Learn More
Vehicular Ad hoc Networks are the focus of increased attention by vehicle manufacturers. However, their deployment requires that security issues be resolved, particularly since they rely on wireless communication, and rogue vehicles can roam with contaminated software. This paper examines security threats to VANETs and argues that a security architecture(More)
Vehicular Ad hoc Networks get increased attention by vehicle manufacturers and researchers. Their deployment requires that security and privacy issues be resolved, particularly since they rely on wireless communication. In this paper, we propose a TPM-based security architecture, where TPM are embedded in vehicles. We emphasize the management of(More)
A Vehicular Ad hoc Network is a collection of mobile hosts forming a temporary network without the aid of any established infrastructure. This flexibility in space and time induces new challenges towards the security needed to support secure communications. Indeed, VANET are subject to attacks due to their vulnerabilities; one of the most compromising(More)
Reputation systems allow to estimate the trustworthiness of entities based on their past behavior. Electronic commerce, peer-to-peer routing and collaborative environments, just to cite a few, highly benefit from using reputation systems. To guarantee an accurate estimation, reputation systems typically rely on a central authority, on the identification and(More)
We present the AMORES project, which aims to provide an architecture for the provision of privacy preserving and resilient collaborative services in "mobiquitous" (i.e., mobile and ubiquitous) systems. The project is built around three use-cases from the area of public transportation: (1) dynamic carpooling, (2) real-time computation of multimodal(More)
More and more mobile devices feature wireless communication capabilities. They can self-organize in a mobile ad hoc network in order to communicate and maintain connectivity without any infrastructure component. In this context, some devices may benefit from established trust relations in order to communicate private data. Various solutions already exist(More)