References
- Youngjun Cho, Hyunseung Lee, Namje Park, Dooho Choi, Dongho Won, Seungjoo Kim, "Security Trend of VANET Security," KIISC, Vol. 19, No. 1, pp. 134-142, 2009.
- H. Hartenstein and K. P. Laberteaux, "A Tutorial Survey on Vehicular Ad Hoc Networks," IEEE Communications Magazine, vol. 46, no. 6, pp. 164-171, Jun. 2008.
- Y. Toor, P. Muhlethaler, A. Laouiti, and A. Fortelle, "Vehicular ad hoc networks: Applications and related technical issues," IEEE Communication Survey & Tutorial, vol. 10, no. 3, pp. 74-88, 2008. https://doi.org/10.1109/COMST.2008.4625806
- JongTaek Oh, "5.9GHz DSRC Frequency Standard of America," TTA Journal, vol. 98, pp. 122-132, 2005.
- M. Raya and J. P. Hubaux, "Securing Vehicular Ad hoc Networks," Journal of Computer Security, Vol. 15, No. 1, pp. 39-68, Jan. 2007.
- X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications," IEEE Transaction on Vehicular Technology, Vol. 56, No. 6, pp. 3442-3456. Nov. 2007. https://doi.org/10.1109/TVT.2007.906878
- R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications," Proceedings IEEE INFOCOM, pp. 1903-1911, Apr. 2008.
- C. Zhang, X. Lin, R. Lu, and P. Ho, "RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks," IEEE International Conference on Communications, art. no. 4533317, pp. 1451-1457, May. 2008.
- C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," Proceedings IEEE INFOCOM, pp. 816-824, Apr. 2008.
- A. Ferrara, M. Green, S. Hohenberger, and M. Pedersen, "Practical Short Signature Batch Verification," Proceedings of CT-RSA, Lecture Notes in Computer Science, Vol. 5473, pp. 309-324, Apr. 2009.
- L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, "A Scalable Robust Authentication Protocol for Secure Vehicular Communications," IEEE Transactions on Vehicular Technology, Vol. 59, No. 4, pp. 1606-1617, May. 2010. https://doi.org/10.1109/TVT.2009.2038222
- "ISO 18013-1, Information technology-Personal identification-ISO-compliant driving licence-Part 1: Physical characteristics and basic data set," ISO, 2005.
- "ISO 18013-2, Information technology-Personal identification-ISO-compliant driving licence-Part 2: Machine-readable technologies," ISO, 2007.
- "ISO 18013-3: Information technology-Personal identification-ISO-compliant driving licence-Part 3:Access control, authentication and integrity validation," ISO, 2006.
- Vasileios Manolopoulos, "Security and privacy in smartphone based intelligent transportation systems," Royal institute of technology, 2012.
- "White Paper: How TomToms HDTraffic And IQRoutes Data Provides The Very Best Routing." [Online]. Available: http://www.tomtom.com/lib/doc/download/HDT_White_Paper.pdf. [Accessed: 25-Apr-2012].
- D. Work and A. Bayen, "Impacts of the mobile internet on transportation cyber-physical systems: Traffic monitoring using smartphones," in National Workshop for Research on High-Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, & Rail, pp. 18-20. 2008.
- "Ford Sync." [Online]. Available:http://www.ford.com/technology/sync/. [Accessed: 25-Apr-2012].
- "BMW Connected." [Online]. Available:http://www.bmw.com/com/en/owners/bmw_apps/app_bmw_connected.html. [Accessed: 25-Apr-2012].
- "ITU Key Global Telecom Indicators for the World Telecommunication Service Sector." [Online]. Available: http://www.itu.int/ITUD/ict/statistics/at_glance/KeyTelecom.html. [Accessed: 25-Apr-2012].
- Y. Yim, "The state of cellular probes," 2003. [Online]. Available:http://escholarship.org/uc/item/8g90p0vw.pdf. [Accessed: 11-Apr-2012].
- D. Valerio, A. D'Alconzo, F. Ricciato, and W. Wiedermann, "Exploiting Cellular Networks for Road Traffic Estimation: A Survey and a Research Roadmap," VTC Spring 2009 - IEEE 69th Vehicular Technology Conference, pp. 1-5, Apr. 2009.
- H. Bar-Gera, "Evaluation of a cellular phone-based system for measurements of traffic speeds and travel times: A case study from Israel," Transportation Research Part C: Emerging Technologies, vol. 15, no. 6, pp. 380-391, Dec. 2007. https://doi.org/10.1016/j.trc.2007.06.003
- M. Fontaine, B. Smith, A. Hendricks, and W. Scherer, "Wireless Location Technology-Based Traffic Monitoring: Preliminary Recommendations to Transportation Agencies Based on Synthesis of Experience and Simulation Results," Transportation Research Record, vol. 1993, no. 1, pp. 51-58, Jan. 2007. https://doi.org/10.3141/1993-08
- "Law of DSA", vol. 10008, 2010.
- "Technology of certificate storage and usage ", KISA, 2010.
- Elaine Barker, William Barker, William Burr, William Polk, Miles Smid, "Recommendation for Key Management Part 1: General(Revised)", SP 800-57, NIST, March 2007.
- Elaine Barker, Allen Roginsky, "Transitions:Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths", SP 800-131A, NIST, January 2011.