|
[1] M.S. Bouassida, I. Chrisment, and O. Festor, “Group key management in MANETs”, International Journal of Network Security, Vol. 6,No. 1, 2008, pp. 67–79. [2] A.K. Das, “An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks”, International Journal of Network Security Vol. 6, No. 2, 2008, pp. 134–144. [3] C.T. Li, M.S. Hwang, and Y.P. Chu, ”A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks” Computer Communications, Vol. 31, NO. 12, 30 July 2008, pp. 2803-2814. [4] N. Jiang and J. Wang, “Anonymous authentication protocol for multi-services in wireless environments”, The Journal of China Universities of Posts and Telecommunications, Vol. 15, NO. 4, December 2008, pp. 69-74. [5] K. Plößl and H. Federrath, “A privacy aware and efficient security 39 infrastructure for vehicular ad hoc networks”, Computer Standards & Interfaces, Vol. 30, NO. 6, August 2008, pp. 390–397. [6] J. Choi and S. Jung, A Security Framework with Strong Non-repudiation and Privacy in VANETs, Consumer Communications and Networking Conference (CCNC 2009), 10-13 Jan. 2009, pp. 1-5. [7] X. Yang, J. Liu, F. Zhao, and N. Vaidya, “A vehicle-to-vehicle communication protocol for cooperative collision warning”, Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous, 2004.pp. 114-123. [8] S. Raghunathan, A. R. Mikler, and C. Cozzolino, “Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework”, Journal of Systems and Software, Vol. 75, No. 1-2, 15, February 2005, pp. 125-137. [9] M. Raya and J. P. Hubaux, “The security of vehicular ad hoc networks”, Proceedings of SASN’05, 2005, pp. 11-21. [10] W. Stallings, “Cryptography and Network Security”, 4th Ed, Prentice-Hall, 2005. [11] M. ElZarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, “Security issues in a future vehicular network”, European Wireless’02 40 Conference, Florence, Italy, 2002. [12] H. Harney and C. Muckenhirn, “Group Key Management Protocol (GKMP) architecture”, RFC 2094, July 1997. [13] A. Perrig, R. Canetti, J.D. Tygar, and D. Song. “The TESLA Broadcast Authentication Protocol”, UC Berkeley and IBM Research, Vol. 5, No. 2, 2002, pp.2-13 [14] S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J. M. Tang, “Framework for security and privacy in automotive telematics”, International Workshop on Mobile Commerce, 2002, pp. 25-32. [15] F. Armknecht, A. Festag, D. Westhoff, and K. Zeng, “Cross-layer privacy enhancement and non-repudiation in vehicular communication”, 4th Workshop on Mobile Ad-Hoc Networks (WMAN), 2007. [16] J. Choi and S. Jung, “A Security Framework with Strong Non-repudiation and Privacy in VANETs”, Consumer Communications and Networking Conference (CCNC 2009), 10-13 Jan. 2009, pp. 1-5. [17] C.T. Li, M.S. Hwang and Y.P. Chu, ”A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks” Computer Communications, Vol. 31, NO. 12, 30 July 2008, pp. 2803-2814. 41 [18] M. Raya and J.P. Hubaux, “Security aspects of inter-vehicle communications”, in: Proceedings of the 5th Swiss Transport Research Conference, Ascona, Switzerland, 2005. [19] D. Jungels, M. Raya, P. Papadimitratos, I. Aad, and J.P. Hubaux, “Certificate revocation in vehicular ad hoc networks”, Technical LCAReport-2006-006, LCA, 2006. [20] J.-S. Lee and C.-C. Chang, Secure communications for cluster-based ad hoc networks using node identities, Journal of Network and Computer Applications 30 (4) 2007, pp. 1377–1396. [21] B. Schneier, “Applied Cryptography Protocols Algorithms and Source Code in C”, second ed., John Wiley and Sons Inc., 1996. [22] IEEE, Dedicated Short Range Communication Standard (DSRC), http://grouper.ieee.org/groups, access available on 27 June 2010
|