|
[1] Z. Li, C. Liu, C. Chigan. “GPAS: A general-purpose automatic survey system based on vehicular ad hoc networks,” IEEE Wireless Communications, vol.18, 2011, pp. 61-66. [2] S. Panichpapiboon, W. Pattara-atikom. “A review of information dissemination protocols for vehicular ad hoc networks,” IEEE Communications Surveys & Tutorials, vol.14, 2012, pp. 784-798. [3] A. Busson. “Analysis and simulation of a message dissemination algorithm for VANET,” International Journal of Communication Systems, 2011, pp. 1212-1229. [4] S . Buchegger, J.Y. Le-Boudec. “Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks,” Processing 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002, pp. 403-410. [5] S . Buchegger, J.Y. Le-Boudec. “Performance analysis of the CONFIDANT Protocol: Cooperation of nodes — Fairness in dynamic ad-hoc networks,” Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002, pp. 226-236. [6] I. Khalil, S. Bagchi, N.B. Shroff. “LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks,” International Conference on Dependable Systems and Networks(DSN’05), 2005, pp. 612-621. [7] Y. Liu, Y.R. Yang. “Reputation propagation and agreement in mobile ad-hoc networks,” IEEE Wireless Communications and Networking Conference(WCNC), 2003, pp. 1510-1515. [8] S. Bansal, M. Baker. “Observation-based cooperation enforcement in ad hoc networks,” CoRR 2003. [9] Q. He, D. Wu, P.K. Khosla. “A secure incentive architecture for ad hoc networks,” Wireless Communications and Mobile Computing, 2006, pp. 333-346. [10] L. Chen, Q. Li, K.M. Martin, S.L. Ng. “Private reputation retrieval in public – a privacy-aware announcement scheme for VANETs,” IET Information Security, vol.11, 2017, pp. 204-210. [11] H. Hu, R. Lu, Z. Zhang, J. Shao. “REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET,” IEEE Transactions on Vehicular Technology, vol. 66, 2016, pp. 1786-1797. [12] C.F. Wang, J.W. Ding, T.C. Chen. “A routing protocol for mobile ad-hoc networks using the profit optimization model,” International Journal of Communication Systems, vol.27, 2013, pp.2851-2869. [13] M.E. Mahmoud, X. Shen. “PIS: A practical incentive system for multihop wireless networks,” IEEE Transaction on Vehicular Technology, vol. 59, 2010, pp. 4012-4025. [14] B. Lamparter, K. Paul, D. Westhoff. “Charging support for ad hoc stub networks,” Computer Communications, vol.26, 2003, pp. 1504-1514. [15] J.P. Jayapalan, S.D. Magee. “Method and system for providing credit for participation in an ad hoc network,” U.S. Patent 20 070 230 438 2007. [16] S.B. Lee, G. Pan, J.S. Park, M. Gerla, S. Lu. “Secure incentives for commercial ad dissemination in vehicular networks,” IEEE Transactions on Vehicular Technology, vol.61, 2012, pp.2715-2728. [17] H. Janzadeh, K. Fayazbakhsh, M. Dehghan, M.S. Fallah. “A secure credit-based cooperation stimulating mechanism for manets using hash chains,” Future Generation Computer Systems, vol. 25, 2009, pp.926-934. [18] T. Chen, S. Zhong. “INPAC: An enforceable incentive scheme for wireless networks using network codin,” Proceeding IEEE INFOCOM, 2010, pp.1-9. [19] M. Felegyhazi, J.P. Hubaux, L. Buttyan. “Nash equilibria of packet forwarding strategies in wireless ad hoc networks,” IEEE Transaction on Mobile Computing, vol. 5, 2006, pp. 463-476. [20] J. Kangaharju, A. Heinemann. “Incentives for electronic coupon systems,” Proceeding of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing and Networking, 2006, pp. 60-62. [21] H.Y. Wei, R.D. Gitlin. “Incentive mechanism design for selfish hybrid wireless relay networks,” Mobile Networks and Applications, vol.10, 2005, pp.929-937. [22] S. Zhong, J. Chen, Y.R. Yang. “Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks,” IEEE INFOCOM, 2003, pp.1987-1997. [23] E. Huang, J. Crowcroft, I. Wassell. “Rethinking incentives for mobile ad hoc networks,” Proceeding of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems, 2004, pp.191-196. [24] F. Li, J. Wu. “Frame: An innovative incentive scheme in vehicular networks,” IEEE International Conference on Communications, 2009, pp. 1-6. [25] S.B. Lee, G. Pan, J.S. Park, M. Gerla, S. Lu. “Secure incentives for commercial ad dissemination in vehicular networks,” IEEE Transaction on Vehicular Technology, vol. 61, 2012, pp.2715-2728. [26] F.K. Tseng, Y.H. Liu, J.S. Hwu, R.J. Chen. “A Secure Reed–Solomon Code Incentive Scheme for Commercial Ad Dissemination Over VANETs,” IEEE Transaction on Vehicular Technology, vol. 60, 2011, pp.4598-4608. [27] Z. Li, C. Liu, C. Chigan. “On Secure VANET-Based Ad Dissemination With Pragmatic Cost and Effect Control,” IEEE Transactions on Intelligent Transportation Systems, vol. 14, 2013, pp. 124-135. [28] L.Y. Yeh, Y.C. Lin. “A Proxy-Based Authentication and Billing Scheme With Incentive-Aware Multihop Forwarding for Vehicular Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 15, 2014, pp. 1607-1621. [29] C. Lai, K. Zhang, N. Cheng, H. Li, X. Shen. “SIRC: A secure incentive scheme for reliable cooperative downloading in highway VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, 2017, pp. 1559-1574. [30] L. Buttyan, J.P. Hubaux. “Stimulating cooperation in self-organizing mobile ad hoc netwokrks,” Mobile Networks and Applications, vol. 8, 2003, pp.579-592. [31] M. Raya, J.P. Hubaux. “Securing vehicular ad hoc networks,” Journal of Computer Security-Special Issue on Security of Ad-hoc and Sensor Networks, vol. 15, 2007, pp.39-68. [32] IEEE Standard for Wireless Access in Vehicular Environments (WAVE)— Over-the-Air Electronic Payment Data Exchange Protocol for Intelligent Transportation Systems (ITS). IEEE Vehicular Technology Society, 2011, pp.1-62. [33] C. Zhang, R. Lu, X. Lin, H.P. Ho, X. Shen. “An efficient identity-based batch verification scheme for vehicular sensor networks,” IEEE INFOCOM, 2008, pp.246-250. [34] K.A. Shim. “CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks,” IEEE Transactions on Vehicular Technology, vol. 61, 2012, pp.1874-1883. [35] J.B. Kenney. “Dedicated short-range communications (DSRC) standards in the United States,” Proceeding of IEEE, 2011, pp. 1162–1182. [36] C. Cremers. “Scyther semantics and verification of security protocols,” Ph.D dissertation: Eindhoven University of Technology, 2006. [37] C. Cremers. “The Scyther Tool: verification, falsification, and analysis of security protocols,” International Conference on Computer Aided Verification (CAV), 2008, pp.414-418. [38] K. Cohn-Gordon, C. Cremers, L. Garrat. “On Post-Compromise Security,” IEEE Computer Security Foundations Symposium (CSF), 2016.
|