"Secure and Efficient Trust Opinion Aggregation for Vehicular Ad-hoc Networks" (Chen, Zhang, et al.)
This paper describes a method of trust aggregation based on cluster-based message routing.
This paper describes a method of trust aggregation based on cluster-based message routing.
"Towards Expanded Trust Management for Agents in Vehicular Ad-hoc Networks" (Minhas, Zhang, et al.)
In this document, a model is proposed that combines role-based, experience-based and priority-based experience. Some mathematical models are shown that calculate: the aggregate trust value, a forgetting value that decays old trust values, and calculate a majority opinion.
In this document, a model is proposed that combines role-based, experience-based and priority-based experience. Some mathematical models are shown that calculate: the aggregate trust value, a forgetting value that decays old trust values, and calculate a majority opinion.
"The Security of Vehicular Ad Hoc Networks" (Raya, Hubaux)
This article describes the potential threats to the VANET system and a way of addressing these concerns. Included in these concerns are topics such as jamming and security key validations.
This article describes the potential threats to the VANET system and a way of addressing these concerns. Included in these concerns are topics such as jamming and security key validations.
"Towards a Secure Road System: A Comprehensive Trust Model For Vehicular Ad-Hoc Networks (VANETs)" (Oluoch, Jarnagin, Fu)
This unpublished paper was written by a student in this program last year. It aims to describe all of the current proposals in VANET Trust models.
Network Security Essentials: Applications and Standards 4th Edition by Stallings
Neha and Greg read selected pages, which explained public and private key cryptography.
"A Survey on Trust Management for VANETs" (Zhang)
This general paper included a spreadsheet describing desired properties of VANET models, something we expanded for our own research.
"A Reputation-Based Announcement Scheme for VANETs" (Li, Malip, et al.)
This paper was emailed to us from Dr. Zhang. It does not use RSUs.
The top 6 from IEEE and ACM
Neha and Greg read selected pages, which explained public and private key cryptography.
"A Survey on Trust Management for VANETs" (Zhang)
This general paper included a spreadsheet describing desired properties of VANET models, something we expanded for our own research.
"A Reputation-Based Announcement Scheme for VANETs" (Li, Malip, et al.)
This paper was emailed to us from Dr. Zhang. It does not use RSUs.
The top 6 from IEEE and ACM