參考文獻 |
[1] Salem, Mohammed A., et al. "QoS categories activeness-aware adaptive EDCA algorithm for dense IoT networks." International Journal of Computer Networks & Communications (IJCNC) Vol 11 (2019).
[2] J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, “An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 20, no. 5, pp. 1621–1632, May 2019
[3] J. Zhang, J. Cui, H. Zhong, Z. Chen, and L. Liu, “PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks,” IEEE Trans. Dependable Secure Comput., early access, Mar. 11, 2019, doi: 10.1109/TDSC. 2019.2904274.
[4] J. B. Kenney, “Dedicated short-range communications (DSRC) standards in the united states,” Proc. IEEE, vol. 99, no. 7, pp. 1162–1182, Jul. 2011.
[5] Dey, Kakan Chandra, et al. "Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–Performance evaluation." Transportation Research Part C: Emerging Technologies 68 (2016): 168-184.
[6] FHWA DSRC Roadside Unit (RSU) Specifications Document v4.1, October 31, 2016. Accessed on: April 30, 2021. [Online]. Available: http://www.its.dot.gov/research_archives/testbed/PDF/USDOT_RSUSpecification4%200_FInal.pdf
[7] Prompt Cloud, “The Future of Big Data Processing : Edge Computing,” Accessed on: May 30, 2021. [Online]. Available: https://www.promptcloud.com/blog/big-data-processing-edge-computing/
[8] Tong, Liang, Yong Li, and Wei Gao. "A hierarchical edge cloud architecture for mobile computing." IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, 2016.
[9] Pan, Jianli, and James McElhannon. "Future edge cloud and edge computing for internet of things applications." IEEE Internet of Things Journal 5.1 (2017): 439-449.
[10] Ning, Huansheng, et al. "Heterogeneous edge computing open platforms and tools for internet of things." Future Generation Computer Systems 106 (2020): 67-76.
[11] Zhang, Wuyang, et al. "Hetero-edge: Orchestration of real-time vision applications on heterogeneous edge clouds." IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 2019.
[12] Zhang, Jin, Qian Zhang, and Weijia Jia. "VC-MAC: A cooperative MAC protocol in vehicular networks." IEEE Transactions on vehicular technology 58.3 (2008): 1561-1571.
[13] Hao, Yong, Jin Tang, and Yu Cheng. "Secure cooperative data downloading in vehicular ad hoc networks." IEEE Journal on Selected Areas in Communications 31.9 (2013): 523-537.
[14] Phull, Nitika, and Parminder Singh. "A Review on Security Issues in VANETs." 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2019.
[15] FIPS PUB 186-4 “Digital Signature Standard (DSS), ” Information Technology Laboratory National Institute of Standards and Technology, July, 2013. Accessed on: May 30, 2021. [Online]. Available : https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
[16] Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.
[17] ANDALIB, SAAD, and SAIFUL AZAD. "The RSA algorithm." PRACTICAL CRYPTOGRAPHY (2014): 135.
[18] Weisstein, Eric W. “Fermat′s little theorem.” Accessed on: May 30, 2021. [Online]. Available: https://mathworld. wolfram. com/
[19] Tasche, Dirk. Euler allocation: Theory and practice. Technical Report, 2007.
[20] “RSA public key cryptography mechanism,” Accessed on: May 31, 2021. [Online]. Available : http://mslab.csie.asia.edu.tw/~jackjow/courses/992_InfoSecurity/ppts/IS_RSA.pdf
[21] Kakvi, Saqib A., Eike Kiltz, and Alexander May. "Certifying rsa." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2012.
[22] Chuang, Chih-Chwen, and James George Dunham. "Matrix extensions of the RSA algorithm." Conference on the Theory and Application of Cryptography. Springer, Berlin, Heidelberg, 1990.
[23] “RSA asymmetric encryption algorithm + public key encryption + encryption + digital signature,” Aug, 2011. Accessed on: May 31, 2021. [Online]. Available : https://blog.xuite.net/hellothere/blog/49077338
[24] “Digital Signature AlgorithmWiki,” Accessed on: May 31, 2021. [Online]. Available : https://en.wikipedia.org/wiki/Digital_Signature_Algorithm
[25] “DSA Algo.,” Accessed on: May 31, 2021. [Online]. Available : https://www.itsfun.com.tw/DSA%E6%BC%94%E7%AE%97%E6%B3%95/wiki-9925651-5720841
[26] Koblitz, Neal. "Elliptic curve cryptosystems." Mathematics of computation 48.177 (1987): 203-209.
[27] Johnson, Don, Alfred Menezes, and Scott Vanstone. "The elliptic curve digital signature algorithm (ECDSA)." International journal of information security 1.1 (2001): 36-63.
[28] “Elliptic curve cryptosystem,” Accessed on: May 31, 2021. [Online]. Available : http://security.nknu.edu.tw/textbook/chap6.pdf
[29] NIST Special Publication 800-57 Part 1, “Recommendation for Key Management, ” January, 2016. Accessed on: May 31, 2021. [Online]. Available : https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
[30] Kenney, John B. "Dedicated short-range communications (DSRC) standards in the United States." Proceedings of the IEEE 99.7 (2011): 1162-1182.
[31] Gonzalez-Martín, Manuel, et al. "Analytical models of the performance of C-V2X mode 4 vehicular communications." IEEE Transactions on Vehicular Technology 68.2 (2018): 1155-1166.
[32] COM, “DSRC/C-V2X standard comparison, ” Accessed on: May 31, 2021. [Online]. Available : https://www.2cm.com.tw/2cm/zh-tw/tech/1BE4026BE9BB4E13814A2832AB76AED8
[33] Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl, “V2X communication protocols,” Accessed on: May 31, 2021. [Online]. Available : https://www.sti-innsbruck.at/sites/default/files/courses/fileadmin/documents/vn-ws0809/11-VN-WAVE.pdf
[34] Lai, Chengzhe, et al. "SIRC: A secure incentive scheme for reliable cooperative downloading in highway VANETs." IEEE Transactions on Intelligent Transportation Systems 18.6 (2016): 1559-1574.
[35] Zhang, Yan, et al. "Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs." IEEE Access (2020).
[36] Cui, Jie, et al. "Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme." IEEE Journal on Selected Areas in Communications 38.6 (2020): 1191-1204.
[37] Luo, Guiyang, et al. "Cooperative vehicular content distribution in edge computing assisted 5G-VANET." China Communications 15.7 (2018): 1-17.
[38] Wen, Xiuxiu, and Peiyun Liu. "A Cooperative Vehicles Selection Method Based on Privacy-Preserving Driving Routes Comparison for Urban Scenarios." 2020 IEEE 5th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA). IEEE, 2020.
[39] US Government Publishing Office Electronic Code of Federal Regulations, 47 CFR Part 90, 2017. Accessed on: May 2, 2021. [Online]. Available: http://www.ecfr.gov/cgi-bin/text-idx?tpl=/ecfrbrowse/Title47/47cfr90_main_02.tpl
[40] Chang, James. "An overview of USDOT connected vehicle roadside unit research activities." (2017).
[41] EN 12795:2002 Dedicated Short-Range Communication (DSRC) – DSRC Data link layer: Medium Access and Logical Link Control (review), 2002. Accessed on: May 10, 2021. [Online]. Available: http://ant.comm.ccu.edu.tw/course/97_ITS/0_Lecture/Ch03_DSRC_WAVE_v3.pdf
[42] FCC 47CFR Part90 Subpart M, 2021. Accessed on: May 10, 2021. [Online]. Available: https://www.fcc.gov/wireless/bureau-divisions/technologies-systems-and-innovation-division/rules-regulations-title-47
[43] Zhang, Chenxi, et al. "RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks." 2008 IEEE international conference on communications. IEEE, 2008.
[44] Godse, Sachin P., and Parikshit N. Mahalle. "A Computational Analysis of ECC Based Novel Authentication Scheme in VANET." International Journal of Electrical & Computer Engineering (2088-8708) 8.6 (2018).
[45] Detailed EDCA mechanism, July 14, 2017. Accessed on: May 15, 2021. [Online]. Available: https://blog.csdn.net/LIN_SHUQING/article/details/75099047
[46] Yen-Chieh Cheng, “Strengthening the quality of communication IEEE 1609.4 is in full swing,” May 4, 2010. Accessed on: May 15, 2021. [Online]. Available : https://www.2cm.com.tw/2cm/zh-tw/tech/95C0F10245A34D2F98B5BE413BC81FC3
[47] OMNet++ org., “OMNet++ Discrete Event Simulator,” Accessed on: May 7, 2021. [Online]. Available: https://omnetpp.org/
[48] OMNet++ document org., “OMNeT++ Tutorials and Technical Articles, ” Accessed on: May 20, 2021. [Online]. Available: https://docs.omnetpp.org/
[49] “Tutorial of OMNET++ tools – Part 2,” Accessed on: May 15, 2021. [Online]. Available: https://www.itread01.com/content/1548426258.html
[50] SUMO org., “Simulation of Urban Mobility,” Accessed on: May 7, 2021. [Online]. Available: https://www.eclipse.org/sumo/
[51] Rodrigue Tchamna, “Sumo (Simulation of Urban Mobility) Tutorials 1) Manually Creation of Network. 2) From OSM to Network + Random Trips Simulation, 3) From OD to Trips,” March 31, 2018. Accessed on: May 16, 2021. [Online]. Available: https://www.linkedin.com/pulse/sumo-simulation-urban-mobility-tutorial-part-1-manually-tchamna
[52] Veins github, “Veins - The open source vehicular network simulation framework,” Accessed on: May 7, 2021. [Online]. Available: https://github.com/sommer/veins
[53] Veins org., “Veins - The open source vehicular network simulation framework,” Accessed on: May 15, 2021. [Online]. Available: https://veins.car2x.org/
[54] “Veins (vehicle communication simulation framework) introductory tutorial, ” Accessed on: May 15, 2021. [Online]. Available: http://www.cxyzjd.com/article/xiaoxiao123jun/79406654
[55] OpenStreetMap wiki, “OpenStreetMap,” Accessed on: May 15, 2021. [Online]. Available: https://zh.wikipedia.org/wiki/%E9%96%8B%E6%94%BE%E8%A1%97%E5%9C%96
[56] Osm.org., “Open Street Map・Taiwan,” Accessed on: May 15, 2021. [Online]. Available: https://osm.tw/
[57] Crypto++ org., “Crypto++® Library 8.5,” Accessed on: May 15, 2021. [Online]. Available: https://www.cryptopp.com/
[58] Conrad Chung, 2BrightSparks, “An Introduction to FTP, ” Accessed on: May 17, 2021. [Online]. Available: https://www.2brightsparks.com/resources/articles/an-introduction-to-ftp.pdf
[59] Lawrence Abrams, “Introduction to the File Transfer Protocol (FTP),” April 2, 2004. Accessed on: May 17, 2021. [Online]. Available : https://www.bleepingcomputer.com/tutorials/introduction-to-ftp/
[60] SUMO Document, “netconvert tutorial,” Accessed on: May 19, 2021. [Online]. Available : https://sumo.dlr.de/docs/netconvert.html
[61] SUMO Document, “polyconvert tutorial,” Accessed on: May 19, 2021. [Online]. Available : https://sumo.dlr.de/docs/polyconvert.html
[62] Consul, Prem C., and Gaurav C. Jain. "A generalization of the Poisson distribution." Technometrics 15.4 (1973): 791-799.
[63] Busanelli, Stefano, Gianluigi Ferrari, and Roberto Gruppini. "Performance analysis of broadcast protocols in VANETs with Poisson vehicle distribution." 2011 11th International Conference on ITS Telecommunications. IEEE, 2011.
[64] Freeway BUREUA, MOTTC, “Speed limit for major sections of the national highway,” Jan 25, 2017. Accessed on: May 22, 2021. [Online]. Available: https://www.freeway.gov.tw/Publish.aspx?cnid=183&p=6
[65] Rachmawati, Dian, J. T. Tarigan, and A. B. C. Ginting. "A comparative study of Message Digest 5 (MD5) and SHA256 algorithm." Journal of Physics: Conference Series. Vol. 978. No. 1. IOP Publishing, 2018.
[66] Moriarty, Kathleen, et al. "PKCS# 1: RSA cryptography specifications version 2.2." Internet Engineering Task Force, Request for Comments 8017 (2016).
[67] Kerry, Cameron F., and Patrick D. Gallagher. "Digital signature standard (DSS)." FIPS PUB (2013): 186-4.
[68] Bi, Wei, Xiaoyun Jia, and Maolin Zheng. "A secure multiple elliptic curves digital signature algorithm for blockchain." arXiv preprint arXiv:1808.02988 (2018).
[69] Courtois, Nicolas, Guangyan Song, and Ryan Castellucci. "Speed optimizations in Bitcoin key recovery attacks." Tatra Mountains Mathematical Publications-The Journal of Slovak Academy of Sciences 67.1 (2016): 55-68.
[70] Bitcoin-core secp256k1 github, “secp256k1 guthub, ” Accessed on: May 15, 2021. [Online]. Available: https://github.com/bitcoin-core/secp256k1
[71] Fernández-Carames, Tiago M., and Paula Fraga-Lamas. "Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks." IEEE access 8 (2020): 21091-21116.
[72] NIST,.” Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process: NISTIR 8309,” July, 2020. Accessed on: July 20, 2021. [Online]. Available: https://csrc.nist.gov/publications/detail/nistir/8309/final
[73] C.H. Luo, “Comprehensive analysis of FIDO network identity, ” February 5, 2019. Accessed on: June 10, 2021. [Online]. Available: https://www.ithome.com.tw/news/128566 |