[1] |
LIU X , ZHAO H , PAN M ,et al. Traffic-aware multiple mix zone placement for protecting location privacy[C]// IEEE INFOCOM. 2012: 972-980.
|
[2] |
ZHANG L , WU Q , QIN B ,et al. Practical secure and privacy-preserving scheme for value-added applications in VANETs[J]. Computer Communications, 2015,71: 50-60.
|
[3] |
刘怡良, 石亚丽, 冯蒿 ,等. 车联网中基于神经网络的入侵检测方案[J]. 通信学报, 2014,72(35): 233-239.
|
|
LIU Y L , SHI Y L , FENG G . Intrusion detection scheme based on neural network in vehicle network[J]. Journal of Communications, 2014,72(35): 233-239.
|
[4] |
FERRAG M , MAGLARAS L , AHMIM A . Privacy-preserving schemes for Ad Hoc social networks:a survey[J]. IEEE Transaction on Communications Surveys & Tutorials, 2017,19(4): 3015-3045.
|
[5] |
LU R , LIN X , LUAN T H ,et al. Pseudonym changing at social spots:an effective strategy for location privacy in VANETs[J]. IEEE Transactions on Vehicular Technology, 2012,61(1): 86-96.
|
[6] |
LIU Y , WANG L , CHEN H H . Message authentication using proxy vehicles in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2015,64(8): 3697-3710.
|
[7] |
BERESFORD A R , STAJANO F . Mix zones:user privacy in location-aware services[C]// IEEE Conference on Pervasive Computing and Communications Workshops. 2004: 127-132.
|
[8] |
BUTTYAN L , HOLCZER T , VAJDA I . On the effectiveness of changing pseudonyms to provide location privacy in VANETs[C]// European Conference on Security and Privacy in Ad-Hoc and Sensor Networks. 2007: 129-141.
|
[9] |
YING B , MAKRAKIS D . Pseudonym changes scheme based on candidate-location-list in vehicular networks[C]// IEEE International Conference on Communications. 2015: 7292-7297.
|
[10] |
LU R , LIN X , LUAN T H ,et al. Pseudonym changing at social spots:an effective strategy for location privacy in VANETs[J]. IEEE Transactions on Vehicular Technology, 2012,61(1): 86-96.
|
[11] |
BUTTYAN L , HOLCZER T , WEIMERSKIRCH A ,et al. SLOW:a practical pseudonym changing scheme for location privacy in VANETs[C]// IEEE Vehicular Networking Conference. 2010: 1-8.
|
[12] |
DAHL M , DELAUNE S , STEEL G . Formal analysis of privacy for vehicular mix-zones[C]// European Symposium on Research in Computer Security Computer Security(ESORICS2010). 2010: 55-70.
|
[13] |
GUO N , MA L , GAO T . Independent mix zone for location privacy in vehicular networks[J].IEEE Access,doi:10.1109/ACCESS.2018.2800907. IEEE Access,doi:10.1109/ACCESS. 2018.2800907.
|
[14] |
SCHEUER F , FUCHS K P , FEDERRATH H . A safety-preserving mix zone for VANETs[C]// International Conference on Trust,Privacy and Security. 2011: 37-48.
|
[15] |
PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2014,14(3): 495-508.
|
[16] |
PALANISAMY B , LIU L . MobiMix:protecting location privacy with mix-zones over road networks[C]// International Conference on Data Engineering. 2011: 494-505.
|
[17] |
SAMPIGETHAYA K , LI M Y , HUANG L P ,et al. Amoeba:robust location privacy scheme for VANET[J]. IEEE Journal on Selected Areas in Communications, 2007,25(8): 1569-1589.
|
[18] |
EMARA K . Safety-aware location privacy in VANET:evaluation and comparison[J]. IEEE Transactions on Vehicular Technology, 2017,66(12): 10718-10731.
|
[19] |
ZENG S , CHEN Y , TAN S ,et al. Concurrently deniable ring authentication and its application to LBS in VANETs[J]. Peer-to-Peer Networking and Applications, 2016,10(4): 1-13.
|
[20] |
HOSMA M . A study of the source traffic generator using poisson distribution for ABR service[J]. Modelling and Simulation in Engineering. 2012(1): 1-6.
|
[21] |
JAYNES E T . Information theory and statistical mechanics[J]. Physical Review, 1957,106(4): 620-630.
|
[22] |
DAN B , BOYEN X , SHACHAM H . Short group signatures[J]. Advances in Cryptology-CRYPTO, 2004,22(6): 41-55.
|
[23] |
刘亚伟 . VANETs中安全认证与隐私保护的研究[D]. 合肥:安徽大学, 2017.
|
|
LIU Y W . Research on security authentication and privacy preservation in VANETs[D]. Hefei:Anhui University, 2017.
|