[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Raya et al., 2005 - Google Patents

Security aspects of inter-vehicle communications

Raya et al., 2005

View PDF
Document ID
14231237578001817477
Author
Raya M
Hubaux J
Publication year
Publication venue
5th Swiss Transport Research Conference (STRC)

External Links

Snippet

Abstract Inter-Vehicular Communications (IVC) are a cornerstone of the future intelligent transportation systems. A crucial enabling component of IVC is its security and privacy. Indeed, as vehicular computing systems become interconnected, there will be new venues …
Continue reading at infoscience.epfl.ch (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer

Similar Documents

Publication Publication Date Title
Raya et al. Security aspects of inter-vehicle communications
Othmane et al. A survey of security and privacy in connected vehicles
Parno et al. Challenges in securing vehicular networks
Raya et al. The security of vehicular ad hoc networks
Leinmuller et al. Security requirements and solution concepts in vehicular ad hoc networks
Yang et al. DeQoS attack: Degrading quality of service in VANETs and its mitigation
Razzaque et al. Security and privacy in vehicular ad-hoc networks: survey and the road ahead
CN109362062B (en) ID-based group signature-based VANETs anonymous authentication system and method
Xue et al. LPA: a new location‐based privacy‐preserving authentication protocol in VANET
Sumra et al. Trust and trusted computing in VANET
Kim et al. Security issues in vehicular networks
Parham et al. An effective privacy-aware Sybil attack detection scheme for secure communication in vehicular ad hoc network
Zhao et al. Security challenges for the intelligent transportation system
CN104010302A (en) Vehicle-mounted self-organizing network traffic data trust evaluation method
Lin et al. Vehicular ad hoc network security and privacy
Mejri et al. Recent advances in cryptographic solutions for vehicular networks
Stübing Multilayered security and privacy protection in Car-to-X networks: solutions from application down to physical layer
Domingo-Ferrer et al. Safety and privacy in vehicular communications
Zidi et al. Review and Perspectives on the Audit of Vehicle-to-everything Communications
Thenmozhi et al. Pseudonyms based blind signature approach for an improved secured communication at social spots in VANETs
Yadav et al. Security in vehicular ad hoc networks
Raya Data-centric trust in ephemeral networks
de Fuentes et al. WEVAN–A mechanism for evidence creation and verification in VANETs
Gerla et al. Securing the future autonomous vehicle: A cyber-physical systems approach
Viejo et al. Aggregation of trustworthy announcement messages in vehicular ad hoc networks