4.7 Article

A Scalable Robust Authentication Protocol for Secure Vehicular Communications

期刊

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
卷 59, 期 4, 页码 1606-1617

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2009.2038222

关键词

Conditional privacy; information security; protocol design; vehicular ad hoc networks (VANETs)

资金

  1. Spanish Government [2010 CSD2007-00004, TSI2007-65406-C03-01]
  2. Chinese National Science Foundation [60970114, 60970116]
  3. Institucio Catalana de Recerca i Estudis Avancats, Government of Catalonia

向作者/读者索取更多资源

Existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise challenges such as certificate distribution and revocation, avoidance of computation and communication bottlenecks, and reduction of the strong reliance on tamper-proof devices. This paper efficiently copes with these challenges with a decentralized group-authentication protocol in the sense that the group is maintained by each roadside unit (RSU) rather than by a centralized authority, as in most existing protocols that are employing group signatures. In our proposal, we employ each RSU to maintain and manage an on-the-fly group within its communication range. Vehicles entering the group can anonymously broadcast vehicle-to-vehicle (V2V) messages, which can be instantly verified by the vehicles in the same group (and neighboring groups). Later, if the message is found to be false, a third party can be invoked to disclose the identity of the message originator. Our protocol efficiently exploits the specific features of vehicular mobility, physical road limitations, and properly distributed RSUs. Our design leads to a robust VANET since, if some RSUs occasionally collapse, only the vehicles that are driving in those collapsed areas will be affected. Due to the numerous RSUs sharing the load to maintain the system, performance does not significantly degrade when more vehicles join the VANET; hence, the system is scalable.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

A uniformization-based approach to preserve individuals' privacy during process mining analyses

Edgar Batista, Agusti Solanas

Summary: The article introduces the concept of Privacy-Preserving Process Mining (PPPM) and presents a novel privacy-preserving technique u-PPPM to protect personal privacy while minimizing information loss. Experimental results demonstrate the feasibility of this technique in real settings.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Review Chemistry, Multidisciplinary

Privacy and Security in Cognitive Cities: A Systematic Review

Juvenal Machin, Edgar Batista, Antoni Martinez-Balleste, Agusti Solanas

Summary: This article discusses the concept of cognitive cities and their importance in the field of information security and privacy. It emphasizes the reliance of cognitive cities on artificial intelligence and the critical issues of privacy and security in sharing citizens' data. The article also highlights the need for further research in addressing the challenges and proposing solutions in this emerging field.

APPLIED SCIENCES-BASEL (2021)

Article Chemistry, Analytical

Smart Health-Enhanced Early Mobilisation in Intensive Care Units

Maria Ferre, Edgar Batista, Agusti Solanas, Antoni Martinez-Balleste

Summary: Prolonged stays in the Intensive Care Units can lead to Post-Intensive Care Syndrome, for which Early Mobilisation has been proposed as a beneficial technique. However, the appropriate application of Early Mobilisation programs requires overcoming resource scarcity, and Information and Communication Technologies play a key role in this aspect.

SENSORS (2021)

Article Multidisciplinary Sciences

Improving Multivariate Microaggregation through Hamiltonian Paths and Optimal Univariate Microaggregation

Armando Maya-Lopez, Fran Casino, Agusti Solanas

Summary: The collection of personal data is increasing rapidly, leading to privacy risks. To address this, various techniques have been proposed, with microaggregation being a popular method. This article introduces a heuristic solution inspired by the Traveling Salesman Problem and the optimal univariate microaggregation solution to tackle the multivariate microaggregation problem efficiently and effectively.

SYMMETRY-BASEL (2021)

Article Chemistry, Analytical

Sensors for Context-Aware Smart Healthcare: A Security Perspective

Edgar Batista, M. Angels Moncusi, Pablo Lopez-Aguilar, Antoni Martinez-Balleste, Agusti Solanas

Summary: The deployment of smart health systems, enabled by miniaturised electronic devices and fast data networks, enhances medical services and people's welfare while reducing healthcare expenditure and waiting times. However, the complexity and variety of devices and systems involved pose challenging considerations from security and privacy perspectives.

SENSORS (2021)

Article Computer Science, Information Systems

Privacy-preserving process mining: A microaggregation-based approach

Edgar Batista, Antoni Martinez-Balleste, Agusti Solanas

Summary: The proper utilization of process mining techniques with large amounts of event data can lead to the discovery, monitoring, and improvement of business processes, enabling the development of more efficient business intelligence systems. However, privacy concerns arising from personal and confidential information within event data have not been adequately addressed in the field of process mining. This article presents a novel privacy-preserving process mining method called k-PPPM, which utilizes microaggregation techniques to achieve k-anonymity and protects targeted individuals from re-identification through attacks based on process model analysis and location-oriented attacks.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Review Chemistry, Analytical

Information Security and Privacy in Railway Transportation: A Systematic Review

Pablo Lopez-Aguilar, Edgar Batista, Antoni Martinez-Balleste, Agusti Solanas

Summary: Intelligent transportation systems will be crucial in future smart cities, with railway transportation gaining attention as a promising solution for mobility challenges in large urban areas. Despite the benefits of digitization, the complexity of railway transportation presents significant security and privacy challenges.

SENSORS (2022)

Proceedings Paper Computer Science, Interdisciplinary Applications

The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review

Pablo Lopez-Aguilar, Constantinos Patsakis, Agusti Solanas

Summary: In recent years, phishing attacks have become prominent and increasingly successful. Existing anti-phishing strategies focus on raising awareness and training users to identify risks, but often overlook individual psychological traits. This article examines extraversion as a personality trait and finds that, despite many studies showing a positive correlation between extraversion and susceptibility to phishing attacks, there is no consensus supported by established psychological theories. The lack of consensus is attributed to the use of non-representative samples, non consideration of contextual factors, and reliance on self-reported personality tests, which result in limited reproducibility and data inconsistencies.

2022 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH, ECRIME (2022)

Review Social Sciences, Interdisciplinary

SoK: cross-border criminal investigations and digital evidence

Fran Casino, Claudia Pina, Pablo Lopez-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis

Summary: This article analyzes the current state of cross-border criminal investigations, considering the challenges and drawbacks, and proposes solutions to facilitate collaboration among different stakeholders.

JOURNAL OF CYBERSECURITY (2022)

Proceedings Paper Computer Science, Information Systems

Intra-train Wagon Wireless Channel Connectivity Analysis of Ultra Dense Node Deployments

Imanol Picallo, Hicham Klaina, Peio Lopez-Iturri, Jose Javier Astrain, Mikel Celaya-Echarri, Leyre Azpilicueta, Ana Alejos, Asier Perallos, Agusti Solanas, Francisco Falcone

Summary: This work analyzes the intra-wagon connectivity in the Internet of Things, focusing on different wireless communication system requirements. It considers the use of standards like 802.11 ah, Bluetooth Low Energy, and 5G new radio spectrum, and utilizes a deterministic 3D Ray Launching algorithm to provide precise characterizations of various parameters.

COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET (2022)

Review Computer Science, Information Systems

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews

Fran Casino, Thomas K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, Istvan Borocz, Agusti Solanas, Mauro Conti, Constantinos Patsakis

Summary: Digital forensics plays a critical role in cybersecurity and has garnered significant attention from researchers and practitioners. However, existing research articles have mostly focused on specific domains within digital forensics, lacking a global perspective. To address this gap, we conducted a qualitative review of relevant studies, identified main topics and challenges, and emphasized technical, procedural, and ethical issues.

IEEE ACCESS (2022)

Proceedings Paper Computer Science, Interdisciplinary Applications

Human Susceptibility to Phishing Attacks Based on Personality Traits: The Role of Neuroticism

Pablo Lopez-Aguilar, Agusti Solanas

Summary: The COVID19 pandemic has provided opportunities for cyber-criminals to conduct phishing attacks, with the effectiveness of protective measures taken by companies still uncertain. While the Big-Five personality traits model may play a role in countering cybercrime, the correlation between phishing susceptibility and neuroticism remains inconclusive, possibly due to non-representative samples and lack of homogeneity in studies.

2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021) (2021)

Proceedings Paper Computer Science, Interdisciplinary Applications

Holistic Approach to Intrinsic Capacity Assessment: An Engineering Perspective

Montse Garcia-Famoso, M. Angels Moncusi, Agusti Solanas

Summary: This paper approaches the concept of intrinsic capacity from an engineering perspective, proposing a data-warehouse-inspired architecture to tackle the lack of holistic solutions in assessing intrinsic capacity automatically. It also discusses the main challenges that need to be studied in the future.

2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021) (2021)

Proceedings Paper Computer Science, Interdisciplinary Applications

A Review of Data Sources for the Study of Ageing

Mary Carlota Bernal, Antoni Martinez-Balleste, Agusti Solanas

Summary: Understanding human ageing is crucial for healthcare improvement and increasing life expectancy and quality of life. This paper identifies and discusses 28 datasets used in the study of human ageing, providing researchers with an organized reference point and increasing visibility in the field.

2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021) (2021)

Article Computer Science, Information Systems

A Survey on Privacy Properties for Data Publishing of Relational Data

Athanasios Zigomitros, Fran Casino, Agusti Solanas, Constantinos Patsakis

IEEE ACCESS (2020)

暂无数据