[1] CHENG Jiujun,CHENG Junlu,ZHOU Mengchu,et al.Routing in Internet of vehicles:a review[J].IEEE Transactions on Intelligent Transportation Systems,2015,16(5):2339-2352. [2] MENEZES A J,OORSCHOT P C,VANSTONE S A.Handbook of applied cryptography[M].[S.l.]:CRC Press,2018. [3] SHAMIR A.Identity-based cryptosystems and signature schemes[M].Berlin,Germany:Springer,1985. [4] HE D J,CHEN C,CHAN S,et al.Secure and efficient handover authentication based on bilinear pairing functions[J].IEEE Transactions on Wireless Communications,2012,11(1):48-53. [5] CAO Jin,MA Maode,LI Hui.An uniform handover authentication between E-UTRAN and non-3GPP access networks[J].IEEE Transactions on Wireless Communications,2012,11(10):3644-3650. [6] WANG Nengwen,HUANG Yuehmin,CHEN Weiming.A novel secure communication scheme in vehicular ad hoc networks[J].Computer Communications,2008,31(12):2827-2837. [7] YING B D,NAYAK A.Anonymous and lightweight authentication for secure vehicular networks[J].IEEE Transactions on Vehicular Technology,2017,66(12):10626-10636. [8] HUO Shiwei,YANG Wenjing,HOU Yintao,et al.Security analysis and improvement of anonymous authentication scheme in vehicle ad hoc network[J].Computer Engineering,2018,44(5):124-127.(in Chinese)霍士伟,杨文静,侯银涛,等.车载自组网匿名认证方案的安全性分析与改进[J].计算机工程,2018,44(5):124-127. [9] LÜ Liudi,ZHENG Dong,ZHANG Yinghui,et al.Identity-based aggregation signature verification in vehicular ad hoc network[J].Computer Engineering and Design,2018,39(7):1866-1871.(in Chinese)吕柳迪,郑东,张应辉,等.车联网中基于身份的聚合签名认证[J].计算机工程与设计,2018,39(7):1866-1871. [10] DUAN Xiaoyu,WANG Xianbin.Authentication handover and privacy protection in 5G HetNets using software-defined networking[J].IEEE Communications Magazine,2015,53(4):28-35. [11] WANG Kai,YIN Hao,QUAN Wei,et al.Enabling collaborative edge computing for software defined vehicular networks[J].IEEE Network,2018,32(5):112-117. [12] HUANG Xumin,YU Rong,KANG Jiawen,et al.Exploring mobile edge computing for 5G-enabled software defined vehicular networks[J].IEEE Wireless Communications,2017,24(6):55-63. [13] LIU Jianqi,WAN Jiafu,ZENG Bi,et al.A scalable and quick response software defined vehicular network assisted by mobile edge computing[J].IEEE Communications Magazine,2017,55(7):94-100. [14] AGIWAL M,ROY A,SAXENA N.Next generation 5G wireless networks:a comprehensive survey[J].IEEE Communications Surveys and Tutorials,2016,18(3):1617-1655. [15] KOSCHER K,CZESKIS A,ROESNER F,et al.Experimental security analysis of a modern automobile[C]//Proceedings of 2010 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2010:1-7. [16] YAN Yang,SUN Lijun,ZHU Lanting.Short-term traffic flow prediction method based on spatiotemporal relativity[J].Computer Engineering,2020,46(1):31-37.(in Chinese)闫杨,孙丽珺,朱兰婷.基于时空相关性的短时交通流量预测方法[J].计算机工程,2020,46(1):31-37. [17] ZHOU Zhihua.Machine learning[M].Beijing:Tsinghua University Press,2016.(in Chinese)周志华.机器学习[M].北京:清华大学出版社,2016. [18] STEVEN M K.Fundamentals of statistical signal processing-estimation and detection theory[M].Beijing:Electronic Industry Press,2011.(in Chinese) STEVEN M K.统计信号处理基础——估计与检测理论[M].北京:电子工业出版社,2011. [19] VIJAYAKUMAR O,AZEES M,KANNAN A,et al.Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks[J].IEEE Transactions on Intelligent Transportation Systems,2016,17(4):1015-1028. [20] LIU Yanbing,WANG Yuhang,CHANG Guanghui.Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(10):2740-2749. |