[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Da Silva et al., 2012 - Google Patents

Examining privacy in vehicular ad-hoc networks

Da Silva et al., 2012

View PDF
Document ID
6347411165415249066
Author
Da Silva D
Ann Kosa T
Marsh S
El-Khatib K
Publication year
Publication venue
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications

External Links

Snippet

In this paper, we examine privacy implications within vehicular ad-hoc networks, specifically looking at DSRC. By looking at different possible applications for VANETs, we get an idea for the consequences of a privacy breach within VANETs. We examined the DSRC protocol …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/20Monitoring the location of vehicles belonging to a group, e.g. fleet of vehicles, countable or determined number of vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/09Arrangements for giving variable traffic instructions
    • G08G1/0962Arrangements for giving variable traffic instructions having an indicator mounted inside the vehicle, e.g. giving voice messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications

Similar Documents

Publication Publication Date Title
Arif et al. A survey on security attacks in VANETs: Communication, applications and challenges
Yoshizawa et al. A survey of security and privacy issues in v2x communication systems
Van Der Heijden et al. Survey on misbehavior detection in cooperative intelligent transportation systems
Kaur et al. Security issues in vehicular ad-hoc network (VANET)
Raya et al. The security of vehicular ad hoc networks
Othmane et al. A survey of security and privacy in connected vehicles
Raya et al. Securing vehicular ad hoc networks
Qian et al. Design of secure and application-oriented VANETs
Razzaque et al. Security and privacy in vehicular ad-hoc networks: survey and the road ahead
Tripathi et al. A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS)
Mishra et al. Security in vehicular adhoc networks: a survey
Boualouache et al. TAPCS: Traffic-aware pseudonym changing strategy for VANETs
Da Silva et al. Examining privacy in vehicular ad-hoc networks
Talat et al. A survey on location privacy techniques deployed in vehicular networks
Al-Ani et al. Privacy and safety improvement of VANET data via a safety-related privacy scheme
Zhao et al. Security challenges for the intelligent transportation system
Phull et al. A review on security issues in VANETs
Bhargava et al. A Systematic Approach for Attack Analysis and Mitigation in V2V Networks.
Krishna et al. Preserving privacy in future vehicles of tomorrow
Stübing Multilayered security and privacy protection in Car-to-X networks: solutions from application down to physical layer
Bouksani et al. RIN: A dynamic pseudonym change system for privacy in VANET
Ekedebe et al. On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS)
Thenmozhi et al. Pseudonyms based blind signature approach for an improved secured communication at social spots in VANETs
Malik et al. An overview of security challenges in vehicular ad-hoc networks
Haidar et al. Experimentation and assessment of pseudonym certificate management and misbehavior detection in C-ITS