.comcom.2014.02.020_b0140 doi: 10.1109/NETAPPS.2010.17 – volume: 31 start-page: 591 year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0995 article-title: A multiagent approach to autonomous intersection management publication-title: J. Artif. Int. Res. – ident: 10.1016/j.comcom.2014.02.020_b0465 doi: 10.1109/ICRTIT.2011.5972438 – volume: 25 start-page: 1569 year: 2007 ident: 10.1016/j.comcom.2014.02.020_b0400 article-title: Amoeba: robust location privacy scheme for VANET publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2007.071007 – ident: 10.1016/j.comcom.2014.02.020_b0020 doi: 10.1109/ISCID.2012.184 – ident: 10.1016/j.comcom.2014.02.020_b0475 – ident: 10.1016/j.comcom.2014.02.020_b0305 doi: 10.1109/VETECS.2010.5494204 – ident: 10.1016/j.comcom.2014.02.020_b0410 doi: 10.1109/ICVES.2008.4640905 – ident: 10.1016/j.comcom.2014.02.020_b0160 – volume: 34 start-page: 39 year: 2004 ident: 10.1016/j.comcom.2014.02.020_b0385 article-title: A taxonomy of DDoS attack and DDoS defense mechanisms publication-title: ACM SIGCOMM Comput. Commun. Rev. doi: 10.1145/997150.997156 – volume: 10 year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0540 article-title: Vehicle ad hoc networks: applications and related technical issues publication-title: IEEE Commun. – ident: 10.1016/j.comcom.2014.02.020_b0500 – volume: 6 start-page: 24 year: 2004 ident: 10.1016/j.comcom.2014.02.020_b0245 article-title: The threat of intelligent collisions publication-title: IT Prof. doi: 10.1109/MITP.2004.1265539 – ident: 10.1016/j.comcom.2014.02.020_b0440 doi: 10.1109/INFOCOM.2007.179 – volume: 59 start-page: 1606 year: 2010 ident: 10.1016/j.comcom.2014.02.020_b0450 article-title: A scalable robust authentication protocol for secure vehicular communications publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2009.2038222 – ident: 10.1016/j.comcom.2014.02.020_b0455 doi: 10.1007/978-3-642-24861-0_20 – ident: 10.1016/j.comcom.2014.02.020_b0145 – volume: 15 start-page: 39 year: 2007 ident: 10.1016/j.comcom.2014.02.020_b0325 article-title: Securing vehicular ad hoc networks publication-title: J. Comput. Secur. doi: 10.3233/JCS-2007-15103 – ident: 10.1016/j.comcom.2014.02.020_b0050 doi: 10.1109/GLOCOMW.2008.ECP.63 – ident: 10.1016/j.comcom.2014.02.020_b0360 doi: 10.1109/CICSyN.2011.77 – volume: 62 start-page: 4150 issue: 9 year: 2013 ident: 10.1016/j.comcom.2014.02.020_b0180 article-title: Automatic emergency braking: Realistic analysis of car dynamics and network performance publication-title: IEEE T. Veh. Technol. doi: 10.1109/TVT.2013.2277802 – ident: 10.1016/j.comcom.2014.02.020_b0275 doi: 10.1007/978-3-642-04434-2_4 – ident: 10.1016/j.comcom.2014.02.020_b0260 doi: 10.1109/icc.2011.5962947 – ident: 10.1016/j.comcom.2014.02.020_b0300 – ident: 10.1016/j.comcom.2014.02.020_b0405 doi: 10.1007/11767831_13 – ident: 10.1016/j.comcom.2014.02.020_b0080 – ident: 10.1016/j.comcom.2014.02.020_b0190 doi: 10.1109/BSC.2010.5473015 – ident: 10.1016/j.comcom.2014.02.020_b0335 doi: 10.1109/ICNP.2008.4697044 – ident: 10.1016/j.comcom.2014.02.020_b0505 doi: 10.1145/1161064.1161076 – ident: 10.1016/j.comcom.2014.02.020_b0445 doi: 10.1145/1287748.1287752 – ident: 10.1016/j.comcom.2014.02.020_b0255 – ident: 10.1016/j.comcom.2014.02.020_b0280 – year: 2011 ident: 10.1016/j.comcom.2014.02.020_b0565 article-title: Secure and efficient protocol for vehicular ad hoc network with privacy preservation publication-title: EURASIP J. Wirel. Commun. Networking doi: 10.1007/978-3-642-27201-1 – ident: 10.1016/j.comcom.2014.02.020_b0065 doi: 10.1109/BWCCA.2011.12 – volume: 21 year: 2010 ident: 10.1016/j.comcom.2014.02.020_b0545 article-title: An identity-based security system for user privacy in vehicular ad hoc networks publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 7 start-page: 1106 year: 2012 ident: 10.1016/j.comcom.2014.02.020_b0430 article-title: Routing algorithm based on multi-community evolutionary game for VANET publication-title: J. Networks doi: 10.4304/jnw.7.7.1106-1115 – ident: 10.1016/j.comcom.2014.02.020_b0040 – volume: 13 start-page: 8 year: 2006 ident: 10.1016/j.comcom.2014.02.020_b0120 article-title: Securing vehicular communications publication-title: IEEE Wirel. Commun. doi: 10.1109/WC-M.2006.250352 – ident: 10.1016/j.comcom.2014.02.020_b0025 doi: 10.1201/EBK1439819197-13 – ident: 10.1016/j.comcom.2014.02.020_b0210 – ident: 10.1016/j.comcom.2014.02.020_b0595 doi: 10.1109/GLOCOMW.2008.ECP.63 – ident: 10.1016/j.comcom.2014.02.020_b0470 – ident: 10.1016/j.comcom.2014.02.020_b0130 doi: 10.1109/SYNASC.2010.9 – ident: 10.1016/j.comcom.2014.02.020_b0355 doi: 10.1109/ISWTA.2011.6089388 – ident: 10.1016/j.comcom.2014.02.020_b0110 doi: 10.1145/1080754.1080762 – ident: 10.1016/j.comcom.2014.02.020_b0390 doi: 10.1109/GLOCOMW.2010.5700199 – volume: 10 start-page: 6 year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0365 article-title: Taxonomies of attacks and vulnerabilities in computer systems publication-title: IEEE Commun. Surv. Tutorials doi: 10.1109/COMST.2008.4483667 – ident: 10.1016/j.comcom.2014.02.020_b0115 doi: 10.1109/NETAPPS.2010.17 – ident: 10.1016/j.comcom.2014.02.020_b0175 doi: 10.1109/ARTCom.2009.173 – volume: 4 start-page: 894 year: 2010 ident: 10.1016/j.comcom.2014.02.020_b0555 article-title: Security attacks and solutions for vehicular ad hoc networks publication-title: IET Commun. doi: 10.1049/iet-com.2009.0191 – ident: 10.1016/j.comcom.2014.02.020_b0580 doi: 10.1109/GLOCOMW.2007.4437823 – volume: 10 start-page: 74 year: 2008 ident: 10.1016/j.comcom.2014.02.020_b0310 article-title: Vehicle ad hoc networks: applications and related technical issues publication-title: IEEE Commun. Surv. Tutorials doi: 10.1109/COMST.2008.4625806 – ident: 10.1016/j.comcom.2014.02.020_b0295 doi: 10.1145/1160972.1160974 |
SSID | ssj0004773 |
Score | 2.5488873 |
Snippet | Vehicular ad hoc networks (VANETs), a subset of Mobile Ad hoc NETworks (MANETs), refer to a set of smart vehicles used on the road. These vehicles provide... |
SourceID | pascalfrancis crossref elsevier |
SourceType | Index Database Enrichment Source Publisher |
StartPage | 1 |
SubjectTerms | Applied sciences Computer science; control theory; systems Computer systems and distributed systems. User interface Equipments and installations Exact sciences and technology Ground, air and sea transportation, marine construction Malicious nodes Memory and file management (including protection and security) Memory organisation. Data processing Mobile radiocommunication systems Radiocommunications Road transportation and traffic Security Software Telecommunications Telecommunications and information theory VANETs Vehicular ad hoc networks |
Title | VANET security surveys |
URI | https://dx.doi.org/10.1016/j.comcom.2014.02.020 |
Volume | 44 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La8JAEB7EXlpK6UtqH5JDr6m6ryRHEcW21JMWb2HdB1iKFR899rd3Jg9boSAUAiFhd5N8u5mZkG--Abi33jMTKxU6J1kofJuH0ySroUFpljqSIhPTeRmqwVg8TeSkAt0yF4ZolYXtz216Zq2LM80CzeZiNmtmtCSulMAdBeak-ClERKv84euH5iGi_C8z0RipdZk-l3G8cGzijKATFJlyJ1X9_ts9HS_0CkHzebWLXy6ofwonRewYdPLbO4OKm5_D0S9FwQuovXaGvVGwKqrSBavN8hPn6hLG_d6oOwiL0geh4Vytwzg2ThpHSjCWxwI_45K2S6zz3Letsx4h5spg7GRlYmysE-FIiU5r9NdMC8lrUJ1_zN0VBLH0jLWMRmfuhVNeM-fjKfPWYGSEr2wdePnEqSl0wak8xXtaEsDe0hynlHBKWwy3Vh3Cba9Frouxp31UgpnuzG-KpntPz8YO9tvLoWPF6Cvh1_8e-gYO6YjIAG15C9X1cuPuMMZYTxvZImrAQefxeTD8BjqMzuk |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La8JAEB6sHtpSSl9S-7A59Bo0-4jJUUSJVXPS4m1ZN7tgKVZ89Pd3Ng-rUBAKgUCS2STfJjMT8s03AK-JMUQFvu9qzYnLjEfdWZj20LBllrLFWSqmM4r9aMLepnxagk5RC2Nplbnvz3x66q3zLY0czcZyPm-ktCTq-wxXNjGnJ1Cx6lS8DJV2fxDFv-WRrexHs2UyWoOigi6leeHwljaCcZCl4p228fffEepiKdeIm8kaXuxFod4VXObpo9POrvAaSnpxA-d7ooK3UH1vx92xs84b0znr7eobp-sOJr3uuBO5efcDV1Hqb9wgUJorbcVgEhow_JILPR0m2lDjJToxiDL1FaZPCQ9VEsiQaStGJyWGbCIZp1UoL74W-h6cgBtCmkpiPDdM-0YSbYIZMYnC5Ajf2hrQ4o6FyqXBbYeKT1FwwD5EhpOwOIkmwaVZA3dntcykMY4c3yrAFAdTLNB7H7GsH2C_Ox3GVkzAQvrw76Ff4DQaj4Zi2I8Hj3Bm91hugMefoLxZbfUzphybWT1_pH4AZa7Rmg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=VANET+security+surveys&rft.jtitle=Computer+communications&rft.au=Engoulou%2C+Richard+Gilles&rft.au=Bella%C3%AFche%2C+Martine&rft.au=Pierre%2C+Samuel&rft.au=Quintero%2C+Alejandro&rft.date=2014-05-15&rft.pub=Elsevier+B.V&rft.issn=0140-3664&rft.eissn=1873-703X&rft.volume=44&rft.spage=1&rft.epage=13&rft_id=info:doi/10.1016%2Fj.comcom.2014.02.020&rft.externalDocID=S0140366414000863 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon |