Abstract. Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must consider various at-tacks on vehicular networks. Also the localization system should protect the drivers ’ identity privacy and make it difficult for the adversary to track vehicles. Many techniques have been proposed for relative posi-tioning and location verification. Due to the high speed and the strict security requirements, the existing relative positioning and location ver-ification techniques are not directly applicable to vehicular networks. Hence we present a scheme called P-SRLD 1, which securely determines the relative locations of a set of wirele...
Abstract—A number of vehicular networking applications require continuous knowledge of the location ...
Location information is considered to be of prime importance in Vehicular Ad Hoc NETworks (VANETs) b...
Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks...
ABSTRACT — In vehicular networks, moving vehicles are enabled to communicate with each other via i...
Abstract—Transportation systems relying on vehicles to collect data for services such as road condit...
In Vehicular Ad-Hoc Networks (VANETs), applications are based on one fundamental piece of informatio...
Advancement of computing and communication techniques transforms the traditional transport system in...
Vehicular communication systems are an emerging form of communication that enables new ways of coope...
Current connected and autonomous vehicles will contribute to various and green vehicular services. H...
Wireless networks which would connect vehicles via the Internet to a location based service, LBS, al...
Abstract Advances in mobile networks and positioning technologies have made location information a v...
Vehicular ad hoc networks (VANETs) have attracted much attention over the last few years. VANETs own...
Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-o...
Vehicular ad-hoc networks (VANETs) are envisioned to provide many road and safety applications that ...
Vehicular communications disclose rich information about the vehicles and their whereabouts. Pseudon...
Abstract—A number of vehicular networking applications require continuous knowledge of the location ...
Location information is considered to be of prime importance in Vehicular Ad Hoc NETworks (VANETs) b...
Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks...
ABSTRACT — In vehicular networks, moving vehicles are enabled to communicate with each other via i...
Abstract—Transportation systems relying on vehicles to collect data for services such as road condit...
In Vehicular Ad-Hoc Networks (VANETs), applications are based on one fundamental piece of informatio...
Advancement of computing and communication techniques transforms the traditional transport system in...
Vehicular communication systems are an emerging form of communication that enables new ways of coope...
Current connected and autonomous vehicles will contribute to various and green vehicular services. H...
Wireless networks which would connect vehicles via the Internet to a location based service, LBS, al...
Abstract Advances in mobile networks and positioning technologies have made location information a v...
Vehicular ad hoc networks (VANETs) have attracted much attention over the last few years. VANETs own...
Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-o...
Vehicular ad-hoc networks (VANETs) are envisioned to provide many road and safety applications that ...
Vehicular communications disclose rich information about the vehicles and their whereabouts. Pseudon...
Abstract—A number of vehicular networking applications require continuous knowledge of the location ...
Location information is considered to be of prime importance in Vehicular Ad Hoc NETworks (VANETs) b...
Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks...