Bibliography on Secure Vehicular Communications    

 

Maintained by

Xiaodong Lin and Rongxing Lu and Chengzhe Lai

Supported by

Professor Xuemin (Sherman) Shen

Broadband Communications Research (BBCR) Group

Department of Electrical and Computer Engineering

University of Waterloo, Waterloo, Ontario, Canada


The advancement and wide deployment of wireless communication technologies have revolutionized human's lifestyles by providing the best convenience and flexibility ever in accessing the Internet services and various types of personal communication applications. Recently, car manufacturers and telecommunication industries gear up to equip each car with the technology that allows the drivers and passengers to communicate with each other as well as with the roadside infrastructure, which is located in some critical sections of the road, such as at every traffic light or any intersection or any stop sign, in order to improve driving experience, facilitate secure traffic management, and enhance driving safety. In spite of the numerous value-added application scenarios, the Vehicular Ad Hoc Networks (VANETs) come with their own a set of challenges, especially in the aspects of security.
   It would be useful to create an up-to-date bibliography on secure vehicular communications and make it available on the Internet. So we try our best to maintain a complete list of all secure vehicular ad hoc networks.
   In general, we are including literatures in English, which are published in conference proceedings, journals, and some unpublished technical reports or dissertations. We would appreciate knowing of any errors in this list, as well as any literatures that should be added. Please e-mail to us.
  Acknowledgements: Many thanks to Prof. Pin-Han Ho, Chenxi Zhang, Xiaoting Sun, Haojin Zhu, Minghui Shi, Yanfei Fan, Xiaohui Liang, Yipin Sun, Shuang Yuan, Baber Aslam, Daniel Wong, and Jose Maria de Fuentes for their valuable contributions to this site.
UW Secure Vehicular Communications Group

WWW BBCR    


  Call for Papers
  • SpringerBriefs: For topics in Wireless Communications, including Vehicular ad hoc networks and others, EMAIL Your PROPOSAL to Professor Xuemin (Sherman) Shen []
  • IEEE Communications Magazine, Automotive Networking Series [HTML]
  • Future Internet, Special Issue "Vehicular Communications and Networking", [HTML] [Manuscript Due, 15 November 2012]
  • IEEE Journal on Selected Areas in Communications, Special Issue on Emerging Technologies in Communications (2012): Vehicular Networks and Telematics Applications , [HTML] [Manuscript Due, March 1, 2012]
  • Journal of Network and Computer Applications, Special Issue on "Vehicular Communications and Applications", [HTML][Manuscript Due, July 15, 2011]
  • IEEE Journal on Selected Areas in Communications, Special Issue on Communications Challenges and Dynamics for Unmanned Autonomous Vehicles, [HTML] [Manuscript Due, July 1, 2011]
  • EURASIP Journal on Wireless Communications and Networking, Special Issue on Recent Advances in Vehicular Networks, [HTML] [Manuscript Due, June 1, 2011]
  • Wiley's Security and Communication Networks Journal, Special Issue on Security in Cooperative Vehicular Networks, [HTML] [Manuscript Due, May 15, 2011]
  • IEEE Journal on Selected Areas in Communications, Special Issue on Broadband Wireless Communications for High Speed Vehicles, [HTML] [Manuscript Due, May 1, 2011]
  • IEEE Transactions on Vehicular Technology, Special Section: Telematics Advances for Vehicular Communication Networks, [HTML] [Manuscript Due, January 31, 2011]
  • Computer Networks, Special Issue on Deploying Vehicle-2-X Communication, [HTML] [Manuscript Due, September 30, 2010]
  • International Journal of Vehicular Technology, Special Issue on Vehicular Ad Hoc Networks, [HTML][Manuscript Due, August 15, 2010]
  • Journal of Communications, Special Issue on Road and Vehicular Communications and Applications, [HTML][Manuscript Due, March. 15, 2010]
  • Journal of Electrical and Computer Engineering, Special Issue on Advances in Vehicular Communications and Applications, [HTML][Manuscript Due, Feburary 1, 2010]
  • Telecommunication Systems, Special Issue on Vehicular Communications, Networks, and Applications [HTML][Manuscript Due, January 31st, 2010]
  • IEEE Journal on Selected Areas in Communications Vehicular Communications and Networks [HTML][Manuscript Due, January 5, 2010]
  • IEEE Transactions on Intelligent Transportation Systems: Special Issue on Exploiting Wireless Communication Technologies in Vehicular Transportation Networks [HTML][Manuscript Due, July 31, 2009]
  • EURASIP Journal on Advances in Signal Processing, Special Issue on Vehicular Ad Hoc Networks [HTML][Manuscript Due, Nov. 1, 2009]
  • IEEE Network Special Issue on Advances in Vehicular Communications Networks [HTML][Manuscript Due, July 15, 2009]
  • IET Communications, Special Issue on Vehicular Ad Hoc and Sensor Networks, [HTML][Manuscript Due, February 1, 2009]
  • Journal of Communications, Special Issue on Challenges in Future Vehicular Ad Hoc Networks, [HTML][Manuscript Due, Nov. 15, 2008]
  • International Journal of Autonomous and Adaptive Communications Systems, Special Issue on Security, Trust, and Privacy in DTN and Vehicular Communications, [HTML][Manuscript Due, Jun. 1, 2008]
  • Inderscience International Journal of Vehicle Information and Communication Systems (IJVICS), Special Issue on Information and Communication Technologies in Vehicle Navigation, [HTML][Manuscript Due, Jan. 31, 2008]
  • Wiley's Security and Communication Networks Journal, Special Issue on Security and Privacy Preservation in Vehicular Communications, [HTML] [PDF][Manuscript Due, Jan. 20, 2008]
  • Computer Communications, Special Issue on Mobility Protocols for ITS/VANET, [HTML][Manuscript Due, July. 1, 2007]
  • IEEE Transactions on Vehicular Technology, Special Section on Vehicular Communication Networks,[ARTILE] [HTML]
  • IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications [PDF][Manuscript Due, February 15, 2006]


  Recent Workshops/Conferences with Themes on Secure Vehicluar Communications
  • ACM VANET, ACM international workshop on Vehicular ad hoc networks (VehiculAr Inter-NETworking) [2004][2005][2006][2007] [2008] [2009][2010] [2011] [2012]
  • ESCAR (Embedded Security in Cars) [ESCAR]
  • IEEE MoVeNET, IEEE International Workshop on Mobile Vehicular Networks [2007] [2008]
  • IEEE WiVeC, IEEE International Symposium on Wireless Vehicular Communications [2007][2008][2010][2011]
  • IEEE VTC, IEEE Vehicular Technology Conference [VTC]
  • Intelligent Vehicle Safety Detroit 2007. [2007]
  • IEEE VNC, IEEE Vehicular Networking Conference (the merger of IEEE V2VCOM and IEEE AutoNet Workshops). [2009] [2010] [2011]
  • IEEE AutoNet, IEEE Workshop on Automotive Networking and Applications. [2006] [2007] [2008]
  • IEEE Vehi-Mobi, IEEE Vehicular Networks & Applications Workshop. [2008] [2009] [2010]
  • ISVCS International Symposium on Vehicular Computing Systems. [2008]
  • The International Conference Access in Vehicular Environments (WAVE). [2008] [2009]
  • IEEE LCN ON-MOVE, IEEE Workshop On User MObility and VEhicular Networks. [2007] [2008] [2009] [2010]
  • IEEE InVeNET, IEEE Workshop on Intelligent Vehicular Networks. [2009] [2010]
  • IEEE VON, IEEE International Workshop on Vehicular Networking. [2008] [2009]
  • IEEE ICC, IEEE International Conference on Communications. [ICC]
  • IEEE GLOBECOM, IEEE Global Communications Conference. [GLOBECOM]
  • IEEE WCNC, IEEE Wireless Communications and Networking Conference. [WCNC]
  • IEEE INFOCOM, IEEE Conference on Computer Communications. [INFOCOM]
  • IEEE SECON, IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. [SECON]


  IEEE WAVE Standards and Other Resources
  • IEEE 1609 WAVE Standards [Link]
  • IEEE 1609 Standards Working Group Archive [Link]
  • Secure Automotive Networking for ITS [Link]
  • vanet.info [Link]


  Bibliography on Secure Vehicular Communications

  • [CVT13] B.K. Chaurasia1, S. Verma, G.S. Tomar,Intersection Attack on Anonymity in VANET, Transactions on Computational Science XVII, Lecture Notes in Computer Science, Volume 7420, 2013, pp 133-149.
  • [DCC13] S. DasGupta, R. Chaki, S. Choudhury, TruVAL: Trusted Vehicle Authentication Logic for VANET, Advances in Computing, Communication, and Control, Communications in Computer and Information Science, Volume 361, 2013, pp 309-322.
  • [DGBG13] de Fuentes, J.M.; González-Tablas, A.I.; Blasco, J.; González-Manzano, L. Protocol for behavior-describing evidence generation and verification in vehicular environments, Journal of Systems Architecture, exp. Q2-2013.
  • [GGL13] J. Grover, M.S. Gaur, V. Laxmi, Trust Establishment Techniques in VANET, Wireless Networks and Security, Signals and Communication Technology, 2013, pp 273-301.
  • [LL13] Cheng-Chi Lee, Yan-Ming Lai, Toward a secure batch verification with group testing for VANET, Wireless Networks, Springer US, 2013.
  • [LNZG13] Liu, H., Ning, H., Zhang, Y., Guizani, M., Battery Status-aware Authentication Scheme for V2G Networks in Smart Grid," Smart Grid, IEEE Transactions on , to appear.
  • [MA13] Mershad, K., Artail, H., A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks, Vehicular Technology, IEEE Transactions on , vol.62, no.2, pp.536-551, Feb. 2013.
  • [PL13] Yuanyuan Pan, Jianqing Li, Cooperative pseudonym change scheme based on the number of neighbors in VANETs, Journal of Network and Computer Applications, to appear.
  • [PLFX13] Y.Y. Pan, J.Q. Li, L. Feng, B. Xu, An analytical model for random pseudonym change scheme in VANETs, Cluster Computing, Springer US, 2013.
  • [RAC13] M.A. Razzaque, Ahmad Salehi S., Seyed M. Cheraghi, Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead,Signals and Communication Technology, 2013, pp 107-132.
  • [VS13] C.S. Vorugunti, M. Sarvabhatla, POSTER: A Secure and Efficient Cross Authentication Protocol in VANET Hierarchical Model, Distributed Computing and Networking, Lecture Notes in Computer Science, Volume 7730, 2013, pp 461-462.
  • [WS13] Wasef, A., Xuemin Shen, EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks, Mobile Computing, IEEE Transactions on, vol.12, no.1, pp.78-89, Jan. 2013.
  • [XZCL13] Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li, Efficient communication scheme with confidentiality and privacy for vehicular networks, Computers & Electrical Engineering,to appear.
  • [YHL13] Ching-Hung Yeh, Meng-Yen Hsieh, Kuan-Ching Li, A Certificate Enhanced Group Key Framework for Vehicular Ad Hoc Networks, CUTE 2012, Lecture Notes in Electrical Engineering, Volume 214, 2013, pp 215-222.
  • [YXX13] Bo Yu, Cheng-Zhong Xu, Bin Xiao, Detecting Sybil attacks in VANETs, Journal of Parallel and Distributed Computing,to appear.
  • [YYCT13] Lo-Yao Yeh, Chun-Chuan Yang, Jee-Gong Chang, Yi-Lang Tsai, A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs, Journal of Network and Computer Applications, Volume 36, Issue 1, January 2013, Pages 284-292.

  • [AB12] Abumansoor, O.; Boukerche, A., A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET, Vehicular Technology, IEEE Transactions on, Volume: 61, ,Issue: 1 , 2012 , Page(s): 275 - 285.
  • [CLCC12] Bo-Chao Cheng, Guo-Tan Liao, Chun-Yu Chen, Huan Chen, A Multi-level Fuzzy Comprehensive Evaluation Approach for Message Verification in VANETs, Mobile, Ubiquitous, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference on , vol., no., pp.176-181, 26-28 June 2012.
  • [CJOJJJ12] Carlos Gaan, Jose L. Muoz, Oscar Esparza, Jorge Mata-Diaz, Juan Hernandez-Serrano, Juanjo Alins, COACH: COllaborative certificate stAtus CHecking mechanism for VANETs, Journal of Network and Computer Applications, to appear.
  • [CQZZS12] Chang, S.; Qi, Y.; Zhu, H.; Zhao, J.; Shen, X., Footprint: Detecting Sybil Attacks in Urban Vehicular Networks, Parallel and Distributed Systems, IEEE Transactions on, to appear.
  • [CYHL12] Chim, T., Yiu, S., Hui, L., Li, V. , VSPN: VANET-based Secure and Privacy-preserving Navigation, Computers, IEEE Transactions on , to appear.
  • [CYHL12] T.W. Chim, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li, MLAS: Multiple level authentication scheme for VANETs, Ad Hoc Networks, Volume 10, Issue 7, September 2012, Pages 1445-1456.
  • [DGLR] de Fuentes, J.M.; González-Tablas, A.I.; López Hernández-Ardieta, J.; Ribagorda, A. Towards an automatic enforcement for speeding: enhanced model and ITS realization. IET Intelligent Transport System, 6 (3), pp. 270-281, 2012.
  • [DM12] David Antolino Rivas, Manel Guerrero-Zapata, Chains of Trust in vehicular networks: A secure Points of Interest dissemination strategy, Ad Hoc Networks, Volume 10, Issue 6, August 2012, Pages 1115-1133.
  • [DMB12] Dahiya, A.; Madhu, M.; Bansal, N, Path Discovery in Vehicular Ad Hoc Networks, Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, 2012 , Page(s): 551 - 555.
  • [DSKC12] Dikmak, M., Sabra, Z., Kayssi, A., Chehab, A., Optimized conditional privacy preservation in VANETs, Telecommunications (ICT), 2012 19th International Conference on , pp.1-6, 23-25 April 2012.
  • [FG12] Felix Gomez Marmol, Gregorio Martinez Perez, TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, Journal of Network and Computer Applications, Volume 35, Issue 3, May 2012, Pages 934-941.
  • [FGAB12] Felguera-Martin, D.; Gonzalez-Partida, J.-T.; Almorox-Gonzalez, P.; Burgos-Garcia, M., Vehicular Traffic Surveillance and Road Lane Detection Using Radar Interferometry, Vehicular Technology, IEEE Transactions on, Volume: 61, Issue: 3, 2012, Page(s): 959 - 970.
  • [FPK12] Feiri, M., Petit, J., Kargl, F., Evaluation of congestion-based certificate omission in VANETs, Vehicular Networking Conference (VNC), 2012 IEEE , vol., no., pp.101-108, 14-16 Nov. 2012.
  • [GBRB12] Gazdar, T., Benslimane, A., Rachedi, A., Belghith, A., A trust-based architecture for managing certificates in vehicular ad hoc networks, Communications and Information Technology (ICCIT), 2012 International Conference on , vol., no., pp.180-185, 26-28 June 2012.
  • [GMEJJJ12] Carlos Ganan, Jose L. Munoz, Oscar Esparza, Jorge Mata-Díaz, Juan Hernández-Serrano, Juanjo Alins, COACH: COllaborative certificate stAtus CHecking mechanism for VANETs, Journal of Network and Computer Applications, to appear.
  • [GS12] Gowtham, G., Samlinson, E., A secured trust creation in VANET environment using random password generator, Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on , vol., no., pp.781-784, 21-22 March 2012.
  • [HCYHL12] Changhui Hu, Tat Wing Chim, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li, Efficient HMAC-based Secure Communication for VANETs, Computer Networks, to appear.
  • [HHLZ12] Jie Hou, Lei Han, Jiqiang Liu, Jia Zhao, Secure and efficient protocol for position-based routing in VANETs, Intelligent Control, Automatic Detection and High-End Equipment (ICADE), 2012 IEEE International Conference on , vol., no., pp.142-148, 27-29 July 2012.
  • [HZ12] Li He, Wen Tao Zhu, Mitigating DoS attacks against signature-based authentication in VANETs, Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on , vol.3, no., pp.261-265, 25-27 May 2012.
  • [JLTLY12] Zhongtian Jia, Xiaodong Lin, Seng-Hua Tan, Lixiang Li, Yixian Yang, Public key distribution scheme for delay tolerant networks based on two-channel cryptography,
    Journal of Network and Computer Applications, Volume 35, Issue 3, May 2012, Pages 905-913.
  • [KD12] Karnik, A.; Dayama, P., Optimal control of information epidemics, Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on, 2012 , Page(s): 1 - 7.
  • [LCE12] Jong-Hyouk Lee, Jiefeng (Terence) Chen, Thierry Ernst, Securing mobile network prefix provisioning for NEMO based vehicular networks, Mathematical and Computer Modelling, Volume 55, Issues 1-2, January 2012, Pages 170-187.
  • [LLG12] Huang Lu; Jie Li; Guizani, M., A novel ID-based authentication framework with adaptive privacy preservation for VANETs, Computing, Communications and Applications Conference (ComComAp), 2012, Page(s): 345 - 350.
  • [LLLS12] Rongxing Lu; Xiaodong Lin; Xiaohui Liang; Xuemin Shen, A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs, Intelligent Transportation Systems, IEEE Transactions on, Volume: 13 , Issue: 1, 2012 , Page(s): 127 - 139.
  • [LLLLS12] Rongxing Lu; Xiaodong Lin; Luan, T.H.; Xiaohui Liang; Xuemin Shen, Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs, Vehicular Technology, IEEE Transactions on, Volume: 61 , Issue: 1, 2012 , Page(s): 86 - 96.
  • [LMMNZ12] Qin Li, Malip, A., Martin, K.M., Siaw-Lynn Ng; Jie Zhang, A Reputation-Based Announcement Scheme for VANETs, Vehicular Technology, IEEE Transactions on, vol.61, no.9, pp.4095-4108, Nov. 2012.
  • [LNZY12] Hong Liu, Huansheng Ning, Yan Zhang, Yang, L.T., Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid, Smart Grid, IEEE Transactions on , vol.3, no.4, pp.1722-1733, Dec. 2012.
  • [LW12] Xiaojun Li, Liangmin Wang, A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on , vol., no., pp.890-895, 25-27 June 2012.
  • [LWSJ12] Wenmin Li, Qiaoyan Wen, Qi Su, Zhengping Jin, An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network, Computer Communications, Volume 35, Issue 2, 15 January 2012, Pages 188-195
  • [MJ12] Sagarika Mohanty and Debasish Jena, Secure Data Aggregation in Vehicular-Adhoc Networks: A Survey, Procedia Technology, Volume 6, 2012, Pages 922–929.
  • [MTCCM12]Francisco J. Martinez, Chai Keong Toh, Juan-Carlos Cano, Carlos T. Calafate, Pietro Manzoni, Determining the Representative Factors Affecting Warning Message Dissemination in VANETs, Wireless Personal Communications, November 2012, Volume 67, Issue 2, pp 295-314.
  • [MV12] Miloslavov, A.; Veeraraghavan, M., An integrated vehicular-wireless evaluation of WAVE/DSRC connected vehicle probe data service, Computing, Communications and Applications Conference (ComComAp), 2012, pp. 322 - 327.
  • [MZYT12] Xiaomin Ma; Jinsong Zhang; Xiaoyan Yin; Trivedi, K.S., Design and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Services, Vehicular Technology, IEEE Transactions on, Volume: 61 , Issue: 1 , 2012 , Page(s): 46 - 61.
  • [P1609.2-D12] IEEE Draft Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, IEEE P1609.2/D12, January 2012.
  • [P1609.2-D13] IEEE Draft Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, IEEE P1609.2/D13, March 2012.
  • [PB12] Joon-Sang Park and Seung Jun Beak, Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks, Peer-to-Peer Networking and Applications, Springer US, 2012.
  • [PFGA12] Esther Palomar, Jose M. de Fuentes, Ana I. Gonzalez-Tablas, Almudena Alcaide, Hindering false event dissemination in VANETs with proof-of-work mechanisms,
    Transportation Research Part C: Emerging Technologies, Volume 23, August 2012, Pages 85-97.
  • [RYD12] Richard R. Brooks, Seok Bae Yun, Juan Deng, Chapter 26 - Cyber-Physical Security of Automotive Information Technology, Handbook on Securing Cyber-Physical Critical Infrastructure, 2012, Pages 655-676
  • [SCBB12] Salvo, P.; Cuomo, F.; Baiocchi, A.; Bragagnini, A., Road Side Unit coverage extension for data dissemination in VANETs, Wireless On-demand Network Systems and Services (WONS), 2012 9th Annual Conference on, 2012 , Page(s): 47 - 50.
  • [SKME12]Daniel Da Silva, Tracy Ann Kosa, Steve Marsh, Khalil El-Khatib, Examining privacy in vehicular ad-hoc networks, DIVANet '12: Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications, ACM New York, NY, USA, 2012, Pages 105-110.
  • [T12] Huei-Ru Tseng, A secure and privacy-preserving communication protocol for V2G networks, Wireless Communications and Networking Conference (WCNC), 2012 IEEE, pp.2706-2711, 1-4 April 2012.
  • [T12] Tseng, Huei-Ru, On the security of a unique batch authentication protocol for vehicle-to-grid communications, ITS Telecommunications (ITST), 2012 12th International Conference on, pp.280-283, 5-8 Nov. 2012.
  • [TSF12] Tomandl, A.; Scheuer, F., Federrath, H., Simulation-based evaluation of techniques for privacy protection in VANETs, Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 IEEE 8th International Conference on , vol., no., pp.165-172, 8-10 Oct. 2012.
  • [WZ12] Huaqun Wang, Yuqing Zhang, On the Security of an Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in VANETs, Procedia Engineering, Volume 29, 2012, Pages 1735-1739.
  • [XCL12] Hu Xiong, Zhong Chen, Fagen Li, Efficient and multi-level privacy-preserving communication protocol for VANET, Computers & Electrical Engineering, Volume 38, Issue 3, May 2012, Pages 573-581,
  • [YMM12] Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah, Privacy preserving broadcast message authentication protocol for VANETs, Journal of Network and Computer Applications, to appear.
  • [YTHJS12] Yeh, L.Y.; Tsaur, W.J.; Huang, Y.L.; Joseph, A.; Shieh, S., A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks, Vehicular Technology, IEEE Transactions on, to appear.
  • [ZBR12] Zhenxia Zhang, Azzedine Boukerche, Hussam Ramadan, Design of a lightweight authentication scheme for IEEE 802.11p vehicular networks, Ad Hoc Networks, Volume 10, Issue 2, March 2012, Pages 243-252.
  • [ZZB12] Pengfei Zhang, Zhenxia Zhang, Boukerche, A., Cooperative location verification for vehicular ad-hoc networks, Communications (ICC), 2012 IEEE International Conference on , pp.37-41, 10-15 June 2012.

  • [AB11] Alpcan, T.; Buchegger, S.; Security Games for Vehicular Networks, IEEE Transactions on Mobile Computing, Volume: 10 , Issue: 2, 2011, Page(s): 280 - 290.
  • [AZ11] B. Aslam and C. C. Zou, "One-way-linkable Blind Signature Security Architecture for VANET", In IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, January 9 -12, 2011.
  • [CGKLH11] Wai Chen, Ratul K. Guha, Taek Jin Kwon, John Lee and Yuan-Ying Hsu, A survey and challenges in routing and data dissemination in vehicular ad hoc networks, WIRELESS COMMUNICATIONS AND MOBILE COMPUTINGm, Volume 11, Issue 5, May 2011.
  • [CHYL11] T. W. Chim, Lucas C. K. Hui, S. M. Yiu, and Victor O. K. Li. 2011. MLAS: multiple level authentication scheme for VANETs. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11). ACM, New York, NY, USA, 471-475.
  • [CJ11] Jaeduck Choi and Souhwan Jung, Unified security architecture and protocols using third party identity in V2V and V2I networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Volume 11, Issue 5, May 2011.
  • [CNS11] Arnaud Casteigts, Amiya Nayak and Ivan Stojmenovic, Communication protocols for vehicular ad hoc networks, WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, Volume 11, Issue 5, May 2011, Pages: 567–582.
  • [CNW11] Liqun Chen; Siaw-Lynn Ng; Guilin Wang; Threshold Anonymous Announcement in VANETs, IEEE Journal on Selected Areas in Communications, Volume: 29 , Issue: 3, 2011, Page(s): 605 - 615.
  • [CYHL11] T.W. Chim, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li, SPECS: Secure and privacy enhancing communications schemes for VANETs, Ad Hoc Networks, Volume 9, Issue 2, March 2011, Pages 189-203.
  • [D11] Dietzel, S.; Privacy implications of in-network aggregation mechanisms for VANETs, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services (WONS), 2011, Page(s): 91 - 95.
  • [DCA11] Brij Bihari Dubey, Naveen Chauhan, and Lalit Kumar Awasthi. 2011. NILDD: nearest intersection location dependent dissemination of traffic information in VANETs. In Proceedings of the 2011 International Conference on Communication, Computing; Security (ICCCS '11). ACM, New York, NY, USA, 96-99.
  • [DRK11] Ameneh Daeinabi, Akbar Ghaffar Pour Rahbar, Ahmad Khademzadeh, VWCA: An efficient clustering algorithm in vehicular ad hoc networks, Journal of Network and Computer Applications, Volume 34, Issue 1, January 2011, Pages 207-222.
  • [DWZCW11] Xiaolei Dong; Lifei Wei; Haojin Zhu; Zhenfu Cao; Licheng Wang, EP2DF: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks; IEEE Transactions on Vehicular Technology, Volume: 60 , Issue: 2, 2011, Page(s): 580 - 591.
  • [GASDB11] González-Tablas, A.I.; Alcaide, A.; Suárez-Tangil, G.; de Fuentes, J.M.; Barroso-Pérez, I. Towards a privacy-respectful telematic verification system for vehicle & driver authorizations”. International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2011) 2011.
  • [GWCM11] Huaqun Guo; Yongdong Wu; Hongmei Chen; Maode Ma; A Batch Authentication Protocol for V2G Communications, 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2011, Page(s): 1 - 5.
  • [HHL11] Haas, J.J.; Yih-Chun Hu; Laberteaux, K.P.; Efficient Certificate Revocation List Organization and Distribution, IEEE Journal on Selected Areas in Communications, Volume: 29 , Issue: 3, 2011 , Page(s): 595 - 604.
  • [HYC11] Jiun-Long Huang; Lo-Yao Yeh; Hung-Yu Chien; ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks, IEEE Transactions on Vehicular Technology, Volume: 60 , Issue: 1, 2011, Page(s): 248 - 262.
  • [HYZS11] Yong Hao; Yu Chengcheng; Chi Zhou; Wei Song; A Distributed Key Management Framework with Cooperative Message Authentication in VANETs, IEEE Journal on Selected Areas in Communications, Volume: 29 , Issue: 3, 2011 , Page(s): 616 - 629.
  • [HMXV11] D. Huang, S. Misra, G. Xue, and M. Verma, "PACP: An Efficient Pseudonymous Authentication Based Conditional Privacy Protocol for VANETs", Accepted by IEEE Transactions on Intelligent Transportations, 2011.
  • [JGGHD11] Jaehoon Jeong; Shuo Guo; Yu Gu; Tian He; Du, D.H.C.; Trajectory-Based Data Forwarding for Light-Traffic Vehicular Ad Hoc Networks, IEEE Transactions on Parallel and Distributed Systems, Volume: 22, Issue: 5, 2011 , Page(s): 743 - 757.
  • [LC11] Zhengming Li and Chunxiao Chigan, RAMV: ensuring resource-aware message verification in VANETs, SECURITY AND COMMUNICATION NETWORKS, Volume 4, Issue 5, May 2011.
  • [LC11b] X. Lin and H.-H. Chen. A Secure and Efficient RSU-aided Bundle Forwarding Protocol for Vehicular Delay Tolerant Networks. Wireless Communications and Mobile Computing (Wiley), Vol. 11, No. 2, 2011, pp. 187-195.
  • [LC11c] Zhengming Li, Chunxiao Chigan, LEAPER: A lightweight reliable and faithful data packet relaying framework for VANETs, Ad Hoc Networks, Volume 9, Issue 3, May 2011, Pages 418-429.
  • [LCE11] Jong-Hyouk Lee, Jiefeng (Terence) Chen, Thierry Ernst, Securing mobile network prefix provisioning for NEMO based vehicular networks, Mathematical and Computer Modelling, In Press, Corrected Proof, Available online 24 February 2011
  • [LLLS11] X. Lin, R. Lu, X. Liang and X. Shen, "STAP: A Social-Tier-Assisted Packet Forwarding Protocol for Achieving Receiver-Location Privacy Preservation in VANETs", Proc. IEEE INFOCOM'11, Shanghai, China, April 10-15, 2011.
  • [MDG] Munera, J.; de Fuentes, J.M.; González-Tablas, A.I. Towards a comparable evaluation of VANET protocols. NS-2 experiments builder assistant and extensible test bed. 9th Embedded Security in Cars Conference (ESCAR) 2011.
  • [MGPS11] Sudip Misra, Sumit Goswami, Gyan Prakash Pathak and Nirav Shah, Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks, WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, Volume 11, Issue 2, February 2011, Pages: 146–162.
  • [MKA11] Sudip Misra, P. Venkata Krishna and Kiran Isaac Abraham, A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks, SECURITY AND COMMUNICATION NETWORKS, Volume 4, Issue 5, May 2011.
  • [MNBJ11] Bharati Mishra, Priyadarshini Nayak, Subhashree Behera, and Debasish Jena. 2011. Security in vehicular adhoc networks: a survey. In Proceedings of the 2011 International Conference on Communication, Computing \&\#38; Security (ICCCS '11). ACM, New York, NY, USA, 590-595.
  • [MP11] Felix Gomez Marmol, Gregorio Martinez Perez, TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , Journal of Network and Computer Applications, In Press, Corrected Proof, Available online 25 March 2011
  • [MZTC11] Minhas, U.F.; Jie Zhang; Tran, T.; Cohen, R.; A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, Volume: 41 , Issue: 3, 2011 , Page(s): 407 - 420.
  • [NCCM11] Marga Nacher, Carlos T. Calafate, Juan-Carlos Cano and Pietro Manzoni, An overview of anonymous communications in mobile ad hoc networks, WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, Volume 11, Issue 5, May 2011.
  • [PAZ11] S. Park, B. Aslam and C. C. Zou, “Long-term Reputation System for Vehicular Networking based on Vehicle's Daily Commute Routine”, In IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, January 9 -12, 2011.
  • [PGSJ11] Min-Ho Park; Gi-Poong Gwon; Seung-Woo Seo; Han-You Jeong; RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications, IEEE Journal on Selected Areas in Communications, Volume: 29 , Issue: 3, 2011, Page(s): 644 - 658.
  • [RAF11] Marshall Riley, Kemal Akkaya and Kenny Fong, A survey of authentication schemes for vehicular ad hoc networks, SECURITY AND COMMUNICATION NETWORKS Volume 4, Issue 5, May 2011.
  • [RAF11b] Marshall Riley, Kemal Akkaya and Kenny Fong, Group-based hybrid authentication scheme for cooperative collision warnings in VANETs SECURITY AND COMMUNICATION NETWORKS, Volume 4, Issue 5, May 2011.
  • [RDZ11] Dandan Ren; Suguo Du; Haojin Zhu, A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs, Communications (ICC), 2011 IEEE International Conference on, 2011 , Page(s): 1 - 5.
  • [RFM11] Dario Rossi, Roberta Fracchia and Michela Meo, On the quality of broadcast services in vehicular ad hoc networks, SECURITY AND COMMUNICATION NETWORKS, Volume 4, Issue 3, March 2011, Pages: 329–346.
  • [SZZF11] Jinyuan Sun; Xiaoyan Zhu; Chi Zhang; Yuguang Fang; RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue, IEEE Journal on Selected Areas in Communications, Volume: 29 , Issue: 3, 2011, Page(s): 659 - 669.
  • [TCDS11] Carmela Troncoso, Enrique Costa-Montenegro, Claudia Diaz, Stefan Schiffner, On the difficulty of achieving anonymity for Vehicle-2-X communication, Computer Networks, In Press, Accepted Manuscript, Available online 13 May 2011.
  • [WTF11] Hesiri D. Weerasinghe, Raymond Tackett and Huirong Fu, Verifying position and velocity for vehicular ad-hoc networks, SECURITY AND COMMUNICATION NETWORKS, Volume 4, Issue 5, May 2011.
  • [XD11] Xiaoping Xue and Jia Ding, LPA: a new location-based privacy-preserving authentication protocol in VANET SECURITY AND COMMUNICATION NETWORKS, Volume 4, Issue 5, May 2011.
  • [YCH11] Lo-Yao Yeh; Yen-Cheng Chen; Jiun-Long Huang; ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, Volume: 29 , Issue: 3, 2011, Page(s): 630 - 643.
  • [YYRO11] Gongjun Yan; Weiming Yang; Rawat, D.B.; Olariu, S.; SmartParking: A Secure and Intelligent Parking System, IEEE Intelligent Transportation Systems Magazine, Volume: 3, Issue: 1, 2011, Page(s): 18 - 30.
  • [ZCNC11] Tong Zhou; Choudhury, R.R.; Peng Ning; Chakrabarty, K.; P2DAP -- Sybil Attacks Detection in Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, Volume: 29, Issue: 3, 2011, Page(s): 582 - 594.

  • [AAZ10] Moath Muayad Al-Doori, Ali Hilal Al-Bayatti, and Hussein Zedan. 2010. Context aware architecture for sending adaptive HELLO messages in VANET. In Proceedings of the 4th ACM International Workshop on Context-Awareness for Self-Managing Systems (CASEMANS '10). ACM, New York, NY, USA, , Article 10 , 4 pages.
  • [AFIKA10] H. Atiq, U. Farooq, R. Ibrahim, O. Khalid, and M. Amar, "Vehicle detection and shape recognition using optical sensors: A review," in Proc. 2nd International Conference on Machine Learning and Computing (ICMLC'10), 9-11 2010, pp. 223-227.
  • [APZT10] B. Aslam, S. Park, C. C. Zou, and D. Turgut. "Secure Traffic Data Propagation in Vehicular Ad hoc Networks", International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), 6(1), 24-39, 2010.
  • [ASL10] Belal Amro, Yucel Saygin, and Albert Levi. 2010. P2-CTM: privacy preserving collaborative traffic monitoring. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL '10). ACM, New York, NY, USA, 55-59.
  • [BVP10] J. Balasch, I. Verbauwhede, and B. Preneel, "An embedded platform for privacy-friendly road charging applications," in Proc. Design, Automation Test in Europe Conference Exhibition (DATE), 2010, 8-12 2010, pp. 867-872.
  • [CC10] Etienne S. Coronado and Soumaya Cherkaoui, Performance analysis of secure on-demand services for wireless vehicular networks, SECURITY AND COMMUNICATION NETWORKS, Volume 3, Issue 2-3, March - June 2010, Pages: 114–129.
  • [CCZXS10] Jiming Chen, Xianghui Cao, Yu Zhang, Weiqiang Xu and Youxian Sun, Measuring the performance of movement-assisted certificate revocation list distribution in VANET, WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, Volume 11, Issue 5, May 2011.
  • [CN10] L. Chen and S.-L. Ng, "Comments on 'proving reliability of anonymous information in vanets' by kounga," IEEE Transactions on Vehicular Technology, vol. 59, no. 3, pp. 1503-1505, march 2010.
  • [CRM10] Xianbo Chen, Hazem H. Refai and Xiaomin Ma, On the enhancements to IEEE 802.11 MAC and their suitability for safety-critical applications in VANET WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, Volume 10, Issue 9, September 2010, Pages: 1253–1269.
  • [CS10] L. Cheng and R. Shakya, "Vanet worm spreading from traffic modeling," in Proc. IEEE Radio and Wireless Symposium (RWS), 2010, 10-14 2010, pp. 669-672.
  • [DGR10] J. M. de Fuentes, A. I. Gonzalez-Tablas, and A. Ribagorda, "Overview of security issues in Vehicular ad-hoc networks", Handbook of Reseach on Mobility and Computing, IGI Global, 2010.
  • [DGR10b] J. M. de Fuentes, A. I. Gonzalez-Tablas, and A. Ribagorda, "Authentication and privacy in vehicular networks", Upgrade, The European Journal for the Informatics Professional, February 2010, vol. XI, no 1, pp. 72-78.
  • [DSKWK10] S. Dietzel, E. Schoch, B. Konings, M. Weber, and F. Kargl, "Resilient secure aggregation for vehicular networks", IEEE Network, Vol. 24, Issue 1, pp. 26-31, 2010.
  • [EBK10] Marc Emmelmann, Bernd Bochow, C. Christopher Kellum, Security and Privacy Mechanisms for Vehicular Networks, VEHICULAR NETWORKING: AUTOMOTIVE APPLICATIONS AND BEYOND, Pages: 105–127, 2010.
  • [FPT10] A. Festag, P. Papadimitratos, and T. Tielert, "Design and performance of secure geocast for vehicular communication," IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2456-2471, jun 2010.
  • [GGL10] Jyoti Grover, Manoj Singh Gaur, and Vijay Laxmi. 2010. A novel defense mechanism against sybil attacks in VANET. In Proceedings of the 3rd international conference on Security of information and networks (SIN '10). ACM, New York, NY, USA, 249-255.
  • [GVGKM10] Mainak Ghosh, Anitha Varghese, Arobinda Gupta, Arzad A. Kherani, Skanda N. Muthaiah, Detecting misbehaviors in VANET with integrated root-cause analysis, Ad Hoc Networks, Volume 8, Issue 7, September 2010, Pages 778-790.
  • [HDRZ10] Q. Han, S. Du, D. Ren and H. Zhu, SAS: A Secure Data Aggregation Scheme in Vehicular Sensing Networks, International Conference on Communications (IEEE ICC'10), Cape Town, South Africa, May 23-27, 2010.
  • [HH10] Jason J. Haas and Yih-Chun Hu. 2010. Communication requirements for crash avoidance. In Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking (VANET '10). ACM, New York, NY, USA, 1-10.
  • [HHL10] Jason J. Haas, Yih-Chun Hu and Kenneth P. Laberteaux, The impact of key assignment on VANET privacy, SECURITY AND COMMUNICATION NETWORKS, Volume 3, Issue 2-3, March - June 2010, Pages: 233–249.
  • [KCJ10] D. Kim, J. Choi, and S. Jung, "Mutual identification and key exchange scheme in secure vanets based on group signature," in Proc. 7th Consumer IEEE Communications and Networking Conference (CCNC'10), 9-12 2010, pp. 1-2.
  • [KHZ10] Z. Ke, L. Huang, and Y. Zheng, "Design and implementation of vehicle wireless data transmission based on mips-linux," in Proc. 2nd International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010, vol. 2, 24-25 2010, pp. 414-417.
  • [KR10] A. Kherani and A. Rao, "Performance of node-eviction schemes in vehicular networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 2, pp. 550-558, feb. 2010.
  • [KSDZPBBI10] Tiffany Hyun-Jin Kim, Ahren Studer, Rituik Dubey, Xin Zhang, Adrian Perrig, Fan Bai, Bhargav Bellur, and Aravind Iyer. 2010. VANET alert endorsement using multi-source filters. In Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking (VANET '10). ACM, New York, NY, USA, 51-60.
  • [LLS10] R. Lu, X. Lin, and X. Shen, "SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks", Proc. IEEE INFOCOM'10, San Diego, California, USA, March 14 - 19, 2010.
  • [LLLS10] R. Lu, X. Lin, X. Liang, and X. Shen, "Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET", Proc. IEEE Globecom'10, Miami, Florida, USA, December 6-10, 2010.
  • [LLLS10b] R. Lu, X. Lin, X. Liang, and X. Shen, "FLIP: An Efficient Privacy-preserving Protocol for Finding Like-minded Vehicles on the Road", Proc. IEEE Globecom'10, Miami, Florida, USA, December 6-10, 2010.
  • [LLLS10c] X. Liang, R. Lu, X. Lin, and X. Shen, "PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks", Proc. VTC2010-Fall, Ottawa, Canada, September 6-9, 2010.
  • [LLZS10] R. Lu, X. Lin, H. Zhu, and X. Shen, "An Intelligent Secure and Privacy-Preserving Parking Scheme through Vehicular Communications", IEEE Trans. on Vehicular Technology, Vol. 59, No. 6, pp. 2772-2785, 2010. .
  • [LLZSP10] R. Lu, X. Lin, H. Zhu, X. Shen, and B. R. Preiss, "Pi: A Practical Incentive Protocol for Delay Tolerant Networks", IEEE Transactions on Wireless Communications, Vol. 9, No. 4, pp. 1483-1493, 2010.
  • [LSKM10] Tim Leinmüller, Elmar Schoch, Frank Kargl and Christian Maihofer, Decentralized position verification in geographic ad hoc routing, SECURITY AND COMMUNICATION NETWORKS, Volume 3, Issue 4, July/August 2010, Pages: 289–302.
  • [MA10] K. Mershad and H. Artail, "Using rsus as delegates for pervasive access to services in vehicle ad hoc networks," in Proc. 17th IEEE International Conference on Telecommunications (ICT'10), 4-7 2010, pp. 790-797.
  • [MKW10] Zhendong Ma, Frank Kargl, Michael Weber, Measuring long-term location privacy in vehicular communication systems, Computer Communications, Volume 33, Issue 12, 15 July 2010, Pages 1414-1427.
  • [MT10] D. Ma, and G. Tsudik, Security and Privacy in Emerging Wireless Networks, IEEE Wireless Communications, pp. 12-21, 2010.
  • [SBDK10] Elmar Schoch, Boto Bako, Stefan Dietzel, and Frank Kargl. 2010. Dependable and secure geocast in vehicular networks. In Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking (VANET '10). ACM, New York, NY, USA, 61-68.
  • [SBLDW10] X. Sun, Y. Bao, W. Lu, J. Dai, and Z. Wang, "A study on performance of inter-vehicle communications in bidirectional traffic streams," in Proc. 2nd International Conference on Future Networks (ICFN '10), 22-24 2010, pp. 68-72.
  • [SFHS11] Yipin Sun, Zhenqian Feng, Qiaolin Hu and Jinshu Su, An efficient distributed key management scheme for group-signature based anonymous authentication in VANET, SECURITY AND COMMUNICATION NETWORKS, Volume 4, Issue 5, May 2011.
  • [SK10] Elmar Schoch and Frank Kargl. 2010. On the efficiency of secure beaconing in VANETs. In Proceedings of the third ACM conference on Wireless network security (WiSec '10). ACM, New York, NY, USA, 111-116.
  • [SLLSS10] Y. Sun, X. Lin, R. Lu, X. Shen, and J. Su, "A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications", Proc. IEEE ICC'10, Cape Town, South Africa, May 23-27, 2010.
  • [SLLSS10b] Y. Sun, X. Lin, R. Lu, X. Shen, and J. Su, "Roadside Units Deployment for Efficient Short-time Certificate Updating in VANETs", Proc. IEEE ICC'10, Cape Town, South Africa, May 23-27, 2010.
  • [SLLSS10c] Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications", IEEE Trans. on Vehicular Technology, Vol. 59, Issue 7, pp. 3589-3603, 2010 .
  • [SLLSS10d] Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "NEHCM: A Novel and Efficient Hash-chain based Certificate Management Scheme for Vehicular Communications", Proc. Chinacom'10, Beijing, China, August 25-27, 2010.
  • [SZZF10] J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An identity-based security system for user privacy in vehicular ad hoc networks," IEEE Transactions on Parallel and Distributed Systems, vol. PP, no. 99, pp. 1 –1, 2010.
  • [WCS10] Y.-C. Wei, Y.-M. Chen and H.-L. Shan, RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks, Security in Emerging Wireless Communication and Networking Systems, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 42, pp.39-51, 2010.
  • [WDG10] Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications," IEEE Transactions on Vehicular Technology, vol. 59, no. 2, pp. 559-573, feb. 2010.
  • [WHHL10] A. Weimerskirch, J. J. Haas, Y.-C. Hu, and K. P. Laberteaux. Data Security in Vehicular Communication Networks. VANET Vehicular Applications and Inter-Networking Technologies. Edited by Hannes Hartenstein and Kenneth P. Laberteaux. John Wiley & Sons, Ltd., March 2010.
  • [WJS10] A. Wasef, Y. Jiang, and X. Shen, "DCS: An Efficient Distributed Certificate Service Scheme for Vehicular Networks", IEEE Trans. on Vehicular Technology, Vol. 59, Issue 2, pp. 533-549, 2010. .
  • [WLLS10] A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing Public Key Infrastructure to Secure Vehicular Ad Hoc Networks", IEEE Wireless Communications, Vol. 17, No. 5, pp. 22-28, 2010.
  • [WMH10] A. Wagan, B. Mughal, and H. Hasbullah, "Vanet security framework for trusted grouping using tpm hardware," in Proc. 2nd International Conference on Communication Software and Networks (ICCSN '10), 26-28 2010, pp. 309-312.
  • [WMKP10] B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, "Privacy in inter-vehicular networks: Why simple pseudonym change is not enough," in Proc. 7th International Conference on wireless On-demand Network Systems and Services (WONS'10), 3-5 2010, pp. 176-183.
  • [WS10] A. Wasef, and X. Shen, "EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks", IEEE Trans. on Vehicular Technology, Vol. 58, Issue 9, pp. 5214 - 5224, 2009.
  • [WS10b] A. Wasef, and X. Shen, "REP: Location Privacy for VANETs Using Random Encryption Periods", ACM Mobile Networks and Applications (MONET), Vol. 15, No. 1, pp. 172 - 185, 2010.
  • [WS10c] A. Wasef, and X. Shen, "Efficient Group Signature Scheme Supporting Batch Verification For Securing Vehicular Networks", Proc. IEEE ICC'10, Cape Town, South Africa, May 23-27, 2010.
  • [YYO10] Gongjun Yan, Weiming Yang, and Stephan Olariu. 2010. Data fusion for location integrity in vehicle ad hoc networks. In Proceedings of the 12th International Conference on Information Integration and Web-based Applications Services (iiWAS '10). ACM, New York, NY, USA, 805-808.
  • [ZWSD10] L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, "A scalable robust authentication protocol for secure vehicular communications,"IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp. 1606-1617, may 2010.

  • [AAAAM09] M. Akhlaq, B. Aslam, F. Alserhani, I.U. Awan, and J. Mellor, "Empowered Certification Authority in VANETs", Proc. International Conference on Advanced Information Networking and Applications Workshops, pp. 181-186, May 2009.
  • [AZ09] B. Aslam, and C. Zou, "Distributed certificate and application architecture for VANETs", Proc. MILCOM 2009, pp. 1-7, Oct. 18-21, 2009.
  • [AZ09b] B. Aslam and C. C. Zou, “Poster: Distributed Certificate Architecture for VANETs”, in ACM SIGCOMM 2009, Barcelona, Spain, August 17 - 21, 2009.
  • [AGKT09] M. Asim, J. Guajardo, S.S. Kumar, and P. Tuyls, "Physical Unclonable Functions and Their Applications to Vehicle System Security", Prod. IEEE 69th Vehicular Technology Conference 2009 (VTC Spring 2009), pp. 1-5, 2009.
  • [BM09] J. Bernsen, and D. Manivannan, Unicast Routing Protocols for Vehicular Ad Hoc Networks: A Critical Comparison and Classification. Pervasive and Mobile Computing, Volume 5, Issue 1, February 2009, Pages 1-18.
  • [BMF09] M. Barzegar, N. Mozayani, and M. Fathy, "Secure Safety Messages Broadcasting in Vehicular Network", Proc. International Conference on Advanced Information Networking and Applications Workshops 2009, pp. 1055-1060, 2009.
  • [BSDT09] R.R. Brooks, S. Sander, J. Deng and J. Taiber, "Automobile security concerns", IEEE Vehicular Technology Magazine, Vol. 4, Issue 2, pp. 52-64, 2009.
  • [CHB09] M. Chammem, M. Hamdi, and N. Boudriga, "A platform for secure multi-service vehicular communication", Proc. International Conference on Ultra Modern Telecommunications & Workshops 2009, pp. 1-6, 2009.
  • [CJ09] J. Choi, and S. Jung, "A Security Framework with Strong Non-Repudiation and Privacy in VANETs", Proc. 6th IEEE Consumer Communications and Networking Conference, pp. 1-5, 2009.
  • [CVTA09] B. K. Chaurasia, S. Verma, G. S. Tomar and A. Abraham, Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks, Transactions on Computational Science IV, Lecture Notes in Computer Science 5430, pp. 136-148, 2009.
  • [DDSV09] V. Daza, J. Domingo-Ferrer, F. Sebe, and A. Viejo, "Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks", IEEE Transactions on Vehicular Technology, Vol. 58, Issue 4, pp. 1876-1886, May 2009.
  • [DEF09] H Dok, R. Echevarria and H. Fu, Privacy Issues for Vehicular Ad-Hoc Network, Communication and Networking, Communications in Computer and Information Science 56, pp. 370-383, 2009.
  • [DGR09] J. M. de Fuentes, A.I. Gonz′alez-Tablas, and A. Ribagorda. “Witness-based evidence generation in Vehicular Ad-Hoc Networks”. En: Proc. 7th Embedded Security in Cars Conference (ESCAR), 2009.
  • [DW09] J. Domingo-Ferre and Q. Wu, Safety and Privacy in Vehicular Communications, Privacy in Location-Based Applications, Lecture Notes in Computer Science 5599, pp. 173-189, 2009.
  • [GKVM09] M. Ghosh, A. Gupta, A. Kherani, A. Varghese, S. N. Muthaiah, "Misbehavior Detection Scheme With Integrated Root Cause Detection in VANET", Proceedings of the Sixth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2009). ACM, Beijing, China, September 2009.
  • [GNWT09] H. Guo, L.H. Ngoh, Y. Wu, and J.C.M. Teo, "Integrated info-security for vehicular networks", Proc. 13th International Conference on Intelligence in Next Generation Networks, pp. 1-4, Oct. 2009.
  • [GR09] A. Groll, and C. Ruland, "Secure and authentic communication on existing in-vehicle networks", Proc. IEEE Intelligent Vehicles Symposium, pp. 1093-1097, June 2009.
  • [GUXWL09] H. Gao, S. Utecht, F. Xu, H. Wang, and Q Li, Experimental Study on Secure Data Collection in Vehicular Sensor Networks, Wireless Algorithms, Systems, and Applications, Lecture Notes in Computer Science 5682, pp. 22-31, 2009.
  • [HHL09] J. J. Haas, Y.-C. Hu, and K. P. Laberteaux, Design and Analysis of a Lightweight Certificate Revocation Mechanism for VANET, Proceedings of the Sixth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2009). ACM, Beijing, China, September 2009.
  • [HHL09b] J. J. Haas, Y.-C. Hu, and K. P. Laberteaux, The Impact of Key Assignment on VANET Privacy. Security and Communication Networks 2009, John Wiley & Sons, Ltd., September, 2009.
  • [HHL09c] J. J. Haas, Y.-C. Hu, and K. P. Laberteaux. Real-World VANET Security Protocol Performance. Proceedings of the IEEE Globecom 2009, Symposium on Selected Areas in Communications. IEEE, Honolulu, HI, November 2009.
  • [HHL09d] Jason J. Haas, Yih-Chun Hu, and Kenneth P. Laberteaux. The Impact of Key Assignment on VANET Privacy. Security and Communication Networks 2009. John Wiley & Sons, Ltd., September 2009.
  • [HV09] D. Huang and M. Verma, ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks, Ad Hoc Networks, Volume 7, Issue 8, November 2009, Pages 1526-1535.
  • [JSPR09] C. D. Jung, C. Sur, Y. Park, K. H. Rhee, A Robust Conditional Privacy-Preserving Authentication Protocol in VANET. MobiSec 2009: 35-45.
  • [JSPR09b] C. D. Jung , C. Sur , Y. Park and K.-H. Rhee, A Robust and Efficient Anonymous Authentication Protocol in VANETs, Journal of Communications and Networks, Vol. 11, pp.607-614, 2009.
  • [JSSL09] Y. Jiang, M. Shi, X. Shen, and C. Lin, "BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree", IEEE Trans. on Wireless Communications, Vol. 8, No. 4, pp. 1974 - 1983, 2009.
  • [KXMC09] S. Kaza, J. Xu, B. Marshall, and H. Chen, Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security. IEEE Transactions on Intelligent Transportation Systems, 2009.
  • [KWL09] G. Kounga, T. Walter, and S. Lachmund, "Proving Reliability of Anonymous Information in VANETs", IEEE Transactions on Vehicular Technology, Vol. 58, Issue 6, pp. 2977-2988, July 2009.
  • [LLS09] X. Lin, R. Lu, and X. Shen, "Location-release Signature for Vehicular Communications", Proc. IEEE ICCCN'09, San Francisco, CA, USA, Aug. 2-6, 2009.
  • [LLZS09] R. Lu, X. Lin, H. Zhu and X. Shen. SPARK: A New VANET-based Smart Parking Scheme for Large Parking Lots. The 28th IEEE International Conference on Computer Communications (INFOCOM 2009), Rio de Janeiro, Brazil, April 19-25, 2009.
  • [LLZS09b] R. Lu, X. Lin, H. Zhu, and X. Shen, "Accelerating Authenticated Emergence Message Propagation to Mitigate Chain-Reaction Accidents in Highway Traffic", Proc. Chinacom'09, Xi'an, China, Aug. 26-28, 2009.
  • [LZZ09] W. Liu, H. Zhang, and W. Zhang, "An Autonomous Road Side Infrastructure Based System in Secure VANETs", Proc. 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-6, Sept. 2009.
  • [MKA09] S.S. Manvi, M.S. Kakkasageri, and D.G. Adiga, "Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach", Proc. International Conference on Future Computer and Communication, pp. 16-20, April 2009.
  • [O09]Stephan Olariu. 2009. NOTICE: an architecture for traffic incident detection. In Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems (MSWiM '09). ACM, New York, NY, USA, 3-3.
  • [O09b]Stephan Olariu. 2009. An architecture for traffic incident detection. In Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia (MoMM '09). ACM, New York, NY, USA, 6-6.
  • [P09] Adrian Perrig. 2009. Securing VANETs: industry approaches and current research directions. In Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking (VANET '09). ACM, New York, NY, USA, 1-2.
  • [PATZ09] S. Park, B. Aslam, D. Turgut, and C. C. Zou, “Defense against Sybil Attack in Vehicular Ad-Hoc Network - Based On Roadside Units Support”, In Proceedings of the IEEE Military Communications Conference (MILCOM'09), Boston, MA, October 18 – 21, 2009.
  • [PDM09] R. Peplow, D.S. Dawoud, and J. Merwe, "Ensuring privacy in vehicular communication", Proc. 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 610-614, May 2009.
  • [RPTHL09] N. Ristanovic, P. Papadimitratos, G. Theodorakopoulos, J.-P. Hubaux and J.-Y. Leboudec, Adaptive message authentication for vehicular networks. Proceedings of the Sixth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2009). ACM, Beijing, China, September 2009.
  • [SF09] J. Sun and Y. Fang, Defense against misbehavior in anonymous vehicular ad hoc networks Ad Hoc Networks, Volume 7, Issue 8, November 2009, Pages 1515-1525.
  • [SLH09] R. K. Schmidt, Tim Leinmuller, and Albert Held, "Defending against Roadside Attackers", Proc. 16th World Congress on Intelligent Transport Systems, Stockholm, Sweden, September 21-25, 2009.
  • [SMK09] F. Schaub, Z. Ma, and F. Kargl, "Privacy Requirements in Vehicular Communication Systems", Proc. International Conference on Computational Science and Engineering 2009, Volume 3, pp. 139-145, Aug. 2009.
  • [SSBP09] A. Studer, E. Shi, F. Bai, and A. Perrig, "TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs", Proc. SECON '09, pp. 1-9, June 2009.
  • [SBBP09b] A. Studer, F. Bai, B. Bellur, and A. Perrig, Flexible, Extensible, and Efficient VANET Authentication, Journal of Communications and Networks, Vol. 11, pp.574-588, 2009.
  • [SCJ09] Ki-Eun Shin, Hyoung-Kee Choi, and Jongmin Jeong. 2009. A practical security framework for a VANET-based entertainment service. In Proceedings of the 4th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks (PM2HW2N '09). ACM, New York, NY, USA, 175-182.
  • [SWL09] J.-H. Song, V. W. S. Wong and V. C. M. Leung, Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks, Mobile Networks and Applications, pp. 1-12, 2009.
  • [SZS09] Y. Sun, B. Zhao, J. Su, ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications, The 4th International Conference on Frontier of Computer Science and Technology (FCST 2009), December 17-19,2009, Shanghai,China.
  • [TMLB09] C. Tchepnda, H. Moustafa, H. Labiod and G. Bourdon, On Analyzing the Potential of a Layer-2 Multi-hop Authentication and Credential Delivery Scheme for Vehicular Communications, Wireless Personal Communications, Volume 51, Number 1, pp. 31-52, October, 2009.
  • [TNG09] J.C.M. Teo, L.H. Ngoh, and H. Guo, “Anonymous DoS-Resistant Password-based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks”, Proc. IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA 2009), Bradford, UK, May 26-29, 2009.
  • [WCL09] H. Wang, R. Cheu, and D. Lee, "En-route Security Monitoring Based on an Incident Detection Algorithm for Commercial Vehicles", Proc. Sixth International Conference on Fuzzy Systems and Knowledge Discovery, Vol. 3, pp. 276-281, 14-16 Aug. 2009.
  • [WHHL09] André Weimerskirch, Jason J Haas, Yih-Chun Hu, Kenneth P Laberteaux, Data Security in Vehicular Communication Networks
    VANET: VEHICULAR APPLICATIONS AND INTER-NETWORKING TECHNOLOGIES, Pages: 299–363, 2009.
  • [WJ09] J. Wang, and N. Jiang, "A simple and efficient security scheme for vehicular ad hoc networks", Proc. IEEE International Conference on Network Infrastructure and Digital Content, pp. 591-595, Nov. 2009.
  • [WS09] A. Wasef, and X. Shen, "MAAC: Message Authentication Acceleration Protocol for Vehicular Ad Hoc Networks", Proc. IEEE Globecom'09, Honolulu, Hawaii, USA, Nov. 30 - Dec. 4, 2009.
  • [WS09b] A. Wasef, and X. Shen, "ASIC: Aggregate Signatures and Certificates Verification Scheme for Vehicular Networks", Proc. IEEE Globecom'09, Honolulu, Hawaii, USA, Nov. 30 - Dec. 4, 2009.
  • [YHWC09] Ching-Hung Yeh, Yueh-Min Huang, Tzone-I Wang, and Hsiao-Hwa Chen. 2009. DESCV--A Secure Wireless Communication Scheme for Vehicle ad hoc Networking. Mob. Netw. Appl. 14, 5 (October 2009), 611-624.
  • [YO09] G. Yan, S. Olariu, "An efficient geographic location-based security mechanism for vehicular adhoc networks", Proc. MASS 09, pp. 804-809, Oct. 2009.
  • [YOW09] G. Yan, S. Olariu, and M. Weigle, "Providing location security in vehicular Ad Hoc networks", IEEE Wireless Communications, Vol. 16, Issue 6, pp. 48-55, 2009.
  • [ZLLS09] H. Zhu, R. Lu, X. Lin, and X. Shen, "Security in Service-Oriented Vehicular Networks", IEEE Wireless Communications, Vol. 16, No. 4, pp. 16-22, 2009.

  • [AP08] P. Ardelean, and P. Papadimitratos, Secure and Privacy-Enhancing Vehicular Communication. Vehicular Technology Conference, 2008.
  • [BA08] S. Buchegger, and T. Alpcan, Security Games for Vehicular Networks. Forty-sixth Annual Allerton Conference on Communication, Control, and Computing, 2008.
  • [BFABD08] L. Bononi, M. D. Felice, G. D'Angelo, M. Bracuto, and L. Donatiello, MoVES: A Framework for Parallel and Distributed Simulation of Wireless Vehicular Ad Hoc Networks. Computer Networks, Volume 52, Issue 1, 18 January 2008, Pages 155-179.
  • [BMC08] M. Burmester, E. Magkos, and V. Chrissikopoulos, Strengthening Privacy Protection in VANETs. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications(WIMOB), 2008.
  • [BONL08] A. Boukerche, H.A.B.F. Oliveira, E. F. Nakamura, and A. A.F. Loureiro, Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems. Computer Communications, Volume 31, Issue 12, 30 July 2008, Pages 2838-2849.
  • [CC08] E.S. Coronado, and S. Cherkaoui, "Service Discovery and Service Access in Wireless Vehicular Networks", Proc. IEEE GLOBECOM Workshops, pp. 1-6, Nov. 2008.
  • [CKLGC08] Z. Cao, J. Kong, U. Lee, M. Gerla, and Z. Chen, "Proof-of-Relevance: Filtering False Data via Authentic Consensus in Vehicle Ad-hoc Networks", Proc. INFOCOM MOVE Workshop, April, 2008.
  • [CVB08] B.K. Chaurasia, S. Verma, and S.M. Bhasker, "Message broadcast in VANETs using group signature", Proc. Fourth International Conference on Wireless Communication and Sensor Networks, pp. 131-136, Dec. 2008.
  • [DNZK08] Soufiene Djahel, Farid Na?t-Abdesselam, Zonghua Zhang and Ashfaq Khokhar, Defending against packet dropping attack in vehicular ad hoc networks, SECURITY AND COMMUNICATION NETWORKS, Volume 1, Issue 3, May/June 2008, Pages: 245–258.
  • [DSGW08] F. Dressler, C. Sommer, T. Gansen, and L. Wischhof, "Requirements and objectives for secure Traffic Information Systems", Proc. 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008), pp. 808-814, Sep. 2008.
  • [FHT08] Chun-I Fan, Ruei-Hau Hsu, and Chun-Hao Tseng. 2008. Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks. In Proceedings of the International Conference on Mobile Technology, Applications, and Systems (Mobility '08). ACM, New York, NY, USA, , Article 82 , 7 pages.
  • [FNSLBTSECK08] A. Festag, G. Noecker, M. Strassberger, A. Lübke, B. Bochow, M. Torrent-Moreno, S. Schnaufer, R. Eigner, C. Catrinescu, J. Kunisch, NoW - Network on Wheels: Project Objectives, Technology and Achievements, In proceedings of 6th International Workshop on Intelligent Transportation (WIT), Hamburg, Germany, March 2008.
  • [G08] M. Gerla, Vehicular Urban Sensing: Efficiency and Privacy. Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems, 2008.
  • [GB08] G. Guette and C. Bryce, Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs), Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Lecture Notes in Computer Science 5019, pp. 106-116, 2008.
  • [GMML08] M. Gerlach, O. Mylyy, N. Mariyasagayam and M. Lenardi, Securing Multihop Vehicular Message Broadcast using Trust Sensors, Advances in Ad Hoc Networking, IFIP International Federation for Information Processing 265, pp. 109-120, 2008.
  • [HCR08] Y. Hao, Y. Cheng, and K. Ren, Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs. IEEE GLOBECOM, 2008.
  • [HHGC08] Xiaoyan Hong, Dijiang Huang, Mario Gerla, and Zhen Cao. 2008. SAT: situation-aware trust architecture for vehicular networks. In Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture (MobiArch '08). ACM, New York, NY, USA, 31-36.
  • [ICZM08] J.T. Isaac, J.S. Camara, S. Zeadally, and J.T. Marquez, A Secure Vehicle-to-Roadside Communication Payment Protocol in Vehicular Ad Hoc Networks. Computer Communications, Volume 31, Issue 10, 25 June 2008, Pages 2478-2484.
  • [IKRK08] A. Iyer, A. Kherani, A. Rao, and A. Karnik, Secure V2V Communications: Performance Impact of Computational Overheads. INFOCOM, 2008.
  • [JSSL08] Y. Jiang, M. Shi, X. Shen, and C. Lin, A Tree-Based Signature Scheme for VANETs. IEEE GLOBECOM, 2008.
  • [KBT08] Pandurang Kamat, Arati Baliga and Wade Trappe, Secure, pseudonymous, and auditable communication in vehicular ad hoc networks, SECURITY AND COMMUNICATION NETWORKS, Volume 1, Issue 3, May/June 2008, Pages: 233–244.
  • [KKKL08] S. H. Kim, B. H. Kim, Y. K. Kim, and D. H. Lee, Auditable and Privacy-Preserving Authentication in Vehicular Networks. UBICOMM, 2008.
  • [KPBMSWTCTHKH08] F. Kargl, P. Papadimitratos, L. Buttyan, M. M{u}ter, E. Schoch, B. Wiedersheim, T. Thong, G. Calandriello, A. Held, A. Kung, and J. Hubaux, Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges
  • [KSWL08] F. Kargl, E. Schoch, B. Wiedersheim, and T. Leinmuller, Secure and Efficient Beaconing for Vehicular Networks. Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking, 2008
  • [LB08] Christine Laurendeau and Michel Barbeau, Insider attack attribution using signal strength-based hyperbolic location estimation, SECURITY AND COMMUNICATION NETWORKS, Volume 1, Issue 4, July/August 2008, Pages: 337–349.
  • [LHC08] C.-T. Li, M.-S. Hwang, and Y.-P. Chu, A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks. Computer Communications, Volume 31, Issue 12, 30 July 2008, Pages 2803-2814.
  • [LHH08] K. P. Laberteaux, J. J. Haas, and Y.-C. Hu. Security Certificate Revocation List Distribution for VANET. Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET 2008). ACM, San Francisco, CA, September 2008, pp. 88-89.
  • [LLF08] C. Langley, R. Lucas, and H. Fu, "Key management in vehicular ad-hoc networks", Proc. IEEE International Conference on Electro/Information Technology, pp. 223-226, May 2008.
  • [LLZHS08] R. Lu , X. Lin, H. Zhu, P.-H. Ho and X. Shen, ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. The 27th IEEE International Conference on Computer Communications (INFOCOM 2008), Phoenix, Arizona.
  • [LLZZHS08] X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho and X. Shen. Security in Vehicular Ad Hoc Networks. IEEE Communications Magazine, Vol. 46, No. 4, pp. 88-95, 2008.
  • [LSSHS08] T. Leinmuller, R.K. Schmidt, E. Schoch, A. Held, G. Schafer, " Modeling Roadside Attacker Behavior in VANETs", Proc. 3rd IEEE Workshop on Automotive Networking and Applications (AutoNet 2008), New Orleans, LA, USA, December 4, 2008.
  • [LSWZHS08] X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho and X. Shen. TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving. IEEE Transactions on Wireless Communications, Vol. 7, No. 12, pp. 4987-4998, 2008.
  • [MKW08] Z. Ma, F. Kargl, and M. Weber, "Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications", Proc. IEEE 68th Vehicular Technology Conference, pp. 1-5, Sep. 2008.
  • [MRCPAH08] T. Moore, M. Raya, J. Clulow, P. Papadimitratos, R. Anderson, and J.-P. Hubaux, "Fast Exclusion of Errant Devices from Vehicular Networks", Proc. SECON 08, pp. 135-143, June 2008.
  • [NL08] D.K. Nilsson, and U.E. Larson, "Secure Firmware Updates over the Air in Intelligent Vehicles", Proc. IEEE ICC Workshops 08, pp. 380-384, May 2008.
  • [NLJ08] D.K. Nilsson, U.E. Larson, and E. Jonsson, "Low-cost key management for hierarchical wireless vehicle networks", Proc. IEEE Intelligent Vehicles Symposium, pp. 476-481, June 2008.
  • [NLJ08b] D.K. Nilsson, U.E. Larson, and E. Jonsson, "Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes", Proc. VTC 2008-Fall, pp. 1-5, Sept. 2008.
  • [NLN08] D.K. Nilsson, Sun Lei, and T. Nakajima "A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs", Proc. IEEE GLOBECOM Workshops, pp. 1-5, Nov 2008.
  • [NPL08] D. K. Nilsson, P. Phung, and U. E. Larson. Vehicle ECU Classification Based on Safety-Security Characteristics. Proc. 13th International Conference on Road Transport and Information Control (RTIC), 2008.
  • [OYNSOI08] H. Oguma, A. Yoshioka, M. Nishikawa, R. Shigetomi, A. Otsuka, and H. Imai, "New Attestation Based Security Architecture for In-Vehicle Communication", Proc. IEEE GLOBECOM 2008, pp. 1-6, Nov. 30 2008.
  • [P08] P. Papadimitratos, "On the Road"-Reflections on the Security of Vehicular Communication Systems. Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety(ICVES), 2008.
  • [PBHSFMMKKH08] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung and J.-P. Hubaux, Secure Vehicular Communication Systems: Design and Architecture. IEEE Communication Magazine, 2008.
  • [PCHL08] P. Papadimitratos, G. Calandriello, J.-P. Hubaux, and A. Lioy, Impact of Vehicular Communications Security on Transportation Safety. INFOCOM, 2008.
  • [PF08] K. PloBI, and H. Federrath, A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. Computer Standards & Interfaces, Volume 30, Issue 6, August 2008, Pages 390-397.
  • [PH08] P. Papadimitratos, and J.-P. Hubaux, Report on the "secure vehicular communications: results and challenges ahead" workshop. ACM SIGMOBILE Mobile Computing and Communications Review, 2008.
  • [PMH08] P. Papadimitratos, G. Mezzour, and J.-P. Hubaux, Certificate revocation list distribution in vehicular communication systems. Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking, 2008.
  • [PSCZ08] S. Pietrowicz, H. Shim, G. D. Crescenzo, and T. Zhang, VDTLS-Providing Secure Communications in Vehicle Networks. INFOCOM, 2008.
  • [QLM08] Y. Qian, K. Lu, and N. Moayeri, A Secure VANET Mac Protocol for DSRC Applications. IEEE GLOBECOM, 2008.
  • [QLM08b] Y. Qian, K. Lu, and N. Moayeri, Performance Evaluation of a Secure MAC Protocol for Vehicular Networks. MILCOM, 2008.
  • [QM08] Y. Qian, and N. Moayeri, "Design of Secure and Application-Oriented VANETs", Proc. VTC Spring 2008, pp. 2794-2799, May 2008.
  • [SF08] J. Sun and Y. Fang, "A defense technique against misbehavior in VANETs based on threshold authentication", Proc. IEEE MILCOM 2008, pp. 1-7, Nov. 2008.
  • [SHSI08] S. Smaldone, L. Han, P. Shankar, and Liviu Iftode, RoadSpeak: enabling voice chat on roadways using vehicular social networks. Proceedings of the 1st workshop on Social network systems, 2008.
  • [SKKW08] Elmar Schoch, Moritz Keppler, Frank Kargl and Michael Weber, On the security of context-adaptive information dissemination, SECURITY AND COMMUNICATION NETWORKS, Volume 1, Issue 3, May/June 2008, Pages: 205–218.
  • [SLM08] J. Serna, J. Luna, and M. Medina, Geolocation-based Trust for VANET's Privacy. Information Assurance and Security(ISIAS), 2008.
  • [SLSHS08] R. K. Schmidt, T. Leinmuller, E. Schoch, A. Held and G. Schafer, "Vehicle Behavior Analysis to Enhance Security in VANETs", Proc. 4th Workshop on Vehicle to Vehicle Communications (V2VCOM 2008), Eindhoven, the Netherlands, June 3, 2008.
  • [SPF08] F. Scheuer, K. Posse, and H. Federrath, "Preventing Profile Generation in Vehicular Networks", Proc. IEEE International Conference on Wireless and Mobile Computing 2008, pp. 520-525, Oct. 2008.
  • [SWL08] J.-H. Song, V. W.S. Wong, and V. C.M. Leung, Secure Location Verification for Vehicular Ad-Hoc Networks. IEEE GLOBECOM, 2008.
  • [THB08] Lei Tang, Xiaoyan Hong and Phillip G. Bradford, Privacy-preserving secure relative localization in vehicular networks, SECURITY AND COMMUNICATION NETWORKS, Volume 1, Issue 3, May/June 2008, Pages: 195–204.
  • [TMLB08] C. Tchepnda, H. Moustafa, H. Labiod, and G. Bourdon, A Layer-2 Multi-hop Authentication and Credential Delivery Scheme for Vehicular Networks. GLOBECOM, 2008.
  • [TMLB08b] C. Tchepnda, H. Moustafa, H. Labiod, and G. Bourdon, "Performance Analysis of a Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks", Proc. VTC Spring 2008, pp. 2636-2640, May 2008.
  • [VNLJ08] V. Verendel, D.K. Nilsson, U.E. Larson, and E. Jonsson, "An Approach to using Honeypots in In-Vehicle Networks", Proc. VTC 2008-Fall, pp. 1-5, Sep. 2008.
  • [WBHLD08] P. Wex, J. Breuer, A. Held, T. Leinmuller and L. Delgrossi, "Trust Issues for Vehicular Ad Hoc Networks", Proc. 67th IEEE Vehicular Technology Conference (VTC2008-Spring), Marina Bay, Singapore, May 11–14, 2008.
  • [WHC08] N.-W. Wang, Y.-M. Huang, and W.-M. Chen, A Novel Secure Communication Scheme in Vehicular Ad Hoc Networks. Computer Communications, Volume 31, Issue 12, 30 July 2008, Pages 2827-2837.
  • [WJS08] A. Wasef, Y. Jiang, and X. Shen, "ECMV: Efficient Certificate Management Scheme for Vehicular Networks", Proc. IEEE Globecom'08, New Orleans, LA, USA, Nov. 30 - Dec. 4, 2008.
  • [WS08] A. Wasef and X. Shen, PGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks, Proc. IEEE ICC'08, Beijing, China, May 19-23, 2008.
  • [XSS08] Yong Xi, Weisong Shi and Loren Schwiebert, Mobile anonymity of dynamic groups in vehicular networks, SECURITY AND COMMUNICATION NETWORKS, Volume 1, Issue 3, May/June 2008, Pages: 219–231.
  • [XSSSZ08] Y. Xi, K.-W. Sha, W.-S. Shi, L. Schwiebert and T. Zhang, Probabilistic Adaptive Anonymous Authentication in Vehicular Networks, Journal of Computer Science and Technology, Volume 23, Number 6, pp. 916-928, November, 2008.
  • [YAEF08] S. Yousefi, E. Altman, R. El-Azouzi, and M. Fathy, Improving Connectivity in Vehicular Ad Hoc Networks: An Analytical Study. Computer Communications, Volume 31, Issue 9, 8 June 2008, Pages 1653-1659.
  • [YOW08] G. Yan, S. Olariu, and M.C. Weigle, Providing VANET Security through Active Position Detection. Computer Communications, Volume 31, Issue 12, 30 July 2008, Pages 2883-2897.
  • [YZH08] Shuang Yuan, Chenxi Zhang and Pin-Han Ho, A secure business framework for file purchasing in vehicular networks, SECURITY AND COMMUNICATION NETWORKS, Volume 1, Issue 3, May/June 2008, Pages: 259–268.
  • [ZLLH08] C. Zhang, X. Lin, R. Lu and P.-H. Ho. RAISE: An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks. IEEE International Conference on Communications (ICC'08), Beijing, China, May 19-23, 2008.
  • [ZLLHS08] C. Zhang, R. Lu, X. Lin, P.-H. Ho and X. Shen, An Efficient Identity-based Batch Verification Scheme for Vehicular Sensor Networks. The 27th IEEE International Conference on Computer Communications (INFOCOM 2008), Phoenix, Arizona.
  • [ZLLHS08b] H. Zhu, X. Lin, R. Lu, P.-H. Ho and X. Shen. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. IEEE International Conference on Communications (ICC'08), Beijing, China, May 19-23, 2008.
  • [ZLLHS08c] C. Zhang, X. Lin, R. Lu, P.H. Ho, and X. Shen, "An Efficient Message Authentication Scheme for Vehicular Communications", IEEE Trans. on Vehicular Technology, Vol. 57, No. 6, 3357-3368, 2008.
  • [ZLHC08] C. Zhang, R. Lu, P.-H. Ho, and A. Chen, A Location Privacy Preserving Authentication Scheme in Vehicular Networks, Proc. IEEE WCNC'08, Las Vegas, Nevada, USA, March 31 - April 3, 2008.
  • [ZMSE08] S. Zrelli, A. Miyaji, Y. Shinoda, and T. Ernst, "Security and Access Control for Vehicular Communications", Proc. IEEE International Conference on Wireless and Mobile Computing, pp. 561-566, Oct. 2008.

  • [AFWZ07] F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication, 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern Switzerland, March 2007.
  • [BHV07] L. Buttyan, T. Holczer, and I. Vajda, On the effectiveness of changing pseudonyms to provide location privacy in VANETs, European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2007) Cambridge, UK, July 2007.
  • [BSCBA07] C.J. Bernardos, I. Soto, M. Calderon, F. Boavida, and A. Azcorra, VARON: Vehicular Ad Hoc Route Optimisation for NEMO. Computer Communications, Volume 30, Issue 8, 8 June 2007, Pages 1765-1784.
  • [CPLH07] G. Calandriello, P. Papadimitratos, A. Lloy, and J.-P. Hubaux, Efficient and Robust Pseudonymous Authentication in VANET, The Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2007), in conjunction with ACM MobiCom 2007, Montr¨|al, QC, Canada, September 2007, pp. 19-28.
  • [CZP07] G. Crescenzo, T. Zhang, and S. Pietrowicz, Anonymity Notions for Public-Key Infrastructures in Mobile Vehicular Networks. In Proceedings of the 1st IEEE International Workshop on Mobile Vehicular Networks (MoVeNet 2007). October 12, 2007, Pisa, Italy.
  • [E07] S. Eichler, A Security Architecture Concept for Vehicular Network Nodes. 6th International Conference on Information, Communications & Signal Processing(ICICS), 2007.
  • [FFBA07] E. Fonseca, A. Festag, R. Baldessari, R. Aguiar, Support of Anonymity in VANETs - Putting Pseudonymity into Practice, IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong, March 2007.
  • [FRF07] J. Freudiger, M. Raya, and M. Feleghhazi, Mix Zones for Location Privacy in Vehicular Networks, The First International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 2007), in conjunction with QShine 2007, Vancouver, British Columbia, August 14, 2007
  • [G07] M. Gerlach, Trust for Vehicular Applications, In Proceedings of the 8th International Symposium on Autonomous Decentralized Systems (ISADS), Sedona, Arizona, March 2007.
  • [G07b] M. Gerlach, Use Cases for a Vehicular Security System, Technical Report NOW-AP24-20070501SECUC-DV1, Network on Wheels Project, 2007.
  • [GBW07] J. Guo, J.P. Baugh, and S. Wang, A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework, Proceedings of the Mobile Networking for Vehicular Environments (MOVE) workshop in conjunction with IEEE INFOCOM, Anchorage, Alaska, May 2007.
  • [GD07] G. Guette and B. Ducourthial, On the Sybil Attack Detection in VANET. In Proceedings of the 1st IEEE International Workshop on Mobile Vehicular Networks (MoVeNet 2007). October 12, 2007, Pisa, Italy.
  • [GFLGH07] M. Gerlach, A. Festag, T. Leinmuller, G. Goldacker, C. Harsch, Security Architecture for Vehicular Communication, 5th International Workshop on Intelligent Transportation (WIT), Hamburg, Germany, March 2007.
  • [GG07] M. Gerlach and F. Guttler, Privacy in VANETs using Changing Pseudonyms - Ideal and Real (Poster Presentation), In Proceedings of 65th Vehicular Technology Conference VTC2007-Spring, Dublin, Ireland, April 2007.
  • [GLMP07] L. Galluccio, A. Leonardi, A. Matera, and S. Palazzo, Service Capacity in Vehicular Networks: A Resource Dissemincation Analysis. Ad Hoc Networks, Volume 5, Issue 8, November 2007, Pages 1272-1283.
  • [HFP07] C. Harsch, A. Festag, and P. Papadimitratos, Secure Position-Based Routing for VANETs, 2007 IEEE 66th Vehicular Technology Conference (VTC 2007), Baltimore, USA, 30 September - 3 October 2007.
  • [HPY07] J. Hur, C. Park, and H. Yoon, An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks, Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, pp. 121-136, Nara, Japan, October 29-31, 2007, Proceedings. Lecture Notes in Computer Science 4752 Springer 2007.
  • [LFS07] X. Liu, Z. Fang, and L. Shi, Securing Vehicular Ad Hoc Networks. 2nd International Conference on Pervasive Computing and Applications, 2007.
  • [LKPSJ07] M. Lee, G. Kim, S. Park, O. Song and S. Jun, Predictive Mobility Support with Secure Context Management for Vehicular Users, Network Control and Engineering for QoS, Security and Mobility, IV, IFIP International Federation for Information Processing 229, pp. 21-28, 2007.
  • [LPPGL07] S. Lee, G. Pan, J. Park, M. Gerla, and S. Lu, Secure Incentives for Commercial Ad Dissemination in Vehicular Networks, MobiHoc '07, Montreal, Canada, Sep 9-14, 2007.
  • [LSHS07] X. Lin, X. Sun, P.-H. Ho and X. Shen. GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications. IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, 2007.
  • [LZSHS07] X. Lin, C. Zhang, X. Sun, P.-H. Ho and X. Shen. Performance Enhancement for Secure Vehicular Communications. IEEE Global Communications Conference (GLOBECOM'07), Washington, DC, USA, Nov. 26-30, 2007.
  • [MFPC07] C. Micheloni, G.L. Foresti, C. Piciarelli, and L. Cinque, An Autonomous Vehicle for Video Surveillance of Indoor Environments. IEEE Transactions on Vehicular Technology, 2007.
  • [O07] Stephan Olariu. 2007. Peer-to-peer multimedia content provisioning for vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling (WMuNeP '07). ACM, New York, NY, USA, 1-1.
  • [ODS07] B. Ostermaier, F. Dotzer, and M. Strassberger, Enhancing the Security of Local Danger Warnings in VANETs - A Simulative Analysis of Voting Schemes, Proceedings of the The Second International Conference on Availability, Reliability and Security, pp. 422-431.
  • [P07] P. Papadimitratos, Securing Ad Hoc Networks and Vehicular Communications, Tutorial at SBSEG 2007.
  • [PC07] R. Pietro and P. Cencioni, VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol. In Proceedings of the 1st IEEE International Workshop on Mobile Vehicular Networks (MoVeNet 2007). October 12, 2007, Pisa, Italy.
  • [PBHKKR07] P. Papadimitratos, L. Butty¨¢n, J-P. Hubaux, F. Kargl, A. Kung, and M. Raya, Architecture for Secure and Private Vehicular Communications, International Conference on ITS Telecommunications (ITST 2007) Sophia Antipolis, France, June 2007.
  • [PTSP07] Ramu Panayappan, Jayini Mukul Trivedi, Ahren Studer, and Adrian Perrig. 2007. VANET-based approach for parking space availability. In Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks (VANET '07). ACM, New York, NY, USA, 75-76.
  • [RH07] M. Raya and J. P. Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security, Vol. 15, No. 1, pp. 39-68, 2007.
  • [RH07b] S. Ur Rahman, and U. Hengartner, Secure Crash Reporting in Vehicular Ad hoc Networks. To appear in Proc. of Third International Conference on Security and Privacy in Communication Networks (SecureComm 2007), Nice, France, September 2007.
  • [RPAJH07] M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, Eviction of Misbehaving and Faulty Nodes in Vehicular Networks, To appear in IEEE Journal on Selected Areas in Communications, Special Issue on Vehicular Networks, 2007
  • [RPGH07] M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux, On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks, EPFL Technical report LCA-REPORT-2007-003, 2007.
  • [RSKLFM07] J. Rybicki, B. Scheuermann, W. Kiess, C. Lochert, P. Fallahi, and M. Mauve, Challenge: Peers on Wheels - A Road to New Traffic Information Systems. MobiCom 2007: Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, Montreal, Quebec, Canada, September 2007, pp. 215-221.
  • [SC07] A. Stampoulis, and Z. Chai, Survey of Security in Vehicular Networks, Project CPSC 534.
  • [SLH07] X. Sun, X. Lin, and P.-H. Ho, Secure Vehicular Communications Based on Group Signature and ID-based Signature Scheme, in Proceedings of International Conference on Communications (ICC), Scotland, June, 2007.
  • [SLHP07] K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, AMOEBA: Robust Location Privacy Scheme for VANET, to appear in IEEE Journal on Selected Areas in Communications (JSAC), Special issue on Vehicular Networks, 2007.
  • [SZF07] J. Sun, C. Zhang, and Y. Fang, An ID-based Framework Achieving Privacy and Non-repudiation in Vehicular Ad Hoc Networks. MILCOM, 2007.
  • [T07] M. Torrent-Moreno, Inter-Vehicle Communications: Assessing Information Dissemination under Safety Constraints, Proceedings of the 4th Annual IEEE/IFIP Conference on Wireless On demand Network Systems and Services (WONS), Obergurgl, Austria, January 2007.
  • [XSSSZ07] Y. Xi, K. Sha, W. Shi, L. Scnwiebert, and T.Zhang, Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks, ISADS, pp. 344-351, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07),2007.
  • [YCWO07] G. Yan, G. Choudhary, M.C. Weigle, and S. Olariu, Providing VANET Security Through Active Position Detection (poster), Proceedings of ACM VANET, Montreal, Canada, September 2007, pp. 73-74.
  • [ZCNC07] T. Zhou, R.R. Choudhury, P. Ning, and K. Chakrabarty, Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks, Mobiquitous, Aug 2007.
  • [ZMSW07] J. Zhang, L. Ma, W. Su, and Y. Wang, Privacy-Preserving Authentication Based on Short Group Signature in Vehicular Networks. ISDPE, 2007.

  • [ABDFGKL06] A. Aijaz, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmuller, Attacks on inter vehicle communication systems - an analysis, 3rd International Workshop on Intelligent Transportation, WIT, 2006.
  • [FAEV06] L. Fischer, A. Aijaz, C. Eckert, and D. Vogt, Secure Revocable Anonymous Authenticated Inter-Vehicle Communication (SRACC), In proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, Berlin, Germany, November 2006.
  • [FF06] E. Fonseca,and A. Festag, A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS, Technical Report NLE-PR-2006-19, NEC Network Laboratories, March 2006.
  • [G06] M. Gerlach, Assessing and Improving Privacy in VANETs, In Proceedings of Fourth Workshop on Embedded Security in Cars (ESCAR), November 2006.
  • [GB06] J. Guo and J.P. Baugh, Security and Privacy in Vehicle Safety Communication Applications, SAE 2006 Transactions Journal of Passenger Cars: Electronic and Electrical Systems, Volume 115, Number 7 (2006), pp. 721-727. (also appeared in 2006 SAE World Congress Session on Vehicle Information and Communication Security).
  • [GSAWT06] M. Gerlach, S. Steglich, S. Arbanowski, M. Wegdam, H. Teunissen, Trustworthy Applications for Vehicular Environments, Vehicular Technology Magazine, 1(2):9 15, 2006.
  • [HL06] Y.-C. Hu and K. P. Laberteaux. Strong VANET Security on a Budget. Proceedings of the 4th Annual Conference on Embedded Security in Cars (escar 2006). is-its, Berlin, Germany, November 2006.
  • [KBT06] P. Kamat, A. Baliga, W. Trappe. An Identity-Based Security Framework for VANETs, International Conference on Mobile Computing and Networking Proceedings of the 3rd international workshop on Vehicular ad hoc networks, 2006.
  • [KMS06] F. Kargl, Z. Ma, and E. Schoch, Security Engineering for VANETs, In proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, Berlin, Germany, November 2006.
  • [LB06] C. Laurendeau and M. Barbeau, Threats to Security in DSRC/WAVE, Ad-Hoc, Mobile, and Wireless Networks, Lecture Notes in Computer Science 4104, pp. 266-279, 2006.
  • [LBHKKPRS06] T. Leinmuller, L. Buttyan, J.-P. Hubaux, F. Kargl, R. Kroh, P. Papadimitratos, M. Raya, and Elmar Schoch, SEVECOM - Secure Vehicle Communication, 15th IST Mobile and Wireless Communication Summit Mykonos, Greece, June, 2006.
  • [MBG06] H. Moustafa , G. Bourdon and Y. Gourhant, Providing Authentication and Access Control in Vehicular Network Environment, Security and Privacy in Dynamic Environments, IFIP International Federation for Information Processing 201, pp. 62-73, 2006.
  • [P06] M. Poturalski, Verification of a VANET protocol, IC-29 miniproject, 2006.
  • [PGH06] P. Papadimitratos, V. Gligor, and J.-P. Hubaux. Securing Vehicular Communications - Assumptions, Requirements, and Principles. In proceedings of the Workshop on Embedded Security in Cars (ESCAR) 2006, Berlin, Germany, November 2006.
  • [PKHK06] P. Papadimitratos, A. Kung, J.-P. Hubaux, and F. Kargl, Privacy and Identity Management for Vehicular Communication Systems: A Position Paper. Workshop on Standards for Privacy in User-Centric Identity Management, Zurich, Switzerland, July 2006.
  • [PNM06] K. Plossl, T. Nowey, and C. Mletzko, Towards a security architecture for vehicular ad hoc networks, The First International Conference on Availability, Reliability and Security. pp.374 -381. ARES, 2006
  • [RAH06] M. Raya, A. Aziz, and J. P. Hubaux, Efficient secure aggregation in VANETs, in Proceedings of International workshop on Vehicular ad hoc networks (VANET), 2006.
  • [RJPAH06] M. Raya, D. Jungels, P. Papadimitratos, I. Aas, J.-P. Hubaux, Certificate Revocation in Vehicular Networks, Reference: LCA-REPORT-2006-006.
  • [RPH06] M. Raya, P. Papadimitratos, and J.-P. Hubaux, Securing Vehicular Communications. In IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, October 2006
  • [RPH06b] M. Raya, P. Papadimitratos, and J.-P. Hubaux, Securing Vehicular Networks, In Infocom'06 - Poster session, April 2006
  • [SHLPMS06] K. Sampigethava, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, CARAVAN: Providing Location Privacy for VANET, in Proceedings of International workshop on Vehicular ad hoc networks (VANET), 2006.
  • [SKLSP06] E. Schoch, F. Kargl, T. Leinmuller, S. Schlott, and P. Papadimitratos. Impact of Pseudonym Changes on Geographic Routing in VANETs. In proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), Hamburg, Germany, October 2006.
  • [SXSSZ06] K. Sha, Y. Xi, W. Shi, L. Schwiebert, and T. Zhang, Adaptive Privacy-Preserving Authentication in Vehicular Networks, in Proceedings of IEEE International Workshop on Vehicle Communication and Applications, Beijing, Oct 27, 2006.
  • [THB06] L. Tang, X. Hong, and P. G. Bradford, Secure Relative Location Determination in Vehicular Network, Mobile Ad-hoc and Sensor Networks, Lecture Notes in Computer Science 4325, pp. 543-554, 2006.
  • [XYG06] B. Xiao, B. Yu, and C. Gao, Detection and localization of sybil nodes in VANETs. International Conference on Mobile Computing and Networking, Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks. Los Angeles, CA, USA, pp. 1-8.

2005
  • [ABDFGKL05] A. Aijaz, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Kroh and T. Leinm¨1ller, Attacks on Inter-Vehicle Communication Systems - An Analysis, Technical Report, NOW-Project, October 2005
  • [CFFGGGSZ05] C.-F. Chiasserini, E. Fasolo, R. Furiato, R. Gaeta, M. Garetto, M. Gribaudo, M. Sereno, A. Zanella, Smart Broadcast of Warning Messages in Vehicular Ad-Hoc Networks, Workshop Interno Progetto NEWCOM (NoE), Turin, Italy, November 18, 2005.
  • [CJW05] J.Y. Choi, M. Jakobsson, and S. Wetzel, Balancing Auditability and Privacy in Vehicular Networks. In Proceedings of ACM Q2SWinet 2005.
  • [D05] F. Dotzer: Privacy Issues in Vehicular Ad Hoc Networks, Workshop on Privacy Enhancing Technologies, Dubrovnik (Cavtat), Croatia, May 30 - June 1, 2005
  • [DFM05] F. Dotzer, L. Fischer, and P. Magiera: VARS: A Vehicle Ad-Hoc Network Reputation System, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Taormina, Italy, June 13-16, 2005.
  • [DKKS05] F. Dotzer, F. Kohlmayer, T. Kosch, M. Strassberger, Secure Communication for Intersection Assistance, WIT 2005: 2nd International Workshop on Intelligent Transportation, Hamburg, Germany, March 15-16, 2005
  • [DKS05] F. Dotzer, T. Kosch, M. Strassberger, Classification for traffic related inter-vehicle messaging, 5th IEEE International Conference on ITS Telecommunications, Brest, France, June 27-29, 2005.
  • [G05] M. Gerlach,“VaneSe-an approach to VANET security,” in Proceedings of the 2nd International Workshop on Vehicle-to-Vehicle Communications (V2VCOM '05), 2005.
  • [I05] M.-Y. Iu, Secure Position Verification through Obfuscation, Mini Project 2005.
  • [N05] M. Nekovee, Modelling the Spread of Computer Worms in Vehicular Ad Hoc Networks, EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK, pp.115-124, 2005.
  • [PP05] Bryan Parno and Adrian Perrig, Challenges in Securing Vehicular Networks, Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), November 14-15, 2005.
  • [RH05] M. Raya and J. P. Hubaux, Security aspects of inter-vehicle communications, in Swiss Transport Research Conference, 2005.
  • [RH05b] M. Raya and J.-P. Hubaux, The Security of Vehicular Ad Hoc Networks, In SASN'05, November 2005
  • [SHLPMS05] K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, CARAVAN: Providing Location Privacy for VANET, in Proceedings of Embedded Security in Cars (ESCAR), November 2005.
  • [Z05] M. T. Zimmer, Surveillance, privacy and the ethics of vehicle safety communication technologies, 2005.

2004
  • [EDSCE04] S. Eichler, F. Dotzer, C. Schwingenschlogl, J. Fabra, and J. Eberspacher, Secure Routing in a Vehicular Ad Hoc Network,IEEE VTC 2004 Fall, Los Angeles, USA, September 26-29, 2004
  • [GGS04] P. Golle, D. Greene, and J. Staddon, Detecting and correcting malicious data in VANETs, in Proceedings of International workshop on Vehicular ad hoc networks (VANET), 2004.
  • [HCL04] J. P. Hubaux, S. Capkun, and J. Luo, The security and privacy of smart vehicles, IEEE Security and Privacy Magazine, Vol. 2, No. 3, pp. 49-55, 2004.


2003 -- Before
  • [MSMB98] B. McMillin, J. Sirois, R. Mahoney, and F. Budd, Fault-Tolerant and Secure Intelligent Vehicle Highway System Software a Safety Prototype, in IEEE International Conference on Intelligent Vehicles, 1998.
  • [ZMTV02] M. E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, Security issues in a future vehicular network, in EuroWireless, 2002.

Last update: Copyright ©2007-2012, Rongxing Lu