Issues, Challenges, and Research Opportunities in Intelligent Transport System for Security and Privacy
暂无分享,去创建一个
Naveed Ahmad | Abdul Malik | Gauhar Ali | Qazi Ejaz Ali | Waheed Rehman | Naveed Ahmad | W. Rehman | Gauhar Ali | Abdul Malik
[1] Andrea Baiocchi,et al. Vehicular Ad-Hoc Networks sampling protocols for traffic monitoring and incident detection in Intelligent Transportation Systems , 2015 .
[2] Zhipeng Cai,et al. FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.
[3] Xiang Cheng,et al. Data Dissemination in VANETs: A Scheduling Approach , 2014, IEEE Transactions on Intelligent Transportation Systems.
[4] Ibrahim Abdullah,et al. Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count , 2015 .
[5] Abdelwahab Boualouache,et al. A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks , 2017, IEEE Communications Surveys & Tutorials.
[6] Jaime Lloret Mauri,et al. CODIE: Controlled Data and Interest Evaluation in Vehicular Named Data Networks , 2016, IEEE Transactions on Vehicular Technology.
[7] Hussein Zedan,et al. A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..
[8] Joel J. P. C. Rodrigues,et al. An intelligent approach for building a secure decentralized public key infrastructure in VANET , 2015, J. Comput. Syst. Sci..
[9] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[10] Matthew R. McKay,et al. On the Equivalence Between Interference and Eavesdropping in Wireless Communications , 2014, IEEE Transactions on Vehicular Technology.
[11] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[12] Hsiao-Hwa Chen,et al. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.
[13] Xinwen Fu,et al. A context-aware scheme for privacy-preserving location-based services , 2012, Comput. Networks.
[14] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[15] Rui Li,et al. Towards a Low-Cost Remote Memory Attestation for the Smart Grid , 2015, Sensors.
[16] Victor C. M. Leung,et al. Anti-Eavesdropping Schemes for Interference Alignment (IA)-Based Wireless Networks , 2016, IEEE Transactions on Wireless Communications.
[17] Radha Poovendran,et al. A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems , 2013, IEEE Transactions on Automatic Control.
[18] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[19] Pingzhi Fan,et al. b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET , 2013, IEEE Transactions on Information Forensics and Security.
[20] Pin-Han Ho,et al. Security in vehicular ad hoc networks , 2008, IEEE Commun. Mag..
[21] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[22] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[23] Alejandro Quintero,et al. VANET security surveys , 2014, Comput. Commun..
[24] Eylem Ekici,et al. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.
[25] Yu Cheng,et al. A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[26] Adrian Perrig,et al. Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.
[27] Xuemin Shen,et al. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.
[28] Xiaodong Lin,et al. Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[29] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[30] Liehuang Zhu,et al. 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.
[31] Pabitra Mohan Khilar,et al. Vehicular communication: a survey , 2014 .
[32] Jeng-Farn Lee,et al. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.
[33] Wei Yu,et al. On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems , 2016, IEEE Trans. Parallel Distributed Syst..
[34] Prashant Johri,et al. Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey , 2017 .
[35] Guihai Chen,et al. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems , 2015, IEEE Transactions on Mobile Computing.
[36] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[37] Hung-Yu Chien,et al. ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.
[38] Weijia Jia,et al. A New Cell-Counting-Based Attack Against Tor , 2012, IEEE/ACM Transactions on Networking.
[39] Pin-Han Ho,et al. An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.
[40] Xinyu Yang,et al. A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[41] Liehuang Zhu,et al. LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication , 2014, Computing.
[42] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[43] Xinyu Yang,et al. Towards Multistep Electricity Prices in Smart Grid Electricity Markets , 2016, IEEE Transactions on Parallel and Distributed Systems.
[44] Tao Zhang,et al. Attacks and countermeasures in the internet of vehicles , 2016, Annals of Telecommunications.
[45] Fei-Yue Wang,et al. A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.
[46] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[47] Hui Li,et al. Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks , 2014, IEEE Transactions on Vehicular Technology.
[48] Xuemin Shen,et al. Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.
[49] Xinwen Fu,et al. Self-Disciplinary Worms and Countermeasures: Modeling and Analysis , 2010, IEEE Transactions on Parallel and Distributed Systems.
[50] Manoj Duhan,et al. An effective implementation of security based algorithmic approach in mobile adhoc networks , 2014, Human-centric Computing and Information Sciences.
[51] Xiaodong Lin,et al. An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[52] Xue Liu,et al. Performance and Reliability Analysis of IEEE 802.11p Safety Communication in a Highway Environment , 2013, IEEE Transactions on Vehicular Technology.
[53] Cheng Huang,et al. PTRS: A privacy-preserving trust-based relay selection scheme in VANETs , 2016, Peer-to-Peer Networking and Applications.
[54] Guillermo Acosta-Marum,et al. Wave: A tutorial , 2009, IEEE Communications Magazine.
[55] Anis Laouiti,et al. Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.