References
- Xu, Q., Mak, T., Ko, J. and Sengupta, R. (2004). ‘Vehicle-to-vehicle safety messaging in DSRC’. In: Proceedings of 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET04), Philadelphia, PA, USA, pp. 19–28.
- Yang, L. and Guo, J. (2008). ‘ Increasing broadcast reliability by coded cooperative repetition in VANETs ‘. In: Proceedings of First International Conference on Wireless Access in Vehicular Environments, Dearborn, Michigan, USA, pp. 1–5.
- Wu, Y., Yang, L., Wu, G. and Guo, J. (2009). ‘An improved coded repetition scheme for safety messaging in VANETs’. In: Proceedings of 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom ’09), Beijing, China, pp. 1–4.
- Farnoud, F. and Valaee, S. (2008). ‘Repetition-based broadcast in vehicular ad hoc networks in Rician channel with capture’. In: Proceedings of IEEE INFOCOM Workshops, Phoenix, AZ, USA, pp. 1–6.
- Yang, L., Guo, J. and Wu, Y. (2009). ‘Piggyback cooperative repetition for reliable broadcasting of safety messages in VANETs’. In: Proceedings of 2009 6th IEEE Consumer Communications and Networking Conference (CCNC ’09), Las Vegas, NV, USA, pp. 1–5.
- Honarvar, A. and Valaee, S. (2010). ‘Selection of repetition codes for MAC in vehicular ad hoc networks’. In: Proceedings of 2010 IEEE Wireless Communication and Networking Conference, Sydney, Australia, pp. 1–6.
- Farnoud, H.F. and Valaee, S. (2009). ‘Reliable broadcast of safety messages in vehicular ad hoc networks’. In: Proceedings of IEEE INFOCOM 2009, Rio de Janeiro, Brazil, pp. 226–234.
- Dang, D.N.M., Nguyen, V., Chuan, P., Oo, T.Z. and Hong, C.S. (2014). ‘A reliable multi-hop safety message broadcast in vehicular ad hoc networks’. In: Proceedings of 2014 16th Asia-Pacific Conference on Network Operations and Management Symposium (APNOMS), Hsinchu, Taiwan, pp. 1–6.
- Singh, A., Mishra, R. and Kumar, R. (2016). ‘VANET security: issues, challenges and solutions’. International Conference on Electrical, Electronics, and Optimization Techniques, pp. 1050–1055.
- Ribagorda, A., de Fuentes, J.M. and GonzalezTablas, A.I. (2010). ‘Overview of security issues in vehicular ad hoc networks’. In: Handbook of Research on Mobility and Computing, IGI Global.
- Horng, S., Tzeng, S., Li, T., Wang, X., Huang, P. and Khan, M. (2015). ‘Enhancing security and privacy for identity-based batch verification scheme in VANET’. IEEE Transactions on Vehicular Technology, 66(4), pp. 3235–3248.
- Xiao, B., Yu, B. and Gao, C. (2006). ‘Detection and localization of Sybil nodes in VANETs’. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless ad Hoc Networks and Sensor Networks, pp. 1–8.
- Tong, Z., Choudhury, R.R., Peng, N. and Chakrabarty, K. (2011). ‘P2DAP: Sybil attacks detection in vehicular ad hoc networks’. IEEE Journal on Selected Areas in Communications, 22(3), pp. 582–594.
- Zhou, T., Choudhury, R.R., Ning, P. and Chakrabarty, K. (2009). ‘Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks’. Mobiquitous, Aug. 2009.
- Jyoti, G., Manoj, S.G. and Vijay, L. (2010). ‘A novel defense mechanism against Sybil attacks in VANET’. In: Proceedings of the 3rd International Conference on Security of Information and Networks (SIN ‘10), ACM, New York, NY, USA, pp. 249–255.
- Yong, H., Yu, C., Chi, Z. and Wei, S. (2011). ‘A distributed key management framework with cooperative message authentication in VANETs’. IEEE Journal on Selected Areas in Communications, 29(3), pp. 616–629.
- Park, S., Aslam, B., Turgut, D. and Zou, C.C. (2009). ‘Defense against Sybil attack in vehicular ad-hoc network - based on roadside units support’. In: Proceedings of the IEEE Military Communications Conference (MILCOM’09), Boston, MA, USA, pp. 1–5.
- Neng, W.W., Wueh, M.H. and We, M.C. (2008). ‘A novel secure communication scheme in vehicular ad hoc networks’. Computer Communications Archive, 31(12), pp. 2827–2837.
- Ameneh, D. and Ghaffar, P.R.A. (2019). ‘Detection of malicious vehicles (DMV) through monitoring in vehicular ad hoc networks’. Springer Multimedia Tools and Applications.
- Wenjia, L. and Anupam, J. (2009). ‘Outlier detection in ad hoc networks using Dempster-Shafer theory’. In: 10th International Conference on Mobile Data Management, pp. 112–121.
- Guo, J., Baugh, J.P. and Wang, S. (2007). ‘A group signature based secure and privacy-preserving vehicular communication framework’. In: Proceedings of the Mobile Networking for Vehicular Environments (MOVE) workshop in conjunction with IEEE INFOCOM, Anchorage, Alaska.
- Hawi, F.A., Yeun, C.Y. and Qutayti, M.A. (2009). The 4th International Conference on Information Technology (ICIT), pp. 3–5.
- Ghosh, M., Varghese, A., Kherani, A. and Gupta, A. (2009). ‘Distributed misbehavior detection in VANETs’. In: Proceedings of WCNC 2009, IEEE Wireless Communication and Networking Conference, Budapest, Hungary, IEEE Press.
- Roselin Mary, S., Maheshwari, M. and Thamaraiselvan, M. (2013). ‘Early detection of DoS attacks in VANET using attacked packet detection algorithm (APDA)’. In: Proceedings of IEEE International Conference on Information Communication and Embedded Systems, pp. 21–22.
- Singh, A. and Sharma, P. (2015). ‘A novel mechanism for detecting DoS attack in VANET using enhanced attacked packet detection algorithm (EAPDA)’. In: Proceedings of IEEE 2nd International Conference on Recent Advances in Engineering & Computational Sciences, pp. 21–22.
- Quyoom, A. and Sharma, H. (2015). ‘A novel mechanism of detection of denial of service attack (DoS) in VANET using malicious and irrelevant packet detection algorithm (MIPDA)’. In: Proceedings of IEEE International Conference on Computing, Communication & Automation, pp. 15–16.
- Kamboj, S. and Singh, K. (2018). ‘Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in VANETs’. In: Proceedings of IEEE 4th International Conference on Computing Sciences, pp. 30–31.
- Nidhal, M. and Ben-Othman, J. (2016). ‘GDVAN: a new greedy behavior attack detection algorithm for VANETs’. IEEE Transactions on Mobile Computing, 15(6), pp. 759–771.
- Pooja, B., Pai, M.M., Pai, R.M., Ajam, N. and Mouzna, J. (2014). ‘Mitigation of insider and outsider DoS attack against signature based authentication in VANETs’. In: Proceedings of IEEE Asia-Pacific Conference on Computer Aided System Engineering, pp. 10–12.
- Verma, K. and Hasbullah, H. (2014). ‘IP-CHOCK (filter)-based detection scheme for denial of service (DoS) attacks in VANET’. In: Proceedings of IEEE International Conference on Computer and Information Sciences, pp. 3–5.
- Guleria, C. and Verma, H.K. (2019). ‘Improved detection and mitigation of DDoS attack in vehicular ad hoc network’. In: Proceedings of IEEE 4th International Conference on Computing Communication and Automation, pp. 1–6.
- Hong, X., Huang, D., Gerla, M. and Cao, Z. (2008). ‘SAT: situation-aware trust architecture for vehicular networks’. In: Proceedings of the 3rd International Workshop on Mobility in the Evolving Internet Architecture, pp. 31–36.
- Hortelano, J., Ruiz, J.C. and Manzoni, P. (2010). ‘Evaluating the usefulness of watchdogs for intrusion detection in VANETs’. In: Communications Workshops (ICC), IEEE International Conference on, pp. 1–5.
- Biswas, S., Misic, J. and Misic, V. (2011). ‘ID-based safety message authentication for security and trust in vehicular networks’. In: Distributed Computing Systems Workshops (ICDCSW), 31st International Conference on, pp. 323–331.
- Wei, Y.C. and Chen, Y.M. (2012). ‘An efficient trust management system for balancing the safety and location privacy in VANETs’. In: Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 11th International Conference on, pp. 393–400.
- Wang, Z. and Chigan, C. (2007). ‘Countermeasure uncooperative behaviors with dynamic trust-token in VANETs’. In: Communications (ICC’07), IEEE International Conference on, pp. 3959–3964.
- Gómez Mármol, F. and Martínez Pérez, G. (2012). ‘TRIP: a trust and reputation infrastructure-based proposal for vehicular ad hoc networks’. Journal of Network and Computer Applications, 35(3), pp. 934–941.
- Gazdar, T., Benslimane, A. and Belghith, A. (2011). ‘Secure clustering scheme based keys management in VANETs’. In: Vehicular Technology Conference (VTC Spring), IEEE 73rd, pp. 1–5.
- Ding, Q., Li, X., Jiang, M. and Zhou, X.H. (2010). ‘Reputation-based trust model in vehicular ad hoc networks’. In: Wireless Communications and Signal Processing (WCSP), International Conference on, pp. 1–6.
- Wang, J., Liu, Y., Liu, X. and Zhang, J. (2009). ‘A trust propagation scheme in VANETs’. In: Intelligent Vehicles Symposium, IEEE, pp. 1067–1071.
- Gazdar, T., Benslimane, A., Rachedi, A. and Belghith, A. (2012). ‘A trust-based architecture for managing certificates in vehicular ad hoc networks’. In: Communications and Information Technology (ICCIT), International Conference on, pp. 180–185.
- Serna, J., Luna, J. and Medina, M. (2008). ‘Geolocation-based trust for VANET’s privacy’. In: Information Assurance and Security (ISIAS’08), Fourth International Conference on, pp. 287–290.
- Chen, Y.M. and Wei, Y.C. (2013). ‘A beacon-based trust management system for enhancing user centric location privacy in VANETs’. Journal of Communications and Networks, 15(2), pp. 153–163.
- Chen, C., Zhang, J., Cohen, R. and Ho, P.H. (2010). ‘Secure and efficient trust opinion aggregation for vehicular ad-hoc networks’. In: Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd, pp. 1–5.
- Sahoo, R.R., Panda, R., Behera, D.K. and Naskar, M.K. (2012). ‘A trust based clustering with ant colony routing in VANET’. In: Computing Communication & Networking Technologies (ICCCNT) Third International Conference on, pp. 1–8.
- Pooja, B., Pai, M.M., Pai, R.M., Ajam, N. and Mouzna, J. (2014). ‘Mitigation of insider and outsider DoS attack against signature based authentication in VANETs’. In: 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE), pp. 152–157.
- Kumar, P.V. and Maheshwari, M. (2014). ‘Prevention of Sybil attack and priority batch verification in VANETs’. In: International Conference on Information Communication and Embedded Systems (ICICES 2014), pp. 1–5.
- Ltifi, A., Zouinkhi, A. and Bouhlel, M.S. (2015). ‘Trust-based scheme for alert spreading in VANET’. Procedia Computer Science, 73, pp. 282–288.
- Li, W. and Song, H. (2016). ‘ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks’. IEEE Transactions on Intelligent Transportation Systems, 17(4), pp. 960–969.
- Kerrache, C.A., Lagraa, N., Calafate, C.T. and Lakas, A. (2016). ‘TFDD: a trust-based framework for reliable data delivery and DoS defense in VANETs’. Vehicular Communications, 9, pp. 254–267.
- Khan, F.A., Imran, M., Abbas, H. and Durad, M.H. (2017). ‘A detection and prevention system against collaborative attacks in mobile ad hoc networks’. Future Generation Computer Systems, 68, pp. 416–427.