References
- R. A. Uzcategui and G. Acosta-Marum, "WAVE: A Tutorial," IEEE Communications Magazine, May 2009, pp. 126-133.
- IEEE Std. 1609.2-2013. (April, 2013.) IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages. Accessed Aug. 2014.
- T. Zhang and L. Delgrossi, Vehicle Safety Communications: Protocols, Security, and Privacy, Hoboken, New Jersey: John Wiley Sons, Inc., 2012.
- P. Papadimitratos, "Secure Vehicular Communication Systems: Design and Architecture," IEEE Communication Magazine, vol. 46, no. 11, 2008, pp. 100-109. https://doi.org/10.1109/MCOM.2008.4689252
- G. Yan, S. Olariu, and M. C. Weigle, "Providing VANET Security Through Active Position Detection," Computer Communications, vol. 31, no. 12, July 2008, pp. 2883-2897. https://doi.org/10.1016/j.comcom.2008.01.009
- N. Wang and Y. Huang, "A Novel Secure Communication Scheme in Vehicular Ad Hoc Networks," Computer Communications, vol. 31, no. 12, July 208, pp. 2827-2837. https://doi.org/10.1016/j.comcom.2007.12.003
- M. Faezipour, M. Nourani, A. Saeed, and S. Addepalli, "Progress and Challenges in Intelligent Vehicle Area Networks," Communications of the ACM, vol. 55, no. 2, Feb. 2012, pp. 90-1000. https://doi.org/10.1145/2076450.2076470
- I. Algredo-Badillo et al, "Efficient Hardware Architecture for the AES-CCM Protocol of the IEEE 802.11i Standard", Computers & Electrical Engineering, 2010, pp. 565-577.
- T. Schutze, "Automotive Security: Cryptography for Car2X Communication," tech. rep., Rodhe & Schwarz, Germany, Mar. 2011, pp. 1-16.
- E. Schoch and F. Kargl, "On the Efficiency of Secure Beaconing in VANETs," The 3rd ACM Conference on Wireless Network Security, Mar. 2010, pp. 111-116.
- Y. Wang et al., "Throughput and Delay Limits of 802.11p and its Influence on Highway Capacity," Procedia - Social and Behavioral Sciences, vol. 96, Nov. 2013, pp. 2096-2104. https://doi.org/10.1016/j.sbspro.2013.08.236
- W. Stallings, Cryptography and Network Security Principles and Practices, 4th ed. Prentice Hall, 2005.
- NIST FIPS-197. Advanced Encryption Standard. Accessed Aug. 2014.
- NIST SP 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. Accessed Aug. 2014.
- Xilinx. XST User Guide for Virtex-4, Virtex-5, Spartan-3, and Newer CPLD Devices. Accessed Aug. 2014.
- Xilinx. ChipScope Pro Software and Cores User Guide. Accessed Aug. 2014.
- A. Aziz, A. Samiah, and N. Ikram, "A Secure Framework for Robust Secure Wireless Network (RSN) using AES-CCMP," The fourth International Bhurban Conference on Applied Sciences and Technology, 2005.
- N. Smyth, M. McLoone, and J. V. McCanny, "WLAN Security Processor," IEEE Trans. on Circ. and Syst.-I, 2006, pp. 1506-1520.
- H. Rha and H. Choi, "Efficient Pipelined Multistream AES CCMP Architecture for Wireless LAN," International Conference on Information Science and Applications (ICISA), May 2012, pp. 1-5.