On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET
暂无分享,去创建一个
[1] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[2] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[3] Matthias Gerlach,et al. Trust for Vehicular Applications , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).
[4] Xiaodong Lin,et al. An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[5] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[6] Pang-Ning Tan,et al. Local detection of selfish routing behavior in ad hoc networks , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).
[7] Xuemin Shen,et al. BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.
[8] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[9] Brian L. Mark,et al. A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.
[10] N.J. Davis,et al. Toward a decentralized trust-based access control system for dynamic collaboration , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[11] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[12] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[13] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[14] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[15] Levente Buttyán,et al. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.
[16] Arobinda Gupta,et al. Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.
[17] Ivan Stojmenovic,et al. Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.
[18] Panagiotis Papadimitratos,et al. Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems , 2020, IEEE Transactions on Mobile Computing.
[19] Yih-Chun Hu,et al. Security certificate revocation list distribution for vanet , 2008, VANET '08.
[20] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[21] E. David,et al. Networks, Crowds, and Markets: Reasoning about a Highly Connected World , 2010 .
[22] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[23] Fan Bai,et al. Towards Characterising and Classifying Communication–based Automotive Applications from a Wireless Networking Perspective , 2012 .
[24] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[25] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[26] Jolyon Clulow,et al. New Strategies for Revocation in Ad-Hoc Networks , 2007, ESAS.
[27] Maxim Raya,et al. Optimal revocations in ephemeral networks: A game-theoretic framework , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[28] Jie Zhang,et al. Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings , 2006, ICEC '06.
[29] Nai-Wei Lo,et al. A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[30] Maxim Raya,et al. Revocation games in ephemeral networks , 2008, CCS.
[31] Thomas M. Chen,et al. Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.
[32] Peng Ning,et al. Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[33] Arobinda Gupta,et al. Application of Secondary Information for Misbehavior Detection in VANETs , 2010, Networking.
[34] Bertrand Ducourthial,et al. On the Sybil attack detection in VANET , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[35] Adrian Perrig,et al. Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[36] Mohammad S. Obaidat,et al. Securing vehicular networks: A reputation and plausibility checks-based approach , 2010, 2010 IEEE Globecom Workshops.
[37] Damla Turgut,et al. Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[38] Shie-Yuan Wang,et al. NCTUns SIMULATOR FOR WIRELESS VEHICULAR AD HOC NETWORK RESEARCH , 2008 .
[39] Xuemin Shen,et al. DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks , 2010, IEEE Transactions on Vehicular Technology.
[40] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[41] Jean-Yves Le Boudec,et al. On the Age of Pseudonyms in Mobile Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[42] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[43] Florian Dotzer,et al. VARS: a vehicle ad-hoc network reputation system , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[44] Sushmita Ruj,et al. Limitations of trust management schemes in VANET and countermeasures , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[45] Jie Zhang,et al. Intelligent Agents in Mobile Vehicular Ad-Hoc Networks: Leveraging Trust Modeling Based on Direct Experience with Incentives for Honesty , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[46] Jinhua Guo,et al. A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework , 2007, 2007 Mobile Networking for Vehicular Environments.
[47] Panagiotis Papadimitratos,et al. Fast Exclusion of Errant Devices from Vehicular Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[48] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[49] Chris McDonald,et al. cnet network simulator , 2009 .
[50] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[51] Chris Arney,et al. Networks, Crowds, and Markets: Reasoning about a Highly Connected World (Easley, D. and Kleinberg, J.; 2010) [Book Review] , 2013, IEEE Technology and Society Magazine.
[52] Florian Dotzer,et al. Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[53] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[54] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[55] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[56] S. Y. Wang,et al. NCTUns 4.0: An Integrated Simulation Platform for Vehicular Traffic, Communication, and Network Researches , 2007, 2007 IEEE 66th Vehicular Technology Conference.
[57] Jelena V. Misic,et al. Privacy and Anonymity in VANETs: A Contemporary Study , 2010, Ad Hoc Sens. Wirel. Networks.
[58] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[59] Douglas Gale,et al. Bayesian learning in social networks , 2003, Games Econ. Behav..
[60] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[61] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[62] Xuemin Shen,et al. ECMV: Efficient Certificate Management Scheme for Vehicular Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[63] Jerry T. Chiang,et al. Limits on Revocation in VANETs , 2010 .
[64] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[65] Jie Zhang,et al. A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.
[66] Maxime Raya,et al. Data-centric trust in ephemeral networks , 2009 .
[67] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[68] Yih-Chun Hu,et al. Design and analysis of a lightweight certificate revocation mechanism for VANET , 2009, VANET '09.
[69] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.