AUB ScholarWorks

Optimized conditional privacy preservation in VANETs

Show simple item record

dc.contributor.author Dikmak M.
dc.contributor.author Sabra Z.
dc.contributor.author Kayssi A.
dc.contributor.author Chehab A.
dc.contributor.editor
dc.date 2012
dc.date.accessioned 2017-10-04T11:07:11Z
dc.date.available 2017-10-04T11:07:11Z
dc.date.issued 2012
dc.identifier 10.1109/ICTEL.2012.6221234
dc.identifier.isbn 9.7814673075e+012
dc.identifier.issn
dc.identifier.uri http://hdl.handle.net/10938/14406
dc.description.abstract In this paper, we present an optimized conditional privacy preservation model for vehicle ad-hoc networks (VANETs). This model includes an ID-based cryptosystem to assure users' anonymity using pseudonyms; however the model provides a backdoor for law enforcement authorities to trace misbehaving and suspicious users. In this model, we propose a heuristic that optimizes the pseudonym update process. This heuristic permits vehicles to switch pseudonyms at different times and locations in a way that maximizes the anonymity degree. © 2012 IEEE.
dc.format.extent
dc.language English
dc.relation.ispartof Publication Name: 2012 19th International Conference on Telecommunications, ICT 2012; Conference Title: 2012 19th International Conference on Telecommunications, ICT 2012; Conference Date: 23 April 2012 through 25 April 2012; Conference Location: Jounieh; Publication Year: 2012;
dc.relation.ispartofseries
dc.relation.uri
dc.source Scopus
dc.subject.other
dc.title Optimized conditional privacy preservation in VANETs
dc.type Conference Paper
dc.contributor.affiliation Dikmak, M., Department of Electrical and Computer Engineering, American University of Beirut, Beirut, Lebanon
dc.contributor.affiliation Sabra, Z., Department of Electrical and Computer Engineering, American University of Beirut, Beirut, Lebanon
dc.contributor.affiliation Kayssi, A., Department of Electrical and Computer Engineering, American University of Beirut, Beirut, Lebanon
dc.contributor.affiliation Chehab, A., Department of Electrical and Computer Engineering, American University of Beirut, Beirut, Lebanon
dc.contributor.authorAddress Dikmak, M.; Department of Electrical and Computer Engineering, American University of Beirut, Beirut, Lebanon; email: mkd03@aub.edu.lb
dc.contributor.authorCorporate University: American University of Beirut; Faculty: Faculty of Engineering and Architecture; Department: Electrical and Computer Engineering;
dc.contributor.authorDepartment Electrical and Computer Engineering
dc.contributor.authorDivision
dc.contributor.authorEmail
dc.contributor.authorFaculty Faculty of Engineering and Architecture
dc.contributor.authorInitials
dc.contributor.authorOrcidID
dc.contributor.authorReprintAddress
dc.contributor.authorResearcherID
dc.contributor.authorUniversity American University of Beirut
dc.description.cited
dc.description.citedCount
dc.description.citedTotWOSCount
dc.description.citedWOSCount
dc.format.extentCount 1
dc.identifier.articleNo 6221234
dc.identifier.coden
dc.identifier.pubmedID
dc.identifier.scopusID 84864250019
dc.identifier.url
dc.publisher.address
dc.relation.ispartofConference Conference Title: 2012 19th International Conference on Telecommunications, ICT 2012 : Conference Date: 23 April 2012 through 25 April 2012 , Conference Location: Jounieh.
dc.relation.ispartofConferenceCode 91386
dc.relation.ispartofConferenceDate 23 April 2012 through 25 April 2012
dc.relation.ispartofConferenceHosting
dc.relation.ispartofConferenceLoc Jounieh
dc.relation.ispartofConferenceSponsor
dc.relation.ispartofConferenceTitle 2012 19th International Conference on Telecommunications, ICT 2012
dc.relation.ispartofFundingAgency
dc.relation.ispartOfISOAbbr
dc.relation.ispartOfIssue
dc.relation.ispartOfPart
dc.relation.ispartofPubTitle 2012 19th International Conference on Telecommunications, ICT 2012
dc.relation.ispartofPubTitleAbbr Int. Conf. Telecommun., ICT
dc.relation.ispartOfSpecialIssue
dc.relation.ispartOfSuppl
dc.relation.ispartOfVolume
dc.source.ID
dc.type.publication Series
dc.subject.otherAuthKeyword anonymity
dc.subject.otherAuthKeyword conditional privacy
dc.subject.otherAuthKeyword ID-based cryptosystem
dc.subject.otherAuthKeyword pseudonyms
dc.subject.otherAuthKeyword traceability
dc.subject.otherChemCAS
dc.subject.otherIndex anonymity
dc.subject.otherIndex Enforcement authorities
dc.subject.otherIndex ID-based cryptosystems
dc.subject.otherIndex Privacy preservation
dc.subject.otherIndex pseudonyms
dc.subject.otherIndex traceability
dc.subject.otherIndex Vehicle ad-hoc networks
dc.subject.otherIndex Cryptography
dc.subject.otherIndex Optimization
dc.subject.otherIndex Information technology
dc.subject.otherKeywordPlus
dc.subject.otherWOS


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search AUB ScholarWorks


Browse

My Account