A secure priority vehicle movement based on blockchain technology in connected vehicles
暂无分享,去创建一个
Vikash Sharma | Anil Saini | Palash Jain | Shreyansh Sharma | Arvind Kumar khandelwal | Anil Saini | Vikash Sharma | Shreyansh Sharma | Palash Jain | Arvind Khandelwal
[1] Eylem Ekici,et al. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.
[2] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[3] Jonathan Miller,et al. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.
[4] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[5] Martin Mullins,et al. Connected and autonomous vehicles: A cyber-risk classification framework , 2019, Transportation Research Part A: Policy and Practice.
[6] Mohd Murtadha Mohamad,et al. A Survey of Security and Privacy in Connected Vehicles , 2015 .
[7] Victor C. M. Leung,et al. Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.
[8] Anis Laouiti,et al. VANet security challenges and solutions: A survey , 2017, Veh. Commun..
[9] Luca Delgrossi,et al. IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[10] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[11] Dieter Hogrefe,et al. Self-managed and blockchain-based vehicular ad-hoc networks , 2016, UbiComp Adjunct.
[12] Zhaohui Wu,et al. Intelligent Transportation Systems , 2006, IEEE Pervasive Computing.
[13] Daniel Krajzewicz,et al. SUMO - Simulation of Urban MObility An Overview , 2011 .
[14] W. Buxton. Human-Computer Interaction , 1988, Springer Berlin Heidelberg.
[15] Anthony Skjellum,et al. A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[16] András Varga,et al. An overview of the OMNeT++ simulation environment , 2008, SimuTools.
[17] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[18] Marion Berbineau,et al. A framework to simulate VANET scenarios with SUMO , 2011 .
[19] Zhili Sun,et al. A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems , 2016 .
[20] Sherali Zeadally,et al. 5G for Vehicular Communications , 2018, IEEE Communications Magazine.
[21] Zhang Zhe,et al. A review on consensus algorithm of blockchain , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[22] Jin Cui,et al. A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.
[23] Vijay Laxmi,et al. Sybil Attack in VANETs: Detection and Prevention , 2010 .
[24] Andy Extance. The future of cryptocurrencies: Bitcoin and beyond , 2015, Nature.
[25] Helena Handschuh,et al. Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.