@inbook {130, title = {Formal Verification of Privacy Properties in Electric Vehicle Charging}, booktitle = {Engineering Secure Software and Systems}, series = {Lecture Notes in Computer Science}, volume = {8978}, year = {2015}, pages = {17-33}, publisher = {Springer International Publishing}, organization = {Springer International Publishing}, keywords = {electric vehicle charging, formal verification, privacy}, isbn = {978-3-319-15617-0}, doi = {10.1007/978-3-319-15618-7_2}, url = {http://dx.doi.org/10.1007/978-3-319-15618-7_2}, author = {Fazouane, Marouane and Kopp, Henning and van der Heijden, RensW. and Le M{\'e}tayer, Daniel and Kargl, Frank}, editor = {Piessens, Frank and Caballero, Juan and Bielova, Nataliia} } @conference {131, title = {Pre-distribution of certificates for pseudonymous broadcast authentication in VANET}, booktitle = {IEEE 81st Vehicular Technology Conference (VTC)}, year = {2015}, month = {April}, publisher = {IEEE}, organization = {IEEE}, author = {Feiri, Michael and Pielage, Rolf and Petit, Jonathan and Zannone, Nicola and Kargl, Frank} } @article {129, title = {Pseudonym Schemes in Vehicular Networks: A Survey}, journal = {Communications Surveys \& Tutorials, IEEE}, volume = {17}, year = {2015}, month = {January-March}, pages = {228-255}, keywords = {Anonymity, Authentication, intelligent transport systems, its, Licenses, privacy, Pseudonym, Tutorials, unlinkability, untraceability, V2X communications, VANET, Vehicles, vehicular ad hoc networks, vehicular ad-hoc networks}, issn = {1553-877X}, doi = {10.1109/COMST.2014.2345420}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6873216}, author = {Petit, Jonathan and Schaub, Florian and Feiri, Michael and Kargl, Frank} } @article {134, title = {Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems}, journal = {Intelligent Transportation Systems, IEEE Transactions on}, volume = {16}, year = {2015}, month = {June}, pages = {1428-1438}, keywords = {Authentication, Estimation, Mobile communication, privacy, Roads, security, Servers, traffic information systems}, issn = {1524-9050}, doi = {10.1109/TITS.2014.2369574}, author = {Gisdakis, S. and Manolopoulos, V. and Tao, S. and Rusu, A. and Papadimitratos, P.} } @conference {132, title = {Secure Cluster-based In-network Information Aggregation for Vehicular Networks}, booktitle = {IEEE 81st Vehicular Technology Conference (VTC)}, year = {2015}, month = {April}, publisher = {IEEE}, organization = {IEEE}, author = {Dietzel, Stefan and Peter, Andreas and Kargl, Frank} } @article {119, title = {Cooperative Home Light: Assessment of a Security Function for the Automotive Field}, journal = {IARIA Journal on Advances in Security}, volume = {7}, year = {2014}, pages = {1-14}, issn = {1942-2636}, url = {http://www.iariajournals.org/security/tocv7n12.html}, author = {Knapik, Peter and Petit, Jonathan and Kargl, Frank and Schoch, Elmar} } @conference {123, title = {An evaluation framework for pre-distribution strategies of certificates in VANETs}, booktitle = {Proceedings of 2nd GI/ITG KuVS Fachgespr{\"a}ch Inter-Vehicle Communication (FG-IVC 2014)}, year = {2014}, month = {February}, address = {Luxemburg}, url = {http://www.vehicularlab.uni.lu/wp-content/uploads/2014/03/Proceedings_FG_IVC_2014.pdf}, author = {Feiri, Michael and Petit, Jonathan and Kargl, Frank} } @conference {139, title = {A flexible, subjective logic-based framework for misbehavior detection in V2V networks}, booktitle = {A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on}, year = {2014}, month = {June}, keywords = {cryptographic signatures, Cryptography, Detectors, logic based framework, message integrity protection, misbehavior detection, Roads, Uncertainty, V2V networks, vehicle to infrastructure communication, vehicle to vehicle communication, Vehicles, vehicular ad hoc networks, world model}, doi = {10.1109/WoWMoM.2014.6918989}, author = {Dietzel, S. and van der Heijden, R. and Decke, H. and Kargl, F.} } @conference {126, title = {Formal model of certificate omission schemes in VANET}, booktitle = {Vehicular Networking Conference (VNC), 2014 IEEE}, year = {2014}, month = {Dec}, address = {Paderborn, Germany}, keywords = {Analytical model, certificate omission, Communication channels, Conferences, Packet loss, Receivers, security, VANET, Vehicles, vehicular ad hoc networks}, doi = {10.1109/VNC.2014.7013307}, author = {Feiri, Michael and Petit, Jonathan and Kargl, Frank} } @article {128, title = {In-Network Aggregation for Vehicular Ad Hoc Networks}, journal = {IEEE Communications Surveys and Tutorials}, volume = {16}, year = {2014}, month = {December}, pages = {1909{\textendash}1932}, keywords = {Bandwidth, Information systems, protocols, Roads, Safety, Vehicles, vehicular ad hoc networks}, issn = {1553-877X}, doi = {10.1109/COMST.2014.2320091}, url = {http://dx.doi.org/10.1109/COMST.2014.2320091}, author = {Dietzel, Stefan and Petit, Jonathan and Kargl, Frank and Scheuermann, Bj{\"o}rn} } @conference {120, title = {Open issues in differentiating misbehavior and anomalies for VANETs}, booktitle = {Proceedings of 2nd GI/ITG KuVS Fachgespr{\"a}ch Inter-Vehicle Communication (FG-IVC 2014)}, year = {2014}, month = {February}, address = {Luxemburg}, url = {http://www.vehicularlab.uni.lu/wp-content/uploads/2014/03/Proceedings_FG_IVC_2014.pdf}, author = {van der Heijden, Rens W. and Kargl, Frank} } @proceedings {121, title = {Proceedings of 2nd GI/ITG KuVS Fachgespr{\"a}ch Inter-Vehicle Communication (FG-IVC 2014)}, year = {2014}, month = {February}, address = {Luxemburg}, url = {http://www.vehicularlab.uni.lu/wp-content/uploads/2014/03/Proceedings_FG_IVC_2014.pdf}, editor = {Frank, Rapha{\"e}l and Forster, Markus and Sommer, Christoph and Kargl, Frank and Engel, Thomas} } @conference {125, title = {PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET)}, booktitle = {Vehicular Networking Conference (VNC), 2014 IEEE}, year = {2014}, month = {Dec}, address = {Paderborn, Germany}, keywords = {Authentication, Conferences, Cryptography, Principal component analysis, privacy, protocols, Vehicles}, doi = {10.1109/VNC.2014.7013305}, author = {Forster, David and Kargl, Frank and Lohr, Hans} } @conference {122, title = {Real World Privacy Expectations in VANETs}, booktitle = {Proceedings of 2nd GI/ITG KuVS Fachgespr{\"a}ch Inter-Vehicle Communication (FG-IVC 2014)}, year = {2014}, month = {February}, address = {Luxemburg}, url = {http://www.vehicularlab.uni.lu/wp-content/uploads/2014/03/Proceedings_FG_IVC_2014.pdf}, author = {Feiri, Michael and Petit, Jonathan and Kargl, Frank} } @conference {127, title = {Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes}, booktitle = {Vehicular Networking Conference (VNC), 2014 IEEE}, year = {2014}, month = {Dec}, address = {Paderborn, Germany}, keywords = {Bandwidth, Cryptography, information aggregation, multi-hop communication, protocols, Roads, security, VANETs, Vectors, Vehicles}, doi = {10.1109/VNC.2014.7013332}, author = {Dietzel, Stefan and Guertler, Julian and van der Heijden, Rens and Kargl, Frank} } @conference {124, title = {Revisiting attacker model for smart vehicles}, booktitle = {Wireless Vehicular Communications (WiVeC), 2014 IEEE 6th International Symposium on}, year = {2014}, month = {September}, publisher = {IEEE}, organization = {IEEE}, address = {Vancouver, Canada}, keywords = {attacker model, cooperative automated safety applications, Cryptography, data acquisition, Hardware, intelligent transportation systems, meta data, metadata security, mobile radio, privacy, security, security of data, Sensor phenomena and characterization, smart vehicles, telecommunication security, Telematics, V2X data lifecycle, vehicle-to-X communication, Vehicles, Vehicularnetworks}, doi = {10.1109/WIVEC.2014.6953258}, author = {Petit, Jonathan and Feiri, Michael and Kargl, Frank} } @conference {147, title = {Towards a Cooperative ITS Vehicle Application Oriented Security Framework}, booktitle = {Intelligent Vehicles Symposium Proceedings, 2014 IEEE}, year = {2014}, month = {June}, keywords = {Automotive engineering, automotive industry, CIVAS layers, Computer architecture, Cooperative ITS, cooperative ITS vehicle application oriented security framework CIVAS, defense-in-depth model, Hardware, intelligent transportation systems, ITS deployment, ITS vehicle security requirements, ITS Vehicle Station, road safety, security, security architecture, security of data, Software, Telecommunication standards, vehicle ITS stations, Vehicles}, doi = {10.1109/IVS.2014.6856548}, author = {Moalla, R. and Lonc, B. and Labiod, H. and Simoni, N.} } @conference {137, title = {Towards deploying a scalable amp; robust vehicular identity and credential management infrastructure}, booktitle = {Vehicular Networking Conference (VNC), 2014 IEEE}, year = {2014}, month = {Dec}, keywords = {Conferences, credential management infrastructure, data privacy, fundamental security building blocks, honest-but-curious security infrastructure, Principal component analysis, privacy, privacy features, protocols, pseudonymous authentication, public key cryptography, security, Servers, telecommunication network management, user privacy protection, Vehicles, vehicular ad hoc networks, vehicular communication systems, vehicular identity, vehicular public-key infrastructure, VPKI}, doi = {10.1109/VNC.2014.7013306}, author = {Khodaei, M. and Hongyu Jin and Papadimitratos, P.} } @conference {6578314, title = {Copra: Conditional pseudonym resolution algorithm in VANETs}, booktitle = {Wireless On-demand Network Systems and Services (WONS), 2013 10th Annual Conference on}, year = {2013}, pages = {9-16}, keywords = {certificate issue identifier, certihcate acquisition phase, conditional pseudonym resolution algorithm, CoPRA, delays, digital certificate, driver privacy protection, generic pseudonym resolution protocol, Joining processes, Principal component analysis, privacy, protocols, pseudonym identifier resolution, Public key, radiotelemetry, short-term pseudonymous certificate, VANET, vehicle tracking, Vehicles, vehicular ad hoc networks, wireless communication, wireless vehicular communication network}, doi = {10.1109/WONS.2013.6578314}, author = {Bi{\ss}meyer, Norbert and Petit, Jonathan and Bayarou, Kpatcha} } @conference {Kargl:2013:DPI:2462096.2462114, title = {Differential Privacy in Intelligent Transportation Systems}, booktitle = {Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks}, series = {WiSec {\textquoteright}13}, year = {2013}, pages = {107{\textendash}112}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {differential privacy, intelligent transportation systems, its, privacy}, isbn = {978-1-4503-1998-0}, doi = {10.1145/2462096.2462114}, url = {http://doi.acm.org/10.1145/2462096.2462114}, author = {Kargl, Frank and Friedman, Arik and Boreli, Roksana} } @article {6104050, title = {Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks}, journal = {Mobile Computing, IEEE Transactions on}, volume = {12}, number = {2}, year = {2013}, month = {Feb.}, pages = {289-303}, keywords = {ad hoc networking protocols, location-aware services, mobile ad hoc networks, Mobile communication, Mobile computing, mobile nodes, mobility management (mobile radio), neighbor position verification, protocols, Public key, Robustness, routing protocol, routing protocols, telecommunication services, Timing, vehicular ad hoc networks, Vehicular Networks}, issn = {1536-1233}, doi = {10.1109/TMC.2011.258}, author = {Fiore, Marco and Ettore Casetti, Claudio and Chiasserini, Carla-Fabiana and Papadimitratos, Panagiotis} } @conference {Feiri:2013:ESS:2517968.2517972, title = {Efficient and Secure Storage of Private Keys for Pseudonymous Vehicular Communication}, booktitle = {Proceedings of the 2013 ACM Workshop on Security, Privacy \& Dependability for Cyber Vehicles}, series = {CyCAR {\textquoteright}13}, year = {2013}, pages = {9{\textendash}18}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {hsm, its, kdf, PUF, secure storage, VANET}, isbn = {978-1-4503-2487-8}, doi = {10.1145/2517968.2517972}, url = {http://doi.acm.org/10.1145/2517968.2517972}, author = {Feiri, Michael and Petit, Jonathan and Kargl, Frank} } @conference {Feiri:2013b, title = {The Impact of Security on Cooperative Awareness in VANET}, booktitle = {Vehicular Networking Conference (VNC), 2013 IEEE}, year = {2013}, author = {Feiri, Michael and Petit, Jonathan and Kargl, Frank} } @conference {Lefevre:2013, title = {Impact of V2X Privacy Strategies on Intersection Collision Avoidance Systems}, booktitle = {Vehicular Networking Conference (VNC), 2013 IEEE}, year = {2013}, author = {Lef{\`e}vre, Stephanie and Petit, Jonathan and Bajcsy, Ruzena and Laugier, Christian and Kargl, Frank} } @conference {Hofer:2013:PPC:2517968.2517971, title = {POPCORN: Privacy-preserving Charging for Emobility}, booktitle = {Proceedings of the 2013 ACM Workshop on Security, Privacy \& Dependability for Cyber Vehicles}, series = {CyCAR {\textquoteright}13}, year = {2013}, pages = {37{\textendash}48}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {electric vehicle charging, iso/iec 15118, privacy, privacy enhancing technologies, security}, isbn = {978-1-4503-2487-8}, doi = {10.1145/2517968.2517971}, url = {http://doi.acm.org/10.1145/2517968.2517971}, author = {H{\"o}fer, Christina and Petit, Jonathan and Schmidt, Robert and Kargl, Frank} } @conference {lag2013sec2, title = {Secure Communication in Vehicular Networks {\textendash} PRESERVE Demo}, booktitle = {Proceedings of the 5th IEEE International Symposium on Wireless Vehicular Communications}, year = {2013}, author = {Lagan{\`a}, Marcello and Feiri, Michael and Sall, Michel and Lange, Mirco and Tomatis, Andrea and Papadimitratos, Panagiotis} } @conference {rim, title = {Security architecture for cooperative ITS-S vehicles}, booktitle = {11th International Embedded Security in Cars Conference}, year = {2013}, author = {Moalla, Rim and Lonc, Brigitte and Labiod, Houda and Simoni, Noemie} } @conference {vanderHeijden:2013:SSD:2462096.2462119, title = {SeDyA: Secure Dynamic Aggregation in VANETs}, booktitle = {Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks}, series = {WiSec {\textquoteright}13}, year = {2013}, pages = {131{\textendash}142}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {multi-hop communication, secure aggregation, VANETs}, isbn = {978-1-4503-1998-0}, doi = {10.1145/2462096.2462119}, url = {http://doi.acm.org/10.1145/2462096.2462119}, author = {van der Heijden, Rens Wouter and Dietzel, Stefan and Kargl, Frank} } @conference {bissmeyer:2013b, title = {Short Paper: Experimental Analysis of Misbehavior Detection and Prevention in VANETs}, booktitle = {Vehicular Networking Conference (VNC), 2013 IEEE}, year = {2013}, author = {Bi{\ss}meyer, Norbert and Schr{\"o}der, Klaus Henrik and Petit, Jonathan and Mauthofer, Sebastian and Bayarou, Kpatcha} } @conference {6583472, title = {Towards a secure and privacy-preserving multi-service vehicular architecture}, booktitle = {World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013 IEEE 14th International Symposium and Workshops on a}, year = {2013}, pages = {1-6}, keywords = {Authorization, efficiency, individual privacy protection, long-standing standards, mobile platforms, mobile radio, Principal component analysis, privacy, privacy-preserving multiservice vehicular architecture, protocols, public key cryptography, secure multiservice vehicular architecture, security, short-term credentials, Standards, telecommunication security, telecommunication services, VC system, Vehicles, vehicular communications, vehicular PKI-based approach, vehicular public key infrastructure-based approach, VPKI, Web-based approaches}, doi = {10.1109/WoWMoM.2013.6583472}, author = {Alexiou, Nikolaos and Gisdakis, Stylianos and Lagan{\`a}, Marcello and Papadimitratos, Panagiotis} } @conference {146, title = {VeSPA: Vehicular Security and Privacy-preserving Architecture}, booktitle = {Proceedings of the 2Nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy}, year = {2013}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {credential management, pki, privacy, security, VANETs}, isbn = {978-1-4503-2003-0}, doi = {10.1145/2463183.2463189}, url = {http://doi.acm.org/10.1145/2463183.2463189}, author = {Alexiou, Nikolaos and Lagan{\`a}, Marcello and Gisdakis, Stylianos and Khodaei, Mohammad and Papadimitratos, Panagiotis} } @conference {Dietzel:2012, title = {Analyzing dissemination redundancy to achieve data consistency in VANETs}, booktitle = {Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications}, series = {VANET {\textquoteright}12}, year = {2012}, pages = {131{\textendash}134}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {data consistency, metrics, security, simulation, VANET}, isbn = {978-1-4503-1317-9}, doi = {10.1145/2307888.2307914}, url = {http://doi.acm.org/10.1145/2307888.2307914}, author = {Dietzel, Stefan and Petit, Jonathan and Kargl, Frank and Heijenk, Geert} } @conference {135, title = {Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters}, booktitle = {Vehicular Networking Conference (VNC), 2012 IEEE}, year = {2012}, month = {Nov}, keywords = {Atmospheric measurements, cryptographic solution, Cryptography, data plausibility check, Java-OSGi bundle, location-based attack, message authentication, message integrity, node trustworthiness assessment, particle filtering (numerical methods), particle filters, Particle measurements, positional reliability, Radar tracking, sender authenticity, telecommunication traffic, traffic safety application, VANET, Vehicles, vehicular ad hoc networks}, doi = {10.1109/VNC.2012.6407448}, author = {Bissmeyer, N. and Mauthofer, S. and Bayarou, K.M. and Kargl, F.} } @conference {142, title = {CANE: A Controlled Application Environment for privacy protection in ITS}, booktitle = {ITS Telecommunications (ITST), 2012 12th International Conference on}, year = {2012}, month = {Nov}, keywords = {application runtime, application sandboxing approach, automated highways, automobiles, CANE, control engineering computing, controlled application environment, data privacy, Databases, intelligent transportation systems, its, location traces, message authentication, monolithic black boxes, paid services authentication, personal identifiable information, privacy protection, proof-of-concept implementation, user control, users cars}, doi = {10.1109/ITST.2012.6458663}, author = {Dietzel, S. and Kost, M. and Schaub, F. and Kargl, F.} } @conference {BiBmeyer:2012, title = {Central misbehavior evaluation for VANETs based on mobility data plausibility}, booktitle = {Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications}, series = {VANET {\textquoteright}12}, year = {2012}, pages = {73{\textendash}82}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {c2c, c2x, confidence, ids, misbehavior, reputation, trust, v2v, v2x, VANET}, isbn = {978-1-4503-1317-9}, doi = {10.1145/2307888.2307902}, url = {http://doi.acm.org/10.1145/2307888.2307902}, author = {Bissmeyer, Norbert and Njeukam, Joel and Petit, Jonathan and Bayarou, Kpatcha M.} } @conference {Feiri:2012, title = {Congestion-based certificate omission in VANETs}, booktitle = {Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications}, series = {VANET {\textquoteright}12}, year = {2012}, pages = {135{\textendash}138}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {certificate omission, congestion, security, VANET}, isbn = {978-1-4503-1317-9}, doi = {10.1145/2307888.2307915}, url = {http://doi.acm.org/10.1145/2307888.2307915}, author = {Feiri, Michael and Petit, Jonathan and Kargl, Frank} } @conference {Feiri:2012b, title = {Evaluation of congestion-based certificate omission in VANETs}, booktitle = {Vehicular Networking Conference (VNC), 2012 IEEE}, year = {2012}, month = {nov.}, pages = {101 -108}, keywords = {Communication channels, Cryptography, Packet loss, Safety, Vehicles}, issn = {2157-9857}, doi = {10.1109/VNC.2012.6407417}, author = {Feiri, Michael and Petit, Jonathan and Kargl, Frank} } @article {Dietzel:2012b, title = {Graph-based Metrics for Insider Attack Detection in VANET Multi-hop Data Dissemination Protocols}, journal = {Vehicular Technology, IEEE Transactions on}, volume = {PP}, number = {99}, year = {2012}, pages = {1}, keywords = {data consistency, graphy theory, protocol analysis, VANETs, Vehicular Networks}, issn = {0018-9545}, doi = {10.1109/TVT.2012.2236117}, author = {Dietzel, S. and Petit, J. and Heijenk, G. and Kargl, F.} } @conference {141, title = {How to secure ITS applications?}, booktitle = {Ad Hoc Networking Workshop (Med-Hoc-Net), 2012 The 11th Annual Mediterranean}, year = {2012}, month = {June}, keywords = {application oriented security approach, Authentication, automated highways, Containers, cooperative applications, ETSI, IEEE 1609.2, intelligent transportation systems, ITS application security, ITS applications, ITS architecture, protocols, road safety, road safety application classification, security of data, security profiles, security requirements, Telecommunication standards, traffic efficiency, V2X communications, Vehicles, vehicular communication}, doi = {10.1109/MedHocNet.2012.6257110}, author = {Moalla, R. and Lonc, B. and Labiod, H. and Simoni, N.} } @conference {Petit:2012a, title = {On the potential of PUF for pseudonym generation in vehicular networks}, booktitle = {Vehicular Networking Conference (VNC), 2012 IEEE}, year = {2012}, month = {nov.}, pages = {94 -100}, keywords = {Authentication, Coatings, Data mining, PPUF, Pseudonym, Public key, PUF, Vehicles, Vehicular Networks}, issn = {2157-9857}, doi = {10.1109/VNC.2012.6407450}, author = {Petit, Jonathan and Bosch, Christoph and Feiri, Michael and Kargl, Frank} } @conference {lag2012sec, title = {Secure Communication in Vehicular Networks {\textendash} PRESERVE Demo}, booktitle = {IEEE Vehicular Networking Conference (IEEE VNC)}, year = {2012}, month = {November}, author = {Lagan{\`a}, M. and Feiri, M. and Sall, M. and Lange, M. and Tomatis, A. and Papadimitratos, P.} } @conference {man2012smart, title = {Smartphone-based Traffic Information System for Sustainable Cities}, booktitle = {ACM International Workshop on Mobile Computing Systems and Applications (ACM HotMobile)}, year = {2012}, month = {February}, author = {Manolopoulos, V. and Tao, S. and Rusu, A. and Papadimitratos, P.} } @conference {136, title = {Understanding vehicle related crime to elaborate on countermeasures based on ADAS and V2X communication}, booktitle = {Vehicular Networking Conference (VNC), 2012 IEEE}, year = {2012}, month = {Nov}, keywords = {ADAS, ADAS communication, advanced driver assistance system, Alarm systems, consumer electronics, crime science, criminal activity, criminological theory, driver information systems, economic loss, Electronic countermeasures, Germany, ICT, information and communication technology, personal injury, rational choice perspective, road safety, security functions, Sensors, situational crime prevention, Strips, V2X communication, vehicle related crime, Vehicles, wireless communication}, doi = {10.1109/VNC.2012.6407449}, author = {Knapik, P. and Schoch, E. and Muller, M. and Kargl, F.} } @article {kargl:2011:acm-wisec-poster, title = {ACM WiSec 2011 poster and demo session}, journal = {ACM SIGMOBILE Mobile Computing and Communications Review}, volume = {15}, year = {2011}, month = {07/2011}, pages = {34{\textendash}34}, publisher = {ACM}, address = {New York, NY, USA}, issn = {1559-1662}, doi = {10.1145/2073290.2073296}, url = {http://doi.acm.org/10.1145/2073290.2073296}, author = {Frank Kargl and Papadimitratos, Panos} } @conference {144, title = {Adaptive Message Authentication for multi-hop networks}, booktitle = {Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on}, year = {2011}, month = {Jan}, keywords = {adaptive message authentication, communication channel, Cryptography, DoS attacks, lightweight filtering scheme, message authentication, multihop intervehicle communication, network performance, protocols, public key cryptography, Routing, Safety, Spread spectrum communication, telecommunication channels, telecommunication security, Vehicles, vehicular ad hoc network, vehicular ad hoc networks, vehicular nodes}, doi = {10.1109/WONS.2011.5720206}, author = {Ristanovic, N. and Papadimitratos, P. and Theodorakopoulos, G. and Hubaux, J.-P. and Le Boudec, J.-Y.} } @conference {Schmidt:2011:ACS:2030698.2030701, title = {Advanced carrier sensing to resolve local channel congestion}, booktitle = {Proceedings of the Eighth ACM international workshop on Vehicular inter-networking}, series = {VANET {\textquoteright}11}, year = {2011}, month = {09/2011}, pages = {11{\textendash}20}, publisher = {ACM}, organization = {ACM}, address = {New York, NY, USA}, keywords = {carrier sensing, clear channel assessment, congestion control, spatial reuse, VANET, vehicular ad-hoc networks}, isbn = {978-1-4503-0869-4}, doi = {10.1145/2030698.2030701}, url = {http://doi.acm.org/10.1145/2030698.2030701}, author = {Schmidt, Robert K. and Brakemeier, Achim and Leinm{\"u}ller, Tim and Frank Kargl and Sch{\"a}fer, G{\"u}nter} } @conference {140, title = {Collaborative Location Privacy}, booktitle = {Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on}, year = {2011}, month = {Oct}, keywords = {Ad hoc networks, Collaboration, collaborative location privacy, collaborative peers, Context, data privacy, Location Privacy, location-aware smart phones, location-based queries, Location-based Services, location-based services server, MobiCrowd, Mobile communication, mobile devices, mobility management (mobile radio), model-based findings, Nokia platforms, privacy, Servers, telecommunication security, user-collaborative privacy preserving approach, wireless communication}, doi = {10.1109/MASS.2011.55}, author = {Shokri, R. and Papadimitratos, P. and Theodorakopoulos, G. and Hubaux, J.-P.} } @conference {Petit:2011b, title = {Dynamic consensus for secured vehicular ad hoc networks}, booktitle = {Wireless and Mobile Computing, Networking and Communications (WiMob), 2011 IEEE 7th International Conference on}, year = {2011}, month = {10/2011}, pages = {1{\textendash}8}, issn = {2160-4886}, doi = {10.1109/WiMOB.2011.6085418}, url = {http://ieeexplore.ieee.org/search/srchabstract.jsp?tp=\&arnumber=6085418}, author = {Jonathan Petit and Mammeri, Zoubir} } @conference {138, title = {A mobile world of security - The model}, booktitle = {Information Sciences and Systems (CISS), 2011 45th Annual Conference on}, year = {2011}, month = {March}, keywords = {Analytical models, Base stations, Computational modeling, cryptographic keys, Cryptography, Entropy, Mobile communication, mobile communication systems, mobile users, networking infrastructure, protocols, secret key sharing, telecommunication security, wireless communication}, doi = {10.1109/CISS.2011.5766242}, author = {Neuberg, C. and Papadimitratos, P. and Fragouli, C. and Urbanke, R.} } @article {dietzel:2011:modeling-in-net, title = {Modeling In-Network Aggregation in VANETs}, journal = {IEEE Communications Magazine}, volume = {49}, number = {11}, year = {2011}, month = {11/2011}, pages = {142-148}, abstract = {
The multitude of applications envisioned for vehicular ad-hoc networks (VANETs) requires efficient com- munication and dissemination mechanisms to prevent network congestion. In-network data aggregation promises to reduce bandwidth requirements and enable scalability in large vehicular networks. However, most existing aggregation schemes are tailored to specific applications and types of data. Proper comparative evaluation of different aggregation schemes is difficult. Yet, comparability is essential to properly measure accuracy, performance, and efficiency. We outline a modeling approach for VANET aggregation schemes to achieve objective comparability. Our modeling approach consists of three models, which provide different perspectives on an aggregation scheme. The generalized architecture model facilitates categorization of aggregation schemes. The aggregation information flow model supports analysis of where information is aggregated by a scheme. The aggregation state graph models how knowledge about the road network and its environment is represented by a scheme. Further, it facilitates error estimation with respect to the ground truth. We apply each modeling approach to existing aggregation schemes from the literature and highlight strengths, as well as weaknesses, that can be used as starting point for designing a more generic aggregation scheme.
}, doi = {10.1109/MCOM.2011.6069721}, author = {Stefan Dietzel and Frank Kargl and Geert Heijenk and Florian Schaub} } @article {calandriello2011performance, title = {On the Performance of Secure Vehicular Communication Systems}, journal = {IEEE Transactions on Dependable and Secure Computing (IEEE TDSC)}, volume = {8}, number = {6}, year = {2011}, month = {November}, pages = {898{\textendash}912}, author = {Calandriello, G. and Papadimitratos, P. and Hubaux, J.-P. and Lioy, A.} } @conference {143, title = {Privacy implications of in-network aggregation mechanisms for VANETs}, booktitle = {Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on}, year = {2011}, month = {Jan}, keywords = {aggregated information, Aggregates, data privacy, in-network aggregation mechanism, Measurement, privacy, privacy enhancements, privacy-sensitive information, protocols, Roads, speed information, traffic efficiency, VANET, Vehicles, vehicular ad hoc networks, wireless communication}, doi = {10.1109/WONS.2011.5720205}, author = {Dietzel, S.} } @conference {kost:2011:privacy-verific, title = {Privacy Verification using Ontologies}, booktitle = {First International Workshop on Privacy by Design}, year = {2011}, month = {08/2011}, pages = {627 - 632}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, address = {Vienna, Austria}, abstract = {As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a comprehensive approach for privacy requirement engineering, implementation, and verification is largely missing. This paper extends current design methods by additional (formal) steps which take advantage of ontologies. The proposed extensions result in a systematic approach that better protects privacy in future information systems.
}, doi = {10.1109/ARES.2011.97}, url = {http://dx.doi.org/10.1109/ARES.2011.97}, author = {Martin Kost and Johann-Christoph Freytag and Frank Kargl and Antonio Kung} } @conference {5986166, title = {Privacy-by-design in ITS applications}, booktitle = {World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2011 IEEE International Symposium on a}, year = {2011}, month = {june}, pages = {1 -6}, keywords = {automated highways, data enforcement, data minimization, data privacy, data transparency, intelligent transport system, intrinsic instability, ITS deployment, privacy-by-design approach, traffic engineering computing}, doi = {10.1109/WoWMoM.2011.5986166}, author = {Kung, A. and Freytag, J. and Kargl, F.} } @conference {kung:2011:privacy-by-desi, title = {Privacy-by-Design in ITS Applications - The Way Forward}, booktitle = {Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2011)}, year = {2011}, month = {06/2011}, address = {Lucca, Italy}, author = {Antonio Kung and Johann-Christoph Freytag and Frank Kargl} } @article {kargl2011report, title = {Report Dagstuhl Seminar 10402 Working Group on Security and Privacy}, journal = {ACM Mobile Computing and Communications Review (ACM MC2R)}, volume = {15}, number = {3}, year = {2011}, month = {July}, pages = {34 {\textendash} 34}, author = {Kargl, F. and Buttyan, L. and Eckhoff, D. and Papadimitratos, P. and Schoch, E.} } @article {dressler:2011:research-challe, title = {Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar}, journal = {IEEE Communications Magazine}, volume = {49}, number = {5}, year = {2011}, month = {05/2011}, pages = {158 - 164}, doi = {10.1109/MCOM.2011.5762813}, author = {Falko Dressler and Frank Kargl and J{\"o}rg Ott and Ozan K. Tonguz and Lars Wischof} } @conference {5970496, title = {Secure neighbor position discovery in vehicular networks}, booktitle = {Ad Hoc Networking Workshop (Med-Hoc-Net), 2011 The 10th IFIP Annual Mediterranean}, year = {2011}, pages = {71-78}, keywords = {a-priori trustworthy nodes, lightweight distributed protocol, mobile ad hoc environments, protocols, secure neighbor position discovery, security analysis, telecommunication security, vehicular ad hoc networks}, doi = {10.1109/Med-Hoc-Net.2011.5970496}, author = {Fiore, M. and Casetti, C. and Chiasserini, C. and Papadimitratos, P.} } @inbook {pp2011b1, title = {Secure Vehicular Communication Systems}, booktitle = {Encyclopedia of Cryptography and Security (2nd Edition)}, year = {2011}, publisher = {Springer}, organization = {Springer}, author = {Papadimitratos, P. and Hubaux, J.-P.}, editor = {van Tilborg, H.C.A. and Jajodia, S.} } @conference {manolopoulos2011securing, title = {Securing Smartphone based ITS}, booktitle = {IEEE International Conference on ITS Telecommunications (IEEE ITST)}, year = {2011}, month = {August}, address = {St. Petersburg, Russia}, doi = {10.1109/ITST.2011.6060053}, author = {Manolopoulos, V. and Papadimitratos, P. and Tao, S. and Rusu, A.} } @conference {petit:2011:spoofed-data-de, title = {Spoofed Data Detection in VANETs using Dynamic Thresholds}, booktitle = {Proceedings of the 3rd IEEE Vehicular Networking Conference (VNC 2011)}, year = {2011}, month = {11/2011}, pages = {25-32}, publisher = {IEEE}, organization = {IEEE}, address = {Amsterdam, The Netherlands}, doi = {10.1109/VNC.2011.6117120}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6117120\&tag=1}, author = {Jonathan Petit and Michael Feiri and Frank Kargl} }