A survey of local/cooperative-based malicious information detection techniques in VANETs
暂无分享,去创建一个
Muhammad Arshad | Yue Cao | Zahid Ullah | Naveed Ahmad | Muhammad Khalid | Haithiam Criuckshank | Yue Cao | M. Arshad | Z. Ullah | Muhammad Khalid | Naveed Ahmad | Haithiam Criuckshank
[1] Nadeem Javaid,et al. SEDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater WSNs , 2015, ANT/SEIT.
[2] Xiang Cheng,et al. Channel Prediction Based Scheduling for Data Dissemination in VANETs , 2017, IEEE Communications Letters.
[3] Xinlei Zhang,et al. Using trust model to ensure reliable data acquisition in VANETs , 2017, Ad Hoc Networks.
[4] G. Singh,et al. Fox-Hole Model for Data-centric Misbehaviour Detection in VANETs , 2012, 2012 Third International Conference on Computer and Communication Technology.
[5] Pandi Vijayakumar,et al. EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.
[6] Rashid Minhas,et al. Effects of jamming on IEEE 802.11p systems , 2010 .
[7] Muttukrishnan Rajarajan,et al. Data-centric Rogue Node Detection in VANETs , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[8] Xiang Cheng,et al. A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks , 2015, IEEE Transactions on Intelligent Transportation Systems.
[9] Muttukrishnan Rajarajan,et al. Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.
[10] Zhong Chen,et al. Proof-of-relevance: Filtering false data via authentic consensus in Vehicle Ad-hoc Networks , 2008, IEEE INFOCOM Workshops 2008.
[11] Pino Caballero-Gil,et al. Countermeasures to Prevent Misbehaviour in VANETs , 2012, J. Univers. Comput. Sci..
[12] Frank Kargl,et al. Misbehavior detection in vehicular ad-hoc networks , 2013 .
[13] Weisong Shi,et al. $RD^{4}$: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs , 2010, IEEE Transactions on Vehicular Technology.
[14] Dijiang Huang,et al. Cheater Detection in Vehicular Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[15] T. Mantoro,et al. Energy consumption evaluation in trust and reputation models for Wireless Sensor Networks , 2013, 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M).
[16] Haitham S. Cruickshank,et al. Pseudonymised communication in delay tolerant networks , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[17] Huirong Fu,et al. Evaluation of active position detection in Vehicular Ad Hoc Networks , 2014, 2014 International Joint Conference on Neural Networks (IJCNN).
[18] Xiang Cheng,et al. 5G-Enabled Cooperative Intelligent Vehicular (5GenCIV) Framework: When Benz Meets Marconi , 2017, IEEE Intelligent Systems.
[19] R. P. Barnwal,et al. Heartbeat Message Based Misbehavior Detection Scheme for Vehicular Ad-hoc Networks , 2012, 2012 International Conference on Connected Vehicles and Expo (ICCVE).
[20] Alejandro Quintero,et al. VANET security surveys , 2014, Comput. Commun..
[21] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[22] Xiang Cheng,et al. An adaptive geometry-based stochastic model for non-isotropic MIMO mobile-to-mobile channels , 2009, IEEE Transactions on Wireless Communications.
[23] Mosa Ali Abu-Rgheff,et al. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.
[24] Muhammad Arshad,et al. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks , 2017, J. Sensors.
[25] Nai-Wei Lo,et al. Illusion Attack on VANET Applications - A Message Plausibility Problem , 2007, 2007 IEEE Globecom Workshops.
[26] Fuad A. Ghaleb,et al. Data Verification and Misbehavior Detection in Vehicular Ad-hoc Networks , 2015 .
[27] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[28] Azizol Abdullah,et al. Vehicular Ad Hoc Networks and Security Issues: Survey , 2017 .
[29] Xuemin Shen,et al. Efficient Group Signature Scheme Supporting Batch Verification for Securing Vehicular Networks , 2010, 2010 IEEE International Conference on Communications.
[30] Rutvij H. Jhaveri,et al. Trust Based Approaches for Secure Routing in VANET: A Survey , 2015 .
[31] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[32] Paolo Cremonesi,et al. Parallel, distributed and network-based processing , 2006, J. Syst. Archit..
[33] Hussein Zedan,et al. A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..
[34] Xin Zhang,et al. VANET alert endorsement using multi-source filters , 2010, VANET '10.
[35] Jie Zhang,et al. A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.
[36] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[37] Xiang Cheng,et al. Data Dissemination in VANETs: A Scheduling Approach , 2014, IEEE Transactions on Intelligent Transportation Systems.
[38] Nai-Wei Lo,et al. A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[39] Vijay Laxmi,et al. Machine Learning Approach for Multiple Misbehavior Detection in VANET , 2011, ACC.
[40] Liuqing Yang,et al. Intelligent transportation spaces: vehicles, traffic, communications, and beyond , 2010, IEEE Communications Magazine.
[41] Nader Mohamed,et al. Similarity-Based Trust Management System: Data Validation Scheme , 2015, HIS.
[42] Alexandra Rivero-García,et al. VANET Event Verification Based on User Trust , 2016, 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP).
[43] Akbar Ghaffar Pour Rahbar,et al. Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks , 2011, Multimedia Tools and Applications.
[44] Radhika M. Pai,et al. Mitigation of insider and outsider DoS attack against signature based authentication in VANETs , 2014, 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE).
[45] Abdelwahab Boualouache,et al. A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks , 2017, IEEE Communications Surveys & Tutorials.
[46] Tim Leinmüller,et al. Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems , 2016, IEEE Communications Surveys & Tutorials.
[47] Tim Leinmüller,et al. Vehicle Behavior Analysis to Enhance Security in VANETs , 2008 .
[48] Yuguang Fang,et al. A defense technique against misbehavior in VANETs based on threshold authentication , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[49] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[50] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[51] Arobinda Gupta,et al. Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.
[52] Xiang Cheng,et al. Envelope Level Crossing Rate and Average Fade Duration of Nonisotropic Vehicle-to-Vehicle Ricean Fading Channels , 2014, IEEE Transactions on Intelligent Transportation Systems.
[53] Soumya K. Ghosh,et al. MDS-Based Trust Estimation of Event Reporting Node in VANET , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[54] Nader Moayeri,et al. Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[55] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[56] Xiaohui Liang,et al. A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs , 2012, IEEE Transactions on Intelligent Transportation Systems.
[57] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[58] Tim Leinmüller,et al. POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.
[59] Soumaya Cherkaoui,et al. Detecting faulty and malicious vehicles using rule-based communications data mining , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[60] Zhen Huang,et al. On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET , 2011 .
[61] Kpatcha M. Bayarou,et al. Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters , 2012, 2012 IEEE Vehicular Networking Conference (VNC).
[62] Xiang Cheng,et al. Interference Graph-Based Resource-Sharing Schemes for Vehicular Networks , 2013, IEEE Transactions on Vehicular Technology.
[63] Arobinda Gupta,et al. Application of Secondary Information for Misbehavior Detection in VANETs , 2010, Networking.
[64] Haitham S. Cruickshank,et al. A comparative simulation based analysis of location based routing protocols in underwater wireless sensor networks , 2017, 2017 2nd Workshop on Recent Trends in Telecommunications Research (RTTR).
[65] Zahid Ullah,et al. Comparison of Localization Free Routing Protocols in Underwater Wireless Sensor Networks , 2017 .
[66] Fei-Yue Wang,et al. A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.
[67] Aifeng Wu,et al. RATE: A RSU-Aided Scheme for Data-Centric Trust Establishment in VANETs , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[68] Arobinda Gupta,et al. Distributed Misbehavior Detection in VANETs , 2009, 2009 IEEE Wireless Communications and Networking Conference.
[69] Vijay Laxmi,et al. Detection of incorrect position information using speed and time span verification in VANET , 2012, SIN '12.
[70] Xiaoyan Zhu,et al. An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.
[71] Ciprian Dobre,et al. Secure Opportunistic Vehicle-to-Vehicle Communication , 2017 .
[72] Kpatcha M. Bayarou,et al. Central misbehavior evaluation for VANETs based on mobility data plausibility , 2012, VANET@MOBICOM.
[73] Imad Mahgoub,et al. A Survey of Vehicular Ad hoc Networks Routing Protocols , 2013 .
[74] Florian Dotzer,et al. VARS: a vehicle ad-hoc network reputation system , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[75] Sushmita Ruj,et al. Limitations of trust management schemes in VANET and countermeasures , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[76] A. Held,et al. Modeling Roadside Attacker Behavior in VANETs , 2008, 2008 IEEE Globecom Workshops.
[77] Xiang Cheng,et al. D2D for Intelligent Transportation Systems: A Feasibility Study , 2015, IEEE Transactions on Intelligent Transportation Systems.
[78] Ivan Stojmenovic,et al. Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.
[79] Saneeha Ahmed,et al. Misbehaviour detection in vehicular networks using logistic trust , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[80] Sherali Zeadally,et al. Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.
[81] Vijay Laxmi,et al. Position forging attacks in Vehicular Ad Hoc Networks: Implementation, impact and detection , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[82] Xiang Cheng,et al. New deterministic and stochastic simulation models for non-isotropic scattering mobile-to-mobile Rayleigh fading channels , 2011, Wirel. Commun. Mob. Comput..
[83] Frank Kargl,et al. Enhanced Position Verification for VANETs Using Subjective Logic , 2016, VTC 2016.
[84] Ayman I. Kayssi,et al. A Privacy-Preserving Trust Model for VANETs , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[85] Debasish Jena,et al. Security in vehicular adhoc networks: a survey , 2011, ICCCS '11.
[86] Gongjun Yan,et al. Providing VANET security through active position detection , 2008, Comput. Commun..
[87] Xiang Cheng,et al. Wideband Channel Modeling and Intercarrier Interference Cancellation for Vehicle-to-Vehicle Communication Systems , 2013, IEEE Journal on Selected Areas in Communications.
[88] Xiaodong Lin,et al. Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[89] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[90] Alok Kumar,et al. A Historical Feedback Based Misbehavior Detection (HFMD) Algorithm in VANET , 2016, 2016 2nd International Conference on Computational Intelligence and Networks (CINE).
[91] Tim Leinmüller,et al. Decentralized position verification in geographic ad hoc routing , 2010, Secur. Commun. Networks.
[92] E. Schoch,et al. Security requirements and solution concepts in vehicular ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.
[93] Bartlomiej Placzek,et al. Detection of malicious data in vehicular ad-hoc networks for traffic signal control applications , 2016, CN.
[94] Pin-Han Ho,et al. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[95] Muttukrishnan Rajarajan,et al. Vehicular Internet: Security & Privacy Challenges and Opportunities , 2015, Future Internet.
[96] Yu-Cheng Lin,et al. A Proxy-Based Authentication and Billing Scheme With Incentive-Aware Multihop Forwarding for Vehicular Networks , 2014, IEEE Transactions on Intelligent Transportation Systems.
[97] Zhong Chen,et al. MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET , 2013, APWeb.
[98] J. Miller,et al. A Review of Security Threats, Solutions and Trust Management in VANETs , 2016, Int. J. Next Gener. Comput..
[99] Tim Leinmüller,et al. Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[100] Azzedine Boukerche,et al. Software-defined Vehicular Ad Hoc Networks with Trust Management , 2016, DIVANet@MSWiM.
[101] Feng Xia,et al. A greedy model with small world for improving the robustness of heterogeneous Internet of Things , 2016, Comput. Networks.
[102] B. K. Chaurasia,et al. Trust Computation in VANETs , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[103] Shikha Agrawal,et al. A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks , 2015 .
[104] Ihn-Han Bae,et al. A Misbehavior-Based Reputation Management System for VANETs , 2012 .