IA2P: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs
暂无分享,去创建一个
Wei Zhang | Guozhen Tan | Nan Ding | Wei Zhang | N. Ding | Guozhen Tan
[1] D. Bhattacharya. Secure Data Aggregation in Wireless Sensor Networks , 2014 .
[2] Francis P. D. Navin,et al. Traffic congestion catastrophes , 1986 .
[3] Weisong Shi,et al. $RD^{4}$: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs , 2010, IEEE Transactions on Vehicular Technology.
[4] Peter Wagner,et al. Fluid-dynamical and microscopic description of traffic flow: a data-driven comparison , 2010, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[5] Antonio F. Gómez-Skarmeta,et al. A Cooperative Approach to Traffic Congestion Detection With Complex Event Processing and VANET , 2012, IEEE Transactions on Intelligent Transportation Systems.
[6] Fei-Yue Wang,et al. Data-Driven Intelligent Transportation Systems: A Survey , 2011, IEEE Transactions on Intelligent Transportation Systems.
[7] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[8] Damla Turgut,et al. Secure traffic data propagation in Vehicular Ad Hoc Networks , 2010, Int. J. Ad Hoc Ubiquitous Comput..
[9] Aifeng Wu,et al. RATE: A RSU-Aided Scheme for Data-Centric Trust Establishment in VANETs , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[10] Ciprian Dobre,et al. Securing Vehicular Networks Based on Data-Trust Computation , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[11] X. Lignos,et al. Non-linear buckling of simple models with tilted cusp catastrophe , 2003 .
[12] Fred L. Hall,et al. An interpretation of speed-flow-concentration relationships using catastrophe theory , 1987 .
[13] Elmar Schoch,et al. Dependable and secure geocast in vehicular networks , 2010, VANET '10.
[14] Yuguang Fang,et al. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[15] Doo-Kwon Baik,et al. Model for accurate speed measurement using double-loop detectors , 2006, IEEE Transactions on Vehicular Technology.
[16] Wei Zhang,et al. Distributed Algorithm for Traffic Data Collection and Data Quality Analysis Based on Wireless Sensor Networks , 2011, Int. J. Distributed Sens. Networks.
[17] D. Gazis,et al. Nonlinear Follow-the-Leader Models of Traffic Flow , 1961 .
[18] Guo Jian. Research on model of traffic flow based on cusp catastrophe , 2008 .
[19] Xiaodong Lin,et al. Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[20] Mohammed Saeed Al-kahtani,et al. Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.
[21] A. Held,et al. Modeling Roadside Attacker Behavior in VANETs , 2008, 2008 IEEE Globecom Workshops.
[22] Ivan Martinovic,et al. Chaotic communication improves authentication: protecting WSNs against injection attacks , 2009, Secur. Commun. Networks.
[23] Gábor Stépán,et al. Traffic jams: dynamics and control , 2010, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[24] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[25] Ahmad Al-Daraiseh,et al. Toward Secure Vehicular Ad-hoc Networks: A Survey , 2012 .
[26] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[27] Xuemin Shen,et al. DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks , 2010, IEEE Transactions on Vehicular Technology.