Issues, Challenges, and Research Opportunities in Intelligent Transport System for Security and Privacy

[1]  Andrea Baiocchi,et al.  Vehicular Ad-Hoc Networks sampling protocols for traffic monitoring and incident detection in Intelligent Transportation Systems , 2015 .

[2]  Zhipeng Cai,et al.  FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.

[3]  Xiang Cheng,et al.  Data Dissemination in VANETs: A Scheduling Approach , 2014, IEEE Transactions on Intelligent Transportation Systems.

[4]  Ibrahim Abdullah,et al.  Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count , 2015 .

[5]  Abdelwahab Boualouache,et al.  A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks , 2017, IEEE Communications Surveys & Tutorials.

[6]  Jaime Lloret Mauri,et al.  CODIE: Controlled Data and Interest Evaluation in Vehicular Named Data Networks , 2016, IEEE Transactions on Vehicular Technology.

[7]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[8]  Joel J. P. C. Rodrigues,et al.  An intelligent approach for building a secure decentralized public key infrastructure in VANET , 2015, J. Comput. Syst. Sci..

[9]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[10]  Matthew R. McKay,et al.  On the Equivalence Between Interference and Eavesdropping in Wireless Communications , 2014, IEEE Transactions on Vehicular Technology.

[11]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[12]  Hsiao-Hwa Chen,et al.  Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.

[13]  Xinwen Fu,et al.  A context-aware scheme for privacy-preserving location-based services , 2012, Comput. Networks.

[14]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[15]  Rui Li,et al.  Towards a Low-Cost Remote Memory Attestation for the Smart Grid , 2015, Sensors.

[16]  Victor C. M. Leung,et al.  Anti-Eavesdropping Schemes for Interference Alignment (IA)-Based Wireless Networks , 2016, IEEE Transactions on Wireless Communications.

[17]  Radha Poovendran,et al.  A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems , 2013, IEEE Transactions on Automatic Control.

[18]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[19]  Pingzhi Fan,et al.  b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET , 2013, IEEE Transactions on Information Forensics and Security.

[20]  Pin-Han Ho,et al.  Security in vehicular ad hoc networks , 2008, IEEE Commun. Mag..

[21]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[22]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[23]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[24]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[25]  Yu Cheng,et al.  A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.

[26]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[27]  Xuemin Shen,et al.  EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.

[28]  Xiaodong Lin,et al.  Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[29]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[30]  Liehuang Zhu,et al.  2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.

[31]  Pabitra Mohan Khilar,et al.  Vehicular communication: a survey , 2014 .

[32]  Jeng-Farn Lee,et al.  TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.

[33]  Wei Yu,et al.  On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems , 2016, IEEE Trans. Parallel Distributed Syst..

[34]  Prashant Johri,et al.  Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey , 2017 .

[35]  Guihai Chen,et al.  Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems , 2015, IEEE Transactions on Mobile Computing.

[36]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[37]  Hung-Yu Chien,et al.  ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.

[38]  Weijia Jia,et al.  A New Cell-Counting-Based Attack Against Tor , 2012, IEEE/ACM Transactions on Networking.

[39]  Pin-Han Ho,et al.  An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.

[40]  Xinyu Yang,et al.  A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[41]  Liehuang Zhu,et al.  LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication , 2014, Computing.

[42]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[43]  Xinyu Yang,et al.  Towards Multistep Electricity Prices in Smart Grid Electricity Markets , 2016, IEEE Transactions on Parallel and Distributed Systems.

[44]  Tao Zhang,et al.  Attacks and countermeasures in the internet of vehicles , 2016, Annals of Telecommunications.

[45]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[46]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[47]  Hui Li,et al.  Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks , 2014, IEEE Transactions on Vehicular Technology.

[48]  Xuemin Shen,et al.  Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.

[49]  Xinwen Fu,et al.  Self-Disciplinary Worms and Countermeasures: Modeling and Analysis , 2010, IEEE Transactions on Parallel and Distributed Systems.

[50]  Manoj Duhan,et al.  An effective implementation of security based algorithmic approach in mobile adhoc networks , 2014, Human-centric Computing and Information Sciences.

[51]  Xiaodong Lin,et al.  An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[52]  Xue Liu,et al.  Performance and Reliability Analysis of IEEE 802.11p Safety Communication in a Highway Environment , 2013, IEEE Transactions on Vehicular Technology.

[53]  Cheng Huang,et al.  PTRS: A privacy-preserving trust-based relay selection scheme in VANETs , 2016, Peer-to-Peer Networking and Applications.

[54]  Guillermo Acosta-Marum,et al.  Wave: A tutorial , 2009, IEEE Communications Magazine.

[55]  Anis Laouiti,et al.  Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.