Triki et al., 2013 - Google Patents
A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networksTriki et al., 2013
View PDF- Document ID
- 5698466908701945046
- Author
- Triki B
- Rekhis S
- Chammem M
- Boudriga N
- Publication year
- Publication venue
- 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC)
External Links
Snippet
Services provided by vehicular Adhoc Networks (VANETs) would be impaired if faced to sybil attacks, by which malicious vehicles claim multiple identities at the same time. The prevention of these attacks, which could occur in or out of the Road Side Units (RSUs) …
- 238000004088 simulation 0 abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mirsadeghi et al. | A trust infrastructure based authentication method for clustered vehicular ad hoc networks | |
| Lu et al. | A survey on recent advances in vehicular network security, trust, and privacy | |
| Rajput et al. | A hybrid approach for efficient privacy-preserving authentication in VANET | |
| Yu et al. | MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks | |
| Sampigethaya et al. | AMOEBA: Robust location privacy scheme for VANET | |
| Yang et al. | DeQoS attack: Degrading quality of service in VANETs and its mitigation | |
| Triki et al. | A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks | |
| Park et al. | Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support | |
| Kumar et al. | Cybersecurity measures for geocasting in vehicular cyber physical system environments | |
| Hammi et al. | Is it really easy to detect sybil attacks in c-its environments: a position paper | |
| Junejo et al. | A privacy‐preserving attack‐resistant trust model for internet of vehicles ad hoc networks | |
| Kushwaha et al. | A survey on sybil attack in vehicular ad-hoc network | |
| Hussain et al. | On secure and privacy-aware sybil attack detection in vehicular communications | |
| Ghaleb et al. | Security and privacy enhancement in VANETs using mobility pattern | |
| Tyagi et al. | Preserving location privacy in location based services against sybil attacks | |
| Rabieh et al. | A secure and privacy‐preserving event reporting scheme for vehicular Ad Hoc networks | |
| Balan et al. | RSSI and public key infrastructure based secure communication in autonomous vehicular networks | |
| Engoulou et al. | A decentralized reputation management system for securing the internet of vehicles | |
| Abdulkader et al. | A survey on sybil attack detection in vehicular ad hoc networks (VANET) | |
| Garai et al. | Authentication in QoS aware VANET: An approach based on enhanced digital certificates | |
| Pouyan et al. | Sybil attack detection in vehicular networks | |
| Lyu et al. | Enabling fast and privacy-preserving broadcast authentication with efficient revocation for inter-vehicle connections | |
| Mekliche et al. | L-P2DSA: Location-based privacy-preserving detection of Sybil attacks | |
| Weimerskirch et al. | Data security in vehicular communication networks | |
| Zhang et al. | TECS: A Trust Model for VANETs using eigenvector centrality and social metrics |