Security in Vehicular Communication Networking

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (15 January 2016) | Viewed by 417

Special Issue Editors


E-Mail Website
Guest Editor
Department of Electrical and Computer Engineering, College Station, Texas A&M University, College Station, TX 77843, USA
Interests: physical informatics; sensors; unconditional security;nanomaterials/structures; aging/degradation; percolation; fluctuation-enhanced sensing; noise-based computation; thermal demons/engines
Special Issues, Collections and Topics in MDPI journals

E-Mail
Guest Editor
Texas A&M Transportation Institute, Texas A&M University, College Station, TX 77843-3135, USA
Interests: intelligent transportation systems; traffic operations and control; traffic flow theory; traffic simulation and modeling

E-Mail
Guest Editor
Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843-3128, USA
Interests: KLJN secure key exchange; unconditionally secure vehicular communications; bit error analysis and mitigation; etc.

Special Issue Information

Dear Colleagues,

The intelligent vehicular system is an emerging research topic that promises to improve road safety, mobility, and efficiency. New features and technologies, such as advanced sensing, computing, and communication protocols, will allow vehicles to share information with each other and with other road infrastructure, creating a “smarter” and more efficient vehicular system. Unfortunately, this integration of new technology and various levels of interconnectivity create new vulnerabilities in the system that raises important security and privacy concerns.  For instance, a malicious user could propagate false information that could affect the decisions of other drivers, which in some cases may lead to catastrophic events. Also, an attacker could monitor the location of a given car or listen to financial transactions to steal credit cards and/or personal information.  Therefore, one of the goals in the design of such networks is to build a robust security architecture that is able to resist malicious activity. This Special Issue features a suite of novel mechanisms and schemes for achieving secure communications and user privacy in vehicular communication networks. The topics include, but are not limited to, the general security and privacy aspects of vehicular communication networks, particular security threats, secure key distribution, ciphers, information leaks, the design of robust security architecture, protection against active (invasive) attacks, etc.

Prof. Dr. Laszlo B. Kish
Dr. Yessica Saez
Dr. Geza Pesti
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • vehicular ad hoc networks
  • secure key distribution
  • passive and active attacks
  • network security
  • security architecture
  • privacy
  • authentication
  • data integrity

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop