References
- M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007. https://doi.org/10.3233/JCS-2007-15103
- F. Dotzer, "Privacy issues in vehicular ad hoc networks," in Proc. PETS, vol. 3856, Springer Berlin Heidelberg, 2006, pp. 197-209.
- M. Gerlach and F. Guttler, "Privacy in VANETs using changing pseudonyms - ideal and real," in Proc. IEEE VTC, Apr. 2007, pp. 2521- 2525.
- G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in VANET," in Proc. ACM VANET, New York, NY, USA, 2007, pp. 19-28.
- J. Sun and Y. Fang, "Defense against misbehavior in anonymous vehicular ad hoc networks," Ad Hoc Netw., vol. 7, no. 8, pp. 1515-1525, 2009. https://doi.org/10.1016/j.adhoc.2009.04.013
- T. Leinmuller, E. Schoch, and F. Kargl, "Position verification approaches for vehicular ad hoc networks," IEEE Wireless Commun., vol. 13, pp. 16- 21, Oct. 2006.
- R. K. Schmidt, T. Leinmuller, E. Schoch, A. Held, and G. Schafer, "Vehicle behavior analysis to enhance security in VANETs," in Proc. V2VCOM, 2009.
- M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks," IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1557-1568, 2007. https://doi.org/10.1109/JSAC.2007.071006
- M. Ghosh, A. Varghese, A. A. Kherani, and A. Gupta, "Distributed misbehavior detection in VANETs," in Proc. IEEE WCNC, 2009, pp. 1-6.
- M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah, "Detecting misbehaviors in VANET with integrated root-cause analysis," Ad Hoc Netw., vol. 8, no. 7, pp. 778-790, 2010. https://doi.org/10.1016/j.adhoc.2010.02.008
- X. Hong, D. Huang, M. Gerla, and Z. Cao, "SAT: Situation-aware trust architecture for vehicular networks," IEEE Commun. Mag., 2008.
- F. Dotzer, L. Fischer, and P. Magiera, "VARs: A vehicle ad-hoc network reputation system," in Proc. WOWMOM, 2005, pp. 454-456.
- B. Ostermaier, F. Dotzer, and M. Strassberger, "Enhancing the security of local dangerwarnings in VANETs - a simulative analysis of voting schemes," in Proc. ARES, Apr. 2007, pp. 422-431,
- Q.Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, 2010. https://doi.org/10.1109/TVT.2009.2034669
- M. Raya, P. Papadimitratos, V. Gligor, and J.-P. Hubaux, "On data-centric trust establishment in ephemeral ad hoc networks," in Proc. INFOCOM, 2008, pp. 1238-1246.
- T. Leinmuller, C. Maihofer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," in Proc. VANET, 2006.
- J. Grover, N. K. Prajapati, V. Laxmi, and M. S. Gaur, "Machine learning approach for multiple misbehavior detection in VANET," in Proc. ACC, vol. 192, Springer Berlin Heidelberg, 2011, pp. 644-653.
- J. Grover, V. Laxmi, and M. Gaur, "Misbehavior detection based on ensemble learning in VANET advanced computing," in Proc. ADCONS, vol. 7135, Springer Berlin Heidelberg, 2012, pp. 602-611.
- N.-W. Lo and H.-C. Tsai, "A reputation system for traffic safety event on vehicular ad hoc networks," EURASIP J. Wireless Commun. Netw., vol. 2009, Dec. 2009.
- Z. Huang, S. Ruj,M. Cavenaghi, M. Stojmenovic, and A. Nayak, "A social network approach to trust management in VANETs," Peer-to-Peer Netw. Appl., pp. 1-14, 2012.
- X. Zhuo, J. Hao, D. Liu, and Y. Dai, "Removal of misbehaving insiders in anonymous VANETs," in Proc. ACM MSWIM, 2009, pp. 106-115.
- K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, "Amoeba: Robust location privacy scheme for VANET," IEEE J. Sel. Areas Commun., vol. 25, pp. 1569-1589, Oct. 2007. https://doi.org/10.1109/JSAC.2007.071007
- E. Schoch, F. Kargl, T. Leinmuller, S. Schlott, and P. Papadimitratos, "Impact of pseudonym changes on geographic routing in VANETs," in Proc. ESAS, vol. 4357, Springer Berlin Heidelberg, 2006, pp. 43-57.
- R. Schmidt, T. Leinmuller, E. Schoch, F. Kargl, and G. Schafer, "Exploration of adaptive beaconing for efficient intervehicle safety communication," IEEE Network, vol. 24, no. 1, pp. 14-19, 2010.
- IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications andManagement Messages, IEEE Standard 1609.2-2006, pp. 1-105, 2006.
- A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," RSA CryptoBytes, vol. 5, no. 2, pp. 2-13, 2002.
- A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]," IEEE Trans. Wireless Commun., vol. 17, pp. 22-28, Oct. 2010.
- S. Ahren, B. Fan, B. Bhargav, and P. Adrian, "Flexible, extensible, and efficient VANET authentication," J. Commun. Netw., vol. 11, no. 6, pp. 894- 901, 2009.
- Y.-C. Wei, Y.-M. Chen, and H.-L. Shan, "Beacon-based trust management for location privacy enhancement VANETs," in Proc. APNOMS, Sept. 2011.
- P. Wex, J. Breuer, A. Held, T. Leinmuller, and L. Delgrossi, "Trust issues for vehicular ad hoc networks," in Proc. VTC, 2008, pp. 2800-2804.
- G. Yan, S. Olariu, and M. C. Weigle, "Providing VANET security through active position detection," Comput. Commun., vol. 31, no. 12, pp. 2883- 2897, 2008. https://doi.org/10.1016/j.comcom.2008.01.009
- S.-H. Cha, "Comprehensive survey on distance/similarity measures between probability density functions," Int. J. Math. Models Methods Applied Sci., vol. 1, no. 4, pp. 300-307, 2008.
- T. C. V. S. C. Consortium, "Vehicle safety communications project task 3 final report: Identify intelligent vehicle safety applications enabled by dsrc," Tech. Rep. DOT HS 809 859, National Highway Traffic Safety Administration, Mar. 2005.
- H. M. Zahera, G. F. El-Hady, and W. F. A. El-Wahed, "Query recommendation for improving search engine results," IJIRR, pp. 45-52, 2011.
- Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE J. Sel. Areas. Commun., vol. 24, no. 2, pp. 305-317, 2006. https://doi.org/10.1109/JSAC.2005.861389
- J. Luo, X. Liu, andM. Fan, "A trust model based on fuzzy recommendation for mobile ad-hoc networks," Comput. Netw., vol. 53, no. 14, pp. 2396- 2407, 2009. https://doi.org/10.1016/j.comnet.2009.04.008
- T. M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks," IEEE Internet Comput.,, vol. 9, no. 6, pp. 35-41, 2005.
- W. Li and A. Joshi, "Outlier detection in ad hoc networks using Dempster- Shafer theory," in Proc. MDM, May 2009, pp. 112-121.
- B. Aslam, S. Park, C. Zou, and D. Turgut, "Secure traffic data propagation in vehicular ad hoc networks," Int. J. Ad Hoc Ubiquitous Comput., vol. 6, no. 1, pp. 24-39, 2010. https://doi.org/10.1504/IJAHUC.2010.033823
- C. Harsch, A. Festag, and P. Papadimitratos, "Secure position-based routing for VANETs," in Proc. IEEE VTC, 2007, pp. 26-30.
- Y. Yang and X. Liu, "A re-examination of text categorization methods," in Proc. ACM SIGIR, 1999, pp. 42-49.