期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
An Efficient Trusted Computing Base for MANET Security 被引量:1
1
作者 Somya D. Mohanty Vinay Thotakura Mahalingam Ramkumar 《Journal of Information Security》 2014年第4期192-206,共15页
Devices participating in mobile ad hoc networks (MANET) are expected to strictly adhere to a uniform routing protocol to route data packets among themselves. Unfortunately, MANET devices, composed of untrustworthy sof... Devices participating in mobile ad hoc networks (MANET) are expected to strictly adhere to a uniform routing protocol to route data packets among themselves. Unfortunately, MANET devices, composed of untrustworthy software and hardware components, expose a large attack surface. This can be exploited by attackers to gain control over one or more devices, and wreak havoc on the MANET subnet. The approach presented in this paper to secure MANETs restricts the attack surface to a?single module?in MANET devices a trusted MANET module (TMM). TMMs are deliberately constrained to demand only modest memory and computational resources in the interest of further reducing the attack surface. The specific contribution of this paper is a precise characterization of simple TMM functionality suitable for any distance vector based routing protocol, to realize the broad assurance that “any node that fails to abide by the routing protocol will not be able to participate in the MANET”. 展开更多
关键词 algorithm/protocol design and analysis Network protocols CRYPTOGRAPHIC CONTROLS Mobile AD-HOC Networks (MANET) Distance Vector (DV) protocols Authenticated Data Structures (ADS)
下载PDF
Emerging Applications for Cyber Transportation Systems
2
作者 Aditya Wagh 侯云飞 +7 位作者 乔春明 张龙飞 李旭 Adel Sadek Kevin Hulme 吴昌旭 徐宏力 黄刘生 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第4期562-575,共14页
Recent advances in connected vehicles and autonomous driving are going to change the face of ground trans- portation as we know it. This paper describes the design and evaluation of several emerging applications for s... Recent advances in connected vehicles and autonomous driving are going to change the face of ground trans- portation as we know it. This paper describes the design and evaluation of several emerging applications for such a cyber transportation system (CTS). These applications have been designed using holistic approaches, which consider the unique roles played by the human drivers, the transportation system, and the communication network. They can improve driver safety and provide on-road infotainment. They can also improve transportation operations and efficiency, thereby benefiting travelers and attracting investment from both government agencies and private businesses to deploy infrastructures and bootstrap the evolutionary process of CTS. 展开更多
关键词 emerging technology application algorithm/protocol design and analysis cyber transportation system
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部