Norbert Bißmeyer

Learn More
Many Intrusion Detection approaches for Vehicular ad hoc networks (VANETs) are proposed. However, not moving fake vehicles and vehicles with a plausible mobility model are not considered in other approaches. In this paper we propose an innovative signature based intrusion detection method that verifies vehicle movement data by applying a plausibility model.(More)
Wireless communication between vehicles is protected by digital certificates but these certificates and related identifiers must not be usable to track vehicles. Therefore, short-term pseudonymous certificates are applied and regularly changed in order to protect the driver's privacy. But in well defined situations, e.g. network attacks or traffic(More)
Most applications considered in Vehicular Adhoc Networks (VANETs) base their calculations on the location of vehicle and roadside units. Therefore, the trustworthiness of this data is essential in Intelligent Transport System (ITS) and can be addressed by digitally signing sent location information. However, we have to assume that an attacker is able to get(More)
In Vehicular Ad-Hoc Networks (VANETs), the exchange of location data (i.e. absolute position, heading, time) for traffic safety applications plays an important role. The trustworthiness of this information is crucial as false data affects applications heavily and might endanger human lives. Beside cryptographic solutions that ensure sender authenticity and(More)
Mobile ad hoc networks (MANETs) are particularly vulnerable to attacks from malicious nodes as the reliability of all communication and data exchange on the network depends on collaboration of participating network nodes.In order to strengthen overall mobile network security and avoid attack, malicious nodes should be detected and appropriate measures(More)
Vehicular Ad-hoc Networks (VANETs) aim to increase, among others, traffic safety and efficiency by warning and informing the driver about road events and hazards. Due to their direct impact on drivers' safety, external and internal attacks have to be prevented. While authentication prevents most of the external attacks, internal attackers are still able to(More)
  • 1