Диссертация (1143658), страница 18
Текст из файла (страница 18)
C., Perrig A., Johnson D. B. Packet leashes: a defense againstwormhole attacks in wireless networks //INFOCOM 2003. Twenty-Second Annual JointConference of the IEEE Computer and Communications. IEEE Societies. – IEEE, 2003.– Т. 3. – С.
1976-1986.35Golparian D. Hardware-based network packet timestamps: improvednetwork clock synchronization: пат. 7768931 США. – 2010.36Perlman R. An overview of PKI trust models //IEEE network. – 1999. – Т.13. – №. 6. – С. 38-43.37Thompson M. R., Essiari A., Mudumbai S. Certificate-based authorizationpolicy in a PKI environment //ACM Transactions on Information and System Security(TISSEC). – 2003. – Т.
6. – №. 4. – С. 566-588.38Hasrouny H. et al. VANet security challenges and solutions: A survey//Vehicular Communications. – 2017. – Т. 7. – С. 7-20.39Nychis G. et al. An empirical evaluation of entropy-based traffic anomalydetection //Proceedings of the 8th ACM SIGCOMM conference on Internetmeasurement. – ACM, 2008. – С. 151-156.40Münz G., Li S., Carle G.
Traffic anomaly detection using k-means clustering//GI/ITG Workshop MMBnet. – 2007. – С. 13-14.41Bellavista P., Corradi A., Giannelli C. Efficiently managing locationinformation with privacy requirements in wi-fi networks: a middleware approach//Wireless Communication Systems, 2005. 2nd International Symposium on. – IEEE,2005. – С. 91-95.42Festag A. et al.
NoW-Network on Wheels: Project Objectives //Technologyand Achievements. – 2008.43Gerlach M. et al. Security architecture for vehicular communication//Workshop on Intelligent Transportation. – 2007.44Stahlmann R. et al. Starting European field tests for Car-2-X communication:the DRIVE C2X framework //18th ITS World Congress and Exhibition. – 2011.12945ETSI E. E. N. 302 665 V1. 1.1: Intelligent Transport Systems (ITS),CommunicationsArchitecture//EuropeanStandard(TelecommunicationsSeries)(September 2010). – 2010.46WG16 I. S.
O. T. C. ISO 21217: 2010: Intelligent transport systems-Communications access for land mobiles (CALM)-Architecture. – 2010.47De La Fortelle A. et al. Network of automated vehicles: the AutoNet 2030vision //ITS World Congress. – 2014.48Obst M. et al.
Challenges for Automated Cooperative Driving: TheAutoNet2030 Approach //Automated Driving. – Springer, Cham, 2017. – С. 561-570.49Robinson T., Chan E., Coelingh E. Operating platoons on public motorways:An introduction to the sartre platooning programme //17th world congress on intelligenttransport systems.
– 2010. – Т. 1. – С. 12.50Bergenhem C. et al. Vehicle-to-vehicle communication for a platooningsystem //Procedia-Social and Behavioral Sciences. – 2012. – Т. 48. – №. 2012. – С. 12221233.51Ku I. et al. Towards software-defined VANET: Architecture and services//2014 13th annual Mediterranean ad hoc networking workshop (MED-HOC-NET). –IEEE, 2014.
– С. 103-110.52Truong N. B., Lee G. M., Ghamri-Doudane Y. Software defined networking-based vehicular adhoc network with fog computing //Integrated Network Management(IM), 2015 IFIP/IEEE International Symposium on. – IEEE, 2015. – С. 1202-1207.53Samara G., Al-Salihy W. A.
H., Sures R. Security analysis of vehicular adhoc nerworks (VANET) //Network Applications Protocols and Services (NETAPPS),2010 Second International Conference on. – IEEE, 2010. – С. 55-60.54Rawat A., Sharma S., Sushil R. VANET: Security attacks and its possiblesolutions //Journal of Information and Operations Management.
– 2012. – Т. 3. – №. 1. –С. 301.55Bhatia J., Shah B. Review on various security threats & solutions andnetwork coding based security approach for VANET //International Journal of Advancesin Engineering & Technology. – 2013. – Т. 6. – №. 1. – С. 361.13056EngoulouR.G.etal.VANETsecuritysurveys//ComputerCommunications. – 2014. – Т. 44. – С.
1-13.57Bariah L. et al. Recent advances in VANET security: a survey //VehicularTechnology Conference (VTC Fall), 2015 IEEE 82nd. – IEEE, 2015. – С. 1-7.58Qu F. et al. A security and privacy review of VANETs //IEEE Transactionson Intelligent Transportation Systems. – 2015. – Т. 16. – №. 6. – С. 2985-2996.59Медведков Д. И.
Угрозы информационной безопасности в сенсорныхсетях VANET //Аллея науки. – 2017. – Т. 4. – №. 10. – С. 829-832.60Kumar A. et al. A review on VANET security attacks and theircountermeasure //Signal Processing, Computing and Control (ISPCC). – 2017. – Т. 2017.– С. 580-585.61Aijaz A. et al. Attacks on inter vehicle communication systems-an analysis//Proc. WIT. – 2006. – С.
189-194.62Ren D., Du S., Zhu H. A novel attack tree based risk assessment approachfor location privacy preservation in the VANETs //Communications (ICC), 2011 IEEEInternational Conference on. – IEEE, 2011. – С. 1-5.63De Fuentes J. M., González-Tablas A. I., Ribagorda A. Overview of securityissues in vehicular ad-hoc networks //Handbook of research on mobility and computing:Evolving technologies and ubiquitous impacts. – IGI Global, 2011.
– С. 894-911.64Al-Qutayri M., Yeun C., Al-Hawi F. Security and privacy of intelligentVANETs //Computational Intelligence and Modern Heuristics. – InTech, 2010.65Malla A. M., Sahu R. K. Security attacks with an effective solution for dosattacks in VANET //International Journal of Computer Applications. – 2013. – Т. 66. –№. 22.66La Vinh H., Cavalli A. R. Security attacks and solutions in vehicular ad hocnetworks: a survey //International journal on AdHoc networking systems (IJANS).
–2014. – Т. 4. – №. 2. – С. 1-20.67Hasrouny H. et al. Security risk analysis of a trust model for secure groupleader-based communication in VANET //Vehicular Ad-Hoc Networks for Smart Cities.– Springer, Singapore, 2017. – С. 71-83.13168Al Junaid M. A. H. et al. Classification of Security Attacks in VANET: AReview of Requirements and Perspectives //MATEC Web of Conferences. – EDPSciences, 2018.
– Т. 150. – С. 06038.69Guette G., Ducourthial B. On the Sybil attack detection in VANET. – 2007.70Xiao B., Yu B., Gao C. Detection and localization of sybil nodes in VANETs//Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networksand sensor networks. – ACM, 2006. – С. 1-8.71Tyagi P., Dembla D. Investigating the security threats in vehicular ad hocnetworks (VANETs): towards security engineering for safer on-road transportation//Advances in Computing, Communications and Informatics (ICACCI, 2014International Conference on. – IEEE, 2014.
– С. 2084-2090.72Zeadally S. et al. Vehicular ad hoc networks (VANETS): status, results, andchallenges //Telecommunication Systems. – 2012. – Т. 50. – №. 4. – С. 217-241.73Bibhu V. et al. Performance analysis of black hole attack in VANET//International Journal Of Computer Network and Information Security. – 2012. – Т. 4. –№. 11. – С. 47.74Raw R. S., Kumar M., Singh N. Security challenges, issues and theirsolutions for VANET //International Journal of Network Security & Its Applications. –2013. – Т. 5.
– №. 5. – С. 95.75Verma S., Mallick B., Verma P. Impact of gray hole attack in VANET //NextGeneration Computing Technologies (NGCT), 2015 1st International Conference on. –IEEE, 2015. – С. 127-130.76Schweitzer N. et al. Contradiction based gray-hole attack minimization forad-hoc networks //IEEE Transactions on Mobile Computing. – 2017. – Т. 16. – №. 8.
–С. 2174-2183.77Puñal O., Aguiar A., Gross J. In VANETs we trust?: characterizing RFjamming in vehicular networks //Proceedings of the ninth ACM international workshopon Vehicular inter-networking, systems, and applications. – ACM, 2012. – С.
83-92.13278Gross J. et al. Experimental characterization and modeling of RF jammingattacks on VANETs //IEEE Transactions on Vehicular Technology. – 2015. – Т. 64. – №.2. – С. 524-540.79Hu Y. C., Perrig A., Johnson D. B. Wormhole attacks in wireless networks//IEEE journal on selected areas in communications. – 2006. – Т. 24. – №.
2. – С. 370380.80Kaur H., Batish S., Kakaria A. An approach to detect the wormhole attack invehicular adhoc networks //International Journal of Smart Sensors and Ad Hoc Networks(IJSSAN) ISSN. – 2012. – №. 2248-9738. – С. 86-89.81Raya M., Hubaux J.
P. Securing vehicular ad hoc networks //Journal ofcomputer security. – 2007. – Т. 15. – №. 1. – С. 39-68.82Lo N. W., Tsai H. C. Illusion attack on vanet applications-a messageplausibility problem //Globecom Workshops, 2007 IEEE. – IEEE, 2007. – С. 1-8.83Bittl S.
et al. Emerging attacks on VANET security based on GPS TimeSpoofing //Communications and Network Security (CNS), 2015 IEEE Conference on. –IEEE, 2015. – С. 344-352.84Sumra I. A., Ab Manan J. L., Hasbullah H. Timing attack in vehicularnetwork //Proceedings of the 15th WSEAS International Conference on Computers,World Scientific and Engineering Academy and Society (WSEAS), Corfu Island, Greece.– 2011. – С.
151-155.85Кочкаров А.А., Кочкаров Р.А. О планарности и других топологическихсвойствах фрактальных графов // Препринты ИПМ Им. М.В. Келдыша, М., 2003. –№ 3. – С. 1-18.86 Харари Ф. Теория графов / Ф. Харари. -М.: Мир, 1973. - 300 С.87Кочкаров, А.М. Алгоритмические вопросы теории фрактальных графов: автореф. дис. … д.физ.-мат.наук : 05.13.16 / Кочкаров Ахмат Магомедович.Черкесск, 1998.88Кочкаров А.А., Кочкаров Р.А.
– Предфрактальные графы впроектировании и анализе сложных структур // Препринты ИПМ Им. М.В.Келдыша, М., 2003. – № 10. – С. 1-21.13389Haklay M., Weber P. Openstreetmap: User-generated street maps //IeeePervas Comput. – 2008. – Т. 7. – №. 4. – С. 12-18.90Haklay M. How good is volunteered geographical information? Acomparative study of OpenStreetMap and Ordnance Survey datasets //Environment andplanning B: Planning and design.
– 2010. – Т. 37. – №. 4. – С. 682-703.91Zilske M., Neumann A., Nagel K. OpenStreetMap for traffic simulation. –92Steiniger S., Hunter A. J. S. Data structure: spatial data on the web2011.//International Encyclopedia of Geography: People, the Earth, Environment andTechnology. – 2016.93Gligorić N., Dejanović I., Krčo S. Performance evaluation of compact binaryXML representation for constrained devices //Distributed Computing in Sensor Systemsand Workshops (DCOSS), 2011 International Conference on.
– IEEE, 2011. – С. 1-5..