[1]KAIWARTYA O,ABDULLAH A H,CAO Y,et al.Internet of vehicles:motivation,layered architecture,network model,challenges,and future aspects[J].IEEE Access,2016,4:5356-5373.
[2]宋成,张明月,彭维平,等.基于双线性对的车联网批量匿名认证方案研究[J].通信学报,2017,38(6):49-57.
[3]LUCKSHETTY A,DONTAL S,TANGADE S.A survey:comparative study of applications,attacks,security and privacy in VANETs[C]//Proceedings of IEEE 2016 International Conference on Communication and Signal Processing.Washington D.C.,USA:IEEE Press,2016:1594-1598.
[4]RAYA M,HUBAUX J P.Securing vehicular ad hoc networks[J].Journal of Computer Security,2007,15(1):39-68.
[5]SHIM K.An ID-based aggregate signature scheme with constant pairng computations[J].Journal of Systems and Software,2010,83(10):1873-1880.
[6]ZHANG C,LU R,LIN X,et al.An efficient identity-based batch verification scheme for vehicular sensor nehvorks[C]//Proceedings of IEEE INFOCOM’08.Washington D.C.,USA:IEEE Press,2008:246-250.
[7]LEE C C,LAI Y M.Toward a secure batch verification with group testing for VANET[J].Wireless Networks,2013,19(6):1441-1449.
[8]HORNG S J,TZENG S F,LI T,et al.Enhancing security and privacy for identity-based batch verification scheme in VANET[J].IEEE Transactions on Vehicular Technology,2015(99):1-12.
[9]BAYAT M,BARMSHOORY M,RAHIMI M,et al.A secure authentication scheme for VANETs with batch verification[J].Wireless Networks,2015,21(5):1733-1743.
(下转第52页)
(上接第41页)
[10]HE D,ZEADALLY S,XU B,et al.An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J].IEEE Transactions on Information Forensics and Security,2015,10(12):2681-2691.
[11]PAPPU R.Physicalone-way functions[D].[S.1.]:Massachusetts Institute of Technology,2001.
[12]LI Jinglin,LIU Zhihan,YANG Fangchun.Internet of vehicles:the framework and key technology[J].Journal of Beijing University of Posts and Telecommunications,2014,37(6):95-100.
[13]BURROWS M,ABADI M,NEEDHAM R M.A logic of authentication[C]//Proceedings of Royal Society of London a Mathematical,Physical and Engineering Sciences.Washington D.C.,USA:IEEE Press,1989:233-271.
[14]刘博雅,刘年义,杨亚涛.基于椭圆曲线密码的无线射频识别双向认证协议[J].计算机工程,2017,43(1):196-200.
[15]GONG L,NEEDHAM R,YAHALOM R.Reasoning about belief in cryptographic protocols[C]//Proceedings of 1990 IEEE Computer Society Symposium on Research in Security and Privacy.Washington D.C.,USA:IEEE Press,1990:234-248.
[16]马成林,肖美华,邓春艳.基于改进GNY逻辑的Kerberos*协议安全性分析[J].计算机与数字工程,2014,42(10):1758-1762,1882.
[17]张学龙.物理不可克隆函数电路研究[D].宁波:宁波大学,2014. |