SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    ETSI TS 102 636–1: “Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 1: Requirements,” v1.1.1, 2010.
  • 2
    ETSI TS 102 636–2: “Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 2: Scenarios,” v1.1.1, 2010.
  • 3
    ETSI TS 102 636–3: “Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 3: Network architecture,” v1.1.1, 2010.
  • 4
    ETSI TS 102 636-4-1: “Intelligent Transport Systems (ITS); Vehicular Communications; Part 4: Geographical Addressing and Forwarding for Point-to-Point and Point-to-Multipoint Communications; Sub-part 1: Media-Independent Functionality,” v0.0.9, 2010.
  • 5
    ETSI TS 102 867: “Intelligent Transport Systems (ITS); Security; Stage 3 mapping for IEEE 1609.2,” v0.0.6, 2010.
  • 6
    Raya M, Hubaux J-P. “The Security of Vehicular Ad Hoc Networks.” In Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2005; 1121.
  • 7
    Haas JJ, Hu, Y-C, Laberteaux KP. “Real-World VANET Security Protocol Performance.” In Proc. of IEEE Global Telecommunications Conference (GLOBECOM), 2009.
  • 8
    Iyer A, Kherani A, Rao A, Karnik A. “Secure V2V Communications: Performance Impact of Computational Overheads.” In Proc. of IEEE Conference on Computer Communications (INFOCOM) Workshop, 2008.
  • 9
    Petit J. “Analysis of ECDSA Authentication Processing in VANETs.” In Prof. of International Conference on New Technologies, Mobility and Security (NTMS), 2009.
  • 10
    Lee J-H, Ernst T. “Overhead analysis on secure beaconing for GeoNetworking.” In Proc. of IEEE Intelligent Vehicles Symposium (IV), 2011; 10491053.
  • 11
    ETSI TS 102 636-6-1: “Intelligent Transport Systems (ITS); Vehicular Communications; Part 6: Internet Integration; Sub-part 1: Transmission of IPv6 Packets over GeoNetworking Protocols,” v0.0.9, 2010.
  • 12
    Papadimitratos P, Buttyan L, Holczer T, et al. “Secure Vehicular Communication Systems: Design and Architecture.” IEEE Communications Magazine 2008; 46(11): 100109.
  • 13
    Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A. “Efficient and Robust Pseudonymous Authentication in VANET.” In Proc. of ACM Workshop on Vehicular ad hoc networks (VANET), 2007; 1927.
  • 14
    Lin X, Sun X, Ho P-H, Shen X. “GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications.” IEEE Transactions on Vehicular Technology 2007; 56(6): 34423456.
  • 15
    Bianchi G. “Performance Analysis of the IEEE 802.11 Distributed Coordination Function.” IEEE Journal on Selected Areas in Communications 2000; 18(3): 535547.
  • 16
    Dong XJ, Varaiya P. “Saturation Throughput Analysis of IEEE 802.11 Wireless LANs for a Lossy Channel.” IEEE Communications Letters 2005; 9(2): 100102.
  • 17
    Ma X, Chen X. Saturation Performance of IEEE 802.11 Broadcast Networks.” IEEE Communications Letters 2007; 11(8): 686688.
  • 18
    Ma X, Chen X. “Performance Analysis of IEEE 802.11 Broadcast Scheme in Ad Hoc Wireless LANs.” IEEE Transactions on Vehicular Technology 2008; 57(6): 37573768.
  • 19
    Papadimitratos P, de La Fortelle A, Evenssen K, Brignolo R, Cosenza S. “Vehicular Communication Systems: Enabling Technologies, Applications, and Future Outlook on Intelligent Transportation.” IEEE Communications Magazine 2009; 47(11): 8495.