English  |  正體中文  |  简体中文  |  Items with full text/Total items : 57970/91504 (63%)
Visitors : 13686007      Online Users : 48
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/83322

    Title: Privacy Preservation in Secure Group Communication for Vehicular Ad Hoc Networks
    Authors: Horng, Wen-Bing;Lee, Cheng-Ping;Peng, Jian-Wen
    Contributors: 淡江大學資訊工程學系
    Keywords: Group communications;Privacy preservation;Vehicular ad hoc network
    Date: 2012-08
    Issue Date: 2013-03-18 09:38:14 (UTC+8)
    Publisher: New York: Springer New York LLC
    Abstract: Secure communications for vehicular ad hoc networks (VANETs) have become an important research issue these years. Many protocols for secure vehicle-to-vehicle communications and vehicle-to-infrastructure communications have been proposed, yet fewer protocols are concerned with secure group communications for VANETs. Of those existing protocols for group communications, some of them form a group of vehicles based on geographical regions and provide broadcasting to the group members with or without message confidentiality. The others allow secure vehicle-to-vehicle communications within a group with session keys, but they do not preserve user privacy for communicating parties within the group. In this paper, we propose a novel group communication scheme for vehicular networks, in which a group is formed by a set of related vehicles of the same purpose, such as a platoon of recreational vehicles targeted for the same tourist spot. The scheme not only offers efficient and secure group communications but also provides privacy preservation for vehicle-to-vehicle communications within a group. Security analysis is given to demonstrate the robustness of the proposed scheme.
    Relation: Telecommunication Systems 50(4), pp.355-365
    DOI: 10.1007/s11235-010-9409-9
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Journal Article

    Files in This Item:

    File Description SizeFormat
    1018-4864_s11235-010-9409-9.pdf1006KbAdobe PDF117View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback