参考文献
[1]QU F,WU Z,WANG F Y,et al.A Security and Privacy Review of VANET[J].IEEE Transactions on Intelligent Transportation Systems,2015,16(6):1-12.
[2]LI J,LU H,GUIZANI M.ACPN:A Novel Authentication Framework with Conditional Privacy-preservation and Non-repudiation for VANET[J].IEEE Transactions on Parallel & Distributed Systems,2015,26(4):938-948.
[3]SHAO C,LENG S,ZHANG Y,et al.Performance Analysis of Connectivity Probability and Connectivity-Aware MAC Protocol Design for Platoon-based VANET[J].IEEE Transactions on Vehicular Technology,2015,64(12):1-11.
[4]EIZA M H,NI Q.An Evolving Graph-based Reliable Routing Scheme for VANET[J].IEEE Transactions on Vehicular Technology,2013,62(4):1493-1504.
[5]罗涛,李俊涛,刘瑞娜,等.VANET中安全信息的快速可靠广播路由算法[J].计算机学报,2015,38(3):663-672.
[6]杨涛,孔令波,胡建斌,等.车辆自组网隐私保护研究综述[J].计算机研究与发展,2012(S2):178-185.
[7]吴启武,刘青子.基于贝叶斯理论的VANET安全路由信任模型[J].四川大学学报(工程科学版),2015,47(2):129-135.
[8]MULERT J V,WELCH I,SEAH W K G.Review:Security Threats and Solutions in MANET:A Case Study Using AODV and SAODV [J].Journal of Network & Computer Applications,2012,35(4):1249-1259.
(下转第123页)
(上接第118页)
[9]JANGRA A,SHALINI,GOEL N.e-ARAN:Enhanced Authenticated Routing for Ad Hoc Networks to Handle Selfish Nodes[C]//Proceedings of International Conference on Advances in Engineering,Science and Management.Washington D.C.,USA:IEEE Press,2012:144-149.
[10]JHAVERI R H,PATEL N M.A Sequence Number Based Bait Detection Scheme to Thwart Grayhole Attack in Mobile Ad Hoc Networks [J].Wireless Networks,2015,21(8):1-18.
[11]XUE Y,REN H L.Greenshields Model Based Congestion Pricing in Bottleneck Road Section[J].Shandong Science,2013,26(5):84-90.
[12]PARAMESWARY S,ROSLI H M,CHE P O,et al.Influence of Darkness Dry and Darkness Rainfall on Malaysian Expressway for Traffic Characteristics Using Greenshield’s Model[J].Journal of Basic and Applied Scientific Research,2015,5(11):34-42.
[13]DUA A,KUMAR N,BAWA S.A Systematic Review on Routing Protocols for Vehicular Ad Hoc Networks[J].Vehicular Communications,2014,1(1):33-52.
[14]VERMA K,HAASBULLAH H,KUMAR A.An Efficient Defense Method Against UDP Spoofed Flooding Traffic of Denial of Service(DoS) Attacks in VANET[C]//Proceedings of IACC’13.Washington D.C.,USA:IEEE Press,2013:550-555.
[15]王海龙,杨岳湘.基于信息熵的大规模网络流量异常检测[J].计算机工程,2007,33(18):130-133.
编辑索书志 |