On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS)
暂无分享,去创建一个
[1] Ilja Radusch,et al. Realistic simulation of vehicular communication and vehicle-2-X applications , 2008, Simutools 2008.
[2] Ana I. González-Tablas,et al. Overview of security issues in Vehicular Ad-hoc Networks , 2011 .
[3] Al-Sakib Khan Pathan,et al. Wireless Networks and Security, Issues, Challenges and Research Trends , 2013, Wireless Networks and Security.
[4] S. Hausberger. Emission Factors from the Model PHEM for the HBEFA Version 3 , 2009 .
[5] Amer Aijaz,et al. Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .
[6] Ilja Radusch,et al. Runtime infrastructure for simulating vehicle-2-x communication scenarios , 2008, VANET '08.
[7] Meiyuan Zhao,et al. Security challenges for the intelligent transportation system , 2012, SecurIT '12.
[8] G. H. Raisoni,et al. Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .
[9] Stephan Olariu,et al. Towards autonomous vehicular clouds , 2011, EAI Endorsed Trans. Mob. Commun. Appl..
[10] Heekuck Oh,et al. Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks , 2014, J. Inf. Process. Syst..
[11] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[12] Sherali Zeadally,et al. Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.
[13] Irshad Ahmed Sumra,et al. Effects of attackers and attacks on availability requirement in vehicular network: A survey , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).
[14] Maxim Raya,et al. TraCI: an interface for coupling road traffic and network simulators , 2008, CNS '08.
[15] Sangjin Kim,et al. Rethinking Vehicular Communications: Merging VANET with cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[16] Sherali Zeadally,et al. Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..
[17] Ilja Radusch,et al. Integration of Communication Security into Advanced Simulation Environments for ITS , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).
[18] Ilja Radusch,et al. Simulation of attacks and corresponding driver behavior in vehicular ad hoc networks with VSimRTI , 2011, SimuTools.
[19] Pino Caballero-Gil. Security Issues in Vehicular Ad Hoc Networks , 2011 .
[20] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[21] Hong Liu,et al. A new anti-jamming strategy for VANET metrics-directed security defense , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[22] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[23] S. Siva Sathya,et al. A Survey on Routing Protocols and its Issues in VANET , 2011 .
[24] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[25] Matthias Gerlach,et al. Implementing Trusted Vehicular Communications , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[26] Björn Schünemann,et al. V2X simulation runtime infrastructure VSimRTI: An assessment tool to design smart traffic management systems , 2011, Comput. Networks.
[27] M. A. Razzaque,et al. Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead , 2013, Wireless Networks and Security.
[28] Christoph Meinel,et al. Realistic Simulation of V2X Communication Scenarios , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[29] Dr.Irshad Ahmed Sumra,et al. Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey , 2015 .
[30] Alejandro Quintero,et al. VANET security surveys , 2014, Comput. Commun..
[31] Jelena V. Misic,et al. DDoS attack on WAVE-enabled VANET through synchronization , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[32] Jetzabel Maritza Serna-Olvera. A trust-driven privacy architecture for vehicular ad-hoc networks , 2013 .
[33] Halabi Hasbullah,et al. Denial of Service (DOS) Attack and Its Possible Solutions in VANET , 2010 .
[34] Daniel Krajzewicz,et al. Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .
[35] Guobin Xu,et al. On an efficient and effective Intelligent Transportation System (ITS) using field and simulation data , 2014, Sensing Technologies + Applications.
[36] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[37] Stefan Hausberger,et al. Update of Emission Factors for Euro 5 and Euro 6 Vehicles for the Hbefa Version 3.2 Final Report Update of Emission Factors for Euro 5 and Euro 6 Vehicles for the Hbefa Version 3.2 Final Report Content , 2013 .
[38] N Ntlatlapa,et al. Towards designing energy-efficient routing protocol for wireless mesh networks , 2009 .
[39] Liana K. Qabajeh,et al. A scalable and secure position-based routing protocols for ad-hoc networks , 2009 .
[40] Michel Barbeau,et al. Threats to Security in DSRC/WAVE , 2006, ADHOC-NOW.