|
Reference [1] W. H. Organization, "World report on road traffic injury prevention," 2004. [2]L. J. Blincoe, "The Economic Impact of Motor Vehicle Crashes,2000," US Dept. of Transportation, National Highway Traffic Safety Administration, 2002. [3]W. D. Jones, "Building SaferCars," IEEE Specturm, vol. 39, pp. 82-85, 2002. [4]J. J. Blum, A. Eskandarian, and L. J. Hoffman, "Challenges of intervehicle ad hoc networks," IEEE Transactions on Intelligent Transportation System, vol. 5, pp. 347-351, 2004. [5]J. Luo and J.-P. Hubaux, "A Survey of Inter-Vehicle Communication," EPFL Technical Report IC, 2004. [6]T. Nadeem, S. Dashtinezhad, C. Liao, and L. Iftode, "TrafficView: traffic data dissemination using car-to-car communication," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 8, pp. 6-19, 2004. [7]P. Shankar, M. T. Alam, S. Musharoff, N. Ravi, C. V. Prados, V. Gradinescu, R. Diaconescu, C. Gorgorin, and L. Iftode, "Outdoor Experience with the TrafficView Application," 2005. [8]Q. Xu, T. Mak, J. Ko, and R. Sengupta, "Vehicle-to-vehicle safety messaging in DSRC," Proceedings of the first ACM workshop on Vehicular ad hoc networks, pp. 19-28, 2004. [9]Y. Jijun, E. Tamer, Y. Gavin, R. Bo, H. Stephen, K. Hariharan, and T. Timothy, "Performance evaluation of safety applications over DSRC vehicular ad hoc networks," Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, 2004. [10]W. Chen and S. Cai, "Ad hoc peer-to-peer network architecture for vehicle safety communications," IEEE Communications Magazine, vol. 43, pp. 100-107, 2005. [11]F. Dötzer, M. Strassberger, and T. Kosch, "Classification for traffic related inter-vehicle messaging," Proceedings of the 5th IEEE International Conference on ITS Telecommunications, 2005. [12]H. Yang, F. Ricciato, S. Lu, and L. Zhang, "Securing a wireless world," Proceedings of the IEEE, vol. 94, pp. 442-454, 2006. [13]D. Djenouri, L. Khelladi, and A. N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Communications Surveys & Tutorials, vol. 7, pp. 2-28, 2005. [14]A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmüller, "Attacks on Inter-Vehicle Communication Systems - An Analysis," Proceedings of the 3rd International Workshop on Intelligent Transportation (WIT 2006), 2006. [15]S. Eichler, F. Dotzer, C. Schwingenschlogl, F. J. F. Caro, and J. Eberspaher, "Secure routing in a vehicular ad hoc network," 2004. [16]R. Maxim and H. Jean-Pierre, "The security of vehicular ad hoc networks," Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, 2005. [17]K. Plobl, T. Nowey, and C. Mletzko, "Towards a Security Architecture for Vehicular Ad Hoc Networks," Proceedings of the First International Conference on Availability,Reliability and Security (ARES' 06), 2006. [18]D. Jungels, M. Raya, I. Aad, and J. P. Hubaux, "Certificate Revocation in Vehicular Ad Hoc Networks," EPFL Technical Report, 2006. [19]E. Fonseca and A. Festag, "A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS," NOW Technical Report, 2006. [20]J. Blum and E. Azim, "The threat of intelligent collisions," IT Professional, vol. 6, pp. 24-29, 2004. [21]B. Parno and A. Perrig, "Challenges in securing vehicular networks," Workshop on Hot Topics in Networks (HotNets-IV), 2005. [22]C. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad hoc ondemand distance vector (AODV) routing," IETF RFC3561experimental Standard, July, 2003. [23]D. B. Jonhson, D. A. Maltz, Y. C. Hu, and J. G. Jetcheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks," IETF MANET WG lnternet draft, 2000. [24]Y. B. Ko and N. H. Vaidya, "Location-Aided Routing (LAR) in mobile ad hoc networks," Wireless Networks, vol. 6, pp. 307-321, 2000. [25]F. Picconi, N. Ravi, M. Gruteser, and L. Iftode, "Probabilistic validation of aggregated data in vehicular ad-hoc networks," Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp. 76-85, 2006. [26]G. F. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation enforcement schemes for MANETs: a survey: Research Articles," Wireless Communications & Mobile Computing, vol. 6, pp. 319-332, 2006. [27]Nai-Wei Lo and H.-C. Tsai, "Illusion Attack on VANET Applications – A Message Plausibility Problem," Dept. of Information Management, NTUST, Technical Report, 2007. [28]K. Fall and K. Varadhan, "The ns Manual (formerly ns Notes and Documentation)," The VINT Project, vol. 1, 2002. [29]A. Mahajan, N. Potnis, K. Gopalan, and A. I. A. Wang, "Evaluation of Mobility Models For Vehicular Ad-Hoc Network Simulations," IEEE International Workshop on Next Generation Wireless Networks (WoNGeN '06) 2006. [30]G. Philippe, G. Dan, and S. Jessica, "Detecting and correcting malicious data in VANETs," Proceedings of the 1st international workshop on Vehicular ad hoc networks, Philadelphia, USA, 2004. [31]M. Raya and J. P. Hubaux, "Efficient secure aggregation in VANETs," Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp. 67-75, 2006. [32]U. S. C. Bureau, "TIGER, TIGER/Line and TIGER-Related Products," Available at http://www.census.gov/geo/www/tiger/. [33]S. Amit Kumar and B. J. David, "Modeling mobility for vehicular ad-hoc networks," Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, Philadelphia, USA, 2004. [34]B. Schneier, "Attack Trees," Dr. Dobb's Journal, vol. 24, pp. 21-29, 1999. |