ShopSpell

Vehicular Ad Hoc Network Security and Privacy [Hardcover]

$130.99       (Free Shipping)
80 available
  • Category: Books (Computers)
  • Author:  Lin, Xiaodong, Lu, Rongxing
  • Author:  Lin, Xiaodong, Lu, Rongxing
  • ISBN-10:  1118913906
  • ISBN-10:  1118913906
  • ISBN-13:  9781118913901
  • ISBN-13:  9781118913901
  • Publisher:  Wiley-IEEE Press
  • Publisher:  Wiley-IEEE Press
  • Pages:  216
  • Pages:  216
  • Binding:  Hardcover
  • Binding:  Hardcover
  • Pub Date:  01-May-2015
  • Pub Date:  01-May-2015
  • SKU:  1118913906-11-MPOD
  • SKU:  1118913906-11-MPOD
  • Item ID: 101237209
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Apr 09 to Apr 11
  • Notes: Brand New Book. Order Now.

This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks

  • Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues
  • Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique
  • Richly illustrated with detailed designs and results for all approaches used
  • Introduces standardization and industry activities, and government regulation in secure vehicular networking

List of Figures xi

List of Tables xv

Acronyms xvii

Preface xix

1 INTRODUCTION 1

1.1 Background 1

1.2 DSRC AND VANET 2

1.2.1 DSRC 2

1.2.2 VANET 3

1.2.3 Characteristics of VANET 6

1.3 Security and Privacy Threats 7

1.4 Security and Privacy Requirements 8

1.5 Challenges and Prospects 9

1.5.1 Conditional Privacy Preservation in VANETs 9

1.5.2 Authentication with Efficient Revocation in VANETs 10

1.6 Standardization and Related Activities 11

1.7 Security Primitives 13

1.8 Outline of the Book 17

References 17

2 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 21

2.1 Introduction 21

2.2 Preliminaries and Background 23

2.2.1 Group Signature 23

2.2.2 Bilinear Pairing and ID-Based Cryptography 23

2.2.3 Threat Model 23

2.2.4 Desired Requirements 24lă…

Add Review