[1] |
YANG J, RAWAT D B. Vehicle-To-Vehicle Connectivity Analysis for Vehicular Ad-Hoc Networks[J]. Ad Hoc Networks, 2017, 58:25-35.
doi: 10.1016/j.adhoc.2016.11.017
|
[2] |
LEE M, ATKISON T. VANET Applications:Past,Present,and Future[J]. Vehicular Communications, 2021, 28:100310.
doi: 10.1016/j.vehcom.2020.100310
|
[3] |
MOSTAFA A. VANET Blockchain:A General Framework for Detecting Malicious Vehicles[J]. J.Communications, 2019, 14(5):356-362.
|
[4] |
DAEINABI A, RAHBAR A G. Detection of Malicious Vehicles (DMV) through Monitoring in Vehicular Ad-Hoc Networks[J]. Multimedia Tools and Applications, 2013, 66(2):325-338.
doi: 10.1007/s11042-011-0789-y
|
[5] |
杨哲. 面向车联网的安全机制与关键技术研究[D]. 北京: 北京邮电大学, 2019.
|
[6] |
HUSSAIN R, LEE J, ZEADALLY S. Trust in VANET:A Survey of Current Solutions and Future Research Opportunities[J]. IEEE Transactions on Intelligent Transportation Systems, 2020, 22(5):2553-2571.
doi: 10.1109/TITS.2020.2973715
|
[7] |
TANGADE S, MANVI S S, LORENZ P. Decentralized and Scalable Privacy Preserving Authentication Scheme in VANETs[J]. IEEE Transactions on Vehicular Technology, 2018, 67(9):8647-8655.
doi: 10.1109/TVT.2018.2839979
|
[8] |
LAMSSAGGAD A, BENAMAR N, HAFID A S, et al. A Survey on The Current Security Landscape of Intelligent Transportation Systems[J]. IEEE Access, 2021, 9:9180-9208.
doi: 10.1109/ACCESS.2021.3050038
|
[9] |
SU S, TIAN Z, LIANG S, et al. A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks[J]. IEEE Wireless Communications, 2020, 27(3):46-52.
|
[10] |
RAYA M, PAPADIMITRATOS P, GLIGOR V D, et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks[C]// IEEE INFOCOM 2008-The 27th Conference on Computer Communications.Piscataway:IEEE, 2008:1238-1246.
|
[11] |
DEBRUHL B, WEERAKKODY S, SINOPOLI B, et al. Is Your Commute Driving You Crazy? A Study of Misbehavior in Vehicular Platoons[C]// Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: ACM, 2015:1-11.
|
[12] |
MOREIRA E. An Evaluation of Reputation with Regard to the Opportunistic Forwarding of Messages in VANETs[J]. EURASIP Journal on Wireless Communications and Networking, 2019, 1:1-14.
|
[13] |
XIAO Y G, LIU Y B. Bayes Trust and Vehicle Rank:Constructing An Implicit Web of Trust in VANET[J]. IEEE Transactions on Vehicular Technology, 2019, 68(3):2850-2864.
doi: 10.1109/TVT.2019.2894056
|
[14] |
AHMAD F, KURUGOLLU F, ADNANE A, et al. MARINE:Man-in-The-Middle Attack Resistant Trust Model in Connected Vehicles[J]. IEEE Internet of Things Journal, 2020, 7(4):3310-3322.
doi: 10.1109/JIOT.2020.2967568
|
[15] |
SHRESTHA R, BAJRACHARYA R, NAM S Y. Centralized Approach for Trustworthy Message Dissemination in VANET[C]// NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium.Piscataway:IEEE, 2018:1-5.
|
[16] |
杨颜博, 张嘉伟, 马建峰. 一种使用区块链保护车联网数据隐私的方法[J]. 西安电子科技大学学报, 2021, 48(3):21-30.
|
|
YANG Yanbo, ZHANG Jiawei, MA Jianfeng. Method Forcusing the Blockchain to Protect Data Privacy of IoV[J]. Journal of Xidian University, 2021, 48(3):21-30.
|
[17] |
BELLINI E, IRAQI Y, DAMIANI E. Blockchain-Based Distributed Trust and Reputation Management Systems:A Survey[J]. IEEE Access, 2020, 8:21127-21151.
doi: 10.1109/ACCESS.2020.2969820
|
[18] |
LU Z J, WANG Q, QU G, et al. Bars:A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs[C]// 2018 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering.Piscataway:IEEE, 2018:98-103.
|
[19] |
YANG Z, YANG K, LEI L, et al. Blockchain-Based Decentralized Trust Management in Vehicular Networks[J]. IEEE Internet of Things Journal, 2018, 6(2):1495-1505.
doi: 10.1109/JIOT.2018.2836144
|
[20] |
JOSANG A, HAYWARD R, POPE S. Trust Network Analysis with Subjective Logic[C]// Conference Proceedings of the Twenty-Ninth Australasian Computer Science Conference.Australian Computer Society.Piscataway:IEEE, 2006:85-94.
|
[21] |
LIU G, YANG Q, WANG H, et al. Trust Assessment in Online Social Networks[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 18(2):994-1007.
doi: 10.1109/TDSC.2019.2916366
|
[22] |
KANG J W, YU R, HUANG X M, et al. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks[J]. IEEE Internet of Things Journal, 2018, 6(3):4660-4670.
doi: 10.1109/JIOT.2018.2875542
|
[23] |
LIU G C, YANG Q, WANG H G, et al. Assessment of Multi-Hop Interpersonal Trust in Social Networks by Three-Valued Subjective Logic[C]// IEEE INFOCOM 2014-IEEE Conference on Computer Communications.Piscataway:IEEE, 2014:1698-1706.
|
[24] |
谭帅帅. 信任管理研究及其在保护移动自组织网安全中的应用[D]. 西安: 西安电子科技大学, 2016.
|
[25] |
LIU G C, CHEN Q, YANG Q, et al. Opinionwalk:An Efficient Solution to Massive Trust Assessment in Online Social Networks[C]// IEEE INFOCOM 2017-IEEE Conference on Computer Communications.Piscataway:IEEE, 2017:1-9.
|
[26] |
BAI J B, LI H B, CHEN J P. Multiple Star Node Discovery Algorithm in Social Network Based on Six Degrees of Separation and Greedy Strategy[J]. Recent Trends in Intelligent Computing,Communication and Devices, 2020:623-632.
|
[27] |
SOMMER C, GERMAN R, DRESSLER F. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis[J]. IEEE Transactions on Mobile Computing, 2010, 10(1):3-15.
doi: 10.1109/TMC.2010.133
|
[28] |
CHENG T, LIU G C, YANG Q, et al. Trust Assessment in Vehicular Social Network Based on Three-Valued Subjective Logic[J]. IEEE Transactions on Multimedia, 2019, 21(3):652-663.
doi: 10.1109/TMM.2019.2891417
|