A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)
暂无分享,去创建一个
Jun Liang | Wensong Wang | Muhammad Sameer Sheikh | Muhammad Sameer Sheikh | Jun Liang | Wensong Wang
[1] Mohammed Saeed Al-kahtani,et al. Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.
[2] Fei-Yue Wang,et al. A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.
[3] MengChu Zhou,et al. Routing in Internet of Vehicles: A Review , 2015, IEEE Transactions on Intelligent Transportation Systems.
[4] Arputharaj Kannan,et al. Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[5] Jinsong Wu,et al. Adaptive Quality-of-Service-Based Routing for Vehicular Ad Hoc Networks With Ant Colony Optimization , 2017, IEEE Transactions on Vehicular Technology.
[6] Jinhua Guo,et al. A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework , 2007, 2007 Mobile Networking for Vehicular Environments.
[7] Pandi Vijayakumar,et al. EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.
[8] Xiaohui Liang,et al. A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs , 2012, IEEE Transactions on Intelligent Transportation Systems.
[9] Yang Li,et al. Efficient authentication and access control of message dissemination over vehicular ad hoc network , 2016, Neurocomputing.
[10] Teruo Higashino,et al. Efficient VANET-Based Traffic Information Sharing using Buses on Regular Routes , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[11] Kyung-Ah Shim,et al. ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks , 2012, IEEE Transactions on Vehicular Technology.
[12] Nader Moayeri,et al. Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[13] Joseph Mouzna,et al. An optimized adaptive algorithm for authentication of safety critical messages in VANET , 2013, 2013 8th International Conference on Communications and Networking in China (CHINACOM).
[14] Azim Eskandarian,et al. Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.
[15] Marios D. Dikaiakos,et al. Low-Cost Adaptive Monitoring Techniques for the Internet of Things , 2018, IEEE Transactions on Services Computing.
[16] Lukas Malina,et al. Short-Term Linkable Group Signatures with Categorized Batch Verification , 2012, FPS.
[17] John Fagan,et al. Countermeasures for GPS Signal Spoofing , 2005 .
[18] Yasser L. Morgan,et al. Notes on DSRC & WAVE Standards Suite: Its Architecture, Design, and Characteristics , 2010, IEEE Communications Surveys & Tutorials.
[19] Pin-Han Ho,et al. TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.
[20] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[21] R. Jueneman,et al. Message authentication , 1985, IEEE Communications Magazine.
[22] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[23] George F. Riley,et al. The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.
[24] Lei Zhang,et al. OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Information Forensics and Security.
[25] Jelena V. Misic,et al. DDoS attack on WAVE-enabled VANET through synchronization , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[26] Ian F. Blake,et al. Refinements of Miller's algorithm for computing the Weil/Tate pairing , 2006, J. Algorithms.
[27] Arobinda Gupta,et al. Distributed Misbehavior Detection in VANETs , 2009, 2009 IEEE Wireless Communications and Networking Conference.
[28] Mahamod Ismail,et al. Vehicular communication ad hoc routing protocols: A survey , 2014, J. Netw. Comput. Appl..
[29] Xiaoyan Zhu,et al. An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.
[30] Ozan K. Tonguz,et al. Feasibility of virtual traffic lights in non-line-of-sight environments , 2012, VANET '12.
[31] Nai-Wei Lo,et al. Illusion Attack on VANET Applications - A Message Plausibility Problem , 2007, 2007 IEEE Globecom Workshops.
[32] Sherali Zeadally,et al. Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.
[33] Sungjin Park,et al. Improving Data Accessibility in Vehicle Ad hoc Network , 2012 .
[34] Xiaodong Lin,et al. Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[35] Josep Domingo-Ferrer,et al. Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response , 2015, IEEE Transactions on Computers.
[36] Jie Cui,et al. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks , 2018, Inf. Sci..
[37] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[38] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[39] Stephan Olariu,et al. Taking VANET to the clouds , 2010, Int. J. Pervasive Comput. Commun..
[40] Sunilkumar S. Manvi,et al. A survey on authentication schemes in VANETs for secured communication , 2017, Veh. Commun..
[41] Rex Chen,et al. TARI: Meeting Delay Requirements in VANETs with Efficient Authentication and Revocation , 2009 .
[42] Anis Laouiti,et al. VANet security challenges and solutions: A survey , 2017, Veh. Commun..
[43] Michael Weber,et al. V-Tokens for Conditional Pseudonymity in VANETs , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[44] Y. Koucheryavy,et al. State of the Art and Research Challenges for VANETs , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[45] András Varga,et al. An overview of the OMNeT++ simulation environment , 2008, SimuTools.
[46] Pandi Vijayakumar,et al. Comprehensive survey on security services in vehicular ad-hoc networks , 2016 .
[47] Tao Zhang,et al. Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).
[48] Rajkumar Buyya,et al. A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..
[49] Chun-I Fan,et al. Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings , 2011, J. Inf. Sci. Eng..
[50] Ajay Kaul,et al. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..
[51] S. A. Kulkarni,et al. A secure message authentication scheme for VANET using ECDSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[52] Li He,et al. Mitigating DoS attacks against signature-based authentication in VANETs , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).
[53] Murizah Kassim,et al. Mobile ad hoc network (MANET) routing protocols comparison for wireless sensor network , 2011, 2011 IEEE International Conference on System Engineering and Technology.
[54] Yael Tauman Kalai,et al. Improved Online/Offline Signature Schemes , 2001, CRYPTO.
[55] Seema Bawa,et al. A systematic review on routing protocols for Vehicular Ad Hoc Networks , 2014, Veh. Commun..
[56] Li Zhao,et al. LTE-V: A TD-LTE-Based V2X Solution for Future Vehicular Network , 2016, IEEE Internet of Things Journal.
[57] S. Yousefi,et al. Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.
[58] Rajkumar Buyya,et al. A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[59] Feng Xia,et al. Vehicular Social Networks: A survey , 2018, Pervasive Mob. Comput..
[60] Rakesh Kumar,et al. VANET security: Issues, challenges and solutions , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[61] S. Eichler. Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks depending on Node Mobility , 2007, 2007 IEEE Intelligent Vehicles Symposium.
[62] Pin-Han Ho,et al. An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.
[63] V. Vijayalakshmi,et al. Survey on various mechanisms for secure and efficient VANET communication , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[64] Sherali Zeadally,et al. Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..
[65] Miguel Sepulcre,et al. Analytical Models of the Performance of C-V2X Mode 4 Vehicular Communications , 2018, IEEE Transactions on Vehicular Technology.
[66] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[67] Srinivas Sampalli,et al. A novel sender authentication scheme based on hash chain for Vehicular Ad-Hoc Networks , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).
[68] E. Nowatkowski Michael,et al. Scalable certificate revocation list distribution in vehicular ad hoc networks , 2010, 2010 IEEE Globecom Workshops.
[69] Rongqing Zhang,et al. Interference-free pilot design and channel estimation using ZCZ sequences for MIMO-OFDM-based C-V2X communications , 2018, China Communications.
[70] Daniel Krajzewicz,et al. iTETRIS: Adaptation of ITS Technologies for Large Scale Integrated Simulation , 2010, 2010 IEEE 71st Vehicular Technology Conference.
[71] Qiaoyan Wen,et al. Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.
[72] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[73] Sevil Sen,et al. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.
[74] Prathima Agrawal,et al. Analysis of Certificate Revocation List Distribution Protocols for Vehicular Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[75] Yanheng Liu,et al. Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..
[76] Yuanfei Zhang,et al. Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud , 2020, IEEE Transactions on Dependable and Secure Computing.
[77] Daniel Krajzewicz,et al. SUMO - Simulation of Urban MObility An Overview , 2011 .
[78] Rashid Minhas,et al. Effects of jamming on IEEE 802.11p systems , 2010 .
[79] Rajen Akalu. Privacy, consent and vehicular ad hoc networks (VANETs) , 2018, Comput. Law Secur. Rev..
[80] Chan Yeob Yeun,et al. Security Challenges for Emerging VANETs , 2009 .
[81] Laurie L. Joiner,et al. Interference aware bandwidth estimation for load balancing in EMHR-energy based with mobility concerns hybrid routing protocol for VANET-WSN communication , 2017, Ad Hoc Networks.
[82] Markus Jakobsson,et al. Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.
[83] Xiaohui Liang,et al. STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.
[84] Wen-Long Jin,et al. Broadcasting safety information in vehicular networks: issues and approaches , 2010, IEEE Network.
[85] Dr.Irshad Ahmed Sumra,et al. Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey , 2015 .
[86] Alejandro Quintero,et al. VANET security surveys , 2014, Comput. Commun..
[87] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[88] Amir Hossein Jahangir,et al. Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).
[89] Eylem Ekici,et al. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.
[90] Lee Armstrong,et al. DEDICATED SHORT RANGE COMMUNICATIONS (DSRC) HOME , 2002 .
[91] Urmila Shrawankar,et al. Secured Communication in Real Time VANET , 2009, 2009 Second International Conference on Emerging Trends in Engineering & Technology.
[92] Susumu Ishihara,et al. Distributing location-dependent data in VANETs by guiding data traffic to high vehicle density areas , 2010, 2010 IEEE Vehicular Networking Conference.
[93] Martin Fränzle,et al. A Traffic Aware Segment-based Routing protocol for VANETs in urban scenarios , 2018, Comput. Electr. Eng..
[94] Marios D. Dikaiakos,et al. ADMin: Adaptive monitoring dissemination for the Internet of Things , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[95] Mohsen Guizani,et al. ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.
[96] Christof Paar,et al. Elliptic Curve Cryptography on Smart Cards without Coprocessors , 2001, CARDIS.
[97] Juan-Carlos Cano,et al. Trust Management for Vehicular Networks: An Adversary-Oriented Overview , 2016, IEEE Access.
[98] Josep Domingo-Ferrer,et al. Distributed Aggregate Privacy-Preserving Authentication in VANETs , 2017, IEEE Transactions on Intelligent Transportation Systems.
[99] Fagen Li,et al. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey , 2019, Veh. Commun..
[100] Alexey V. Vinel,et al. AI-Based Malicious Network Traffic Detection in VANETs , 2018, IEEE Network.
[101] Ke Zeng,et al. Pseudonymous PKI for Ubiquitous Computing , 2006, EuroPKI.
[102] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[103] Seung-Woo Seo,et al. RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications , 2011, IEEE Journal on Selected Areas in Communications.
[104] Jing Zhang,et al. An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks , 2019, IEEE Transactions on Intelligent Transportation Systems.
[105] Anis Laouiti,et al. Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.
[106] Reinhard German,et al. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.
[107] Leonard Barolli,et al. Effect of security and trustworthiness for a fuzzy cluster management system in VANETs , 2019, Cognitive Systems Research.
[108] Josep Domingo-Ferrer,et al. Practical secure and privacy-preserving scheme for value-added applications in VANETs , 2015, Comput. Commun..
[109] Tan Yan,et al. A Distributed Intersection Management Protocol for Safety, Efficiency, and Driver’s Comfort , 2018, IEEE Internet of Things Journal.
[110] Ashutosh Saxena,et al. A novel remote user authentication scheme using bilinear pairings , 2006, Comput. Secur..
[111] Christian Bonnet,et al. Vehicular Mobility Simulation for VANETs , 2007, 40th Annual Simulation Symposium (ANSS'07).
[112] Javier Gozalvez,et al. LTE-V for Sidelink 5G V2X Vehicular Communications: A New 5G Technology for Short-Range Vehicle-to-Everything Communications , 2017, IEEE Vehicular Technology Magazine.
[113] Md Zakirul Alam Bhuiyan,et al. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.
[114] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[115] Soumyadev Maity,et al. A Protocol for Authentication with Multiple Levels of Anonymity (AMLA) in VANETs , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[116] Abdelwahab Boualouache,et al. A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks , 2017, IEEE Communications Surveys & Tutorials.
[117] Jia-Lun Tsai,et al. Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings , 2014, Int. J. Commun. Syst..
[118] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[119] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[120] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[121] L. Hui. Security and Privacy Issues for Inter-vehicle Communcations in VANETs , 2009 .
[122] Jinshu Su,et al. An efficient distributed key management scheme for group-signature based anonymous authentication in VANET , 2012, Secur. Commun. Networks.
[123] Rutvij H. Jhaveri,et al. Trust Based Approaches for Secure Routing in VANET: A Survey , 2015 .
[124] Kuo-Yu Tsai,et al. An efficient certificateless signature scheme without bilinear pairings , 2014, Multimedia Tools and Applications.
[125] Maxim Raya,et al. TraCI: an interface for coupling road traffic and network simulators , 2008, CNS '08.
[126] Stephan Olariu,et al. Vehicular Networks: From Theory to Practice , 2009 .
[127] Hussein Zedan,et al. A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..
[128] Adrian Perrig,et al. Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.
[129] Xuemin Shen,et al. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.
[130] Maxim Raya,et al. Security Aspects of Inter-Vehicle Communications , 2005 .
[131] Panagiotis Papadimitratos,et al. TraNS: realistic joint traffic and network simulator for VANETs , 2008, MOCO.
[132] Bo Sun,et al. A Traffic-Light-Aware Routing Protocol Based on Street Connectivity for Urban Vehicular Ad Hoc Networks , 2016, IEEE Communications Letters.
[133] Lei Zhang,et al. Key Management Scheme for Secure Channel Establishment in Fog Computing , 2021, IEEE Transactions on Cloud Computing.
[134] Jia-Lun Tsai,et al. An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings , 2016, IEEE Transactions on Intelligent Transportation Systems.
[135] Jochen Seitz,et al. Vehicle-to-Pedestrian Communication for Vulnerable Road Users: Survey, Design Considerations, and Challenges , 2019, Sensors.
[136] Daniel Krajzewicz,et al. Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .
[137] Xiang Cheng,et al. 5G-Enabled Cooperative Intelligent Vehicular (5GenCIV) Framework: When Benz Meets Marconi , 2017, IEEE Intelligent Systems.
[138] Jian Wang,et al. A Survey of Vehicle to Everything (V2X) Testing , 2019, Sensors.
[139] Gang Qu,et al. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy , 2019, IEEE Transactions on Intelligent Transportation Systems.
[140] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[141] Kemal Akkaya,et al. A survey of authentication schemes for vehicular ad hoc networks , 2011, Secur. Commun. Networks.
[142] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[143] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[144] Akbar Ghaffar Pour Rahbar,et al. Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks , 2011, Multimedia Tools and Applications.
[145] Ana I. González-Tablas,et al. Overview of security issues in Vehicular Ad-hoc Networks , 2011 .
[146] Yuguang Fang,et al. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[147] Klaus Wehrle,et al. Modeling and Tools for Network Simulation , 2010, Modeling and Tools for Network Simulation.
[148] Javier Gozalvez,et al. LTE-V for Sidelink 5 G V 2 X Vehicular Communications , 2022 .
[149] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[150] Dong Hoon Lee,et al. Efficient Message Authentication Scheme for VANET , 2009, INSCRYPT 2009.
[151] Victor I. Chang,et al. Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , 2018, Future Gener. Comput. Syst..
[152] M.S. Kakkasageri,et al. Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach , 2009, 2009 International Conference on Future Computer and Communication.
[153] Mohammad S. Obaidat,et al. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..
[154] G. H. Raisoni,et al. Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .
[155] Huang Lu,et al. A novel ID-based authentication framework with adaptive privacy preservation for VANETs , 2012, 2012 Computing, Communications and Applications Conference.
[156] Todd R. Andel,et al. On the credibility of manet simulations , 2006, Computer.
[157] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[158] Sudip Misra,et al. Guide to Wireless Ad Hoc Networks , 2009, Computer Communications and Networks.
[159] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[160] Qi Chen,et al. Overhaul of ieee 802.11 modeling and simulation in ns-2 , 2007, MSWiM '07.
[161] Jeng-Farn Lee,et al. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.
[162] Xian Wang,et al. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks , 2015, Inf. Sci..