[1] |
徐哲鑫, 高楷蒙, 贾文康 ,等. 负载约束的C-V2X车辆缓存节点选择算法[J]. 通信学报, 2021,42(3): 171-182.
|
|
XU Z X , GAO K M , JIA W K ,et al. Vehicular cache nodes selection algorithm under load constraint in C-V2X[J]. Journal on Communications, 2021,42(3): 171-182.
|
[2] |
SUN S H , HU J L , PENG Y ,et al. Support for vehicle-to-everything services based on LTE[J]. IEEE Wireless Communications, 2016,23(3): 4-8.
|
[3] |
邵雯娟, 沈庆国 . 软件定义的D2D和V2X通信研究综述[J]. 通信学报, 2019,40(4): 179-194.
|
|
SHAO W J , SHEN Q G . Survey of software defined D2D and V2X communication[J]. Journal on Communications, 2019,40(4): 179-194.
|
[4] |
WIEST J , H?FFKEN M , KREBEL U ,et al. Probabilistic trajectory prediction with Gaussian mixture models[C]// Proceedings of 2012 IEEE Intelligent Vehicles Symposium. Piscataway:IEEE Press, 2012: 141-146.
|
[5] |
HOUENOU A , BONNIFAIT P , CHERFAOUI V ,et al. Vehicle trajectory prediction based on motion model and maneuver recognition[C]// Proceedings of 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems. Piscataway:IEEE Press, 2014: 4363-4369.
|
[6] |
ALTCHé F , DE-LA-FORTELLE A . An LSTM network for highway trajectory prediction[C]// Proceedings of 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC). Piscataway:IEEE Press, 2018: 353-359.
|
[7] |
MA Y X , ZHU X G , ZHANG S B ,et al. TrafficPredict:trajectory prediction for heterogeneous traffic-agents[J]. Proceedings of the AAAI Conference on Artificial Intelligence, 2019,33(1): 6120-6127.
|
[8] |
张应辉, 胡凌云, 李艺昕 ,等. 空间信息网络中基于动态撤销机制的安全高效批量认证方案[J]. 通信学报, 2022,43(4): 164-176.
|
|
ZHANG Y H , HU L Y , LI Y X ,et al. Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network[J]. Journal on Communications, 2022,43(4): 164-176.
|
[9] |
CHEN S , HU J , SHI Y ,et al. A vision of C-V2X:technologies,field testing and challenges with Chinese development[J]. arXiv Preprint,arXiv:2002.08736, 2020.
|
[10] |
KENNEY J B . Dedicated short-range communications (DSRC) standards in the United States[J]. Proceedings of the IEEE, 2011,99(7): 1162-1182.
|
[11] |
GHARSALLAH I , SMAOUI S , ZARAI F . An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks[J]. IET Information Security, 2020,14(1): 21-29.
|
[12] |
WANG P F , DI B Y , ZHANG H L ,et al. Platoon cooperation in cellular V2X networks for 5G and beyond[J]. IEEE Transactions on Wireless Communications, 2019,18(8): 3919-3932.
|
[13] |
杨芫, 徐明伟, 陈浩 . 5G/后5G部署对互联网主干影响的分析与建模[J]. 通信学报, 2019,40(8): 36-44.
|
|
YANG Y , XU M W , CHEN H . Analysis and modeling of Internet backbone traffic with 5G/B5G[J]. Journal on Communications, 2019,40(8): 36-44.
|
[14] |
ZHANG Y H , DENG R H , BERTINO E ,et al. Robust and universal seamless handover authentication in 5G HetNets[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(2): 858-874.
|
[15] |
CAO J , MA M D , LI H ,et al. A survey on security aspects for 3GPP 5G networks[J]. IEEE Communications Surveys & Tutorials, 2020,22(1): 170-195.
|
[16] |
SHARMA A , JAIN A , SHARMA I . Exposing the security weaknesses of fifth generation handover communication[C]// Proceedings of 2019 10th International Conference on Computing,Communication and Networking Technologies (ICCCNT). Piscataway:IEEE Press, 2019: 1-6.
|
[17] |
LI G J , LAI C Z . Platoon handover authentication in 5G-V2X[C]// Proceedings of 2020 IEEE Conference on Communications and Network Security (CNS). Piscataway:IEEE Press, 2020: 1-2.
|
[18] |
PAN M S , LIN T M , CHEN W T . An enhanced handover scheme for mobile relays in LTE-a high-speed rail networks[J]. IEEE Transactions on Vehicular Technology, 2015,64(2): 743-756.
|
[19] |
MA R H , CAO J , FENG D G ,et al. FTGPHA:fixed-trajectory group pre-handover authentication mechanism for mobile relays in 5G high-speed rail networks[J]. IEEE Transactions on Vehicular Technology, 2020,69(2): 2126-2140.
|
[20] |
YAN X B , MA M D , SU R . A certificateless efficient and secure group handover authentication protocol in 5G enabled vehicular networks[C]// Proceedings of IEEE International Conference on Communications. Piscataway:IEEE Press, 2022: 1678-1684.
|
[21] |
LEE H J , KIM D , CHUNG B ,et al. Adaptive hysteresis using mobility correlation for fast handover[J]. IEEE Communications Letters, 2008,12(2): 152-154.
|
[22] |
ZHANG L , QIN B , WU Q ,et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010,54(14): 2482-2491.
|
[23] |
GARCIA M H C , MOLINA-GALAN A , BOBAN M T ,et al. A tutorial on 5G NR V2X communications[J]. IEEE Communications Surveys &Tutorials, 2021,23(3): 1972-2026.
|
[24] |
3GPP. Architectural enhancements for 5G multicast-broadcast services (Release 17)[R]. 2021.
|
[25] |
HAROUNABADI M , SOLEYMANI D M , BHADAURIA S ,et al. V2X in 3GPP standardization:NR sidelink in release-16 and beyond[J]. IEEE Communications Standards Magazine, 2021,5(1): 12-21.
|
[26] |
3GPP. Security architecture and procedures for 5G system (Release 16):TS33.501[S]. 2022.
|
[27] |
CREMERS C S . Scyther:semantics and verification of security protocols[D]. Eindhoven:Eindhoven University of Technology, 2006.
|
[28] |
LOWE G . A hierarchy of authentication specifications[C]// Proceedings of the 10th Computer Security Foundations Workshop. Piscataway:IEEE Press, 2002: 31-43.
|