Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs |
Martinez, Juan A.
(Department of Information and Communications Engineering, University of Murcia)
Vigueras, Daniel (Department of Information and Communications Engineering, University of Murcia) Ros, Francisco J. (Department of Information and Communications Engineering, University of Murcia) Ruiz, Pedro M. (Department of Information and Communications Engineering, University of Murcia) |
1 | V. Cabrera, F. Ros, and P. Ruiz, "Simulation-based study of common issues in VANET routing protocols," in Proc. IEEE VTC, 2009. |
2 | R. Marín-Pérez and P. M. Ruiz, "SBGR: A simple self-protected beaconless geographic routing for wireless sensor networks," in Proc. IEEE MASS, 2011, pp. 610-619. |
3 | M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Secur., vol. 15, pp. 39-68, Jan. 2007. |
4 | P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure vehicular communication systems: Design and architecture," IEEE Commun. Mag., vol. 46, no. 11, pp. 100-109, 2008. |
5 | C. Harsch, A. Festag, and P. Papadimitratos, "Secure position-based routing for VANETs," in Proc. IEEE VTC, 2007, pp. 26-30. |
6 | A. Festag, P. Papadimitratos, and T. Tielert, "Design and performance of secure geo-cast for vehicular communication," IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2456-2471, June 2010. DOI ScienceOn |
7 | J. Sanchez, R. Marin-Perez, and P. Ruiz, "Beacon-less geographic routing in real wireless sensor networks," J. Comput. Sci. Technol., vol. 23, no. 3, pp. 438-450, 2008. DOI |
8 | Q. Chen, F. Schmidt-Eisenlohr, D. Jiang, M. Torrent-Moreno, L. Delgrossi, and H. Hartenstein, "Overhaul of IEEE 802.11 modeling and simulation in NS-2," [Online]. Available: http://dsn.tm.kit.edu/english/ Overhaul_NS-2.php |
9 | F. Martinez, M. Fogue, C. K. Toh, J. C. Cano, C. T. Calafate, and P. Manzoni, "Computer simulations of VANETs using realistic city topologies," Wireless Pers. Commun., pp. 1-25, 2012. |
10 | M. Mauve, A. Widmer, and H. Hartenstein, "A survey on position-based routing in mobile ad hoc networks," IEEE netw., vol. 15, no. 6, pp. 30-39, 2001. DOI ScienceOn |
11 | F. Li and Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE Veh. Technol. Mag., vol. 2, no. 2, pp. 12-22, 2007. |
12 | C. Lochert, H. Hartenstein, J. Tian, H. Fussler, D. Hermann, and M. Mauve, "A routing strategy for vehicular ad hoc networks in city environments," in Proc. IEEE IVS, 2003, pp. 156-161. |
13 | J. Tian, L. Han, K. Rothermel, and C. Cseh, "Spatially aware packet rout ing for mobile ad hoc inter-vehicle radio networks," in Proc. IEEE ITSC, 2003, pp. 1546-1551. |
14 | J. Douceur, "The sybil attack," in Proc. IPTPS, 2002, pp. 251-260. |
15 | B. Seet, G. Liu, B. Lee, C. Foh, K.Wong, and K. Lee, "A-STAR: A mobile ad hoc routing strategy for metropolis vehicular communications," in Proc. IFIP-TC6 Netw., 2004, pp. 989-999. |
16 | I. Leontiadis and C. Mascolo, "GeOpps: Geographical opportunistic routing for vehicular networks," in Proc. WoWMoM, 2007, pp. 1-6. |
17 | P. Ruiz, V. Cabrera, J. Martinez, and F. Ros, "BRAVE: Beacon-less routing algorithm for vehicular environments," in Proc. IEEE MASS, 2010, pp. 709-714. |
18 | J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis & defenses," in Proc. IPSN, 2004, pp. 259-268. |
19 | C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad hoc netw., vol. 1, no. 2-3, pp. 293-315, 2003. DOI ScienceOn |
20 | IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, IEEE. Std. 1609.2-2006, 2006. |
21 | I. Lequerica, J. A. Martinez, and P. M. Ruiz, "Efficient certificate revocation in vehicular networks using NGN capabilities," in Proc. IEEE VTC, 2010, pp. 1-5. |