Da Silva et al., 2012 - Google Patents
Examining privacy in vehicular ad-hoc networksDa Silva et al., 2012
View PDF- Document ID
- 6347411165415249066
- Author
- Da Silva D
- Ann Kosa T
- Marsh S
- El-Khatib K
- Publication year
- Publication venue
- Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
External Links
Snippet
In this paper, we examine privacy implications within vehicular ad-hoc networks, specifically looking at DSRC. By looking at different possible applications for VANETs, we get an idea for the consequences of a privacy breach within VANETs. We examined the DSRC protocol …
- 102100004612 PIGP 0 abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/20—Monitoring the location of vehicles belonging to a group, e.g. fleet of vehicles, countable or determined number of vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/09—Arrangements for giving variable traffic instructions
- G08G1/0962—Arrangements for giving variable traffic instructions having an indicator mounted inside the vehicle, e.g. giving voice messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Arif et al. | A survey on security attacks in VANETs: Communication, applications and challenges | |
Yoshizawa et al. | A survey of security and privacy issues in v2x communication systems | |
Van Der Heijden et al. | Survey on misbehavior detection in cooperative intelligent transportation systems | |
Kaur et al. | Security issues in vehicular ad-hoc network (VANET) | |
Raya et al. | The security of vehicular ad hoc networks | |
Othmane et al. | A survey of security and privacy in connected vehicles | |
Raya et al. | Securing vehicular ad hoc networks | |
Qian et al. | Design of secure and application-oriented VANETs | |
Razzaque et al. | Security and privacy in vehicular ad-hoc networks: survey and the road ahead | |
Tripathi et al. | A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS) | |
Mishra et al. | Security in vehicular adhoc networks: a survey | |
Boualouache et al. | TAPCS: Traffic-aware pseudonym changing strategy for VANETs | |
Da Silva et al. | Examining privacy in vehicular ad-hoc networks | |
Talat et al. | A survey on location privacy techniques deployed in vehicular networks | |
Al-Ani et al. | Privacy and safety improvement of VANET data via a safety-related privacy scheme | |
Zhao et al. | Security challenges for the intelligent transportation system | |
Phull et al. | A review on security issues in VANETs | |
Bhargava et al. | A Systematic Approach for Attack Analysis and Mitigation in V2V Networks. | |
Krishna et al. | Preserving privacy in future vehicles of tomorrow | |
Stübing | Multilayered security and privacy protection in Car-to-X networks: solutions from application down to physical layer | |
Bouksani et al. | RIN: A dynamic pseudonym change system for privacy in VANET | |
Ekedebe et al. | On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS) | |
Thenmozhi et al. | Pseudonyms based blind signature approach for an improved secured communication at social spots in VANETs | |
Malik et al. | An overview of security challenges in vehicular ad-hoc networks | |
Haidar et al. | Experimentation and assessment of pseudonym certificate management and misbehavior detection in C-ITS |