International audienceIn this paper, we propose a distributed and dynamic public key infrastructure for vehicular ad hoc networks. We aim to achieve the fundamental security requirements, particularly the authentication, the confidentiality, and a reliable vehicle-to-vehicle data exchange. To make the certification authority (CA) reachable by all vehicles, we distribute its role among a set of dynamically elected vehicles. The election of dynamic CAs is based on a clustering algorithm where the cluster heads will be CAs in their clusters. The cluster heads are elected following two criteria: security and mobility. Due to the important role of the CA in each cluster and to protect it from DOS attacks, we introduce a VANETs dynamic demilitari...
International audienceAn Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes...
Abstract—Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobi...
Nodes in a mobile ad hoc network (MANET) are more vulnerable and there is no predefined infrastructu...
International audienceIn this paper, we propose a distributed and dynamic public key infrastructure ...
International audienceIn this paper, we propose a secure and distributed public key infrastructure f...
Security has become a prime concern in providing communication between mobile nodes in a hostile env...
Vehicular Ad hoc Networks (VANETs) are emerging as a promising approach to improving traffic safety ...
International audienceIn this paper, we propose a new architecture based on an efficient trust model...
Abstract—A vehicular Ad-hoc network is composed of moving cars as nodes without any infrastructure. ...
International audienceIn this paper, we propose a new architecture based on an efficient trust model...
Car-to-X communication systems, often called vehicular ad-hoc networks (VANETs), are in the process ...
A thorough review of the state of the art will reveal that most VANET applications rely on Public Ke...
VANET helps in preventing critical circumstances like traffic congestion, unobserved interferences, ...
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehic...
Privacy, authentication, confidentiality and non repudiation are the most desired security attribute...
International audienceAn Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes...
Abstract—Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobi...
Nodes in a mobile ad hoc network (MANET) are more vulnerable and there is no predefined infrastructu...
International audienceIn this paper, we propose a distributed and dynamic public key infrastructure ...
International audienceIn this paper, we propose a secure and distributed public key infrastructure f...
Security has become a prime concern in providing communication between mobile nodes in a hostile env...
Vehicular Ad hoc Networks (VANETs) are emerging as a promising approach to improving traffic safety ...
International audienceIn this paper, we propose a new architecture based on an efficient trust model...
Abstract—A vehicular Ad-hoc network is composed of moving cars as nodes without any infrastructure. ...
International audienceIn this paper, we propose a new architecture based on an efficient trust model...
Car-to-X communication systems, often called vehicular ad-hoc networks (VANETs), are in the process ...
A thorough review of the state of the art will reveal that most VANET applications rely on Public Ke...
VANET helps in preventing critical circumstances like traffic congestion, unobserved interferences, ...
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehic...
Privacy, authentication, confidentiality and non repudiation are the most desired security attribute...
International audienceAn Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes...
Abstract—Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobi...
Nodes in a mobile ad hoc network (MANET) are more vulnerable and there is no predefined infrastructu...