VANET Authentication Using Trust Distribution in a Clustered Environment

[1]  Prithwish Basu,et al.  A mobility based metric for clustering in mobile ad hoc networks , 2001, Proceedings 21st International Conference on Distributed Computing Systems Workshops.

[2]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, EUROCRYPT.

[3]  Michael Gurstein,et al.  Remote management of a province-wide youth employment program using Internet technologies , 1999 .

[4]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[5]  P.H.J. Chong,et al.  A survey of clustering schemes for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[6]  Charalampos Konstantopoulos,et al.  Clustering in mobile ad hoc networks through neighborhood stability-based mobility prediction , 2008, Comput. Networks.

[7]  Azim Eskandarian,et al.  Mobility management in IVC networks , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).

[8]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[9]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[10]  Xiaoyuan Yang,et al.  Dynamic Group Signature with Forward Security and Its Application , 2007, Sixth International Conference on Grid and Cooperative Computing (GCC 2007).

[11]  Call for Chapters Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation , 2013 .

[12]  Taieb Znati,et al.  A mobility-based framework for adaptive clustering in wireless ad hoc networks , 1999, IEEE J. Sel. Areas Commun..

[13]  Mohd Dani Baba,et al.  Hierarchical QoS Admission Control Mechanism for IEEE 802.16j Mobile Multi-Hop Relay WiMAX Network , 2014 .

[14]  Mahmoud Naghshineh,et al.  PARO: Supporting Dynamic Power Controlled Routing in Wireless Ad Hoc Networks , 2003, Wirel. Networks.

[15]  Mehdi Khosrow-Pour Cases on Telecommunications And Networking (Cases on Information Technology Series) (Cases on Information Technology Series) , 2006 .

[16]  Ramjee Prasad,et al.  Closed User Group Automotive Communication Network Based on Addressing at Physical Layer , 2012, Int. J. Interdiscip. Telecommun. Netw..

[17]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[18]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[19]  Afifa Ghenai,et al.  Hybrid Simulation Based Approach for Embedded Systems Reliability Analysis , 2013, Int. J. Embed. Real Time Commun. Syst..

[20]  R. Poovendran,et al.  CARAVAN: Providing Location Privacy for VANET , 2005 .

[21]  Thomas Nowey,et al.  Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[22]  R. S. D. Wahida Banu,et al.  A Novel Approach to Avoid Mobile Phone Accidents While Driving and Cost- Effective Fatalities , 2011, Int. J. Interdiscip. Telecommun. Netw..

[23]  Baber Aslam,et al.  Distributed certificate and application architecture for VANETs , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[24]  Ronald C. Dodge,et al.  Technology Education at the US Military Academy , 2005, IEEE Secur. Priv..

[25]  Sung-Ju Lee,et al.  Wireless Ad Hoc Multicast Routing with Mobility Prediction , 2001, Mob. Networks Appl..

[26]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[27]  Adi Shamir,et al.  How to share a secret , 1979, CACM.