[go: nahoru, domu]

Noori et al., 2020 - Google Patents

Reporting spectrum misbehaviour using the IEEE 1609 security credential management system

Noori et al., 2020

Document ID
14315182721175831997
Author
Noori H
Michelson D
Henry K
Publication year
Publication venue
2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)

External Links

Snippet

Connected Vehicle (CV) wireless networks based on DSRC and C-V2X technology are susceptible to interference from both non-CV devices that may be authorized to share the same band and unintentional emitters. In previous work, we proposed and demonstrated …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details

Similar Documents

Publication Publication Date Title
Xie et al. Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs
El-Rewini et al. Cybersecurity challenges in vehicular communications
Mirsadeghi et al. A trust infrastructure based authentication method for clustered vehicular ad hoc networks
Masood et al. Security and privacy challenges in connected vehicular cloud computing
EP1926234B1 (en) Method for transmitting information using aircraft as transmission relays
Raya et al. Securing vehicular ad hoc networks
Raya et al. The security of vehicular ad hoc networks
Park et al. Security and enforcement in spectrum sharing
Raya et al. Eviction of misbehaving and faulty nodes in vehicular networks
Arshad et al. Beacon trust management system and fake data detection in vehicular ad‐hoc networks
Fatemieh et al. Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.
Wang et al. Physical layer security enhancement using artificial noise in cellular vehicle-to-everything (C-V2X) networks
US20210112417A1 (en) Pathloss drop trusted agent misbehavior detection
CN107302468B (en) Method, device and system for automatically inspecting roadside communication device for vehicle-road communication
US20230298388A1 (en) Road usage charging (ruc) determination and reporting techniques
Hatzivasilis et al. MobileTrust: Secure knowledge integration in VANETs
Engoulou et al. A decentralized reputation management system for securing the internet of vehicles
Liu et al. MISO-V: Misbehavior detection for collective perception services in vehicular communications
Al-Mutaz et al. Detecting Sybil attacks in vehicular networks
Noori et al. Reporting spectrum misbehaviour using the IEEE 1609 security credential management system
Shichun et al. Essential technics of cybersecurity for intelligent connected vehicles: Comprehensive review and perspective
Najafi et al. Decentralized reputation model based on bayes' theorem in vehicular networks
Haidar et al. Experimentation and assessment of pseudonym certificate management and misbehavior detection in C-ITS
Goli-Bidgoli et al. A trust-based framework for increasing MAC layer reliability in cognitive radio VANETs
Eckhoff Simulation of privacy-enhancing technologies in vehicular ad-hoc networks