Secure vehicular communication systems: design and architecture
Top Cited Papers
- 25 November 2008
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Communications Magazine
- Vol. 46 (11), 100-109
- https://doi.org/10.1109/mcom.2008.4689252
Abstract
Significant developments have taken place over the past few years in the area of vehicular communication systems. Now, it is well understood in the community that security and protection of private user information are a prerequisite for the deployment of the technology. This is so precisely because the benefits of VC systems, with the mission to enhance transportation safety and efficiency, are at stake. Without the integration of strong and practical security and privacy enhancing mechanisms, VC systems can be disrupted or disabled, even by relatively unsophisticated attackers. We address this problem within the SeVeCom project, having developed a security architecture that provides a comprehensive and practical solution. We present our results in a set of two articles in this issue. In this first one, we analyze threats and types of adversaries, identify security and privacy requirements, and present a spectrum of mechanisms to secure VC systems. We provide a solution that can be quickly adopted and deployed. In the second article we present our progress toward the implementation of our architecture and results on the performance of the secure VC system, along with a discussion of upcoming research challenges and our related current results.Keywords
This publication has 9 references indexed in Scilit:
- Secure vehicular communication systems: implementation, performance, and research challengesIEEE Communications Magazine, 2008
- Certificate revocation list distribution in vehicular communication systemsPublished by Association for Computing Machinery (ACM) ,2008
- Secure neighborhood discovery: a fundamental element for mobile ad hoc networkingIEEE Communications Magazine, 2008
- Eviction of Misbehaving and Faulty Nodes in Vehicular NetworksIEEE Journal on Selected Areas in Communications, 2007
- On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETsLecture Notes in Computer Science, 2007
- POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKSIEEE Wireless Communications, 2006
- Impact of Pseudonym Changes on Geographic Routing in VANETsLecture Notes in Computer Science, 2006
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003
- Location privacy in pervasive computingIEEE Pervasive Computing, 2003