28
Views
8
CrossRef citations to date
0
Altmetric
Articles

Pseudonym generation using genetic algorithm in vehicular ad hoc networks

&

References

  • Dötzer, Florian. “ Privacy issues in vehicular ad hoc networks.” In International Workshop on Privacy Enhancing Technologies, pp. 197-209. Springer, Berlin, Heidelberg, 2005
  • Dabboussi, A., R. Kouta, J. Gaber, M. Wack, Bachar EL Hassan, and Lina Nachabeh. “Analyzing the reliability for connected vehicles using qualitative approaches and quantitative methods.” In Safety and Reliability–Safe Societies in a Changing World, pp. 2603-2610. CRC Press, 2018.
  • Pan, Yuanyuan, Jianqing Li, Li Feng, and Ben Xu. “An analytical model for random pseudonym change scheme in VANETs.” Cluster Computing 17, no. 2 (2014): 413-421. doi: 10.1007/s10586-012-0242-7
  • Emara, Karim, Wolfgang Woerndl, and Johann Schlichter. “On evaluation of location privacy preserving schemes for VANET safety applications.” Computer Communications 63 (2015): 11-23. doi: 10.1016/j.comcom.2015.03.002
  • Grzybek, Agata, Marcin Seredynski, Grégoire Danoy, and Pascal Bouvry. “Aspects and trends in realistic VANET simulations.” In 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1-6. IEEE, 2012.
  • Krumm, John. “A survey of computational location privacy.” Personal and Ubiquitous Computing 13, no. 6 (2009): 391-399. doi: 10.1007/s00779-008-0212-5
  • Song, Joo-Han, Vincent W. Wong, and Victor C. Leung. “Wireless location privacy protection in vehicular ad-hoc networks.” Mobile Networks and Applications 15, no. 1 (2010): 160-171. doi: 10.1007/s11036-009-0167-4
  • Ogundoyin, Sunday Oyinlola. “An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks.” International Journal of Computers and Applications (2018): 1-16. doi: 10.1080/1206212X.2018.1477320
  • Ordóñez-Hurtado, Rodrigo H., Emanuele Crisostomi, and Robert N. Shorten. “An assessment on the use of stationary vehicles to support cooperative positioning systems.” International Journal of Control 91, no. 3 (2018): 608-621. doi: 10.1080/00207179.2017.1286537
  • Sampigethaya, Krishna, Mingyan Li, Leping Huang, and Radha Poovendran. “AMOEBA: Robust location priva-cy scheme for VANET.” IEEE Journal on Selected Areas in communications 25, no. 8 (2007): 1569-1589. doi: 10.1109/JSAC.2007.071007
  • Lu, Rongxing, Xiaodong Lin, Tom H. Luan, Xiaohui Liang, and Xuemin Shen. “Pseudonym changing at social spots: An effective strategy for location privacy in vanets.” IEEE transactions on vehicular technology 61, no. 1 (2011): 86-96.
  • Sampigethaya, Krishna, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, and Kaoru Seza-ki. CARAVAN: Providing location privacy for VANET. Washington Univ Seattle Dept of Electrical Engineering, 2005.
  • Liu, Hui, Yining Sun, Yan Xu, Rui Xu, and Zhuo Wei. “A secure lattice-based anonymous authentication scheme for VANETs.” Journal of the Chinese Institute of Engineers 42, no. 1 (2019): 66-73. doi: 10.1080/02533839.2018.1537804
  • Le Boudec, Jean-Yves, and Jean-Pierre Hubaux. “On the Age of Pseudonyms in Mobile Ad Hoc Networks.” In Infocom, no. CONF. 2010.
  • Artail, Hassan, and Noor Abbani. “A pseudonym management system to achieve anonymity in vehicular ad hoc networks.” IEEE Transactions on Dependable and Secure Computing 13, no. 1 (2015): 106-119. doi: 10.1109/TDSC.2015.2480699
  • Pan, Yuanyuan, Jianqing Li, Li Feng, and Ben Xu. “An analytical model for random pseudonym change scheme in VANETs.” Cluster Computing 17, no. 2 (2014): 413-421. doi: 10.1007/s10586-012-0242-7
  • Emara, Karim. “Safety-aware location privacy in VANET: Evaluation and comparison.” IEEE Transactions on Vehicular Technology 66, no. 12 (2017): 10718-10731. doi: 10.1109/TVT.2017.2736885
  • Holland, John Henry. Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. MIT press, 1992.
  • Boardman, John, and Brian Sauser. “System of Systems-the meaning of of.” In 2006 IEEE/SMC International Conference on System of Systems Engineering, pp. 6-pp. IEEE, 2006.
  • Mitchell, Melanie. An introduction to genetic algorithms. MIT press, 1998.
  • Whitley, Darrell. “A genetic algorithm tutorial.” Statistics and computing 4, no. 2 (1994): 65-85.
  • Arumugam, M. Senthil, M. V. C. Rao, and Ramaswamy Palaniappan. “New hybrid genetic operators for real coded genetic algorithm to compute optimal control of a class of hybrid systems.” Applied Soft Computing 6, no. 1 (2005): 38-52.
  • Machado, Penousal, Malcolm I. Heywood, James McDermott, Mauro Castelli, Pablo García-Sánchez, Paolo Burelli, Sebastian Risi, and Kevin Sim, eds. Genetic Programming: 18th European Conference, EuroGP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings. Vol. 9025. Springer, 2015.
  • Larrañaga, Pedro, and Jose A. Lozano, eds. Estimation of distribution algorithms: A new tool for evolutionary computation. Vol. 2. Springer Science & Business Media, 2001.
  • Deep, Kusum, and Manoj Thakur. “A new mutation operator for real coded genetic algorithms.” Applied mathematics and Computation 193, no. 1 (2007): 211-230. doi: 10.1016/j.amc.2007.03.046
  • Kaelo, P., and M. M. Ali. “Integrated crossover rules in real coded genetic algorithms.” European Journal of Operational Research 176, no. 1 (2007): 60-76. doi: 10.1016/j.ejor.2005.07.025
  • Mayaud, Louis, Peggy S. Lai, Gari D. Clifford, Lionel Tarassenko, Leo Anthony G. Celi, and Djillali Annane. “Dynamic data during hypotensive episode improves mortality predictions among patients with sepsis and hypotension.” Critical care medicine 41, no. 4 (2013): 954. doi: 10.1097/CCM.0b013e3182772adb
  • Lin, Wen-Yang, Wen-Yung Lee, and Tzung-Pei Hong. “Adapting crossover and mutation rates in genetic algo-rithms.” J. Inf. Sci. Eng. 19, no. 5 (2003): 889-903.
  • Styugin, M. A., A. A. Kytmanov, and T. N. Yamskikh. “Formalization of the problem of protection against reconnaissance in conflict systems.” Journal of Discrete Mathematical Sciences and Cryptography 21.3 (2018): 679-694. doi: 10.1080/09720529.2016.1226619
  • Pathak, Sunil, and Sonal Jain. “Comparative study of clustering algorithms for MANETs.” Journal of Statistics and Management Systems 22.4 (2019): 653-664. doi: 10.1080/09720510.2019.1609723
  • Lin, Lan, and James A. Misener. “Message sets for vehicular communications.” In Vehicular ad hoc Networks, pp. 123-163. Springer, Cham, 2015.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.