Access the full text.
Sign up today, get DeepDyve free for 14 days.
A. Imran, S. Salhi, Niaz Wassan (2009)
A variable neighborhood-based heuristic for the heterogeneous fleet vehicle routing problemEur. J. Oper. Res., 197
Neng-Wen Wang, Yueh-Min Huang, Wei-Ming Chen (2008)
A novel secure communication scheme in vehicular ad hoc networksComput. Commun., 31
Moon Kim, Sung-Joon Cho, Su-Yong Kim (2007)
A Study of Seamless Handover Service and QoS in Heterogeneous Wireless NetworksThe 9th International Conference on Advanced Communication Technology, 3
A. Fanian, M. Berenjkoub, T. Gulliver (2009)
A TESLA-based mutual authentication protocol for GSM networksISC Int. J. Inf. Secur., 1
A. Kaloxylos, G. Lampropoulos, N. Passas, L. Merakos (2006)
A flexible handover mechanism for seamless service continuity in heterogeneous environmentsComput. Commun., 29
Ross Anderson, F. Bergadano, B. Crispo, Jong-Hyeon Lee, C. Manifavas, R. Needham (1998)
A new family of authentication protocolsACM SIGOPS Oper. Syst. Rev., 32
Frederik Armknecht, Andreas Festag, D. Westhoff, Ke Zeng (2011)
Cross-layer Privacy Enhancement and Non-repudiation in Vehicular Communication
M. Raya, J. Hubaux (2007)
Securing vehicular ad hoc networksJ. Comput. Secur., 15
Yu-Chang Chen, Ja-Hsing Hsia, Y. Liao (2009)
Advanced seamless vertical handoff architecture for WiMAX and WiFi heterogeneous networks with QoS guaranteesComput. Commun., 32
Fábio Buiati, R. Puttini, Rafael Júnior, C. Abbas, L. Garcia-Villalba (2004)
Authentication and Autoconfiguration for MANET Nodes
Jaewoo So (2008)
Vertical handoff in integrated CDMA and WLAN systemsAeu-international Journal of Electronics and Communications, 62
F. Dötzer (2005)
Privacy Issues in Vehicular Ad Hoc Networks
(2004)
R
S. Bitam, A. Mellouk (2014)
Vehicular Ad Hoc Networks
M. Raya, Panos Papadimitratos, J. Hubaux (2006)
SECURING VEHICULAR COMMUNICATIONSIEEE Wireless Communications, 13
M. Raya, J. Hubaux (2005)
The security of vehicular ad hoc networks
M. Zarki, S. Mehrotra, G. Tsudik, N. Venkatasubramanian (2002)
Security Issues in a Future Vehicular Network
J. Hubaux, Srdjan Capkun, Jun Luo (2004)
The security and privacy of smart vehiclesIEEE Security & Privacy Magazine, 2
X. Yang, Jie Liu, Feng Zhao, N. Vaidya (2004)
A vehicle-to-vehicle communication protocol for cooperative collision warningThe First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.
Hao Yang, Haiyun Luo, F. Ye, Songwu Lu, Lixia Zhang (2004)
Security in mobile ad hoc networks: challenges and solutionsIEEE Wireless Communications, 11
E. Paik, Yanghee Choi (2003)
Seamless mobility support for mobile networks on vehicles across heterogeneous wireless access networksThe 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring., 4
H. Harney, C. Muckenhirn (1997)
Group Key Management Protocol (GKMP) ArchitectureRFC, 2094
Shengdong Xie, Meng Wu (2007)
Adaptive vertical handoff algorithm in heterogeneous networksThe Journal of China Universities of Posts and Telecommunications, 14
A. Perrig, R. Canetti, J. Tygar, D. Song (2002)
The TESLA Broadcast Authentication Protocol, 5
Vehicular communications have become an increasingly important communication technique worldwide. The current limitations of vehicular communications are not determined by capability or authentication but by security infrastructure. In 2005, a proposal for vehicular network security was discussed by Raya and Hubaux. However, such protocol is not practical and is unsafe for use in VANETs. In addition, handoff has become a relevant issue for vehicles moving from one region to another. For these reasons, we propose a secure communication and handoff protocol. In our protocol, a vehicle can enjoy seamless service between heterogeneous vehicular networks. Furthermore, vehicular communication is made more secure and ubiquitous.
Journal of High Speed Networks – IOS Press
Published: Jan 1, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.