Serveur d'exploration sur les relations entre la France et l'Australie

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Securing mobile network prefix provisioning for NEMO based vehicular networks

Identifieur interne : 001682 ( PascalFrancis/Corpus ); précédent : 001681; suivant : 001683

Securing mobile network prefix provisioning for NEMO based vehicular networks

Auteurs : Jong-Hyouk Lee ; JIEFENG CHEN ; Thierry Ernst

Source :

RBID : Pascal:12-0040246

Descripteurs français

English descriptors

Abstract

The recently developed mobile network prefix provisioning (MNPP) enables a direct communication, i.e., Route Optimization (RO), between vehicular mobile routers (VMRs). However, without being secured, MNPP is vulnerable to various threats such as spoofing, replay, and wormhole attacks as well as location tracking. In this paper, possible threats to MNPP are identified with suggestions of security requirements. Then, three different security approaches (five different security mechanisms) for securing MNPP are introduced and compared.

Notice en format standard (ISO 2709)

Pour connaître la documentation sur le format Inist Standard.

pA  
A01 01  1    @0 0895-7177
A03   1    @0 Math. comput. model.
A05       @2 55
A06       @2 1-2
A08 01  1  ENG  @1 Securing mobile network prefix provisioning for NEMO based vehicular networks
A09 01  1  ENG  @1 Advanced Theory and Practice for Cryptography and Future Security
A11 01  1    @1 LEE (Jong-Hyouk)
A11 02  1    @1 JIEFENG CHEN
A11 03  1    @1 ERNST (Thierry)
A12 01  1    @1 PRENEEL (Bart) @9 ed.
A12 02  1    @1 KIM (Jongsung) @9 ed.
A12 03  1    @1 SAUVERON (Damien) @9 ed.
A14 01      @1 IMARA Team @2 INRIA @3 FRA @Z 1 aut. @Z 3 aut.
A14 02      @1 National ICT Australia and University of New South Wales @3 AUS @Z 2 aut.
A15 01      @1 Katholieke Universiteit Leuven, Kasteelpark Arenberg 10 (Heverlee) bus 2441 @2 Leuven 3001 @3 BEL @Z 1 aut.
A15 02      @1 Dept. of Computer Science and Engineering, Kyungnam University, 449 Wolyoung-dong @2 Masan, Kyungnam 631-701 @3 KOR @Z 2 aut.
A15 03      @1 IRCOM-CNRS, Université de Limoges @2 Limoges @3 FRA @Z 3 aut.
A20       @1 170-187
A21       @1 2012
A23 01      @0 ENG
A43 01      @1 INIST @2 18808 @5 354000507387570190
A44       @0 0000 @1 © 2012 INIST-CNRS. All rights reserved.
A45       @0 20 ref.
A47 01  1    @0 12-0040246
A60       @1 P
A61       @0 A
A64 01  1    @0 Mathematical and computer modelling
A66 01      @0 GBR
C01 01    ENG  @0 The recently developed mobile network prefix provisioning (MNPP) enables a direct communication, i.e., Route Optimization (RO), between vehicular mobile routers (VMRs). However, without being secured, MNPP is vulnerable to various threats such as spoofing, replay, and wormhole attacks as well as location tracking. In this paper, possible threats to MNPP are identified with suggestions of security requirements. Then, three different security approaches (five different security mechanisms) for securing MNPP are introduced and compared.
C02 01  X    @0 001A02I02
C02 02  X    @0 001A02E18
C02 03  X    @0 001A02I01P2
C03 01  X  FRE  @0 Mathématiques appliquées @5 01
C03 01  X  ENG  @0 Applied mathematics @5 01
C03 01  X  SPA  @0 Matemáticas aplicadas @5 01
C03 02  X  FRE  @0 Modèle mathématique @5 02
C03 02  X  ENG  @0 Mathematical model @5 02
C03 02  X  SPA  @0 Modelo matemático @5 02
C03 03  X  FRE  @0 Analyse assistée @5 03
C03 03  X  ENG  @0 Computer aided analysis @5 03
C03 03  X  SPA  @0 Análisis asistido @5 03
C03 04  X  FRE  @0 Analyse numérique @5 04
C03 04  X  ENG  @0 Numerical analysis @5 04
C03 04  X  SPA  @0 Análisis numérico @5 04
C03 05  X  FRE  @0 Programmation mathématique @5 05
C03 05  X  ENG  @0 Mathematical programming @5 05
C03 05  X  SPA  @0 Programación matemática @5 05
C03 06  X  FRE  @0 Calcul variationnel @5 06
C03 06  X  ENG  @0 Variational calculus @5 06
C03 06  X  SPA  @0 Cálculo de variaciones @5 06
C03 07  X  FRE  @0 Méthode optimisation @5 17
C03 07  X  ENG  @0 Optimization method @5 17
C03 07  X  SPA  @0 Método optimización @5 17
C03 08  X  FRE  @0 49XX @4 INC @5 70
C03 09  X  FRE  @0 65Kxx @4 INC @5 71
C03 10  X  FRE  @0 65K10 @4 INC @5 72
N21       @1 023
N44 01      @1 OTO
N82       @1 OTO

Format Inist (serveur)

NO : PASCAL 12-0040246 INIST
ET : Securing mobile network prefix provisioning for NEMO based vehicular networks
AU : LEE (Jong-Hyouk); JIEFENG CHEN; ERNST (Thierry); PRENEEL (Bart); KIM (Jongsung); SAUVERON (Damien)
AF : IMARA Team/INRIA/France (1 aut., 3 aut.); National ICT Australia and University of New South Wales/Australie (2 aut.); Katholieke Universiteit Leuven, Kasteelpark Arenberg 10 (Heverlee) bus 2441/Leuven 3001/Belgique (1 aut.); Dept. of Computer Science and Engineering, Kyungnam University, 449 Wolyoung-dong/Masan, Kyungnam 631-701/Corée, République de (2 aut.); IRCOM-CNRS, Université de Limoges/Limoges/France (3 aut.)
DT : Publication en série; Niveau analytique
SO : Mathematical and computer modelling; ISSN 0895-7177; Royaume-Uni; Da. 2012; Vol. 55; No. 1-2; Pp. 170-187; Bibl. 20 ref.
LA : Anglais
EA : The recently developed mobile network prefix provisioning (MNPP) enables a direct communication, i.e., Route Optimization (RO), between vehicular mobile routers (VMRs). However, without being secured, MNPP is vulnerable to various threats such as spoofing, replay, and wormhole attacks as well as location tracking. In this paper, possible threats to MNPP are identified with suggestions of security requirements. Then, three different security approaches (five different security mechanisms) for securing MNPP are introduced and compared.
CC : 001A02I02; 001A02E18; 001A02I01P2
FD : Mathématiques appliquées; Modèle mathématique; Analyse assistée; Analyse numérique; Programmation mathématique; Calcul variationnel; Méthode optimisation; 49XX; 65Kxx; 65K10
ED : Applied mathematics; Mathematical model; Computer aided analysis; Numerical analysis; Mathematical programming; Variational calculus; Optimization method
SD : Matemáticas aplicadas; Modelo matemático; Análisis asistido; Análisis numérico; Programación matemática; Cálculo de variaciones; Método optimización
LO : INIST-18808.354000507387570190
ID : 12-0040246

Links to Exploration step

Pascal:12-0040246

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">Securing mobile network prefix provisioning for NEMO based vehicular networks</title>
<author>
<name sortKey="Lee, Jong Hyouk" sort="Lee, Jong Hyouk" uniqKey="Lee J" first="Jong-Hyouk" last="Lee">Jong-Hyouk Lee</name>
<affiliation>
<inist:fA14 i1="01">
<s1>IMARA Team</s1>
<s2>INRIA</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Jiefeng Chen" sort="Jiefeng Chen" uniqKey="Jiefeng Chen" last="Jiefeng Chen">JIEFENG CHEN</name>
<affiliation>
<inist:fA14 i1="02">
<s1>National ICT Australia and University of New South Wales</s1>
<s3>AUS</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Ernst, Thierry" sort="Ernst, Thierry" uniqKey="Ernst T" first="Thierry" last="Ernst">Thierry Ernst</name>
<affiliation>
<inist:fA14 i1="01">
<s1>IMARA Team</s1>
<s2>INRIA</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">12-0040246</idno>
<date when="2012">2012</date>
<idno type="stanalyst">PASCAL 12-0040246 INIST</idno>
<idno type="RBID">Pascal:12-0040246</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">001682</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">Securing mobile network prefix provisioning for NEMO based vehicular networks</title>
<author>
<name sortKey="Lee, Jong Hyouk" sort="Lee, Jong Hyouk" uniqKey="Lee J" first="Jong-Hyouk" last="Lee">Jong-Hyouk Lee</name>
<affiliation>
<inist:fA14 i1="01">
<s1>IMARA Team</s1>
<s2>INRIA</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Jiefeng Chen" sort="Jiefeng Chen" uniqKey="Jiefeng Chen" last="Jiefeng Chen">JIEFENG CHEN</name>
<affiliation>
<inist:fA14 i1="02">
<s1>National ICT Australia and University of New South Wales</s1>
<s3>AUS</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Ernst, Thierry" sort="Ernst, Thierry" uniqKey="Ernst T" first="Thierry" last="Ernst">Thierry Ernst</name>
<affiliation>
<inist:fA14 i1="01">
<s1>IMARA Team</s1>
<s2>INRIA</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Mathematical and computer modelling</title>
<title level="j" type="abbreviated">Math. comput. model.</title>
<idno type="ISSN">0895-7177</idno>
<imprint>
<date when="2012">2012</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Mathematical and computer modelling</title>
<title level="j" type="abbreviated">Math. comput. model.</title>
<idno type="ISSN">0895-7177</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Applied mathematics</term>
<term>Computer aided analysis</term>
<term>Mathematical model</term>
<term>Mathematical programming</term>
<term>Numerical analysis</term>
<term>Optimization method</term>
<term>Variational calculus</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Mathématiques appliquées</term>
<term>Modèle mathématique</term>
<term>Analyse assistée</term>
<term>Analyse numérique</term>
<term>Programmation mathématique</term>
<term>Calcul variationnel</term>
<term>Méthode optimisation</term>
<term>49XX</term>
<term>65Kxx</term>
<term>65K10</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">The recently developed mobile network prefix provisioning (MNPP) enables a direct communication, i.e., Route Optimization (RO), between vehicular mobile routers (VMRs). However, without being secured, MNPP is vulnerable to various threats such as spoofing, replay, and wormhole attacks as well as location tracking. In this paper, possible threats to MNPP are identified with suggestions of security requirements. Then, three different security approaches (five different security mechanisms) for securing MNPP are introduced and compared.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0895-7177</s0>
</fA01>
<fA03 i2="1">
<s0>Math. comput. model.</s0>
</fA03>
<fA05>
<s2>55</s2>
</fA05>
<fA06>
<s2>1-2</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG">
<s1>Securing mobile network prefix provisioning for NEMO based vehicular networks</s1>
</fA08>
<fA09 i1="01" i2="1" l="ENG">
<s1>Advanced Theory and Practice for Cryptography and Future Security</s1>
</fA09>
<fA11 i1="01" i2="1">
<s1>LEE (Jong-Hyouk)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>JIEFENG CHEN</s1>
</fA11>
<fA11 i1="03" i2="1">
<s1>ERNST (Thierry)</s1>
</fA11>
<fA12 i1="01" i2="1">
<s1>PRENEEL (Bart)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="02" i2="1">
<s1>KIM (Jongsung)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="03" i2="1">
<s1>SAUVERON (Damien)</s1>
<s9>ed.</s9>
</fA12>
<fA14 i1="01">
<s1>IMARA Team</s1>
<s2>INRIA</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>National ICT Australia and University of New South Wales</s1>
<s3>AUS</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA15 i1="01">
<s1>Katholieke Universiteit Leuven, Kasteelpark Arenberg 10 (Heverlee) bus 2441</s1>
<s2>Leuven 3001</s2>
<s3>BEL</s3>
<sZ>1 aut.</sZ>
</fA15>
<fA15 i1="02">
<s1>Dept. of Computer Science and Engineering, Kyungnam University, 449 Wolyoung-dong</s1>
<s2>Masan, Kyungnam 631-701</s2>
<s3>KOR</s3>
<sZ>2 aut.</sZ>
</fA15>
<fA15 i1="03">
<s1>IRCOM-CNRS, Université de Limoges</s1>
<s2>Limoges</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</fA15>
<fA20>
<s1>170-187</s1>
</fA20>
<fA21>
<s1>2012</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA43 i1="01">
<s1>INIST</s1>
<s2>18808</s2>
<s5>354000507387570190</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2012 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>20 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>12-0040246</s0>
</fA47>
<fA60>
<s1>P</s1>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Mathematical and computer modelling</s0>
</fA64>
<fA66 i1="01">
<s0>GBR</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>The recently developed mobile network prefix provisioning (MNPP) enables a direct communication, i.e., Route Optimization (RO), between vehicular mobile routers (VMRs). However, without being secured, MNPP is vulnerable to various threats such as spoofing, replay, and wormhole attacks as well as location tracking. In this paper, possible threats to MNPP are identified with suggestions of security requirements. Then, three different security approaches (five different security mechanisms) for securing MNPP are introduced and compared.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001A02I02</s0>
</fC02>
<fC02 i1="02" i2="X">
<s0>001A02E18</s0>
</fC02>
<fC02 i1="03" i2="X">
<s0>001A02I01P2</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Mathématiques appliquées</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Applied mathematics</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Matemáticas aplicadas</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Modèle mathématique</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Mathematical model</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Modelo matemático</s0>
<s5>02</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Analyse assistée</s0>
<s5>03</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Computer aided analysis</s0>
<s5>03</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Análisis asistido</s0>
<s5>03</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Analyse numérique</s0>
<s5>04</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Numerical analysis</s0>
<s5>04</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Análisis numérico</s0>
<s5>04</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE">
<s0>Programmation mathématique</s0>
<s5>05</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG">
<s0>Mathematical programming</s0>
<s5>05</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA">
<s0>Programación matemática</s0>
<s5>05</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE">
<s0>Calcul variationnel</s0>
<s5>06</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG">
<s0>Variational calculus</s0>
<s5>06</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA">
<s0>Cálculo de variaciones</s0>
<s5>06</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE">
<s0>Méthode optimisation</s0>
<s5>17</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG">
<s0>Optimization method</s0>
<s5>17</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA">
<s0>Método optimización</s0>
<s5>17</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE">
<s0>49XX</s0>
<s4>INC</s4>
<s5>70</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE">
<s0>65Kxx</s0>
<s4>INC</s4>
<s5>71</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE">
<s0>65K10</s0>
<s4>INC</s4>
<s5>72</s5>
</fC03>
<fN21>
<s1>023</s1>
</fN21>
<fN44 i1="01">
<s1>OTO</s1>
</fN44>
<fN82>
<s1>OTO</s1>
</fN82>
</pA>
</standard>
<server>
<NO>PASCAL 12-0040246 INIST</NO>
<ET>Securing mobile network prefix provisioning for NEMO based vehicular networks</ET>
<AU>LEE (Jong-Hyouk); JIEFENG CHEN; ERNST (Thierry); PRENEEL (Bart); KIM (Jongsung); SAUVERON (Damien)</AU>
<AF>IMARA Team/INRIA/France (1 aut., 3 aut.); National ICT Australia and University of New South Wales/Australie (2 aut.); Katholieke Universiteit Leuven, Kasteelpark Arenberg 10 (Heverlee) bus 2441/Leuven 3001/Belgique (1 aut.); Dept. of Computer Science and Engineering, Kyungnam University, 449 Wolyoung-dong/Masan, Kyungnam 631-701/Corée, République de (2 aut.); IRCOM-CNRS, Université de Limoges/Limoges/France (3 aut.)</AF>
<DT>Publication en série; Niveau analytique</DT>
<SO>Mathematical and computer modelling; ISSN 0895-7177; Royaume-Uni; Da. 2012; Vol. 55; No. 1-2; Pp. 170-187; Bibl. 20 ref.</SO>
<LA>Anglais</LA>
<EA>The recently developed mobile network prefix provisioning (MNPP) enables a direct communication, i.e., Route Optimization (RO), between vehicular mobile routers (VMRs). However, without being secured, MNPP is vulnerable to various threats such as spoofing, replay, and wormhole attacks as well as location tracking. In this paper, possible threats to MNPP are identified with suggestions of security requirements. Then, three different security approaches (five different security mechanisms) for securing MNPP are introduced and compared.</EA>
<CC>001A02I02; 001A02E18; 001A02I01P2</CC>
<FD>Mathématiques appliquées; Modèle mathématique; Analyse assistée; Analyse numérique; Programmation mathématique; Calcul variationnel; Méthode optimisation; 49XX; 65Kxx; 65K10</FD>
<ED>Applied mathematics; Mathematical model; Computer aided analysis; Numerical analysis; Mathematical programming; Variational calculus; Optimization method</ED>
<SD>Matemáticas aplicadas; Modelo matemático; Análisis asistido; Análisis numérico; Programación matemática; Cálculo de variaciones; Método optimización</SD>
<LO>INIST-18808.354000507387570190</LO>
<ID>12-0040246</ID>
</server>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Asie/explor/AustralieFrV1/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001682 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 001682 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Asie
   |area=    AustralieFrV1
   |flux=    PascalFrancis
   |étape=   Corpus
   |type=    RBID
   |clé=     Pascal:12-0040246
   |texte=   Securing mobile network prefix provisioning for NEMO based vehicular networks
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Dec 5 10:43:12 2017. Site generation: Tue Mar 5 14:07:20 2024