1 |
I. Ali, M. Gervais, E. Ahene, and F. Li, "A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs," J. Syst. Archit., vol. 99, p. 101636, Oct. 2019.
DOI
|
2 |
H. Li, L. Pei, D. Liao, G. Sun, and D. Xu, "Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET," Peer-to-Peer Netw. Appl., vol. 12, no. 5, pp. 1178-1193, Jul. 2019.
DOI
|
3 |
M. Atzori, "Blockchain-Based Architectures for the Internet of Things: A Survey," SSRN Electron. J., Apr. 2017.
|
4 |
L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, "A scalable robust authentication protocol for secure vehicular communications," IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606-1617, 2010.
DOI
|
5 |
M. Behrisch, L. Bieker, J. Erdmann, and D. Krajzewicz, "SUMO- Simulation of urban mobility: An overview," in Proc. of 3rd Int. Conf. Adv. Syst. Simul., Barcelona, Spain, pp. 55-60, 2011.
|
6 |
X. Xian, W. Shi, and H. Huang, "Comparison of OMNET++ and other simulator for WSN simulation," in Proc. of 3rd IEEE Conf. Ind. Electron. Appl., Singapore, pp. 1439-1443, Jun. 3-5, 2008.
|
7 |
X. Zhang and X. Chen, "Data Security Sharing and Storage Based on a Consortium Blockchain in a Vehicular Ad-hoc Network," IEEE Access, vol. 7, pp. 58241-58254, Jan. 3, 2019.
DOI
|
8 |
A. Kchaou, R. Abassi, and S. Guemara, "Toward a distributed trust management scheme for VANET," in Proc. of the 13th International Conference on Availability, Reliability and Security, pp. 1-6, Aug. 2018, Article No. 53.
|
9 |
R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs," IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012,
DOI
|
10 |
H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, "VANet security challenges and solutions: A survey," Veh. Commun., vol. 7, pp. 7-20, Jan. 2017.
DOI
|
11 |
R. W. Van Der Heijden, S. Dietzel, T. Leinmuller, and F. Kargl, "Survey on misbehavior detection in cooperative intelligent transportation systems," IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 779-811, 2019.
DOI
|
12 |
S. Zeadally, R. Hunt, Y. S. Chen, A. Irwin, and A. Hassan, "Vehicular ad hoc networks (VANETS): Status, results, and challenges," Telecommun. Syst., vol. 50, no. 4, pp. 217-241, Aug. 2012.
DOI
|
13 |
Y. Li, "An Overview of the DSRC/WAVE Technology," in Proc. of Quality, Reliability, Security, and Robustness in Heterogeneous Networks, vol. 74, X. Zhang and D. Qiao, Ed. Berlin, Germany: Springer, pp. 544-558, 2010.
|
14 |
A. K. Malhi, S. Batra, and H. S. Pannu, "Security of vehicular ad-hoc networks: A comprehensive survey," Comput. Secur., vol. 89, p. 101664, Feb. 2020.
DOI
|
15 |
T. Zhang and Q. Zhu, "Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs," IEEE Trans. Signal Inf. Process. over Networks, vol. 4, no. 1, pp. 148-161, Feb. 2018.
DOI
|
16 |
C. Lin, D. He, X. Huang, N. Kumar, and K.-K. R. Choo, "BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks," IEEE Trans. Intell. Transp. Syst., vol. 22, no. 12, pp. 7408-7420, 2021.
DOI
|
17 |
C. A. Kerrache, C. T. Calafate, J. C. Cano, N. Lagraa, and P. Manzoni, "Trust Management for Vehicular Networks: An Adversary-Oriented Overview," IEEE Access, vol. 4, pp. 9293-9307, Dec. 2016.
DOI
|
18 |
M. S. Sheikh, J. Liang, and W. Wang, "A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)," Sensors, vol. 19, no. 16, p. 3589, Aug. 2019.
DOI
|
19 |
D. Zheng, C. Jing, R. Guo, S. Gao, and L. Wang, "A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs," IEEE Access, vol. 7, pp. 117716-117726, Aug. 2019.
DOI
|
20 |
R. Hussain, J. Lee, and S. Zeadally, "Trust in VANET: A Survey of Current Solutions and Future Research Opportunities," IEEE Trans. Intell. Transp. Syst., vol. 22, no. 5, pp, 2553-2571, 2021.
DOI
|
21 |
J. Ren and L. Harn, "An efficient threshold anonymous authentication scheme for privacy-preserving communications," IEEE Trans. Wirel. Commun., vol. 12, no. 3, pp. 1018-1025, Jan. 2013.
DOI
|
22 |
D. He, S. Chan, and M. Guizani, "An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks," IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1605-1614, March 2016.
DOI
|
23 |
S. Rowan, M. Clear, M. Gerla, M. Huggard, and C. Mc Goldrick, "Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels," arXiv, April 2017.
|
24 |
A. Wasef and X. S. Shen, "EMAP: Expedite message authentication protocol for vehicular ad hoc networks," IEEE Trans. Mob. Comput., vol. 12, no. 1, pp. 78-89, Jan. 2013.
DOI
|
25 |
Q. Feng, D. He, S. Zeadally, and K. Liang, "BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks," IEEE Trans. Ind. Informatics, vol. 16, no. 6, pp. 4146-4155, June 2020.
DOI
|
26 |
R. Lu, X. Lin, H. Zhu, P. H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. of IEEE INFOCOM, Phoenix, AZ, USA, pp. 1229-1237, 2008.
|
27 |
B. Luo, X. Li, J. Weng, J. Guo, and J. Ma, "Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET," IEEE Trans. Veh. Technol., vol. 69, no. 2, pp. 2034-2048, Feb. 2020.
DOI
|
28 |
A. Dorri, M. Steger, S. S. Kanhere and R. Jurdak, "BlockChain: A Distributed Solution to Automotive Security and Privacy," IEEE Communications Magazine, vol. 55, no. 12, pp. 119-125, Dec. 2017.
DOI
|
29 |
M. C. Chuang and J. F. Lee, "PPAS: A privacy preservation authentication scheme for vehicle-to-infrastructure communication networks," in Proc. of 2011 Int. Conf. Consum. Electron. Commun. Networks, in Proc. of CECNet 2011, Xianning, China, pp. 1509-1512, 2011.
|
30 |
C.Sommer, J. Harri, F. Hrizi, B. Schunemann, and F. Dressler, "Simulation tools and techniques for vehicular communications and applications," Vehicular Ad Hoc Networks, Cham, Switzerland: Springer, pp. 365-392, 2015.
|
31 |
M. Raya, P. Papadimitratos, V. D. Gligor, and J. P. Hubaux, "On data-centric trust establishment in ephemeral ad hoc networks," in Proc. of IEEE INFOCOM, Phoenix, AZ, USA, pp. 1238-1246, 2008.
|
32 |
Y. Xiao and Y. Liu, "BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET," IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 2850-2864, March 2019.
DOI
|
33 |
J. Cui, J. Zhang, H. Zhong, and Y. Xu, "SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter," IEEE Trans. Veh. Technol., vol. 66, no. 11, pp. 10283-10295, Nov. 2017.
DOI
|
34 |
R. El Sibai, T. Atechian, J. B. Abdo, J. Demerjian, and R. Tawil, "A new software-based service provision approach for vehicular cloud," in Proc. of GSCIT 2015, Sousse, Tunisia, pp. 1-6, 2015.
|
35 |
S. F. Tzeng, S. J. Horng, T. Li, X. Wang, P. H. Huang, and M. K. Khan, "Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs," IEEE Trans. Veh. Technol., vol. 66, no. 4, pp. 3235-3248, April 2017.
DOI
|
36 |
M. Azees, P. Vijayakumar, and L. J. Deboarh, "EAAP: Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks," IEEE Trans. Intell. Transp. Syst., vol. 18, no. 9, pp. 2467-2476, Sept. 2017.
DOI
|
37 |
W. Li and H. Song, "ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks," IEEE Trans. Intell. Transp. Syst., vol. 17, no. 4, pp. 960-969, April 2016,
DOI
|
38 |
Y. M. Chen and Y. C. Wei, "A beacon-based trust management system for enhancing user centric location privacy in VANETs," J. Commun. Networks, vol. 15, no. 2, pp. 153-163, April 2013.
DOI
|
39 |
M. Arshad et al., "Beacon trust management system and fake data detection in vehicular ad-hoc networks," IET Intell. Transp. Syst., vol. 13, no. 5, pp. 780-788, May 2019.
DOI
|