|
[1] K. S. J. Pister, J. M. Kahn, and B. E. Boser, ``Smart dust: Wireless networks of millimeter-scale sensor nodes,' tech. rep., Electronics Research Laboratory Research Summary, 1999. [2] D. W. Carman, P. S. Kruus, and B. J. Matt, ``Constraints and approaches for distributed sensor network security,' Tech. Rep. 010, NAI Labs, The Security Research Division Network Associates, Inc., September 2000. [3] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, ``System architecture directions for networked sensors,' SIGPLAN Notices, vol. 35, pp. 93--104, November 2000. [4] R. L. Rivest, A. Shamir, and L. Adleman, ``A method for obtaining digital signatures and public-key cryptosystems,' Communications of the ACM, vol. 21, pp. 120--126, February 1978. [5] M. Rabin, ``Digitalized signatures and public key functions as intractable as factoring,' Tech. Rep. TR-212, Laboratory for Computer Science, Cambridge, MA, USA, 1979. [6] B. Neuman and T. Ts'o, ``Kerberos: an authentication service for computer networks,' IEEE Communications Magazine, vol. 32, pp. 33--38, September 1994. [7] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, ``Spins: security protocols for sensor networks,' Wireless Networks, vol. 8, pp. 521--534, September 2002. [8] J. Liu, A. Sangi, R. Du, and Q. Wu, ``Light weight network coding based key distribution scheme for manets,' in Network and System Security (J. Lopez, X. Huang, and R. Sandhu, eds.), vol. 7873 of Lecture Notes in Computer Science, pp. 521--534, Springer Berlin Heidelberg, 2013. [9] Y. Yang, ``Broadcast encryption based non-interactive key distribution in manets,' Journal of Computer and System Sciences, 2013. [10] L. Eschenauer and V. D. Gligor, ``A key-management scheme for distributed sensor networks,' in Proceedings of the 9th ACM conference on Computer and Communications Security, CCS '02, pp. 41--47, 2002. [11] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, ``A pairwise key predistribution scheme for wireless sensor networks,' ACM Transactions on Information and System Security (TISSEC), vol. 8, pp. 228--258, May 2005. [12] D. Liu and P. Ning, ``Establishing pairwise keys in distributed sensor networks,' in Proceedings of the 10th ACM conference on Computer and communications security, pp. 52--61, ACM, 2003. [13] H. Chan, A. Perrig, and D. Song, ``Random key predistribution schemes for sensor networks,' in Security and Privacy, 2003. Proceedings. 2003 Symposium on, pp. 197-- 213, May 2003. [14] A. Shamir, ``How to share a secret,' Communications of the ACM, vol. 22, pp. 612--613, November 1979. [15] D. Knuth, The Art of Computer Programming, vol 2: Seminumerical Algorithms. Addison-Wesley, 1981. [16] C. Perkins, Ad Hoc Networking. Addison-Wesley, 2001. [17] M. Tompa and H. Woll, ``How to share a secret with cheaters,' in Proceedings on Advances in cryptology---CRYPTO '86, pp. 261--265, Springer-Verlag, 1987. [18] H.-Y. Lin and L. Harn, ``Fair reconstruction of a secret,' Information Processing Letters, vol. 55, no. 1, pp. 45--47, 1995. [19] E. Brickell and D. Stinson, ``The detection of cheaters in threshold schemes,' in Advances in Cryptology —CRYPTO’88, vol. 403 of Lecture Notes in Computer Science, pp. 564--577, Springer Berlin / Heidelberg, 1990. [20] W. Du, J. Deng, Y. Han, and P. Varshney, ``A key predistribution scheme for sensor networks using deployment knowledge,' IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, pp. 62--77, 2006. [21] P. S. Graham, ``Intellectual preservation and electronic intellectual property,' in Proceedings of Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment, Interactive Multimedia Association, January 1994. [22] ``Webopedia: Digital rights management.' http://www.webopedia.com/TERM/D/DRM.html. [23] ``Openmhp.' http://www.openmhp.org/. [24] E. Diehl, ``A four-layer model for security of digital rights management,' in Proceedings of the 8th ACM workshop on Digital rights management, pp. 19--28, 2008. [25] D. Kundur, C.-Y. Lin, B. Macq, and H. Yu, ``Special issue on enabling security technologies for digital rights management,' IEEE Proceedings, vol. 92, pp. 879--882, June 2004. [26] T. C. Xie Lanchi and W. Xingjun, ``A device management and credit evaluation system in home network domain,' in Lecture Notes on Information Theory, vol. Vol. 1, pp. pp. 104--108, September 2013. [27] M. Stamp, ``Digital rights management: The technology behind the hype,' Journal of Electronic Commerce Research, vol. 4, no. 3, 2003. [28] ``Intertrust.' http://www.intertrust.com/. [29] ``Ms-drm: License protocol specification.' http://msdn.microsoft.com/en-us/library/cc227964.aspx. [30] ``Oma.' http://www.openmobilealliance.org/. [31] H. PARK and J. KIM, ``Copyright protection for modifiable digital content based on distributed environment,' IEICE Transactions on Information and Systems, vol. E91.D, no. 5, pp. 1390--1397, 2008. [32] C.-L. Chen, ``An all-in-one mobile drm system design,' International Journal of Innovative Computing, Information and Control, vol. 6, pp. 897--911, March 2010. [33] D. Alessio and M. Joye, ``A simple construction for public-key encryption with revocable anonymity: the honest-sender case,' in Proceedings of the nineth ACM workshop on Digital rights management, pp. 11--16, 2009. [34] J. B. Lotspiech, ``Broadcast encryption versus public key cryptography in content protection systems,' in Proceedings of the nineth ACM workshop on Digital rights management, pp. 39--46, 2009. [35] Q. Liu, R. Safavi-Naini, and N. P. Sheppard, ``Digital rights management for content distribution,' in Proceedings of the Australasian information security workshop conference on ACSW frontiers, pp. 49--58, 2003. [36] R. Song and L. Korba, ``Pay-tv system with strong privacy and non-repudiation protection,' IEEE Transactions on Consumer Electronics, vol. 49, pp. 408 -- 413, May 2003. [37] S. Palavalli, U. S. Srinivas, and A. R. Pais, ``Identity based drm system with total anonymity and device flexibility using ibes,' in Proceedings of High Performance Computing & Simulation Conference, 2008. [38] ``Project dream.' https://dream.dev.java.net/. [39] C. Conrado, F. Kamperman, G. Schrijen, and W. Jonker, ``Privacy in an identitybased drm system,' in Proceedings of 14th International Workshop on Database and Expert Systems Applications, pp. 389 -- 395, September 2003. [40] H.-M. Sun, C.-F. Hung, and C.-M. Chen, ``An improved digital rights management system based on smart cards,' in Proceedings of Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, pp. 308 --313, February 2007. [41] K. Fujita and Y. Tsukada, ``An analysis of interoperability between licenses,' in Proceedings of the tenth annual ACM workshop on Digital rights management, pp. 61--72, 2010. [42] P. A. Jamkhedkar, G. L. Heileman, and C. C. Lamb, ``An interoperable usage management framework,' in Proceedings of the 10th annual ACM workshop on Digital rights management, pp. 73--88, 2010. [43] B.-N. Park, J.-W. Kim, and W. Lee, ``Precept: A privacy-enhancing license management protocol for digital rights management,' in Proceedings of the 18th International Conference on Advanced Information Networking and Applications – Volume 2, p. 574, 2004. [44] B.-N. Park, W. Lee, and J.-W. Kim, ``A license management protocol for protecting user privacy and digital contents in digital rights management systems,' IEICE Transactions on Information And Systems, vol. E88D, no. 8, pp. 1958--1965, 2005. [45] J. Zhang, B. Li, L. Zhao, and S.-Q. Yang, ``License management scheme with anonymous trust for digital rights management,' in Proceedings of IEEE International Conference on Multimedia and Expo, p. 4, July 2005. [46] U. Greveler, ``Enforcing regional drm for multimedia broadcasts with and without trusted computing,' in Digital Rights Management. Technologies, Issues, Challenges and Systems (R. Safavi-Naini and M. Yung, eds.), vol. 3919 of Lecture Notes in Computer Science, pp. 332--340, Springer Berlin / Heidelberg, 2006. [47] Y. Jeong, K. Yoon, and J. Ryou, ``A trusted key management scheme for digital rights management,' ETRI Journal, vol. 27, no. 1, pp. 114--117, 2005. [48] J. Kim, Y. Jeong, K. Yoon, and J. Ryou, ``A trustworthy end-to-end key management scheme for digital rights management,' in Proceedings of the 14th annual ACM international conference on Multimedia, pp. 635--638, 2006. [49] M.-K. Sun, C.-S. Laih, H.-Y. Yen, and J.-R. Kuo, ``A ticket based digital rights management model,' in Proceedings of IEEE 6th Consumer Communications and Networking Conference, pp. 1 --5, January 2009. [50] W. Rosenblatt, W. Trippe, and S. Mooney, Digital Rights Management – Business and Technology. M & T Books, 2002. [51] S. Subramanya and B. Yi, ``Digital rights management,' IEEE Potentials, vol. 25, pp. 31 -- 34, March-April 2006. [52] R. J. Anderson, ``Ueps - a second generation electronic wallet,' in European Symposium on Research in Computer Security, pp. 411--418, 1992. [53] W.-B. Lee, W.-J. Wu, and C.-Y. Chang, ``A portable drm scheme using smart cards,' Journal of Organizational Computing and Electronic Commerce, vol. 17, no. 3, pp. 247--258, 2007. [54] A. Skordylis and N. Trigoni, ``Delay-bounded routing in vehicular ad-hoc networks,' in Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, pp. 341--350, 2008. [55] M. Zhang and R. Wolff, ``Routing protocols for vehicular ad hoc networks in rural areas,' IEEE Communications Magazine, vol. 46, pp. 126 --131, November 2008. [56] M. Uddin, H. Ahmadi, T. Abdelzaher, and R. Kravets, ``A low-energy, multi-copy inter-contact routing protocol for disaster response networks,' in Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1 --9, June 2009. [57] ``Its standards advisory.' http://www.standards.its.dot.gov/Documents/advisories/dsrc_advisory.htm. [58] G. Korkmaz, E. Ekici, F. Özgüner, and U. Özgüner, ``Urban multi-hop broadcast protocol for inter-vehicle communication systems,' in Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, VANET '04, pp. 76--85, ACM, 2004. [59] D. Goodman, J. Borras, N. Mandayam, and R. Yates, ``Infostations: a new system model for data and messaging services,' in Proceedings of the IEEE 47th Vehicular Technology Conference, vol. 2, pp. 969 --973 vol.2, May 1997. [60] R. Frenkiel, B. Badrinath, J. Borres, and R. Yates, ``The infostations challenge: balancing cost and ubiquity in delivering wireless data,' IEEE Personal Communications, vol. 7, pp. 66 --71, Apr. 2000. [61] Q. Xu, T. Mak, J. Ko, and R. Sengupta, ``Vehicle-to-vehicle safety messaging in dsrc,' in Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, VANET '04, pp. 19--28, ACM, 2004. [62] X. Yang, J. Liu, F. Zhao, and N. H. Vaidya, ``A vehicle-to-vehicle communication protocol for cooperative collision warning,' Mobile and Ubiquitous Systems, Annual International Conference on, vol. 0, pp. 114--123, 2004. [63] J. Yin, T. ElBatt, G. Yeung, B. Ryu, S. Habermas, H. Krishnan, and T. Talty, ``Performance evaluation of safety applications over dsrc vehicular ad hoc networks,' in Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pp. 1--9, 2004. [64] Z. Li, C. Liu, and C. Chigan, ``On secure vanet-based ad dissemination with pragmatic cost and effect control,' IEEE Transactions on Intelligent Transportation Systems, vol. 14, no. 1, pp. 124--135, 2013. [65] D. B. Johnson and D. A. Maltz, ``Dynamic source routing in ad hoc wireless networks,' in Mobile Computing (Imielinski and Korth, eds.), vol. 353, Kluwer Academic Publishers, 1996. [66] C. E. Perkins and E. M. Royer, ``Ad-hoc on-demand distance vector routing,' in Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), pp. 90 --100, February 1999. [67] F. Li and Y. Wang, ``Routing in vehicular ad hoc networks: A survey,' IEEE Vehicular Technology Magazine, vol. 2, no. 2, pp. 12 --22, 2007. [68] J. A. D. A. H. Fagg and B. N. Levine, ``Wearable computers as packet transport mechanisms in highly-partitioned ad-hoc networks,' in Proceedings of the 5th IEEE International Symposium on Wearable Computers, pp. 141 -- 148, Octorber 2001. [69] J. Zhao and G. Cao, ``Vadd: Vehicle-assisted data delivery in vehicular ad hoc networks,' IEEE Transactions on Vehicular Technology, vol. 57, pp. 1910 --1922, May 2008. [70] B. Karp and H. T. Kung, ``Gpsr: greedy perimeter stateless routing for wireless networks,' in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 243--254, ACM, 2000. [71] Q. Xu, R. Segupta, D. Jiang, and D. Chrysler, ``Design and analysis of highway safety communication protocol in 5.9 ghz dedicated short range communication spectrum,' in Proceedings of the the 57th IEEE Semiannual Vehicular Technology Conference, vol. 4, pp. 2451 -- 2455 vol.4, April 2003. [72] V. Naumov and T. R. Gross, ``Connectivity-aware routing (car) in vehicular ad-hoc networks,' in The 26th IEEE International Conference on Computer Communications, pp. 1919 --1927, May 2007. [73] J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, ``Vanet routing on city roads using real-time vehicular traffic information,' IEEE Transactions on Vehicular Technology, vol. 58, no. 7, pp. 3609 --3626, 2009. [74] Q. Yang, A. Lim, S. Li, J. Fang, and P. Agrawal, ``Acar: Adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios,' Mobile Networks and Applications, vol. 15, pp. 36--60, February 2010. [75] J. P. Jeong, S. Guo, Y. J. Gu, T. He, and D. H. C. Du, ``Trajectory-based data forwarding for light-traffic vehicular ad hoc networks,' IEEE Transactions on Parallel and Distributed Systems, vol. 22, pp. 743--757, May 2011. [76] K. C. Lee, U. Lee, and M. Gerla, Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, ch. Survey of Routing Protocols in Vehicular Ad Hoc Networks, pp. 149--170. IGI Global, October 2009. [77] C. Lochert, H. Hartenstein, J. Tian, H. Fuessler, D. Hermann, and M. Mauve, ``A routing strategy for vehicular ad hoc networks in city environments,' in In Proceedings of the IEEE Intelligent Vehicles Symposium, pp. 156--161, June 2003. [78] W. Chen, R. K. Guha, T. J. Kwon, J. Lee, and Y.-Y. Hsu, ``A survey and challenges in routing and data dissemination in vehicular ad hoc networks,' Wireless Communications and Mobile Computing, vol. 11, no. 7, pp. 787--795, 2011. [79] K. C. Lee, U. Lee, and M. Gerla, ``Geo-opportunistic routing for vehicular networks,' IEEE Communications Magazine, vol. 48, pp. 164 -- 170, May 2010. [80] ``Tiger, tiger/line and tiger-related products.' http://www.census.gov/geo/www/tiger/. [81] N. Wisitpongphan, F. Bai, P. Mudalige, and O. Tonguz, ``On the routing problem in disconnected vehicular ad-hoc networks,' in Proceedings of the 26th IEEE International Conference on Computer Communications, pp. 2291 --2295, May 2007. [82] ``Move (mobility model generator for vehicular networks): Rapid generation of realistic simulation for vanet..' http://lens1.csie.ncku.edu.tw/MOVE/index.htm, 2007. [83] K. D. and R. C., ``Sumo (simulation of urban mobility).' http://sumo.sourceforge.net/index.shtml, 2007. [84] ``The network simulator - ns-2.' http://www.isi.edu/nsnam/ns/. [85] C. Lochert, M. Mauve, H. Füßler, and H. Hartenstein, ``Geographic routing in city scenarios,' in Proceedings of the ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9, pp. 69--72, January 2005. [86] F. Bohdanowicz, H. Dickel, and C. Steigner, ``Detection of routing loops,' in Proceedings of the 23rd international conference on Information Networking, ICOIN'09, (Piscataway, NJ, USA), pp. 230--234, IEEE Press, 2009. [87] I. Azogu, M. Ferreira, and H. Liu, ``A security metric for vanet content delivery,' in IEEE Global Communications Conference (GLOBECOM), pp. 991--996, 2012.
|