Intrusion-aware trust model for vehicular ad hoc networks
暂无分享,去创建一个
[1] Matti H. A. J. Herben,et al. High-resolution angle-of-arrival measurement of the mobile radio channel , 1999 .
[2] Theodore S. Rappaport,et al. Millimeter-Wave 60 GHz Outdoor and Vehicle AOA Propagation Measurements Using a Broadband Channel Sounder , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[3] Zhenfu Cao,et al. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .
[4] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[5] Paolo Bellavista,et al. Mobeyes: smart mobs for urban monitoring with a vehicular sensor network , 2006, IEEE Wireless Communications.
[6] Matthias Gerlach,et al. Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[7] Timothy W. Finin,et al. A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.
[8] Liviu Iftode,et al. TrafficView: traffic data dissemination using car-to-car communication , 2004, MOCO.
[9] Yi-Ming Chen,et al. A beacon-based trust management system for enhancing user centric location privacy in VANETs , 2013, Journal of Communications and Networks.
[10] Luca Delgrossi,et al. IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[11] Jie Zhang,et al. A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.
[12] Pin-Han Ho,et al. A Trust Modeling Framework for Message Propagation and Evaluation in VANETs , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.
[13] J Kyle Garrett,et al. AASHTO Connected Vehicle Infrastructure Deployment Analysis , 2011 .
[14] Zhen Huang,et al. On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET , 2011 .
[15] Chen Chen,et al. Trust modeling for message relay control and local action decision making in VANETs , 2013, Secur. Commun. Networks.
[16] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[17] M. Gerlach. Full Paper : Assessing and Improving Privacy in VANETs , 2006 .
[18] Sushmita Ruj,et al. Limitations of trust management schemes in VANET and countermeasures , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[19] David K. Chiabi. European Telecommunications Standards Institute , 2015 .
[20] Shari Lawrence Pfleeger,et al. Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach , 2012 .
[21] Adrian Perrig,et al. Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[22] Athanasios V. Vasilakos,et al. Vehicular Communications and Networks-Part II , 2011 .
[23] Elmar Schoch,et al. Communication patterns in VANETs , 2008, IEEE Communications Magazine.
[24] Gang Yang,et al. An energy‐efficient localization algorithm for mobile vehicles in vehicle to vehicle network , 2012, Concurr. Comput. Pract. Exp..
[25] Félix Gómez Mármol,et al. TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..
[26] Fabián E. Bustamante,et al. An integrated mobility and traffic model for vehicular wireless networks , 2005, VANET '05.
[27] Xiaoyan Hong,et al. Situation-aware trust architecture for vehicular networks , 2010, IEEE Communications Magazine.
[28] Robbert van Renesse,et al. Scalable Wireless Ad Hoc Network Simulation , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.
[29] Vijay Laxmi,et al. Trust Establishment Techniques in VANET , 2013, Wireless Networks and Security.
[30] M Chevreuil,et al. IVHW: an inter-vehicle hazard warning system concept within the DEUFRAKO program , 2002 .
[31] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.