Secure Wireless Communications for Vehicle-to-Everything
نویسندگان
چکیده
منابع مشابه
Secure Group Communications for Wireless Networks
In this paper we consider the problem of key management in a highly-mobile wireless networking environment, such as a dynamic, distributed setting in which command and control nodes move along with individual users. In this scenario, data must be securely multicast from one source to many users, requiring that users be properly keyed. Furthermore, because users move in and out of the session (d...
متن کاملSecure Communications over Wireless Channels
In this work, we present new techniques that leverage the wireless medium in facilitating secure communications in the presence of eavesdroppers. First, we consider the secure transmission of information over an ergodic fading channel with long coherence intervals. The secrecy capacity of such a system is characterized under different assumptions on the available channel state information. We t...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملRay-tracing for Vehicle-to-vehicle Communications
A comprehensive model of the transmission channel between moving vehicles in realistic environments is presented in this paper. The approach consists of tree major parts: the modelling of the road traffic, the modelling of the environment adjacent to the road and the actual modelling of the wave propagation between the vehicles. A ray-tracing approach is used for the wave propagation, which all...
متن کاملSecure Wireless Communications via Cooperative Transmitting
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Magazine
سال: 2019
ISSN: 0163-6804,1558-1896
DOI: 10.1109/mcom.2019.8875718