Enhancing Privacy and Reducing Traffic Levels in Vehicular Ad-Hoc Networks
Abstract
Keywords
Full Text:
PDFReferences
M. Raya and J-P. Hubaux, “Securing Vehicular Ad Hoc Networks,” J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007.
J.Y. Choi, M. Jakobsson, and S. Wetzel, “Balancing Auditability and Privacy in Vehicular Networks,” Proc. First ACM Int’l WorkshopQoS and Security for Wireless and Mobile Networks (Q2SWinet ’05), pp. 79-87, Oct. 2005.
J. Sun, C. Zhang, and Y. Fang, “An Id-Based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks,” Proc. IEEE Military Comm. Conf., pp. 1-7, Oct. 2007.
X. Lin, X. Sun, P.-H. Ho, and X. Shen, “GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications, ”IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
M. Raya, P. apadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux,“Eviction of Misbehaving and Faulty Nodes in Vehicular Networks,” IEEE J. Selected Areas Comm., vol. 25, no. 8, pp. 1557- 1568,Oct. 2007.
C. Gamage, B. Gras, B. Crispo, and A.S. Tanenbaum, “An Identity Based Ring Signature Scheme with Enhanced Privacy,” Proc.Second Int’l Conf. Security and Privacy in Comm. Networks (SecureComm ’06), Aug. 2006.
P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, “Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs,” Proc. ACM Conf. Computer and Comm. Security (CCS),pp. 72-81, 2007.
J. Sun and Y. Fang, “A Defense Technique against Misbehavior in VANETs Based on Threshold Authentication,” Proc. IEEE Military Comm. Conf., Nov. 2008.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.