1.
Richard Gilles Engoulou, Martine Bellaiche, Samuel Pierre, Alejandro Quintero, “VANET security surveysâ€, in: computer communications Elsevier, 1- 13, 2014.
2.
O. Trullols, M. Fiore, C. Casetti, C.-F.Chiasserini, J.M. BarceloOrdinas, “Planning roadside infrastructure for information dissemination in intelligent transportation systemsâ€, Comput. Commun.33 (4) 432–442, 2010.
3.
S.S. Kaushik, “Review of different approaches for privacy scheme in VANETsâ€, Int. J. 5 ISSN 2231-1963, 2012.
4.
A.Stampoulis, Z.Chai, “A Survey of Security in Vehicular Networksâ€, Project CPSC 534,2007.
5.
J.-P. Hubaux, S. Capkun, J. Luo, “The security and privacy of smart vehiclesâ€, IEEE Secur.Priv. 2 (3) 49–55, 2004.
6.
C.Wei, Y,Jianding, L. Xiangjun, “The design of electronic license plate recognition terminal system based on nRF24LE1â€, in : 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), pp. 127-129, 2012.
7.
M. J.-P. Hubaux, S. Capkun, J. Luo, “The security and privacy of smart vehiclesâ€, IEEE, J.-P.Hubaux, Securing vehicular ad hoc networks, J. Comput. Secur.15 (1) 39–68, 2007.
8.
Qing Xu, Tony Mak, Jeff Ko, Raja Sengupta “Vehicle-to-Vehicle Safety Messaging in DSRC†ACM 1-58113-922-5/04/0010, October 1, 2004.
9.
I.C. Society, “802.11p– IEEE standard for information technology – local- and metropolitan area networks – specific requirements – part 11â€: Wireless LAN medium access control, (mac) and physical layer (phy) specifications amendment 6: wireless access in vehicular environments, 2010.
10.
DSRC, Dsrc, http://grouper.ieee.org/groups/scc32/dsrc/.
11.
ETSI, European Telecommunications Standards Institute (ETSI), http://www. etsi.org.
12.
ITS, ITS standards fact sheets of IEEE, http://www.standards.its.dot.gov/ factsheets/factsheet/80, seen, April 19, 2014.
13.
L. Miao, K. Djouani, B.J. van Wyk, Y. Hamam, “Evaluation and enhancement of IEEE 802.11 p standard: a surveyâ€, Mob. Comput.1 (1) 2012.
14.
G.Jyoti, M.S.Gaur, in: S, Auerbach (Ed.), “Security of Self-organising Networks MANET, WSN, WMN, VANETâ€, CRC Press, 2010.
15.
Y.wang, F.Li, “Vehicular Ad Hoc Networksâ€, Springer-Verlag, London, 2009.
16.
H. Hartenstein , Kennith P. Laberteaux, “A tutorial survey on vehicular ad hoc networksâ€, IEEE commun. Mag., 2008.
17.
SalehYousefi ,MahmoodSiadatMousavi, MahmoodFathy, “Vehicular Ad Hoc Networks (VANETs) : Challenges and Perspectivesâ€, in : International conference on ITS Telecommunications Proceedings, pp. 1151- 1155, 2006.
18.
J. Kakarla, S. Siva Sathya, B.G. Laxmi, B. Ramesh Babu, “A survey on routing protocols and its issues in VANETâ€, Int. J. Comput. Appl. 28 (4) ISSN 0975-8887, 2011.
19.
L.K. Qabajeh, M.L.M. Kiah, M.M. Qabajeh, “A scalable and secure position-based routing protocols for ad-hoc networksâ€, Malays. J. Comput. Sci. 22 (2) 99–120, 2009.
20.
F.D. Rango, J.-C. Cano, M. Fotino, C. Calafate, P. Manzoni, S. Marano, “OLSR vs DSR: a comparative analysis of proactive and reactive mechanisms from an en- ergetic point of view in wireless ad hoc networksâ€, Comput. Commun.31 (16) 3843–3854, 2008.
21.
Philippe Jacquet, Paul Muhlethaler, Thomas Clausen, AnisLaouiti, Amir Qayyum, Laurent Viennot, “Optimized link state routing protocol for ad hoc net- worksâ€, in: Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings.IEEE International, IEEE, pp. 62–68, 2001.
22.
M. Osman, “The performance of aodv routing protocol based on dropped packet and throughput metrics: a simulation and comparative study for VANETâ€, Int. J. Manag. Inform. Technol. 4 (2) 265–279, 2013.
23.
B. Karp and H.T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networksâ€, in Proceedings of the ACM/IEEE International Conference on MobileComputing and Networking (MobiCom), 2000.
24.
R. Jain, A. Puri, R. Sengupta, “Geographical routing using partial information for wireless ad hoc networksâ€, IEEE Pers. Commun. 8 (1) 48–57, 2001.
25.
H. Rahbar, K. Naik, A. Nayak, “Dtsg: dynamic time-stable geo-cast routing in vehicular ad hoc networksâ€, in: 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), IEEE, pp. 1–7, 2010.
26.
S.-Y. Wang, C.-C.Lin, K.-C.Liu, W.-J. Hong, “On multi-hop forwarding over wbss-based IEEE 802.11 (p)/1609 networksâ€, in: IEEE 20th International Sympo- sium on Personal, Indoor and Mobile Radio Communications, 2009, IEEE, pp. 3040–3044, 2009.
27.
L. Miao, K. Djouani, B.J. van Wyk, Y. Hamam, “Evaluation and enhancement of IEEE 802.11 p standard: a surveyâ€, Mob. Comput.1 (1), 2012.
28.
B. Ducourthial, F. El Ali, et al., “Architecture pour communication vehicular-infrastructureâ€, in: CFIP, 2009.
29.
J.T.Isaac, S. Zeadally, J.S. Camara, “Security attacks and solutions for vehicular ad hoc networksâ€, IET commun, 4 894-903, 2010-04-30.
30.
V.S. Yadav, S. Misra, M. Afaque, “Security of Wireless and Self-Organising Networks: Security in Vehicular Ad hoc Networksâ€, CRC Press, pp.227-250, 2010.
31.
M Raya, P. Papadimitratos, J.P. Hubaux, “Securing vehicular communications, IEEE wirelessâ€, Commun, 13 8-15, 2006.
32.
S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, A. Hassan, “Vehicular ad hoc networks (VANETs): status, results, and challengesâ€, Telecommun. Syst. 50 (4) 217–241, 2012.
33.
A. Dhamgaye, N. Chavhan, “Survey on security challenges in VANETâ€, Int. J. Com- put. Sci. 2 88–96, ISSN 2277-5420, 2013.
34.
J.M. d. Fuentes, A.I. GonzaÌlez-Tablas, A. Ribagorda, “Overview of security issuesin vehicular ad-hoc networksâ€, in: Maria Manuela Cruz-Cunha, Fernando Moreira (Eds.), Handbook of Research on Mobility and Computing, IGI Global, 2010.
35.
B. Schneier, “Applied Cryptographic protocols, Algorithms, and Source Code in Câ€, John Wiley & Sons, Inc., 1996.
36.
R. Minhas, M. Tilal, “Effects of jamming on IEEE 802.11 p systemsâ€, Chalmers University of Technology, 2010.
37.
A. Hamieh, J. Ben-Othman, A. Gueroui, F. Naït-Abdesselam, “Detecting greedy behaviors by linear regression in wireless ad hoc networksâ€, in: IEEE Interna- tional Conference on Communications, ICC’09, IEEE, pp. 1–6, 2009.
38.
J.R. Douceur, “The sybil attackâ€, in: Peer-to-Peer Systems, Springer, pp. 251–260, 2002.
39.
M.S. Al-kahtani, “Survey on security attacks in vehicular ad hoc networks (VANETs)â€, in: 6th International Conference on Signal Processing and Commu- nication Systems (ICSPCS), IEEE, pp. 1–9, 2012.
40.
Nadeem T, Shankar P “A comparative study of data dissemination models for VANETsâ€, IEEE Mob Ubiquitous SystNetwServ: 1–10, 2006.
41.
AmenehDaeinabi, Akbar Ghaffarpour Rahbar “Detection of malicious vehicles (DMV) through monitoring in vehicular Ad-hoc Networks†in : Springer, pp 325-338, 2013 .
42.
Abdulhamid H, Tepe KE, Abdel-Raheem E “Performance of DSRC systems using conventional channel estimation at high velocitiesâ€, Int J Electron Commun: 556–561, 2007.
43.
Picconi F, Ravi N, Gruteser M, Iftode L “Probabilistic validation of aggregated data in Vehicular Ad Hoc Networksâ€, International Conference on Mobile Computing and Networking, Los Angeles, CA, USA: 76–85, 2006.
44.
Raya M, Papadimitratos P, Aad I, Jungels D, Hubaux JP “Eviction of Misbehaving and Faulty Nodes in Vehicular Networksâ€, IEEE J Sel Areas Commun 25(8):1557–1568, 2007.
45.
Ghosh M, Varghese A, Gupta “A Distributed misbehaviour detection in VANETsâ€, IEEE WirelCommun Network Conf: 2909-2914, 2009.
46.
Ghosh M, Varghese A, Kherani AA, Gupta A, Muthaiah SN “Detecting misbehaviour in VANET with integrated root cause analysisâ€, Elsevier AD Hoc Networks 8:778-790, 2010.
47.
Gelle P, Grren D, Staddon J “Detection and correcting malicious data in VANETsâ€, in Proc VANETS’04: 29–37, 2004.
48.
Guo J, Baugh JP, Wang SH “A group signature based secure and privacy-preserving vehicular communication frameworkâ€, Mob NetwVeh Environments: 103–108, 2007.
49.
Li ChT, Hwang MSh, Chu YP, “A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networkâ€, ComputCommun 31(12):2803–2814, 2008.
50.
Raya M, Hubaux JP, “The security of vehicular ad hoc networksâ€, J ComputSecur Spec Issue Secur Ad Hoc Sensor Netw 15(1):39–68, 2007.
51.
Wang NW, Hauang YM, Chen WM, “A novel secure communication scheme in vehicular ad hoc networksâ€, ComputCommun 31(12):2827–2837, 2008.
52.
Wua B, Wua J, Fernandeza EB, Ilyasa M, Magliveras S, “Secure and efficient key management in mobile ad hoc networksâ€, J NetwComputAppl 30:937–954, 2007.
53.
Yan G, Olariu S, Weigle MC, “Providing VANET security through active positionâ€, ComputCommun 31(12):2883–2897, 2008.
54.
Wang Z, Chigan CH, “Countermeasure uncooperative behaviors with dynamic trust-token in VANETsâ€, Proc IEEE IntConfCommun: 3959–3964, 2007.
55.
Wex P, Breuer J, Held A, Leinmuller T, Delgrossi L, “Trust issues for Vehicular Ad-Hoc Networksâ€, VTC.2008: 2800–2804, 2008.
56.
Fonseca E, Festag A, “A survey of existing approaches for secure Ad Hoc routing and their applicability to VANETSâ€, Technical Report NLE-PR, NEC Network Laboratories, 2006.
57.
Uzma Khan, Shikha Agarwal, Sanjay Silakari, “Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networksâ€, in: Elsevier, pp 965- 972, 2015.