CPESP: Cooperative Pseudonym Exchange and Scheme Permutation to preserve location privacy in VANETs
暂无分享,去创建一个
Sukumar Nandi | Pranav Kumar Singh | Shivram N Gowtham | S Tamilselvan | P. Singh | S. Tamilselvan | Sukumar Nandi | Shivram N. Gowtham
[1] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[2] A. M. Mathai. An Introduction to Geometrical Probability: Distributional Aspects with Applications , 1999 .
[3] Daniel Krajzewicz,et al. SUMO - Simulation of Urban MObility An Overview , 2011 .
[4] Patrick Weber,et al. OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.
[5] Abdelwahab Boualouache,et al. VLPZ: The Vehicular Location Privacy Zone , 2016, ANT/SEIT.
[6] Karim Emara,et al. Safety-Aware Location Privacy in VANET: Evaluation and Comparison , 2017, IEEE Transactions on Vehicular Technology.
[7] Bruno Crispo,et al. Security and privacy in vehicular communications: Challenges and opportunities , 2017, Veh. Commun..
[8] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[9] Joel J. P. C. Rodrigues,et al. Secure and stable Vehicular Ad Hoc Network clustering algorithm based on hybrid mobility similarities and trust management scheme , 2018, Veh. Commun..
[10] Abdelwahab Boualouache,et al. A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks , 2017, IEEE Communications Surveys & Tutorials.
[11] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[12] Christoph Sommer,et al. Driving for Big Data? Privacy Concerns in Vehicular Networking , 2014, IEEE Security & Privacy.
[13] Stephan Olariu,et al. Vehicular Networks: From Theory to Practice , 2009 .
[14] Hannes Federrath,et al. Simulation-based evaluation of techniques for privacy protection in VANETs , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[15] Hussein Zedan,et al. A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..
[16] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[17] Victor C. M. Leung,et al. Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks , 2010, Mob. Networks Appl..
[18] Sukumar Nandi,et al. A tutorial survey on vehicular communication state of the art, and future research directions , 2019, Veh. Commun..
[19] Zhendong Ma,et al. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[20] David Eckhoff,et al. Privacy assessment in vehicular networks using simulation , 2014, Proceedings of the Winter Simulation Conference 2014.
[21] Fei-Yue Wang,et al. A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.
[22] Panagiotis Papadimitratos,et al. The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems , 2015, IEEE Vehicular Technology Magazine.
[23] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[24] Reinhard German,et al. SlotSwap: strong and affordable location privacy in intelligent transportation systems , 2011, IEEE Communications Magazine.
[25] Karim Emara. Poster: PREXT: Privacy extension for Veins VANET simulator , 2016, 2016 IEEE Vehicular Networking Conference (VNC).
[26] Alastair R. Beresford,et al. Location privacy in ubiquitous computing , 2005 .
[27] Kaoru Sezaki,et al. Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[28] Matthias Gerlach,et al. Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[29] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[30] Antonella Molinaro,et al. From today's VANETs to tomorrow's planning and the bets for the day after , 2015, Veh. Commun..
[31] Anis Laouiti,et al. VANet security challenges and solutions: A survey , 2017, Veh. Commun..
[32] Radha Poovendran,et al. Swing & swap: user-centric approaches towards maximizing location privacy , 2006, WPES '06.
[33] Attila Jaeger,et al. Weather Hazard Warning Application in Car-to-X Communication , 2016, Springer Fachmedien Wiesbaden.
[34] David Antolino Rivas,et al. Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation , 2011, J. Netw. Comput. Appl..
[35] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[36] Levente Buttyán,et al. SLOW: A Practical pseudonym changing scheme for location privacy in VANETs , 2009, 2009 IEEE Vehicular Networking Conference (VNC).
[37] Sukumar Nandi,et al. Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city , 2019, Veh. Commun..
[38] J.-P. Hubaux,et al. Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.
[39] Shibin Wang,et al. A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs , 2018, Peer-to-Peer Netw. Appl..
[40] Reinhard German,et al. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.
[41] Samira Moussaoui,et al. An SDMA-Based Mechanism for Accurate and Efficient Neighborhood-Discovery Link-Layer Service , 2016, IEEE Transactions on Vehicular Technology.
[42] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[43] Jianqing Li,et al. Cooperative pseudonym change scheme based on the number of neighbors in VANETs , 2013, J. Netw. Comput. Appl..
[44] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[45] Karim Emara,et al. On evaluation of location privacy preserving schemes for VANET safety applications , 2015, Comput. Commun..
[46] Karim Emara,et al. Vehicle tracking using vehicular network beacons , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[47] Victor I. Chang,et al. Location and trajectory privacy preservation in 5G-Enabled vehicle social network services , 2018, J. Netw. Comput. Appl..
[48] Panagiotis Papadimitratos,et al. Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems , 2020, IEEE Transactions on Mobile Computing.
[49] Christoph Sommer,et al. Readjusting the privacy goals in Vehicular Ad-Hoc Networks: A safety-preserving solution using non-overlapping time-slotted pseudonym pools , 2018, Comput. Commun..
[50] Daniel F. Macedo,et al. Vehicular networks using the IEEE 802.11p standard: An experimental analysis , 2014, Veh. Commun..
[51] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[52] Karim Emara,et al. CAPS: context-aware privacy scheme for VANET safety applications , 2015, WISEC.