16.7.2.5.16 Security, Privacy in Vehicle Networks, VANET

Chapter Contents (Back)
Vehicle Networks. Networks. VANET. Smart Highways.

Huang, D., Misra, S., Verma, M., Xue, G.,
PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs,
ITS(12), No. 3, September 2011, pp. 736-746.
IEEE DOI 1109
BibRef

Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.,
OPQ: OT-Based Private Querying in VANETs,
ITS(12), No. 4, December 2011, pp. 1413-1422.
IEEE DOI 1112
BibRef

Lu, R., Lin, X., Liang, X., Shen, X.,
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs,
ITS(13), No. 1, March 2012, pp. 127-139.
IEEE DOI 1203
BibRef

Taha, S., Shen, X.,
A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs,
ITS(14), No. 4, 2013, pp. 1665-1680.
IEEE DOI 1312
Estimation error BibRef

Yan, G., Wen, D., Olariu, S., Weigle, M.C.,
Security Challenges in Vehicular Cloud Computing,
ITS(14), No. 1, March 2013, pp. 284-294.
IEEE DOI 1303
BibRef

Woo, S., Jo, H.J., Lee, D.H.,
A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN,
ITS(16), No. 2, April 2015, pp. 993-1006.
IEEE DOI 1504
Automotive engineering BibRef

Woo, S., Jo, H.J., Kim, I.S., Lee, D.H.,
A Practical Security Architecture for In-Vehicle CAN-FD,
ITS(17), No. 8, August 2016, pp. 2248-2261.
IEEE DOI 1608
Automotive engineering BibRef

Qu, F., Wu, Z., Wang, F., Cho, W.,
A Security and Privacy Review of VANETs,
ITS(16), No. 6, December 2015, pp. 2985-2996.
IEEE DOI 1512
Authentication BibRef

Alcaide, A., Palomar, E., Fuentes, J.M., Gonza´lez-Manzano, L.,
Privacy-aware average speed monitoring system for vehicular ad-hoc networks,
IET-ITS(9), No. 3, 2015, pp. 293-305.
DOI Link 1506
cryptographic protocols BibRef

Lo, N.W., Tsai, J.L.,
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings,
ITS(17), No. 5, May 2016, pp. 1319-1328.
IEEE DOI 1605
Authentication BibRef

Li, W., Song, H.,
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 960-969.
IEEE DOI 1604
Ad hoc networks BibRef

Vijayakumar, P., Azees, M., Kannan, A., Deborah, L.J.[L. Jegatha],
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 1015-1028.
IEEE DOI 1604
Authentication See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. BibRef

Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.,
Distributed Aggregate Privacy-Preserving Authentication in VANETs,
ITS(18), No. 3, March 2017, pp. 516-526.
IEEE DOI 1703
Aggregates BibRef

Xia, Y., Chen, W., Liu, X., Zhang, L., Li, X., Xiang, Y.,
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks,
ITS(18), No. 10, October 2017, pp. 2629-2641.
IEEE DOI 1710
Ad hoc networks, Cryptography, Data privacy, Multimedia communication, Privacy, Social network services, Attributed-based encryption, decision tree, multimedia message, outsourcing decryption, vehicular ad-hoc networks BibRef

Khodaei, M., Jin, H., Papadimitratos, P.,
SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems,
ITS(19), No. 5, May 2018, pp. 1430-1444.
IEEE DOI 1805
Authentication, Delays, Principal component analysis, Privacy, Public key, Vehicular communications, vehicular PKI BibRef

Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., Zhang, Z.,
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles,
ITS(19), No. 7, July 2018, pp. 2204-2220.
IEEE DOI 1807
Authentication, Privacy, Protocols, Reliability, Servers, Smart transportation, Smart transportation, blockchain, vehicular communication BibRef

Zhang, Q., Boukerche, A.,
A Novel Infrastructure-Based Worm Spreading Countermeasure for Vehicular Networks,
ITS(19), No. 7, July 2018, pp. 2188-2203.
IEEE DOI 1807
Analytical models, Curing, Grippers, Roads, Simulation, Topology, Vehicular ad hoc networks, Vehicular networks (VANETs), worms BibRef

Kang, J., Yu, R., Huang, X., Zhang, Y.,
Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles,
ITS(19), No. 8, August 2018, pp. 2627-2637.
IEEE DOI 1808
Privacy, Cloud computing, Local government, Edge computing, Computer architecture, Safety, Internet of vehicles, fog computing, game theory BibRef

Förster, D., Löhr, H., Grätz, A., Petit, J., Kargl, F.,
An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios,
ITS(19), No. 10, October 2018, pp. 3400-3405.
IEEE DOI 1810
Privacy, Vehicles, Road transportation, Vehicular ad hoc networks, Standards, Safety, Observers, C-ITS, vehicular ad hoc networks, tracking BibRef

Azees, M.,
Reply to Comments on 'Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(20), No. 9, September 2019, pp. 3595-3595.
IEEE DOI 1909
Authentication, Vehicular ad hoc networks, Digital signatures, Cryptography, Data communication, Resistance, Authentication, replay attack See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. BibRef

Azees, M., Vijayakumar, P., Jegatha Deborah, L.,
Comprehensive survey on security services in vehicular ad-hoc networks,
IET-ITS(10), No. 6, 2016, pp. 379-388.
DOI Link 1608
intelligent transportation systems BibRef

Corser, G.P., Fu, H., Banihani, A.,
Evaluating Location Privacy in Vehicular Communications and Applications,
ITS(17), No. 9, September 2016, pp. 2658-2667.
IEEE DOI 1609
Measurement BibRef

Lai, C., Zhang, K., Cheng, N., Li, H., Shen, X.,
SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs,
ITS(18), No. 6, June 2017, pp. 1559-1574.
IEEE DOI 1706
Authentication, Incentive schemes, Internet, Reliability, Road transportation, Vehicles, VANET, cooperation, downloading, drive-thru Internet, incentive, security BibRef

Azees, M., Vijayakumar, P., Deboarh, L.J.,
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks,
ITS(18), No. 9, September 2017, pp. 2467-2476.
IEEE DOI 1709
telecommunication security, signature verification process, Multicast communication, Conditional privacy, anonymous certificates, authentication, security, BibRef

Liu, Y., Wang, Y., Chang, G.,
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm,
ITS(18), No. 10, October 2017, pp. 2740-2749.
IEEE DOI 1710
Authentication, Encryption, Hardware, Technological innovation, Internet of Vehicles, privacy-preserving, vehicle-to-vehicle, security BibRef

Parkinson, S., Ward, P., Wilson, K., Miller, J.,
Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges,
ITS(18), No. 11, November 2017, pp. 2898-2915.
IEEE DOI 1711
Automation, Computer security, Global Positioning System, Hardware, Jamming, Monitoring, Sensors, Connected, autonomous, cyber threats, mitigation, vehicles, vulnerabilities BibRef

Tan, H., Choi, D., Kim, P., Pan, S., Chung, I.,
Comments on 'Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(19), No. 7, July 2018, pp. 2149-2151.
IEEE DOI 1807
See also Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. See also Reply to Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. Authentication, Cryptography, Data communication, Resistance, Vehicular ad hoc networks, Authentication, VANETs, replay attack BibRef

Ahmed, S.H., Bouk, S.H., Yaqub, M.A., Kim, D., Song, H.,
DIFS: Distributed Interest Forwarder Selection in Vehicular Named Data Networks,
ITS(19), No. 9, September 2018, pp. 3076-3080.
IEEE DOI 1809
Storms, Security, Delays, Roads, Reliability, Vehicle dynamics, IP networks, NDN, interest forwarding, vehicular networks BibRef

Suo, D.[Dajiang], Siegel, J.E.[Joshua E.], Sarma, S.E.[Sanjay E.],
Merging safety and cybersecurity analysis in product design,
IET-ITS(12), No. 9, November 2018, pp. 1103-1109.
DOI Link 1810
BibRef

Panagiotopoulos, I.[Ilias], Dimitrakopoulos, G.[George],
Diffie-Hellman process and its use in secure and authenticated VC networks,
IET-ITS(12), No. 9, November 2018, pp. 1082-1087.
DOI Link 1810
BibRef

Brecht, B., Therriault, D., Weimerskirch, A., Whyte, W., Kumar, V., Hehn, T., Goudy, R.,
A Security Credential Management System for V2X Communications,
ITS(19), No. 12, December 2018, pp. 3850-3871.
IEEE DOI 1812
Privacy, Safety, Cryptography, Risk management, Vehicles, Device-to-device communication, vehicle safety, cryptography, intelligent transportation systems BibRef

Lu, Z., Qu, G., Liu, Z.,
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy,
ITS(20), No. 2, February 2019, pp. 760-776.
IEEE DOI 1902
Privacy, Authentication, Vehicular ad hoc networks, Safety, Tools, VANETs, security, privacy, trust management, simulation tools BibRef

Cheng, T., Liu, G., Yang, Q., Sun, J.,
Trust Assessment in Vehicular Social Network Based on Three-Valued Subjective Logic,
MultMed(21), No. 3, March 2019, pp. 652-663.
IEEE DOI 1903
road safety, road vehicles, security of data, social networking (online), traffic engineering computing, distributed algorithm BibRef

Liu, S., Liu, L., Tang, J., Yu, B., Wang, Y., Shi, W.,
Edge Computing for Autonomous Driving: Opportunities and Challenges,
PIEEE(107), No. 8, August 2019, pp. 1697-1716.
IEEE DOI 1908
Connected and autonomous vehicles (CAVs), edge computing, heterogeneous computing, security, vehicle-to-everything (V2X), vehicular operating system BibRef

Javed, M.A., Hamida, E.B.,
On the Interrelation of Security, QoS, and Safety in Cooperative ITS,
ITS(18), No. 7, July 2017, pp. 1943-1957.
IEEE DOI 1706
Cams, Quality of service, Roads, Safety, Security, Standards, Vehicles, Intelligent transport systems, QoS, VANET, safety awareness, security BibRef

Lu, R., Zhang, L., Ni, J., Fang, Y.,
5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy,
PIEEE(108), No. 2, February 2020, pp. 373-389.
IEEE DOI 2001
5G vehicle-to-everything (V2X) services, challenges, privacy, security, solutions, trust BibRef

Ren, K., Wang, Q., Wang, C., Qin, Z., Lin, X.,
The Security of Autonomous Driving: Threats, Defenses, and Future Directions,
PIEEE(108), No. 2, February 2020, pp. 357-372.
IEEE DOI 2001
Laser radar, Sensors, Security, Global Positioning System, Autonomous vehicles, Jamming, Autonomous vehicles (AVs), sensors BibRef


Yan, G., Rawat, D.B., Shi, H.[Hui], Chong, D.,
A cross-layer and optimized privacy method in Vehicular ad-hoc Networks,
ICIVC17(894-898)
IEEE DOI 1708
Privacy, Protocols, Transportation, ad hoc network, cost optimization, privacy, scalability, vehicular, networks BibRef

Chapter on Motion -- Feature-Based, Long Range, Motion and Structure Estimates, Tracking, Surveillance, Activities continues in
Rail Traffic Controls, Trains .


Last update:May 26, 2020 at 12:00:59