參考文獻 |
[1] H. Hartenstein and K. Laberteaux. “A tutorial survey on vehicular ad hoc networks”. In: Communications Magazine, IEEE 46.6 (2008), pp. 164 –171.
[2] G. Karagiannis et al. “Vehicular Networking: A Survey and Tutorial on Requirements, Ar- chitectures, Challenges, Standards and Solutions”. In: Communications Surveys Tutorials, IEEE 13.4 (2011), pp. 584 –616.
[3] “Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) - Resource Manager”. In: IEEE Std 1609.1-2006 (2006), pp. 1–71.
[4] “IEEE Standard for Wireless Access in Vehicular Environments Security Services for Ap- plications and Management Messages”. In: IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006) (2013), pp. 1–289.
[5] “IEEE Standard for Wireless Access in Vehicular Environments (WAVE) - Networking Ser- vices”. In: IEEE Std 1609.3-2010 (Revision of IEEE Std 1609.3-2007) (2010), pp. 1–144.
[6] “IEEE Standard for Wireless Access in Vehicular Environments (WAVE)–Multi-channel Op- eration”. In: IEEE Std 1609.4-2010 (Revision of IEEE Std 1609.4-2006) (2011), pp. 1–89.
[7] “IEEE Standard for Information technology– Local and metropolitan area networks– Specific requirements– Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments”. In: IEEE Std 802.11p-2010 (2010), pp. 1–51.
[8] A. Vinel et al. “Trustworthy Broadcasting in IEEE 802.11p/WAVE Vehicular Networks: Delay Analysis”. In: Communications Letters, IEEE 15.9 (2011), pp. 1010–1012.
[9] S. Zeadally et al. “Vehicular ad hoc networks (VANETS): status, results, andchallenges”. In: Telecommunication Systems 50.4 (2012), pp. 217–241.
[10] L. Wischhof, A. Ebner, and H. Rohling. “Information dissemination in self-organizing inter- vehicle networks”. In: Intelligent Transportation Systems, IEEE Transactions on 6.1 (2005), pp. 90 –101.
[11] T. Kosch et al. “The scalability problem of vehicular ad hoc networks and how to solve it”. In: Wireless Communications, IEEE 13.5 (2006), pp. 22 –28.
[12] A. Vinel. “3GPP LTE Versus IEEE 802.11p/WAVE: Which Technology is Able to Support Cooperative Vehicular Safety Applications?” In: Wireless Communications Letters, IEEE 1.2 (2012), pp. 125 –128.
[13] S. Yousefi, M. S. Mousavi, and M. Fathy. “Vehicular Ad Hoc Networks (VANETs): Chal- lenges and Perspectives”. In: ITS Telecommunications Proceedings, 2006 6th International Conference on. 2006, pp. 761 –766.
[14] M. Raya and J.-P. Hubaux. “Securing vehicular ad hoc networks”. In: Journal of Computer Security 15.1 (2007), pp. 39–68.
[15] G. Samara, W. Al-Salihy, and R. Sures. “Security Analysis of Vehicular Ad Hoc Nerworks (VANET)”. In: Network Applications Protocols and Services (NETAPPS), 2010 Second In- ternational Conference on. 2010, pp. 55 –60.
[16] M. Raya, P. Papadimitratos, and J.-P. Hubaux. “SECURING VEHICULAR COMMUNI- CATIONS”. In: Wireless Communications, IEEE 13.5 (2006), pp. 8 –15.
[17] Y.-C. Wei, Y.-M. Chen, and H.-L. Shan. “RSSI-Based User Centric Anonymization for Loca- tion Privacy in Vehicular Networks”. In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol. 42. 2010, pp. 39–51.
[18] B. Parno and A. Perrig. “Challenges in Securing Vehicular Networks”. In: Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV). 2005.
[19] S. Ma, O. Wolfson, and J. Lin. “A survey on trust management for intelligent transportation system”. In: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Compu- tational Transportation Science. CTS ’11. Chicago, Illinois: ACM, 2011, pp. 18–23.
74
[20] P. Wex et al. “Trust Issues for Vehicular Ad Hoc Networks”. In: Vehicular Technology Con- ference, 2008. VTC Spring 2008. IEEE. 2008, pp. 2800–2804.
[21] M. Gerlach. “Trust for Vehicular Applications”. In: Autonomous Decentralized Systems, 2007. ISADS ’07. Eighth International Symposium on. 2007, pp. 295–304.
[22] Y.-M. Chen and Y.-C. Wei. “SafeAnon: a safe location privacy scheme for vehicular net- works”. In: Telecommunication Systems 50.4 (2012), pp. 339–354.
[23] C. Campolo et al. “Modeling Broadcasting in IEEE 802.11p/WAVE Vehicular Networks”. In: Communications Letters, IEEE 15.2 (2011), pp. 199 –201.
[24] The CAMP Vehicle Safety Communications Consortium. Vehicle Safety Communications Project Task 3 Final Report: Identify intelligent vehicle safety applications enabled by DSRC. Tech. rep. DOT HS 809 859. National HighwayTraffic Safety Administration, 2005.
[25] X. Lin et al. “Security in vehicular ad hoc networks”. In: Communications Magazine, IEEE 46.4 (2008), pp. 88 –95.
[26] F. D ̈otzer. “Privacy Issues in Vehicular Ad Hoc Networks”. In: Privacy Enhancing Tech- nologies. Ed. by G. Danezis and D. Martin. Vol. 3856. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006, pp. 197–209.
[27] M. Gerlach and F. Guttler. “Privacy in VANETs using Changing Pseudonyms - Ideal and Real”. In: Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th. 2007, pp. 2521– 2525.
[28] G. Calandriello et al. “Efficient and robust pseudonymous authentication in VANET”. In: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks. VANET ’07. Montreal, Quebec, Canada: ACM, 2007, pp. 19–28.
[29] J. Sun and Y. Fang. “Defense against misbehavior in anonymous vehicular ad hoc networks”. In: Ad Hoc Networks 7.8 (2009), pp. 1515–1525.
[30] T. Leinmuller, E. Schoch, and F. Kargl. “POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS”. In: Wireless Communications, IEEE 13.5 (2006), pp. 16 –21.
[31] R. K. Schmidt et al. “Vehicle Behavior Analysis to Enhance Security in VANETs”. In: Proceedings of 4th Workshop on Vehicle to Vehicle Communications (V2VCOM 2008). 2009.
[32] M. Raya et al. “Eviction of Misbehaving and Faulty Nodes in Vehicular Networks”. In: Selected Areas in Communications, IEEE Journal on 25.8 (2007), pp. 1557–1568.
[33] M. Ghosh et al. “Distributed Misbehavior Detection in VANETs”. In: Wireless Communi- cations and Networking Conference, 2009. WCNC 2009. IEEE, pp. 1–6.
[34] M. Ghosh et al. “Detecting misbehaviors in VANET with integrated root-cause analysis”. In: Ad Hoc Networks 8.7 (2010), pp. 778–790.
[35] X. Hong et al. “SAT: situation-aware trust architecture for vehicular networks”. In: Pro- ceedings of the 3rd international workshop on Mobility in the evolving internet architecture. MobiArch ’08. Seattle, WA, USA: ACM, 2008, pp. 31–36.
[36] F. D ̈otzer, L. Fischer, and P. Magiera. “VARS: A Vehicle Ad-Hoc Network Reputation Sys- tem”. In: Proceedings of the Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks. 1070391: IEEE Computer Society, pp. 454–456.
[37] B. Ostermaier, F. Dotzer, and M. Strassberger. “Enhancing the Security of Local Danger- Warnings in VANETs - A Simulative Analysis of Voting Schemes”. In: Proceedings of the The Second International Conference on Availability, Reliability and Security. 1250539 422-431. IEEE Computer Society, pp. 422–431.
[38] Q. Wu, J. Domingo-Ferrer, and U ́. Gonz ́alez-Nicol ́as. “Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications”. In: Vehicular Technology, IEEE Trans- actions on 59.2 (2010), pp. 559–573.
[39] M. Raya et al. “On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks”. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. 2008, pp. 1238–1246.
75
[40] Z. Haojin et al. “AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks”. In: Communications, 2008. ICC ’08. IEEE International Conference on, pp. 1436–1440.
[41] Z. Jie. “A Survey on Trust Management for VANETs”. In: Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on, pp. 105–112.
[42] Y.-C. Wei and Y.-M. Chen. “Evaluation of collusion resistance on trust management systems for VANETs”. In: ITS Telecommunications (ITST), 2012 12th International Conference on. 2012, pp. 356–360.
[43] Z. Huang et al. “A social network approach to trust management in VANETs”. In: Peer-to- Peer Networking and Applications (2012), pp. 1–14.
[44] T. Leinmu ̈ller et al. “Improved security in geographic ad hoc routing through autonomous position verification”. In: Proceedings of the 3rd international workshop on Vehicular ad hoc networks. VANET ’06. Los Angeles, CA, USA: ACM, 2006, pp. 57–66.
[45] B. Yu, C.-Z. Xu, and B. Xiao. “Detecting Sybil attacks in {VANETs}”. In: Journal of Parallel and Distributed Computing 73.6 (2013), pp. 746 –756.
[46] J. Zhang, C. Chen, and R. Cohen. “Trust modeling for message relay control and local action decision making in VANETs”. In: Security and Communication Networks 6.1 (2013), pp. 1 –14.
[47] A. Patwardhan et al. “A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks”. In: Mobile and Ubiquitous Systems - Workshops, 2006. 3rd Annual Interna- tional Conference on. 2006, pp. 1–8.
[48] U. F. Minhas et al. “Towards expanded trust management for agents in vehicular ad-hoc networks”. In: International Journal of Computational Intelligence: Theory and Practice 5.1 (2010), pp. 3–15.
[49] N.-W. Lo and H.-C. Tsai. “A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks”. In: EURASIP Journal on Wireless Communications and Networking 2009.1 (2009), p. 125348.
[50] D. Qing et al. “Reputation Management in Vehicular Ad Hoc Networks”. In: Multimedia Technology (ICMT), 2010 International Conference on. 2010, pp. 1–5.
[51] Q. Li et al. “A Reputation-Based Announcement Scheme for VANETs”. In: Vehicular Tech- nology, IEEE Transactions on 61.9 (2012), pp. 4095–4108.
[52] J. Grover et al. “Machine Learning Approach for Multiple Misbehavior Detection in VANET”. In: Advances in Computing and Communications. Ed. by A. Abraham et al. Vol. 192. Commu- nications in Computer and Information Science. Springer Berlin Heidelberg, 2011, pp. 644– 653.
[53] J. Grover, V. Laxmi, and M. Gaur. “Misbehavior Detection Based on Ensemble Learning in VANET”. In: Advanced Computing, Networking and Security. Ed. by P. S. Thilagam et al. Vol. 7135. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. Chap. 70, pp. 602–611.
[54] H. Zhen et al. “Limitations of trust management schemes in VANET and countermeasures”. In: Personal Indoor and Mobile Radio Communications (PIMRC), 2011 IEEE 22nd Inter- national Symposium on, pp. 1228–1232.
[55] A. Wu, J. Ma, and S. Zhang. “RATE: A RSU-Aided Scheme for Data-Centric Trust Es- tablishment in VANETs”. In: Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on. 2011, pp. 1 –6.
[56] X. Zhuo et al. “Removal of misbehaving insiders in anonymous VANETs”. In: Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems. MSWiM ’09. Tenerife, Canary Islands, Spain: ACM, 2009, pp. 106–115.
[57] A. Tajeddine, A. Kayssi, and A. Chehab. “A Privacy-Preserving Trust Model for VANETs”. In: Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, pp. 832–837.
76
[58] E. Fonseca et al. “Support of Anonymity in VANETs - Putting Pseudonymity into Practice”. In: Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE. 2007, pp. 3400–3405.
[59] K. Sampigethaya et al. “AMOEBA: Robust Location Privacy Scheme for VANET”. In: Se- lected Areas in Communications, IEEE Journal on 25.8 (2007), pp. 1569 –1589.
[60] E. Schoch et al. “Impact of Pseudonym Changes on Geographic Routing in VANETs”. In: Security and Privacy in Ad-Hoc and Sensor Networks. Ed. by L. Butty ́an, V. Gligor, and D. Westhoff. Vol. 4357. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006, pp. 43–57.
[61] J. Petit. “Analysis of ECDSA Authentication Processing in VANETs”. In: New Technologies, Mobility and Security (NTMS), 2009 3rd International Conference on. 2009, pp. 1 –5.
[62] A. Perrig et al. “The TESLA broadcast authentication protocol”. In: RSA CryptoBytes 5.2 (2002), pp. 2–13.
[63] A. Wasef et al. “Complementing public key infrastructure to secure vehicular ad hoc net- works”. In: Wireless Communications, IEEE 17.5 (2010), pp. 22–28.
[64] A. Studer et al. “Flexible, extensible, and efficient VANET authentication”. In: Communi- cations and Networks, Journal of 11.6 (2009), pp. 574–588.
[65] I. 11770-3. Information technology - Security techniques - Key management - Part 3: Mech- anisms using asymmetric technologies -Second Edition. 2008.
[66] R. Schmidt et al. “Exploration of adaptive beaconing for efficient intervehicle safety commu- nication”. In: Network, IEEE 24.1 (2010), pp. 14–19.
[67] Y.-M. Chen and Y.-C. Wei. “A beacon-based trust management system for enhancing user centric location privacy in VANETs”. In: Communications and Networks, Journal of 15.2 (2013), pp. 153–163.
[68] G. Yan, S. Olariu, and M. C. Weigle. “Providing VANET security through active position detection”. In: Computer Communications 31.12 (2008), pp. 2883–2897.
[69] S.-H. Cha. “Comprehensive survey on distance/similarity measures between probability den- sity functions”. In: International Journal of Mathematical Models and Methods in Applied Sciences 1.4 (2008), pp. 300–307.
[70] H. M. Zahera, G. F. El-Hady, and W. F. A. El-Wahed. “Query Recommendation for Im- proving Search Engine Results”. In: (2011), pp. 45–52.
[71] Y. L. Sun et al. “Information theoretic framework of trust modeling and evaluation for ad hoc networks”. In: Selected Areas in Communications, IEEE Journal on 24.2 (2006), pp. 305– 317.
[72] J. Luo, X. Liu, and M. Fan. “A trust model based on fuzzy recommendation for mobile ad-hoc networks”. In: Computer Networks 53.14 (2009), pp. 2396–2407.
[73] T. M. Chen and V. Venkataramanan. “Dempster-Shafer theory for intrusion detection in ad hoc networks”. In: Internet Computing, IEEE 9.6 (2005), pp. 35–41.
[74] W. Li and A. Joshi. “Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory”. In: Mobile Data Management: Systems, Services and Middleware, 2009. MDM ’09. Tenth International Conference on. 2009, pp. 112–121.
[75] Y.-C. Wei and Y.-M. Chen. “An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs”. In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. 2012, pp. 393– 400.
[76] Y.-C. Wei, Y.-M. Chen, and H.-L. Shan. “Beacon-based trust management for location pri- vacy enhancement VANETs”. In: Network Operations and Management Symposium (AP- NOMS), 2011 13th Asia-Pacific. 2011, pp. 1–8.
[77] A. Abdrabou and Z. Weihua. “Probabilistic Delay Control and Road Side Unit Placement for Vehicular Ad Hoc Networks with Disrupted Connectivity”. In: Selected Areas in Com- munications, IEEE Journal on 29.1 (2011), pp. 129–139.
77
[78] B Aslam et al. “Secure Traffic Data Propagation in Vehicular Ad hoc Networks”. In: Int. J. Ad Hoc and Ubiquitous Computing 6.1 (2010), pp. 24–39.
[79] C. Harsch, A. Festag, and P. Papadimitratos. “Secure Position-Based Routing for VANETs”. In: Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE 66th, pp. 26–30.
[80] Y. Wei and K. J. R. Liu. “Attack-resistant cooperation stimulation in autonomous ad hoc networks”. In: Selected Areas in Communications, IEEE Journal on 23.12 (2005), pp. 2260– 2271.
[81] C. J. V. Rijsbergen. Information Retrieval. 2nd. Newton, MA, USA: Butterworth-Heinemann, 1979.
[82] A. Kherani and A. Rao. “Performance of Node-Eviction Schemes in Vehicular Networks”. In: Vehicular Technology, IEEE Transactions on 59.2 (2010), pp. 550–558. |