References | - R. G. Engoulou, M. Bellache, S. Pierre, and A. Quintero, “VANET security surveys,” Comput. Commun., vol. 44, pp. 1–13, May 2014..
- M. Kakkasageri and S. Manvi, “Information management in vehicular ad hoc networks: A review,” J. Netw. Comput. Appl., vol. 39, pp. 334–350,Mar. 2014.
- B. T. Sharef, R. A. Alsaqour, and M. Ismail, “Vehicular communication ad hoc routing protocols: A survey,” J. Netw. Comput. Appl., vol. 40,pp. 363–396, Apr. 2014.
- S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl.,vol. 37, pp. 380–392, Jan. 2014.
- M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,”J. Comput. Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
- Y. Lin and H. Song, “DynaCHINA: Real-time traffic estimation and prediction,”IEEE PervasiveComput., vol. 5, no. 4, pp. 65–65, Oct.–Dec. 2006..
- J. R. Douceur, “The sybil attack,” in International Workshop on Peerto-Peer Systems, ser. Lecture Notes in Computer Science, P. Druschel,F. Kaashoek, and A. Rowstron, vol. 2429. Berlin, Germany: Springer-
- Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demandrouting protocol for ad hoc networks,” in Proc. 8th Annu. Int. Conf.MobiCom Netw., Atlanta, GA, USA, 2002, pp. 12–23.
- S. Buchegger and J.-Y. Le Boudee, “Self-policing mobile ad hoc networks by reputation systems,” IEEE Commun. Mag., vol. 43, no. 7, pp. 101–107,Jul. 2005
- P.-W. Yau and C. J. Mitchell, “Security vulnerabilities in ad hoc networks,” in Proc. 7th Int. Symp. Commun. Theory Appl., 2003,pp. 99–104.
- M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Veh. Commun., vol. 1,no. 2, pp. 53–66, Apr. 2014.
- J. Molina-Gil, P. Caballero-Gil, and C. Caballero-Gil, “Aggregation and probabilistic verification for data authentication in VANETs,” Inf. Sci.,vol. 262, pp. 172–189,Mar.2014.25822589,ISSN00313203,10.1016/j.patcog.2010.01.008.
- Y. Lin and H. Song, “DynaCHINA: Real-time traffic estimation and prediction,”IEEE PervasiveComput., vol. 5, no. 4, pp. 65–65, Oct.–Dec. 2006..
- B. T. Sharef, R. A. Alsaqour, and M. Ismail, “Vehicular communicationad hoc routing protocols: A survey,” J. Netw. Comput. Appl., vol. 40,pp. 363–396, Apr. 2014.
- S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl.,vol. 37, pp. 380–392, Jan. 2014.
- M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,”J. Comput. Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
- Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,”in Proc. ACM 6th Annu. Int. Conf. MobiCom Netw., Boston, MA, USA,2000, pp. 275–283.
|
---|