[1] |
LIU J K, YUEN T H, AU M H, et al. Improvements on an authentication scheme for vehicular sensor networks[J]. Expert Systems with Applications, 2014, 41(5):2559-2564.
|
[2] |
DE FUENTES J M, GONZ′ALEZ-TABLAS A I,RIBAGORDA A. Overview of security issues in vehicularad-hoc networks [C]//Handbook of Research onMobility and Computing. [s.l.]: IGI Global, 2011: 894-911.
|
[3] |
GIORDANO S. Mobile ad hoc networks[C]//Handbook of Wireless Networks and MobileComputing. New York, USA: John Wiley & Sons,2002: 325-346.
|
[4] |
RAVI S, RAGHUNATHAN A, CHAKRADHAR S.Tamper resistance mechanisms for secure embeddedsystems [C]//Proceedings of the 17th InternationalConference on VLSI Design. [s.l.]: IEEE, 2004: 605-611.
|
[5] |
KERRY C F, GALLAGHER P D. Digital signaturestandard (DSS): FIPS 186-4 [S]. Gaithersburg, USA:The Federal Information Processing Standards Publication,2013.
|
[6] |
GOLDWASSER S, MICALI S, RIVEST R L. A digitalsignature scheme secure against adaptive chosenmessageattacks [J]. SIAM Journal on Computing,1988, 17(2): 281-308.
|
[7] |
BOLDYREVA A, GOYAL V, KUMAR V.Identity-based encryption with efficient revocation[C]//Proceedings of the 14th ACM Conference onComputer and Communications Security. [s.l.]: ACM,2008: 417-426.
|
[8] |
WASEF A, SHEN X. EDR: Efficient decentralized revocationprotocol for vehicular ad hoc networks [J].IEEE Transactions on Vehicular Technology, 2009,58(9): 5214-5224.
|
[9] |
D¨OTZER F. Privacy issues in vehicular ad hoc networks[C]//International Workshop on Privacy EnhancingTechnologies. Berlln Heldelberg, Germany:Spnnger-Verlag, 2005: 197-209.
|
[10] |
RAYA M, HUBAUX J P. Securing vehicular ad hocnetworks [J]. Journal of Computer Security, 2007,15(1): 39-68.
|
[11] |
FERGUSON N, SCHNEIER B, KOHNO T. Cryprographyengineering: Design principles and practical applications[M]. New York, USA: John Wiley & Sons,2011.
|
[12] |
ZHU H J, LU R X, SHEN X M, et al. Security inservice-oriented vehicular networks [J]. IEEE WirelessCommunications, 2009, 16(4): 16-22.
|
[13] |
LIU Y L, WANG L M, CHEN H H. Message authenticationusing proxy vehicles in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technolology,2015, 64(8): 3697-3710.
|
[14] |
SHAMIR A. Identity-based cryptosystems and signatureschemes [C]//Advances in Cryptology, LNCS 196.Berlln Heldelberg, Germany: Spnnger-Verlag, 1985:47-53.
|
[15] |
KATZ J. Digital signatures [M]. New York, USA:Springer Science & Business Media, 2010.
|
[16] |
CHUANG M C, LEE J F. TEAM: Trust-extended authenticationmechanism for vehicular ad hoc networks[J]. IEEE Systems Journal, 2014, 8(3): 749-758.
|
[17] |
LIN X D, LI X. Achieving efficient cooperative messageauthentication in vehicular ad hoc networks [J]. IEEETransactions on Vehicular Technology, 2013, 62(7):3339-3348.
|
[18] |
ZHU X Y, JIANG S R, WANG L M, et al. Efficientprivacy-preserving authentication for vehicular ad hocnetworks [J]. IEEE Transactions on Vehicular Technology,2014, 63(2): 907-919.
|
[19] |
SHIM K A. Reconstruction of a secure authenticationscheme for vehicular ad hoc networks using a binaryauthentication tree [J]. IEEE Transactions on WirelessCommunications, 2013, 12(11): 5386-5393.
|
[20] |
HE D B, ZEADALLY S, XU B W, et al. An efficientidentity-based conditional privacy-preserving authenticationscheme for vehicular ad hoc networks [J]. IEEETransactions on Information Forensics and Security,2015, 10(12): 2681-2691.
|
[21] |
LO N W, TSAI J L. An efficient conditional privacypreservingauthentication scheme for vehicular sensornetworks without pairings [J]. IEEE Transactions onIntelligent Transportation Systems, 2016, 17(5): 1319-1328.
|
[22] |
MISHRA A. Security and quality of service in adhoc wireless networks [M]. Cambridge, UK: CambridgeUniversity Press, 2008.
|
[23] |
CHAUM D L. Untraceable electronic mail, return addresses,and digital pseudonyms [J]. Communicationsof the ACM, 1981, 24(5): 84-90.
|
[24] |
Intelligent Transportation Systems Committee. IEEEtrial-use standard for wireless access in vehicular environments:Security services for applications and managementmessages: IEEE Std 1609.2 [S]. New York,USA: IEEE Vehicular Technology Society, 2006.
|
[25] |
HOFFSTEIN J, PIPHER J C, SILVERMAN J H. Anintroduction to mathematical cryptography [M]. NewYork, USA: Springer Science & Business Media, 2008.
|