16.7.2.5.17 Security, Privacy in Vehicle Networks, VANET

Chapter Contents (Back)
Vehicle Networks. Networks. VANET. Smart Highways.

Huang, D., Misra, S., Verma, M., Xue, G.,
PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs,
ITS(12), No. 3, September 2011, pp. 736-746.
IEEE DOI 1109
BibRef

Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.,
OPQ: OT-Based Private Querying in VANETs,
ITS(12), No. 4, December 2011, pp. 1413-1422.
IEEE DOI 1112
BibRef

Lu, R., Lin, X., Liang, X., Shen, X.,
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs,
ITS(13), No. 1, March 2012, pp. 127-139.
IEEE DOI 1203
BibRef

Taha, S., Shen, X.,
A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs,
ITS(14), No. 4, 2013, pp. 1665-1680.
IEEE DOI 1312
Estimation error BibRef

Yan, G., Wen, D., Olariu, S., Weigle, M.C.,
Security Challenges in Vehicular Cloud Computing,
ITS(14), No. 1, March 2013, pp. 284-294.
IEEE DOI 1303
BibRef

Petit, J., Shladover, S.E.,
Potential Cyberattacks on Automated Vehicles,
ITS(16), No. 2, April 2015, pp. 546-556.
IEEE DOI 1504
Automation BibRef

Woo, S., Jo, H.J., Lee, D.H.,
A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN,
ITS(16), No. 2, April 2015, pp. 993-1006.
IEEE DOI 1504
Automotive engineering BibRef

Woo, S., Jo, H.J., Kim, I.S., Lee, D.H.,
A Practical Security Architecture for In-Vehicle CAN-FD,
ITS(17), No. 8, August 2016, pp. 2248-2261.
IEEE DOI 1608
Automotive engineering BibRef

Qu, F., Wu, Z., Wang, F., Cho, W.,
A Security and Privacy Review of VANETs,
ITS(16), No. 6, December 2015, pp. 2985-2996.
IEEE DOI 1512
Authentication BibRef

Alcaide, A., Palomar, E., Fuentes, J.M., Gonza´lez-Manzano, L.,
Privacy-aware average speed monitoring system for vehicular ad-hoc networks,
IET-ITS(9), No. 3, 2015, pp. 293-305.
DOI Link 1506
cryptographic protocols BibRef

Jiang, S., Zhu, X., Wang, L.,
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs,
ITS(17), No. 8, August 2016, pp. 2193-2204.
IEEE DOI 1608
Authentication BibRef

Lo, N.W., Tsai, J.L.,
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings,
ITS(17), No. 5, May 2016, pp. 1319-1328.
IEEE DOI 1605
Authentication BibRef

Li, W., Song, H.,
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 960-969.
IEEE DOI 1604
Ad hoc networks BibRef

Vijayakumar, P., Azees, M., Kannan, A., Deborah, L.J.[L. Jegatha],
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks,
ITS(17), No. 4, April 2016, pp. 1015-1028.
IEEE DOI 1604
Authentication See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. BibRef

Azees, M.,
Reply to Comments on 'Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(20), No. 9, September 2019, pp. 3595-3595.
IEEE DOI 1909
Authentication, Vehicular ad hoc networks, Digital signatures, Cryptography, Data communication, Resistance, Authentication, replay attack See also Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. BibRef

Azees, M., Vijayakumar, P., Jegatha Deborah, L.,
Comprehensive survey on security services in vehicular ad-hoc networks,
IET-ITS(10), No. 6, 2016, pp. 379-388.
DOI Link 1608
intelligent transportation systems BibRef

Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.,
Distributed Aggregate Privacy-Preserving Authentication in VANETs,
ITS(18), No. 3, March 2017, pp. 516-526.
IEEE DOI 1703
Aggregates BibRef

Xia, Y., Chen, W., Liu, X., Zhang, L., Li, X., Xiang, Y.,
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks,
ITS(18), No. 10, October 2017, pp. 2629-2641.
IEEE DOI 1710
Ad hoc networks, Cryptography, Data privacy, Multimedia communication, Privacy, Social network services, Attributed-based encryption, decision tree, multimedia message, outsourcing decryption, vehicular ad-hoc networks BibRef

Jo, H.J., Kim, I.S., Lee, D.H.,
Reliable Cooperative Authentication for Vehicular Networks,
ITS(19), No. 4, April 2018, pp. 1065-1079.
IEEE DOI 1804
Authentication, Message authentication, Protocols, Reliability, Roads, Synchronization, Anonymity, cooperative authentication, vehicular Ad-hoc NETworks BibRef

Rosenstatter, T., Englund, C.,
Modelling the Level of Trust in a Cooperative Automated Vehicle Control System,
ITS(19), No. 4, April 2018, pp. 1237-1247.
IEEE DOI 1804
Control systems, Decision making, Kalman filters, Radar, Sensor systems, Vehicular ad hoc networks, GCDC 2016, vehicle-to-vehicle communication BibRef

Khodaei, M., Jin, H., Papadimitratos, P.,
SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems,
ITS(19), No. 5, May 2018, pp. 1430-1444.
IEEE DOI 1805
Authentication, Delays, Principal component analysis, Privacy, Public key, Vehicular communications, vehicular PKI BibRef

Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., Zhang, Z.,
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles,
ITS(19), No. 7, July 2018, pp. 2204-2220.
IEEE DOI 1807
Authentication, Privacy, Protocols, Reliability, Servers, Smart transportation, Smart transportation, blockchain, vehicular communication BibRef

Zhang, Q., Boukerche, A.,
A Novel Infrastructure-Based Worm Spreading Countermeasure for Vehicular Networks,
ITS(19), No. 7, July 2018, pp. 2188-2203.
IEEE DOI 1807
Analytical models, Curing, Grippers, Roads, Simulation, Topology, Vehicular ad hoc networks, Vehicular networks (VANETs), worms BibRef

Kang, J., Yu, R., Huang, X., Zhang, Y.,
Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles,
ITS(19), No. 8, August 2018, pp. 2627-2637.
IEEE DOI 1808
Privacy, Cloud computing, Local government, Edge computing, Computer architecture, Safety, Internet of vehicles, fog computing, game theory BibRef

Förster, D., Löhr, H., Grätz, A., Petit, J., Kargl, F.,
An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios,
ITS(19), No. 10, October 2018, pp. 3400-3405.
IEEE DOI 1810
Privacy, Vehicles, Road transportation, Vehicular ad hoc networks, Standards, Safety, Observers, C-ITS, vehicular ad hoc networks, tracking BibRef

Kaviani, A.[Arash], Thompson, R.G.[Russell G.], Rajabifard, A.[Abbas], Sarvi, M.[Majid],
Hybrid machine learning and optimisation method to solve a tri-level road network protection problem,
IET-ITS(12), No. 9, November 2018, pp. 1011-1019.
DOI Link 1810
BibRef

Abdollahi Biron, Z., Dey, S., Pisu, P.,
Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems,
ITS(19), No. 12, December 2018, pp. 3893-3902.
IEEE DOI 1812
Cyberattack, Stability analysis, Safety, Mathematical model, Delays, Estimation, Control systems, Connected vehicles, estimation BibRef

Shin, D., Kim, B., Yi, K., Carvalho, A., Borrelli, F.,
Human-Centered Risk Assessment of an Automated Vehicle Using Vehicular Wireless Communication,
ITS(20), No. 2, February 2019, pp. 667-681.
IEEE DOI 1902
Safety, Radar, Vehicles, Vehicular ad hoc networks, Risk management, Wireless communication, Delays, Risk assessment, automated drive BibRef

Corser, G.P., Fu, H., Banihani, A.,
Evaluating Location Privacy in Vehicular Communications and Applications,
ITS(17), No. 9, September 2016, pp. 2658-2667.
IEEE DOI 1609
Measurement BibRef

Lai, C., Zhang, K., Cheng, N., Li, H., Shen, X.,
SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs,
ITS(18), No. 6, June 2017, pp. 1559-1574.
IEEE DOI 1706
Authentication, Incentive schemes, Internet, Reliability, Road transportation, Vehicles, VANET, cooperation, downloading, drive-thru Internet, incentive, security BibRef

Azees, M., Vijayakumar, P., Deboarh, L.J.,
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks,
ITS(18), No. 9, September 2017, pp. 2467-2476.
IEEE DOI 1709
telecommunication security, signature verification process, Multicast communication, Conditional privacy, anonymous certificates, authentication, security, BibRef

Liu, Y., Wang, Y., Chang, G.,
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm,
ITS(18), No. 10, October 2017, pp. 2740-2749.
IEEE DOI 1710
Authentication, Encryption, Hardware, Technological innovation, Internet of Vehicles, privacy-preserving, vehicle-to-vehicle, security BibRef

Parkinson, S., Ward, P., Wilson, K., Miller, J.,
Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges,
ITS(18), No. 11, November 2017, pp. 2898-2915.
IEEE DOI 1711
Automation, Computer security, Global Positioning System, Hardware, Jamming, Monitoring, Sensors, Connected, autonomous, cyber threats, mitigation, vehicles, vulnerabilities BibRef

Tan, H., Choi, D., Kim, P., Pan, S., Chung, I.,
Comments on 'Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks',
ITS(19), No. 7, July 2018, pp. 2149-2151.
IEEE DOI 1807
See also Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. See also Reply to Comments on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. Authentication, Cryptography, Data communication, Resistance, Vehicular ad hoc networks, Authentication, VANETs, replay attack BibRef

Ahmed, S.H., Bouk, S.H., Yaqub, M.A., Kim, D., Song, H.,
DIFS: Distributed Interest Forwarder Selection in Vehicular Named Data Networks,
ITS(19), No. 9, September 2018, pp. 3076-3080.
IEEE DOI 1809
Storms, Security, Delays, Roads, Reliability, Vehicle dynamics, IP networks, NDN, interest forwarding, vehicular networks BibRef

Suo, D.[Dajiang], Siegel, J.E.[Joshua E.], Sarma, S.E.[Sanjay E.],
Merging safety and cybersecurity analysis in product design,
IET-ITS(12), No. 9, November 2018, pp. 1103-1109.
DOI Link 1810
BibRef

Panagiotopoulos, I.[Ilias], Dimitrakopoulos, G.[George],
Diffie-Hellman process and its use in secure and authenticated VC networks,
IET-ITS(12), No. 9, November 2018, pp. 1082-1087.
DOI Link 1810
BibRef

Brecht, B., Therriault, D., Weimerskirch, A., Whyte, W., Kumar, V., Hehn, T., Goudy, R.,
A Security Credential Management System for V2X Communications,
ITS(19), No. 12, December 2018, pp. 3850-3871.
IEEE DOI 1812
Privacy, Safety, Cryptography, Risk management, Vehicles, Device-to-device communication, vehicle safety, cryptography, intelligent transportation systems BibRef

Lu, Z., Qu, G., Liu, Z.,
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy,
ITS(20), No. 2, February 2019, pp. 760-776.
IEEE DOI 1902
Privacy, Authentication, Vehicular ad hoc networks, Safety, Tools, VANETs, security, privacy, trust management, simulation tools BibRef

Cheng, T., Liu, G., Yang, Q., Sun, J.,
Trust Assessment in Vehicular Social Network Based on Three-Valued Subjective Logic,
MultMed(21), No. 3, March 2019, pp. 652-663.
IEEE DOI 1903
road safety, road vehicles, security of data, social networking (online), traffic engineering computing, distributed algorithm BibRef

Liu, S., Liu, L., Tang, J., Yu, B., Wang, Y., Shi, W.,
Edge Computing for Autonomous Driving: Opportunities and Challenges,
PIEEE(107), No. 8, August 2019, pp. 1697-1716.
IEEE DOI 1908
Connected and autonomous vehicles (CAVs), edge computing, heterogeneous computing, security, vehicle-to-everything (V2X), vehicular operating system BibRef

Javed, M.A., Hamida, E.B.,
On the Interrelation of Security, QoS, and Safety in Cooperative ITS,
ITS(18), No. 7, July 2017, pp. 1943-1957.
IEEE DOI 1706
Cams, Quality of service, Roads, Safety, Security, Standards, Vehicles, Intelligent transport systems, QoS, VANET, safety awareness, security BibRef

Cui, J., Wei, L., Zhang, J., Xu, Y., Zhong, H.,
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks,
ITS(20), No. 5, May 2019, pp. 1621-1632.
IEEE DOI 1905
Authentication, Message authentication, Edge computing, Vehicular ad hoc networks, Cloud computing, Vehicles, VANETs, edge computing BibRef

Arshad, M.[Muhammad], Ullah, Z.[Zahid], Khalid, M.[Muhammad], Ahmad, N.[Naveed], Khalid, W.[Waqar], Shahwar, D.[Duri], Cao, Y.[Yue],
Beacon trust management system and fake data detection in vehicular ad-hoc networks,
IET-ITS(13), No. 5, May 2019, pp. 780-788.
DOI Link 1906
BibRef

Liu, Y.[Yi], Wu, J.[Jun], Li, J.H.[Jian-Hua], Yang, W.[Wu], Chen, H.[Hao], Li, G.[Gaolei],
ISRF: interest semantic reasoning based fog firewall for information-centric Internet of Vehicles,
IET-ITS(13), No. 6, June 2019, pp. 975-982.
DOI Link 1906
BibRef

Kanchan, S.[Sneha], Singh, G.[Garima], Chaudhari, N.S.[Narendra S.],
SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups,
IET-ITS(13), No. 9, September 2019, pp. 1447-1460.
DOI Link 1908
BibRef

Rasheed, A.A., Mahapatra, R.N., Hamza-Lup, F.G.,
Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks,
ITS(21), No. 2, February 2020, pp. 867-881.
IEEE DOI 2002
Authentication, Protocols, Privacy, Vehicular ad hoc networks, Public key, Authentication, privacy and trust, anonymity, revocation BibRef

Chen, J., Mao, G., Li, C., Zhang, D.,
A Topological Approach to Secure Message Dissemination in Vehicular Networks,
ITS(21), No. 1, January 2020, pp. 135-148.
IEEE DOI 2001
Roads, Relays, Network topology, Heuristic algorithms, Encryption, Authentication, Vehicular networks, security, decision algorithm BibRef

Lu, R., Zhang, L., Ni, J., Fang, Y.,
5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy,
PIEEE(108), No. 2, February 2020, pp. 373-389.
IEEE DOI 2001
5G vehicle-to-everything (V2X) services, challenges, privacy, security, solutions, trust BibRef

Ren, K., Wang, Q., Wang, C., Qin, Z., Lin, X.,
The Security of Autonomous Driving: Threats, Defenses, and Future Directions,
PIEEE(108), No. 2, February 2020, pp. 357-372.
IEEE DOI 2001
Laser radar, Sensors, Security, Global Positioning System, Autonomous vehicles, Jamming, Autonomous vehicles (AVs), sensors BibRef

Castiglione, A.[Arcangelo], Palmieri, F.[Francesco], Colace, F.[Francesco], Lombardi, M.[Marco], Santaniello, D.[Domenico], D'Aniello, G.[Giuseppe],
Securing the internet of vehicles through lightweight block ciphers,
PRL(135), 2020, pp. 264-270.
Elsevier DOI 2006
Internet of vehicles, Automotive security, Controller area network, Lightweight cryptography, Security BibRef

Boualouache, A., Senouci, S., Moussaoui, S.,
PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks,
ITS(21), No. 8, August 2020, pp. 3209-3218.
IEEE DOI 2008
Privacy, Mathematical model, Ad hoc networks, Adaptation models, Road safety, IP networks, Vehicular ad-hoc networks (VANETs), pseudonym changing BibRef


Yan, G., Rawat, D.B., Shi, H.[Hui], Chong, D.,
A cross-layer and optimized privacy method in Vehicular ad-hoc Networks,
ICIVC17(894-898)
IEEE DOI 1708
Privacy, Protocols, Transportation, ad hoc network, cost optimization, privacy, scalability, vehicular, networks BibRef

Moudni, H., Er-Rouidi, M., Mouncif, H., El Hadadi, B.,
Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks,
CGiV16(385-389)
IEEE DOI 1608
mobile ad hoc networks BibRef

Chapter on Motion -- Feature-Based, Long Range, Motion and Structure Estimates, Tracking, Surveillance, Activities continues in
Rail Traffic Controls, Trains .


Last update:Aug 4, 2020 at 13:31:31