[1] |
DE-BRUHL B , WEERAKKODY S , SINOPOLI B ,et al. Is your commute driving you crazy:a study of misbehavior in vehicular platoons[C]// Proceedings of the 8th ACM Conference on Security &Privacy in Wireless and Mobile Networks. 2015: 1-11.
|
[2] |
PI W , YANG P T , DUAN D L ,et al. Malicious user detection for cooperative mobility tracking in autonomous driving[J]. IEEE Internet of Things Journal, 2020,7(6): 4922-4936.
|
[3] |
LEON F , GAVRILESCU M . A review of tracking and trajectory prediction methods for autonomous driving[J]. Mathematics, 2021,9(6): 660.
|
[4] |
DONGRE S , RAHBARI H . Message sieving to mitigate smart gridlock attacks in V2V[C]// Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 2021: 129-134.
|
[5] |
SUN M S , MAN Y M , LI M ,et al. SVM:secure vehicle motion verification with a single wireless receiver[C]// Proceedings of the 13th ACM Conference on Security & Privacy in Wireless and Mobile Networks. 2020: 65-76.
|
[6] |
DE-MEO P , MESSINA F , POSTORINO M N ,et al. A reputation framework to share resources into IoT-based environments[C]// IEEE 14th International Conference on Networking Sensing and Control. 2017: 513-518.
|
[7] |
GROZA B , MURVAY P S . Security solutions for the controller area network:bringing authentication to in vehicle networks[J]. IEEE Vehicular Technology Magazine, 2018,13(1): 40-47.
|
[8] |
SUN M S , LI M , GERDES R . Verification and inference of positions in vehicular networks through anonymous beaconing[J]. IEEE Transactions on Mobile Computing, 2014,13(10): 2415-2428.
|
[9] |
YAN G J , CHOUDHARY G , WEIGLE M C ,et al. Providing VANET security through active position detection[C]// Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks. 2007: 73-74.
|
[10] |
DU C L , ZHANG R D , LOU W J ,et al. Mob track:locating indoor interfering radios with a single device[C]// IEEE INFOCOM, 2016: 1-9.
|
[11] |
KOOPMAN P , WAGNER M . Autonomous vehicle safety:an interdisciplinary challenge[J]. IEEE Intelligent Transportation Systems Magazine, 2017,9(1): 90-96.
|
[12] |
SANDERS C , WANG Y Q . Localizing spoofing attacks on vehicular GPS using vehicle-to-vehicle communications[J]. IEEE Transactions on Vehicular Technology, 2020,69(12): 15656-15667.
|
[13] |
BAKER R , MARTINOVIC I . Secure location verification with a mobile receiver[C]// Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. 2016: 35-46.
|
[14] |
YAO Y , XIAO B , WU G f ,et al. A novel sybil attack detection method based on RSSI for VANET[C]// IEEE International Conference on Dependable Systems and Networks. 2017: 591-602.
|
[15] |
SUN M S , LI M , GERDES R . A data trust framework for VANETsenabling false data detection and secure vehicle tracking[C]// IEEE Conference on Communications and Network Security. 2017: 1-9.
|
[16] |
DE-MEO P , MESSINA F , POSTORINO M N ,et al. A reputation framework to share resources into IoT-based environments[C]// IEEE 14th International Conference on Networking Sensing and Control. 2017: 513-518.
|
[17] |
SUN M S . Secure motion claim verification and decision-making for vehicular cyber-physical systems[D]. Arizona:University of Arizona, 2021.
|
[18] |
LEINMULLER T , SCHOCH E , KARGL F . Position verification approaches for vehicular ad hoc networks[J]. IEEE Wireless Communications Magazine, 2006,13(5): 16-21.
|
[19] |
WONG W E , LI X L , LAPLANTE P A . Be more familiar with our enemies and pave the way forward:a review of the roles bugs played in software failures[J]. Journal of Systems and Software, 2017,133(11): 68-94.
|
[20] |
LI C L , FU Y C , RICHARD F YU ,et al. Vehicle position correction:a vehicular blockchain networks-based GPS error sharing framework[J]. IEEE Transactions on Intelligent Transportation Systems, 2021,22(2): 898-912.
|
[21] |
LI F N , CHANG L B . MEKF with navigation frame attitude error parameterization for INS/GPS[J]. IEEE Sensors Journal, 2020,20(3): 1536-1549.
|
[22] |
RANGANATHAN A , óLAFSDóTTIR H , CAPKUN S . SPREE:a spoofing resistant GPS receiver[C]// Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking. 2016: 348-360.
|