EVICTION OF MISBEHAVING AND FAULTY NODES IN VEHICULAR NETWORKS PDF

Abstract Vehicular networks VNs are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor and a significant challenge to be met. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment. Existing networks rely mainly on node certificate revocation for attacker eviction, but the lack of an omnipresent infrastructure in VNs may unacceptably delay the retrieval of the most recent and relevant revocation information; this will especially be the case in the early deployment stages of such a highly volatile and large-scale system.

Author:Kirr Arashimuro
Country:Kosovo
Language:English (Spanish)
Genre:Science
Published (Last):9 August 2007
Pages:464
PDF File Size:17.12 Mb
ePub File Size:4.80 Mb
ISBN:609-3-95025-894-9
Downloads:34979
Price:Free* [*Free Regsitration Required]
Uploader:JoJokus



Mur However, security is a critical factor and a significant challenge to be met. CiteULike uses cookies, some of which may already have been set. Skip to search form Skip to main content. Groups Connections Recommendations Neighbours Watchlist. The service is similar in scope to EndNote or RefWorks or any other reference manager evjction BibTeX, but it is a social bookmarking service for scientists and humanities researchers.

To insert individual citation into a bibliography in a word-processor, select your preferred citation style below and drag-and-drop it into the document. See our FAQ for additional information. Robust regression and outlier-detection for combustion engine measurements H. Find this article at Save current location: References Publications referenced by this paper. This paper has citations. You can also specify a CiteULike article id. Related Products We have identified the following relevant lab reagents.

Citations Publications citing this paper. Topics Discussed in This Paper. Brought to you by AQnowledgeprecision products for scientists. Setup a permanent sync to delicious. Export in format suitable for direct import into delicious. By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy PolicyTerms of Serviceand Dataset License.

Semantic Scholar estimates that this publication has citations based on the available data. Register and you can start organising your references online. Showing of 33 references. This paper has highly influenced 29 other papers. Read about how we use cookies. You may hide this message. It helps undergraduates and postgraduates. Some citation styles add the source URL, which you may not want. Cooperative attack and defense in distributed networks Tyler Evicion An application of information theory to intrusion detection.

We will interpret your continued use of this site as your acceptance of our use of cookies. Most Related.

IEC 60722 PDF

Eviction of Misbehaving and Faulty Nodes in Vehicular Networks - PowerPoint PPT Presentation

Resources and Help Eviction of Misbehaving and Faulty Nodes in Vehicular Networks Abstract: Vehicular networks VNs are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor and a significant challenge to be met. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment. Existing networks rely mainly on node certificate revocation for attacker eviction, but the lack of an omnipresent infrastructure in VNs may unacceptably delay the retrieval of the most recent and relevant revocation information; this will especially be the case in the early deployment stages of such a highly volatile and large-scale system. In this paper, we address this specific problem. We propose protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system. We tailor our design to the VN characteristics and analyze our system.

CELULITIS PERIORBITARIA PDF

Kazracage It helps undergraduates and postgraduates. The service is similar in scope to EndNote or RefWorks or any other reference manager like BibTeX, but it is a social bookmarking service for scientists and humanities researchers. We will interpret your continued use of this site as your acceptance of our use of cookies. Brought to you by AQnowledgenodex products for scientists. Semantic Scholar estimates that this publication has citations based on the available data. People studying for PhDs or in postdoctoral postdoc positions.

ARAPILES GUIDE BOOK PDF

Mur However, security is a critical factor and a significant challenge to be met. CiteULike uses cookies, some of which may already have been set. Skip to search form Skip to main content. Groups Connections Recommendations Neighbours Watchlist. The service is similar in scope to EndNote or RefWorks or any other reference manager evjction BibTeX, but it is a social bookmarking service for scientists and humanities researchers. To insert individual citation into a bibliography in a word-processor, select your preferred citation style below and drag-and-drop it into the document. See our FAQ for additional information.

Related Articles