參考文獻 |
[1] E. Schmitt, H. Jula, “Vehicle Route Guidance Systems: Classification and Comparison,” in Proc. IEEE ITSC, Sep. 2006, pp. 242-247.
[2] ITS Taiwan, http://www.its-taiwan.org.tw/its-taiwan-2.htm
[3] RITA | ITS | Applications Overview, http://www.itsoverview.its.dot.gov
[4] Institute of Transportation, http://www.iot.gov.tw/mp.asp
[5] National ITS Architechure, http://www.iteris.com/itsarch
[6] J. Zhu and S. Roy, "MAC for Dedicated Short Range Communications in Intelligent Transport System," IEEE Comm., vol. 12, no. 41, Dec. 2003, pp. 60–67.
[7] http://grouper.ieee.org/groups/802/11/Reports/802.11_Timelines.htm
[8] Y. Sugiyama, M. Fukui, M. Kikuchi, K. Hasebe, A. Nakayama, K. Nishinari, S.-i. Tadaki, and S, Yukawa, “Traffic jams without bottlenecks—experimental evidence for the physical mechanism of the formation of a jam,” New Journal of Physics 10, 033001 (2008).
[9] J. Zhao and G. Cao, "VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks," IEEE Trans. Veh. Technol., Vol. 57, No. 3, pp. 1910-1922, May. 2008.
[10] Li. Li, F.Y. Wang, “Cooperative Driving at Blind Crossings Using Intervehicle Commnication,” IEEE Trans. Veh. Technol., Vol. 55, No. 6, p1712~1724, Nov. 2006
[11] O. Kwon, S.H. Lee, J.S. Kim, M.S Kim, K.J Li, “Collision Prediction at Intersection in Sensor Network Environment,” in Proc. IEEE ITSC, Sep. 2006, pp. 982-987.
[12] L. Le, A. Festag, R. Baldessari, and W. Zhang. “Communication-Based Intersection Safety: Motivation, Challenges and State-of-the-Art,” in 6th Int. Workshop on Intelligent Transportation (WIT), March 2009.
[13] S. Morinaka, T. Nishi, M. Konishi, and J. Imai, "A distributed routing. method for multiple agvs for motion delay disturbances," in Proc. IEEE IROS, Aug. 2005, pp. 1986-1991.
[14] B. Karp and H. T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks,” in Proc. Int. Conf. MobiCom, Aug. 2000, pp. 243-254.
[15] IEEE standard for wireless access in vehicular environments - security services for applications and management messages. IEEE Std. 1609.2-2013
[16] Intelligent transport systems (its); security; trust and privacy management. ETSI TS 102 940 V1.1.1 (2012-06)
[17] Aubernon, C.: NHTSA Unveils Plan Instituting New V2V Technology By 2020. http://www.thetruthaboutcars.com/2014/08/nhtsa-unveils-plan-instituting- new-v2v-technology-by-2020/ (2014), [2014-08-19]
[18] Bai, F., Krishnan, H., Sadekar, V., Holland, G., ElBatt, T.: Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In: IN PROCEEDINGS OF IEEE WORKSHOP ON AUTOMOTIVE NETWORKING AND APPLICATIONS (AUTONET) (2006)
[19] Chen, R., Jin, W.L., Regan, A.: Broadcasting safety information in vehicular networks: issues and approaches. IEEE Network 24(1), 20–25 (Jan 2010)
[20] Cheng, J., Fu, A.W.c., Liu, J.: K-isomorphism: Privacy preserving network publication against structural attacks. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. pp. 459–470. SIGMOD ’10, ACM, New York, NY, USA (2010), http://doi.acm.org/10.1145/1807167.1807218
[21] Douceur, J.R.: The sybil attack. In: Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS) (2002), http://research.microsoft. com/apps/pubs/default.aspx?id=74220
[22] Dwork, C.: Differential privacy. In: 33rd International Colloquium on Automata, Languages and Programming, part II (ICALP 2006). Lecture Notes in Computer Science, vol. 4052, pp. 1–12. Springer Verlag, Venice, Italy (July 2006)
[23] Dwork, C.: Theory and Applications of Models of Computation: 5th International Conference, TAMC 2008, Xi’an, China, April 25-29, 2008. Proceedings, chap. Differential Privacy: A Survey of Results, pp. 1–19. Springer Berlin Heidelberg, Berlin, Heidelberg (2008), http://dx.doi.org/10.1007/978-3-540-79228-4_1
[24] Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of anonymity in vanets - putting pseudonymity into practice. In: Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE. pp. 3400–3405 (March 2007)
[25] Haas, J., Hu, Y.C., Laberteaux, K.: Efficient certificate revocation list organization and distribution. Selected Areas in Communications, IEEE Journal on 29(3), 595– 604 (March 2011)
[26] Hartenstein, H., Laberteaux, L.P.: A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine 46(6), 164–171 (June 2008)
[27] Khodaei, M., Jin, H., Papadimitratos, P.: Towards deploying a scalable amp; robust vehicular identity and credential management infrastructure. In: 2014 IEEE Vehicular Networking Conference (VNC). pp. 33–40 (Dec 2014)
[28] Khodaei, M., Papadimitratos, P.: The key to intelligent transportation: Identity and credential management in vehicular communication systems. IEEE Vehicular Technology Magazine 10(4), 63–69 (Dec 2015)
[29] Krajzewicz, D., Erdmann, J., Behrisch, M., Bieker, L.: Recent development and applications of SUMO - Simulation of Urban MObility. International Journal On Advances in Systems and Measurements 5(3&4), 128–138 (December 2012)
[30] Li, F., Wang, Y.: Routing in vehicular ad hoc networks: A survey. Vehicular Technology Magazine, IEEE 2(2), 12–22 (June 2007)
[31] Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. pp. 93–106. SIGMOD ’08, ACM, New York, NY, USA (2008), http://doi.acm.org/10. 1145/1376616.1376629
[32] Mittal, P., Papamanthou, C., Song, D.X.: Preserving link privacy in social network based systems. In: NDSS (2013)
[33] Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: A survey. Communications Surveys Tutorials, IEEE 17(1), 228–255 (Firstquarter 2015)
[34] Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of misbehaving and faulty nodes in vehicular networks. Selected Areas in Communications, IEEE Journal on 25(8), 1557–1568 (Oct 2007)
[35] Reidt, S., Srivatsa, M., Balfe, S.: The fable of the bees: Incentivizing robust revocation decision making in ad hoc networks. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. pp. 291–302. CCS ’09, ACM, New York, NY, USA (2009), http://doi.acm.org/10.1145/1653662.1653698
[36] Ruj, S., Cavenaghi, M., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in vanets. In: Vehicular Technology Conference (VTC Fall), 2011 IEEE. pp. 1–5 (Sept 2011)
[37] Sarathy, R., Muralidhar, K.: Evaluating laplace noise addition to satisfy differential privacy for numeric data. Trans. Data Privacy 4(1), 1–17 (Apr 2011), http://dl.acm. org/citation.cfm?id=2019312.2019313
[38] Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together efficient authentication, revocation, and privacy in vanets. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. pp. 1–9 (June 2009)
[39] Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Personal Ubiquitous Comput. 18(1), 163–175 (Jan 2014), http://dx.doi.org/10.1007/s00779-012-0633-z
[40] Whyte, W., Weimerskirch, A., Kumar, V., Hehn, T.: A security credential management system for v2v communications. In: Vehicular Networking Conference (VNC), 2013 IEEE. pp. 1–8 (Dec 2013)
[41] Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In: Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on. pp. 176–183 (Feb 2010)
[42] Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: Defending against sybil attacks via social networks. SIGCOMM Comput. Commun. Rev. 36(4), 267–278 (Aug 2006), http://doi.acm.org/10.1145/1151659.1159945
[43] Zeadally, S., Hunt, R., Chen, Y.S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (vanets): status, results, and challenges. Telecommunication Systems 50(4), 217–241 (2010), http://dx.doi.org/10.1007/s11235-010-9400-5
[44] Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems 28(1), 47–77 (2010), http://dx.doi.org/10.1007/s10115-010-0311-2 |