1 |
V. Cabrera, F. Ros, and P. Ruiz, "Simulation-based study of common issues in VANET routing protocols," in Proc. IEEE VTC, 2009.
|
2 |
R. Marín-Pérez and P. M. Ruiz, "SBGR: A simple self-protected beaconless geographic routing for wireless sensor networks," in Proc. IEEE MASS, 2011, pp. 610-619.
|
3 |
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Secur., vol. 15, pp. 39-68, Jan. 2007.
|
4 |
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure vehicular communication systems: Design and architecture," IEEE Commun. Mag., vol. 46, no. 11, pp. 100-109, 2008.
|
5 |
C. Harsch, A. Festag, and P. Papadimitratos, "Secure position-based routing for VANETs," in Proc. IEEE VTC, 2007, pp. 26-30.
|
6 |
A. Festag, P. Papadimitratos, and T. Tielert, "Design and performance of secure geo-cast for vehicular communication," IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2456-2471, June 2010.
DOI
ScienceOn
|
7 |
J. Sanchez, R. Marin-Perez, and P. Ruiz, "Beacon-less geographic routing in real wireless sensor networks," J. Comput. Sci. Technol., vol. 23, no. 3, pp. 438-450, 2008.
DOI
|
8 |
Q. Chen, F. Schmidt-Eisenlohr, D. Jiang, M. Torrent-Moreno, L. Delgrossi, and H. Hartenstein, "Overhaul of IEEE 802.11 modeling and simulation in NS-2," [Online]. Available: http://dsn.tm.kit.edu/english/ Overhaul_NS-2.php
|
9 |
F. Martinez, M. Fogue, C. K. Toh, J. C. Cano, C. T. Calafate, and P. Manzoni, "Computer simulations of VANETs using realistic city topologies," Wireless Pers. Commun., pp. 1-25, 2012.
|
10 |
M. Mauve, A. Widmer, and H. Hartenstein, "A survey on position-based routing in mobile ad hoc networks," IEEE netw., vol. 15, no. 6, pp. 30-39, 2001.
DOI
ScienceOn
|
11 |
F. Li and Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE Veh. Technol. Mag., vol. 2, no. 2, pp. 12-22, 2007.
|
12 |
C. Lochert, H. Hartenstein, J. Tian, H. Fussler, D. Hermann, and M. Mauve, "A routing strategy for vehicular ad hoc networks in city environments," in Proc. IEEE IVS, 2003, pp. 156-161.
|
13 |
J. Tian, L. Han, K. Rothermel, and C. Cseh, "Spatially aware packet rout ing for mobile ad hoc inter-vehicle radio networks," in Proc. IEEE ITSC, 2003, pp. 1546-1551.
|
14 |
J. Douceur, "The sybil attack," in Proc. IPTPS, 2002, pp. 251-260.
|
15 |
B. Seet, G. Liu, B. Lee, C. Foh, K.Wong, and K. Lee, "A-STAR: A mobile ad hoc routing strategy for metropolis vehicular communications," in Proc. IFIP-TC6 Netw., 2004, pp. 989-999.
|
16 |
I. Leontiadis and C. Mascolo, "GeOpps: Geographical opportunistic routing for vehicular networks," in Proc. WoWMoM, 2007, pp. 1-6.
|
17 |
IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, IEEE. Std. 1609.2-2006, 2006.
|
18 |
P. Ruiz, V. Cabrera, J. Martinez, and F. Ros, "BRAVE: Beacon-less routing algorithm for vehicular environments," in Proc. IEEE MASS, 2010, pp. 709-714.
|
19 |
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis & defenses," in Proc. IPSN, 2004, pp. 259-268.
|
20 |
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad hoc netw., vol. 1, no. 2-3, pp. 293-315, 2003.
DOI
ScienceOn
|
21 |
I. Lequerica, J. A. Martinez, and P. M. Ruiz, "Efficient certificate revocation in vehicular networks using NGN capabilities," in Proc. IEEE VTC, 2010, pp. 1-5.
|