• 1
    CAR 2 CAR Communication Consortium, Decemeber 11, Retrieved: (2012). [accessed on 11 Nov 2012].
  • 2
    Vehicle infrastructure integration, (December 11, Retrieved: 2012). [accessed on 11 Nov 2012].
  • 3
    Internet ITS consortium, (December 11, Retrieved: 2012). [accessed on 11 Nov 2012].
  • 4
    Jiang D, Delgrossi L. IEEE 802.11p: towards an international standard for wireless access in vehicular environments, Proceedings of IEEE Vehicular Technology Conference, Singapore, 2008; 20362040.
  • 5
    European Telecommunications Standards Institute. News Release, September 2008, (December 10, Retrieved: 2012). [accessed on 10 Nov 2012].
  • 6
    Studer A, Luk M, Perrig A. Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs, Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, (SecureComm 2007), Nice, France, 2007; 422432.
  • 7
    Hill C, Garrett J. Jun 2011. AASHTO connected vehicle infrastructure deployment analysis, Technical Report Technical Report FHWA-JPO-11-090, American Association of State Highway and Transportation Officials (AASHTO), Jun 2011.
  • 8
    Nekovee M. Vehicular Communications and Networks (retrieved: 2012-05-12), (4 Jun 2010). [accessed on 5 Dec 2012].
  • 9
    Schoch E, Kargl F, Weber M, Leinmüller T. Communication patterns in VANETs. IEEE Communications Magazine 2008; 46: 119125.
  • 10
    Altan O, Colgin R. Threat assessment algorithm for forward collision warning. Nov 2004. US Patent: US6813562, Filing date: Oct 15, 2002, Publication date: Nov 2, 2004, Original Assignee: General Motors Corporation.
  • 11
    Maïsseu B. IVHW:an inter-vehicle hazard warning system, Proceedings of the International Workshop on Vehicle Safety Communications, Tokyo, JAPAN, 2003.
  • 12
    Nadeem T, Dashtinezhad S, Liao C, Iftode L. TrafficView: traffic data dissemination using car-to-car communication. ACM SIGMOBILE Mobile Computing and Communications Review 2004; 8(3): 619.
  • 13
    Zhang J. A survey on trust management for VANETs, Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA), 2011; 105112.
  • 14
    Chen C, Zhang J, Cohen R, Ho P. A trust modeling framework for message propagation and evaluation in VANETs, Proceedings of the 2nd International Conference on Information Technology Convergence and Services (ITCS), Cebu, Philippines, 2010; 18.
  • 15
    Grover J, Gaur M, Laxmi V. 2013. Trust establishment techniques in VANET, In Wireless Networks and Security, Khan S, Khan Pathan A-S (eds), Signals and Communication Technology, Springer Berlin Heidelberg, DOI: 10.1007/978-3-642-36169-2_8.{8} [accessed on 1 Jun 2013].
  • 16
    Shaikh R, Jameel H, d'Auriol B, Lee H, Lee S, Song Y. Group-based trust management scheme for clustered wireless sensor networks. IEEE Transaction on Parallel and Distributed Systems 2009; 20(11): 16981712.
  • 17
    Raya M, Papadimitratos P, Gligor V, Hubaux J. On data-centric trust establishment in ephemeral ad hoc networks, Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008), Phoenix,USA, 2008; 12381246.
  • 18
    Huang D, Hong X, Gerla M. Situation-aware trust architecture for vehicular networks. IEEE Communications Magazine 2010; 48(11): 128135.
  • 19
    Minhas U, Zhang J, Tran T, Cohen R. Towards expanded trust management for agents in vehicular ad-hoc networks. International Journal of Computational Intelligence: Theory and Practice (IJCITP) 2010; 5(1): 315.
  • 20
    Patwardhan A, Joshi A, Finin T, Yesha Y. A data intensive reputation management scheme for vehicular ad hoc networks, Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, 2006; 18.
  • 21
    Gómez Mármol F, Martínez Pérez G. Trip, a trust and reputation infrastructure-based proposal for vehicular ad-hoc networks. Journal of Network and Computer Applications 2012; 35(3): 934941.
  • 22
    Zhang J, Chen C, Cohen R. Trust modeling for message relay control and local action decision making in vanets. Security and Communication Networks 2013; 6(1): 114.
  • 23
    Zhu H, Du S, Gao Z, Dong M, Cao Z. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks. IEEE Transactions on Parallel and Distributed Systems 2013. DOI:10.1109/TPDS.2013.36.
  • 24
    Huang Z, Ruj S, Cavenaghi M, Nayak A. Limitations of trust management schemes in VANET and countermeasures, Proceedings of the IEEE 22nd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), 2011; 12281232.
  • 25
    Gerlach M. Assessing and improving privacy in VANETs, Proceedings of Fourth Workshop on Embedded Security in Cars (ESCAR), Berlin Germany, 2006.
  • 26
    Gerlach M, Guttler F. Privacy in VANETs using changing pseudonyms-ideal and real, Proceedings of the IEEE 65th Vehicular Technology Conference (VTC2007-Spring), 2007; 25212525.
  • 27
    Chen Y, Wei Y. A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks 2013; 15(2): 153163.
  • 28
    Lee U, Zhou B, Gerla M, Magistretti E, Bellavista P, Corradi A. MobEyes: smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications October 2006; 13(5): 5257.
  • 29
    Zhang L, Yang G. An energy-efficient localization algorithm for mobile vehicles in vehicle to vehicle network. Concurrency and Computation: Practice and Experience 2012; 24(11): 12131222. doi:10.1002/cpe.1894.
  • 30
    Ben-Dor E, Rappaport T, Qiao Y, Lauffenburger S. Millimeter-wave 60 ghz outdoor and vehicle AOA propagation measurements using a broadband channel sounder, IEEE Global Telecommunications Conference (GLOBECOM 2011), Houston, Texas, USA, 2011; 16.
  • 31
    de Jong Y, Herben M. High-resolution angle-of-arrival measurement of the mobile radio channel. IEEE Transactions on Antennas and Propagation Nov 1999; 47(11): 16771687. doi:10.1109/8.814947.
  • 32
    Huang Z. On reputation and data-centric misbehavior detection mechanisms for VANET, Master's Thesis, School of Electrical Engineering & Computer Science, University of Ottawa, 2011.
  • 33
    Hu Y, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003) 2003; 3: 19761986. IEEE.
  • 34
    Pandey H. Design Analysis and Algorithms, Laxmi Publications Pvt Ltd: New Delhi, India, 2008.
  • 35
    SWANS++ – Extensions to the Scalable Wireless Ad-hoc Network Simulator, (April 15, Retrieved: 2013). [accessed on 15 April 2013].
  • 36
    Barr R, Haas Z, Van Renesse R. 2005. Scalable wireless ad hoc network simulation, In Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-peer Networks, Wu J (ed), CRC Press, 2005; 297311.
  • 37
    Choffnes D, Bustamante F. An integrated mobility and traffic model for vehicular wireless networks, Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks, 2005; 6978.
  • 38
    Pfleeger C, Pfleeger S. Analyzing Computer Security: A Threat–vulnerability–countermeasure Approach, Prentice Hall Professional: Upper Saddle River, New Jersey, USA, 2011.