Citation: | SHANGGUAN Wei, ZHA Yuan-yuan, FU Yao, ZHENG Si-fa, CHAI Lin-guo. Vehicle-infrastructure cooperative credible interaction method based on traffic business characteristics understanding[J]. Journal of Traffic and Transportation Engineering, 2022, 22(4): 348-360. doi: 10.19818/j.cnki.1671-1637.2022.04.027 |
[1] |
CHEN Wei, GUO Fang-zhou, WANG Fei-yue. A survey of traffic data visualization[J]. IEEE Transactions on Intelligent Transportation Systems, 2015, 16(6): 2970-2984. doi: 10.1109/TITS.2015.2436897
|
[2] |
YAO De-zhong, YU Chen, YANG L T, et al. Using crowdsourcing to provide QoS for mobile cloud computing[J]. IEEE Transactions on Cloud Computing, 2019, 7(2): 344-356. doi: 10.1109/TCC.2015.2513390
|
[3] |
马永杰, 程时升, 马芸婷, 等. 卷积神经网络及其在智能交通系统中的应用综述[J]. 交通运输工程学报, 2021, 21(4): 48-71. doi: 10.19818/j.cnki.1671-1637.2021.04.003
MA Yong-jie, CHENG Shi-sheng, MA Yun-ting, et al. Review of convolutional neural network and its application in intelligent transportation system[J]. Journal of Traffic and Transportation Engineering, 2021, 21(4): 48-71. (in Chinese) doi: 10.19818/j.cnki.1671-1637.2021.04.003
|
[4] |
LI Wen-jia, SONG Hou-bing. ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(4): 960-969. doi: 10.1109/TITS.2015.2494017
|
[5] |
LU Zhao-jun, QU Gang, LIU Zheng-lin. A survey on recent advances in vehicular network security, trust, and privacy[J]. IEEE Transactions on Intelligent Transportation Systems, 2019, 20(2): 760-776. doi: 10.1109/TITS.2018.2818888
|
[6] |
张毅, 姚丹亚, 李力, 等. 智能车路协同系统关键技术与应用[J]. 交通运输系统工程与信息, 2021, 21(5): 40-51. doi: 10.16097/j.cnki.1009-6744.2021.05.005
ZHANG Yi, YAO Dan-ya, LI Li, et al. Technologies and applications for intelligent vehicle-infrastructure cooperation systems[J]. Journal of Transportation Systems Engineering and Information Technology, 2021, 21(5): 40-51. (in Chinese) doi: 10.16097/j.cnki.1009-6744.2021.05.005
|
[7] |
DENG Ruo-qi, DI Bo-ya, SONG Ling-yang. Cooperative collision avoidance for overtaking maneuvers in cellular V2X-based autonomous driving[J]. IEEE Transactions on Vehicular Technology, 2019, 68(5): 4434-4446. doi: 10.1109/TVT.2019.2906509
|
[8] |
赵祥模, 惠飞, 史昕, 等. 泛在交通信息服务系统的概念、架构与关键技术[J]. 交通运输工程学报, 2014, 14(4): 105-115. http://transport.chd.edu.cn/article/id/201404013
ZHAO Xiang-mo, HUI Fei, SHI Xin, et al. Concept, architecture and challenging technologies of ubiquitous traffic information service system[J]. Journal of Traffic and Transportation Engineering, 2014, 14(4): 105-115. (in Chinese) http://transport.chd.edu.cn/article/id/201404013
|
[9] |
CHETLUR V V, DHILLON H S. Coverage and rate analysis of downlink cellular vehicle-to-everything (C-V2X) communication[J]. IEEE Transactions on Wireless Communications, 2020, 19(3): 1738-1753. doi: 10.1109/TWC.2019.2957222
|
[10] |
ALNASSER A, SUN Hong-jian, JIANG Jing. Cyber security challenges and solutions for V2X communications: a survey[J]. Computer Networks, 2019, 151: 52-67. doi: 10.1016/j.comnet.2018.12.018
|
[11] |
AL-SULTAN S, Al-DOORI M M, AL-BAYATTI A H, et al. A comprehensive survey on vehicular ad hoc network[J]. Journal of Network and Computer Applications, 2014, 37: 380-392. doi: 10.1016/j.jnca.2013.02.036
|
[12] |
上官伟, 史斌, 蔡伯根, 等. 车路协同环境下信道接入协议的优化方法[J]. 交通运输系统工程与信息, 2016, 16(6): 47-53. doi: 10.3969/j.issn.1009-6744.2016.06.008
SHANGGUAN Wei, SHI Bin, CAI Bai-gen, et al. Optimization of channel access protocols and performance evaluation in cooperative vehicle infrastructure environment[J]. Journal of Transportation Systems Engineering and Information Technology, 2016, 16(6): 47-53. (in Chinese) doi: 10.3969/j.issn.1009-6744.2016.06.008
|
[13] |
GHOSAL A, CONTI M. Security issues and challenges in V2X: a survey[J]. Computer Networks, 2020, 169: 107093. doi: 10.1016/j.comnet.2019.107093
|
[14] |
蔡伯根, 王丛丛, 上官伟, 等. 车路协同系统信息交互仿真方法[J]. 交通运输工程学报, 2014, 14(3): 111-119. doi: 10.3969/j.issn.1671-1637.2014.03.020
CAI Bai-gen, WANG Cong-cong, SHANGGUAN Wei, et al. Simulation method of information interaction in CVIS[J]. Journal of Traffic and Transportation Engineering, 2014, 14(3): 111-119. (in Chinese) doi: 10.3969/j.issn.1671-1637.2014.03.020
|
[15] |
LI Teng-long, HUI Fei, ZHAO Xiang-mo, et al. Modelling heterogeneous traffic dynamics by considering the influence of V2V safety messages[J]. IET Intelligent Transport Systems, 2020, 14(4): 220-227. doi: 10.1049/iet-its.2019.0361
|
[16] |
RAWAT D B, POPESCU D C, YAN Gong-jun, et al. Enhancing VANET performance by joint adaptation of transmission power and contention window size[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(9): 1528-1535. doi: 10.1109/TPDS.2011.41
|
[17] |
刘云璐, 蒲菊华, 方维维, 等. 一种无线传感器网络MAC协议优化算法[J]. 计算机学报, 2012, 35(3): 529-539. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJX201203012.htm
LIU Yun-lu, PU Ju-hua, FANG Wei-wei, et al. A MAC layer optimization algorithm in wireless sensor networks[J]. Chinese Journal of Computers, 2012, 35(3): 529-539. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-JSJX201203012.htm
|
[18] |
TAN Shuai-shuai, LI Xiao-ping, DONG Qing-kuai. Trust based routing mechanism for securing OSLR-based MANET[J]. Ad Hoc Networks, 2015, 30: 84-98. doi: 10.1016/j.adhoc.2015.03.004
|
[19] |
VIJAYAKUMAR P, AZEES M, KANNAN A, et al. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(4): 1015-1028. doi: 10.1109/TITS.2015.2492981
|
[20] |
VIJAYAKUMAR P, AZEES M, CHANG V, et al. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks[J]. Cluster Computing, 2017, 20(3): 2439-2450. doi: 10.1007/s10586-017-0848-x
|
[21] |
AZEES M, VIJAYAKUMAR P, DEBOARH L J. EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 18(9): 2467-2476. doi: 10.1109/TITS.2016.2634623
|
[22] |
季一木, 陆毅成, 刘尚东, 等. HIBE-MPJ: 一种基于HIBE的物联网环境下跨域通信机制研究[J]. 南京邮电大学学报(自然科学版), 2020, 40(4): 1-10. https://www.cnki.com.cn/Article/CJFDTOTAL-NJYD202004001.htm
JI Yi-mu, LU Yi-cheng, LIU Shang-dong, et al. HIBE-MPJ: cross-domain communication mechanism based on HIBE in Internet of things environment[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2020, 40(4): 1-10. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-NJYD202004001.htm
|
[23] |
郑明辉, 段洋洋, 吕含笑. 车联网中基于群签名的身份认证协议研究[J]. 工程科学与技术, 2018, 50(4): 130-134. https://www.cnki.com.cn/Article/CJFDTOTAL-SCLH201804017.htm
ZHENG Ming-hui, DUAN Yang-yang, LYU Han-xiao. Research on identity authentication protocol group signature-based in Internet of vehicles[J]. Advanced Engineering Sciences, 2018, 50(4): 130-134. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-SCLH201804017.htm
|
[24] |
杨雪婷, 李重. 车联网中基于车辆行为预测的身份认证方案[J]. 计算机工程, 2021, 47(1): 129-138. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJC202101018.htm
YANG Xue-ting, LI Zhong. Identity authentication scheme based on vehicle behavior prediction for IoV[J]. Computer Engineering, 2021, 47(1): 129-138. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-JSJC202101018.htm
|
[25] |
VUKADINOVIC V, BAKOWSKI K, MARSCH P, et al. 3GPP C-V2X and IEEE 802.11p for vehicle-to-vehicle communications in highway platooning scenarios[J]. Ad Hoc Networks, 2018, 74: 17-29.
|
[26] |
SHAIKH R A, ALZAHRANI A S. Intrusion-aware trust model for vehicular ad hoc networks[J]. Security and Communication Networks, 2014, 7(11): 1652-1669.
|
[27] |
ARSHAD M, ULLAH Z, AHMAD N, et al. A survey of local/cooperative-based malicious information detection techniques in VANETs[J]. EURASIP Journal on Wireless Communications and Networking, 2018, 2018: 62.
|
[28] |
KIM T H J, STUDER A, DUBEY R, et al. VANET alert endorsement using multi-source filters[C]//ACM. Proceedings of the Seventh ACM International Workshop on Vehicular Internetworking. New York: ACM, 2010: 51-60.
|
[29] |
YAO Xuan-xia, ZHANG Xin-lei, NING Huan-sheng, et al. Using trust model to ensure reliable data acquisition in VANETs[J]. Ad Hoc Networks, 2017, 55: 107-118.
|
[30] |
刘伎昭, 董跃钧. 基于空间推理的车联网虚假消息检测方法[J]. 计算机工程与设计, 2020, 41(12): 35-39. https://www.cnki.com.cn/Article/CJFDTOTAL-SJSJ202012005.htm
LIU Ji-zhao, DONG Yue-jun. False messages detection method based on spatial inference in Internet of vehicles[J]. Computer Engineering and Design, 2020, 41(12): 35-39. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-SJSJ202012005.htm
|
[31] |
MUHAMMAD M, SAFDAR G A. Survey on existing authentication issues for cellular-assisted V2X communication[J]. Vehicular Communications, 2018, 12: 50-65.
|