Mondal et al., 2018 - Google Patents
Extending security horizon through identification authentication and tracking services in hierarchical vehicular networksMondal et al., 2018
- Document ID
- 2932363446361442493
- Author
- Mondal A
- Mitra S
- Publication year
- Publication venue
- Computers & Electrical Engineering
External Links
Snippet
The inter-vehicle communication in vehicular ad hoc network must be protected from unauthorized message injection and message alteration of unauthentic vehicles. A lightweight scheme for identification, authentication and tracking of vehicles in hierarchical …
- 238000004891 communication 0 abstract description 44
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Xiong et al. | Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs | |
| Vijayakumar et al. | Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks | |
| US8635681B2 (en) | Method and system to authorize and assign digital certificates without loss of privacy, and/or to enhance privacy key selection | |
| Alexiou et al. | Vespa: Vehicular security and privacy-preserving architecture | |
| Hathal et al. | Certificateless and lightweight authentication scheme for vehicular communication networks | |
| Daeinabi et al. | An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks | |
| Oulhaci et al. | Secure and distributed certification system architecture for safety message authentication in VANET | |
| Khalil et al. | Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks | |
| Chim et al. | MLAS: Multiple level authentication scheme for VANETs | |
| CN114430552B (en) | Vehicle networking v2v efficient communication method based on message pre-authentication technology | |
| Tiwari et al. | A novel secure authentication scheme for VANETs | |
| Li et al. | A Privacy‐Preserving Authentication Scheme for VANETs with Exculpability | |
| Mondal et al. | Security issues in vehicular ad hoc networks for evolution towards Internet of vehicles | |
| Furtado et al. | Threat analysis of the security credential management system for vehicular communications | |
| Sahu et al. | PMA-KDP: privacy-preserving mutual authentication and key distribution protocol in Vehicular Ad-hoc Networks (VANETs) | |
| Naskar et al. | Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks | |
| Mallissery et al. | Cloud enabled secure communication in vehicular ad-hoc networks | |
| Mahmood et al. | Comment on “lightweight secure message broadcasting protocol for vehicle-to-vehicle communication” | |
| Dina et al. | Conditional privacy-preserving authentication and message dissemination scheme using timestamp based pseudonyms for VANETs | |
| Weimerskirch et al. | Data security in vehicular communication networks | |
| Khalil et al. | Crypto-SAP protocol for Sybil attack prevention in VANETs | |
| Mondal et al. | Extending security horizon through identification authentication and tracking services in hierarchical vehicular networks | |
| Kargl et al. | Security and privacy in vehicular networks | |
| Gafencu et al. | An overview of security aspects and solutions in VANETs | |
| Stephen et al. | Roadside unit‐based pseudonym authentication in vehicular ad hoc network |