[go: up one dir, main page]

Mondal et al., 2018 - Google Patents

Extending security horizon through identification authentication and tracking services in hierarchical vehicular networks

Mondal et al., 2018

Document ID
2932363446361442493
Author
Mondal A
Mitra S
Publication year
Publication venue
Computers & Electrical Engineering

External Links

Snippet

The inter-vehicle communication in vehicular ad hoc network must be protected from unauthorized message injection and message alteration of unauthentic vehicles. A lightweight scheme for identification, authentication and tracking of vehicles in hierarchical …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it

Similar Documents

Publication Publication Date Title
Xiong et al. Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs
Vijayakumar et al. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks
US8635681B2 (en) Method and system to authorize and assign digital certificates without loss of privacy, and/or to enhance privacy key selection
Alexiou et al. Vespa: Vehicular security and privacy-preserving architecture
Hathal et al. Certificateless and lightweight authentication scheme for vehicular communication networks
Daeinabi et al. An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks
Oulhaci et al. Secure and distributed certification system architecture for safety message authentication in VANET
Khalil et al. Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Chim et al. MLAS: Multiple level authentication scheme for VANETs
CN114430552B (en) Vehicle networking v2v efficient communication method based on message pre-authentication technology
Tiwari et al. A novel secure authentication scheme for VANETs
Li et al. A Privacy‐Preserving Authentication Scheme for VANETs with Exculpability
Mondal et al. Security issues in vehicular ad hoc networks for evolution towards Internet of vehicles
Furtado et al. Threat analysis of the security credential management system for vehicular communications
Sahu et al. PMA-KDP: privacy-preserving mutual authentication and key distribution protocol in Vehicular Ad-hoc Networks (VANETs)
Naskar et al. Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
Mallissery et al. Cloud enabled secure communication in vehicular ad-hoc networks
Mahmood et al. Comment on “lightweight secure message broadcasting protocol for vehicle-to-vehicle communication”
Dina et al. Conditional privacy-preserving authentication and message dissemination scheme using timestamp based pseudonyms for VANETs
Weimerskirch et al. Data security in vehicular communication networks
Khalil et al. Crypto-SAP protocol for Sybil attack prevention in VANETs
Mondal et al. Extending security horizon through identification authentication and tracking services in hierarchical vehicular networks
Kargl et al. Security and privacy in vehicular networks
Gafencu et al. An overview of security aspects and solutions in VANETs
Stephen et al. Roadside unit‐based pseudonym authentication in vehicular ad hoc network