Cargando…

Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Maria, Azees (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Diplomica Verlag GmbH : Anchor Academic Publishing, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1089930718
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 190315s2018 xx o 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d N$T  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9783960676805  |q (electronic bk.) 
020 |a 3960676808  |q (electronic bk.) 
020 |z 9783960671800 
035 |a (OCoLC)1089930718 
050 4 |a TE228.37 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
049 |a UAMI 
100 1 |a Maria, Azees,  |e author. 
245 1 0 |a Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks /  |c Azees Maria. 
264 1 |a [Place of publication not identified] :  |b Diplomica Verlag GmbH :  |b Anchor Academic Publishing,  |c 2018. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed April 2, 2019). 
505 0 |a Efficient Anonymous Authentication and Key Management Techniques for Vehicular Ad-hoc Networks; ABSTRACT; ACKNOWLEGDEMENT; TABLE OF CONTENTS; LIST OF TABLES; LIST OF FIGURES; LIST OF SYMBOLS AND ABBREVIATIONS; CHAPTER 1 INTRODUCTION; 1.1 VANET OVERVIEW; 1.1.1 VANET System Model; 1.1.2 Dedicated Short Range Communication (DSRC); 1.1.3 VANET Characteristics; 1.2 SECURITY ISSUES IN VANET; 1.3 PROPOSED WORKS; 1.4 OBJECTIVES OF THE RESEARCH WORK; 1.5 ASSUMPTIONS; 1.6 ORGANIZATION OF THE THESIS; CHAPTER 2 LITERATURE SURVEY; 2.1 INTRODUCTION; 2.2 SECURITY SERVICES OF VANETS 
505 8 |a 2.3 AVAILABILITY IN VANETS2.3.1 Threats and Attacks on Availability; 2.3.2 Works on Availability; 2.4 CONFIDENTIALITY IN VANETS; 2.4.1 Threats and Attacks on Confidentiality; 2.4.2 Works on Confidentiality; 2.5 AUTHENTICATION IN VANETS; 2.5.1 Threats and Attacks on Authentication; 2.5.2 Requirements for Authentication; 2.5.3 Works on Authentication with Privacy Preservation; 2.5.4 Computational Cost for Various Authentication Schemes; 2.6 DATA INTEGRITY IN VANETS; 2.6.1 Threats and Attacks on Data Integrity; 2.6.2 Works on Data Integrity; 2.7 NON-REPUDIATION IN VANETS 
505 8 |a 2.7.1 Attack on Non-repudiation2.7.2 Works on Non-repudiation; 2.8 COUNTERMEASURES ON VARIOUS SECURITYATTACKS; 2.9 WORKS ON KEY MANAGEMENT; 2.10 LITERATURE SURVEY GAPS; 2.11 PROPOSED WORK; 2.12 CONCLUSIONS; CHAPTER3 SYSTEM ARCHITECTURE; CHAPTER 4 DUAL AUTHENTICATION AND DUAL KEYMANAGEMENT FOR GROUP COMMUNICATION; 4.1 INTRODUCTION; 4.2 PROPOSED DUAL AUTHENTICATION TECHNIQUE; 4.2.1 Registration Through Offline Mode; 4.2.2 Vehicle's Authentication Process; 4.2.3 Trusted Authority's Authentication Process and the Provisionof Authentication Code (AC) 
505 8 |a 4.3 PROPOSED DUAL KEY MANAGEMENT FOR GROUPCOMMUNICATION4.3.1 TA Initial Set Up; 4.3.2 Group Key Computation; 4.3.3 Secure Data Transmission in VANETs; 4.3.4 Key Updating; 4.4 SECURITY ANALYSIS; 4.4.1 Resistance to Replay Attack; 4.4.2 Masquerade and Sybil Attacks; 4.4.3 Message Tampering /Fabrication/Alteration Attack; 4.4.4 Backward Secrecy; 4.4.5 Forward Secrecy; 4.4.6 Collusion Attack; 4.5 PERFORMANCE ANALYSIS; 4.6 CONCLUSIONS; CHAPTER 5 CPAV: COMPUTATIONALLY EFFICIENT PRIVACY PRESERVING ANONYMOUS AUTHENTICATION FOR A VEHICLE USER IN VANETS; 5.1 INTRODUCTION; 5.2 SECURITY REQUIREMENTS 
505 8 |a 5.3 BILINEAR PAIRING5.4 PROPOSED CPAV SCHEME; 5.4.1 System Initialization; 5.4.2 Registration; 5.4.3 Secure Activation Key Distribution; 5.4.4 CPAV Secure Anonymous Mutual Authentication; 5.5 SECURITY ANALYSIS; 5.5.1 Message Integrity and Source Authentication; 5.5.2 Conditional Privacy Preservation; 5.5.3 Anonymity; 5.6 PERFORMANCE ANALYSIS; 5.7 CONCLUSIONS; CHAPTER 6 EFFICIENT ANONYMOUS AUTHENTICATION OF AN RSU; 6.1 INTRODUCTION; 6.2 ANONYMOUS AUTHENTICATION; 6.2.1 System Initialization; 6.2.2 Anonymous Authentication of an RSU; 6.3 SECURITY ANALYSIS; 6.4 PERFORMANCE ANALYSIS 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Vehicular ad hoc networks (Computer networks) 
650 0 |a Traffic congestion. 
650 0 |a Intelligent transportation systems. 
650 6 |a Réseaux ad hoc de véhicules. 
650 6 |a Embouteillages (Circulation) 
650 6 |a Systèmes de transport intelligents. 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Intelligent transportation systems  |2 fast 
650 7 |a Traffic congestion  |2 fast 
650 7 |a Vehicular ad hoc networks (Computer networks)  |2 fast 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2070390  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5735882 
938 |a EBSCOhost  |b EBSC  |n 2070390 
994 |a 92  |b IZTAP