Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi
{"title":"车辆自组织网络中密钥交换的信标方法","authors":"Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi","doi":"10.1109/JNS2.2012.6249252","DOIUrl":null,"url":null,"abstract":"Vehicular Ad-Hoc Networks (VANETs) are special forms of Mobile Ad-Hoc Networks (MANETs) that allows vehicles to communicate together in the absence of fixed infrastructure. In this type of network beaconing is the means used to discover the nodes in its neighborhood. Successful delivery of the message beacons containing speed, direction and position of a car is extremely important. Otherwise, routing information should not be modified/manipulated during transmission without detection, in order to ensure the routing information, messages must be signed and provided with a certificate to attest valid network participants. In this work we present a beaconing protocol with key exchange to prepare the generation of a signature to protect the routing information protocol ‘Greedy Perimeter Stateless Routing’.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Une approche beaconing avec échange de clés dans les réseaux ad hoc de véhicules\",\"authors\":\"Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi\",\"doi\":\"10.1109/JNS2.2012.6249252\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Vehicular Ad-Hoc Networks (VANETs) are special forms of Mobile Ad-Hoc Networks (MANETs) that allows vehicles to communicate together in the absence of fixed infrastructure. In this type of network beaconing is the means used to discover the nodes in its neighborhood. Successful delivery of the message beacons containing speed, direction and position of a car is extremely important. Otherwise, routing information should not be modified/manipulated during transmission without detection, in order to ensure the routing information, messages must be signed and provided with a certificate to attest valid network participants. In this work we present a beaconing protocol with key exchange to prepare the generation of a signature to protect the routing information protocol ‘Greedy Perimeter Stateless Routing’.\",\"PeriodicalId\":224410,\"journal\":{\"name\":\"2012 National Days of Network Security and Systems\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 National Days of Network Security and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JNS2.2012.6249252\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 National Days of Network Security and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JNS2.2012.6249252","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Une approche beaconing avec échange de clés dans les réseaux ad hoc de véhicules
Vehicular Ad-Hoc Networks (VANETs) are special forms of Mobile Ad-Hoc Networks (MANETs) that allows vehicles to communicate together in the absence of fixed infrastructure. In this type of network beaconing is the means used to discover the nodes in its neighborhood. Successful delivery of the message beacons containing speed, direction and position of a car is extremely important. Otherwise, routing information should not be modified/manipulated during transmission without detection, in order to ensure the routing information, messages must be signed and provided with a certificate to attest valid network participants. In this work we present a beaconing protocol with key exchange to prepare the generation of a signature to protect the routing information protocol ‘Greedy Perimeter Stateless Routing’.