Security Analysis of Vehicular Ad Hoc Networks (VANETs): A Comprehensive Study
暂无分享,去创建一个
[1] Hong Liu,et al. A new anti-jamming strategy for VANET metrics-directed security defense , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[2] Dipak Ghosal,et al. VGSim: An integrated networking and microscopic vehicular mobility simulation platform , 2009, IEEE Communications Magazine.
[3] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[4] Ana I. González-Tablas,et al. Overview of security issues in Vehicular Ad-hoc Networks , 2011 .
[5] Yuguang Fang,et al. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[6] Shie-Yuan Wang. Predicting the lifetime of repairable unicast routing paths in vehicle-formed mobile ad hoc networks on highways , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[7] Hariharan Krishnan,et al. Performance evaluation of safety applications over DSRC vehicular ad hoc networks , 2004, VANET '04.
[8] D. Prowe. Berlin , 1855, Journal of public health, and sanitary review.
[9] Iftikhar Ahmad,et al. Classes of attacks in VANET , 2011, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC).
[10] Mohammed Saeed Al-kahtani,et al. Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.
[11] Hong Liu,et al. A security metric for VANET content delivery , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[12] Anis Laouiti,et al. Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.
[13] Pabitra Mohan Khilar,et al. Vehicular communication: a survey , 2014 .
[14] Yu Cheng,et al. Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[15] Günter Hommel,et al. Role-based multicast in highly mobile but sparsely connected ad hoc networks , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[16] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[17] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[18] Murizah Kassim,et al. A Literature Survey on Security Challenges in VANETs , 2012 .
[19] Wei Yan,et al. RBM: A Role Based Mobility Model for VANET , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[20] G. Mahadevan,et al. Defensive mechanism for VANET security in game theoretic approach using heuristic based ant colony optimization , 2013, 2013 International Conference on Computer Communication and Informatics.
[21] Sherali Zeadally,et al. Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..
[22] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[23] Asif Ali Wagan,et al. VANET Security Framework for Trusted Grouping Using TPM Hardware , 2010, 2010 Second International Conference on Communication Software and Networks.
[24] Ghassan Samara,et al. A new security mechanism for vehicular communication networks , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[25] Yan Zhang,et al. Vehicular Networks: Techniques, Standards, and Applications , 2009 .
[26] T. Zia,et al. Vehicular Ad-Hoc Networks (VANETs): An Overview and Challenges , 2013 .