References
- Dedicated Short Range Communications (DSRC), Available: http://www.leearmstrong.com/dsrc/dsrchomeset.htm.
- M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, Vol.15, No.1, pp.39-68, 2007.
- M. D. Dikaiakos, A. Florides, T. Nadeem, and L. Iftode, "Location-aware services over vehicular ad-hoc networks using car-to-car communication," IEEE Journal on Selected Areas in Communications, Vol.25, No.8, pp.1590-1602, 2007. https://doi.org/10.1109/JSAC.2007.071008
- M. D. Dikaiakos, S. Iqbal, T. Nadeem, and L. Iftode, "VITP: An information transfer protocol for vehicular computing," in Proceedings of 2nd ACM Internationial Workshop on Vehicular Ad Hoc Networks, 2005, pp.30-39.
- X. Lin, X. Sun, and X. Shen, "GSIS: A secure and privacy preserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, Vol.56, No.6, pp. 3442-3456, 2007. https://doi.org/10.1109/TVT.2007.906878
- R. Lu, X. Lin, H. Zhu, P. H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicle communications," in Proceedings of IEEE INFOCOM, 2008, pp.1229-1237.
- C. D. Jung, C. Sur, Y. Park, and K. H. Rhee, "A robust and efficient anonymous authentication protocol in VANETs," Journal of Communications and Networks, Vol.11, No.6, pp.607-614, 2009. https://doi.org/10.1109/JCN.2009.6388414
- V. Pathak, D. Yao, and L. Iftode, "Securing location aware services over VANET using geographical secure path routing," in Proceedings of IEEE International Conference on Vehicular Electronics and Safety, 2008, pp.346-353.
- Z. Ren, W. Li, and Q. Yang, "Location verification for VANETs routing," in Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2009, pp.141-146.
- L. Zhang and F. Zhang, "A new certificateless aggregate signature scheme," Computer Communications, Vol.32, Issue 6, pp.1079-1085, 2009. https://doi.org/10.1016/j.comcom.2008.12.042
- L. Chen, Z. Chen, and N. P. Smart, "Identity-based key agreement protocols from pairings," International Journal of Information Security, Vol.6, No.4, pp.213-241, 2007. https://doi.org/10.1007/s10207-006-0011-9
- S. Micali, "NOVOMODO: Scalable certificate validation and simplified PKI management," in Proceeding of 1st Annual PKI Research Workshop, 2002, pp.15-25.
- C. Sur and K. H. Rhee, "An efficient authentication and simplified certificate status management for personal area networks," in Proceeding of APNOMS, 2006, LNCS 4238, pp.273-282, 2006.
- Pairing-Based Cryptography Library, Available: http://crypto.stanford.edu/pbc.
- TraNS - Realistic Simulator for VANET, Available: http://trans.epfl.ch/.
- The Network Simulator - NS-2, Available: http://www.isi.edu/nsnam/ns/