|
[1] K. Dar, M. Bakhouya, J. Gaber, M. Wack, and P. Lorenz, “Wireless Communication Technologies for ITS Applications,” IEEE Communications Magazine, Vol. 48, No.5, pp.156-162, 2010. [2] ITS EUROPE, http://www.ertico.com. [3] ITS AMERICA, http://www.itsa.org. [4] ITS JAPAN, http://www.its-jp.org. [5] Intelligent Transportation Society of TAIWAN, http:// www.itstaiwan.org.tw/C/Home.aspx. [6] V. Psaraki, I. Pagoni, and A. Schafer, “Techno-economic Assessment of the Potential of Intelligent Transport Systems to Reduce CO2 Emissions,” IET Intelligent Transport Systems, Vol. 6, No. 4, pp. 355-363, 2012. [7] Auto Mart, http://blog.automart.co.za/2013/03/27/embrace-car-2-car-communication. [8] Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara, “Reputation Systems,” Magazine on Communications of the ACM, Vol. 43, No. 12, pp. 45-48, 2000. [9] Li Qin, A. Malip, K.M. Martin, Ng Siaw-Lynn, and Zhang Jie, “A Reputation-Based Announcement Scheme for VANETs,” IEEE Transactions on Vehicular Technology, Vol. 61, No.9, PP. 4095-4108, 2012. [10] Kim Chil-Hwa, and Bae Ihn-Han, “A Misbehavior-Based Reputation Management System for VANETs,” Embedded and Multimedia Computing Technology and Service, pp. 441-450, 2012. [11] Mármol Félix Gómez, and Pérez Gregorio Martínez, “TRIP, A Trust and Reputation Infrastructure-based Proposal for vehicular Ad Hoc Networks,” Journal of Network and Computer Applications, Vol. 35, No. 3, pp. 934-941, 2012. [12] ebay, http://www.ebay.com. [13] Yahoo, http://tw.bid.yahoo.com. [14] Xuejun Zhuo, Jianguo Hao, Duo Liu, and Yiqi Dai, “Removal of Misbehaving Insiders in Anonymous VANETs,” 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, pp. 106-115, 2009. [15] M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, “Eviction of Misbehaving and Faulty Nodes in Vehicular Networks,”IEEE Journal on Selected Areas in Communications, Vol. 25, No. 8, pp. 1557-1568, 2007. [16] M. Raya, P. Papadimitratos, V.D. Gligor, and J.-P. Hubaux, “On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks,”27th IEEE Conference on Computer Communications, pp. 1238-1246, 2008. [17] B. Ostermaier, F. Dotzer, and M. Strassberger, “Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes,” The Second International Conference on Availability, Reliability and Security, pp. 422-431, 2007. [18] L. Buttyan, and J. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications, Vol. 8, No. 5, pp. 579-592, 2003. [19] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks,” 22th Joint Conference of the IEEE Computer and Communications, Vol. 3, pp. 1987-1997, 2003. [20] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” 6th Annual International Conference on Mobile Computing and Networking, pp. 255-265, 2000. [21] S. Buchegger, and J.Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol,” 3th ACM international symposium on Mobile ad hoc networking and computing, pp. 226-236, 2002. [22] P. Michiardi, and R. Molva, “CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks,”6th Joint Working Conference on Communications and Multimedia Security, Vol. 100, pp. 107-121, 2002. [23] A.A. Pirzada, and C. McDonald, “Trusted Greedy Perimeter Stateless Routing,” 15th IEEE International Conference on Networks, pp. 206-211, 2007. [24] B. Karp, and H.T. Kung, “GPSR:Greedy Perimeter Stateless Routing for Wireless Networks,” 6th Annual International Conference on Mobile Computing and Networking, pp. 243-254, 2000. [25] James Bernsen, and D. Manivannan, “Unicast Routing Protocols for Vehicular Ad Hoc Networks: A Critical Comparison and Classification,”Pervasive and Mobile Computing, Vol. 5, No. 1, pp. 1-18, 2009. [26] S. Ruj, M.A. Cavenaghi, Huang Zhen, A. Nayak, and I. Stojmenovic, “On Data-Centric Misbehavior Detection in VANETs,” IEEE Vehicular Technology Conference, pp. 1-5, 2011. [27] The Network Simulator, http://http://www.isi.edu/nsnam/ns/. [28] VanetMobiSim, http://vanet.eurecom.fr/. [29] A. Rodriguez-Mayol, and J. Gozalvez, “On the Implementation Feasibility of Reputation Techniques for Cooperative Mobile Ad-Hoc Networks,” European Wireless Conference, pp. 616-623, 2010.
|