參考文獻 |
[1] Market Intelligence & Consulting Institute. Online Available: http://www.ctci.org.tw/public/Attachment/614151144740.pdf, 2015.
[2] Ming-Kai Jiau, Shih-Chia Huang, Jenq-Neng Hwang, and Athanasios V Vasilakos. Multimedia services in cloud-based vehicular networks. IEEE Intelligent Transportation Systems Magazine, 7(3):62-79, 2015.
[3] Ning Lu, Nan Cheng, Ning Zhang, Xuemin Shen, and Jon W Mark. Connected vehicles: Solutions and challenges. IEEE Internet of Things Journal, 1(4):289-299, 2014.
[4] Fangchun Yang, Shangguang Wang, Jinglin Li, Zhihan Liu, and Qibo Sun. An overview of internet of vehicles. China Communications, 11(10):1-15, 2014.
[5] Youngseok Chung, Seokjin Choi, and Dongho Won. Lightweight anonymous authentication scheme with unlinkability in global mobility networks. Journal of Convergence, 4(4):23-29, Dec 2013.
[6] Ziya Cihan Taysi and Ali Gokhan Yavuz. Etsi compliant geonetworking protocol layer implementation for ivc simulations. Human-centric Computing and Information Sciences, 3(1):1-12, 2013.
[7] Rajinder Singh, Parvinder Singh, and Manoj Duhan. An effiective implementation of security based algorithmic approach in mobile ad hoc networks. Human-centric Computing and Information Sciences, 4(1):1-14, 2014.
[8] Kun Peng. A secure network for mobile wireless service. Journal of Information Processing Systems, 9(2):247-258, 2013.
[9] Nanjie Liu. Internet of vehicles: Your next connection. Huawei WinWin, 11:23-28, 2011.
[10] Christian Cseh. Architecture of the dedicated short-range communications (dsrc) protocol. In Vehicular Technology Conference, 1998. VTC 98. 48th IEEE, volume 3, pages 2095-2099. IEEE, 1998.
[11] John B Kenney. Dedicated short-range communications (dsrc) standards in the united states. Proceedings of the IEEE, 99(7):1162-1182, 2011.
[12] Maxim Raya and Jean-Pierre Hubaux. The security of vehicular ad hoc networks. In Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005.
[13] Fan Bai, Tamer Elbatt, Gavin Hollan, Hariharan Krishnan, and Varsha Sadekar. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), pages 1-25, 2006.
[14] Neng-Wen Wang, Yueh-Min Huang, and Wei-Ming Chen. A novel secure communication scheme in vehicular ad hoc networks. Computer communications, 31(12):2827-2837, 2008.
[15] Lars Wischhof, Andre Ebner, and Hermann Rohling. Information dissemination in self-organizing intervehicle networks. IEEE Transactions on Intelligent Transportation Systems, 6(1):90-101, 2005.
[16] Jesus Tellez Isaac, Jose Sierra Camara, Sherali Zeadally, and Joaquin Torres Marquez. A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Computer Communications, 31(10):2478-2484, 2008.
[17] Saleh Yousefi, Mahmoud Siadat Mousavi, and Mahmood Fathy. Vehicular ad hoc networks (vanets): challenges and perspectives. In 2006 6th International Conference on ITS Telecommunications, pages 761-766. IEEE, 2006.
[18] Chenxi Zhang, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, and Xuemin Shen. An ecient message authentication scheme for vehicular communications. IEEE Transactions on Vehicular Technology, 57(6):3357-3368, 2008.
[19] Chun-Ta Li, Min-Shiang Hwang, and Yen-Ping Chu. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications, 31(12):2803-2814, 2008.
[20] Lo-Yao Yeh, Yen-Cheng Chen, and Jiun-Long Huang. Paacp: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Computer Communications, 34(3):447-456, 2011.
[21] Wei-ChenWu and Yi-Ming Chen. Cryptanalysis of a paacp: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Applied Mathematics & Information Sciences, 6(2S):463S-469S, 2012.
[22] Fei Wang, Yongjun Xu, Hanwen Zhang, Yujun Zhang, and Liehuang Zhu. 2 A two-factor lightweight privacy-preserving authentication scheme for vanet. IEEE Transactions on Vehicular Technology, 65(2):896-911, 2016.
[23] Jae-Youn Sung, Jeong-Yeon Jeong, and Ki-Song Yoon. Drm enabled p2p architecture. In The 8th International Conference Advanced Communication Technology, volume 1, pages 487-490. IEEE, 2006.
[24] Tetsuya Iwata, Takehito Abe, Kiyoshi Ueda, and Hiroshi Sunaga. A drm system suitable for p2p content delivery and the study on its implementation. In Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference on, volume 2, pages 806-811. IEEE, 2003.
[25] CC Chu, X. Su, BS Prabhu, R. Gadh, S. Kurup, G. Sridhar, and V. Sridhar. Mobile drm for multimedia content commerce in p2p networks. In IEEE Consumer Communications and Networking Conference, pages 1119-1123, 2006.
[26] Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang, and Ravi Sandhu. Toward digital rights protection in bittorrent-like p2p systems. In Electronic Imaging 2008, pages 68180F-68180F. International Society for Optics and Photonics, 2008.
[27] John R Douceur. The sybil attack. In International Workshop on Peer-to-Peer Systems, pages 251-260. Springer, 2002.
[28] Brian Neil Levine, Clay Shields, and N Boris Margolin. A survey of solutions to the sybil attack. University of Massachusetts Amherst, Amherst, MA, 7, 2006.
[29] Eng Keong Lua. Securing peer-to-peer overlay networks from sybil attack. In Communications and Information Technologies, 2007. ISCIT′07. International Symposium on, pages 1213-1218. IEEE, 2007.
[30] Wei-Chen Wu and Yi-Ming Chen. Tlms: A novel drm scheme for multimedia sharing in p2p networks. In The 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 873-876, 2009.
[31] David L Chaum. Blinding for unanticipated signatures. In In Advances in Cryptology, EUROCRYPT′87, pages 227-233, 1988.
[32] David L Chaum. Blind signatures for untraceable payments. In In Advances in Cryptology, CRYPTO′83, volume 82, pages 199-203, 1983.
[33] David L Chaum. Blind signatures system. In In Advances in Cryptology, CRYPTO′82, pages 153-156, 1982.
[34] Lee George C.S. Koo, Simon G. M. and Karthik Kannan. Using p2p to distribute large-volume contents-research problems, solutions and future directions. In In Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics, pages 10-13, 2005.
[35] Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Message authentication using hash functions: The hmac construction. RSA Laboratories′ CryptoBytes, 2(1):12-15, 1996.
[36] Qiong Liu, Reihaneh Safavi-Naini, and Nicholas Paul Sheppard. Digital rights management for content distribution. In Proceedings of the Australasian information security workshop conference on ACSW frontiers, volume 21, pages 49-58. Australian Computer Society, Inc., 2003.
[37] Miao Wang, Hangguan Shan, Rongxing Lu, Ran Zhang, Xuemin Shen, and Fan Bai. Real-time path planning based on hybrid-vanet-enhanced transportation system. IEEE Transactions on Vehicular Technology, 64(5):1664-1678, 2015.
[38] Shancang Li, Li Da Xu, and Shanshan Zhao. The internet of things: a survey. Information Systems Frontiers, 17(2):243-259, 2015.
[39] Neeraj Kumar, Sudip Misra, Joel JPC Rodrigues, and Mohammad S Obaidat. Coalition games for spatio-temporal big data in internet of vehicles environment: a comparative analysis. IEEE Internet of Things Journal, 2(4):310-320, 2015.
[40] Cheng Cheng and Wu Zongxin. Design of a system for safe driving based on the internet of vehicles and the fusion of multi-aspects information. In Computational Intelligence and Security (CIS), 2013 9th International Conference on, pages 692-696. IEEE, 2013.
[41] Mohammad Ali Salahuddin, Ala Al-Fuqaha, and Mohsen Guizani. Software-defined networking for rsu clouds in support of the internet of vehicles. IEEE Internet of Things Journal, 2(2):133-144, 2015.
[42] Tuncer Baykas, Chin-Sean Sum, Zhou Lan, Junyi Wang, M Azizur Rahman, Hiroshi Harada, and Shuzo Kato. Ieee 802.15. 3c: the first ieee wireless standard for data rates over 1 gb/s. IEEE Communications Magazine, 49(7):114-121, 2011.
[43] SIG Bluetooth. Specification of the bluetooth system: core package version 2.1+ edr. Online Available: http://www.bluetooth.com, 2007.
[44] Ozan K Tonguz, Hsin-Mu Tsai, Timothy Talty, Andrew Macdonald, and Cem Saraydar. Rfid technology for intra-car communications: A new paradigm. In IEEE Vehicular Technology Conference, pages 1-6. IEEE, 2006.
[45] ZigBee Alliance. Zigbee 2007 specification. Online Available: http://www.zigbee.org/Specifications/ZigBee/Overview.aspx, 2007.
[46] Mike Burmester and Yvo Desmedt. A secure and efficient conference key distribution system. In Advances in cryptology|EUROCRYPT′94, pages 275-286. Springer, 1994.
[47] Michael Steiner, Gene Tsudik, and Michael Waidner. Diffie-hellman key distribution extended to group communication. In Proceedings of the 3rd ACM conference on Computer and communications security, pages 31-37. ACM, 1996.
[48] Michael Steiner, Gene Tsudik, and Michael Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems,
11(8):769-780, 2000.
[49] Michael Steiner, Gene Tsudik, and Michael Waidner. Cliques: A new approach to group key agreement. In The 18th IEEE International Conference on Distributed Computing Systems, pages 380-387. Citeseer, 1997.
[50] Whiteld Diffie and Martin Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644-654, 1976.
[51] Alfred J Menezes, Paul C Van Oorschot, and Scott A Vanstone. Handbook of applied cryptography. CRC press, 1996.
[52] Ahren Studer, Fan Bai, Bhargav Bellur, and Adrian Perrig. Flexible, extensible, and efficient vanet authentication. Journal of Communications and Networks,
11(6):574-588, 2009.
[53] Don Johnson, Alfred Menezes, and Scott Vanstone. The elliptic curve digital signature algorithm (ecdsa). International Journal of Information Security, 1(1):36-63, 2001.
[54] Adrian Perrig, Ran Canetti, J Doug Tygar, and Dawn Song. The tesla broadcast authentication protocol. RSA CryptoBytes, 5, 2005.
[55] Ueli M Maurer and Yacov Yacobi. A non-interactive public-key distribution system. Designs, Codes and Cryptography, 9(3):305-316, 1996.
[56] Yuh-Min Tseng and Jinn-Ke Jan. Id-based cryptographic schemes using a non-interactive public-key distribution system. In Computer Security Applications Conference, 1998. Proceedings. 14th Annual, pages 237-243. IEEE, 1998.
[57] Kui Ren, Wenjing Lou, Kwangjo Kim, and Robert Deng. A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular technology, 55(4):1373-1384, 2006.
[58] Yen-Cheng Chen and Lo-Yao Yeh. An efficient authentication and access control scheme using smart cards. In The 11th International Conference on Parallel and Distributed Systems (ICPADS′05), volume 2, pages 78-82. IEEE, 2005.
[59] Wei-Chen Wu and Yi-Ming Chen. Improving the authentication scheme and access control protocol for vanets. Entropy, 16(11):6152-6165, 2014.
[60] Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
[61] Georgios Karagiannis, Onur Altintas, Eylem Ekici, Geert Heijenk, Boangoat Jarupan, Kenneth Lin, and Timothy Weil. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4):584-616, 2011.
[62] Rongxing Lu, Xiaodong Lin, Haojin Zhu, P-H Ho, and Xuemin Shen. Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008.
[63] Bruce Schneier. Applied cryptography: protocols, algorithms, and source code in C. Second ed., John Wiley and Sons Inc., New York, NY, USA, 1996.
[64] Jung-San Lee and Chin-Chen Chang. Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications, 30(4):1377-1396, 2007.
[65] Hsing-Bai Chen and Sue-Chen Hsueh. Light-weight authentication and billing in mobile communications. In Security Technology, Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on, pages 245-252. IEEE, 2003.
[66] MOTC Institute of Transportation. Traffic accident loss about 475 billion annually. Online Available: https://www.motc.gov.tw/uploaddowndoc?file=news/201408210828550.docx, 2014.
[67] Ministry of Transportation and Communications. Statistics of ministry of transportation and communications. Online Available: http://stat.motc.gov.tw/, 2016.
[68] Yunchuan Wang, Wei Shu, and Michael Her. Internet protocol television, May 12 2006. US Patent App. 11/433,142.
[69] Far Eastern Electronic Toll Collection Co. (FETC). etag card. Online Available: http://www.fetc.net.tw/product/eTag-card.html, 2016.
[70] Bo Yang and Yiqun Lei. Vehicle detection and classification for low-speed congested traffic with anisotropic magnetoresistive sensor. IEEE Sensors Journal, 15(2):1132-1138, 2015.
[71] Andrew C Hazlett, John L Crassidis, Daniel P Fuglewicz, and Patrick Miller. Dierential wheel speed sensor integration with gps/ins for land vehicle navigation. American Institute of Aeronautics and Astronautics, 2013.
[72] Markus Dielacher, Martin Flatscher, Thomas Herndl, Thomas Lentsch, Rainer Matischek, Josef Prainsack, and Werner Weber. A robust wireless sensor node for in-tire-pressure monitoring. In MEMS-based Circuits and Systems for Wireless Communication, pages 313-328. Springer, 2013.
[73] Hyung-ik Kim, Jungwook Shon, and Kihyung Lee. A study of fuel economy and exhaust emission according to engine coolant and oil temperature. Journal of Thermal Science and Technology, 8(1):255-268, 2013.
[74] Ratan Hudda, Clint Kelly, Garrett Long, Jun Luo, Atul Pandit, Dave Phillips, Lubab Sheet, and Ikhlaq Sidhu. Self driving cars. College of Engineering University of California, Berkeley, Berkeley: College of Engineering University of California, 2013.
[75] Gary Silberg, Richard Wallace, G Matuszak, J Plessers, C Brower, and D Subramanian. Self-driving cars: The next revolution. White paper, KPMG LLP & Center of Automotive Research, 2012.
[68] Yunchuan Wang, Wei Shu, and Michael Her. Internet protocol television, May 12 2006. US Patent App. 11/433,142.
[69] Far Eastern Electronic Toll Collection Co. (FETC). etag card. Online Available: http://www.fetc.net.tw/product/eTag-card.html, 2016.
[70] Bo Yang and Yiqun Lei. Vehicle detection and classification for low-speed congested traffic with anisotropic magnetoresistive sensor. IEEE Sensors Journal, 15(2):1132-1138, 2015.
[71] Andrew C Hazlett, John L Crassidis, Daniel P Fuglewicz, and Patrick Miller. Dierential wheel speed sensor integration with gps/ins for land vehicle navigation. American Institute of Aeronautics and Astronautics, 2013.
[72] Markus Dielacher, Martin Flatscher, Thomas Herndl, Thomas Lentsch, Rainer Matischek, Josef Prainsack, and Werner Weber. A robust wireless sensor node for in-tire-pressure monitoring. In MEMS-based Circuits and Systems for Wireless Communication, pages 313-328. Springer, 2013.
[73] Hyung-ik Kim, Jungwook Shon, and Kihyung Lee. A study of fuel economy and exhaust emission according to engine coolant and oil temperature. Journal of Thermal Science and Technology, 8(1):255-268, 2013.
[74] Ratan Hudda, Clint Kelly, Garrett Long, Jun Luo, Atul Pandit, Dave Phillips, Lubab Sheet, and Ikhlaq Sidhu. Self driving cars. College of Engineering University of California, Berkeley, Berkeley: College of Engineering University of California, 2013.
[75] Gary Silberg, Richard Wallace, G Matuszak, J Plessers, C Brower, and D Subramanian. Self-driving cars: The next revolution. White paper, KPMG LLP & Center of Automotive Research, 2012. |