{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T21:12:23Z","timestamp":1654117943873},"reference-count":17,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10,1]]},"abstract":"<p>In this paper, the authors propose a dynamic Public Key Infrastructure (PKI) for vehicular ad hoc networks to distribute the role of the central certification authority (CA) among a set of dynamically elected CAs. The election process is based on a clustering algorithm relying on trust levels and relative mobility. Furthermore, the authors have adapted the Dynamic Demilitarized Zones to protect the elected CAs from malicious nodes and enable them to act as registration authorities (RA). Extensive simulations are conducted to evaluate the performance of the clustering algorithm and investigate the impact of the vehicle speed, the vehicle average arrival rate, and the percentage of confident vehicles on the stability and efficiency of the security infrastructure. The authors demonstrate the percentage of confident nodes has a little impact on these performance metrics and that the minimum number of CAs to cover the entire platoon.<\/p>","DOI":"10.4018\/jbdcn.2010100103","type":"journal-article","created":{"date-parts":[[2011,2,3]],"date-time":"2011-02-03T16:41:09Z","timestamp":1296751269000},"page":"38-63","source":"Crossref","is-referenced-by-count":0,"title":["A Distributed Secure Architecture for Vehicular Ad Hoc Networks"],"prefix":"10.4018","volume":"6","author":[{"given":"Tahani","family":"Gazdar","sequence":"first","affiliation":[{"name":"University of Manouba, Tunisia"}]},{"given":"Abdelfettah","family":"Belghith","sequence":"additional","affiliation":[{"name":"University of Manouba, Tunisia"}]},{"given":"Abderrahim","family":"Benslimane","sequence":"additional","affiliation":[{"name":"University of Avignon, France"}]}],"member":"2432","reference":[{"key":"jbdcn.2010100103-0","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.1265539"},{"key":"jbdcn.2010100103-1","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Zhang, T., & Pietrowicz, S. (2007). Anonymity Notions for Public Key Infrastructure in Vehicular Networks. In Proceedings of the IEEE International Conference on Mobile Ad hoc and Sensor Systems.","DOI":"10.1109\/MOBHOC.2007.4428741"},{"key":"jbdcn.2010100103-2","unstructured":"Leinmueller, T., Buttyan, L., Hubaux, J. P., Kargl, F., Kroh, R., Papadimitratos, P., et al. (2006). SEVECOM \u201cSecure Vehicle Communication\u201d. Paper presented at the IST Mobile and Wireless Communication Summit (MobileSummit2006), Mykonos, Greece."},{"key":"jbdcn.2010100103-3","doi-asserted-by":"crossref","first-page":"2803","DOI":"10.1016\/j.comcom.2007.12.005","article-title":"A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad hoc Networks.","volume":"31","author":"C.Li","year":"2008","journal-title":"Science Direct Computer Communications"},{"key":"jbdcn.2010100103-4","doi-asserted-by":"crossref","unstructured":"Little, T. D. C., & Agrawal, A. (2005). An Information Propagation Scheme for VANETs. In Proceeding in 8th International IEEE Conference on Intelligent Transportation Systems (ITSC2005), Vienna, Austria.","DOI":"10.1109\/ITSC.2005.1520039"},{"key":"jbdcn.2010100103-5","first-page":"1687","article-title":"Performance and Reliability of DSRC Vehicular Safety Communication: A formal Analysis, EURASIP.","volume":"3","author":"X.Ma","year":"2009","journal-title":"Journal on Wireless Communications and Networking"},{"key":"jbdcn.2010100103-6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"jbdcn.2010100103-7","unstructured":"Papadimitratos, P., Gligor, V., & Hubaux, J. P. (2006). Securing Vehicular Communications Assumptions, Requirements, and Principles. In Proceedings of the Workshop on Embedded Security in Cars (ESCAR)."},{"key":"jbdcn.2010100103-8","unstructured":"Parno, B., & Perrig, A. (2005). Challenges in Securing Vehicular Networks. In Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD."},{"key":"jbdcn.2010100103-9","doi-asserted-by":"publisher","DOI":"10.1002\/sec.116"},{"key":"jbdcn.2010100103-10","doi-asserted-by":"crossref","unstructured":"Raya, M., Aziz, A., & Hubaux, J. P. (2006). Efficient Secure Aggregation in VANETs. In Proceedings of VANET06, Los Angeles, CA.","DOI":"10.1145\/1161064.1161076"},{"key":"jbdcn.2010100103-11","author":"M.Raya","year":"2006","journal-title":"Securing Vehicular Communications"},{"key":"jbdcn.2010100103-12","article-title":"Providing Location Privacy for VANET","author":"K.Sampigethaya","year":"2005","journal-title":"Proceedings of Embedded Security in Cars (ESCAR)"},{"issue":"2","key":"jbdcn.2010100103-13","first-page":"299","article-title":"Authentic Vehicular Environment Using a Cluster Based Key Management.","volume":"36","author":"S.Sivagurunathan","year":"2009","journal-title":"European Journal of Scientific Research"},{"key":"jbdcn.2010100103-14","author":"T.Taleb","year":"2009","journal-title":"Towards an Effective Risk-conscious and Collaborative Vehicular Collision Avoidance System"},{"key":"jbdcn.2010100103-15","doi-asserted-by":"crossref","first-page":"2827","DOI":"10.1016\/j.comcom.2007.12.003","article-title":"A Novel Secure Communication scheme in Vehicular Ad hoc Networks.","volume":"31","author":"N.Wang","year":"2008","journal-title":"Science Direct Computer Communications"},{"key":"jbdcn.2010100103-16","doi-asserted-by":"crossref","unstructured":"Zhou, T., Choudhury, R., Ning, P., & Chakrabarty, K. (2007). Privacy Preserving Detection of Sybil Attacks in Vehicular Ad hoc Networks. In Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous).","DOI":"10.1109\/MOBIQ.2007.4451013"}],"container-title":["International Journal of Business Data Communications and Networking"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=47313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:49:10Z","timestamp":1654116550000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jbdcn.2010100103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,10,1]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jbdcn.2010100103","relation":{},"ISSN":["1548-0631","1548-064X"],"issn-type":[{"value":"1548-0631","type":"print"},{"value":"1548-064X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,1]]}}}