STUDY ON THE IMPLEMENTATION OF PROTOCOLS FOR PROVIDING SECURITY IN AVERAGE VANET INTERVEHICULARY NETWORK COMMUNICATION SYSTEMS

被引:0
|
作者
Alexandrescu, R. V. [1 ]
Surugiu, Maria Claudia [2 ]
Petrescu, I. [2 ]
机构
[1] Univ Politehn Bucuresti, Fac Elect Telecommun & Informat Technol, Bucharest, Romania
[2] Univ Politehn Bucuresti, Fac Transports, Remote Control & Elect Transports Dept, Bucharest, Romania
关键词
Vehicular Ad-Hoc Networks; protocol; communication V2V; structure message; seizing date packets; calculating the minimum carrier frequency;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The VANET type networks (Vehicular Ad-Hoc Networks) are a particular case of ad-hoc wireless networks. These networks are formed by equipping vehicles with short-range wireless communication devices. The development of VANET network applications and protocols brings some unique security issues dictated by the devices in use, vehicles' sporadic connectivity, the high degree of relevance given by their geographical location discovery. The paper presents a security protocol used in VANET networks (Vehicular Ad-Hoc Networks). The motivation behind this work is based on the current void of adequate mechanisms to ensure standardized property security in vehicular ad-hoc environments of today. Now, there is a serious lack of mechanisms for possible attack detection and also a lack of means to neutralize them. The solutions developed so far do not cover all security aspects, not being yet standardized and accepted among the scientific community. The security solution exposed in this paper is based on the vehicle's position when sending messages, the time when emission occurs, and existence of certification authorities in the area at the starting moment of information transmittal, which guarantees a secure message transmission in the VANET environment.
引用
收藏
页码:WW1 / WW6
页数:6
相关论文
共 50 条
  • [31] Incorporating security requirements into communication protocols in multi-agent software systems
    Luo, Yuxiu
    Antoniou, Giannakis
    Sterling, Leon
    EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 159 - 160
  • [32] Security-typed languages for implementation of cryptographic protocols: A case study
    Askarov, A
    Sabelfeld, A
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 197 - 221
  • [33] The Implementation and Application of Security Evaluation System of Electric Power Communication Network
    Jiang Dairu
    Li Yiyang
    Liu Xintong
    Zhao Yunwei
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1162 - 1165
  • [34] An Adaptive Cloud Communication Network Using VSAT with Enhanced Security Implementation
    Bose, Rajesh
    Sahana, Sudipta
    Sarddar, Debabrata
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 117 - 125
  • [35] Protocols for network throughput optimisation in intelligent vehicle highway communication systems
    Tonbul, F
    Gurcan, MK
    1996 IEEE 46TH VEHICULAR TECHNOLOGY CONFERENCE, PROCEEDINGS, VOLS 1-3: MOBILE TECHNOLOGY FOR THE HUMAN RACE, 1996, : 1801 - 1804
  • [36] The Study and Implementation of the Wireless Network Data Security Model
    Lin, Haifeng
    FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): ALGORITHMS, PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2013, 8784
  • [37] Study on security of network and implementation of VPN based on FreeSWAN
    Li, Fang-Min
    Peng, Xiao-Bing
    Ye, Cheng-Qing
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2003, 24 (05):
  • [38] Applying the fuzzy-weighted-average approach to evaluate network security systems
    Chang, PT
    Hung, KC
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2005, 49 (11-12) : 1797 - 1814
  • [39] Design and Implementation of Security Risk Assessment System for Electric Power Communication Network
    Zhu, Rui-Bo
    An, Yi
    Yu, Ning
    Rong, Li
    INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATION CONTROL (ICEEAC 2017), 2017, 123 : 482 - 487
  • [40] Inverse problems of chaotic dynamics and statistical analysis in providing information security in communication systems and networks
    Kostenko P.Yu.
    Antonov A.V.
    Kostenko T.P.
    Cybernetics and Systems Analysis, 2006, 42 (5) : 694 - 701