PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Safety solutions for mobile nodes authentications in vehicular networks in applications of intelligent transportation systems

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Applications of VANET (Vehicular ad hoc Networks) networks is focused on monitoring of the safety states of vehicles or roadway by exchanging messages between vehicles and infrastructure so that the applications will be able to help a driver to handle insecure situations. They are able to warn before possible risks which can occur during the process of transportation. Essential tool for assuring of safety communications within developed applications of intelligent transportations systems are cryptography constructions on the basis of digital signature schemes. In order to assuring safety and anonymity within vehicular communications are used pseudorandom authentications methods. The authors in the paper are focused on realization of mathematical model and description of modified cryptographic constructions which are suitable for sensor networks and applications orientated to memory and performance. In these systems it is very important to use signature scheme which do not have only computational safety but must also be effective from the view of performance and must generate short digital signatures in order to communications in real time conditions.
Rocznik
Strony
29--33
Opis fizyczny
Bibliogr. 7 poz.
Twórcy
autor
  • University of Žilina, Department of Control and Information Systems, Faculty of Electrical Engineering, Univerzitná 8215/1, 010 26 Žilina, Slovakia
autor
  • University of Žilina, Department of Control and Information Systems, Faculty of Electrical Engineering, Univerzitná 8215/1, 010 26 Žilina, Slovakia
autor
  • University of Žilina, Department of Control and Information Systems, Faculty of Electrical Engineering, Univerzitná 8215/1, 010 26 Žilina, Slovakia
Bibliografia
  • [1] Car2Car Communication Consortium. In: http://www.car- 2-car.org/ (accessed: 20.05.14)
  • [2] KASRA AMIRTAHMASEBI-SEYED REZA JALALINIA: Vehicular Networks – Security, Vulnerabilities and Countermeasures, University of Gothenburg, Sweden (2010)
  • [3] ENGE A.: Elliptic Curves and Their Applications to Cryptography – An Introduction. Kluwer Academic Publisher, Boston (2001)
  • [4] FIPS 140-2: Security Requirements for Cryptographic Modules (2002)
  • [5] GALLO, P.: Enhanced authentication algorithm based on elliptic curves. PhD thesis, TU Košice (2014)
  • [6] User guide Cryptool. In: www.cryptool.com (accessed: 20.05.14)
  • [7] ĎURECH, J., et. al.: Security analysis of cryptographic constructions used within communications in modern transportation systems on the base of modeling. ELEKTRO 2014, Rajecke Teplice, May (2014)
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-35be838b-e569-48bd-8c80-6a38a5fd4b28
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.