Providing VANET security through active position detection
暂无分享,去创建一个
Gongjun Yan | Stephan Olariu | Michele C. Weigle | Gyanesh Choudhary | S. Olariu | Gongjun Yan | M. Weigle | Gyanesh Choudhary
[1] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[2] Zygmunt J. Haas,et al. A new routing protocol for the reconfigurable wireless networks , 1997, Proceedings of ICUPC 97 - 6th International Conference on Universal Personal Communications.
[3] Jie Wu,et al. Proactive route maintenance in wireless ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[4] Mato Baotic,et al. Multi-object Adaptive Cruise Control , 2008, HSCC.
[5] Tim Leinmüller,et al. Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.
[6] A. Takahashi,et al. Introduction of Honda ASV-2 (advanced safety vehicle-phase 2) , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).
[7] A. Yasinsac,et al. Ad hoc network security: peer identification and authentication using signal properties , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[8] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[9] Mario Gerla,et al. Emergency related video streaming in VANET using network coding , 2006, VANET '06.
[10] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[11] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[12] Maxim Raya,et al. Efficient secure aggregation in VANETs , 2006, VANET '06.
[13] Markus Jakobsson,et al. Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[14] Soe-Tsyr Yuan,et al. Ontology-Based Structured Cosine Similarity in Speech Document Summarization , 2004, IEEE/WIC/ACM International Conference on Web Intelligence (WI'04).
[15] Martin Mauve,et al. A Reactive Location Service for Mobile Ad Hoc Networks , 2002 .
[16] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[17] Thomas Nowey,et al. Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[18] Tim Leinmüller,et al. Influence of falsified position data on geographic ad-hoc routing , 2005 .
[19] Brian Neil Levine,et al. Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[20] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[21] T. Leinmüller,et al. Greedy Routing in Highway Scenarios : The Impact of Position Faking Nodes , 2006 .
[22] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[23] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[24] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[25] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[26] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[27] Markus G. Kuhn,et al. An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.
[28] Lei Tian,et al. Improving GPS positioning precision by using optical encoders , 2000, ITSC2000. 2000 IEEE Intelligent Transportation Systems. Proceedings (Cat. No.00TH8493).
[29] Liviu Iftode,et al. Probabilistic validation of aggregated data in vehicular ad-hoc networks , 2006, VANET '06.