dc.contributor.author |
Wehbi R. |
dc.contributor.author |
Kayssi A. |
dc.contributor.author |
Chehab A. |
dc.contributor.author |
Dawy Z. |
dc.contributor.editor |
|
dc.date |
2008 |
dc.date.accessioned |
2017-09-07T07:07:22Z |
dc.date.available |
2017-09-07T07:07:22Z |
dc.date.issued |
2008 |
dc.identifier |
10.4018/978-1-60566-148-3.ch018 |
dc.identifier.isbn |
9.7816056615e+012 |
dc.identifier.issn |
|
dc.identifier.uri |
http://hdl.handle.net/10938/11369 |
dc.description.abstract |
In Inter-Vehicle Communication (IVC) networks, the high mobility and lack of infrastructure pose major challenges in designing secure routing protocols. In this work, we present a new secure routing protocol called SERVEN (SEcure Routing in VEhicular Networks) that can achieve near-instantaneous secure communication in IVC networks. In particular, we concentrate on the design of the network setup phase of the protocol and we present simulation results using Network Simulator version 2.28 (ns-2.28). Secure setup means the appropriate formation of a network whose nodes are aware of each other and of the right topology. This is especially important for location-based routing protocols in IVC networks. © 2009, IGI Global. |
dc.format.extent |
|
dc.format.extent |
Pages: (272-285) |
dc.language |
English |
dc.publisher |
IGI Global; |
dc.relation.ispartof |
Publication Name: Breakthrough Perspectives in Network and Data Communications Security, Design and Applications; Publication Year: 2008; Pages: (272-285); |
dc.relation.ispartofseries |
|
dc.relation.uri |
|
dc.source |
Scopus |
dc.subject.other |
|
dc.title |
Network setup for secure routing in inter-vehicle communication networks |
dc.type |
Book Chapter |
dc.contributor.affiliation |
Wehbi, R., American University of Beirut, Lebanon |
dc.contributor.affiliation |
Kayssi, A., American University of Beirut, Lebanon |
dc.contributor.affiliation |
Chehab, A., American University of Beirut, Lebanon |
dc.contributor.affiliation |
Dawy, Z., American University of Beirut, Lebanon |
dc.contributor.authorAddress |
American University of BeirutLebanon |
dc.contributor.authorCorporate |
University: American University of Beirut; Faculty: Faculty of Engineering and Architecture; Department: Electrical and Computer Engineering; |
dc.contributor.authorDepartment |
Electrical and Computer Engineering |
dc.contributor.authorDivision |
|
dc.contributor.authorEmail |
|
dc.contributor.faculty |
Faculty of Engineering and Architecture |
dc.contributor.authorInitials |
|
dc.contributor.authorOrcidID |
|
dc.contributor.authorReprintAddress |
|
dc.contributor.authorResearcherID |
|
dc.contributor.authorUniversity |
American University of Beirut |
dc.description.cited |
|
dc.description.citedCount |
|
dc.description.citedTotWOSCount |
|
dc.description.citedWOSCount |
|
dc.format.extentCount |
14 |
dc.identifier.articleNo |
|
dc.identifier.coden |
|
dc.identifier.pubmedID |
|
dc.identifier.scopusID |
84898271233 |
dc.identifier.url |
|
dc.publisher.address |
|
dc.relation.ispartofConference |
|
dc.relation.ispartofConferenceCode |
|
dc.relation.ispartofConferenceDate |
|
dc.relation.ispartofConferenceHosting |
|
dc.relation.ispartofConferenceLoc |
|
dc.relation.ispartofConferenceSponsor |
|
dc.relation.ispartofConferenceTitle |
|
dc.relation.ispartofFundingAgency |
|
dc.relation.ispartOfISOAbbr |
|
dc.relation.ispartOfIssue |
|
dc.relation.ispartOfPart |
|
dc.relation.ispartofPubTitle |
Breakthrough Perspectives in Network and Data Communications Security, Design and Applications |
dc.relation.ispartofPubTitleAbbr |
Breakthrough Perspectives in Netwk. and Data Commun. Secty., Des. and Applic. |
dc.relation.ispartOfSpecialIssue |
|
dc.relation.ispartOfSuppl |
|
dc.relation.ispartOfVolume |
|
dc.source.ID |
|
dc.type.publication |
Book |
dc.subject.otherAuthKeyword |
|
dc.subject.otherChemCAS |
|
dc.subject.otherIndex |
|
dc.subject.otherKeywordPlus |
|
dc.subject.otherWOS |
|