Noori et al., 2020 - Google Patents
Reporting spectrum misbehaviour using the IEEE 1609 security credential management systemNoori et al., 2020
- Document ID
- 14315182721175831997
- Author
- Noori H
- Michelson D
- Henry K
- Publication year
- Publication venue
- 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)
External Links
Snippet
Connected Vehicle (CV) wireless networks based on DSRC and C-V2X technology are susceptible to interference from both non-CV devices that may be authorized to share the same band and unintentional emitters. In previous work, we proposed and demonstrated …
- 238000001228 spectrum 0 title abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xie et al. | Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs | |
El-Rewini et al. | Cybersecurity challenges in vehicular communications | |
Mirsadeghi et al. | A trust infrastructure based authentication method for clustered vehicular ad hoc networks | |
Masood et al. | Security and privacy challenges in connected vehicular cloud computing | |
EP1926234B1 (en) | Method for transmitting information using aircraft as transmission relays | |
Raya et al. | Securing vehicular ad hoc networks | |
Raya et al. | The security of vehicular ad hoc networks | |
Park et al. | Security and enforcement in spectrum sharing | |
Raya et al. | Eviction of misbehaving and faulty nodes in vehicular networks | |
Arshad et al. | Beacon trust management system and fake data detection in vehicular ad‐hoc networks | |
Fatemieh et al. | Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks. | |
Wang et al. | Physical layer security enhancement using artificial noise in cellular vehicle-to-everything (C-V2X) networks | |
US20210112417A1 (en) | Pathloss drop trusted agent misbehavior detection | |
CN107302468B (en) | Method, device and system for automatically inspecting roadside communication device for vehicle-road communication | |
US20230298388A1 (en) | Road usage charging (ruc) determination and reporting techniques | |
Hatzivasilis et al. | MobileTrust: Secure knowledge integration in VANETs | |
Engoulou et al. | A decentralized reputation management system for securing the internet of vehicles | |
Liu et al. | MISO-V: Misbehavior detection for collective perception services in vehicular communications | |
Al-Mutaz et al. | Detecting Sybil attacks in vehicular networks | |
Noori et al. | Reporting spectrum misbehaviour using the IEEE 1609 security credential management system | |
Shichun et al. | Essential technics of cybersecurity for intelligent connected vehicles: Comprehensive review and perspective | |
Najafi et al. | Decentralized reputation model based on bayes' theorem in vehicular networks | |
Haidar et al. | Experimentation and assessment of pseudonym certificate management and misbehavior detection in C-ITS | |
Goli-Bidgoli et al. | A trust-based framework for increasing MAC layer reliability in cognitive radio VANETs | |
Eckhoff | Simulation of privacy-enhancing technologies in vehicular ad-hoc networks |