Limit search to available items
Book Cover
E-book
Author Benarous, Leila

Title Security in Vehicular Networks Focus on Location and Identity Privacy
Published Newark : John Wiley & Sons, Incorporated, 2022

Copies

Description 1 online resource (265 p.)
Contents Cover -- Title Page -- Copyright Page -- Contents -- Preface -- List of Acronyms -- Introduction -- Chapter 1. Vehicular Networks -- 1.1. Introduction -- 1.2. Motivation by numbers -- 1.3. Evolution -- 1.4. Architecture -- 1.5. Characteristics -- 1.6. Technical challenges and issues -- 1.7. Wireless technology -- 1.8. Standards -- 1.8.1. IEEE WAVE stack -- 1.8.2. ETSI standards -- 1.8.3. The 3GPP standard -- 1.9. Types -- 1.9.1. The autonomous vehicle (self-dependent) -- 1.9.2. VANET -- 1.9.3. Vehicular clouds -- 1.9.4. Internet of vehicles -- 1.9.5. Social Internet of vehicles
1.9.6. Data named vehicular networks -- 1.9.7. Software-defined vehicular networks -- 1.10. Test beds and real implementations -- 1.11. Services and applications -- 1.12. Public opinion -- 1.13. Conclusion -- Chapter 2. Privacy and Security in Vehicular Networks -- 2.1. Introduction -- 2.2. Privacy issue in vehicular networks -- 2.2.1. Types -- 2.2.2. When and how it is threatened? -- 2.2.3. Who is the threat? -- 2.2.4. What are the consequences? -- 2.2.5. How can we protect against it? -- 2.3. State-of-the-art location privacy-preserving solutions -- 2.3.1. Non-cooperative change
2.3.2. Silence approaches -- 2.3.3. Infrastructure-based mix-zone approach -- 2.3.4. The cooperation approach (distributed mix-zone) -- 2.3.5. Hybrid approach -- 2.4. Authentication issues in vehicular networks -- 2.4.1. What is being authenticated in vehicular networks? -- 2.4.2. Authentication types -- 2.4.3. How does authentication risk privacy? -- 2.5. Identity privacy preservation authentication solutions: state of the art -- 2.6. Conclusion -- Chapter 3. Security and Privacy Evaluation Methodology -- 3.1. Introduction -- 3.2. Evaluation methodology -- 3.2.1. Security -- 3.2.2. Privacy
3.3. Conclusion -- Chapter 4. The Attacker Model -- 4.1. Introduction -- 4.2. Security objectives -- 4.3. Security challenges -- 4.4. Security attacker -- 4.4.1. Aims -- 4.4.2. Types -- 4.4.3. Means -- 4.4.4. Attacks -- 4.4.5. Our attacker model -- 4.5. Conclusion -- Chapter 5. Privacy-preserving Authentication in Cloud-enabled Vehicle Data Named Networks (CVDNN) for Resources Sharing -- 5.1. Introduction -- 5.2. Background -- 5.2.1. Vehicular clouds -- 5.2.2. Vehicular data named networks -- 5.3. System description -- 5.4. Forming cloud-enabled vehicle data named networks
5.5. Migrating the local cloud virtual machine to the central cloud -- 5.6. Privacy and authentication when using/providing CVDNN services -- 5.6.1. The authentication process -- 5.6.2. The reputation testimony -- 5.7. The privacy in CVDNN -- 5.8. Discussion and analysis -- 5.8.1. The privacy when joining the VC -- 5.8.2. Privacy while using the VC -- 5.9. Conclusion -- Chapter 6. Privacy-preserving Authentication Scheme for On-road On-demand Refilling of Pseudonym in VANET -- 6.1. Introduction -- 6.2. Network model and system functionality -- 6.2.1. Network model
Notes Description based upon print version of record
6.2.2. The system functionality
Form Electronic book
Author Batim, Salim
Mellouk, Abdelhamid
ISBN 9781394172597
1394172591