Vehicular Ad Hoc Network Security and Privacy
Home > Science, Technology & Agriculture > Transport technology and trades > Intelligent and automated transport system technology > Vehicular Ad Hoc Network Security and Privacy: (IEEE Press Series on Information and Communication Networks Security)
Vehicular Ad Hoc Network Security and Privacy: (IEEE Press Series on Information and Communication Networks Security)

Vehicular Ad Hoc Network Security and Privacy: (IEEE Press Series on Information and Communication Networks Security)

|
     0     
5
4
3
2
1




International Edition


About the Book

This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and results for all approaches used Introduces standardization and industry activities, and government regulation in secure vehicular networking

Table of Contents:
List of Figures xi List of Tables xv Acronyms xvii Preface xix 1 INTRODUCTION 1 1.1 Background 1 1.2 DSRC AND VANET 2 1.2.1 DSRC 2 1.2.2 VANET 3 1.2.3 Characteristics of VANET 6 1.3 Security and Privacy Threats 7 1.4 Security and Privacy Requirements 8 1.5 Challenges and Prospects 9 1.5.1 Conditional Privacy Preservation in VANETs 9 1.5.2 Authentication with Efficient Revocation in VANETs 10 1.6 Standardization and Related Activities 11 1.7 Security Primitives 13 1.8 Outline of the Book 17 References 17 2 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 21 2.1 Introduction 21 2.2 Preliminaries and Background 23 2.2.1 Group Signature 23 2.2.2 Bilinear Pairing and ID-Based Cryptography 23 2.2.3 Threat Model 23 2.2.4 Desired Requirements 24 2.3 Proposed Secure and Privacy-Preserving Protocol 25 2.3.1 Problem Formulation 25 2.3.2 System Setup 27 2.3.3 Security Protocol between OBUs 29 2.3.4 Security Protocol between RSUs and OBUs 38 2.4 Performance Evaluation 41 2.4.1 Impact of Traffic Load 43 2.4.2 Impact of Cryptographic Signature Verification Delay 43 2.4.3 Membership Revocation and Tracing Efficiency 45 2.5 Concluding Remarks 47 References 47 3 ECPP: EFFICIENT CONDITIONAL PRIVACY PRESERVATION PROTOCOL 51 3.1 Introduction 51 3.2 System Model and Problem Formulation 52 3.2.1 System Model 52 3.2.2 Design Objectives 54 3.3 Proposed ECPP Protocol 55 3.3.1 System Initialization 55 3.3.2 OBU Short-Time Anonymous Key Generation 56 3.3.3 OBU Safety Message Sending 62 3.3.4 OBU Fast Tracking Algorithm 63 3.4 Analysis on Conditional Privacy Preservation 64 3.5 Performance Analysis 66 3.5.1 OBU Storage Overhead 66 3.5.2 OBU Computation Overhead on Verification 66 3.5.3 TA Computation Complexity on OBU Tracking 68 3.6 Concluding Remarks 69 References 69 4 PSEUDONYM-CHANGING STRATEGY FOR LOCATION PRIVACY 71 4.1 Introduction 71 4.2 Problem Definition 73 4.2.1 Network Model 73 4.2.2 Threat Model 74 4.2.3 Location Privacy Requirements 75 4.3 Proposed PCS Strategy for Location Privacy 75 4.3.1 KPSD Model for PCS Strategy 75 4.3.2 Anonymity Set Analysis for Achieved Location Privacy 79 4.3.3 Feasibility Analysis of PCS Strategy 85 4.4 Performance Evaluation 86 4.5 Concluding Remarks 89 References 89 5 RSU-AIDED MESSAGE AUTHENTICATION 91 5.1 Introduction 91 5.2 System Model and Preliminaries 93 5.2.1 System Model 93 5.2.2 Assumption 93 5.2.3 Problem Statement 94 5.2.4 Security Objectives 95 5.3 Proposed RSU-Aided Message Authentication Scheme 96 5.3.1 Overview 96 5.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles 96 5.3.3 Hash Aggregation 98 5.3.4 Verification 99 5.3.5 Privacy Enhancement 100 5.4 Performance Evaluation 101 5.4.1 Message Loss Ratio 102 5.4.2 Message Delay 102 5.4.3 Communication Overhead 104 5.5 Security Analysis 105 5.6 Concluding Remarks 106 References 107 6 TESLA-BASED BROADCAST AUTHENTICATION 109 6.1 Introduction 109 6.2 Timed Efficient and Secure Vehicular Communication Scheme 110 6.2.1 Preliminaries 110 6.2.2 System Formulation 112 6.2.3 Proposed TSVC Scheme 113 6.2.4 Enhanced TSVC with Nonrepudiation 118 6.2.5 Discussion 123 6.3 Security Analysis 129 6.4 Performance Evaluation 129 6.4.1 Impact of Vehicle Moving Speed 131 6.4.2 Impact of Vehicle Density 132 6.5 Concluding Remarks 134 References 134 7 DISTRIBUTED COOPERATIVE MESSAGE AUTHENTICATION 137 7.1 Introduction 137 7.2 Problem Formulation 138 7.2.1 Network Model 138 7.2.2 Security Model 139 7.3 Basic Cooperative Authentication Scheme 140 7.4 Secure Cooperative Authentication Scheme 141 7.4.1 Evidence and Token for Fairness 142 7.4.2 Authentication Proof 145 7.4.3 Flows of Proposed Scheme 146 7.5 Security Analysis 147 7.5.1 Linkability Attack 147 7.5.2 Free-Riding Attack without Authentication Efforts 147 7.5.3 Free-Riding Attack with Fake Authentication Efforts 148 7.6 Performance Evaluation 148 7.6.1 Simulation Settings 148 7.6.2 Simulation Results 149 7.7 Concluding Remarks 150 References 151 8 CONTEXT-AWARE COOPERATIVE AUTHENTICATION 153 8.1 Introduction 153 8.2 Message Trustworthiness in VANETs 156 8.3 System Model and Design Goal 159 8.3.1 Network Model 159 8.3.2 Attack Model 159 8.3.3 Design Goals 160 8.4 Preliminaries 160 8.4.1 Pairing Technique 160 8.4.2 Aggregate Signature and Batch Verification 160 8.5 Proposed AEMAT Scheme 161 8.5.1 System Setup 161 8.5.2 Registration 162 8.5.3 SER Generation and Broadcasting 162 8.5.4 SER Opportunistic Forwarding 162 8.5.5 SER Aggregated Authentication 163 8.5.6 SER Aggregated Trustworthiness 165 8.6 Security Discussion 168 8.6.1 Collusion Attacks 168 8.6.2 Privacy Protection of Witnesses 168 8.7 Performance Evaluation 169 8.7.1 Transmission Cost 169 8.7.2 Computational Cost 169 8.8 Concluding Remarks 170 References 170 9 FAST HANDOVER AUTHENTICATION BASED ON MOBILITY PREDICTION 173 9.1 Introduction 173 9.2 Vehicular Network Architecture 175 9.3 Proposed Fast Handover Authentication Scheme Based on Mobility Prediction 176 9.3.1 Multilayer Perceptron Classifier 176 9.3.2 Proposed Authentication Scheme 178 9.4 Security Analysis 183 9.4.1 Replay Attack 183 9.4.2 Forward Secrecy 183 9.5 Performance Evaluation 184 9.6 Concluding Remarks 185 References 186 Index 187


Best Sellers


Product Details
  • ISBN-13: 9781118913901
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-IEEE Press
  • Height: 244 mm
  • No of Pages: 216
  • Returnable: N
  • Spine Width: 21 mm
  • Width: 165 mm
  • ISBN-10: 1118913906
  • Publisher Date: 22 Jun 2015
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Series Title: IEEE Press Series on Information and Communication Networks Security
  • Weight: 513 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Vehicular Ad Hoc Network Security and Privacy: (IEEE Press Series on Information and Communication Networks Security)
John Wiley & Sons Inc -
Vehicular Ad Hoc Network Security and Privacy: (IEEE Press Series on Information and Communication Networks Security)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Vehicular Ad Hoc Network Security and Privacy: (IEEE Press Series on Information and Communication Networks Security)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!