|
[1]N.W. Wang, Y.M. Huang, and W.M. Chen, “A novel secure communication scheme in vehicular ad hoc networks,” Computer Communications (In press), Available online, 2008. [2]M. Raya, and J. P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, Vol. 15, Pages: 39-68, 2007. [3]J. Kelsey, B. Schneier, and D. Wagner, “Protocol Interactions and the Chosen Protocol Attack,” In Proceeding of the 5th International Workshop on Security Protocols, Vol. 1361 of LNCS, Pages: 91-104, 1997. [4]W. Diffie, and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, 1976. [5]S. Blake-Wilson and A. Menezes, “Authenticated Diffie-Hellman Key Agreement Protocols,” In Proceeding of the 5th Annual Workshop on Selected Areas in Cryptography, Vol. 1556 of LNCS, pages: 339-361, 1998. [6]M. Raya, and J.P. Hubaux, “The security of vehicular ad hoc networks,” In Proceeding of SASN’05, pages: 11-21, 2005. [7]F. Dotzer, F. Kohlmayer, T. Kosch, and M. Strassberger, “Secure Communication for Intersection Assistance,” In proceeding of the 2nd International Workshop on Intelligent Transportation, March 15-16, 2005. [8]C. Laurendeau and M. Barbeau, “Secure Anoymous Broadcasting in Vehicular Networks,” IEEE Conference on Local Computer Networks, 2007. [9]IEEE Vehicular Technology Society, “5.9 GHz Dedicated Short Range Communications (DSRC) – Overview,” [online] available: http://grouper.ieee.org/groups/scc32/dsrc/ [10]IEEE 802 Committee of the IEEE Computer Society: Draft Amendment to Standard for Information Technology -Telecommunications and information Exchange between Systems - LAN/MAN Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Wireless Access in Vehicular Environments (WAVE). Draft IEEE Standard, IEEE P802.11p/D1.1, January 2005. [11]SCC32 Committee of the IEEE Intelligent Transportation Systems Society: Draft Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages. Draft IEEE Standard, IEEE 1609.2/D1.3, October 2005. [12]SCC32 Committee of the IEEE Intelligent Transportation System Society: Wireless Access in Vehicular Environments (WAVE) Multi-Channel Operation. Draft IEEE Standard, IEEE p1609.2/D1.3, October 2005. [13]C. Laurendeau and M. Barbeau, “Threats to Security in DSRC/WAVE,” In Proceedings of the 5th International Conference on Ad Hoc Networks andWireless. Vol 4104 of LNCS, 2006. [14]M. Gerlach, A. Festag, T. Leinmuller, G. Goldacker, and C. Harsch, “Security architecture for vehicular communication,” In Proceeding of WIT’05, Hamburg, Germany, 2005. [15]P. Papadimitratos, V. Gligor, and J. P. Hubaux, “Securing Vehicular Communications - Assumptions, Requirements, and Principles,” In Proceedings of 4th Workshop on Embedded Security in Cars, 2006. [16]X. Yang, J. Liu, F. Zhao and N. Vaidya, “A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning,” Technical Report, University of Illinois at Urbana-Champaign, Dec. 2003. [17]C. Adler and M. Strassberger, “Putting Together the Pieces- A Comprehensive View on Cooperative Local Danger Warning,” In Proceedings the 13th ITS World Congress and Exhibition on Intelligent Transport Systems and Services, London, UK, 2006. [18]B. Parno and A. Perrig, “Challenges in Securing Vehicular Networks,” In Proceeding of the Workshop on Hot Topics in Networks, 2005. [19]J.P. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security and Privacy, pages: 49–55, 2004. [20]M. Juhong, H Jihun, Y Sangki, K Lnhye, and K Hyogon,” Secure Vehicular Communication for Safety Applications - A Measurement Study,” In Proceeding of the IEEE Vehicular Technology Conference, 2008. [21]M. Raya, P. Papadimitratos, and J. P. Hubaux, “Securing Vehicular Communications,” IEEE Wireless Communications Magazine, 2006. [22]JT Isaac, JS Camara, S Zeadally, and JT Marquez, “A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks,” - Computer Communications, 2008. [23]J. Zhang, W. Zou, D. Chen, and Y. Wang, “On the security of a digital signature with message recovery using self-certified public key,” Informatica (Slovenia), Vol.29, No 3, pages: 343–346, 2005. [24]E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, “Recommendation for Key Management – Part 1: General(Revised) NIST Special Publication 800-57”, May, 2006. [25]Wei Dai, “Crypto++ Library 5.5.2.” online available: http://www.cryptopp.com/ [26]FIPS PUB 186-2, “Digital Signature Standard (DSS),” National Institute for Standard. [27]W. Ren, Y. Kim, J.Y. Jo, M. Yang and Y. Jiang, “dsRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks,” In Proceeding of 4th International Conference on Information Technology, Pages: 102-110, 2007.
|