Aboobaker, 2010 - Google Patents
Performance analysis of authentication protocols in vehicular ad hoc networks (VANET)Aboobaker, 2010
View PDF- Document ID
- 9313188754511635546
- Author
- Aboobaker A
- Publication year
- Publication venue
- Master of Science Thesis, Department of Mathematics, University of London, September
External Links
Snippet
Traffic safety is a major challenge recognised by the major players in the automotive industry and by many governments. According to [31], in 1999 alone 450,000 road accidents were reported in Germany. During the same year, Europe reported three times this number of …
- 238000004458 analytical method 0 title description 65
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60W—CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
- B60W2550/00—Input parameters relating to exterior conditions
- B60W2550/40—Involving external transmission of data to or from the vehicle
- B60W2550/408—Data transmitted between vehicles
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Boualouache et al. | A survey on pseudonym changing strategies for vehicular ad-hoc networks | |
Hasan et al. | Securing vehicle-to-everything (V2X) communication platforms | |
Sugumar et al. | Trust based authentication technique for cluster based vehicular ad hoc networks (VANET) | |
Mejri et al. | Survey on VANET security challenges and possible cryptographic solutions | |
Raya et al. | The security of vehicular ad hoc networks | |
Raya et al. | Securing vehicular ad hoc networks | |
Engoulou et al. | VANET security surveys | |
Rivas et al. | Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation | |
Papadimitratos et al. | Secure vehicular communication systems: design and architecture | |
Raya et al. | Certificate revocation in vehicular networks | |
Mishra et al. | Security in vehicular adhoc networks: a survey | |
Arshad et al. | Beacon trust management system and fake data detection in vehicular ad‐hoc networks | |
Bao et al. | A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters | |
Rezazadeh Baee et al. | Authentication strategies in vehicular communications: A taxonomy and framework | |
Singh et al. | CPESP: Cooperative pseudonym exchange and scheme permutation to preserve location privacy in VANETs | |
Vaas et al. | Nowhere to hide? Mix-zones for private pseudonym change using chaff vehicles | |
Molina-Gil et al. | Aggregation and probabilistic verification for data authentication in VANETs | |
Caballero-Gil et al. | Security issues in vehicular ad hoc networks | |
Mahi et al. | A review on VANET security: Future challenges and open issues | |
Sireesha et al. | A survey of VANET security models and its issues on node level data transmission | |
Gazdar et al. | A secure cluster‐based architecture for certificates management in vehicular networks | |
Malik et al. | An overview of security challenges in vehicular ad-hoc networks | |
Aboobaker | Performance analysis of authentication protocols in vehicular ad hoc networks (VANET) | |
Sharma et al. | Cognitive radio adhoc vehicular network (CRAVENET): Architecture, applications, security requirements and challenges | |
Yadav et al. | Security in vehicular ad hoc networks |