Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Towards privacy aware pseudonymless strategy for avoiding profile generation in VANET

Full metadata record
DC Field Value Language
dc.contributor.authorHussain, Rasheed-
dc.contributor.authorKim, Sangjin-
dc.contributor.authorOh, Heekuck-
dc.date.accessioned2021-06-23T16:03:15Z-
dc.date.available2021-06-23T16:03:15Z-
dc.date.issued2009-01-
dc.identifier.issn03029743-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/41442-
dc.description.abstractInspiring from MANET (Mobile Ad hoc NETworks), VANET (Vehicular Ad hoc NETworks) employing vehicles as nodes, provide a wide range of applications in transportation system. The security of VANET has been a hot topic among the research community. VANETs must meet the basic security requirements such as authentication, integrity, confidentiality and privacy. In VANET, vehicles send beacon messages periodically every 100-300ms which carry speed and position information used for safe driving. The privacy of user is abused by profile generation where the adversary makes movement profiles against the vehicle using the identity information in the beacon. We outline the strategies using pseudonyms to provide privacy of user. After finding out deficiencies in pseudonym-based schemes, we propose a pseudonymless strategy to avoid profilation. In our scheme, we assume that each car is equipped with TRH (Tamper-Resistant Hardware) carrying out secure operations. Our proposed scheme assures the avoidance of profile generation without using mix zones and silent periods. We show that our proposed scheme is computationally efficient and less bandwidth consuming than other systems. © 2009 Springer-Verlag Berlin Heidelberg.-
dc.format.extent13-
dc.language영어-
dc.language.isoENG-
dc.publisherSpringer Verlag-
dc.titleTowards privacy aware pseudonymless strategy for avoiding profile generation in VANET-
dc.typeArticle-
dc.publisher.location독일-
dc.identifier.doi10.1007/978-3-642-10838-9_20-
dc.identifier.scopusid2-s2.0-76649136148-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.5932, pp 268 - 280-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume5932-
dc.citation.startPage268-
dc.citation.endPage280-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassother-
dc.subject.keywordAuthorResearch communities-
dc.subject.keywordAuthorTamper-resistant-
dc.subject.keywordAuthorTransportation system-
dc.subject.keywordAuthorIdentity information-
dc.subject.keywordAuthorNetwork security-
dc.subject.keywordAuthorAd hoc networks-
dc.subject.keywordAuthorSafe driving-
dc.subject.keywordAuthorMobile ad hoc networks-
dc.subject.keywordAuthorPosition information-
dc.subject.keywordAuthorVehicular ad hoc networks-
dc.subject.keywordAuthorComputationally efficient-
dc.subject.keywordAuthorSecurity requirements-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-3-642-10838-9_20-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE