Direct Security Approach Based on Trust Management In VANET
暂无分享,去创建一个
[1] Azim Eskandarian,et al. The threat of intelligent collisions , 2004, IT Professional.
[2] Mohammed Hashem,et al. A Trust-Based Message Reporting Scheme For VANET , 2013 .
[3] Manju Bala,et al. Study of Blackhole Attack Using DifferentRouting Protocols in MANET , 2013 .
[4] James P. Keener,et al. The Perron-Frobenius Theorem and the Ranking of Football Teams , 1993, SIAM Rev..
[5] Irshad Ullah,et al. Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .
[6] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[7] Jelena V. Misic,et al. ID-based Safety Message Authentication for Security and Trust in Vehicular Networks , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[8] Sushmita Ruj,et al. Limitations of trust management schemes in VANET and countermeasures , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[9] Iftikhar Ahmad,et al. Forming vehicular web of trust in VANET , 2011, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC).
[10] Xin Wang,et al. Sybil attack detection based on signature vectors in VANETs , 2011, Int. J. Crit. Comput. Based Syst..
[11] Kamarularifin Abd. Jali,et al. MITIGATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOL , 2011 .
[12] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[13] S. Yousefi,et al. Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.
[14] Jie Zhang,et al. A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.
[15] W. Marsden. I and J , 2012 .
[16] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[17] Nader Moayeri,et al. A Secure VANET MAC Protocol for DSRC Applications , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[18] Sudhan Majhi,et al. The Design of a Wireless Access for Vehicular Environment (WAVE) Prototype for Intelligent Transportation System (ITS) and Vehicular Infrastructure Integration (VII) , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[19] C. Chen,et al. A Trust-based Message Propagation and Evaluation Framework in VANETs , 2010 .
[20] Dr. Kamal Jamshidi,et al. Providing security in Vehicular ad hoc networks (VANETs) through historical data collection , 2011 .
[21] Ciprian Dobre,et al. Securing Vehicular Networks Based on Data-Trust Computation , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[22] Vijay Varadharajan,et al. Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[23] Azzedine Boukerche,et al. Towards a Secure Trust Model for Vehicular Ad Hoc Networks Services , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[24] Iftikhar Ahmad,et al. New card based scheme to ensure security and trust in vehicular communications , 2011, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC).
[25] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[26] Tim Leinmüller,et al. Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[27] Jie Zhang,et al. Towards Expanded Trust Management for Agents in Vehicular Ad-hoc Networks , 2017 .
[28] Jeng-Farn Lee,et al. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.
[29] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[30] Iftikhar Ahmad,et al. Trust levels in peer-to-peer (P2P) vehicular network , 2011, 2011 11th International Conference on ITS Telecommunications.
[31] Jetzabel M. Serna,et al. Geolocation-Based Trust for Vanet's Privacy , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[32] Brijesh Kumar Chaurasia,et al. Trust Based Group Formation in VANET , 2013 .