Academic literature on the topic 'Securing Vehicular'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Securing Vehicular.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Securing Vehicular"

1

Raya, Maxim, Panos Papadimitratos, and Jean-pierre Hubaux. "SECURING VEHICULAR COMMUNICATIONS." IEEE Wireless Communications 13, no. 5 (2006): 8–15. http://dx.doi.org/10.1109/wc-m.2006.250352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fernandez, Pedro J., Jose Santa, Fernando Bernal, and Antonio F. Skarmeta. "Securing Vehicular IPv6 Communications." IEEE Transactions on Dependable and Secure Computing 13, no. 1 (2016): 46–58. http://dx.doi.org/10.1109/tdsc.2015.2399300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moussaoui, Djilali, Mohamed Feham, Boucif Amar Bensaber, and Benamar Kadri. "Securing vehicular cloud networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4154. http://dx.doi.org/10.11591/ijece.v9i5.pp4154-4162.

Full text
Abstract:
<p>Vehicular Cloud Networks (VCN) is the network that ensures mobility and availability of resources allowing new services and applications like Network as a Service (NaaS), STorage as a Service (STaaS), Computation as a Service (CompaaS) and Cooperation as a Service (CaaS). In this paper, we propose a solution to secure the Vehicular Cloud Network (VCN). Our challenge in this work is to adapt the PKI architecture, which is mainly used in wired networks to be used in VCN. To propose a security solution for Vehicular Cloud Networks (VCN), our work is based on three steps; the first one is to make network architecture study, where we tried to highlight the main network components. The second step is to propose the security solution architecture. Finally, the last step is to program a test and validate the solution using a simulation.</p>
APA, Harvard, Vancouver, ISO, and other styles
4

Raya, Maxim, and Jean-Pierre Hubaux. "Securing vehicular ad hoc networks." Journal of Computer Security 15, no. 1 (2007): 39–68. http://dx.doi.org/10.3233/jcs-2007-15103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saez, Y., X. Cao, L. B. Kish, and G. Pesti. "Securing Vehicle Communication Systems by the KLJN Key Exchange Protocol." Fluctuation and Noise Letters 13, no. 03 (2014): 1450020. http://dx.doi.org/10.1142/s0219477514500205.

Full text
Abstract:
We review the security requirements for vehicular communication networks and provide a critical assessment of some typical communication security solutions. We also propose a novel unconditionally secure vehicular communication architecture that utilizes the Kirchhoff-law–Johnson-noise (KLJN) key distribution scheme.
APA, Harvard, Vancouver, ISO, and other styles
6

Mei, Fang, Shengjie Liu, Jian Wang, Yuming Ge, and Tie Feng. "Negotiation-Free Encryption for Securing Vehicular Unicasting Communication." Applied Sciences 9, no. 6 (2019): 1121. http://dx.doi.org/10.3390/app9061121.

Full text
Abstract:
Thanks to the rapid development of vehicle-to-everything (V2X) and sensor technology, states of vehicles can be accurately measured and stored jointly in the cloud. These states can be viewed as a set of infinite attributes, such as the density around the motor vehicle, signal strength and so on. As such, the vehicle can be viewed as a moving object. The vehicle state can be measured, and its entropy is large. In vehicle networking, unicast communications between vehicles must be encrypted. The previous approach was to negotiate a session key through the Diffie-Hellman algorithm and then use the session key to encrypt the communications. This method not only needs to know in advance the peer IP of the communication, but it also needs a long time to establish a session key. Therefore, it is not suitable for vehicle networking. For the fast-changing vehicle networking, the session key establishment process should be shortened or even canceled. In this paper, we propose a method of Negotiation-free encryption for securing vehicular unicasting communications to improve the efficiency of vehicle ad hoc network transmissions.
APA, Harvard, Vancouver, ISO, and other styles
7

Trouli, Georgia-Irene, and George Kornaros. "Automotive Virtual In-sensor Analytics for Securing Vehicular Communication." IEEE Design & Test 37, no. 3 (2020): 91–98. http://dx.doi.org/10.1109/mdat.2020.2974914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rathee, Sharma, Iqbal, Aloqaily, Jaglan, and Kumar. "A Blockchain Framework for Securing Connected and Autonomous Vehicles." Sensors 19, no. 14 (2019): 3165. http://dx.doi.org/10.3390/s19143165.

Full text
Abstract:
Recently, connected vehicles (CV) are becoming a promising research area leading to the concept of CV as a Service (CVaaS). With the increase of connected vehicles and an exponential growth in the field of online cab booking services, new requirements such as secure, seamless and robust information exchange among vehicles of vehicular networks are emerging. In this context, the original concept of vehicular networks is being transformed into a new concept known as connected and autonomous vehicles. Autonomous vehicular use yields a better experience and helps in reducing congestion by allowing current information to be obtained by the vehicles instantly. However, malicious users in the internet of vehicles may mislead the whole communication where intruders may compromise smart devices with the purpose of executing a malicious ploy. In order to prevent these issues, a blockchain technique is considered the best technique that provides secrecy and protection to the control system in real time conditions. In this paper, the issue of security in smart sensors of connected vehicles that can be compromised by expert intruders is addressed by proposing a blockchain framework. This study has further identified and validated the proposed mechanism based on various security criteria, such as fake requests of the user, compromise of smart devices, probabilistic authentication scenarios and alteration in stored user’s ratings. The results have been analyzed against some existing approach and validated with improved simulated results that offer 79% success rate over the above-mentioned issues.
APA, Harvard, Vancouver, ISO, and other styles
9

Shrestha, Rakesh, Seung Yeob Nam, Rojeena Bajracharya, and Shiho Kim. "Evolution of V2X Communication and Integration of Blockchain for Security Enhancements." Electronics 9, no. 9 (2020): 1338. http://dx.doi.org/10.3390/electronics9091338.

Full text
Abstract:
With the rapid evolution in wireless communications and autonomous vehicles, intelligent and autonomous vehicles will be launched soon. Vehicle to Everything (V2X) communications provides driving safety, traffic efficiency, and road information in real-time in vehicular networks. V2X has evolved by integrating cellular 5G and New Radio (NR) access technology in V2X communications (i.e., 5G NR V2X); it can fulfill the ever-evolving vehicular application, communication, and service demands of connected vehicles, such as ultra-low latency, ultra-high bandwidth, ultra-high reliability, and security. However, with the increasing number of intelligent and autonomous vehicles and their safety requirements, there is a backlash in deployment and management because of scalability, poor security and less flexibility. Multi-access Edge Computing (MEC) plays a significant role in bringing cloud services closer to vehicular nodes, which reduces the scalability and flexibility issues. In addition, blockchain has evolved as an effective technology enabler to solve several security, privacy, and networking issues faced by the current 5G-based MEC systems in vehicular networks. Blockchain can be integrated as a strong security mechanism for securing and managing 5G V2X along with MEC. In this survey, we discuss, in detail, state-of-the-art V2X, its evolution based on cellular 5G technology and non-cellular 802.11bd. We investigate the integration of blockchain in 5G-based MEC vehicular networks for security, privacy protection, and content caching. We present the issues and challenges in existing edge computing and 5G V2X and, then, we shed some light on future research directions in these integrated and emerging technologies.
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Jong-Hyouk, Jiefeng (Terence) Chen, and Thierry Ernst. "Securing mobile network prefix provisioning for NEMO based vehicular networks." Mathematical and Computer Modelling 55, no. 1-2 (2012): 170–87. http://dx.doi.org/10.1016/j.mcm.2011.02.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Securing Vehicular"

1

Ben, Jaballah Wafa. "Securing wireless sensor and vehicular networks." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0013/document.

Full text
Abstract:
Les Réseaux de Capteurs Sans Fils (RCSFs) et les réseaux véhiculaires sont de plus en plus répandus, et déployés dans des domaines d’applications variés tels que la santé, la surveillance environnementale, les applications d’alerte d’accident, et les applications militaires. Cependant, ces réseaux peuvent être sujets à des attaques, ce qui empêche leur utilisation à grande échelle. Cette thèse étudie la sécurité des communications pour les réseaux de capteurs sans fils, et les communications inter-véhiculaires. Dans ce but, nous abordons quatre aspects importants. La première étude porte sur l’authentification des messages diffusés dans les réseaux de capteurs. Nous nous concentrons sur les principaux schémas à base de divulgation de clés d’authentification. Nous démontrons que le délai de divulgation de clé induit un délai d’authentification, ce qui pourrait conduire à une attaque de mémoire de déni de service. Nous proposons ensuite deux protocoles d’authentification de la source dans les RCSFs, pour surmonter la vulnérabilité des solutions existantes. Les schémas proposés garantissent la gestion efficace de la mémoire tampon du récepteur, en utilisant un mécanisme d’authentification par niveau, et une structure de Filtre de Bloom afin de réduire le coût de communication. Ensuite, nous validons nos protocoles en utilisant l’outil de vérification AVISPA, et nous les évaluons avec des expérimentations dans l’environment TinyOS. Nous confirmons que ces protocoles fournissent un service d’authentification de la source tout en respectant les contraintes de RCSFs. La seconde étude porte sur le problème de stockage au niveau des capteurs. Nous considérons en particulier l’attaque d’authentification différée “Delayed Authentication Compromise” (DAC) dans les RCSFs, qui permet à un attaquant d’utiliser une clé déjà divulguée pour signer d’autres messages. Nous montrons d’abord que les systèmes récemment proposés qui sont résistants également à l’attaque DAC sont vulnérables aussi à deux types d’attaques: attaque de permutation de commandes (où un adversaire prétend “permuter” deux messages au fil du temps), et l’attaque de rejet de commandes (où un adversaire semble “cacher” un message envoyé par la station de base). Nous proposons ensuite une nouvelle solution d’authentification. Notre analyse montre que notre solution est efficace pour détecter à la fois l’attaque de permutation de commandes et l’attaque de rejet de commandes, — et en même temps — est plus efficace (en termes de communication et de calcul) que les solutions existantes. xxiDans la troisième étude, nous considérons le problème de la sécurité de la gestion des clés dans les réseaux de capteurs. Nous présentons de nouveaux schémas d’authentification à base de clés symétriques qui présentent un faible coût d’authentification et de communication. Nos systèmes sont construits en intégrant un mécanisme de réputation, un filtre de Bloom, et un arbre binaire de clés pour la distribution et la mise à jour des clés d’authentification. Nos schémas d’authentification sont efficaces en matière de communication et de consommation de l’énergie. La quatrième étude porte sur la sécurité des communications véhiculaires. Nous nous concentrons sur les applications d’alerte d’accident. Nous analysons les menaces pour un ensemble d’algorithmes. Nous démontrons que ces systèmes sont vulnérables à l’attaque d’injection d’une fausse position, à l’attaque de rejeu de message d’alerte, et à l’attaque d’interruption de message d’alerte. Ensuite, nous proposons des contre-mesures à ces menaces. Nous avons donc proposé une solution qui est à la fois rapide et sécurisée pour les applications d’alerte d’accident : Un algorithme rapide et sécurisé pour la diffusion des messages en multi-saut (FS-MBA). Enfin, nous confirmons l’efficacité et la faisabilité des différents protocoles en effectuant un ensemble de simulations sous le simulateur NS-2<br>Wireless sensor and vehicular networks play an important role in critical military and civil applications, and pervade our daily life. However, security concerns constitute a potential stumbling block to the impeding wide deployment of sensor networks and vehicular communications. This dissertation studies communication security for Wireless Sensor Networks (WSNs), and vehicular communication. To this aim, we address four important aspects. The first study addresses broadcast authentication in WSNs. We focus on key disclosure based schemes. We demonstrate that key disclosure delay induces an authentication delay, which could lead to a memory DoS attack. We then propose two broadcastauthentication protocols for WSNs, which overcome the security vulnerability of existingsolutions. The proposed schemes guarantee the efficient management of receiver’s buffer, by employing a staggered authentication mechanism, and a Bloom filter data structure to reduce the communication overhead. We also validate our protocols under the AVISPA model checking tool, and we evaluate them with experiments under TinyOS. Our findings are that these protocols provide source authentication service while respecting the WSN constraints.The second study addresses the storage issue in WSNs, in particular the Delayed AuthenticationCompromise attack (DAC). We first demonstrate that recently proposed schemes, which also address the DAC issue are vulnerable to two kinds of attacks: switch command attack (where an adversary pretends to “switch” two messages over time), and drop command attack (where an adversary just pretends to “hide” a message sent from the broadcaster). As a countermeasure against these attacks, we propose a new solution for broadcast authentication. Our analysis shows that our solution is effective in detecting both switch command and drop command attack, and—at the same time—is more efficient (in terms of both communication and computation) than the state of the art solutions.In the third study, we address key management security in WSNs. We present novel symmetric-key-based authentication schemes which exhibit low computation and communication authentication overhead. Our schemes are built upon the integration of a reputation mechanism, a Bloom filter, and a key binary tree for the distribution and updating of the auxviii thentication keys. Our schemes are lightweight and efficient with respect to communication and energy overhead. The fourth study addresses security in vehicular communications. We focus on fast multi hop broadcast applications. We analyze the security threats of state of the art vehicular based safety applications. We demonstrate that these schemes are vulnerable to the position cheating attack, the replay broadcast message attack, and the interrupting forwarding attack. Then, we propose countermeasures for these threats. We hence propose a complete solution which is both fast and secure in broadcasting safety related messages: Fast and Secure Multi-hop Broadcast Algorithm (FS-MBA). Finally, we confirm the efficiency and feasibility of our proposals using an extensive set of simulations under NS-2 Simulator
APA, Harvard, Vancouver, ISO, and other styles
2

Aldabbas, Hamza. "Securing data dissemination in vehicular ad hoc networks." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7987.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) in which the mobile nodes are vehicles; these vehicles are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. This kind of network has the advantage of being able to be set-up and deployed anywhere and anytime because it has no infrastructure set-up and no central administration. Distributing information between these vehicles over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging, particularly in military applications where controlling the dissemination of messages is essential. This thesis therefore provides a review of the issue of security in VANET and MANET; it also surveys existing solutions for dissemination control. It highlights a particular area not adequately addressed until now: controlling information flow in VANETs. This thesis contributes a policy-based framework to control the dissemination of messages communicated between nodes in order to ensure that message remains confidential not only during transmission, but also after it has been communicated to another peer, and to keep the message contents private to an originator-defined subset of nodes in the VANET. This thesis presents a novel framework to control data dissemination in vehicle ad hoc networks in which policies are attached to messages as they are sent between peers. This is done by automatically attaching policies along with messages to specify how the information can be used by the receiver, so as to prevent disclosure of the messages other than consistent with the requirements of the originator. These requirements are represented as a set of policy rules that explicitly instructs recipients how the information contained in messages can be disseminated to other nodes in order to avoid unintended disclosure. This thesis describes the data dissemination policy language used in this work; and further describes the policy rules in order to be a suitable and understandable language for the framework to ensure the confidentiality requirement of the originator. This thesis also contributes a policy conflict resolution that allows the originator to be asked for up-to-date policies and preferences. The framework was evaluated using the Network Simulator (NS-2) to provide and check whether the privacy and confidentiality of the originators’ messages were met. A policy-based agent protocol and a new packet structure were implemented in this work to manage and enforce the policies attached to packets at every node in the VANET. Some case studies are presented in this thesis to show how data dissemination can be controlled based on the policy of the originator. The results of these case studies show the feasibility of our research to control the data dissemination between nodes in VANETs. NS-2 is also used to test the performance of the proposed policy-based agent protocol and demonstrate its effectiveness using various network performance metrics (average delay and overhead).
APA, Harvard, Vancouver, ISO, and other styles
3

Mejri, Mohamed Nidhal. "Securing Vehicular Networks Against Denial of Service Attacks." Thesis, Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCD038/document.

Full text
Abstract:
Dans cette thèse nous nous sommes intéressés à sécuriser les réseaux véhiculaires ad hoc (VANETs) contre les attaques de déni de service (DoS) jugées comme étant les plus dangereuses pour ces réseaux. Notre travail peut être subdivisé en trois grandes parties.Dans un premier temps, nous avons étudié les différentes vulnérabilités auxquelles sont exposés les VANETs, spécialement les attaques DoS. Vu notre expertise en matière de la cryptographie, nous avons exploré, dégagé et classifié des solutions possibles à une grande panoplie de brèches de sécurité VANETs. En effet, nous avons montré que la cryptographie permet de résoudre divers problèmes de sécurité VANETs. Notre première contribution dans ce sens est un algorithme de génération de clés de groupe pour les convois de véhicules. Dans notre deuxième contribution nous avons conçu deux nouvelles méthodes de détection d’attaques DoS. Dans ce contexte, notre premier algorithme de détection est basé sur la régression linéaire, la logique floue ainsi que la définition de trois nouvelles métriques spécifiques VANETs. Dans notre deuxième algorithme de détection nous avons défini une nouvelle métrique à base de l'entropie de Shannon que nous avons introduite pour la première fois pour détecter tel type d’attaques. Notre troisième contribution a été consacrée à la réaction contre les attaques une fois détectées. Pour cela, nous avons eu recourt à l'utilisation des techniques offertes par la théorie des jeux. Nous avons proposé deux jeux non-coopératifs de réaction sous forme stratégique et extensive. Pour chacune des phases de détection et de réaction, les expérimentations ont été faites essentiellement pour les attaques greedy et jamming. Nos algorithmes proposés présentent l'avantage de la rapidité, d'être exécutés par n'importe quel nœud du réseau et ne nécessitent aucune modification du protocole IEEE 802.11p utilisée comme standard de la couche MAC et PHY des réseaux véhiculaires.Au cours de ce travail, nous avons pu participer à la sécurisation des réseaux VANETs. Cependant nous jugeons qu'il reste beaucoup à faire. A savoir par exemple, l'étude des solutions cryptographiques que nous avons menée nous a permis de découvrir à quel point l'usage de la cryptographie pour la sécurité des VANETs est un sujet assez vaste et qui nécessite d'être encore mieux exploré. Ceci constituera pour nous une ouverture assez prometteuse<br>In this thesis we interested in securing Vehicular Ad hoc Networks (VANETs) against Denial of Service attacks (DoS) judged to be the most dangerous attacks to such networks. Our work can be divided into three main parts. First, we studied all the various possible existing vulnerabilities to which are exposed VANETs, we focused especially on denial of service attacks. Based on our expertise in cryptography, we explored, identified and classified the possible solutions to a wide range of VANET security breaches from a cryptographic point of view. Indeed, we showed that cryptography with its primitives and fairly powerful tools solves many VANET security problems. Our first contribution in this direction is a secure group key generation algorithm for VANET platoons. In our second contribution, we have developed two new techniques to detect denial of service attacks in VANET networks mainly characterized by the high mobility and frequent disconnections which considerably complicate the detection. Our first detection algorithm is based on the linear regression mathematical concept, fuzzy logic and three newly defined VANET appropriate metrics. In our second algorithm we define a new Shannon Entropy based metric that we introduced for the first time to detect DoS attacks in VANET. Our third contribution was devoted to the reaction against the detected attacks. For that, we used the techniques offered by game theory. We have proposed two non-cooperative reaction games in strategic and extensive forms. For both detection and reaction proposed schemes, experiments were made essentially for the greedy behavior and jamming attacks. All our proposed algorithms present the advantage of rapidity, to be executed by any node of the network and do not require any modification of the 802.11p MAC layer protocol used as a standard for VANETs. In this work, we have participated in securing VANETs, however we believe that much remains to be done. Namely, for example the study of cryptographic solutions we have conducted, allowed us to discover how the use of cryptography for VANET security is a fairly broad topic which needs to be better explored. This will be for us a very promising subject
APA, Harvard, Vancouver, ISO, and other styles
4

Corser, George P. "Securing location privacy in vehicular applications and communications." Thesis, Oakland University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10169186.

Full text
Abstract:
<p> Vehicular communications systems may one day save lives, reduce fuel consumption, and advance connectivity, but they may also transmit information which could be deanonymized to obtain personal information. Vehicle location data are of special concern because they could be used maliciously. This dissertation presents a systematic study resulting in novel definitions, metrics and methods for evaluating and applying location privacy preserving protocols specifically in vehicular settings.</p><p> Previous work in vehicular network privacy has not thoroughly considered vehicular mobility patterns. Previous work in vehicular network privacy has not solved the problem of collusion between MAC layer and application layer attackers. As defenses against location privacy attacks, previous work has favored the privacy methods of anonymization and obfuscation, but these methods have weaknesses. Spatial-temporal cloaking, for example, requires overhead of trusted third parties, and provides little protection in low vehicle densities especially when applications require frequent precise location data. Little published work has addressed the "location" part of location privacy, the geographical distance of location privacy, focusing instead on the size of the anonymity set. The need for new metrics is indicated.</p><p> The present research addresses these issues. In addition to new definitions and metrics, this study develops privacy methods which would (1) accommodate vehicular mobility patterns, (2) defend against collusion by MAC and application layer attackers, (3) produce privacy solutions which depend on cooperation neither by large numbers of other motorists nor by trusted third parties, and (4) function in low vehicle densities, notably during the transition period between system initialization and full saturation, (5) provide protection even when applications require frequent and precise location queries, and (6) provide protection over a geographical range beyond a vehicle's wireless communications range and provide protection over measurable and lengthy spans of time. Finally, it presents a new metric for measuring privacy (KDT), an equation to estimate the safety impact of privacy protocols (SSTE), and three new privacy models, Endpoint Protection Zones (EPZ), Privacy by Decoy (PBD) and Random Rotation of Vehicular Trajectory (RRVT).</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Dadras, Soodeh. "Security of Vehicular Platooning." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7445.

Full text
Abstract:
Platooning concept involves a group of vehicles acting as a single unit through coordination of movements. While Platooning as an evolving trend in mobility and transportation diminishes the individual and manual driving concerns, it creates new risks. New technologies and passenger’s safety and security further complicate matters and make platooning attractive target for the malicious minds. To improve the security of the vehicular platooning, threats and their potential impacts on vehicular platooning should be identified to protect the system against security risks. Furthermore, algorithms should be proposed to detect intrusions and mitigate the effects in case of attack. This dissertation introduces a new vulnerability in vehicular platooning from the control systems perspective and presents the detection and mitigation algorithms to protect vehicles and passengers in the event of the attack.
APA, Harvard, Vancouver, ISO, and other styles
6

Karthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.

Full text
Abstract:
The emerging concept of vehicular platooning with trust is a promising solution to deal with ever-growing computational and communication demands of connected vehicles. The most important concept introduced in any technology is trust, this has previously been imbibed into the platoon with the use of a centralized trust evaluating infrastructure. The introduction of trust evaluation using a decentralized model is not in widespread use, which makes it a challenging task to be included in the fast-varying feature of vehicular environment. This thesis discusses incorporation of a decentralized trust evaluation architecture (without a separate infrastructure) within a platoon, and a method to develop trust in the communication between the fellow platoon members with the help of a feedback system in place which is used to evaluate the trust of the platoon members and the platoon leader on the vehicle which joins the platoon newly. This trust model has been implemented in the case of VANET’s initially, for the purpose of group leader selection this model also includes the concept of direct and indirect trust among the vehicles. The results obtained show that the stability and the performance of the platoon drastically improve in the case of a decentralized mechanism, compared to a normal platoon with general characteristics. Keywords: Trust management, Feedback system, Platoon, Decentralized architecture, VANET, Trust model.
APA, Harvard, Vancouver, ISO, and other styles
7

Gomes, Gonçalo Miguel Vieira. "Forwarding and security in vehicular networks." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/15927.

Full text
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações<br>The growing research in vehicular network solutions provided the rise of interaction in these highly dynamic environments in the market. The developed architectures do not usually focus, however, in security aspects. Common security strategies designed for the Internet require IP. Since nodes' addresses in a vehicular network are too dynamic, such solutions would require cumbersome negotiations, which would make them unsuitable to these environments. The objective of this dissertation is to develop, and test a scalable, lightweight, layer 3 security protocol for vehicular networks, in which nodes of the network are able to set up long-term security associations with a Home Network, avoiding session renegotiations due to lack of connectivity and reduce the protocol stacking. This protocol allows to provide security independent of the nodes (vehicles) position, of its addressing and of the established path to access the Internet, allowing the mobility of vehicles and of its active sessions seamlessly without communication failures.<br>O crescimento da investigação em redes veiculares provocou o aumento da interação nestes ambientes muito dinâmicos no mercado. As arquiteturas desenvolvidas não se focam, no entanto, na segurança. Estratégias comuns de segurança para a Internet, requerem sessões baseadas no IP. Como os endereços dos nós numa rede veicular, e a sua localização e caminhos até à Internet, são muito dinâmicos, as soluções já desenvolvidas para outro tipo de redes iriam requerer renegociações que teriam um grande impacto no desempenho destes ambientes. O objetivo desta dissertação será, portanto, desenvolver e testar um protocolo de segurança implementado na camada 3 para redes veiculares, que seja escalável e leve, em que os nós da rede conseguirão estabelecer associações de segurança de longa duração com a Home Network, evitando renegociações devidas à falta de conectividade, e reduzir o overhead devido ao empilhamento protocolar. Este protocolo permite ter segurança independentemente da posição dos nós (os veículos), do seu endereçamento e do caminho estabelecido para o acesso à Internet, permitindo assim mobilidade dos veículos e das sessões ativas de forma transparente sem falhas na comunicação.
APA, Harvard, Vancouver, ISO, and other styles
8

Duarte, Daniel Belém de Almeida. "Implementation of security services for vehicular communications." Master's thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/11677.

Full text
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações<br>Ao longo dos últimos anos tem existido uma enorme evolução nas redes veiculares com o objectivo de desenvolver protocolos e protótipos que satisfaçam os requisitos do sistema de transporte inteligente. Uma das normas desenvolvidas é a norma IEEE 802.11p que define a camada física para a criação de uma plataforma que permita a formação de uma rede veicular. A VANET (Vehicular Ad-Hoc Network) é uma rede criada pelos vários elementos da estrada, como carros e plataformas de prestação de serviços encontradas ao longo da estrada. Estas redes são de elevada importância, permitindo fornecer vários tipos de serviços: proporcionar maior segurança aos condutores e ocupantes reduzindo o número de acidentes; aumentar a eficiência rodoviária reduzindo o impacto no ambiente; proporcionar serviços de navegação e entretenimento para os seus ocupantes. O potencial destas redes é enorme, mas exige requisitos de segurança e anonimato de forma a não serem adulteradas por atacantes que pretendam tirar partido destas. Deste modo, estudos mais recentes têm dado um maior relevo ás camadas superiores da pilha protocolar, nomeadamente ao estudo do impacto da segurança nestas redes. Neste trabalho propõe-se criar uma arquitetura e a analisar o impacto que os serviços de segurança têm quando adicionados a uma rede veicular. Deste modo o Standard IEEE 1609.2 aparece como forma de colmatar as falhas de segurança que possam existir numa rede veicular. Foi efetuada a implementação de serviços de segurança com base no Standard IEEE 1609.2 D17 Draft Standard implementando os vários algoritmos criptográficos específicos assim como os protocolos para gerir a troca de mensagens seguras na rede. Esta implementação foi desenvolvida em software com a ajuda da livraria OpenSSL para implementação dos algoritmos de segurança. O algoritmo criptográficos ECDSA que garante autenticação de mensagens é mantatório para todas as mensagens trocadas tendo sido este o foco da implementação. De modo a ser possível testar a implementação num ambiente real, foi efetuada a integração do sistema com outros módulos tais como a geração de mensagens e o protocolo de transporte WSMP. O objetivo desta dissertação é avaliar o desempenho do sistema e o “overhead" causado na rede quando os serviços de segurança são adicionados a uma rede veicular. Como On Boad Unit (OBU) foi considerado o uso de um Raspberry-Pi, concluindo que uma implementação puramente em software não é viável conseguindo apenas atingir o número máximo de 40 verificações de assinaturas por segundo usando o algoritmo criptográfico ECDSA.<br>Over the last few years there has been a considerable development in the eld of vehicular communications (VC) in order to develop standards and prototypes that satisfy the requirements of the Intelligent Transportation System (ITS). One of these standards is the IEEE 802.11p that de nes the physical layers to create a platform for vehicular communications. Cars and elements on the road are viewed as wireless routers (nodes), creating a VANET (Vehicular Ad-Hoc Network), which is part of the ITS. It's intention is to provide several services as: a safer environment for drivers by reducing the number of accidents/injuries; improve tra c congestion and consequently reduce the impact of cars in the environment; provide infotainment services. These networks have promising features to guarantee a high level of safety between drivers, however they have to work on a secure and anonymous way since they can be threatened and attacked by malicious sources. Therefore more recently studies have focused on studying the impact of security on VC. In this dissertation it is proposed the creation of an architecture and the analysis of the impact of security services when they are added to VANET. This is achieved by using the IEEE 1609.2 Standard to overcome the limitations of security on vehicular communications. An implementation of the required cryptographic algorithms and protocols to manage the sharing of secure messages according to the IEEE 1609.2 Standard was developed with the help of the OpenSSL library. The ECDSA cryptographic algorithm ensures the authentication of all messages, which is the focus of this dissertation. In order to achieve an architecture capable of being integrated and tested in a real scenario, the implemented system was joined with other applications as the WSMP (WAVE Short Message Protocol) and the generation of CAM messages. With this integration it was possible to evaluate the overhead that is caused when the process to sign/verify a digital message is added to a vehicular communication. For these tests a Raspberry-Pi was used as a On Board Unit, concluding that a pure software implementation is not feasible, allowing only a maximum number of 40 signature veri cations/second using the ECDSA cryptographic algorithm.
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Shareeda, Sarah Yaseen Abdulrazzaq. "Enhancing Security, Privacy, and Efficiency of Vehicular Networks." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu150032914711847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lim, Kiho. "Secure and Authenticated Message Dissemination in Vehicular ad hoc Networks and an Incentive-Based Architecture for Vehicular Cloud." UKnowledge, 2016. http://uknowledge.uky.edu/cs_etds/48.

Full text
Abstract:
Vehicular ad hoc Networks (VANETs) allow vehicles to form a self-organized network. VANETs are likely to be widely deployed in the future, given the interest shown by industry in self-driving cars and satisfying their customers various interests. Problems related to Mobile ad hoc Networks (MANETs) such as routing, security, etc.have been extensively studied. Even though VANETs are special type of MANETs, solutions proposed for MANETs cannot be directly applied to VANETs because all problems related to MANETs have been studied for small networks. Moreover, in MANETs, nodes can move randomly. On the other hand, movement of nodes in VANETs are constrained to roads and the number of nodes in VANETs is large and covers typically large area. The following are the contributions of the thesis. Secure, authenticated, privacy preserving message dissemination in VANETs: When vehicles in VANET observe phenomena such as accidents, icy road condition, etc., they need to disseminate this information to vehicles in appropriate areas so the drivers of those vehicles can take appropriate action. When such messages are disseminated, the authenticity of the vehicles disseminating such messages should be verified while at the same time the anonymity of the vehicles should be preserved. Moreover, to punish the vehicles spreading malicious messages, authorities should be able to trace such messages to their senders when necessary. For this, we present an efficient protocol for the dissemination of authenticated messages. Incentive-based architecture for vehicular cloud: Due to the advantages such as exibility and availability, interest in cloud computing has gained lot of attention in recent years. Allowing vehicles in VANETs to store the collected information in the cloud would facilitate other vehicles to retrieve this information when they need. In this thesis, we present a secure incentive-based architecture for vehicular cloud. Our architecture allows vehicles to collect and store information in the cloud; it also provides a mechanism for rewarding vehicles that contributing to the cloud. Privacy preserving message dissemination in VANETs: Sometimes, it is sufficient to ensure the anonymity of the vehicles disseminating messages in VANETs. We present a privacy preserving message dissemination protocol for VANETs.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Securing Vehicular"

1

Du, Suguo, and Haojin Zhu. Security Assessment in Vehicular Networks. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9357-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wolf, Marko. Security Engineering for Vehicular IT Systems. Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Xiaodong, and Rongxing Lu, eds. Vehicular Ad Hoc Network Security and Privacy. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119082163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jean, Michele. Conduire un vehicule de promenade. Publications du Quebec, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wolf, Marko. Security Engineering for Vehicular IT Systems: Improving the Trustworthiness and Dependability of Automotive IT Applications. Vieweg+Teubner Verlag / GWV Fachverlage GmbH, Wiesbaden, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Security Assessment In Vehicular Networks. Springer-Verlag New York Inc., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Xiaodong, and Rongxing Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Xiaodong, and Rongxing Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley-Interscience, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Xiaodong, and Rongxing Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rawat, Danda B., and Chandra Bajracharya. Vehicular Cyber Physical Systems: Adaptive Connectivity and Security. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Securing Vehicular"

1

Rawat, Danda B., and Chandra Bajracharya. "Securing VANETs for Vehicular CPS." In Vehicular Cyber Physical Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44494-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmed, Wedad, and Mourad Elhadef. "Securing Intelligent Vehicular Ad Hoc Networks: A Survey." In Advances in Computer Science and Ubiquitous Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7605-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Progga, Farhat Tasnim, Hossain Shahriar, Chi Zhang, and Maria Valero. "Securing Vehicular Network Using AI and Blockchain-Based Approaches." In Studies in Big Data. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74575-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jain, Vaishali, Rajendra Singh Kushwah, and Ranjeet Singh Tomar. "Named Data Network Using Trust Function for Securing Vehicular Ad Hoc Network." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0589-4_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Popescu-Zeletin, Radu, Ilja Radusch, and Mihai Adrian Rigani. "Security." In Vehicular-2-X Communication. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-540-77143-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hartong, Mark, Rajni Goel, and Duminda Wijesekera. "Security and Dependability in Train Control Systems." In Vehicular Networking. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470661314.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Papadimitratos, Panos. "Security and Privacy Mechanisms for Vehicular Networks." In Vehicular Networking. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470661314.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wolf, Marko. "Vehicular Security Technologies." In Security Engineering for Vehicular IT Systems. Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wolf, Marko. "Vehicular Security Mechanisms." In Security Engineering for Vehicular IT Systems. Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eckhoff, David. "Vehicular Privacy." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1529-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Securing Vehicular"

1

Liu, Xiaonan, Zhiyi Fang, and Lijun Shi. "Securing Vehicular Ad Hoc Networks." In 2007 2nd International Conference on Pervasive Computing and Applications. IEEE, 2007. http://dx.doi.org/10.1109/icpca.2007.4365481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Asplund, Mikael. "Poster: Securing vehicular platoon membership." In 2014 IEEE Vehicular Networking Conference (VNC). IEEE, 2014. http://dx.doi.org/10.1109/vnc.2014.7013324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mazilu, S., M. Teler, and C. Dobre. "Securing Vehicular Networks Based on Data-Trust Computation." In 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. IEEE, 2011. http://dx.doi.org/10.1109/3pgcic.2011.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vaszary, Mark, Andreas Slovacek, Yanyan Zhuang, and Sang-Yoon Chang. "Securing Tire Pressure Monitoring System for Vehicular Privacy." In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2021. http://dx.doi.org/10.1109/ccnc49032.2021.9369576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rawat, Danda B., Bhed Bahadur Bista, and Gongjun Yan. "Securing vehicular ad-hoc networks from data falsification attacks." In TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7847967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Eltayeb, Mohammed E., and Robert W. Heath. "Securing mmWave Vehicular Communication Links with Multiple Transmit Antennas." In 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 2018. http://dx.doi.org/10.1109/iccw.2018.8403556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Teler, Mihaela, and Valentin Cristea. "Securing Vehicular Networks Using Deterministic Schemes for Computing Trust." In 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2012. http://dx.doi.org/10.1109/incos.2012.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bermad, Nabila, Salah Zemmoudj, and Mawloud Omar. "Securing Vehicular Platooning against Vehicle Platooning Disruption (VPD) Attacks." In 2019 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN). IEEE, 2019. http://dx.doi.org/10.23919/pemwn47208.2019.8986956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Dhuraibi, Wedad Ahmed, and Mourad Elhadef. "Securing Vehicular Ad-Hoc Networks: A DDoS Case Study." In 2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE, 2021. http://dx.doi.org/10.1109/iccakm50778.2021.9357733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Amari, Houda, Wassef Louati, Lyes Khoukhi, and Lamia Hadrich Belguith. "Securing Software-Defined Vehicular Network Architecture against DDoS attack." In 2021 IEEE 46th Conference on Local Computer Networks (LCN). IEEE, 2021. http://dx.doi.org/10.1109/lcn52139.2021.9524953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!