Design and Evaluation of a Secure Mechanism without the Third Party for VANETs
電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
|Thesis Publication Year:||2012|
|Graduation Academic Year:||100|
|Keywords (in Chinese):||車載隨意網路 、攻擊 、安全 、驗證|
|Keywords (in other languages):||VANETs, Attack, Security, Verification|
|Reference times:||Clicks: 131 Downloads: 2|
|School Collection Retrieve National Library Collection Retrieve Error Report|
In ad hoc network, VANET is part of MANET, and inherit it many attacks.
This make the securtiy issue, in particular, very important in VANET.
In the past, secure mechanism for VANET always designed under the assumption that road side unit or
a third party using to protect the transmission security. Since this assumption is not reasonable,
a secure mechanism without the third party is the proposed in this thesis. Our proposed is composed of
registered between car and car, building trusted model between car and car and improved verification delay
problem. To increase VANET security and to reduce the delay time, then to reach the relative security.
Finially, this papaer compared with TMSMBM. According the analysis and simulation results,
a better performance on security, efficiency, and delay time.
 D. Jiang and L. Delgrossi, "IEEE 802.11p: Towards an International Standard
for Wireless Access in Vehicular Environments," in Proc. IEEE VTC, May 2008,
 P. B. Velloso, R. P. Laufer, O. C.M. B. Duarte, and G. Pujolle, "Trust Man-
agement in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model,"
in IEEE Trans. Netw. Service Manage, vol. 7, no. 3, pp. 172--185, Sep. 2010.
 S. Youse , M.S. Mousavi, and M. Fathy, "Vehicular Ad Hoc Networks
(VANETs): Challenges and Perspectives," in Proc. 6th IEEE Int. Conf. ITS
Telecommun., Jun. 2006, pp. 761--766.
 F. Lin, Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE
Vehicular Technology Magazine, vol. 2, no. 2, pp. 12--22, Jun. 2007.
 A. Akram, F. Aadil, and S. Khayyam, "Modern routing protocol for VanNETs
(MODNET)," in Computer Networks and Information Technology (ICCNIT),
July 2011, pp. 71--74.
 J.-J. Chang, Y.-H. Li, W. Liao, and I.-C. Chang, "Intersection-based routing
for urban vehicular communications with tra c-light considerations," IEEE
Wireless Communications., Feb. 2012, pp. 82--88.
 W. Wang, F. Xie, and M. Chatterjee, "Small-Scale and Large-Scale Routing in
Vehicular Ad Hoc Networks," IEEE Trans. Veh. Technol., vol. 58, no. 9, pp.
5200--5213, Nov. 2009.
 H. Saleet, R. Langar, S. Naik, R. Boutaba, A. Nayak, and N. Goel,
"Intersection-Based Geographical Routing Protocol for VANETs: A Proposal and Analysis," IEEE Trans. Veh. Technol., vol. 60,
no. 9,pp. 4560--4574, Nov.2011.
 I.A. Sumra, I. Ahmad, H. Hasbullah, and J.-L. bin Ab Manan, "Classes of
attacks in VANET," in Electronics, Communications and Photonics Conference
(SIECPC), April 2011, pp. 1--5.
 G. Samara, W.A.H. Al-Salihy, and R. Sures, "Security Issues and Challenges of
Vehicular ad hoc networks (VANETs)," in New Trends in Information Science
and Service Science (NISS), May 2010, pp. 393--398.
 J.T. Isaac, S. Zeadally, and J.S. Camara, "Security attacks and solutions for
vehicular ad hoc networks," IET Communications, April 2010 , pp. 894--903.
 S.M. Sa , A. Movaghar, and M. Mohammadizadeh, "A Novel Approach for
Avoiding Wormhole Attacks in VANET," in 2009. WCSE '09. Second Interna-
tional Workshop on Computer Science and Engineering, Oct. 2009 , pp. 160--
 J. Grover, M.S. Garur, and V. Laxmi, "Position Forging Attacks in Vehicular Ad
Hoc Networks: Implementation, Impact and Detection," in Proceedings of the
7th International Wireless Communications and Mobile Computing Conference
(IWCMC 2011), July 2011 , pp. 701--706.
 N. Alsharif, A. Wasef, and S. Xuemin, "Mitigating the E ects of Position-Based
Routing Attacks in Vehicular Ad Hoc Networks," in 2011 IEEE International
Conference on Communications (ICC), June 2011 , pp. 1--5.
 J. M. D. Fuentes, A. I. Gonzalez-Tablas, and A. Ribagorda, "Overview of Secu-
rity Issues in Vehicular Ad-hoc Networks," in Handbook of Research on Mobility
and Computing: Evolving Technologies and Ubiquitous Impacts., IGI Global,
2011, pp. 894--911
 A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing public key infrastruc-
ture to secure vehicular ad hoc networks," in IEEE Wireless Communications,
vol.17, no. 5, Oct. 2010, pp. 127-139
 C. Gosman, C. Dobre, and V. Cristea, "A Security Protocol for Vehicular
Distributed," in Symbolic and Numeric Algorithms for Scienti c Computing
(SYNASC), 2010 12th International Symposium on, Sept. 2010, pp. 321-327
 Y. Qian and N. Moayeri, "Design of Secure and Application-Oriented
VANETs," in Proc. of the IEEE 67th Vehicular Technology Conference(VTC
2008), May 2008, pp. 2794--2799.
 G. Samara, W.A.H. Al-Salihy, and R. Sures, "E cient certi cate management
in VANET," in 2010 2nd International Conference on Future Computer and
Communication (ICFCC), May 2010, pp. 750--754.
 N. Ristanovic, P. Papadimitratos, G. Theodorakopoulos, J.P. Hubaux, and J.Y.
Le Boudec, "Adaptive Message Authentication for multi-hop networks," in 2011
IEEE/IFIP International Conference on Wireless On-Demand Network Sys-
tems and Services (WONS), Jan. 2011 , pp. 96--103.
 H.T. Wu, W.S. Li, T.S. Su, and W.S. Hsieh, "A Novel RSU-Based Message Au-
thentication Scheme for VANET," in Systems and Networks Communications
(ICSNC), 2010 Fifth International Conference on, Aug. 2010, pp. 111--116.
 M. Dikmak, Z. Sabra, A. Kayssi, and A. Chehab, "Optimized conditional pri-
vacy preservation in VANETs," in Telecommunications(ICT), 2012 19th Inter-
national Conference on, April 2012, pp. 1--6.
 Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Shen, "A Dynamic Privacy-
Preserving Key Management Scheme for Location-Based Services in VANETs,"
IEEE Transactions on Intelligent Transporttation System, vol. 13, no. 1,pp. 1--6,
 C. Zhang, X. Lin, R. Lu, P.-H. Ho and X. Shen, "An E cient Message Authen-
tication Scheme for Vehicular Communications," IEEE Trans. Veh. Technol.,
vol. 57, no. 6, pp. 3357--3368, 2008.
 Y. Hao, Y. Cheng, C. Zhou, and W. Song, "A Distributed Key Management
Framework with Cooperative Message Authentication in VANETs," in IEEE Journal on Selected Areas in Communications, vol. 29,
no. 3, March 2011 , pp.616--629.
 J. L. Huang, L. Y. Yeh, and H. Y. "ABAKA: An Anonymous Batch Authen-
ticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad
Hoc Networks," IEEE Transactions on Vehicular Technology, vol. 60, no. 1, pp.
248--262, Jan. 2011.
 J. Y. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An Identity-Based security
system for user privacy in vehicular ad hoc networks," IEEE Trans. Parallel
and Distrib. Syst., vol. 21, no. 9, pp. 1227--1239, Sep. 2010.
 L. Y. Yeh, Y. C. Chen, and J. L. Huang, "ABACS: An Attribute-Based Access
Control System for Emergency Services over Vehicular Ad Hoc Networks," Se-
lected Areas in Communications, IEEE Journal on, vol. 29, no. 3, pp. 630--643,
 P. B. Velloso, R. P. Laufer, O. C. M. B. Duarte, and G. Pujolle "A Trust Model
Robust to Slander Attacks in Ad Hoc Networks," in IEEE International Conf.
Comput. Commun. Netw. ANC workshop, Aug. 2008, pp. 1--6.
 L. Chen, S.-L. Ng, and G. Wang, "Threshold Anonymous Announcement in
VANETs," Selected Areas in Communications, IEEE Journal on, vol. 29, no.
3, pp. 605--615, March 2011.