[1] CHEN Wei, GUO Fang-zhou, WANG Fei-yue. A survey of traffic data visualization[J]. IEEE Transactions on Intelligent Transportation Systems, 2015, 16(6): 2970-2984.
[2] YAO De-zhong, YU Chen, YANG L T, et al. Using
crowdsourcing to provide QoS for mobile cloud computing[J]. IEEE Transactions on Cloud Computing, 2019, 7(2): 344-356.
[3] 马永杰,程时升,马芸婷,等.卷积神经网络及其在智能交通系统中的应用综述[J].交通运输工程学报,2021,21(4):48-71.
MA Yong-jie, CHENG Shi-sheng, MA Yun-ting, et al. Review of convolutional neural network and its application in intelligent transportation system[J]. Journal of Traffic and Transportation Engineering, 2021, 21(4): 48-71.(in Chinese)
[4] LI Wen-jia, SONG Hou-bing. ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(4): 960-969.
[5] LU Zhao-jun, QU Gang, LIU Zheng-lin. A survey on recent advances in vehicular network security, trust, and privacy[J]. IEEE Transactions on Intelligent Transportation Systems, 2019, 20(2): 760-776.
[6] 张 毅,姚丹亚,李 力,等.智能车路协同系统关键技术与应用[J].交通运输系统工程与信息,2021,21(5):40-51.
ZHANG Yi, YAO Dan-ya, LI Li, et al. Technologies and applications for intelligent vehicle-infrastructure cooperation systems[J]. Journal of Transportation Systems Engineering and Information Technology, 2021, 21(5): 40-51.(in Chinese)
[7] DENG Ruo-qi, DI Bo-ya, SONG Ling-yang. Cooperative
collision avoidance for overtaking maneuvers in cellular V2X-based autonomous driving[J]. IEEE Transactions on Vehicular Technology, 2019, 68(5): 4434-4446.
[8] 赵祥模,惠 飞,史 昕,等.泛在交通信息服务系统的概念、架构与关键技术[J].交通运输工程学报,2014,14(4):105-115.
ZHAO Xiang-mo, HUI Fei, SHI Xin, et al. Concept, architecture and challenging technologies of ubiquitous traffic information service system[J]. Journal of Traffic and Transportation Engineering, 2014, 14(4): 105-115.(in Chinese)
[9] CHETLUR V V, DHILLON H S. Coverage and rate analysis of downlink cellular vehicle-to-everything(C-V2X)communication[J]. IEEE Transactions on Wireless Communications, 2020, 19(3): 1738-1753.
[10] ALNASSER A, SUN Hong-jian, JIANG Jing. Cyber security challenges and solutions for V2X communications: a survey[J]. Computer Networks, 2019, 151: 52-67.
[11] AL-SULTAN S, Al-DOORI M M, AL-BAYATTI A H, et al. A comprehensive survey on vehicular ad hoc network[J]. Journal of Network and Computer Applications, 2014, 37: 380-392.
[12] 上官伟,史 斌,蔡伯根,等.车路协同环境下信道接入协议的优化方法[J].交通运输系统工程与信息,2016,16(6):47-53.
SHANGGUAN Wei, SHI Bin, CAI Bai-gen, et al. Optimization of channel access protocols and performance evaluation in cooperative vehicle infrastructure environment[J]. Journal of Transportation Systems Engineering and Information Technology, 2016, 16(6): 47-53.(in Chinese)
[13] GHOSAL A, CONTI M. Security issues and challenges in V2X: a survey[J]. Computer Networks, 2020, 169: 107093.
[14] 蔡伯根,王丛丛,上官伟,等.车路协同系统信息交互仿真方法[J].交通运输工程学报,2014,14(3):111-119.
CAI Bai-gen, WANG Cong-cong, SHANGGUAN Wei, et al. Simulation method of information interaction in CVIS[J]. Journal of Traffic and Transportation Engineering, 2014, 14(3): 111-119.(in Chinese)
[15] LI Teng-long, HUI Fei, ZHAO Xiang-mo, et al. Modelling heterogeneous traffic dynamics by considering the influence of V2V safety messages[J]. IET Intelligent Transport Systems, 2020, 14(4): 220-227.
[16] RAWAT D B, POPESCU D C, YAN Gong-jun, et al.
Enhancing VANET performance by joint adaptation of transmission power and contention window size[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(9): 1528-1535.
[17] 刘云璐,蒲菊华,方维维,等.一种无线传感器网络MAC协议优化算法[J].计算机学报,2012,35(3):529-539.
LIU Yun-lu, PU Ju-hua, FANG Wei-wei, et al. A MAC layer optimization algorithm in wireless sensor networks[J]. Chinese Journal of Computers, 2012, 35(3): 529-539.(in Chinese)
[18] TAN Shuai-shuai, LI Xiao-ping, DONG Qing-kuai. Trust based routing mechanism for securing OSLR-based MANET[J]. Ad Hoc Networks, 2015, 30: 84-98.
[19] VIJAYAKUMAR P, AZEES M, KANNAN A, et al. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(4): 1015-1028.
[20] VIJAYAKUMAR P, AZEES M, CHANG V, et al.
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks[J]. Cluster Computing, 2017, 20(3): 2439-2450.
[21] AZEES M, VIJAYAKUMAR P, DEBOARH L J. EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 18(9): 2467-2476.
[22] 季一木,陆毅成,刘尚东,等.HIBE-MPJ:一种基于HIBE的物联网环境下跨域通信机制研究[J].南京邮电大学学报(自然科学版),2020,40(4):1-10.
JI Yi-mu, LU Yi-cheng, LIU Shang-dong, et al. HIBE-MPJ: cross-domain communication mechanism based on HIBE in Internet of things environment[J]. Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition), 2020, 40(4): 1-10.(in Chinese)
[23] 郑明辉,段洋洋,吕含笑.车联网中基于群签名的身份认证协议研究[J].工程科学与技术,2018,50(4):130-134.
ZHENG Ming-hui, DUAN Yang-yang, LYU Han-xiao. Research on identity authentication protocol group signature-based in Internet of vehicles[J]. Advanced Engineering Sciences, 2018, 50(4): 130-134.(in Chinese)
[24] 杨雪婷,李 重.车联网中基于车辆行为预测的身份认证方案[J].计算机工程,2021,47(1):129-138.
YANG Xue-ting, LI Zhong. Identity authentication scheme based on vehicle behavior prediction for IoV[J]. Computer Engineering, 2021, 47(1): 129-138.(in Chinese)
[25] VUKADINOVIC V, BAKOWSKI K, MARSCH P, et al.
3GPP C-V2X and IEEE 802.11p for vehicle-to-vehicle communications in highway platooning scenarios[J]. Ad Hoc Networks, 2018, 74: 17-29.
[26] SHAIKH R A, ALZAHRANI A S. Intrusion-aware trust
model for vehicular ad hoc networks[J]. Security and Communication Networks, 2014, 7(11): 1652-1669.
[27] ARSHAD M, ULLAH Z, AHMAD N, et al. A survey of local/cooperative-based malicious information detection techniques in VANETs[J]. EURASIP Journal on Wireless Communications and Networking, 2018, 2018: 62.
[28] KIM T H J, STUDER A, DUBEY R, et al. VANET alert endorsement using multi-source filters[C]∥ACM. Proceedings of the Seventh ACM International Workshop on Vehicular Internetworking. New York: ACM, 2010: 51-60.
[29] YAO Xuan-xia, ZHANG Xin-lei, NING Huan-sheng, et al. Using trust model to ensure reliable data acquisition in VANETs[J]. Ad Hoc Networks, 2017, 55: 107-118.
[30] 刘伎昭,董跃钧.基于空间推理的车联网虚假消息检测方法[J].计算机工程与设计,2020,41(12):35-39.
LIU Ji-zhao, DONG Yue-jun. False messages detection method based on spatial inference in Internet of vehicles[J]. Computer Engineering and Design, 2020, 41(12): 35-39.(in Chinese)
[31] MUHAMMAD M, SAFDAR G A. Survey on existing
authentication issues for cellular-assisted V2X communication[J]. Vehicular Communications, 2018, 12: 50-65.