1 |
SAE, "Level of Driving Automation", SAE J3061, 2018
|
2 |
관계부처 합동, "미래자동차 산업 발전 전략", 2019
|
3 |
Anwer, M. Shahid, Chris GuyA, "Survey of VANET Technologies", Journal of Emerging Trends in Computing and Information Sciences 5(9) pp. 661-674, 2014
|
4 |
"IEEE Guide for Wireless Access in Vehicular Environments (WAVE)-Architecture," IEEE Standard 1609.0-2013, 2013.
|
5 |
"IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Networking Services," IEEE Standard 1609.3-2016, 2016
|
6 |
C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, 1999
|
7 |
K. Geetha, N. Sreenath, "Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol", RESEARCH ARTICLE - COMPUTER ENGINEERING AND COMPUTER SCIENCE, pp. 1161-1172, 2015
|
8 |
Carlos E. Caicedo, James B.D. Joshi, Summit R. Tuladhar, "IPv6 Security Challenge", Computer, vol. 42, no. 2, pp.36-42, Feb 2009
DOI
|
9 |
A. S. A. Mohamed Sid Ahmed, R. Hassan and N. E. Othman, "IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey.", IEEE Access, vol. 5, pp. 18187-18210, 2017.
DOI
|
10 |
Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang, "Resisting flooding attacks in ad hoc networks." International Conference on Information Technology: Coding and Computing Volume II, pp. 657-662, 2005,
|
11 |
V. Bibhu, K. Roshan, K. Balwant, D. Kumar, "Performance Analysis of Black Hole Attack in Vanet", I. J. Computer Network and Information Security, pp. 47-54, Nov 2012
|
12 |
Karn, Chaitanya, Gupta, C.P., "A survey on VANETs security attacks and Sybil Attack detection." International Journal of Sensors Wireless Communications and Control. 6. pp. 45-62. 2016
DOI
|
13 |
P. Kafil, M. Fathy, M. Z. Lighvan, "Modeling Sybil attacker behavior in VANETs." 2012 9th International ISC Conference on Information Security and Cryptology, pp. 162-168. 2012,
|
14 |
Elsa Mustikawati, Doan Perdana, Ridha Muldina Negara, "Network Security Analysis in Vanet Against Black Hole and Jellyfish Attack with Intrusion Detection System Algorithm", CommIT (Communication & Information Technology) Journal 11(2), pp. 77-83, 2017
DOI
|
15 |
B. Brecht et al., "A Security Credential Management System for V2X Communications.", IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 12, pp. 3850-3871, Dec. 2018.
DOI
|
16 |
L. He and W. T. Zhu, "Mitigating DoS attacks against signature-based authentication in VANETs." IEEE International Conference on Computer Science and Automation Engineering (CSAE), pp. 261-265. 2012
|
17 |
M. Kaur, J. Martin and H. Hu, "Comprehensive view of security practices in vehicular networks." International Conference on Connected Vehicles and Expo (ICCVE), pp. 19-26. 2016
|
18 |
"IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-Channel Operation," IEEE Standard 1609.4-2016, 2016
|
19 |
P. Liu, B. Liu, Y. Sun, B. Zhao, I. You, "Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET," IEEE Access, vol. 6, pp. 20795-20806, 2018.
DOI
|
20 |
M. N. Mejri, J. Ben-Othman, "GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs.", IEEE Transactions on Mobile Computing, vol. 16, no. 3, pp. 759-771, March 2017.
DOI
|
21 |
K. Verma, H. Hasbullah, "IP-CHOCK (filter)-Based detection scheme for Denial of Service (DoS) attacks in VANET," International Conference on Computer and Information Sciences (ICCOINS), pp. 1-6. 2014
|
22 |
J. Tobin, C. Thorpe, L. Murphy, "An Approach to Mitigate Black Hole Attacks on Vehicular Wireless Networks," IEEE 85th Vehicular Technology Conference, pp. 1-7, 2017
|