|
[1] Cmumonarchgroup,cmumonarchextensions to the ns-2 simulator 1998. available from http://monarch.cs.cmu.edu/cmu-ns.html/.
[2] Dedicated short range communication (dsrc):http://grouper.ieee.org/groups/scc32/dsrc/.
[3] IEEE. 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE standards,2006.
[4] F. Bai, T. Elbatt, G. Hollan, H. Krishnan, and V. Sadekar. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), 2006.
[5] AR Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46-55, 2003.
[6] S. Brands and D. Chaum. Distance-bounding protocols. Lecture Notes in Computer Science, 765:344-359, 1994.
[7] S. Capkun and J.P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In Proceedings IEEE INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, volume 3, 2005.
[8] M. El Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian. Security issues in a future vehicular network. In European Wireless, pages 270-274,2002.
[9] Y.C. Hu and K.P. Laberteaux. Strong VANET security on a budget. In Proceedings of Workshop on Embedded Security in Cars (ESCAR), 2006.
[10] JP Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security & Privacy, 2(3):49-55, 2004.
[11] N. Koblitz. Elliptic curve cryptosystems. Mathematics of computation, pages 203-209, 1987.
[12] L. Lazos and R. Poovendran. SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of the 3rd ACM workshop on Wireless security, pages 21-30. ACM New York, NY, USA, 2004.
[13] L. Lazos, R. Poovendran, and S. ·Capkun. ROPE: Robust position estimation in wireless sensor networks. In Proceedings of the 4th international symposium on Information processing in sensor networks. IEEE Press Piscataway, NJ, USA, 2005.
[14] Z. Li, W. Trappe, Y. Zhang, and B. Nath. Robust statistical methods for securing wireless localization in sensor networks. In Information Processing in Sensor Networks, 2005. IPSN 2005. Fourth International Symposium on, pages 91-98, 2005.
[15] D. Liu, P. Ning, A. Liu, C. Wang, and W.K. Du. Attack-resistant location estimation in wireless sensor networks. 2008.
[16] S.Y. Ni, Y.C. Tseng, Y.S. Chen, and J.P. Sheu. The broadcast storm problem in a mobile ad hoc network. In Proceedings of the 5th annual ACM/IEEEinternational conference on Mobile computing and networking, pages 151-162. ACM New York, NY, USA, 1999.
[17] P. Papadimitratos, L. Buttyan, J.P. Hubaux, F. Kargl, A. Kung, and M. Raya. Architecture for secure and private vehicular communications.
[18] P. Papadimitratos, V. Gligor, and JP Hubaux. Securing vehicular communications-assumptions, requirements, and principles. In Workshop on Embedded Security in Cars (ESCAR), volume 2006, 2006.
[19] B. Parno and A. Perrig. Challenges in securing vehicular networks. In Proceedings of HotNets-IV, 2005.
[20] A. Perrig, R. Canetti, JD Tygar, and D. Song. Efficient authentication and signing of multicast streams overlossy channels. In 2000 IEEE Symposium on Security and Privacy, 2000. S&P 2000. Proceedings, pages 56-73, 2000.
[21] M. Raya. The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pages 11-21. ACM New York, NY, USA, 2005.
[22] M. Raya and J.P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39-68, 2007.
[23] N. Sastry, U. Shankar, and D. Wagner. Secure verication of location claims. In Proceedings of the 2nd ACM workshop on Wireless security, pages 1-10. ACM New York, NY, USA, 2003.
[24] A. Studer, M. Luk, and A. Perrig. E±cient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007.Third International Conference on, pages 422-432, 2007.
[25] G. Wang. Security analysis of several group signature schemes. Proceedings of 4th International Conference on Cryptology in India (INDOCRYPT), Dec. 2003.
[26] B. Xiao, B. Yu, and C. Gao. Detection and localization of sybil nodes in VANETs. In Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, pages 1-8. ACM New York, NY, USA, 2006.
|