Detailed Information

Cited 3 time in webofscience Cited 4 time in scopus
Metadata Downloads

Unified security architecture and protocols using third party identity in V2V and V2I networks

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Jaeduck-
dc.contributor.authorJung, Souhwan-
dc.date.available2018-05-10T05:07:03Z-
dc.date.created2018-04-17-
dc.date.issued2012-10-
dc.identifier.issn1530-8669-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/12332-
dc.description.abstractVANETs have been developed to improve the safety and efficiency of transportation systems (V2V communications) and to enable various mobile services for the traveling public (V2I communications). For VANET technologies to be widely available, security issues concerning several essential requirements should be addressed. The existing security architectures and mechanisms have been studied separately in V2V and V2I networks, which results in duplicated efforts, security modules, and more complex security architectures. In this paper, we propose a unified security architecture and its corresponding security protocols that achieve essential security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality. To the best of our knowledge, this paper is the first study that deals with the security protocol in V2V as well as the handover authentication in V2I communications. Our proposal is characterized by a low-complexity security framework, owing to the design and unification of the security architectures and modules. Furthermore, the evaluation of the proposed protocols proves them to be more secure and efficient than existing schemes. Copyright (C) 2010 John Wiley & Sons, Ltd.-
dc.publisherWILEY-BLACKWELL-
dc.relation.isPartOfWIRELESS COMMUNICATIONS & MOBILE COMPUTING-
dc.subjectAD HOC NETWORKS-
dc.subjectVEHICULAR COMMUNICATIONS-
dc.subjectCOMMUNICATION SCHEME-
dc.subjectPRIVACY-
dc.titleUnified security architecture and protocols using third party identity in V2V and V2I networks-
dc.typeArticle-
dc.identifier.doi10.1002/wcm.1057-
dc.type.rimsART-
dc.identifier.bibliographicCitationWIRELESS COMMUNICATIONS & MOBILE COMPUTING, v.12, no.15, pp.1326 - 1337-
dc.description.journalClass1-
dc.identifier.wosid000308966500003-
dc.identifier.scopusid2-s2.0-84866425541-
dc.citation.endPage1337-
dc.citation.number15-
dc.citation.startPage1326-
dc.citation.titleWIRELESS COMMUNICATIONS & MOBILE COMPUTING-
dc.citation.volume12-
dc.contributor.affiliatedAuthorJung, Souhwan-
dc.type.docTypeArticle-
dc.subject.keywordAuthorhandover authentication-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorV2V-
dc.subject.keywordAuthorV2I-
dc.subject.keywordAuthorVANET-
dc.subject.keywordPlusAD HOC NETWORKS-
dc.subject.keywordPlusVEHICULAR COMMUNICATIONS-
dc.subject.keywordPlusCOMMUNICATION SCHEME-
dc.subject.keywordPlusPRIVACY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jung, Sou hwan photo

Jung, Sou hwan
College of Information Technology (Major in IT Convergence)
Read more

Altmetrics

Total Views & Downloads

BROWSE