Computer Science ›› 2014, Vol. 41 ›› Issue (Z11): 235-240.
Previous Articles Next Articles
LI Chun-yan and WANG Liang-min
[1] Blum J,Eskandarian A,Hoffman L.Challenges of inter-vehicle ad hoc networks [J].IEEE Transactions on Intelligent Transportation Systems,2004,5(4):347-351 [2] 常促宇,向勇,史美林.车载自组网的现状与发展[J].通信学报,2007,28(11):116-127 [3] 乔震,刘光杰,李季,等.移动自组织网络安全接入技术研究综述 [J].计算机科学,2013,40(20):1-9 [4] 王良民,李晓君,仲红.VANET中一种可撤销的车辆群组批认证方法 [J].中国科学:信息科学,2013,43(10):1307-1325 [5] Douceur J R.The Sybil attack [C]∥Proceeding of International Workshop on Peer-to-peer Systems.Cambridge.USA,IEEE,2002:251-260 [6] Razzaque M A,Salehi A,Cheraghi S M.Security and privacy in vehicular Ad-Hoc networks:survey and the road ahead [M]∥Wireless Networks and Security.Springer Berlin Heidelberg,2013:107-132 [7] Hartenstein H,Laberteaux K P.A tutorial survey on vehicular ad hoc networks [J].Communications Magazine,IEEE,2008,46(6):164-171 [8] Lacroix J,El-Khatib K.Vehicular Ad Hoc Network Security and Privacy:A Second Look [C]∥The Third International Conference on Advances in Vehicular SystemsTechnologies and Applications(VEHICULAR 2014).2014:6-15 [9] Al Sultan S,Al Doori M M,Bayatti A H,et al.A comprehensive survey on vehicular Ad Hoc network [J].Journal of Network and Computer Applications,2014,37:380-392 [10] 王良民,茅冬梅,梁军.基于RFID系统的隐私保护技术[J].江苏大学学报:自然科学版,2012,33(6):690-695 [11] Bissmeyer N,Stresing C,Bayarou K M.Intrusion detection inVANETs through verification of vehicle movement data [C]∥Vehicular Networking Conference (VNC) 2010.New Jersey,USA,IEEE,2010:166-173 [12] Ding Qing,Li Xi,Jiang Ming,et al.Reputation-based trust modelin vehicular ad hoc networks [C]∥International Conference on Wireless Communications and Signal Processing (WCSP).Suzhou,China,2010:1-6 [13] Chen Yi-ming,Wei Yu-chih.A beacon-based trust management system for enhancing user centric location privacy in VANETs [J].Journal of Communications and Networks,2013,15(2):153-163 [14] Korkmaz G,Ekici E,Ozguner F,et al.Urban multi-hop broadcast protocol for inter-vehicle communication systems [C]∥Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks.Philadelphia,PA,USA,ACM,2004:76-85 [15] Zhao Jing,Cao Guo-hong.VADD:Vehicle-assisted data delivery in vehicular ad hoc networks [J].IEEE Transactions on Vehicular Technology,2008,57(3):1910-1922 [16] Karp B,Kung H T.GPSR:Greedy perimeter stateless routing for wireless networks [C]∥Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston,MA,USA,ACM,2000:243-254 [17] Newsome J,Shi E,Song D,et al.The Sybil attack in sensor networks:analysis & defenses [C]∥Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks.Berkeley,California,USA:ACM,2004:259-268 [18] Yu H,Kaminsky M,Gibbons P B,et al.SybilGuard:Defendingagainst Sybil attacks via social networks [J].IEEE/ACM Transactions on Networking,2008,16(3):576-589 [19] Danezis G,Mittal P.SybilInfer:Detecting Sybil Nodes using Social Networks [C]∥Proceedings of the Network and Distributed System Security Symposium.San Diego,California,USA,2009:1-15 [20] Margolin N B,Levine B N.Quantifying resistance to the Sybil attack [M]∥Financial Cryptography and Data Security.Springer Berlin Heidelberg,2008:1-15 [21] Raya M,Hubaux J P.Securing vehicular ad hoc networks [J].Journal of Computer Security,2007,15(1):39-68 [22] 李春彦,刘怡良,王良民.车载自组网中基于交通场景的入侵行为检测机制 [J].山东大学学报:工学版,2013,43(6):14-19 [23] Rahbari M,Jamali J.Efficient detection of Sybil attack based on cryptography in VANET [J].International Journal of Network Security & its Applications (IJNSA).2011,3(6):185-195 [24] Guette G,Bryce C.Using TPMs to secure vehicular ad-hoc networks (VANETs) [M]∥Information Security Theory and Practices.Smart Devices,Convergence and Next Generation Networks.Springer Berlin Heidelberg.2008:106-116 [25] Park S,Aslam B,Turgut D,et al.Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support [J].Security and Communication Networks,2013,6(4):523-538 [26] Studer A,Shi E,Bai F,et al.TACKing together efficient authentication,revocation,and privacy in VANETs [C]∥6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks(SECON09).Rome,Italy,IEEE,2009:1-9 [27] Sun Yi-pin,Lu Rong-xing,Lin Xiao-dong,et al.An efficientpseudonymous authentication scheme with strong privacy pre-servation for vehicular communications [J].IEEE Transactions on Vehicular Technology,2010,59(7):3589-3603 (下转第262页)(上接第240页) [28] Ruj S,Cavenaghi M A,Huang Z,et al.On data-centric misbehavior detection in VANETs [C]∥Vehicular Technology Conference (VTC Fall).San Francisco,CA,USA,IEEE,2011:1-5 [29] Lu Rong-xing,Li Xiao-dong,Luan T H,et al.Pseudonym changing at social spots:an effective strategy for location privacy in VANETs [J].IEEE Transactions on Vehicular Technology,2012,61(1):86-96 [30] Pan Yuan-yuan,Li Jian-qing,Feng Li,et al.An analytical model for random pseudonym change scheme in VANETs [J].Cluster Computing,2013:1-9 [31] Zhou Tong,Choudhury R R,Ning Peng,et al.P2DAP—Sybil Attacks Detection in Vehicular Ad Hoc Networks [J].IEEE Journal on Selected Areas in Communications,2011,29(3):582-594 [32] Golle P,Greene D,Staddon J.Detecting and correcting malicious data in VANETs [C]∥Proceedings of the 1st ACM internationalworkshop on Vehicular ad hoc networks.Philadelphia,PA,USA,ACM,2004:29-37 [33] Grover J,Prajapati N K,Laxmi V,et al.Machine learning approach for multiple misbehavior detection in VANET [M]∥Advances in Computing and Communications.Springer Berlin Heidelberg,2011:644-653 [34] Grover J,Gaur M S,Laxmi V,et al.A Sybil attack detection approach using neighboring vehicles in VANET [C]∥Proceedings of the 4th International Conference on Security of Information and Networks.Sydney,Australia,ACM,2011:151-158 [35] Chen Chen,Wang X,Han Wei-li,et al.A robust detection of the Sybil attack in urban VANETs [C]∥The 29th IEEE International Conference on Distributed Computing Systems Workshops(ICDCS 2009).Montreal,Quebec,Canada,IEEE,2009:270-276 [36] Chang Shan,Qi Yong,Zhu Hong-zi,et al.Footprint:detecting Sybil attacks in urban vehicular networks [J].IEEE Transactions on Parallel and Distributed Systems,2012,23(6):1103-1114 [37] Guette G,Ducourthial B.On the Sybil attack detection in VANET [C]∥IEEE International Conference on Mobile Ad hoc and Sensor Systems(MASS 2007).Pisa,Italy,IEEE,2007:1-6 [38] Yu Bo,Xu Cheng-zhong,Xiao Bin.Detecting Sybil attacks inVANETs [J].Journal of Parallel and Distributed Computing,2013:746-756 [39] Grover J,Kumar D,Sargurunathan M,et al.Performance evaluation and detection of Sybil attacks in vehicular ad-hoc networks [M]∥Recent Trends in Network Security and Applications.Springer Berlin Heidelberg,2010:473-482 [40] Capun S,Hubaux J P.Secure positioning of wireless deviceswith application to sensor networks [C]∥Proceeding of 24th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2005).Miami,USA,IEEE,2005:1917-1928 [41] Bouassida M S,Guette G,Shawky M,et al.Sybil nodes detection based on received signal strength variations within VANET [J].IJ Network Security,2009,9(1):22-33 [42] Leinmuller T,Schoch E,Kargl F.Position verification approa-ches for vehicular ad hoc networks [J].IEEE Wireless Communications,2006,13(5):16-21 [43] Hao Yong,Tang Jin,Cheng Yu.Cooperative Sybil attack detection for position based applications in privacy preserved VANETs[C]∥Global Telecommunications Conference (GLOBECOM 2011).Houston,Texas,USA,IEEE,2011:1-5 |
No related articles found! |
|