TROPHY: Trustworthy VANET routing with group authentication keys

Ad Hoc Networks - Tập 71 - Trang 45-67 - 2018
Pedro Cirne1, André Zúquete1,2, Susana Sargento1
1Instituto de Telecomunicações, Universidade de Aveiro, Aveiro, Portugal
2DETI/IEETA, Universidade de Aveiro, Aveiro, Portugal

Tài liệu tham khảo

Qu, 2015, A security and privacy review of VANETs, IEEE Trans. Intell. Transp. Syst., 16, 2985, 10.1109/TITS.2015.2439292

Farooq, 2015, A survey of multicast routing protocols for vehicular ad hoc networks, Int. J. Distrib. Sens. Netw., 11, 10.1155/2015/923086

Bali, 2014, Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions, Veh. Commun., 1, 134, 10.1016/j.vehcom.2014.05.004

Amit Dua, 2014, A systematic review on routing protocols for vehicular ad hoc networks, Veh. Commun., 1, 33, 10.1016/j.vehcom.2014.01.001

IEEE Guide for Wireless Access in Vehicular Environments (WAVE) - Architecture, in: IEEE Std 1609.0–2013, 2014, pp. 1–78, doi:10.1109/IEEESTD.2014.6755433.

Kenney, 2011, Dedicated short-range communications (DSRC) standards in the united states, Proc. of the IEEE, 99, 1162, 10.1109/JPROC.2011.2132790

IEEE Standard for Wireless Access in Vehicular Environments (WAVE)Multi-channel Operation, in: IEEE Std 1609.4–2010, (Revision of IEEE Std 1609.4–2006) 2011, pp. 1–89, doi:10.1109/IEEESTD.2011.5712769.

Li, 2007, Routing in vehicular ad hoc networks: a survey, IEEE Veh. Technol. Mag., 2, 12, 10.1109/MVT.2007.912927

Lee, 2010, Survey of routing protocols in vehicular ad hoc networks, Adv. Vehicul. Ad-Hoc Netw.: Develop. Challenges, 149, 10.4018/978-1-61520-913-2.ch008

Cheng, 2015, Routing in internet of vehicles: a review, IEEE Trans. Intell. Transp. Syst., 16, 2339, 10.1109/TITS.2015.2423667

IEEE Standard for Wireless Access in Vehicular Environments (WAVE) Networking Services, in: IEEE Std 1609.3–2016, (Revision of IEEE Std 1609.3–2010) 2016, pp. 1–160, doi:10.1109/IEEESTD.2016.7458115.

Mejri, 2014, Survey on VANET security challenges and possible cryptographic solutions, Veh. Commun., 1, 53, 10.1016/j.vehcom.2014.05.001

IEEE Standard for Wireless Access in Vehicular Environments (WAVE) Security Services for Applications and Management Messages, in: IEEE Std 1609.2–2016, (Revision of IEEE Std 1609.2–2013) 2016, pp. 1–240, doi:10.1109/IEEESTD.2016.7426684.

Studer, 2009, Flexible, extensible, and efficient VANET authentication, J. Commun. Netw., 11, 574, 10.1109/JCN.2009.6388411

FutureCities Project. Living lab : Vehicular adhoc networking. URL http://futurecities.up.pt/site/vehicular-ad-hoc-networking-testbed.

C. Ameixieira, Method and system for operating a vehicular data network based on a layer-2 periodic frame broadcast, in particular a routing protocol, 2016, WO2016135711A1.

Khilar, 2014, Vehicular communication: a survey, IET Netw., 3, 204, 10.1049/iet-net.2013.0065

Petracca, 2012, On-board unit hardware and software design for vehicular ad-Hoc networks

O. Henniger, A. Ruddle, H. Seudi, B. Weyl, M. Wolf, T. Wollinger, Securing vehicular on-board it systems: the EVITA project, 2009.

Petit, 2009, Analysis of ECDSA authentication processing in VANETs, 1

Dressler, 2011, Research challenges in intervehicular communication: lessons of the 2010 dagstuhl seminar, IEEE Commun. Mag., 49, 158, 10.1109/MCOM.2011.5762813

Ahmed, 2015, Layered scalable WAVE security for VANET, 1566

Wagan, 2014, Security framework for low latency VANET applications, 1

Haas, 2011, Efficient certificate revocation list organization and distribution, IEEE J. Sel. Areas Commun., 29, 595, 10.1109/JSAC.2011.110309

H. Harney, C. Muckenhirn, Group Key Management Protocol (GKMP) Specification, 1997, (RFC 2093).

D. Wallner, E. Harder, R. Agee, Key Management for Multicast: Issues and Architectures, 1999, (RFC 2627).

Rafaeli, 2003, A survey of key management for secure group communication, ACM Comput. Surv., 35, 309, 10.1145/937503.937506

Daghighi, 2015, Key management paradigm for mobile secure group communications: issues, solutions, and challenges, Comput. Commun., 72, 1, 10.1016/j.comcom.2015.05.008

Jiang, 2008, A survey of group key management, 3, 994

Chiang, 2003, Group keys and the multicast security in ad hoc networks, 385

Sakarindr, 2010, Survey of security services on group communications, IET Inf. Secur., 4, 258, 10.1049/iet-ifs.2009.0261

Judge, 2003, Security issues and solutions in multicast content distribution: a survey, IEEE Netw., 17, 30, 10.1109/MNET.2003.1174175

Zhu, 2005, Optimizing the tree structure in secure multicast key management, IEEE Commun. Lett., 9, 477, 10.1109/LCOMM.2005.1431177

Sherman, 2003, Key establishment in large dynamic groups using one-way function trees, IEEE Trans. Softw. Eng., 29, 444, 10.1109/TSE.2003.1199073

Merkle, 1979

Ng, 2007, Dynamic balanced key tree management for secure multicast communications, IEEE Trans. Comput., 56, 590, 10.1109/TC.2007.1022

Park, 2014, Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users, IEEE Trans. Mobile Comput., 13, 783, 10.1109/TMC.2013.40

Reis, 2017, Parked cars are excellent roadside units, IEEE Trans. Intell. Transp. Syst., 18, 2490, 10.1109/TITS.2017.2655498

Campolo, 2012, Modeling prioritized broadcasting in multichannel vehicular networks, IEEE Trans. Veh. Technol., 61, 687, 10.1109/TVT.2011.2181440

Barker, 2016, Recommendation for Key Management Part 1: General