Skip to main content

2017 | OriginalPaper | Buchkapitel

Smart Transportation Systems: Architecture, Enabling Technologies, and Open Issues

verfasst von : Hansong Xu, Jie Lin, Wei Yu

Erschienen in: Secure and Trustworthy Transportation Cyber-Physical Systems

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of smart sensors, smart vehicles, and vehicular communication technologies, the smart transportation system is proposed and considered to be the future of the transportation critical infrastructure system, aiming to improve traffic efficiency, safety, and security. All vehicles and roadside infrastructures will be deployed with integrated smart sensors and communication units in order that traffic states can be measured and shared via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication networks. With the smart transportation system, diversified services can be provided to customers, including traffic and transportation management, safety management, and others. In addition, the optimal travel for users (e.g., drivers) can be achieved, travel safety can be realized, and road congestion can be reduced in the smart transportation system. Nonetheless, security issues, including illegal access, attacks, unauthorized information sharing, and so on, become challenging in the smart transportation system. In order to understand smart transportation systems such that techniques can be designed to make them secure, this chapter conducts a review of smart transportation systems with respect to architecture, enabling technologies, and open issues. To be specific, a three-layer architecture is first presented for the smart transportation system, including the physical layer, communication layer, and service layer. Then, the detailed components and enabling technologies in each layer are described. Finally, we present some open issues related to security, big data, performance, and evaluation platforms in the smart transportation system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbassi, S.H., Qureshi, I.M., & Abbasi, H. (2014). Performance of uni-directional road side units in vehicular adhoc networks. In: Proceedings of World Congress on Computer Applications and Information Systems (WCCAIS). Abbassi, S.H., Qureshi, I.M., & Abbasi, H. (2014). Performance of uni-directional road side units in vehicular adhoc networks. In: Proceedings of World Congress on Computer Applications and Information Systems (WCCAIS).
2.
Zurück zum Zitat Abdelgader, A., & Lenan, W. (2014). The physical layer of the ieee 802.11 p wave communication standard: the specifications and challenges. In: Proceedings of the world congress on engineering and computer science. Abdelgader, A., & Lenan, W. (2014). The physical layer of the ieee 802.11 p wave communication standard: the specifications and challenges. In: Proceedings of the world congress on engineering and computer science.
3.
Zurück zum Zitat Ahmed-Zaid, F., Bai, F., Bai, S., Basnayake, C., Bellur, B., Brovold, S., Brown, G., et al. (2011). Vehicle safety communications–applications (vsc-a) final report: appendix volume 1 system design and objective test. Technical Report. Ahmed-Zaid, F., Bai, F., Bai, S., Basnayake, C., Bellur, B., Brovold, S., Brown, G., et al. (2011). Vehicle safety communications–applications (vsc-a) final report: appendix volume 1 system design and objective test. Technical Report.
4.
Zurück zum Zitat Al-kahtani, M.S. (2012). Survey on security attacks in vehicular ad hoc networks (vanets). In: Proceedings of 6th International Conference on Signal Processing and Communication Systems (ICSPCS). Al-kahtani, M.S. (2012). Survey on security attacks in vehicular ad hoc networks (vanets). In: Proceedings of 6th International Conference on Signal Processing and Communication Systems (ICSPCS).
5.
Zurück zum Zitat Al-Rabayah, M., & Malaney, R. (2010). A new hybrid location-based ad hoc routing protocol. In Proceedings of ieee global telecommunications conference (GLOBECOM). Al-Rabayah, M., & Malaney, R. (2010). A new hybrid location-based ad hoc routing protocol. In Proceedings of ieee global telecommunications conference (GLOBECOM).
6.
Zurück zum Zitat Al-Rabayah, M., & Malaney, R. (2012). A new scalable hybrid routing protocol for vanets. IEEE Transactions on Vehicular Technology (TVT), 61(6), 2625–2635.CrossRef Al-Rabayah, M., & Malaney, R. (2012). A new scalable hybrid routing protocol for vanets. IEEE Transactions on Vehicular Technology (TVT), 61(6), 2625–2635.CrossRef
7.
Zurück zum Zitat Altayeb, M., & Mahgoub, I. (2013). A survey of vehicular ad hoc networks routing protocols. International Journal of Innovation and Applied Studies, 3(3), 829–846. Altayeb, M., & Mahgoub, I. (2013). A survey of vehicular ad hoc networks routing protocols. International Journal of Innovation and Applied Studies, 3(3), 829–846.
8.
Zurück zum Zitat An, S.H., Lee, B.H., & Shin, D.R. (2011). A survey of intelligent transportation systems. In Proceedings of third international conference on computational intelligence, communication systems and networks (CICSyN). An, S.H., Lee, B.H., & Shin, D.R. (2011). A survey of intelligent transportation systems. In Proceedings of third international conference on computational intelligence, communication systems and networks (CICSyN).
9.
Zurück zum Zitat Anagnostopoulos, P., Papapanagiotakis, G., & Gonos, F., (1992). Pan-drive: A vehicle navigation and route guidance system. In Proceedings of the 3rd International Conference on Vehicle Navigation and Information Systems. Anagnostopoulos, P., Papapanagiotakis, G., & Gonos, F., (1992). Pan-drive: A vehicle navigation and route guidance system. In Proceedings of the 3rd International Conference on Vehicle Navigation and Information Systems.
10.
Zurück zum Zitat Chahbi, I., Ben Amara, D., & Belghith, A., (2013). A novel route guidance algorithm using beamforming techniques for vehicular networks. In Proceedings of IEEE 38th conference on local computer networks workshops (LCN Workshops). Chahbi, I., Ben Amara, D., & Belghith, A., (2013). A novel route guidance algorithm using beamforming techniques for vehicular networks. In Proceedings of IEEE 38th conference on local computer networks workshops (LCN Workshops).
11.
Zurück zum Zitat Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., et al. (2011). Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of 20th USENIX security symposium (SEC). Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., et al. (2011). Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of 20th USENIX security symposium (SEC).
12.
Zurück zum Zitat Chen, W., Guha, R. K., Kwon, T. J., Lee, J., & Hsu, Y. Y. (2011). A survey and challenges in routing and data dissemination in vehicular ad hoc networks. Wireless Communications and Mobile Computing, 11(7), 787–795.CrossRef Chen, W., Guha, R. K., Kwon, T. J., Lee, J., & Hsu, Y. Y. (2011). A survey and challenges in routing and data dissemination in vehicular ad hoc networks. Wireless Communications and Mobile Computing, 11(7), 787–795.CrossRef
13.
Zurück zum Zitat Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W., & Lu, C. (2016). A cloud computing based network monitoring and threat detection system for critical infrastructures. International journal of big data research (elsevier)-special issue on big data from networking perspective 3:10–23. Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W., & Lu, C. (2016). A cloud computing based network monitoring and threat detection system for critical infrastructures. International journal of big data research (elsevier)-special issue on big data from networking perspective  3:10–23.
14.
Zurück zum Zitat Deng, H., Zeng, Q.A., & Agrawal, D.P. (2003). Svm-based intrusion detection system for wireless ad hoc networks. In Proceedings of IEEE 58th vehicular technology conference, VTC 2003-Fall. Deng, H., Zeng, Q.A., & Agrawal, D.P. (2003). Svm-based intrusion detection system for wireless ad hoc networks. In Proceedings of IEEE 58th vehicular technology conference, VTC 2003-Fall.
15.
Zurück zum Zitat Ding, J. W., Wang, C. F., Meng, F. H., & Wu, T. Y. (2010). Real-time vehicle route guidance using vehicle-to-vehicle communication. IET Communications, 4(7), 870–883.MathSciNetCrossRef Ding, J. W., Wang, C. F., Meng, F. H., & Wu, T. Y. (2010). Real-time vehicle route guidance using vehicle-to-vehicle communication. IET Communications, 4(7), 870–883.MathSciNetCrossRef
16.
Zurück zum Zitat Djojo, M., & Karyono, K. (2013). Computational load analysis of dijkstra, a*, and floyd-warshall algorithms in mesh network. In Proceedings of IEEE international conference on robotics, biomimetics, and intelligent computational systems (ROBIONETICS). Djojo, M., & Karyono, K. (2013). Computational load analysis of dijkstra, a*, and floyd-warshall algorithms in mesh network. In Proceedings of IEEE international conference on robotics, biomimetics, and intelligent computational systems (ROBIONETICS).
17.
Zurück zum Zitat Dong, W., Vu, H., & Vo, Q. (2011). Real time route guidance with correlated link cost. In Proceedings of IEEE 14th international conference on intelligent transportation systems (ITSC). Dong, W., Vu, H., & Vo, Q. (2011). Real time route guidance with correlated link cost. In Proceedings of IEEE 14th international conference on intelligent transportation systems (ITSC).
18.
Zurück zum Zitat D’Orey, P., & Ferreira, M. (2014). Its for sustainable mobility: A survey on applications and impact assessment tools. IEEE Transactions on Intelligent Transportation Systems, 15(2), 477–493.CrossRef D’Orey, P., & Ferreira, M. (2014). Its for sustainable mobility: A survey on applications and impact assessment tools. IEEE Transactions on Intelligent Transportation Systems, 15(2), 477–493.CrossRef
19.
Zurück zum Zitat Ekedebe, N., Lu, C., & Yu, W. (2015). On experimental evaluation of intelligent transportation system (its) safety and traffic efficiency. In Proceedings of IEEE international conference on communication (ICC). Ekedebe, N., Lu, C., & Yu, W. (2015). On experimental evaluation of intelligent transportation system (its) safety and traffic efficiency. In Proceedings of IEEE international conference on communication (ICC).
20.
Zurück zum Zitat Elkosantini, S., & Darmoul, S. (2013). Intelligent public transportation systems: A review of architectures and enabling technologies. In Proceedings of international conference on advanced logistics and transport (ICALT). Elkosantini, S., & Darmoul, S. (2013). Intelligent public transportation systems: A review of architectures and enabling technologies. In Proceedings of international conference on advanced logistics and transport (ICALT).
21.
Zurück zum Zitat Ezell, S. (2010). Explaining international it application leadership: Intelligent transportation systems. Ezell, S. (2010). Explaining international it application leadership: Intelligent transportation systems.
22.
Zurück zum Zitat Faezipour, M., Nourani, M., Saeed, A., & Addepalli, S. (2012). Progress and challenges in intelligent vehicle area networks. Communication of ACM, 55(2), 90–100.CrossRef Faezipour, M., Nourani, M., Saeed, A., & Addepalli, S. (2012). Progress and challenges in intelligent vehicle area networks. Communication of ACM, 55(2), 90–100.CrossRef
23.
Zurück zum Zitat Fallah, Y. P., Nasiriani, N., & Krishnan, H. (2016). Stable and fair power control in vehicle safety networks. IEEE Transactions on Vehicular Technology, 65(3), 1662–1675.CrossRef Fallah, Y. P., Nasiriani, N., & Krishnan, H. (2016). Stable and fair power control in vehicle safety networks. IEEE Transactions on Vehicular Technology, 65(3), 1662–1675.CrossRef
24.
Zurück zum Zitat Fan, D., & Shi, P. (2010). Improvement of dijkstra’s algorithm and its application in route planning. In Proceedings of seventh international conference on fuzzy systems and knowledge discovery (FSKD). Fan, D., & Shi, P. (2010). Improvement of dijkstra’s algorithm and its application in route planning. In Proceedings of seventh international conference on fuzzy systems and knowledge discovery (FSKD).
25.
Zurück zum Zitat Festag, A. (2015). Standards for vehicular communication-from ieee 802.11 p to 5g. e & i. Elektrotechnik und Informationstechnik, 132(7), 409–416.CrossRef Festag, A. (2015). Standards for vehicular communication-from ieee 802.11 p to 5g. e & i. Elektrotechnik und Informationstechnik, 132(7), 409–416.CrossRef
26.
Zurück zum Zitat Gillani, S.A., Shah, P.A., Qayyum, A., & Hasbullah, H.B. (2015). Mac layer challenges and proposed protocols for vehicular ad-hoc networks. In Vehicular ad-hoc networks for smart cities, Springer, pp. 3–13. Gillani, S.A., Shah, P.A., Qayyum, A., & Hasbullah, H.B. (2015). Mac layer challenges and proposed protocols for vehicular ad-hoc networks. In Vehicular ad-hoc networks for smart cities, Springer, pp. 3–13.
28.
Zurück zum Zitat Goyal, M.K., Verma, Y.K., Bassi, P., & Misra, P.K. (2013). Performance analysis of ad hoc on-demand distance vector routing and dynamic source routing using ns2 simulation. In Mobile communication and power engineering, Springer, pp. 390–396. Goyal, M.K., Verma, Y.K., Bassi, P., & Misra, P.K. (2013). Performance analysis of ad hoc on-demand distance vector routing and dynamic source routing using ns2 simulation. In Mobile communication and power engineering, Springer, pp. 390–396.
30.
Zurück zum Zitat Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., & Saidane, L. A. (2015). Tdma-based mac protocols for vehicular ad hoc networks: A survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials, 17(4), 2461–2492.CrossRef Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., & Saidane, L. A. (2015). Tdma-based mac protocols for vehicular ad hoc networks: A survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials, 17(4), 2461–2492.CrossRef
31.
Zurück zum Zitat Harding, J., Powell, G., Yoon, R., Fikentscher, J., Doyle, C., Sade, D., Lukuc, M. et al. (2014). Vehicle-to-vehicle communications: Readiness of v2v technology for application. Technical Report. Harding, J., Powell, G., Yoon, R., Fikentscher, J., Doyle, C., Sade, D., Lukuc, M. et al. (2014). Vehicle-to-vehicle communications: Readiness of v2v technology for application. Technical Report.
32.
Zurück zum Zitat Hartenstein, H., & Laberteaux, L. (2008). A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine, 46(6), 164–171.CrossRef Hartenstein, H., & Laberteaux, L. (2008). A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine, 46(6), 164–171.CrossRef
33.
Zurück zum Zitat Hematian, A., Yu, W., Lu, C., Griffith, D., & Golmie, N. (2016). Clustering-based device-to-device communication to support diverse applications. In Proceedings of ACM International Conference on Reliable & Convergent Systems (RACS). Hematian, A., Yu, W., Lu, C., Griffith, D., & Golmie, N. (2016). Clustering-based device-to-device communication to support diverse applications. In Proceedings of ACM International Conference on Reliable & Convergent Systems (RACS).
34.
Zurück zum Zitat Hu, L., Eichinger, J., Dillinger, M., Botsov, M., & Gozalvez, D. (2016). Unified device-to-device communications for low-latency and high reliable vehicle-to-x services. In Proceedings of IEEE Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd. Hu, L., Eichinger, J., Dillinger, M., Botsov, M., & Gozalvez, D. (2016). Unified device-to-device communications for low-latency and high reliable vehicle-to-x services. In Proceedings of IEEE Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd.
35.
Zurück zum Zitat Huang, Y., Yang, X., Yang, S., Yu, W., & Fu, X. (2011). A cross-layer approach handling link asymmetry for wireless mesh access networks. IEEE Transactions on Vehicular Technology (TVT), 60(3), 1045–1058.CrossRef Huang, Y., Yang, X., Yang, S., Yu, W., & Fu, X. (2011). A cross-layer approach handling link asymmetry for wireless mesh access networks. IEEE Transactions on Vehicular Technology (TVT), 60(3), 1045–1058.CrossRef
36.
Zurück zum Zitat Jarupan, B., & Ekici, E. (2011). A survey of cross-layer design for vanets. Ad Hoc Networks, 9(5), 966–983.CrossRef Jarupan, B., & Ekici, E. (2011). A survey of cross-layer design for vanets. Ad Hoc Networks, 9(5), 966–983.CrossRef
37.
Zurück zum Zitat Ji, S., Kim, J., & You, C. (2015). An efficient directional mac protocol for vehicular ad-hoc networks. Journal of the Institute of Electronics and Information Engineers, 52(4), 9–16.CrossRef Ji, S., Kim, J., & You, C. (2015). An efficient directional mac protocol for vehicular ad-hoc networks. Journal of the Institute of Electronics and Information Engineers, 52(4), 9–16.CrossRef
38.
Zurück zum Zitat Jiang, D., & Delgrossi, L. (2008). Ieee 802.11 p: Towards an international standard for wireless access in vehicular environments. In Proceedings of ieee vehicular technology conference, 2008. VTC Spring 2008. IEEE. Jiang, D., & Delgrossi, L. (2008). Ieee 802.11 p: Towards an international standard for wireless access in vehicular environments. In Proceedings of ieee vehicular technology conference, 2008. VTC Spring 2008. IEEE.
39.
Zurück zum Zitat Jo, Y., & Jeong, J. (2016). Rpa: Road-side units placement algorithm for multihop data delivery in vehicular networks. In Proceedings of 30th international conference on advanced information networking and applications workshops (WAINA). Jo, Y., & Jeong, J. (2016). Rpa: Road-side units placement algorithm for multihop data delivery in vehicular networks. In Proceedings of 30th international conference on advanced information networking and applications workshops (WAINA).
40.
Zurück zum Zitat Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4), 584–616.CrossRef Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4), 584–616.CrossRef
41.
Zurück zum Zitat Karp, B., & Kung, H.T. (2000). Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (ACM). Karp, B., & Kung, H.T. (2000). Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (ACM).
42.
Zurück zum Zitat Kastell, K. (2014). Security requirements in communication networks for transportation systems. In Proceedings of 16th international conference on transparent optical networks (ICTON). Kastell, K. (2014). Security requirements in communication networks for transportation systems. In Proceedings of 16th international conference on transparent optical networks (ICTON).
43.
Zurück zum Zitat Kenney, J. B. (2011). Dedicated short-range communications (dsrc) standards in the united states. Proceedings of the IEEE, 99(7), 1162–1182.CrossRef Kenney, J. B. (2011). Dedicated short-range communications (dsrc) standards in the united states. Proceedings of the IEEE, 99(7), 1162–1182.CrossRef
44.
Zurück zum Zitat Khanjary, M., & Hashemi, S. (2012). Route guidance systems: Review and classification. In Proceedings of 6th euro american conference on telematics and information systems (EATIS). Khanjary, M., & Hashemi, S. (2012). Route guidance systems: Review and classification. In Proceedings of 6th euro american conference on telematics and information systems (EATIS).
45.
Zurück zum Zitat Khanjary, M., Faez, K., Meybodi, M., & Sabaei, M. (2011). Persiangulf: an autonomous combined traffic signal controller and route guidance system. In Proceedings of IEEE vehicular technology conference (VTC Fall). Khanjary, M., Faez, K., Meybodi, M., & Sabaei, M. (2011). Persiangulf: an autonomous combined traffic signal controller and route guidance system. In Proceedings of IEEE vehicular technology conference (VTC Fall).
46.
Zurück zum Zitat Khosroshahi, A., Keshavarzi, P., KoozehKanani, & Z., Sobhi, J. (2011). Acquiring real time traffic information using vanet and dynamic route guidance. In Proceedings of IEEE 2nd International Conference on Computing, Control and Industrial Engineering (CCIE). Khosroshahi, A., Keshavarzi, P., KoozehKanani, & Z., Sobhi, J. (2011). Acquiring real time traffic information using vanet and dynamic route guidance. In Proceedings of IEEE 2nd International Conference on Computing, Control and Industrial Engineering (CCIE).
47.
Zurück zum Zitat Kim, D., Velasco, Y., Yang, Z., Wang, W., Hussain, R., & Uma, R.N. (2016). Cost effective mobile and static road side unit deployment for vehicular adhoc networks. In Proceedings of international conference on computing, networking and communications (ICNC). Kim, D., Velasco, Y., Yang, Z., Wang, W., Hussain, R., & Uma, R.N. (2016). Cost effective mobile and static road side unit deployment for vehicular adhoc networks. In Proceedings of international conference on computing, networking and communications (ICNC).
48.
Zurück zum Zitat Kim, R., Lim, H., & Krishnamachari, B. (2015). Prefetching-based data dissemination in vehicular cloud systems. IEEE Transactions on Vehicular Technology (TVT) PP(99):1–1. Kim, R., Lim, H., & Krishnamachari, B. (2015). Prefetching-based data dissemination in vehicular cloud systems. IEEE Transactions on Vehicular Technology (TVT) PP(99):1–1.
49.
Zurück zum Zitat Klaus Finkenzeller, D.M. (2010). RFID Handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication, 3rd edn. Wiley. Klaus Finkenzeller, D.M. (2010). RFID Handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication, 3rd edn. Wiley.
50.
Zurück zum Zitat Kleberger, P., Olovsson, T., & Jonsson, E. (2011). Security aspects of the in-vehicle network in the connected car. In Proceedings of IEEE intelligent vehicles symposium (IV). Kleberger, P., Olovsson, T., & Jonsson, E. (2011). Security aspects of the in-vehicle network in the connected car. In Proceedings of IEEE intelligent vehicles symposium (IV).
51.
Zurück zum Zitat Knapp, A. (2011). Nevada passes law authorizing driverless cars. In: Forbes. Knapp, A. (2011). Nevada passes law authorizing driverless cars. In: Forbes.
52.
Zurück zum Zitat Kukreja, D., Dhurandher, S. K., & Reddy, B. (2015). Enhancing the security of dynamic source routing protocol using energy aware and distributed trust mechanism in manets. In Intelligent distributed computing (pp. 83–94). Springer. Kukreja, D., Dhurandher, S. K., & Reddy, B. (2015). Enhancing the security of dynamic source routing protocol using energy aware and distributed trust mechanism in manets. In Intelligent distributed computing (pp. 83–94). Springer.
53.
Zurück zum Zitat Kumar, P. N., et al. (2013). A novel method to avoid stale route cache problem of dynamic source routing protocol for mobile ad hoc network. In Proceedings of the IEEE International Conference On Current Trends in Engineering and Technology (ICCTET). Kumar, P. N., et al. (2013). A novel method to avoid stale route cache problem of dynamic source routing protocol for mobile ad hoc network. In Proceedings of the IEEE International Conference On Current Trends in Engineering and Technology (ICCTET).
55.
Zurück zum Zitat LeLann, G. (2015). Safety in vehicular networks–on the inevitability of short-range directional communications. In Proceedings of the International Conference on Ad-Hoc Networks and Wireless (Springer). LeLann, G. (2015). Safety in vehicular networks–on the inevitability of short-range directional communications. In Proceedings of the International Conference on Ad-Hoc Networks and Wireless (Springer).
56.
Zurück zum Zitat Leontiadis, I., Marfia, G., Mack, D., Pau, G., Mascolo, C., & Gerla, M. (2011). On the effectiveness of an opportunistic traffic management system for vehicular networks. IEEE Transactions on Intelligent Transportation Systems, 12(4), 1537–1548.CrossRef Leontiadis, I., Marfia, G., Mack, D., Pau, G., Mascolo, C., & Gerla, M. (2011). On the effectiveness of an opportunistic traffic management system for vehicular networks. IEEE Transactions on Intelligent Transportation Systems, 12(4), 1537–1548.CrossRef
57.
Zurück zum Zitat Li, C., Anavatti, S., & Ray, T. (2014). Analytical hierarchy process using fuzzy inference technique for real-time route guidance system. IEEE Transactions on Intelligent Transportation Systems, 15(1), 84–93.CrossRef Li, C., Anavatti, S., & Ray, T. (2014). Analytical hierarchy process using fuzzy inference technique for real-time route guidance system. IEEE Transactions on Intelligent Transportation Systems, 15(1), 84–93.CrossRef
58.
Zurück zum Zitat Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: A survey. IEEE Vehicular Technology Magazine, 2(2), 12–22.CrossRef Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: A survey. IEEE Vehicular Technology Magazine, 2(2), 12–22.CrossRef
59.
Zurück zum Zitat Li, S. (2012). A survey of urban traffic coordination controls in intelligent transportation systems. In Proceedings of the IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). Li, S. (2012). A survey of urban traffic coordination controls in intelligent transportation systems. In Proceedings of the IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).
60.
Zurück zum Zitat Li, W., & Song, H. (2016). Art: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.CrossRef Li, W., & Song, H. (2016). Art: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.CrossRef
61.
Zurück zum Zitat Li, W., Joshi, A., & Finin, T. (2010). Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach. In Proceedings of the Eleventh International Conference on Mobile Data Management. Li, W., Joshi, A., & Finin, T. (2010). Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach. In Proceedings of the Eleventh International Conference on Mobile Data Management.
62.
Zurück zum Zitat Lin, J., & Yu, W. (2014). Yang X (2016a) On false data injection attack against multistep electricity price in electricity market in smart grid. IEEE Transactions on Parallel and Distributed Systems (TPDS), 27, 286–302.CrossRef Lin, J., & Yu, W. (2014). Yang X (2016a) On false data injection attack against multistep electricity price in electricity market in smart grid. IEEE Transactions on Parallel and Distributed Systems (TPDS), 27, 286–302.CrossRef
63.
Zurück zum Zitat Lin, J., Yu, W., Yang, X., Yang, Q., Fu, X., & Zhao, W. (2016b). A real-time en-route route guidance decision scheme for transportation-based cyber-physical systems. IEEE Transactions on Vehicular Technology (TVT) PP(99), 1–1. Lin, J., Yu, W., Yang, X., Yang, Q., Fu, X., & Zhao, W. (2016b). A real-time en-route route guidance decision scheme for transportation-based cyber-physical systems. IEEE Transactions on Vehicular Technology (TVT) PP(99), 1–1.
64.
Zurück zum Zitat Lin, J., Yu, W., Zhang, N., Yang, X., & Ge, L. (2017). On data integrity attack against route guidance in transportation-based cyber-physical systems. In Proceedings of Annual IEEE Consumer Communications and Networking (CCNC). Lin, J., Yu, W., Zhang, N., Yang, X., & Ge, L. (2017). On data integrity attack against route guidance in transportation-based cyber-physical systems. In Proceedings of Annual IEEE Consumer Communications and Networking (CCNC).
65.
Zurück zum Zitat Liu, J., Wan, J., Wang, Q., Zeng, B., & Fang, S. (2016). A time-recordable cross-layer communication protocol for the positioning of vehicular cyber-physical systems. Future Generation Computer Systems, 56, 438–448.CrossRef Liu, J., Wan, J., Wang, Q., Zeng, B., & Fang, S. (2016). A time-recordable cross-layer communication protocol for the positioning of vehicular cyber-physical systems. Future Generation Computer Systems, 56, 438–448.CrossRef
66.
Zurück zum Zitat Liu, Y., Tian, B., Chen, S., Zhu, F., Wang, K. (2013). A survey of vision-based vehicle detection and tracking techniques in its. In Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES). Liu, Y., Tian, B., Chen, S., Zhu, F., Wang, K. (2013). A survey of vision-based vehicle detection and tracking techniques in its. In Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES).
67.
Zurück zum Zitat Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom). Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom).
69.
Zurück zum Zitat MirEmail, Z. H., & Filali, F. (2014). Lte and ieee 802.11p for vehicular networking: a performance evaluation. EURASIP Journal on Wireless Communications and Networking, 2014(89). MirEmail, Z. H., & Filali, F. (2014). Lte and ieee 802.11p for vehicular networking: a performance evaluation. EURASIP Journal on Wireless Communications and Networking, 2014(89).
70.
Zurück zum Zitat Mittag, J., Papanastasiou, S., Hartenstein, H., & Strom, E. G. (2011). Enabling accurate cross-layer phy/mac/net simulation studies of vehicular communication networks. Proceedings of the IEEE, 99(7), 1311–1326.CrossRef Mittag, J., Papanastasiou, S., Hartenstein, H., & Strom, E. G. (2011). Enabling accurate cross-layer phy/mac/net simulation studies of vehicular communication networks. Proceedings of the IEEE, 99(7), 1311–1326.CrossRef
71.
Zurück zum Zitat Morais, A., & Cavalli, A. (2012). A distributed intrusion detection scheme for wireless ad hoc networks. In Proceedings of the 27th Annual ACM Symposium on Applied Computing. Morais, A., & Cavalli, A. (2012). A distributed intrusion detection scheme for wireless ad hoc networks. In Proceedings of the 27th Annual ACM Symposium on Applied Computing.
72.
Zurück zum Zitat Morgan, Y. L. (2010). Notes on dsrc & wave standards suite: Its architecture, design, and characteristics. IEEE Communications Surveys & Tutorials, 12(4), 504–518.CrossRef Morgan, Y. L. (2010). Notes on dsrc & wave standards suite: Its architecture, design, and characteristics. IEEE Communications Surveys & Tutorials, 12(4), 504–518.CrossRef
73.
Zurück zum Zitat Mostefaoui, A., Melkemi, M., & Boukerche, A. (2014). Localized routing approach to bypass holes in wireless sensor networks. IEEE Transactions on Computers (TC), 63(12), 3053–3065.MathSciNetCrossRefMATH Mostefaoui, A., Melkemi, M., & Boukerche, A. (2014). Localized routing approach to bypass holes in wireless sensor networks. IEEE Transactions on Computers (TC), 63(12), 3053–3065.MathSciNetCrossRefMATH
74.
Zurück zum Zitat Nakamura, J. (2005). Image sensors and signal processing for digital still cameras. In Optical science and engineering: CRC Press. Nakamura, J. (2005). Image sensors and signal processing for digital still cameras. In Optical science and engineering: CRC Press.
75.
Zurück zum Zitat Namboodiri, V., & Gao, L. (2007). Prediction-based routing for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology (TV), 56(4), 2332–2345.CrossRef Namboodiri, V., & Gao, L. (2007). Prediction-based routing for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology (TV), 56(4), 2332–2345.CrossRef
76.
Zurück zum Zitat Oh, H., Yae, C., Ahn, D., & Cho, H. (1999). 5.8 ghz dsrc packet communication system for its services. In Proceedings of IEEE Vehicular Technology Conference. Oh, H., Yae, C., Ahn, D., & Cho, H. (1999). 5.8 ghz dsrc packet communication system for its services. In Proceedings of IEEE Vehicular Technology Conference.
77.
Zurück zum Zitat Owojaiye, G., & Sun, Y. (2012). Focal design issues affecting the deployment of wireless sensor networks for intelligent transport systems. IET Intelligent Transport Systems, 6(4), 432–432.CrossRef Owojaiye, G., & Sun, Y. (2012). Focal design issues affecting the deployment of wireless sensor networks for intelligent transport systems. IET Intelligent Transport Systems, 6(4), 432–432.CrossRef
78.
Zurück zum Zitat Pingley, A., Yu, W., Zhang, N., Fu, X., & Zhao, W. (2009). Cap: A context-aware privacy protection system for location-based services. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). Pingley, A., Yu, W., Zhang, N., Fu, X., & Zhao, W. (2009). Cap: A context-aware privacy protection system for location-based services. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS).
79.
Zurück zum Zitat Qing, S., & Xiaofan, W. (2011). An efficient route computation approach for large graphs. In Proceedings of the 30th Chinese Control Conference (CCC). Qing, S., & Xiaofan, W. (2011). An efficient route computation approach for large graphs. In Proceedings of the 30th Chinese Control Conference (CCC).
80.
Zurück zum Zitat Ratwani, V., & Shah, A. (2015). Network coding and cross-layer approach for reliability and optimization of routing in vanet: A survey. International Journal of Computer Applications, 113(13). Ratwani, V., & Shah, A. (2015). Network coding and cross-layer approach for reliability and optimization of routing in vanet: A survey. International Journal of Computer Applications, 113(13).
81.
Zurück zum Zitat Sassi, A., Charfi, F., Kamoun, L., Elhillali, Y., & Rivenq, A. (2014). Ofdm transmission performance evaluation in v2x communication. arXiv:14108039. Sassi, A., Charfi, F., Kamoun, L., Elhillali, Y., & Rivenq, A. (2014). Ofdm transmission performance evaluation in v2x communication. arXiv:​14108039.
82.
Zurück zum Zitat Schnemann, B. (2016). V2x simulation runtime infrastructure vsimrti: An assessment tool to design smart traffic management systems. Computer Networks, 55(14), 3189–3198.CrossRef Schnemann, B. (2016). V2x simulation runtime infrastructure vsimrti: An assessment tool to design smart traffic management systems. Computer Networks, 55(14), 3189–3198.CrossRef
83.
Zurück zum Zitat Sedjelmaci, H., Bouali, T., & Senouci, S. M (2014) Detection and prevention from misbehaving intruders in vehicular networks. In Proceedings of IEEE Global Communications Conference (GLOBECOM). Sedjelmaci, H., Bouali, T., & Senouci, S. M (2014) Detection and prevention from misbehaving intruders in vehicular networks. In Proceedings of IEEE Global Communications Conference (GLOBECOM).
84.
Zurück zum Zitat Selamat, A., Zolfpour-Arokhlo, M., Hashim, S., & Selamat, M. (2011). A fast path planning algorithm for route guidance system. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC). Selamat, A., Zolfpour-Arokhlo, M., Hashim, S., & Selamat, M. (2011). A fast path planning algorithm for route guidance system. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC).
85.
Zurück zum Zitat Shulman, M., & Deering, R. (2007). Vehicle safety communications in the united states. In Proceedings of the Conference on Experimental Safety Vehicles. Shulman, M., & Deering, R. (2007). Vehicle safety communications in the united states. In Proceedings of the Conference on Experimental Safety Vehicles.
86.
Zurück zum Zitat Skordylis, A., & Trigoni, N. (2008). Delay-bounded routing in vehicular ad-hoc networks. In Proceedings of the 9th ACM International Symposium on Mobile ad hoc Networking and Computing. Skordylis, A., & Trigoni, N. (2008). Delay-bounded routing in vehicular ad-hoc networks. In Proceedings of the 9th ACM International Symposium on Mobile ad hoc Networking and Computing.
87.
Zurück zum Zitat Song, Q., & Wang, X. (2011). Efficient routing on large road networks using hierarchical communities. IEEE Transactions on Intelligent Transportation Systems, 12(1), 132–140.CrossRef Song, Q., & Wang, X. (2011). Efficient routing on large road networks using hierarchical communities. IEEE Transactions on Intelligent Transportation Systems, 12(1), 132–140.CrossRef
89.
Zurück zum Zitat Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaaniche, M., Laarouchi, Y. (2013). Survey on security threats and protection mechanisms in embedded automotive networks. In Proceedings of 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W). Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaaniche, M., Laarouchi, Y. (2013). Survey on security threats and protection mechanisms in embedded automotive networks. In Proceedings of 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
90.
Zurück zum Zitat Sun, W., Hu, L., Li, P., & Wang, H. (2012). A bi-level optimal control approach to route guidance problem considering travelers’ stochastic compliance. In Proceedings of the of Proceedings of International Conference on Modelling, Identification Control (ICMIC). Sun, W., Hu, L., Li, P., & Wang, H. (2012). A bi-level optimal control approach to route guidance problem considering travelers’ stochastic compliance. In Proceedings of the of Proceedings of International Conference on Modelling, Identification Control (ICMIC).
91.
Zurück zum Zitat Tian, D., Yuan, Y., Zhou, J., Wang, Y., Lu, G., Xia, H. (2013). Real-time vehicle route guidance based on connected vehicles. In Proceedings of IEEE International Conference on and IEEE Cyber, Physical and Social Computing. Tian, D., Yuan, Y., Zhou, J., Wang, Y., Lu, G., Xia, H. (2013). Real-time vehicle route guidance based on connected vehicles. In Proceedings of IEEE International Conference on and IEEE Cyber, Physical and Social Computing.
92.
Zurück zum Zitat Tielert, T., Jiang, D., Hartenstein, H., & Delgrossi, L. (2013). Joint power/rate congestion control optimizing packet reception in vehicle safety communications. In Proc. of the tenth ACM international workshop on Vehicular inter-networking, systems, and applications (ACM). Tielert, T., Jiang, D., Hartenstein, H., & Delgrossi, L. (2013). Joint power/rate congestion control optimizing packet reception in vehicle safety communications. In Proc. of the tenth ACM international workshop on Vehicular inter-networking, systems, and applications (ACM).
93.
Zurück zum Zitat Torrent-Moreno, M., Mittag, J., Santi, P., & Hartenstein, H. (2009). Vehicle-to-vehicle communication: fair transmit power control for safety-critical information. IEEE Transactions on Vehicular Technology (TVT), 58(7), 3684–3703.CrossRef Torrent-Moreno, M., Mittag, J., Santi, P., & Hartenstein, H. (2009). Vehicle-to-vehicle communication: fair transmit power control for safety-critical information. IEEE Transactions on Vehicular Technology (TVT), 58(7), 3684–3703.CrossRef
95.
Zurück zum Zitat Tyagi, P., & Dembla, D. (2014). Investigating the security threats in vehicular ad hoc networks (vanets): Towards security engineering for safer on-road transportation. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI). Tyagi, P., & Dembla, D. (2014). Investigating the security threats in vehicular ad hoc networks (vanets): Towards security engineering for safer on-road transportation. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI).
96.
Zurück zum Zitat Wang, J., Sun, Y., Liu, Z., Yang, P., Lin, T. (2007a). Route planning based on floyd algorithm for intelligence transportation system. In Proceedings of the IEEE International Conference on Integration Technology (ICIT). Wang, J., Sun, Y., Liu, Z., Yang, P., Lin, T. (2007a). Route planning based on floyd algorithm for intelligence transportation system. In Proceedings of the IEEE International Conference on Integration Technology (ICIT).
97.
Zurück zum Zitat Wang, Y., Wu, Y., Liu, Y., Tang, A. (2007b). The application of radio frequency identification technology on tires tracking. In Proceedings of the 2007 IEEE International Conference on Automation and Logistics. Wang, Y., Wu, Y., Liu, Y., Tang, A. (2007b). The application of radio frequency identification technology on tires tracking. In Proceedings of the 2007 IEEE International Conference on Automation and Logistics.
98.
Zurück zum Zitat Wei, M., & Meng, Y. (2014). Research on the optimal route choice based on improved dijkstra. In Proceedings of IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA). Wei, M., & Meng, Y. (2014). Research on the optimal route choice based on improved dijkstra. In Proceedings of IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA).
99.
Zurück zum Zitat Wu, C., Zhang, X., Dong, Y. (2013). Route guidance systems based on real-time information. In Proceedings of International Conference on Connected Vehicles and Expo (ICCVE). Wu, C., Zhang, X., Dong, Y. (2013). Route guidance systems based on real-time information. In Proceedings of International Conference on Connected Vehicles and Expo (ICCVE).
100.
Zurück zum Zitat Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X., & Lu, C. (2015). A cloud computing based system for cyber security management. International Journal of Parallel, Emergent and Distributed Systems (IJPEDS) 30(1), 29–45. Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X., & Lu, C. (2015). A cloud computing based system for cyber security management. International Journal of Parallel, Emergent and Distributed Systems (IJPEDS)  30(1), 29–45.
101.
Zurück zum Zitat Xu, Q., Mak, T., Ko, J, Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in dsrc. In Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks. Xu, Q., Mak, T., Ko, J, Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in dsrc. In Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks.
102.
Zurück zum Zitat Y Z, X Z, S Z, s G. (2012). Intelligent transportation system based on internet of things. In Proceedings of World Automation Congress (WAC). Y Z, X Z, S Z, s G. (2012). Intelligent transportation system based on internet of things. In Proceedings of World Automation Congress (WAC).
103.
Zurück zum Zitat Yan, X., Zhang, H., Wu, C. (2012). Research and development of intelligent transportation systems. In Proceedings of 11th International Symposium on Distributed Computing and Applications to Business, Engineering Science (DCABES). Yan, X., Zhang, H., Wu, C. (2012). Research and development of intelligent transportation systems. In Proceedings of 11th International Symposium on Distributed Computing and Applications to Business, Engineering Science (DCABES).
104.
Zurück zum Zitat Yang, Q., Lim, A., Li, S., Fang, J., & Agrawal, P. (2010). Acar: Adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios. Mobile Networks and Applications, 15(1), 36–60.CrossRef Yang, Q., Lim, A., Li, S., Fang, J., & Agrawal, P. (2010). Acar: Adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios. Mobile Networks and Applications, 15(1), 36–60.CrossRef
105.
Zurück zum Zitat Yang, Q., Yang, J., Yu, W., An, D., Zhang, N., & Zhao, W. (2014). On false data-injection attacks against power system state estimation: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed System (TPDS), 25(3), 717–729.CrossRef Yang, Q., Yang, J., Yu, W., An, D., Zhang, N., & Zhao, W. (2014). On false data-injection attacks against power system state estimation: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed System (TPDS), 25(3), 717–729.CrossRef
106.
Zurück zum Zitat Yang, X., Lin, J., Yu, W., Moulema, P., Fu, X., & Zhao, W. (2015). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers (TC), 64(1), 4–18.MathSciNetCrossRefMATH Yang, X., Lin, J., Yu, W., Moulema, P., Fu, X., & Zhao, W. (2015). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers (TC), 64(1), 4–18.MathSciNetCrossRefMATH
107.
Zurück zum Zitat Ye, P., Chen, C., Zhu, F. (2011). Dynamic route guidance using maximum flow theory and its mapreduce implementation. In Proceedings of 14th International IEEE Conference on Intelligent Transportation Systems (ITSC). Ye, P., Chen, C., Zhu, F. (2011). Dynamic route guidance using maximum flow theory and its mapreduce implementation. In Proceedings of 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).
108.
Zurück zum Zitat Yu, W., Lee, J. (2002). Dsr-based energy-aware routing protocols in ad hoc networks. In Proceedings of IEEE International Conference on Wireless Network (ICWN). Yu, W., Lee, J. (2002). Dsr-based energy-aware routing protocols in ad hoc networks. In Proceedings of IEEE International Conference on Wireless Network (ICWN).
109.
Zurück zum Zitat Yu, W., Boyer, P.C., Chellappan, S., Xuan, D. (2005). Peer-to-peer system-based active worm attacks: Modeling and analysis. In Proceedings of the IEEE International Conference on Communications (ICC). Yu, W., Boyer, P.C., Chellappan, S., Xuan, D. (2005). Peer-to-peer system-based active worm attacks: Modeling and analysis. In Proceedings of the IEEE International Conference on Communications (ICC).
110.
Zurück zum Zitat Yu, W., Wang, X., Calyam, P., Xuan, D., Zhao, W. (2006). On detecting camouflaging worm. In Proceedings of Annual Computer Security Applications Conference (ACSAC). Yu, W., Wang, X., Calyam, P., Xuan, D., Zhao, W. (2006). On detecting camouflaging worm. In Proceedings of Annual Computer Security Applications Conference (ACSAC).
111.
Zurück zum Zitat Yu, W., Zhang, N., Fu, X., & Zhao, W. (2010). Self-disciplinary worms: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed Systems (TPDS), 21(10), 1501–1514.CrossRef Yu, W., Zhang, N., Fu, X., & Zhao, W. (2010). Self-disciplinary worms: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed Systems (TPDS), 21(10), 1501–1514.CrossRef
112.
Zurück zum Zitat Yu, W., Xu, G., Chen, Z., & Moulema, P. (2013). A cloud computing based architecture for cyber security situation awareness. In: Proceedings of 4th International Workshop on Security and Privacy in Cloud Computing (SPCC). Yu, W., Xu, G., Chen, Z., & Moulema, P. (2013). A cloud computing based architecture for cyber security situation awareness. In: Proceedings of 4th International Workshop on Security and Privacy in Cloud Computing (SPCC).
113.
Zurück zum Zitat Yu, W., Xu, H., Hematian, A., Griffith, D., & Golmie, N. (2016a). Towards energy efficiency in ultra dense networks. In Proceedings of IEEE International Performance Computing and Communications Conference (IPCCC). Yu, W., Xu, H., Hematian, A., Griffith, D., & Golmie, N. (2016a). Towards energy efficiency in ultra dense networks. In Proceedings of IEEE International Performance Computing and Communications Conference (IPCCC).
114.
Zurück zum Zitat Yu, W., Xu, H., Zhang, H., Griffith, D., & Golmie, N. (2016b). Ultra dense networks: State of art and future directions. In Proceedings of IEEE International Conference on Computer Communication and Networks (ICCCN). Yu, W., Xu, H., Zhang, H., Griffith, D., & Golmie, N. (2016b). Ultra dense networks: State of art and future directions. In Proceedings of IEEE International Conference on Computer Communication and Networks (ICCCN).
115.
Zurück zum Zitat Zhang, J., Wang, F. Y., Wang, K., Lin, W. H., Xu, X., & Chen, C. (2011). Data-driven intelligent transportation systems: A survey. IEEE Transactions on Intelligent Transportation Systems, 12(4), 1624–1639.CrossRef Zhang, J., Wang, F. Y., Wang, K., Lin, W. H., Xu, X., & Chen, C. (2011). Data-driven intelligent transportation systems: A survey. IEEE Transactions on Intelligent Transportation Systems, 12(4), 1624–1639.CrossRef
116.
Zurück zum Zitat Zhang, R., Li, Z., Feng, C., & Jiang, S. (2012). Traffic routing guidance algorithm based on backpressure with a trade-off between user satisfaction and traffic load. In Proceedings of IEEE Vehicular Technology Conference (VTC Fall). Zhang, R., Li, Z., Feng, C., & Jiang, S. (2012). Traffic routing guidance algorithm based on backpressure with a trade-off between user satisfaction and traffic load. In Proceedings of IEEE Vehicular Technology Conference (VTC Fall).
117.
Zurück zum Zitat Zhao, J., & Cao, G. (2008). Vadd: Vehicle-assisted data delivery in vehicular ad hoc networks. IEEE transactions on vehicular technology (TVT), 57(3), 1910–1922.CrossRef Zhao, J., & Cao, G. (2008). Vadd: Vehicle-assisted data delivery in vehicular ad hoc networks. IEEE transactions on vehicular technology (TVT), 57(3), 1910–1922.CrossRef
118.
Zurück zum Zitat Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In Proceedings of 2013 9th International Conference on Computational Intelligence and Security (CIS). Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In Proceedings of 2013 9th International Conference on Computational Intelligence and Security (CIS).
119.
Zurück zum Zitat Zhao, M., Walker, J., & Wang, CC. (2012). Security challenges for the intelligent transportation system. In Proceedings of the First International Conference on Security of Internet of Things. Zhao, M., Walker, J., & Wang, CC. (2012). Security challenges for the intelligent transportation system. In Proceedings of the First International Conference on Security of Internet of Things.
120.
Zurück zum Zitat Zhao, P., Yang, X., Yu, W., & Fu, X. (2013). A loose virtual clustering based routing for power heterogeneous manets. IEEE Transactions on Vehicular Technology (TVT), 62(5), 2290–2302.CrossRef Zhao, P., Yang, X., Yu, W., & Fu, X. (2013). A loose virtual clustering based routing for power heterogeneous manets. IEEE Transactions on Vehicular Technology (TVT), 62(5), 2290–2302.CrossRef
121.
Zurück zum Zitat Zheng, B., Li, W., Deng, P., Grardy, L., Zhu, Q., Shankar, N. (2015a). Design and verification for transportation system security. In Proceedings of 52nd ACM/EDAC/IEEE Design Automation Conference (DAC). Zheng, B., Li, W., Deng, P., Grardy, L., Zhu, Q., Shankar, N. (2015a). Design and verification for transportation system security. In Proceedings of 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
122.
Zurück zum Zitat Zheng, K., Zheng, Q., Chatzimisios, P., Xiang, W., & Zhou, Y. (2015b). Heterogeneous vehicular networking: A survey on architecture, challenges, and solutions. IEEE Communications Surveys & Tutorials, 17(4), 2377–2396.CrossRef Zheng, K., Zheng, Q., Chatzimisios, P., Xiang, W., & Zhou, Y. (2015b). Heterogeneous vehicular networking: A survey on architecture, challenges, and solutions. IEEE Communications Surveys & Tutorials, 17(4), 2377–2396.CrossRef
123.
Zurück zum Zitat Zhu, J., & Roy, S. (2003). Mac for dedicated short range communications in intelligent transport system. IEEE Communications Magazine, 41(12), 60–67.CrossRef Zhu, J., & Roy, S. (2003). Mac for dedicated short range communications in intelligent transport system. IEEE Communications Magazine, 41(12), 60–67.CrossRef
Metadaten
Titel
Smart Transportation Systems: Architecture, Enabling Technologies, and Open Issues
verfasst von
Hansong Xu
Jie Lin
Wei Yu
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3892-1_2