Raya et al., 2005 - Google Patents
Security aspects of inter-vehicle communicationsRaya et al., 2005
View PDF- Document ID
- 14231237578001817477
- Author
- Raya M
- Hubaux J
- Publication year
- Publication venue
- 5th Swiss Transport Research Conference (STRC)
External Links
Snippet
Abstract Inter-Vehicular Communications (IVC) are a cornerstone of the future intelligent transportation systems. A crucial enabling component of IVC is its security and privacy. Indeed, as vehicular computing systems become interconnected, there will be new venues …
- 238000004642 transportation engineering 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Raya et al. | Security aspects of inter-vehicle communications | |
Othmane et al. | A survey of security and privacy in connected vehicles | |
Parno et al. | Challenges in securing vehicular networks | |
Raya et al. | The security of vehicular ad hoc networks | |
Leinmuller et al. | Security requirements and solution concepts in vehicular ad hoc networks | |
Yang et al. | DeQoS attack: Degrading quality of service in VANETs and its mitigation | |
Razzaque et al. | Security and privacy in vehicular ad-hoc networks: survey and the road ahead | |
CN109362062B (en) | ID-based group signature-based VANETs anonymous authentication system and method | |
Xue et al. | LPA: a new location‐based privacy‐preserving authentication protocol in VANET | |
Sumra et al. | Trust and trusted computing in VANET | |
Kim et al. | Security issues in vehicular networks | |
Parham et al. | An effective privacy-aware Sybil attack detection scheme for secure communication in vehicular ad hoc network | |
Zhao et al. | Security challenges for the intelligent transportation system | |
CN104010302A (en) | Vehicle-mounted self-organizing network traffic data trust evaluation method | |
Lin et al. | Vehicular ad hoc network security and privacy | |
Mejri et al. | Recent advances in cryptographic solutions for vehicular networks | |
Stübing | Multilayered security and privacy protection in Car-to-X networks: solutions from application down to physical layer | |
Domingo-Ferrer et al. | Safety and privacy in vehicular communications | |
Zidi et al. | Review and Perspectives on the Audit of Vehicle-to-everything Communications | |
Thenmozhi et al. | Pseudonyms based blind signature approach for an improved secured communication at social spots in VANETs | |
Yadav et al. | Security in vehicular ad hoc networks | |
Raya | Data-centric trust in ephemeral networks | |
de Fuentes et al. | WEVAN–A mechanism for evidence creation and verification in VANETs | |
Gerla et al. | Securing the future autonomous vehicle: A cyber-physical systems approach | |
Viejo et al. | Aggregation of trustworthy announcement messages in vehicular ad hoc networks |