Detecting misbehaviors in VANET with integrated root-cause analysis
暂无分享,去创建一个
Arobinda Gupta | Anitha Varghese | Mainak Ghosh | Skanda N. Muthaiah | Arzad A. Kherani | Skanda N. Muthaiah | A. Varghese | A. Kherani | Mainak Ghosh | Arobinda Gupta
[1] A. Held,et al. Modeling Roadside Attacker Behavior in VANETs , 2008, 2008 IEEE Globecom Workshops.
[2] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[3] Christian Bonnet,et al. Vehicular Mobility Simulation for VANETs , 2007, 40th Annual Simulation Symposium (ANSS'07).
[4] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[5] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[6] A.A. Kherani,et al. Secure V2V Communication With Certificate Revocations , 2007, 2007 Mobile Networking for Vehicular Environments.
[7] Tim Leinmüller,et al. Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.
[8] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[9] A. Festag,et al. Security Architecture for Vehicular Communication , 2007 .
[10] Yuguang Fang,et al. Defense against misbehavior in anonymous vehicular ad hoc networks , 2009, Ad Hoc Networks.
[11] Tamer A. ElBatt,et al. Cooperative collision warning using dedicated short range wireless communications , 2006, VANET '06.
[12] Arobinda Gupta,et al. Distributed Misbehavior Detection in VANETs , 2009, 2009 IEEE Wireless Communications and Networking Conference.
[13] Tim Leinmüller,et al. Vehicle Behavior Analysis to Enhance Security in VANETs , 2008 .
[14] Han-Shue Tan,et al. DGPS-Based Vehicle-to-Vehicle Cooperative Collision Warning: Engineering Feasibility Viewpoints , 2006, IEEE Transactions on Intelligent Transportation Systems.
[15] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[16] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[17] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[18] Panagiotis Papadimitratos,et al. Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems , 2020, IEEE Transactions on Mobile Computing.
[19] Christian Bonnet,et al. VanetMobiSim: generating realistic mobility patterns for VANETs , 2006, VANET '06.
[20] Tim Leinmüller,et al. POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.
[21] M. Torrent-Moreno,et al. The challenges of robust inter-vehicle communications , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[22] Fan Bai,et al. Towards Characterising and Classifying Communication–based Automotive Applications from a Wireless Networking Perspective , 2012 .
[23] Andrew T. Campbell,et al. Spawning networks , 1999, IEEE Netw..
[24] Tim Leinmüller,et al. Influence of falsified position data on geographic ad-hoc routing , 2005 .
[25] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.