hs-pseudonym-schemes-in-v2x/mybib.bib

460 lines
32 KiB
BibTeX
Raw Normal View History

@misc{europeantelecommunicationsstandardsinstituteetsiETSITS1332017,
title = {{{ETSI TS}} 133 185 {{V14}}.0.0; {{LTE}}; {{5G}}; {{Security}} Aspect for {{LTE}} Support of {{Vehicle}}-to-{{Everything}} ({{V2X}}) Services ({{3GPP TS}} 33.185 Version 14.0.0 {{Release}} 14)},
lccn = {DTS/TSGS-0333185ve00},
language = {English},
publisher = {{ETSI}},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = jul,
year = {2017},
keywords = {standards,unread},
file = {/home/spiollinux/Zotero/storage/QZ9J6QPR/ts_133185v140000p.pdf}
2018-06-01 14:43:52 +02:00
}
@misc{3GPPTS23,
title = {{{3GPP TS}} 23.285 {{V15}}.0.0 \textendash{} {{Architecture}} Enhancements for {{V2X}} Services},
lccn = {3GPP TS 23.285 V15.0.0},
keywords = {standards,unread},
file = {/home/spiollinux/Zotero/storage/EVPKU3QU/3GPP TS 23.285 V15.0.0 Architecture enhancements.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSITS1022012,
title = {{{ETSI TS}} 102 941 {{V1}}.1.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Security}}; {{Trust}} and {{Privacy Management}}},
lccn = {ETSI \textendash{} TS 102 941},
publisher = {{ETSI}},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = jun,
year = {2012},
keywords = {standards,unread},
file = {/home/spiollinux/Zotero/storage/QTWZ48M8/ts_102941v010101p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSI3026652010,
title = {{{ETSI EN}} 302 665 {{V1}}.1.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Communicatons Architecture}}},
lccn = {EN 302 665},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = sep,
year = {2010},
keywords = {standards,unread},
file = {/home/spiollinux/Zotero/storage/JRA3LKUZ/en_302665v010101p.pdf}
}
@misc{StudyArchitectureEnhancements,
title = {Study on Architecture Enhancements for {{LTE}} Support of {{V2X}} Services ({{Release}} 14)},
lccn = {3GPP TR 23.785 V14.0.0},
publisher = {{3GPP}},
keywords = {standards,unread},
file = {/home/spiollinux/Zotero/storage/HYALN4ND/Study on architecture enhancements for LTE support.pdf}
}
@misc{StudySecurityAspects,
title = {Study on Security Aspects for {{LTE}} Support of {{Vehilce}}-to-{{Everythine}} ({{V2X}}) Services ({{Release}} 14)},
lccn = {TR 33.885},
publisher = {{3GPP}},
keywords = {standards,unread},
file = {/home/spiollinux/Zotero/storage/AZ7R6325/Study on security aspects for LTE support of Vehil.pdf}
}
@inproceedings{angermeierPALPrivacyAugmented2013,
title = {{{PAL}} - {{Privacy}} Augmented {{LTE}}: {{A}} Privacy-Preserving Scheme for Vehicular {{LTE}} Communication},
author = {Angermeier, Daniel and Kiening, Alexander and Stumpf, Frederic},
month = jun,
year = {2013},
keywords = {unread},
file = {/home/spiollinux/Zotero/storage/T5AAP6NL/Angermeier et al. - 2013 - PAL - Privacy augmented LTE A privacy-preserving .pdf}
}
@inproceedings{schaubVtokensConditionalPseudonymity2010,
title = {V-Tokens for Conditional Pseudonymity in {{VANETs}}},
doi = {10.1109/WCNC.2010.5506126},
abstract = {Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical applications. Conditional pseudonymity, i.e., usage of resolvable pseudonyms, is a common approach to address both. Often, resolvability of pseudonyms is achieved by authorities maintaining pseudonym- identity mappings. However, these mappings are privacy sensitive and require strong protection to prevent abuse or leakage. We present a new approach that does not rely on pseudonym-identity mappings to be stored by any party. Resolution information is directly embedded in pseudonyms and can only be accessed when multiple authorities cooperate. Our privacy-preserving pseudonym issuance protocol ensures that pseudonyms contain valid resolution information but prevents issuing authorities from creating pseudonym-identity mappings.},
author = {Schaub, Florian and Kargl, Frank and Ma, Zhendong and Weber, Michael},
month = apr,
year = {2010},
keywords = {unread},
pages = {1-6},
file = {/home/spiollinux/Zotero/storage/JXGQNUGA/Schaub et al. - 2010 - V-tokens for conditional pseudonymity in VANETs.pdf}
}
@article{forsterPUCAPseudonymScheme2016,
title = {{{PUCA}}: {{A}} Pseudonym Scheme with Strong Privacy Guarantees for Vehicular Ad-Hoc Networks},
abstract = {Pseudonym certificates are the state-of-the-art approach for secure and privacy-friendly message authentication in vehicular ad-hoc networks. However, most of the proposed pseudonym schemes focus on privacy among participants. Privacy towards backend providers is usually (if at all) only protected by separation of responsibilities. The protection can be overridden, when the entities collaborate, e.g. when revocation of long-term credentials is required. This approach puts the users' privacy at risk, if the backend systems are not fully trusted.},
language = {en},
journal = {Ad Hoc Networks},
author = {F{\"o}rster, David and Kargl, Frank and L{\"o}hr, Hans},
year = {2016},
keywords = {unread},
pages = {11},
file = {/home/spiollinux/Zotero/storage/4RNH9ZR9/Förster et al. - 2016 - PUCA A pseudonym scheme with strong privacy guara.pdf}
}
@misc{baldiniAnalysisPrivacyThreat2017,
type = {Research Article},
title = {An {{Analysis}} of the {{Privacy Threat}} in {{Vehicular Ad Hoc Networks}} Due to {{Radio Frequency Fingerprinting}}},
abstract = {In Vehicular Ad Hoc Networks (VANETs) used in the road transportation sector, privacy risks may arise because vehicles could be tracked on the basis of the information transmitted by the Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications implemented with the Dedicated Short Range Communications (DSRC) standards operating at 5.9 GHz. Various techniques have been proposed in the literature to mitigate these privacy risks including the use of pseudonym schemes, but they are mostly focused on data anonymization at the network and application layer. At the physical layer, the capability to accurately identify and fingerprint wireless devices through their radio frequency (RF) emissions has been demonstrated in the literature. This capability may generate a privacy threat because vehicles can be tracked using the RF emissions of their DSRC devices. This paper investigates the privacy risks related to RF fingerprinting to determine if privacy breaches are feasible in practice. In particular, this paper analyzes the tracking accuracy in challenging RF environments with high attenuation and fading.},
language = {en},
howpublished = {https://www.hindawi.com/journals/misy/2017/3041749/},
journal = {Mobile Information Systems},
author = {Baldini, Gianmarco and Giuliani, Raimondo and Cano Pons, Eduardo},
year = {2017},
keywords = {unread},
file = {/home/spiollinux/Zotero/storage/3JTSBLM8/3041749.html;/home/spiollinux/Zotero/storage/U5T7NWFF/Baldini et al. - 2017 - An Analysis of the Privacy Threat in Vehicular Ad .pdf},
doi = {10.1155/2017/3041749}
}
@article{quSecurityPrivacyReview2015,
title = {A {{Security}} and {{Privacy Review}} of {{VANETs}}},
volume = {16},
doi = {10.1109/TITS.2015.2439292},
abstract = {Vehicular ad hoc networks (VANETs) have stimulated interest in both academic and industry settings because, once deployed, they would bring a new driving experience to drivers. However, communicating in an open-access environment makes security and privacy issues a real challenge, which may affect the large-scale deployment of VANETs. Researchers have proposed many solutions to these issues. We start this paper by providing background information of VANETs and classifying security threats that challenge VANETs. After clarifying the requirements that the proposed solutions to security and privacy problems in VANETs should meet, on the one hand, we present the general secure process and point out authentication methods involved in these processes. Detailed survey of these authentication algorithms followed by discussions comes afterward. On the other hand, privacy preserving methods are reviewed, and the tradeoff between security and privacy is discussed. Finally, we provide an outlook on how to detect and revoke malicious nodes more efficiently and challenges that have yet been solved.},
journal = {IEEE Transactions on Intelligent Transportation Systems},
author = {Qu, Fengzhong and Wu, Zhihui and Wang, Fei-Yue and Cho, Woong},
month = dec,
year = {2015},
keywords = {unread,pseudonyms},
pages = {2985-2996},
file = {/home/spiollinux/Zotero/storage/NSXM95K3/Qu et al. - 2015 - A Security and Privacy Review of VANETs.pdf}
}
@article{liuAnonymousGroupMessage,
title = {Anonymous {{Group Message Authentication Protocol}} for {{LTE}}-Based {{V2X Communications}}},
doi = {10.1002/itl2.25},
language = {en},
author = {Liu, Dongxiao and Ni, Jianbing and Lin, Xiaodong},
keywords = {unread,pseudonyms},
pages = {6},
file = {/home/spiollinux/Zotero/storage/BSYK88YT/Liu et al. - Anonymous Group Message Authentication Protocol fo.pdf}
}
@inproceedings{sorensen5GVisionsUser2015,
title = {{{5G Visions}} of {{User Privacy}}},
doi = {10.1109/VTCSpring.2015.7145587},
abstract = {Currently the discussions are going on the elements and definition of 5G networks. One of the elements in this discussion is how to provide for user controlled privacy for securing users' digital interaction. The purpose of this paper is to present elements of user controlled privacy needed for the future 5G networks. The paper concludes that an ecosystem consisting of a Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of user controlled privacy for future services.},
booktitle = {2015 {{IEEE}} 81st {{Vehicular Technology Conference}} ({{VTC Spring}})},
author = {Sorensen, L. T. and Khajuria, S. and Skouby, K. E.},
month = may,
year = {2015},
keywords = {5G mobile communication,5G network security,Computer crime,data privacy,digital interaction,ecosystem,Ecosystems,Facebook,Internet,Mobile communication,Privacy,telecommunication security,trusted third party,user privacy},
pages = {1-4},
file = {/home/spiollinux/Zotero/storage/R8XRJEM7/Sorensen et al. - 2015 - 5G Visions of User Privacy.pdf;/home/spiollinux/Zotero/storage/LGAV8C9C/7145587.html}
}
@article{lentzSDDRLightWeightSecure,
title = {{{SDDR}}: {{Light}}-{{Weight}}, {{Secure Mobile Encounters}}},
abstract = {Emerging mobile social apps use short-range radios to discover nearby devices and users. The device discovery protocol used by these apps must be highly energy-efficient since it runs frequently in the background. Also, a good protocol must enable secure communication (both during and after a period of device co-location), preserve user privacy (users must not be tracked by unauthorized third parties), while providing selective linkability (users can recognize friends when strangers cannot) and efficient silent revocation (users can permanently or temporarily cloak themselves from certain friends, unilaterally and without re-keying their entire friend set).},
language = {en},
author = {Lentz, Matthew and Erdelyi, Viktor and Aditya, Paarijaat and Shi, Elaine and Druschel, Peter and Bhattacharjee, Bobby},
keywords = {unread},
pages = {17},
file = {/home/spiollinux/Zotero/storage/T6LX2CVF/Lentz et al. - SDDR Light-Weight, Secure Mobile Encounters.pdf}
}
@inproceedings{nevenPrivacypreservingAttributebasedCredentials2017,
title = {Privacy-Preserving Attribute-Based Credentials in Cooperative Intelligent Transport Systems},
doi = {10.1109/VNC.2017.8275631},
abstract = {In Cooperative Intelligent Transport Systems (C-ITSs), vehicles broadcast their location and other information over dedicated short-range radio channels. This communication must be authenticated to protect the information against tampering, but at the same time must be anonymous to protect the location privacy of the driver. The most prominent C-ITS solutions today let vehicles either store large numbers of preloaded pseudonym certificates, or let them regularly fetch new pseudonyms from an online authority. More advanced solutions based on group signatures or anonymous credentials allow vehicles to generate arbitrarily many pseudonyms locally, without requiring further interaction. These solutions, however, are vulnerable to Sybil attacks, as the compromised key material of a single vehicle could be used to impersonate an arbitrary number of vehicles simultaneously. In this paper, we propose a new generic approach for C-ITS authentication based on privacy-preserving Attribute-Based Credential (ABC) that generates pseudonyms locally on the vehicle, but where only one valid pseudonym can be generated at any given time. The computational performance and signature sizes of current Privacy-ABC schemes makes them more useful for low-frequency warning messages than for high-frequency beaconing. We therefore see our approach rather as a conceptual framework that can direct further research into more efficient dedicated implementations.},
booktitle = {2017 {{IEEE Vehicular Networking Conference}} ({{VNC}})},
author = {Neven, G. and Baldini, G. and Camenisch, J. and Neisse, R.},
month = nov,
year = {2017},
keywords = {data privacy,Privacy,anonymous credentials,Authentication,authorisation,C-ITS authentication,computer network security,Conferences,cooperative communication,Cooperative Intelligent Transport Systems,Cryptography,dedicated short-range radio channels,Europe,group signatures,high-frequency beaconing,intelligent transportation systems,location privacy,low-frequency warning messages,mobile computing,online authority,preloaded pseudonym certificates,Privacy-ABC schemes,Privacy-preserving attribute-based credentials,Roads,security,Sybil attacks,transportation,vehicular ad hoc networks,vehicular networks,unread},
pages = {131-138},
file = {/home/spiollinux/Zotero/storage/GJG66F4Y/08275631.pdf;/home/spiollinux/Zotero/storage/CKPUBPJH/8275631.html}
}
@article{boualouacheSurveyPseudonymChanging2018,
title = {A {{Survey}} on {{Pseudonym Changing Strategies}} for {{Vehicular Ad}}-{{Hoc Networks}}},
volume = {20},
abstract = {The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing strategy for VANETs is still an open issue. In this paper, we present a comprehensive survey and classification of pseudonym changing strategies. We then discuss and compare them with respect to some relevant criteria. Finally, we highlight some current researches, and open issues and give some future directions.},
language = {en},
number = {1},
author = {Boualouache, Abdelwahab and Senouci, Sidi-Mohammed and Moussaoui, Samira},
year = {2018},
keywords = {unread,pseudonym change strategies,pseudonyms},
pages = {21},
file = {/home/spiollinux/Zotero/storage/VSBWZIA9/Boualouache et al. - 2018 - A Survey on Pseudonym Changing Strategies for Vehi.pdf}
}
@article{petitPseudonymSchemesVehicular2015,
title = {Pseudonym {{Schemes}} in {{Vehicular Networks}}: {{A Survey}}},
abstract = {Safety-critical applications in cooperative vehicular networks require authentication of nodes and messages. Yet, privacy of individual vehicles and drivers must be maintained. Pseudonymity can satisfy both security and privacy requirements. Thus, a large body of work emerged in recent years, proposing pseudonym solutions tailored to vehicular networks. In this survey, we detail the challenges and requirements for such pseudonym mechanisms, propose an abstract pseudonym lifecycle, and give an extensive overview and categorization of the state of the art in this research area. Specifically, this survey covers pseudonym schemes based on public key and identity-based cryptography, group signatures and symmetric authentication. We compare the different approaches, give an overview of the current state of standardization, and identify open research challenges.},
language = {en},
author = {Petit, Jonathan and Schaub, Florian and Feiri, Michael and Kargl, Frank},
year = {2015},
keywords = {read,pseudonym change strategies,pseudonyms},
pages = {33},
file = {/home/spiollinux/Zotero/storage/F4BWMU4T/Petit et al. - Pseudonym Schemes in Vehicular Networks A Survey.pdf}
}
@misc{Vocabulary3GPPSpecifications,
title = {Vocabulary for {{3GPP Specifications}}},
lccn = {3GPP TR 21.905},
keywords = {unread},
file = {/home/spiollinux/Zotero/storage/SLRCYDGA/_.pdf}
}
@article{wernkeClassificationLocationPrivacy2014,
title = {A {{Classification}} of {{Location Privacy Attacks}} and {{Approaches}}},
volume = {18},
issn = {1617-4909},
doi = {10.1007/s00779-012-0633-z},
number = {1},
journal = {Personal Ubiquitous Comput.},
author = {Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt},
month = jan,
year = {2014},
keywords = {Adversary,Approaches,Attacks,Classification,Location privacy,Location-based services,Principles,Protection goals,unread},
pages = {163--175},
file = {/home/spiollinux/Zotero/storage/EQ8UD3AY/Wernke et al. - 2014 - A Classification of Location Privacy Attacks and A.pdf}
}
@inproceedings{zengPseudonymousPKIUbiquitous2006,
title = {Pseudonymous {{PKI}} for {{Ubiquitous Computing}}},
doi = {10.1007/11774716_17},
abstract = {Conventional PKI is the most effective and efficient solution to non-repudiation. But, it also puts user privacy in danger because the user's activities could be tracked via the unique public-key and...},
language = {en},
booktitle = {Public {{Key Infrastructure}}},
publisher = {{Springer, Berlin, Heidelberg}},
author = {Zeng, Ke},
month = jun,
year = {2006},
keywords = {unread},
pages = {207-222},
file = {/home/spiollinux/Zotero/storage/SKS9QWXC/Zeng - 2006 - Pseudonymous PKI for Ubiquitous Computing.pdf;/home/spiollinux/Zotero/storage/I7SGM3RR/login.html}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSITR1032018,
title = {{{ETSI TR}} 103 415 {{V1}}.1.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Security}}; {{Pre}}-Standardization Study on Pseudonym Change Management},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = apr,
year = {2018},
keywords = {read,pseudonym change strategies,pseudonyms},
file = {/home/spiollinux/Zotero/storage/7P3MSQYG/tr_103415v010101p.pdf}
}
@article{hamidaSecurityCooperativeIntelligent2015,
title = {Security of {{Cooperative Intelligent Transport Systems}}: {{Standards}}, {{Threats Analysis}} and {{Cryptographic Countermeasures}}},
volume = {4},
issn = {2079-9292},
shorttitle = {Security of {{Cooperative Intelligent Transport Systems}}},
doi = {10.3390/electronics4030380},
abstract = {Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS). Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA) are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.},
language = {en},
number = {3},
journal = {Electronics},
author = {Hamida, Elyes and Noura, Hassan and Znaidi, Wassim},
month = jul,
year = {2015},
keywords = {unread},
pages = {380-423},
file = {/home/spiollinux/Zotero/storage/5YHZM7DJ/Hamida et al. - 2015 - Security of Cooperative Intelligent Transport Syst.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSITS1022010,
title = {{{ETSI TS}} 102 731 {{V1}}.1.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Security}}; {{Security Services}} and {{Architecture}}},
lccn = {ETSI TS 102 731},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = sep,
year = {2010},
keywords = {read},
file = {/home/spiollinux/Zotero/storage/F3NNPMJC/ts_102731v010101p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSITS1022012a,
title = {{{ETSI TS}} 102 940 {{V1}}.1.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Security}}; {{ITS}} Communications Security Architecture and Security Management},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = jun,
year = {2012},
file = {/home/spiollinux/Zotero/storage/6D2DLDGB/ts_102940v010101p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSI302636612014,
title = {{{ETSI EN}} 302 636-6-1 {{V1}}.2.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Vehicular Communications}}; {{GeoNetworking}}; {{Part}} 6: {{Internet Integration}}; {{Sub}}-Part 1: {{Transmission}} of {{IPv6 Packets}} over {{GeoNetworking Protocols}}},
lccn = {ETSI EN 302 636-6-1},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = may,
year = {2014},
keywords = {GeoNetworking,pseudonyms,IPv6},
file = {/home/spiollinux/Zotero/storage/TRJW42GU/en_3026360601v010201p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSI302636412017,
title = {{{ETSI EN}} 302 636-4-1 {{V1}}.3.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Vehicular Communications}}; {{GeoNetworking}}; {{Part}} 4: {{Geographical}} Addressing and Forwarding for Point-to-Point and Point-to-Multipoint Communications; {{Sub}}-Part 1: {{Media}}-{{Independent Functionality}}},
lccn = {ETSI EN 302 636-4-1},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = aug,
year = {2017},
keywords = {GeoNetworking},
file = {/home/spiollinux/Zotero/storage/H43WFVVS/en_3026360401v010301p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSI302636512017,
title = {{{ETSI EN}} 302 636-5-1 {{V2}}.1.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Vehicular Communications}}; {{GeoNetworking}}; {{Part}} 5: {{Transport Protocols}}; {{Sub}}-Part 1: {{Basic Transport Protocol}}},
lccn = {ETSI TS 102 636-5-1},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = aug,
year = {2017},
keywords = {GeoNetworking,BTP},
file = {/home/spiollinux/Zotero/storage/PSKDF7X4/en_3026360501v020101p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSI30263632014,
title = {{{ETSI EN}} 302 636-3 {{V1}}.2.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Vehicular Communications}}; {{GeoNetworking}}; {{Part}} 3: {{Network}} Architecture},
lccn = {ETSI TS 102 636-3},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = dec,
year = {2014},
keywords = {GeoNetworking},
file = {/home/spiollinux/Zotero/storage/VIZQJ69B/en_30263603v010201p.pdf}
}
@article{sandonisVehicleInternetCommunications2016,
title = {Vehicle to {{Internet}} Communications Using the {{ETSI ITS GeoNetworking}} Protocol: {{V}}. {{Sandonis}} et Al.},
volume = {27},
issn = {21613915},
shorttitle = {Vehicle to {{Internet}} Communications Using the {{ETSI ITS GeoNetworking}} Protocol},
doi = {10.1002/ett.2895},
abstract = {Vehicular ad hoc networks allow the exchange of information between vehicles to improve road safety. In addition, vehicles can be connected to the Internet through gateways placed alongside the roads, which allow drivers to use common Internet services and new applications specifically oriented to them. The European Telecommunications Standards Institute Technical Committee Intelligent Transport System has standardised the architecture and the communication protocols for an Intelligent Transport System, considering both safety applications and communications with the Internet. The GeoNetworking (GN) protocol has been designed to forward packets inside the vehicular ad hoc network taking safety requirements as the main concern. This paper analyses the GN protocol focusing on the provision of Internet connectivity to vehicles. The main contributions of this work are the identification of sources of performance losses when using the GN protocol in communications with the Internet and the proposal of different mechanisms to improve its performance in this type of communications. The evaluation of the GN protocol and the proposed improvements is conducted by means of extensive simulations. Copyright \textcopyright{} 2014 John Wiley \& Sons, Ltd.},
language = {en},
number = {3},
journal = {Transactions on Emerging Telecommunications Technologies},
author = {Sandonis, Victor and Soto, Ignacio and Calderon, Maria and Urue{\~n}a, Manuel},
month = mar,
year = {2016},
keywords = {GeoNetworking},
pages = {373-391},
file = {/home/spiollinux/Zotero/storage/DE8US3BX/Sandonis et al. - 2016 - Vehicle to Internet communications using the ETSI .pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSI30263622013,
title = {{{ETSI EN}} 302 636-2 {{V1}}.2.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Vehicular Communications}}; {{GeoNetworking}}; {{Part}} 2: {{Scenarios}}},
lccn = {ETSI TS 102 636-2 V1.1.1},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = nov,
year = {2013},
keywords = {unread,GeoNetworking},
file = {/home/spiollinux/Zotero/storage/53W38GKN/en_30263602v010201p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSI30263612014,
title = {{{ETSI EN}} 302 636-1 {{V1}}.2.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Vehicular Communications}}; {{GeoNetworking}}; {{Part}} 1: {{Requirements}}},
lccn = {ETSI TS 102 636-1 V1.1.1},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = apr,
year = {2014},
keywords = {unread,GeoNetworking},
file = {/home/spiollinux/Zotero/storage/5D63HWLL/en_30263601v010201p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSITS1022012b,
title = {{{ETSI TS}} 102 942 {{V1}}.1.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Security}}; {{Access Control}}},
lccn = {ETSI TS 102 942 V1.1.1},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = jun,
year = {2012},
keywords = {standards,unread},
file = {/home/spiollinux/Zotero/storage/JRVFZCDN/ts_102942v010101p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSITS1022012c,
title = {{{ETSI TS}} 102 943 {{V1}}.1.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Security}}; {{Confidentiality}} Services},
lccn = {ETSI TS 102 943 V1.1.1},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = jun,
year = {2012},
keywords = {standards,unread},
file = {/home/spiollinux/Zotero/storage/C5Y2VWD2/ts_102943v010101p.pdf}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSITS1032017,
title = {{{ETSI TS}} 103 097 {{V1}}.3.1; {{Intelligent Transport Systems}} ({{ITS}}); {{Security}}; {{Security}} Header and Certificate Formats},
lccn = {ETSI TS 103 097 V1.3.1},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = oct,
year = {2017},
keywords = {standards,unread},
file = {/home/spiollinux/Zotero/storage/9LFPJKCL/ts_103097v010301p.pdf}
}
@misc{polalemanypratsPerformanceStudyIEEE2017,
title = {Performance Study of the {{IEEE}} 802.11p and {{ETSI GeoNetworking}} Protocols},
author = {{Pol Alemany Prats}},
month = may,
year = {2017},
keywords = {GeoNetworking},
file = {/home/spiollinux/Zotero/storage/Z4UTYR9K/Performance study of the IEEE 802.11p and ETSI GeoNetworking protocols(3).pdf}
}
@misc{eucomissionc-itsplatformSecurityPolicyGovernance,
title = {Security {{Policy}} \& {{Governance Framework}} for {{Deployment}} and {{Operation}} of {{European Cooperative Intelligent Transport Systems}} ({{C}}-{{ITS}})},
author = {{EU Comission C-ITS Platform}},
keywords = {pseudonym change strategies},
file = {/home/spiollinux/Zotero/storage/6KJFFAMX/c-its_security_policy_release_1.pdf}
}
@article{TN_libero_mab2,
title = {{{ISO}} 29281-1},
abstract = {Bibliographische Datenbank (monatlich aktualisiert, 3sprachig) mit ca. 1.100.000 Daten von Normen aus 23 L{\"a}ndern, (z.B. ANSI, DIN, ISO), technischen Regeln sowie von deutschen Rechtsvorschriften mit technischen Bezug und geltenden EU-Richtlinien incl. VDI-Richtlinien. Der Volltextzugriff auf Normen ist nur bei entsprechender Lizenz verf{\"u}gbar!},
author = {intelligents de transport {ISO/TC 204 Systeme f{\"u}r Verkehrsbeeinflussung und -information , ISO/TC 204 Intelligent transport systems}, ISO/TC 204 Syst{\`e}mes},
year = {2013},
keywords = {DIN-Norm,Internationale Norm,Norm,Regeln der Technik,Verzeichnis},
publisher = {{ISO Internationale Organisation f{\"u}r Normung, ISO International Organization for Standardization, ISO Organisation Internationale de Normalisation}}
}
@techreport{RFC8200,
type = {{{STD}}},
title = {Internet {{Protocol}}, {{Version}} 6 ({{IPv6}}) {{Specification}}},
number = {86},
institution = {{RFC Editor}},
author = {Deering, S. and Hinden, R.},
month = jul,
year = {2017},
issn = {2070-1721},
howpublished = {Internet Requests for Comments}
}
@techreport{RFC4291,
type = {{{RFC}}},
title = {{{IP Version}} 6 {{Addressing Architecture}}},
number = {4291},
institution = {{RFC Editor}},
author = {Hinden, R. and Deering, S.},
month = feb,
year = {2006},
issn = {2070-1721},
howpublished = {Internet Requests for Comments},
note = {http://www.rfc-editor.org/rfc/rfc4291.txt}
}
@misc{baeckerRFCE014IPv6,
title = {{RFCE014: IPv6}},
copyright = {Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License},
language = {German},
number = {14},
author = {Baecker, Anna-Lena and Schrimpe, Clemens}
}
@techreport{RFC4861,
type = {{{RFC}}},
title = {Neighbor {{Discovery}} for {{IP}} Version 6 ({{IPv6}})},
number = {4861},
institution = {{RFC Editor}},
author = {Narten, T. and Nordmark, E. and Simpson, W. and Soliman, H.},
month = sep,
year = {2007},
issn = {2070-1721},
howpublished = {Internet Requests for Comments},
note = {http://www.rfc-editor.org/rfc/rfc4861.txt}
}
@misc{europeantelecommunicationsstandardsinstituteetsiETSITS1032016,
title = {{{ETSI TS}} 103 248 {{V1}}.1.1 {{Intelligent Transport Systems}} ( {{ITS}} ); {{GeoNetworking}}; {{Port Numbers}} for the {{Basic Transport Protocol}} ({{BTP}})},
lccn = {ETSI TS 103 248 V1.1.1},
author = {{European Telecommunications Standards Institute (ETSI)}},
month = nov,
year = {2016},
file = {/home/spiollinux/Zotero/storage/U3RMDZ2I/ts_103248v010101p.pdf}
}