A Relay-assisted Secure Handover Mechanism for High-speed Trains |
Zhao, Yue
(Science and Technology on Communication Security Laboratory)
Tian, Bo (Science and Technology on Communication Security Laboratory) Chen, Zhouguo (Science and Technology on Communication Security Laboratory) Yang, Jin (College of Cyber Security, Sichuan University) Li, Saifei (The School of Information Science and Technology, Southwest Jiaotong University) |
1 | R. He, B Ai, G. Wang, K. Guan, Z. Zhong, A. Molisch, C. Briso-Rodriguez, C. Oestges, "High-speed railway communications: From GSM-R to LTE-R," IEEE Vehicular Technology Magazine, vol.11, no.3, pp: 49-58, 2016. DOI |
2 | J. Lee, C. Jang, O. Yi, "Analysis of radio based train control system using LTE-R and analysis of security requirements: The security of the radio based train control system," in Proc. of International Conference on Computer Applications and Information Processing Technology, pp: 1-4, August 2017. |
3 | H. Song, X. Fang, L. Yan, "Handover scheme for 5G C/U plane split heterogeneous network in high-speed railway," IEEE Transactions on Vehicular Technology, vol.63, no.9, pp: 4633-4646, 2014. DOI |
4 | L. Yan, X. Fang, Y. Fang, "Control and data signaling decoupled architecture for railway wireless networks," IEEE Wireless Communications, vol.22, no.1, pp: 103-111, 2015. DOI |
5 | A. Jabir, S. Shamala, Z. Zuriati, N. Hamid, "Fast handoff scheme for cluster-based proxy mobile Ipv6 protocol," IEICE Transactions on Communications, vol.E97-B, no.8, pp: 1667-1678, 2014. DOI |
6 | M. Almulla, Y. Wang, A. Boukerche, Z. Zhang, "A fast location-based handoff scheme for vehicular networks," IEEE International Conference on Communications, pp: 1464-1468, June 2013. |
7 | I. Lopez, M. Aguado, "Cyber security analysis of the European train control system," IEEE Communications Magazine, vol.53, no.10, pp: 110-116, 2015. DOI |
8 | X. Wang, C. He. "Safety function design and application of CTCS on-board equipment in high-speed railway of China," in Proc. of International Conference on Electromagnetics in Advanced Applications, pp: 677-679, October 2017. |
9 | J. H. Lin, L. Liu, C. Yi, W. Y. Wu. "Research on evolution law of service performance of high-speed train based on tracking monitoring," in Proc. of IET Conference on Railway Condition Monitoring, pp: 1-8, September 2016. |
10 | Z. Pan, S. Liu, A. K. Sangaiah, K. Muhammad. "Visual attention feature (VAF): a novel strategy for visual tracking based on cloud platform in intelligent surveillance systems," Journal of Parallel & Distributed Computing, vol. 120, pp: 182-194, 2018. DOI |
11 | Y. Li, Y. Qi, L. Lu, "Secure and efficient V2V communications for heterogeneous vehicle Ad Hoc networks," in Proc. of International Conference on Networking and Network Applications, pp: 93-99, October 2017. |
12 | E. Aqeeli, A. Moubayed, A. Shami. "Towards intelligent LTE mobility management through MME Pooling," in Proc. of IEEE Global Communications Conference, pp: 1-6, December 2015. |
13 | S. Li, L. Yan, "Enhanced robustness of control network for Chinese train control system level 3 (CTCS-3) facilitated by software defined networking," International Journal of Rail Transportation, vol.2, no.4, pp: 239-252, 2014. DOI |
14 | Y. Zhao, B. Tian, Z. Chen, Y. Liu, J. Ding, "An energy-efficient key agreement mechanism for underwater sensor networks," iCatse Conference on IT Convergence and Security, pp: 146-158, September 2017. |
15 | S. Liu, X. Cheng, W. Fu, Y. Zhou, Q. Li, "Numeric characteristics of generalized M-set with its asymptote," Applied Mathematics & Computation, vol. 243, pp: 767-774, 2014. DOI |
16 | Y. Zheng, H. Imai, "How to construct efficient signcryption schemes on elliptic curves," Information Processing Letters, vol. 68, no.5, pp: 227-233, 1998. DOI |
17 | M. Abdeljebbar, R. Elkouch, "Security analysis of LTE/SAE networks over E-UTRAN," International Conference on Information Technology for Organizations Development, pp: 1-5, March 2016. |
18 | S. Liu, W. Fu, L. He, J Zhou, M Ma, "Distribution of primary additional errors in fractal encoding method," Multimedia Tools & Applications, vol. 76, no.4, pp: 5787-5802, 2017. DOI |
19 | R Sanodiya, "DoS attacks: A simulation study," in Proc. of International Conference on Energy, Communication, Data Analytics and Soft Computing, pp: 2553-2558, August 2017. |
20 | Y. Zhao, X. Fang, R. Huang, Y. Fang, "Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular Networks," IEEE Transactions on Mobile Computing, vol.13, no.1, pp: 89-101, 2014. DOI |
21 | P. A. Rohman, R. Indrawijaya, T. Miftahushudur, B. A. Wael, "Performance analysis of curve-shaped NLFM against Doppler effect and background noise," in Proc. of International Conference on Radar, Antenna, Microwave, Electronics and Telecommunications, pp: 54-58, October 2016. |
22 | H. Song, X. Fang, C. Wang, "Cost-reliability tradeoff in licensed and unlicensed spectra interoperable networks with guaranteed user data rate requirements," IEEE Journal on Selected Areas in Communications, vol.35, no.1, pp: 200-214, 2017. DOI |
23 | Z. Haddad, M. Mahmoud, I. A. Saroit, S. Taha, "Secure and efficient uniform handover scheme for LTE-A networks," in Proc. of IEEE Wireless Communications and Networking Conference, pp: 1-6, September 2016. |
24 | W. Khedr, M. Abdalla, A. Elsheikh, "Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network," IET Information Security, vol. 9, no.6, pp: 334-343, 2015. DOI |
25 | S. Zargar, J. Joshi, D. Tipper, "DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring," in Proc. of IEEE International Conference on Information Reuse and Integration, pp: 120-129, August 2014. |
![]() |