Internati
o
nal
Journal of Ele
c
trical
and Computer
Engineering
(IJE
CE)
V
o
l.
6, N
o
. 1
,
Febr
u
a
r
y
201
6,
pp
. 34
4
~
34
8
I
S
SN
: 208
8-8
7
0
8
,
D
O
I
:
10.115
91
/ij
ece.v6
i
1.8
877
3
44
Jo
urn
a
l
h
o
me
pa
ge
: h
ttp
://iaesjo
u
r
na
l.com/
o
n
lin
e/ind
e
x.ph
p
/
IJECE
Prop
os
ed Pot
e
nt
ial Security In
frastructure in VANETS using
Tamper Regist
ered Hardware
Shaik
Mah
a
b
o
ob
Jani, S
y
e
d
Um
ar
Dept of CSE, K
L University
, Guntur, AP, India
Article Info
A
B
STRAC
T
Article histo
r
y:
Received Aug 21, 2015
Rev
i
sed
No
v 2, 201
5
Accepted Nov 17, 2015
All over
th
e
world man
y
ro
ad accidents
ar
e occurred
due to
lack
of
knowledge of v
e
hicle`s distan
ce and speed. But
this issue will b
e
solved b
y
using VANETS through which we can well know about the speed of the
vehicle
and how
much distance it is fro
m other
v
e
hicles in
all sid
e
s. So the
VANETS will pla
y
a ver
y
cruc
ia
l role in the safe
t
y
and m
o
stl
y
av
oidanc
e of
acc
idents like
r
eac
ting im
m
e
diate
l
y
in
danger
ous situations.
In order
to
prevent
the
abus
e
of
VANETS
a potenti
al s
ecur
i
t
y
infras
t
ru
ctur
e is
needed to
m
a
intain conf
id
enti
al requir
e
m
e
nts like m
e
ssage integri
t
y
& ava
ilabi
lit
y.
To
achieve this
we have
proposed a
concep
t
called A
separate
Potential secur
ity
infrastruc
t
ure
fa
cili
tat
e
d wi
th s
y
m
m
e
tric & As
ym
m
e
tric cr
yptog
r
aph
y
with
TRH. Our proposed theor
y
will give ver
y
high effici
ent
in term
s of
Computational
Needs for
the VANETS users.
Keyword:
Assymmetric
C
r
y
p
t
o
gra
p
hy
Sym
m
etric
Tam
p
er resistance
hardware
VANETS
Copyright ©
201
6 Institut
e
o
f
Ad
vanced
Engin
eer
ing and S
c
i
e
nce.
All rights re
se
rve
d
.
Co
rresp
ond
i
ng
Autho
r
:
Sh
aik Mah
a
boo
b Jan
i
,
M.Tech
Stud
en
t, D
e
p
t
of
CSE,
K L
Un
iv
ersity,
Gu
ntu
r
,
AP
.
Em
a
il: lsn
tl@c
c
u
.
ed
u.tw
1.
INTRODUCTION
In
t
h
e M
a
net
s
t
h
e
Ve
hi
cul
a
r
A
d
h
o
c
net
w
o
r
ks
i
s
one
o
f
t
h
e
part
[
1
]
.
Th
ese t
y
pes
of
n
e
t
w
o
r
ks
ar
e
m
a
i
n
l
y
used and a
net
w
or
k i
s
fo
rm
ed i
n
bet
w
een t
h
e
ve
hi
cles like cars, truc
ks bi
kes etc. Som
e
factors like
roa
d
course, traffic and it regulations
will be restricted the
m
ovem
e
nt of
the node (Ve
h
icle) because of these
facto
r
s wh
ich will b
e
a feasib
le i
m
ag
in
atio
n
an
d
app
r
o
x
i
m
a
tio
n
th
at th
e VANET will su
ppo
rt
so
m
e
i
n
fra
st
ruct
ure
whi
c
h i
s
fi
xe
d
whi
c
h can a
ssi
st
som
e
servi
ces [2]
.
As i
t
i
s
o
f
t
e
n
havi
ng
of
fi
xe
d i
n
f
r
ast
r
u
c
t
u
re i
f
the node
s are
depl
oyed i
n
critical si
tuations like service stations,
dang
e
r
ous inte
rsections
, s
o
m
e
places like
hazardous
wea
t
her c
o
nditions. Ge
nerally nodes are
sup
posed to c
o
mm
unicate [3] to ea
ch ot
her
using radi
o
sig
n
a
ls
wh
ich is a stand
a
rd of IEEE
8
0
2
.
11
p and
m
u
lti h
opin
g
will b
e
po
ssib
le wh
en
th
ey in
teract with
o
t
h
e
r
no
des
[
4
]
.
T
h
e
m
a
i
n
co
ncept
of
V
A
N
ETS
i
s
t
o
co
nce
n
t
r
ate o
n
ro
ad safety. Main
ly to
ach
iev
e
ro
ad
safety
u
s
ing
sen
s
o
r
s
wh
ich
co
n
t
ai
n in
fo
rm
atio
n
lik
e sp
eed
o
f
t
h
e v
e
h
i
cle lo
cat
io
n
etc.,
wh
ich
will en
ab
les driv
er
alerting to a
v
oid accidents a
n
d traffic
jam
s
etc.,. The a
u
thorize
d
pe
ople l
i
ke police and
firefi
ghter
will send
t
h
e si
gnal
s
t
o
t
h
e ve
hi
cl
es bef
o
re t
h
ey
are a
p
pr
oac
h
i
n
g
so t
h
e ve
hicles can leave the spa
ce for t
h
e ve
hicle to
m
o
v
e
asid
e in
th
e way [5
] Gen
e
rally we h
a
ve th
ree ap
p
licatio
n
categ
ories
W, A, V
ie.,
W
arnings,
A
larm
in
g
& Alertin
g syste
m
,
V
alue
Added services. T
h
e se
rvices
of
VA
NETS are sh
own
in th
e
b
e
lo
w
Figu
re 1
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJEC
E V
o
l
.
6, No
. 1, Feb
r
uar
y
20
1
6
:
34
4 – 34
8
3
45
Fi
gu
re
1.
Ser
v
i
ces o
f
VA
NET
S
2.
RELATED WORK
There a
r
e m
a
ny applications
using VANET
S which
ca
n easily receive m
o
re and m
o
re inform
ation
and ea
si
l
y
com
m
uni
cat
e wi
t
h
o
n
e
no
de t
o
ot
he
r n
o
d
e.
Som
e
funded
projects like
N
e
t
w
or
k
on
W
h
eels
[
6
]
,
W
ill
Warn
[7
] GST
[8
]. We
are h
a
v
i
n
g
v
a
riou
s
app
r
o
ach
es
o
n
e
of t
h
em
are as fo
llows t
h
e sen
s
ed
d
a
ta
will b
e
use
d
as PKI a
nd
digitally signs eac
h m
e
ss
age. In this
each ve
hicle will have it
own electronic license plate
an
d it o
w
n
ch
assis nu
m
b
er wh
ich
w
ill b
e
issu
ed b
y
th
e govern
m
e
n
t
and
the related
info
rmatio
n
w
ill b
e
sto
r
ed
in
th
e
serv
er.
Th
is licen
se p
l
ate will h
a
v
e
a
p
r
iv
ate k
e
y and
resp
ectiv
e d
i
g
ital sig
n
a
tu
re
o
f
th
e u
s
er wh
ich
is sto
r
ed
in
th
e TPD. To alter th
is an
ony
m
o
u
s
k
e
y to
u
s
e in
th
e
g
e
n
e
ral o
p
e
ration
we requ
ire three
revo
cation
m
e
t
h
od
s
[9
] lik
e RTPD
so
called
as Rev
o
cation
Tam
p
ered
p
r
o
o
f d
e
v
i
ce, RCCRL Re
v
o
cation
co
m
p
ressed
CRLs, DRP-
Di
st
ri
b
u
t
e
d R
e
vocat
i
o
n
Pr
ot
o
c
ol
.
In
th
e
[1
0
]
p
a
p
e
r au
tho
r
s sug
g
e
st th
at th
e ad
v
a
n
c
ed
v
e
rsi
o
n
o
f
PKI is PKI+ as it in
clud
es ellip
tic
curve crypt
o
graphy,
whic
h can easily generate its
own
pse
u
donym certificates. For th
e
PKI+ to
ex
p
l
ai
n
th
is
clearly it h
a
s fi
v
e
stag
es lik
e
a.
Settin
g
th
e applicatio
n
of CA
wh
ich
creates its o
w
n
pr
iv
ate
k
e
y and
selects its o
w
n
ellip
ti
c curv
e fo
r t
h
e
streng
th
en
secu
rity
b.
Settin
g
o
f
Veh
i
cle u
s
ing
t
h
is t
h
e
b
o
t
h
p
r
i
v
ate k
e
y an
d
th
e m
a
ster certificatio
n will b
e
used b
y
th
e user
c.
Gene
rat
i
o
n
of
Pseu
do
ny
m
used t
o
l
i
n
k
wi
t
h
C
A
b
u
t
i
n
t
e
rna
l
l
y
no
use
d.
R
e
vel
a
t
i
on
o
f
Pseu
do
ny
m
,
i
n
t
h
i
s
C
A
uses t
h
e
dat
a
base
an
d se
rve
r
a
n
d
us
ers m
a
st
er key
and
cert
i
f
i
cat
e
t
o
rev
eal t
h
e id
entity o
f
th
e
v
e
h
i
cle
e.
R
e
vocat
i
o
n
of
t
h
e Key
i
n
C
A
use
d
t
o
recom
put
es t
h
e p
r
i
v
a
t
e
m
e
ssage or
i
n
f
o
rm
at
i
on an
d ge
ne
rat
e
d t
h
e
pu
bl
i
c
key
.
In
t
h
i
s
we
ha
ve s
o
m
e
dra
w
back
s
wi
t
h
us
i
n
g
of
on
ly PK
I appr
o
a
ch
es, th
e VAN
ETS hav
e
to
p
a
rticip
ate in th
e tru
s
ted CA. If t
h
e C
A
is
n
o
t
tru
s
ted
th
en
th
e m
a
x
i
m
u
m
in
form
at
io
n will b
e
leaked
to
t
h
e
h
ack
ers and
the b
a
n
d
wid
t
h
u
s
ag
e
will b
e
enorm
o
u
s
.
3.
VA
NETS SECU
RI
NG D
A
T
A
& SATI
S
F
Y
ITS
RE
Q
U
IRE
M
ENT
S
Whi
l
e
we are
st
udy
i
n
g a
b
o
u
t
t
h
e V
A
N
ETS
we
got
m
a
jor issues a
r
ise at the sec
u
rity requi
rem
e
nts
wh
ile send
ing
o
r
receiv
ing
d
a
ta fro
m
o
n
e
nod
e to
o
t
h
e
r.
We alread
y kn
own
th
at app
licatio
n
s
categ
ories
called
W,
A, V. Th
e
main
requ
irem
en
ts are sh
own in
b
e
low tab
l
e: 1
R
e
qui
rem
e
nt
s
Tab
l
e. 1
W.A.V
Security
requ
irem
en
ts
Abbr
.
Secur
ity
Requir
e
m
e
nt
W A
V
I1 Data
integrit
y
x
X
x
I2a I
m
m
e
diate
sender
authentication
X
I2b
Ex post accountabi
lity
x
x
C1
Different levels of confide
n
tiality
x
X
x
C2
Pr
otection of the secur
ity infrastructure
x
X
x
P1
Pr
otection against pr
ofile gener
a
tion
x
X
x
P2
Protection against surveillance
x
X
x
A1
Co
m
putational and bandwidth efficie
n
cy
x
(
x
)
X
Evaluation Warning : The document was created with Spire.PDF for Python.
IJECE
ISS
N
:
2088-8708
Prop
o
s
ed Po
ten
tia
l S
e
cu
rity
In
fra
s
tru
c
tu
re in
VANETS usin
g Ta
mp
er
Reg
i
stered
Ha
rdwa
re
(
S.
M.
Jan
i
)
34
6
4.
PROP
OSED SYSTEM
4.
1 Pr
op
os
al
T
h
eor
y
f
o
r
High E
fficient Securit
y
Th
e in
frastru
c
tu
re of th
e secu
rity o
f
VANETS
a
r
e des
i
gne
d an
d co
m
p
li
ed
with v
e
ry
efficient
co
m
p
u
tin
g
and co
mm
u
n
i
catio
n
s
cap
ab
ilities to
m
a
in
tain
h
i
g
h
co
nfid
en
tial ab
ou
t th
e in
form
at
io
n
.
Wh
en th
e
in
itializat
io
n
fi
n
i
sh
ed
th
en
asy
mmetric cryp
to
graph
y
w
ill b
e
em
p
l
o
y
ed
with
in
th
e
PKI to
sen
d
t
h
e
messag
e
s
for th
e ro
ad
secu
rity. Th
is exp
l
ain
s
clearly in
th
e b
e
l
o
w Fi
g
u
re
2
.
Fi
gu
re
2.
M
A
NETS
ba
sed
V
ANE
TS se
n
d
t
h
e m
e
ssages f
r
o
m
one
no
de
(
v
ehi
c
l
e
)
t
o
ot
h
e
r
In t
h
e above Figure 2 i
n
the t
op
right we
ca
n ob
se
rve
that
accident
occur betwee
n the t
w
o
ve
hicle.
Using the
VANETS
we ca
n
reduce this type of acci
de
nt
s by sending the
alerting acci
dents like wa
rnings
t
o
t
h
e ot
he
r
vehi
cl
es whi
c
h si
d
e
s t
o
t
h
e o
n
e
.
B
y
usi
ng t
h
e a
s
ym
m
e
t
r
i
c
cry
p
t
o
gra
p
hy
an i
n
t
e
r
n
al
i
n
f
r
ast
r
uct
u
re
will be created between the
vehicle. By AW
acci
dent
warni
ngs
will warn the ve
hicles near and sides and
sim
ilarly if any registere
d
ve
hicle lik
e a
m
bulance or police vehicles are e
n
te
red
in
th
e
n
e
twork
t
h
en
from th
at
a m
e
ssag
e
called
SI
will b
e
passed
t
o
all th
e v
e
h
i
cles n
e
arby th
e way
SI is no
th
ing
bu
t St
o
p
In
stru
ction
s
.
4.
2 An
al
ysi
s
a
nd
B
r
i
e
fi
n
g
of
As
ymme
tri
c
Parti
c
i
p
ate
In
VANE
TS
we em
ploy PKI
as an asymm
e
tric cryp
t
o
g
r
ap
hy
w
h
i
c
h
ha
ve
VR
I i
n
t
h
e
fo
r
m
of p
r
i
v
at
e
key
a
n
d
rel
a
t
e
d
C
A
w
h
i
c
h
wa
s o
p
er
at
ed
by
g
ove
r
n
m
e
nt
of t
h
ei
r c
o
unt
ry
G
T
A.
T
h
e
VR
I
was s
u
gge
st
ed
by
t
h
e
GTA to ov
ercome th
e fo
llo
wi
n
g
reason
s
a. To i
d
e
n
t
i
f
y
t
h
e o
w
ne
r o
f
t
h
e ve
hi
cl
e gen
e
ral
l
y
user wi
l
l
have hi
s
ow
n l
i
censce pl
at
e whi
c
h has a
fi
xe
d
p
e
su
don
ym
an
d
th
is will b
e
lin
k
e
d
b
y
th
e GTA
p
e
o
p
l
e
u
s
i
n
g VR
I
b.
The
GT
A
w
a
s t
r
u
s
t
e
d
by
t
h
e ci
t
i
zens an
d i
t
wel
l
k
n
o
w
n a
s
g
o
v
e
r
n
m
e
nt
or
ga
ni
zat
i
on
c. Th
e CA shou
ld
b
e
em
p
l
o
y
ed
GTA wh
ich will
m
o
re co
st efficien
t
b
ecau
s
e
o
f
t
h
e
u
s
ag
e
o
f
t
h
e tachog
raph
wh
ich
will d
e
man
d
th
e CA issu
es
[1
1
]
Th
e
warn
ing
s
in
teg
r
ity and
au
th
en
ticatio
n
will b
e
en
su
red
b
y
ad
d
i
n
g
dig
ital sig
n
a
ture an
d
CERT
Sender which is shown in
bel
o
w
Figure 3.
The receive
r who receives
th
is
will chec
ks the
digital signature
&
ID
of the
certificate.
Data with address inform
at
io
n
Dig
ital Sign
ature
CERTSend
er
Fi
gu
re 3.
M
e
ss
age wi
t
h
Asy
m
m
e
t
r
i
c
prot
ect
i
o
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJEC
E V
o
l
.
6, No
. 1, Feb
r
uar
y
20
1
6
:
34
4 – 34
8
3
47
4.
3
Initia
liza
t
io
n
o
f
the Sy
stem
We are well fa
miliar that at the production
of th
e
vehi
cl
es
t
h
e TR
H i
s
equi
ppe
d i
n
t
e
r
n
al
l
y
and we
cann
o
t
rem
ove
i
t
wi
t
hout
dest
roy
i
n
g
i
t
, t
h
e
m
a
nufact
ure
r
a
l
so i
n
st
al
l
t
h
e
C
E
R
T
ro
ot
cer
t
i
f
i
cat
e i
n
whi
c
h t
h
e
p
r
esh
a
red
k
e
y u
s
ed
to
en
crypt th
e d
a
ta b
e
tween
th
e TRH
& sm
art card
.
Wh
ile in
itializ
atio
n
of th
e syste
m
if
th
ere are
n
o
erro
rs th
en
th
ere will b
e
easy way to
g
e
n
e
rate
th
e TRH k
e
y pair (PK TR
HA & SK TRHA) wh
i
c
h
are p
h
y
sically d
e
stro
yed
The VRI is th
en
reg
i
stered
with
th
e GTA in
the n
o
r
m
a
l reg
i
stratio
n
pro
cess
wh
ile
registeri
ng
ve
hicle at the local ad
m
i
ssio
n
o
f
fice. Th
is m
e
a
n
s th
e lo
cal
a
d
mission office
can easily rea
d
PK
TRH
A and
m
u
st ch
eck
t
h
at
k
e
y p
a
ir g
e
n
e
ratio
n
is
d
eactiv
ated
. Then
it
sav
e
s
VRI
with
in
t
h
e ex
istin
g
GTA
reg
i
sters an
d
t
h
erefore is ab
l
e
to
lin
k
VRI t
o
own
e
r id
en
tity. Th
en
GTA
issu
es a certificate (CERT TRH A)
th
at is sav
e
d
i
n
v
e
h
i
cle's TRH. Th
e in
itializatio
n
was shown in
th
e b
e
l
o
w Fig
u
re
4
.
Fig
u
re
4
.
In
itializatio
n
Pro
cess of th
e system
4.
4 S
y
mme
tri
c
An
al
ysi
s
o
f
t
h
e Pr
op
osed
S
y
ste
m
We are well k
nown
th
at the v
a
lu
e add
e
d serv
ices will b
e
p
r
o
t
ected b
y
m
ean
s o
f
sy
mmetric
cryp
tog
r
aph
y
. W
i
t
h
th
e p
a
rticip
atio
n
of nod
e A u
s
es
t
h
e cha
l
l
e
nge res
p
o
n
s
e
pr
ot
oc
ol
and
C
E
R
T
TR
H A use
d
to
au
t
h
en
ticate with
t
h
e l
o
cal
GTTP, as to
i
n
crease the av
ailab
ility o
f
GTTP m
u
st an
d sh
ou
ld b
e
nearer to th
e
VA
NET
S
t
o
com
m
uni
cat
e wi
t
h
ot
her s
o
u
r
c
e
s or de
vi
ces
lik
e GSM etc.,
After au
th
en
ticate itself with
GTTP
issu
es a p
s
eudo
n
y
m
PA will b
e
g
e
n
e
ra
ted
an
d
asso
ciated
sy
mm
e
t
ric k
e
y is k
MAC PA is g
e
n
e
rated
th
at is
uni
que t
o
t
h
e
VR
I f
o
r a cert
a
i
n
peri
od
of t
i
m
e and st
ores
t
h
e rel
a
t
i
on bet
w
een
VR
I an
d
PA. It
al
so i
s
s
u
es t
h
e
sym
m
et
ri
c key
s
k M
A
C
ALL
an
d
k c.
M
a
n
y
m
e
ssages are
assem
b
l
e
d i
n
s
i
de t
h
e
TR
H.
Fi
rst
P
A
i
s
a
d
d
e
d t
h
e
data
before
it s
e
nt to the
recei
ver. T
h
e
n
a
m
e
ssage
w
ith aut
h
entication c
o
de M
A
C1 is c
o
m
puted with K MAC
PA
wh
ich
is ad
d
e
d
and
fo
llowed b
y
M
A
C
2
co
m
p
u
t
ed
with
K M
A
C
ALL th
en
th
e wh
o
l
e m
e
ssag
e
will b
e
en
cr
y
p
ted
lik
e
as show
n b
e
l
o
w
in Figur
e
5
.
Data with add
r
ess
in
fo
rm
atio
n
P
A
MAC
1
with KMAC
PA
MA
C
2
with KMAC
ALL
C
i
phere
d
wi
t
h
k
c
Figu
re
5.
M
e
ss
age
fram
e
for
m
at of the
Sy
m
m
e
tric part
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
Prop
o
s
ed Po
ten
tia
l S
e
cu
rity
In
fra
s
tru
c
tu
re in
VANETS usin
g Ta
mp
er
Reg
i
stered
Ha
rdwa
re
(
S.
M.
Jan
i
)
34
8
C
o
m
put
at
i
on t
i
m
es sho
w
n i
n
Tabl
e
2.
Tabl
e
2. T
h
e
C
o
m
put
at
i
onal
P
e
ri
o
d
s
of
Sy
m
m
e
t
r
i
c
and
Asy
m
m
e
t
r
i
c
cry
p
t
o
gra
p
hy
Asy
m
m
e
tr
ic
cry
p
togr
aphy
Symme
t
r
i
c
c
r
ypt
o
g
r
a
ph
y
Signatur
e
gener
a
tion
98
m
s
2 0.
035
m
s
Signatur
e
ver
i
fication
2.
9 m
s
0.
035 m
s
E
n
cr
y
p
tion
–
0.
029 m
s
Decr
yption
–
0.
031 m
s
T
o
tal
100.
9 m
s
0.
165 m
s
5.
CO
NCL
USI
O
N
In t
h
i
s
pa
per
we m
a
de a pr
o
pos
ed
base
d
o
n
t
h
e i
n
f
r
ast
r
u
c
t
u
re
of t
h
e se
curi
t
y
usi
ng sy
m
m
e
t
r
i
c
and
asy
m
m
e
tric cryp
to
grap
h
y
and
TRH to
satisfy requ
ired
iden
tities.
W
h
ile
satisfyin
g
th
e requ
irem
en
ts o
f
o
u
r
p
r
op
o
s
ed
con
c
ep
t will assu
re th
e
h
i
gh
security to
th
e
VANETS and
assu
res a
g
ood
com
p
u
t
atio
n
a
l n
e
ed
.
In
t
h
i
s
pape
r we expl
ai
n
s
ho
w t
h
e com
m
uni
cat
i
on d
one bet
w
een t
h
e ve
hi
cl
es whi
l
e
any
regi
st
ered
vehi
cl
es l
i
k
e
Am
b
u
l
an
ce or p
o
lice are en
tered
in
th
e way
,
b
y
th
at sig
n
a
ls th
en
o
t
h
e
r no
rm
al v
e
h
i
cles will g
i
v
e
a w
a
y to
that
re
gistered vehicles.
T
h
e future
sc
ope of this
wo
rk ch
ang
i
ng
o
f
th
e p
s
eu
don
ym
k
e
ys an
d symmetr
ic
k
e
ys
t
o
w
h
i
c
h c
o
n
s
i
s
t
s
o
f
pri
v
at
e
and
p
u
b
l
i
c
key
s
.
We ca
n e
x
t
e
nd
t
h
i
s
w
o
r
k
t
o
d
e
fi
ne
t
h
e
g
e
og
ra
phi
c
re
gi
on
o
f
GTTP
.
REFERE
NC
ES
[1]
J. Munoz, N. S
y
racuse, Proc. of
the 53.
Internet engineer
ing task f
o
rce, 2002.
[2]
M. Ray
a
, J
.
P. H
ubaux,
The secu
rity o
f
vehicular
ad hoc n
e
tworks
, Proceed
ings of
SASN 2005, ACM, 2005.
[3]
IEEE, D
e
dicated
Short Range Co
mmunication
Standar
d
(DSRC),
http://grouper
.
ieee.org
/
gr
oups/scc32/dsrc/n
america/.
[4]
J. Ti
an,
L.
Col
e
tti
,
Routing
ap
proach in carta
l
k 2000 project
, Proceedings o
f
the IST Mobile
& Wireless
Communications Summit 2003,
vol. 2
,
2003
.
[5]
K.
Plößl, T.
Nowey
,
C.
Mletzko,
Towards a sec
u
rity arc
h
ite
c
t
ur
e for vehicular ad hoc networks
, P
r
oceed
ings
o
f
ARES 2006, I
E
EE Computer
Society
,
2006.
[6]
M. Ray
a
, J
.
P. H
ubaux,
The secu
rity o
f
vehicular
ad hoc n
e
tworks
, Proceed
ings of
SASN 2005, ACM, 2005.
[7]
M. Ray
a
, P. Papadimitratos, J.P. H
ubaux, Securing vehicular
communications
,
IEEE Wire
le
ss Communic
a
tions,
Specia
l
Issue on
Inter Vehicu
lar
Communications
, 2006
.
[8]
M. Ray
a
, J.P.
Hubaux, Secur
i
ng vehicular
ad
hoc n
e
tworks,
Journal of Com
puter Security,
Specia
l
Issue o
n
Security of Ad
Hoc and S
e
nsor N
e
tworks
, 2007
.
[9]
D. Jungels, I. Aad, M.
Ray
a
, J.P. Hubaux,
Certificate revoca
tion
in vehicu
l
ar ad hoc networks
, Tech
.
Rep. LCA
-
Report-2006-00
6, EPFL, 2006.
[10]
F
.
Arm
knecht, A. F
e
s
t
ag, D
.
W
e
s
t
ho
ff, K. Zeng,
Cross-lay
e
r priv
acy
enh
a
ncement and non-repud
iation in v
e
hicular
communication, 4h
Work- shop o
n
Mobile
Ad-Hoc Networks (
WMAN)
,
2007.
[11]
Council of th
e
EU, Council R
e
gu
lation
(EC)
No 2
135/98, 1998
.
Evaluation Warning : The document was created with Spire.PDF for Python.