{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:21Z","timestamp":1750306101607,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T00:00:00Z","timestamp":1511222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,21]]},"DOI":"10.1145\/3132114.3132730","type":"proceedings-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T13:36:37Z","timestamp":1510752997000},"page":"9-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Proactive Certificate Distribution for PKI in VANET"],"prefix":"10.1145","author":[{"given":"Joshua","family":"Harrington","sequence":"first","affiliation":[{"name":"University of Ontario Institute of Technology, Oshawa, ON, Canada"}]},{"given":"Jesse","family":"Lacroix","sequence":"additional","affiliation":[{"name":"University of Ontario Institute of Technology, Oshawa, Canada"}]},{"given":"Khalil","family":"El-Khatib","sequence":"additional","affiliation":[{"name":"University of Ontario Institute of Technlogy, Oshawa, Canada"}]},{"given":"Felipe Leite","family":"Lobo","sequence":"additional","affiliation":[{"name":"University Federal of Roraima, Boa Vista, Brazil"}]},{"given":"Hor\u00e1cio A.B.F.","family":"Oliveira","sequence":"additional","affiliation":[{"name":"University Federal of Amazonas, Manaus, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2017,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Journal of Network and Computer Applications A comprehensive survey on vehicular Ad Hoc network","author":"S.","year":"2013","unstructured":"S. Al-sultan, M. M. Al-doori, A. H. Al-bayatti, and H. Zedan , \" Journal of Network and Computer Applications A comprehensive survey on vehicular Ad Hoc network ,\" J. Netw. Comput. Appl. , pp. 1 -- 13 , 2013 . S. Al-sultan, M. M. Al-doori, A. H. Al-bayatti, and H. Zedan, \"Journal of Network and Computer Applications A comprehensive survey on vehicular Ad Hoc network,\" J. Netw. Comput. Appl., pp. 1--13, 2013.","journal-title":"J. Netw. Comput. Appl."},{"key":"e_1_3_2_1_2_1","first-page":"282","article-title":"Detection and Localization of Sybil Attack in VANET : A Review","volume":"2","author":"Malathi K.","year":"2014","unstructured":"K. Malathi and R. Manavalan , \" Detection and Localization of Sybil Attack in VANET : A Review \", International Journal For Research In Applied Science and Engineering Technology vol. 2 , no. Ix, pp. 282 -- 293 , 2014 . K. Malathi and R. Manavalan, \"Detection and Localization of Sybil Attack in VANET : A Review\",International Journal For Research In Applied Science and Engineering Technology vol. 2, no. Ix, pp. 282--293, 2014.","journal-title":"International Journal For Research In Applied Science and Engineering Technology"},{"key":"e_1_3_2_1_3_1","unstructured":"K. Emara W. Woerndl and J. Schlichter \"Vehicle Tracking using Vehicular Network Beacons.\"  K. Emara W. Woerndl and J. Schlichter \"Vehicle Tracking using Vehicular Network Beacons.\""},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-328-6_9"},{"key":"e_1_3_2_1_5_1","first-page":"11","volume-title":"The Security of Vehicular Ad Hoc Networks","author":"Raya M.","unstructured":"M. Raya and J. Hubaux , \" The Security of Vehicular Ad Hoc Networks ,\" pp. 11 -- 21 . M. Raya and J. Hubaux, \"The Security of Vehicular Ad Hoc Networks,\" pp. 11--21."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1641913.1641938"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.928899"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.03.012"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"R. N. Charette \"This vehicle runs on code \" IEEE Spectrum vol. 46 no. 2 Feb. 2009.  R. N. Charette \"This vehicle runs on code \" IEEE Spectrum vol. 46 no. 2 Feb. 2009.","DOI":"10.1109\/MSPEC.2009.5340234"},{"volume-title":"Review on various security threats & solutions and network coding based security approach for VANET","author":"Bhatia J.","key":"e_1_3_2_1_10_1","unstructured":"J. Bhatia and B. Shah , \" Review on various security threats & solutions and network coding based security approach for VANET \" vol. 6 , no. 1, pp. 361--369, 2013. J. Bhatia and B. Shah, \"Review on various security threats & solutions and network coding based security approach for VANET\" vol. 6, no. 1, pp. 361--369, 2013."},{"volume-title":"Vehicular Fog Computing : A Viewpoint of Vehicles as the Infrastructures","author":"Hou X.","key":"e_1_3_2_1_11_1","unstructured":"X. Hou , \" Vehicular Fog Computing : A Viewpoint of Vehicles as the Infrastructures ,\" vol. 65 , no. 6, pp. 3860--3873, 2016. X. Hou et al., \"Vehicular Fog Computing : A Viewpoint of Vehicles as the Infrastructures,\" vol. 65, no. 6, pp. 3860--3873, 2016."},{"key":"e_1_3_2_1_12_1","volume-title":"Octopus : An Edge-Fog Mutual Authentication Scheme Octopus : An Edge-Fogh Mutual Authentication Scheme","author":"Ibrahim M.","year":"2016","unstructured":"M. Ibrahim and M. H. Ibrahim , \" Octopus : An Edge-Fog Mutual Authentication Scheme Octopus : An Edge-Fogh Mutual Authentication Scheme ,\" 2016 . M. Ibrahim and M. H. Ibrahim, \"Octopus : An Edge-Fog Mutual Authentication Scheme Octopus : An Edge-Fogh Mutual Authentication Scheme,\" 2016."},{"key":"e_1_3_2_1_13_1","volume-title":"Cryptography and network security","author":"Stallings W.","year":"2017","unstructured":"W. Stallings , Cryptography and network security . Boston : Pearson , 2017 . W. Stallings, Cryptography and network security. Boston: Pearson, 2017."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780203498156"},{"key":"e_1_3_2_1_15_1","unstructured":"Y. Kim and I. Kim \"Security Issues in Vehicular Networks.\"  Y. Kim and I. Kim \"Security Issues in Vehicular Networks.\""},{"volume-title":"Official Google Blog, 2009","year":"2009","key":"e_1_3_2_1_16_1","unstructured":"\"The bright side of sitting in traffic: Crowdsourcing road congestion data \", Official Google Blog, 2009 . [Online]. Available : https:\/\/googleblog.blogspot.ca\/ 2009 \/08\/bright-side-of-sitting-in-traffic.html. [Accessed: 10- Jul- 2017]. \"The bright side of sitting in traffic: Crowdsourcing road congestion data\", Official Google Blog, 2009. [Online]. Available: https:\/\/googleblog.blogspot.ca\/2009\/08\/bright-side-of-sitting-in-traffic.html. [Accessed: 10- Jul- 2017]."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161076"},{"key":"e_1_3_2_1_18_1","unstructured":"B. Varghese N. Wang and D. S. Nikolopoulos \"Feasibility of Fog Computing.\"  B. Varghese N. Wang and D. S. Nikolopoulos \"Feasibility of Fog Computing.\""},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"A. Wasef X. Lin \"Complementing Public Key Infrastructure to Secure Vehicular Ad Hoc Networks\" October pp. 22--28 2010.  A. Wasef X. Lin \"Complementing Public Key Infrastructure to Secure Vehicular Ad Hoc Networks\" October pp. 22--28 2010.","DOI":"10.1109\/MWC.2010.5601954"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"E. Munivel \"Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks \" 2010.  E. Munivel \"Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks \" 2010.","DOI":"10.1109\/ICWCSC.2010.5415904"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2008.77"},{"key":"e_1_3_2_1_22_1","volume-title":"Comparison of Certificate Policies for Merging Public Key Infrastructures during Merger and Acquisition of Companies,\" no","author":"Security N.","year":"2015","unstructured":"Journal, N. Security , I. Applications , and M. Unive , \" Comparison of Certificate Policies for Merging Public Key Infrastructures during Merger and Acquisition of Companies,\" no . September 2015 , 2012. Journal, N. Security, I. Applications, and M. Unive, \"Comparison of Certificate Policies for Merging Public Key Infrastructures during Merger and Acquisition of Companies,\" no. September 2015, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454609.1454628"},{"volume-title":"A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET","author":"Abumansoor O.","key":"e_1_3_2_1_24_1","unstructured":"O. Abumansoor , A. Boukerche , and S. Member , \" A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET ,\" vol. 61 , no. 1, pp. 275--285, 2012. O. Abumansoor, A. Boukerche, and S. Member, \"A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET,\" vol. 61, no. 1, pp. 275--285, 2012."},{"key":"e_1_3_2_1_25_1","first-page":"2413","volume-title":"Trust-based security for wireless ad hoc and sensor networks","author":"Boukerch A.","year":"2007","unstructured":"A. Boukerch and L. Xu , \" Trust-based security for wireless ad hoc and sensor networks ,\" vol. 30 , pp. 2413 -- 2427 , 2007 . A. Boukerch and L. Xu, \"Trust-based security for wireless ad hoc and sensor networks,\" vol. 30, pp. 2413--2427, 2007."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656346.2656348"},{"key":"e_1_3_2_1_27_1","first-page":"95","volume-title":"Effective Public Key Infrastructure for Vehicle-to-Grid","author":"Vaidya B.","year":"2014","unstructured":"B. Vaidya , K. E. Ave , K. E. Ave , H. Mouftah , and K. E. Ave , \" Effective Public Key Infrastructure for Vehicle-to-Grid ,\" pp. 95 -- 101 , 2014 . B. Vaidya, K. E. Ave, K. E. Ave, H. Mouftah, and K. E. Ave, \"Effective Public Key Infrastructure for Vehicle-to-Grid,\" pp. 95--101, 2014."},{"key":"e_1_3_2_1_28_1","first-page":"103","volume-title":"Trust Based Security Enhancements for Vehicular Ad hoc Networks","author":"Wei Z.","year":"2014","unstructured":"Z. Wei and F. R. Yu , \" Trust Based Security Enhancements for Vehicular Ad hoc Networks ,\" pp. 103 -- 109 , 2014 . Z. Wei and F. R. Yu, \"Trust Based Security Enhancements for Vehicular Ad hoc Networks,\" pp. 103--109, 2014."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512921.2512936"},{"key":"e_1_3_2_1_30_1","first-page":"55","volume-title":"Securing Vehicular Ad hoc Networks with Mean Field Game Theory","author":"Wang Y.","year":"2013","unstructured":"Y. Wang , F. R. Yu , and T. Chen , \" Securing Vehicular Ad hoc Networks with Mean Field Game Theory ,\" pp. 55 -- 60 , 2013 . Y. Wang, F. R. Yu, and T. Chen, \"Securing Vehicular Ad hoc Networks with Mean Field Game Theory,\" pp. 55--60, 2013."},{"key":"e_1_3_2_1_31_1","first-page":"405","volume-title":"Solution of Detecting Jamming Attacks in Vehicle Ad Hoc NETworks","author":"Nguyen A. T.","unstructured":"[ A. T. Nguyen and L. Mokdad , \" Solution of Detecting Jamming Attacks in Vehicle Ad Hoc NETworks ,\" pp. 405 -- 410 . [A. T. Nguyen and L. Mokdad, \"Solution of Detecting Jamming Attacks in Vehicle Ad Hoc NETworks,\" pp. 405--410."},{"key":"e_1_3_2_1_32_1","first-page":"167","volume-title":"Security Evaluation Methodology for Intrusion Recovery Protocols in Wireless Sensor Networks","author":"Stavrou E.","unstructured":"E. Stavrou and A. Pitsillides , \" Security Evaluation Methodology for Intrusion Recovery Protocols in Wireless Sensor Networks ,\" pp. 167 -- 170 . E. Stavrou and A. Pitsillides, \"Security Evaluation Methodology for Intrusion Recovery Protocols in Wireless Sensor Networks,\" pp. 167--170."}],"event":{"name":"MSWiM '17: 20th ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Miami Florida USA","acronym":"MSWiM '17"},"container-title":["Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132114.3132730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132114.3132730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:34Z","timestamp":1750217434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132114.3132730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,21]]},"references-count":32,"alternative-id":["10.1145\/3132114.3132730","10.1145\/3132114"],"URL":"https:\/\/doi.org\/10.1145\/3132114.3132730","relation":{},"subject":[],"published":{"date-parts":[[2017,11,21]]},"assertion":[{"value":"2017-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}