Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks (VANET)
暂无分享,去创建一个
[1] Elmar Schoch,et al. Security Engineering for VANETs , 2006 .
[2] Adrian Perrig,et al. TESLA Broadcast Authentication , 2003 .
[3] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[4] FederrathHannes,et al. A privacy aware and efficient security infrastructure for vehicular ad hoc networks , 2008 .
[5] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[6] Yu-Chee Tseng,et al. The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.
[7] Panagiotis Papadimitratos,et al. Impact of vehicular communications security on transportation safety , 2008, IEEE INFOCOM Workshops 2008.
[8] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[9] Maxim Raya,et al. Certificate Revocation in Vehicular Networks , 2006 .
[10] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[11] Panagiotis Papadimitratos,et al. VANET Connectivity Analysis , 2009, ArXiv.
[12] Nader Moayeri,et al. Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[13] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[14] Azim Eskandarian,et al. Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.
[15] Hannes Hartenstein,et al. Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks , 2004, VANET '04.
[16] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[17] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[18] Mihir Bellare,et al. Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.
[19] Wenhui Zhang,et al. Car-2-Car Communication Consortium - Manifesto , 2007 .
[20] Huirong Fu,et al. Privacy Issues of Vehicular Ad-Hoc Networks , 2010 .
[21] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[22] Raja Sengupta,et al. Vehicle-to-vehicle safety messaging in DSRC , 2004, VANET '04.
[23] S. Eichler,et al. Secure routing in a vehicular ad hoc network , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[24] Kenneth P. Laberteaux,et al. STRONG VANET SECURITY ON A BUDGET , 2006 .
[25] Elmar Schoch,et al. Communication patterns in VANETs , 2008, IEEE Communications Magazine.
[26] E. Schoch,et al. Security requirements and solution concepts in vehicular ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.
[27] Maxim Raya,et al. Revocation games in ephemeral networks , 2008, CCS.
[28] Maxim Raya,et al. Efficient secure aggregation in VANETs , 2006, VANET '06.
[29] Bernd Bochow,et al. "NoW - Network on Wheels" : Project Objectives, Technology and Achievements , 2008 .
[30] James A. Freebersyser,et al. A DoD perspective on mobile Ad hoc networks , 2001 .
[31] Hovav Shacham,et al. Group signatures with verifier-local revocation , 2004, CCS '04.
[32] Tansu Alpcan,et al. Centrality Analysis in Vehicular Networks , 2008 .
[34] Panagiotis Papadimitratos,et al. Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems , 2020, IEEE Transactions on Mobile Computing.
[35] Panagiotis Papadimitratos,et al. SEVECOM - Secure Vehicle Communication , 2006 .
[36] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[37] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[38] Chris C. Kellum. Six Application Mechanisms Required for Wireless Access in Vehicular Environments (WAVE) , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[39] Michel Dubois,et al. Performance Evaluation of the , 1995 .
[40] Girish Katkar,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.
[41] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[42] A. Festag,et al. Security Architecture for Vehicular Communication , 2007 .
[43] Hariharan Krishnan,et al. Performance evaluation of safety applications over DSRC vehicular ad hoc networks , 2004, VANET '04.
[44] Levente Buttyán,et al. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.
[45] Felix Schmidt-Eisenlohr,et al. IEEE 802.11-based one-hop broadcast communications: understanding transmission success and failure under different radio propagation environments , 2006, MSWiM '06.
[46] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[47] Katrin Bilstrup. A survey regarding wireless communication standards intended for a high-speed vehicle environment , 2007 .
[48] J.-P. Hubaux,et al. Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.
[49] Elmar Schoch,et al. On the security of context-adaptive information dissemination , 2008, Secur. Commun. Networks.
[50] Nitin H. Vaidya,et al. A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[51] Maxim Raya,et al. Securing Vehicular Networks , 2006, INFOCOM 2006.
[52] Panagiotis Papadimitratos,et al. Report on the "secure vehicular communications: results and challenges ahead" workshop , 2008, MOCO.
[53] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[54] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[55] Joseph Y. Halpern,et al. Gossip-based ad hoc routing , 2002, IEEE/ACM Transactions on Networking.
[56] Tim Leinmüller,et al. A GLOBAL TREND FOR CAR 2 X COMMUNICATION , 2008 .
[57] Florian Dötzer,et al. Privacy Issues in Vehicular Ad Hoc Networks , 2005, Privacy Enhancing Technologies.
[58] Sidi-Mohammed Senouci,et al. An Improved Vehicular Ad Hoc Routing Protocol for City Environments , 2007, 2007 IEEE International Conference on Communications.
[59] Hazem H. Refai,et al. Performance and Reliability of DSRC Vehicular Safety Communication: A Formal Analysis , 2009, EURASIP J. Wirel. Commun. Netw..
[60] Markus Jakobsson,et al. Stealth attacks in vehicular technologies , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[61] Michel Barbeau,et al. Threats to Security in DSRC/WAVE , 2006, ADHOC-NOW.
[62] Michael A. Shulman,et al. Vehicle safety communications in the United States , 2007 .
[63] Jun Luo,et al. A Survey of Inter-Vehicle Communication , 2004 .
[64] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[65] Kartik Gopalan,et al. Urban Mobility Models for VANETs , 2006 .
[66] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[67] Panagiotis Papadimitratos,et al. Fast Exclusion of Errant Devices from Vehicular Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[68] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[69] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[70] Ingrid Moerman,et al. An overview of mobile ad hoc networks: applications and challenges , 2004 .
[71] Stephan Eichler,et al. Performance Evaluation of the IEEE 802.11p WAVE Communication Standard , 2007, 2007 IEEE 66th Vehicular Technology Conference.
[72] Thomas Nowey,et al. Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[73] H. Rohling,et al. Congestion control in vehicular ad hoc networks , 2005, IEEE International Conference on Vehicular Electronics and Safety, 2005..
[74] Jean-Pierre Hubaux,et al. Towards Self-Organized Location Privacy in Mobile Networks , 2008 .
[75] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[76] Victor C. M. Leung,et al. Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[77] Panagiotis Papadimitratos,et al. Secure Position-Based Routing for VANETs , 2007, 2007 IEEE 66th Vehicular Technology Conference.
[78] Hannes Federrath,et al. A privacy aware and efficient security infrastructure for vehicular ad hoc networks , 2008, Comput. Stand. Interfaces.
[79] S. Eichler. Security Challenges in MANET-based Telematics Environments , 2004 .
[80] Hannes Hartenstein,et al. FleetNet: Bringing Car-to-Car Communication into the Real World , 2004 .
[81] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).