A Highly Secured QoS Aware Routing Algorithm for Software Defined Vehicle Ad-Hoc Networks Using Optimal Trust Management Scheme
暂无分享,去创建一个
[1] Xuemin Shen,et al. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.
[2] Andrew Lewis,et al. The Whale Optimization Algorithm , 2016, Adv. Eng. Softw..
[3] Jie Cui,et al. Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET , 2016 .
[4] Xiaodong Lin,et al. A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.
[5] Xiaodong Lin,et al. Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[6] Hassan Artail,et al. A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[7] Jeng-Farn Lee,et al. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.
[8] Sherali Zeadally,et al. Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..
[9] Vanga Odelu,et al. Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks , 2017, IEEE Access.
[10] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[11] Jian Shen,et al. Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs , 2016 .
[12] Giuseppe Ricci,et al. A Localization Algorithm Based on V2I Communications and AOA Estimation , 2017, IEEE Signal Processing Letters.
[13] Pabitra Mohan Khilar,et al. SIR: a secure and intelligent routing protocol for vehicular ad hoc network , 2015, IET Networks.
[14] Qiang Ni,et al. Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs , 2016, IEEE Transactions on Dependable and Secure Computing.
[15] D. Turgay Altilar,et al. Uplink utilization with V2V2R communications in clustered vehicular networks , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).
[16] Elmar Schoch,et al. Resilient secure aggregation for vehicular networks , 2010, IEEE Network.
[17] Jing Zhang,et al. SPACF: A Secure Privacy-Preserving Authentication Scheme for VANET With Cuckoo Filter , 2017, IEEE Transactions on Vehicular Technology.
[18] Song Guo,et al. Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications , 2014, IEEE Transactions on Parallel and Distributed Systems.
[19] Tim Leinmüller,et al. POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.
[20] Kyung-Ah Shim,et al. ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks , 2012, IEEE Transactions on Vehicular Technology.
[21] Liehuang Zhu,et al. 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.
[22] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[23] Yu-Chee Tseng,et al. A Multi-channel MAC Protocol with Power Control for Multi-hop Mobile Ad Hoc Networks , 2002, Comput. J..
[24] Fredrik Tufvesson,et al. A Measurement-Based Multilink Shadowing Model for V2V Network Simulations of Highway Scenarios , 2017, IEEE Transactions on Vehicular Technology.