{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:37:20Z","timestamp":1765355840144},"reference-count":51,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/wmnc.2014.6878854","type":"proceedings-article","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T20:19:52Z","timestamp":1408565992000},"page":"1-8","source":"Crossref","is-referenced-by-count":19,"title":["REST-Net: A dynamic rule-based IDS for VANETs"],"prefix":"10.1109","author":[{"given":"Andreas","family":"Tomandl","sequence":"first","affiliation":[]},{"given":"Karl-Peter","family":"Fuchs","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Federrath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Survey of Intrusion Detection Techniques","year":"1993","author":"lunt","key":"35"},{"key":"36","article-title":"Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective","author":"bai","year":"2006","journal-title":"Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet)"},{"journal-title":"The Sybil Attack \" in Peer-to-Peer Systems","year":"2002","author":"douceur","key":"33"},{"journal-title":"Computer Security Threat Monitoring and Surveillance","year":"1980","author":"anderson","key":"34"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2011.6117120"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737612"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/1614269.1614285"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2028893"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502130"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/0001-6918(80)90046-3"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428742"},{"journal-title":"Sybil Nodes Detection Based on Received Signal Strength Variations Within VANET","year":"2009","author":"bouassida","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2009.4917675"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"27","article-title":"On data-centric misbehavior detection in vanets","author":"ruj","year":"2011","journal-title":"Vehicular Technology Conference (VTC Fall)"},{"key":"28","article-title":"Security requirements and solution concepts in vehicular ad hoc networks","author":"leinmu?ller","year":"2009","journal-title":"Annual Conference on Wireless On-demand Network Systems and Services"},{"journal-title":"Here Come the XOR Ninjas","year":"2011","author":"rizzo","key":"29"},{"key":"3","article-title":"A privacy aware and efficient security infrastructure for vehicular ad hoc networks","author":"plo?\ufffdl","year":"2007","journal-title":"Security in Information Systems Proceedings of the 5th International Workshop on Security in Information Systems - WOSIS 2007"},{"journal-title":"IEEE Standard for Wireless Access in Vehicular Environments","year":"2013","key":"2"},{"journal-title":"IEEE Computer Society IEEE Standard for Information Technology- Local and Metropolitan Area Networks- Specific Requirements- Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6 Wireless Access in Vehicular Environments","year":"2010","key":"1"},{"journal-title":"Dedicated Short Range Communications (DSRC) Message Set Dictionary","year":"2009","key":"7"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"journal-title":"ETSI TS 102 637-2 Intelligent Transport Systems (ITS)","year":"2011","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.367"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"31","article-title":"Lessons learned from previous ssl\/tls attacks-A brief chronology of attacks and weaknesses","author":"meyer","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-73275-4_10","article-title":"On the effectiveness of changing pseudonyms to provide location privacy in vanets","author":"buttya?n","year":"2007","journal-title":"Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks"},{"journal-title":"Vehicular Communications Basic Set of Application Part 3 Specification of Decentralized Environmental Notification Basic Service","year":"2010","key":"8"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451013"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287762"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379844"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/11734666_13","article-title":"Silent cascade: Enhancing location privacy without communication qos degradation","author":"huang","year":"2006","journal-title":"Security in Pervasive Computing Third International Conference"},{"journal-title":"Securing Vehicular Ad Hoc Networks","year":"2007","author":"raya","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424677"},{"key":"11","article-title":"Mix-zones for location privacy in vehicular networks","author":"freudiger","year":"2007","journal-title":"ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1160972.1160974"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110308"},{"journal-title":"Microscopic Modeling of Traffic Flow Investigation of Collision Free Vehicle Dynamics","year":"1998","author":"krau\ufffd","key":"49"},{"year":"2013","key":"48"},{"key":"45","doi-asserted-by":"crossref","DOI":"10.1109\/INFOCOM.2008.179","article-title":"Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications","author":"lu","year":"2008","journal-title":"INFOCOM 2008 The 27th Conference on Computer Communications IEEE"},{"key":"44","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04434-2_4","article-title":"A robust conditional privacy-preserving authentication protocol in vanet","author":"jung","year":"2009","journal-title":"Security and Privacy in Mobile Information and Communication Systems"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2012.6379070"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.79"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1109\/WiMob.2008.45","article-title":"Preventing profile generation in vehicular networks","author":"scheuer","year":"2008","journal-title":"WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing Networking & Communication"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.62.1805"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1051\/jp1:1992277"}],"event":{"name":"2014 7th IFIP Wireless and Mobile Networking Conference (WMNC)","start":{"date-parts":[[2014,5,20]]},"location":"Vilamoura, Portugal","end":{"date-parts":[[2014,5,22]]}},"container-title":["2014 7th IFIP Wireless and Mobile Networking Conference (WMNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6871739\/6878843\/06878854.pdf?arnumber=6878854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:43:01Z","timestamp":1602686581000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6878854"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/wmnc.2014.6878854","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}