References
- J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, "A Survey on Security Aspects for LTE and LTE-A Networks," Communications Surveys & Tutorials IEEE, vol. 16, pp. 283-302, 2014. https://doi.org/10.1109/SURV.2013.041513.00174
- J. Cheng, J. Cheng, M. Zhou, F. Liu, S. Gao, and C. Liu, "Routing in Internet of Vehicles: A Review," IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, vol. 16, pp. 2339-2352, 2015. https://doi.org/10.1109/TITS.2015.2423667
- M. H. Lin and Y. W. Chen, "Performance Analysis of Buffer Aware Scheduling for Video Services in LTE Network," KSII Transactions on Internet & Information Systems, vol. 9, pp. 3594-3610, 2015.
- D. He, S. Chan and M. Guizani, "Securing software defined wireless networks," IEEE Communications Magazine, vol. 54, pp. 20-25, 2016.
- G. Araniti, C. Campolo, M. Condoluci, A. Iera, and A. Molinaro, "LTE for Vehicular Networking: A Survey," IEEE COMMUNICATIONS MAGAZINE, vol. 51, pp. 148-157, 2013.
- D. P. Van, B. P. Rimal, S. Andreev, and T. Tirronen, "Machine-to-Machine Communications Over FiWi Enhanced LTE Networks: A Power-Saving Framework and End-to-End Performance," Journal of Lightwave Technology, vol. 34, pp. 1062-1071, 2016. https://doi.org/10.1109/JLT.2015.2510358
- K. Kanwal and G. A. Safdar, "Reduced Early Handover for Energy Saving in LTE Networks," Communications Letters IEEE, vol. 20, pp. 153-156, 2016. https://doi.org/10.1109/LCOMM.2015.2503280
- M. Condoluci, M. Dohler, G. Araniti, and A. Molinaro, "Enhanced Radio Access and Data Transmission Procedures Facilitating Industry-Compliant Machine-Type Communications over LTE-Based 5G Networks," IEEE Wireless Communications, vol. 23, pp. 56-63, 2016. https://doi.org/10.1109/MWC.2016.7422406
- R. Hemajanani, R. Perumalraja and S. Chowmya, "Software defined LTE vehicular network," International Journal of Applied Engineering Research, vol. 10, pp. 1812-1816, 2015.
- T. H. Chuang, M. H. Tsai and C. Y. Chuang, "Group-Based Uplink Scheduling for Machine-Type Communications in LTE-Advanced Networks," in Proc. of IEEE International Conference on Advanced Information NETWORKING and Applications Workshops, 2015, pp. 652-657.
- D. Choi, H. K. Choi and S. Y. Lee, "A group-based security protocol for machine-type communications in LTE-advanced," Wireless Networks, vol. 21, pp. 405-419, 2015. https://doi.org/10.1007/s11276-014-0788-9
- C. Lai, H. Li, R. Lu, and X. Shen, "SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks," Computer Networks, vol. 57, pp. 3492-3510, 2013. https://doi.org/10.1016/j.comnet.2013.08.003
- C. Lai, H. Li, R. Lu, and R. Jiang, "LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks," in Proc. of GLOBECOM 2013 - 2013 IEEE Global Communications Conference, 2013, pp. 832-837.
- C. Lai, R. Lu, D. Zheng, H. Li, and X. Shen, "GLARM: Group-based Lightweight Authentication Scheme for Resource-constrained Machine to Machine Communications," Computer Networks, vol. 99, pp. 66-81, 2016. https://doi.org/10.1016/j.comnet.2016.02.007
- P. Sindhuja, Y. Kuwahara, K. Kumaki, and Y. Hiramatsu, "A Design of Vehicular GPS and LTE Antenna Considering Vehicular Body Effects," Ieice Transactions on Communications, vol. 99, 2016.
- W. Li, X. Ma, J. Wu, K. S. Trivedi, and X. L. Huang, "Analytically Modelling and Performance Evaluation of Long Term Evolution for Vehicle (LTE-V) Safety Services," IEEE Transactions on Vehicular Technology, 2016.
- A. Fu, J. Song, S. Li, G. Zhang, and Y. Zhang, "A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks," Security & Communication Networks, vol. 9, pp. 2002-2014, 2016.
- Y. Qiu, M. Ma and X. Wang, "A proxy signature-based handover authentication scheme for LTE wireless networks," Journal of Network & Computer Applications, vol. 83, pp. 63-71, 2017. https://doi.org/10.1016/j.jnca.2017.01.023
- Y. Xie, L. B. Wu, J. Shen, and A. Alelaiwi, "EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs," Telecommunication Systems, pp. 1-12, 2016.
- K. A. Shim, "CPAS:An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks," IEEE Transactions on Vehicular Technology, vol. 61, pp. 1874-1883, 2012. https://doi.org/10.1109/TVT.2012.2186992
- C. C. Lee and Y. M. Lai, "Toward a secure batch verification with group testing for VANET," Wireless Networks, vol. 19, pp. 1441-1449, 2013. https://doi.org/10.1007/s11276-013-0543-7
- Z. Jianhong, X. Min and L. Liying, "On the security of a secure batch verification with group testing for VANET," International Journal of Network Security, vol. 16, pp. 355-362, 2014.
- M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref, "A secure authentication scheme for VANETs with batch verification," Wireless Networks, vol. 21, pp. 1-11, 2015. https://doi.org/10.1007/s11276-014-0766-2
- D. He, S. Zeadally, B. Xu, and X. Huang, "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Information Forensics & Security, vol. 10, p. 1-1, 2015. https://doi.org/10.1109/TIFS.2014.2377671
- S. Chen, J. Hu, Y. Shi, and L. Zhao, "LTE-V: A TD-LTE based V2X Solution for Future Vehicular Network," IEEE Internet of Things Journal, vol. PP, p. 1-1, 2016.
- Y. L. Tseng, "LTE-Advanced enhancement for vehicular communication," IEEE Wireless Communications, vol. 22, pp. 4-7, 2015.
- C. K. Han and H. K. Choi, "Security Analysis of Handover Key Management in 4G LTE/SAE Networks," IEEE Transactions on Mobile Computing, vol. 13, pp. 457-468, 2014. https://doi.org/10.1109/TMC.2012.242
- J. Calabuig, J. F. Monserrat, D. Gozalvez, and O. Klemp, "Safety on the Roads: LTE Alternatives for Sending ITS Messages," Vehicular Technology Magazine IEEE, vol. 9, pp. 61-70, 2014. https://doi.org/10.1109/MVT.2014.2362272
- T. Yang, C. Lai, R. Lu, and R. Jiang, "EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks," Peer-to-Peer Networking and Applications, vol. 8, pp. 216-228, 2015. https://doi.org/10.1007/s12083-014-0251-9
- X. Duan and X. Wang, "Authentication handover and privacy protection in 5G hetnets using software-defined networking," IEEE Communications Magazine, vol. 53, pp. 28-35, 2015.
- A. G. Gotsis, A. S. Lioumpas and A. Alexiou, "M2M Scheduling over LTE: Challenges and new Perspectives," IEEE Vehicular Technology Magazine, vol. 7, pp. 34-39, 2012.
- A. Fu, N. Qin, Y. Wang, Q. Li, and G. Zhang, "Nframe : A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks," Wireless Networks, pp. 1-12, 2016.
- MIRACL Library, 2017.
Cited by
- STEIM: A Spatiotemporal Event Interaction Model in V2X Systems Based on a Time Period and a Raster Map vol.2020, pp.None, 2018, https://doi.org/10.1155/2020/1375426