博碩士論文 964403007 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:46 、訪客IP:13.59.147.228
姓名 魏銪志(Yu-Chih Wei)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 車載網路中精確且高效率的信任管理系統
(An Accurate and Efficient Trust Management System in VANETs)
相關論文
★ 應用數位版權管理機制於數位影音光碟內容保護之研究★ 以應用程式虛擬化技術達成企業軟體版權管理之研究
★ 以IAX2為基礎之網頁電話架構設計★ 應用機器學習技術協助警察偵辦詐騙案件之研究
★ 擴充防止詐欺及保護隱私功能之帳戶式票務系統研究-以大眾運輸為例★ 網際網路半結構化資料之蒐集與整合研究
★ 電子商務環境下網路購物幫手之研究★ 網路安全縱深防護機制之研究
★ 國家寬頻實驗網路上資源預先保留與資源衝突之研究★ 以樹狀關聯式架構偵測電子郵件病毒之研究
★ 考量地區差異性之隨選視訊系統影片配置研究★ 不信任區域網路中數位證據保留之研究
★ 入侵偵測系統事件說明暨自動增加偵測規則之整合性輔助系統研發★ 利用程序追蹤方法關聯分散式入侵偵測系統之入侵警示研究
★ 一種網頁資訊擷取程式之自動化產生技術研發★ 應用XML/XACML於工作流程管理系統之授權管制研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在車載網路(VANETs)中,如何確保事件訊息的可信度在近幾年來一直獲得相當多的關注,希望可增加車輛的安全性與確保隱私防護機制不會影響到信任關係的建立。傳統相關研究的主要不足在於隱私保護、快速轉傳惡意訊息以及在共謀攻擊的情況下,嚴重的影響信任管理系統在事件訊息可信度決策的準確性,此外傳統決策判斷造的延遲時間更是影響車輛安全的重要因素。
為了解決傳統研究上的不足,本研究提出一個利用路側單元(RSU)與信標(Beacon)為基礎的信任管理系統,可有效對抗快速轉傳的惡意訊息及共謀攻擊。而在隱私防護及確保信任關係的有效性上,本研究提出安全廣播認證協定,除了可以有效確保廣播訊息的隱私性外,亦可作為信任關係建立的基礎。而在縮短決策的延遲時間部份,本研究採用了調適性的決策模式,藉由車旁單位快速提供輔助資訊,可有效縮短決策的延遲時間。
為了評估系統的可靠性與效率,本研究在不同假造訊息或變造訊息攻擊比例組合下及共謀攻擊發生時進行大量的模擬測試與比較,得到的結果,顯示本研究所提出的系統足以抵抗訊息丟棄攻擊、訊息修改攻擊及假訊息攻擊,並且表現較比較對象於準確度至少可超過23%以上,在決策延遲時間至少可縮短12%以上,在共謀攻擊的情況下在準確度與延遲時間仍可以有超過18%及14%領先比較對象。
摘要(英) In VANETs, how to determine the trustworthiness of event messages has received many attentions in recent years for improving the traffic safety and ensuring the location privacy of vehicles. In existing researches, the decision making accuracy on event message under privacy enhanced scheme, fast forwarded malicious message and collusion attacks are all the outstanding problems. In addition, the decision delay while making decision for distinguishing the message trustworthiness is also a critical issue and need to be resolved.
In this paper, we propose a RSU and beacon-aided trust management system, called RaBTM, which aims to provide message opinion quickly and thwart internal attacker from sending or forwarding forged message in privacy-enhanced VANETs. In addition, a secure broadcast authentication protocol has also been proposed which can not only ensure the privacy of broadcast messages, but also can provide the linking ability of the trust relations of vehicles. On shorten the decision delay, in this paper, we propose an adaptive decision making model which makes decision quickly by the effective and quick assistance of the RSUs. This propose model can effective shorten the decision delay.
To evaluate the detection accuracy and efficiency of our proposed system, we conducted a set of simulations under various trust attacks. Under non-collusion attacks, the simulation results show that the proposed RaBTM can highly resilient to adversarial attacks and performs at least 23% better on detection accuracy, and 12% shorter on decision delay than VEBAS with weighted vote (WV) scheme. Under collusion attacks, RaBTM can still perform better than comparison baseline more than 18% and 14% respectively.
關鍵字(中) ★ 車載網路
★ 路側單元輔助
★ 信任管理
★ 安全
★ 信標
關鍵字(英) ★ VANET
★ RSU-aided
★ Trust Management
★ Safety
★ Beacon
論文目次 中文摘要 ........................................ i
Abstract ....................................... ii
謝誌............................................. iii
目錄............................................. iv
圖目錄 ........................................... vi
表目錄 ...........................................viii
1. INTRODUCTION ............................... 1
1.1 Background ................................. 1
1.2 Motivation&ResearchQuestion................. 8
1.3 TheProposedApproach ........................ 11
1.4 Contributions .............................. 12
1.5 OutlineoftheDissertation.................... 13
2. RELATED WORK................................ 14
2.1 EntityTrustModel............................ 15
2.2 DataTrustModel.............................. 18
2.3 Trust Management under Privacy Enhanced Scheme . . .22
3. METHODOLOGY ................................ 25
3.1 Assumptions................................. 25
3.2 Secure Broadcast Authentication Protocol (SBAP) . . 26
3.3 The RSU & Beacon-based Trust Management System . . 31
3.4 TrustGatherPart............................. 33
3.4.1 Beacon-basedTrust ........................ 33
3.4.2 Event-basedTrust ......................... 35
3.5 TrustCompositionPart ....................... 39
3.5.1 TheMaintenanceofHistoricalReputation. . . . . . . 39
3.5.2 CompositefromDifferentSensor ............. 39
3.5.3 CombineTrustValuefromMultipleVehicles . . . . . . 40
3.6 RSUOpinionCalculationPart................... 43
3.7 TrustCombination&DecisionPart............... 46
3.7.1 OBU’s Observation and RSU’s Opinion combination . 46
3.7.2 AdaptiveDecisionMaking ................... 47
4. EVALUATION.................................. 50
4.1 TrustAdversaryModels ....................... 50
4.1.1 Non-collusionAttack ...................... 51
4.1.2 CollusionAttack........................... 52
4.2 EvaluationMethod ........................... 52
4.2.1 EvaluationonSecurity ..................... 53
4.2.2 EvaluationonDetectionAccuracy ............ 54
4.2.3 EvaluationonDecisionDelay................. 56
4.3 SimulationEnvironment ...................... 57
4.4 DetermineKeyParameters...................... 57
5. EVALUATION RESULTS ......................... 61
5.1 ComparisonofDetectionAccuracy .............. 61
5.2 ComparisonofLocationPrivacy................. 64
5.3 ComparisonofDecisionDelay .................. 66
6. CONCLUSION AND FUTURE WORK.................. 72
REFERENCES...................................... 74
參考文獻 [1] H. Hartenstein and K. Laberteaux. “A tutorial survey on vehicular ad hoc networks”. In: Communications Magazine, IEEE 46.6 (2008), pp. 164 –171.
[2] G. Karagiannis et al. “Vehicular Networking: A Survey and Tutorial on Requirements, Ar- chitectures, Challenges, Standards and Solutions”. In: Communications Surveys Tutorials, IEEE 13.4 (2011), pp. 584 –616.
[3] “Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) - Resource Manager”. In: IEEE Std 1609.1-2006 (2006), pp. 1–71.
[4] “IEEE Standard for Wireless Access in Vehicular Environments Security Services for Ap- plications and Management Messages”. In: IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006) (2013), pp. 1–289.
[5] “IEEE Standard for Wireless Access in Vehicular Environments (WAVE) - Networking Ser- vices”. In: IEEE Std 1609.3-2010 (Revision of IEEE Std 1609.3-2007) (2010), pp. 1–144.
[6] “IEEE Standard for Wireless Access in Vehicular Environments (WAVE)–Multi-channel Op- eration”. In: IEEE Std 1609.4-2010 (Revision of IEEE Std 1609.4-2006) (2011), pp. 1–89.
[7] “IEEE Standard for Information technology– Local and metropolitan area networks– Specific requirements– Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments”. In: IEEE Std 802.11p-2010 (2010), pp. 1–51.
[8] A. Vinel et al. “Trustworthy Broadcasting in IEEE 802.11p/WAVE Vehicular Networks: Delay Analysis”. In: Communications Letters, IEEE 15.9 (2011), pp. 1010–1012.
[9] S. Zeadally et al. “Vehicular ad hoc networks (VANETS): status, results, andchallenges”. In: Telecommunication Systems 50.4 (2012), pp. 217–241.
[10] L. Wischhof, A. Ebner, and H. Rohling. “Information dissemination in self-organizing inter- vehicle networks”. In: Intelligent Transportation Systems, IEEE Transactions on 6.1 (2005), pp. 90 –101.
[11] T. Kosch et al. “The scalability problem of vehicular ad hoc networks and how to solve it”. In: Wireless Communications, IEEE 13.5 (2006), pp. 22 –28.
[12] A. Vinel. “3GPP LTE Versus IEEE 802.11p/WAVE: Which Technology is Able to Support Cooperative Vehicular Safety Applications?” In: Wireless Communications Letters, IEEE 1.2 (2012), pp. 125 –128.
[13] S. Yousefi, M. S. Mousavi, and M. Fathy. “Vehicular Ad Hoc Networks (VANETs): Chal- lenges and Perspectives”. In: ITS Telecommunications Proceedings, 2006 6th International Conference on. 2006, pp. 761 –766.
[14] M. Raya and J.-P. Hubaux. “Securing vehicular ad hoc networks”. In: Journal of Computer Security 15.1 (2007), pp. 39–68.
[15] G. Samara, W. Al-Salihy, and R. Sures. “Security Analysis of Vehicular Ad Hoc Nerworks (VANET)”. In: Network Applications Protocols and Services (NETAPPS), 2010 Second In- ternational Conference on. 2010, pp. 55 –60.
[16] M. Raya, P. Papadimitratos, and J.-P. Hubaux. “SECURING VEHICULAR COMMUNI- CATIONS”. In: Wireless Communications, IEEE 13.5 (2006), pp. 8 –15.
[17] Y.-C. Wei, Y.-M. Chen, and H.-L. Shan. “RSSI-Based User Centric Anonymization for Loca- tion Privacy in Vehicular Networks”. In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol. 42. 2010, pp. 39–51.
[18] B. Parno and A. Perrig. “Challenges in Securing Vehicular Networks”. In: Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV). 2005.
[19] S. Ma, O. Wolfson, and J. Lin. “A survey on trust management for intelligent transportation system”. In: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Compu- tational Transportation Science. CTS ’11. Chicago, Illinois: ACM, 2011, pp. 18–23.
74
[20] P. Wex et al. “Trust Issues for Vehicular Ad Hoc Networks”. In: Vehicular Technology Con- ference, 2008. VTC Spring 2008. IEEE. 2008, pp. 2800–2804.
[21] M. Gerlach. “Trust for Vehicular Applications”. In: Autonomous Decentralized Systems, 2007. ISADS ’07. Eighth International Symposium on. 2007, pp. 295–304.
[22] Y.-M. Chen and Y.-C. Wei. “SafeAnon: a safe location privacy scheme for vehicular net- works”. In: Telecommunication Systems 50.4 (2012), pp. 339–354.
[23] C. Campolo et al. “Modeling Broadcasting in IEEE 802.11p/WAVE Vehicular Networks”. In: Communications Letters, IEEE 15.2 (2011), pp. 199 –201.
[24] The CAMP Vehicle Safety Communications Consortium. Vehicle Safety Communications Project Task 3 Final Report: Identify intelligent vehicle safety applications enabled by DSRC. Tech. rep. DOT HS 809 859. National HighwayTraffic Safety Administration, 2005.
[25] X. Lin et al. “Security in vehicular ad hoc networks”. In: Communications Magazine, IEEE 46.4 (2008), pp. 88 –95.
[26] F. D ̈otzer. “Privacy Issues in Vehicular Ad Hoc Networks”. In: Privacy Enhancing Tech- nologies. Ed. by G. Danezis and D. Martin. Vol. 3856. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006, pp. 197–209.
[27] M. Gerlach and F. Guttler. “Privacy in VANETs using Changing Pseudonyms - Ideal and Real”. In: Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th. 2007, pp. 2521– 2525.
[28] G. Calandriello et al. “Efficient and robust pseudonymous authentication in VANET”. In: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks. VANET ’07. Montreal, Quebec, Canada: ACM, 2007, pp. 19–28.
[29] J. Sun and Y. Fang. “Defense against misbehavior in anonymous vehicular ad hoc networks”. In: Ad Hoc Networks 7.8 (2009), pp. 1515–1525.
[30] T. Leinmuller, E. Schoch, and F. Kargl. “POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS”. In: Wireless Communications, IEEE 13.5 (2006), pp. 16 –21.
[31] R. K. Schmidt et al. “Vehicle Behavior Analysis to Enhance Security in VANETs”. In: Proceedings of 4th Workshop on Vehicle to Vehicle Communications (V2VCOM 2008). 2009.
[32] M. Raya et al. “Eviction of Misbehaving and Faulty Nodes in Vehicular Networks”. In: Selected Areas in Communications, IEEE Journal on 25.8 (2007), pp. 1557–1568.
[33] M. Ghosh et al. “Distributed Misbehavior Detection in VANETs”. In: Wireless Communi- cations and Networking Conference, 2009. WCNC 2009. IEEE, pp. 1–6.
[34] M. Ghosh et al. “Detecting misbehaviors in VANET with integrated root-cause analysis”. In: Ad Hoc Networks 8.7 (2010), pp. 778–790.
[35] X. Hong et al. “SAT: situation-aware trust architecture for vehicular networks”. In: Pro- ceedings of the 3rd international workshop on Mobility in the evolving internet architecture. MobiArch ’08. Seattle, WA, USA: ACM, 2008, pp. 31–36.
[36] F. D ̈otzer, L. Fischer, and P. Magiera. “VARS: A Vehicle Ad-Hoc Network Reputation Sys- tem”. In: Proceedings of the Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks. 1070391: IEEE Computer Society, pp. 454–456.
[37] B. Ostermaier, F. Dotzer, and M. Strassberger. “Enhancing the Security of Local Danger- Warnings in VANETs - A Simulative Analysis of Voting Schemes”. In: Proceedings of the The Second International Conference on Availability, Reliability and Security. 1250539 422-431. IEEE Computer Society, pp. 422–431.
[38] Q. Wu, J. Domingo-Ferrer, and U ́. Gonz ́alez-Nicol ́as. “Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications”. In: Vehicular Technology, IEEE Trans- actions on 59.2 (2010), pp. 559–573.
[39] M. Raya et al. “On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks”. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. 2008, pp. 1238–1246.
75
[40] Z. Haojin et al. “AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks”. In: Communications, 2008. ICC ’08. IEEE International Conference on, pp. 1436–1440.
[41] Z. Jie. “A Survey on Trust Management for VANETs”. In: Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on, pp. 105–112.
[42] Y.-C. Wei and Y.-M. Chen. “Evaluation of collusion resistance on trust management systems for VANETs”. In: ITS Telecommunications (ITST), 2012 12th International Conference on. 2012, pp. 356–360.
[43] Z. Huang et al. “A social network approach to trust management in VANETs”. In: Peer-to- Peer Networking and Applications (2012), pp. 1–14.
[44] T. Leinmu ̈ller et al. “Improved security in geographic ad hoc routing through autonomous position verification”. In: Proceedings of the 3rd international workshop on Vehicular ad hoc networks. VANET ’06. Los Angeles, CA, USA: ACM, 2006, pp. 57–66.
[45] B. Yu, C.-Z. Xu, and B. Xiao. “Detecting Sybil attacks in {VANETs}”. In: Journal of Parallel and Distributed Computing 73.6 (2013), pp. 746 –756.
[46] J. Zhang, C. Chen, and R. Cohen. “Trust modeling for message relay control and local action decision making in VANETs”. In: Security and Communication Networks 6.1 (2013), pp. 1 –14.
[47] A. Patwardhan et al. “A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks”. In: Mobile and Ubiquitous Systems - Workshops, 2006. 3rd Annual Interna- tional Conference on. 2006, pp. 1–8.
[48] U. F. Minhas et al. “Towards expanded trust management for agents in vehicular ad-hoc networks”. In: International Journal of Computational Intelligence: Theory and Practice 5.1 (2010), pp. 3–15.
[49] N.-W. Lo and H.-C. Tsai. “A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks”. In: EURASIP Journal on Wireless Communications and Networking 2009.1 (2009), p. 125348.
[50] D. Qing et al. “Reputation Management in Vehicular Ad Hoc Networks”. In: Multimedia Technology (ICMT), 2010 International Conference on. 2010, pp. 1–5.
[51] Q. Li et al. “A Reputation-Based Announcement Scheme for VANETs”. In: Vehicular Tech- nology, IEEE Transactions on 61.9 (2012), pp. 4095–4108.
[52] J. Grover et al. “Machine Learning Approach for Multiple Misbehavior Detection in VANET”. In: Advances in Computing and Communications. Ed. by A. Abraham et al. Vol. 192. Commu- nications in Computer and Information Science. Springer Berlin Heidelberg, 2011, pp. 644– 653.
[53] J. Grover, V. Laxmi, and M. Gaur. “Misbehavior Detection Based on Ensemble Learning in VANET”. In: Advanced Computing, Networking and Security. Ed. by P. S. Thilagam et al. Vol. 7135. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. Chap. 70, pp. 602–611.
[54] H. Zhen et al. “Limitations of trust management schemes in VANET and countermeasures”. In: Personal Indoor and Mobile Radio Communications (PIMRC), 2011 IEEE 22nd Inter- national Symposium on, pp. 1228–1232.
[55] A. Wu, J. Ma, and S. Zhang. “RATE: A RSU-Aided Scheme for Data-Centric Trust Es- tablishment in VANETs”. In: Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on. 2011, pp. 1 –6.
[56] X. Zhuo et al. “Removal of misbehaving insiders in anonymous VANETs”. In: Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems. MSWiM ’09. Tenerife, Canary Islands, Spain: ACM, 2009, pp. 106–115.
[57] A. Tajeddine, A. Kayssi, and A. Chehab. “A Privacy-Preserving Trust Model for VANETs”. In: Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, pp. 832–837.
76
[58] E. Fonseca et al. “Support of Anonymity in VANETs - Putting Pseudonymity into Practice”. In: Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE. 2007, pp. 3400–3405.
[59] K. Sampigethaya et al. “AMOEBA: Robust Location Privacy Scheme for VANET”. In: Se- lected Areas in Communications, IEEE Journal on 25.8 (2007), pp. 1569 –1589.
[60] E. Schoch et al. “Impact of Pseudonym Changes on Geographic Routing in VANETs”. In: Security and Privacy in Ad-Hoc and Sensor Networks. Ed. by L. Butty ́an, V. Gligor, and D. Westhoff. Vol. 4357. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006, pp. 43–57.
[61] J. Petit. “Analysis of ECDSA Authentication Processing in VANETs”. In: New Technologies, Mobility and Security (NTMS), 2009 3rd International Conference on. 2009, pp. 1 –5.
[62] A. Perrig et al. “The TESLA broadcast authentication protocol”. In: RSA CryptoBytes 5.2 (2002), pp. 2–13.
[63] A. Wasef et al. “Complementing public key infrastructure to secure vehicular ad hoc net- works”. In: Wireless Communications, IEEE 17.5 (2010), pp. 22–28.
[64] A. Studer et al. “Flexible, extensible, and efficient VANET authentication”. In: Communi- cations and Networks, Journal of 11.6 (2009), pp. 574–588.
[65] I. 11770-3. Information technology - Security techniques - Key management - Part 3: Mech- anisms using asymmetric technologies -Second Edition. 2008.
[66] R. Schmidt et al. “Exploration of adaptive beaconing for efficient intervehicle safety commu- nication”. In: Network, IEEE 24.1 (2010), pp. 14–19.
[67] Y.-M. Chen and Y.-C. Wei. “A beacon-based trust management system for enhancing user centric location privacy in VANETs”. In: Communications and Networks, Journal of 15.2 (2013), pp. 153–163.
[68] G. Yan, S. Olariu, and M. C. Weigle. “Providing VANET security through active position detection”. In: Computer Communications 31.12 (2008), pp. 2883–2897.
[69] S.-H. Cha. “Comprehensive survey on distance/similarity measures between probability den- sity functions”. In: International Journal of Mathematical Models and Methods in Applied Sciences 1.4 (2008), pp. 300–307.
[70] H. M. Zahera, G. F. El-Hady, and W. F. A. El-Wahed. “Query Recommendation for Im- proving Search Engine Results”. In: (2011), pp. 45–52.
[71] Y. L. Sun et al. “Information theoretic framework of trust modeling and evaluation for ad hoc networks”. In: Selected Areas in Communications, IEEE Journal on 24.2 (2006), pp. 305– 317.
[72] J. Luo, X. Liu, and M. Fan. “A trust model based on fuzzy recommendation for mobile ad-hoc networks”. In: Computer Networks 53.14 (2009), pp. 2396–2407.
[73] T. M. Chen and V. Venkataramanan. “Dempster-Shafer theory for intrusion detection in ad hoc networks”. In: Internet Computing, IEEE 9.6 (2005), pp. 35–41.
[74] W. Li and A. Joshi. “Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory”. In: Mobile Data Management: Systems, Services and Middleware, 2009. MDM ’09. Tenth International Conference on. 2009, pp. 112–121.
[75] Y.-C. Wei and Y.-M. Chen. “An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs”. In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. 2012, pp. 393– 400.
[76] Y.-C. Wei, Y.-M. Chen, and H.-L. Shan. “Beacon-based trust management for location pri- vacy enhancement VANETs”. In: Network Operations and Management Symposium (AP- NOMS), 2011 13th Asia-Pacific. 2011, pp. 1–8.
[77] A. Abdrabou and Z. Weihua. “Probabilistic Delay Control and Road Side Unit Placement for Vehicular Ad Hoc Networks with Disrupted Connectivity”. In: Selected Areas in Com- munications, IEEE Journal on 29.1 (2011), pp. 129–139.
77
[78] B Aslam et al. “Secure Traffic Data Propagation in Vehicular Ad hoc Networks”. In: Int. J. Ad Hoc and Ubiquitous Computing 6.1 (2010), pp. 24–39.
[79] C. Harsch, A. Festag, and P. Papadimitratos. “Secure Position-Based Routing for VANETs”. In: Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE 66th, pp. 26–30.
[80] Y. Wei and K. J. R. Liu. “Attack-resistant cooperation stimulation in autonomous ad hoc networks”. In: Selected Areas in Communications, IEEE Journal on 23.12 (2005), pp. 2260– 2271.
[81] C. J. V. Rijsbergen. Information Retrieval. 2nd. Newton, MA, USA: Butterworth-Heinemann, 1979.
[82] A. Kherani and A. Rao. “Performance of Node-Eviction Schemes in Vehicular Networks”. In: Vehicular Technology, IEEE Transactions on 59.2 (2010), pp. 550–558.
指導教授 陳奕明(Yi-Ming Chen) 審核日期 2013-7-29
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明