The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Location Security in Vehicular Wireless Networks
|
Author(s): Gongjun Yan (University of Southern Indiana, USA), Danda B. Rawat (Georgia Southern University, USA), Bhed Bahadur Bista (Iwate Prefectural University, Japan)and Lei Chen (Sam Houston State University, USA)
Copyright: 2014
Pages: 26
Source title:
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Source Author(s)/Editor(s): Danda B. Rawat (Georgia Southern University, USA), Bhed B. Bista (Iwate Prefectural University, Japan)and Gongjun Yan (University of Southern Indiana, USA)
DOI: 10.4018/978-1-4666-4691-9.ch006
Purchase
|
Abstract
In Vehicular Ad-Hoc Networks (VANETs), applications are based on one fundamental piece of information: location. Therefore, attackers will exploit location information to launch attacks. The authors present an in-depth survey of location security methods that have been recently proposed in literature. They present the algorithms or protocols of different methods and compare them with each other in this chapter. The methods are mainly in three aspects: position integrity, position confidentiality, and position availability. The position integrity methods focus on validating a vehicle’s position to ensure the position information is correct. Position confidentiality ensures not only the confidentiality of position information but also the authentication of location that a location related message can only decrypt by the receiver which is “physically” present inside a decryption region that is specified by location, time, and speed. The position availability methods create and maintain a reliable routing path to delivery position information. The selection and maintenance of routing paths in literature can be based on multiple resources, for example wireless signal strength, computation resources, and probability models. The three aspects, position integrity, position confidentiality, and position availability, are the three basic requirements of information security based on the standard 200 of NIST.
Related Content
Tapan Kumar Behera.
© 2023.
20 pages.
|
B. Narendra Kumar Rao.
© 2023.
17 pages.
|
Blendi Rrustemi, Deti Baholli, Herolind Balaj.
© 2023.
18 pages.
|
Alma Beluli.
© 2023.
11 pages.
|
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku.
© 2023.
15 pages.
|
Yllka Totaj.
© 2023.
12 pages.
|
Hla Myo Tun, Devasis Pradhan.
© 2023.
31 pages.
|
|
|