FAN Na, ZOU Xiao-min, LI Si-rui, YANG Xiao-duo. A Trusted Computing Based Secure Scheme in Vehicular Named Data Networking[J]. Computer and Modernization, 2023, 0(02): 96-103.
[1] 吴建波,朱文霞,剧亮,等. 边缘计算在智慧交通系统中的应用[J]. 计算机与现代化, 2021(12):103-109.
[2] SHAHID M A, JAEKEL A, EZEIFE C, et al. Review of potential security attacks in VANET[C]// 2018 Majan International Conference (MIC). 2018:1-4.
[3] TANG L, DUAN Z T, ZHU Y S. Data dissemination in service discovery for vehicular ad hoc networks: A Survey[J]. IET Intelligent Transport Systems,2018,12(10):1189-1200.
[4] YANG N, CHEN K, LIU Y. Towards efficient NDN framework for connected vehicle applications[J]. IEEE Access, 2020,8:60850-60866.
[5] 谢英英,石涧,黄硕康,等. 面向5G的命名数据网络物联网研究综述[J]. 计算机科学, 2020,47(4):217-225.
[6] 黄胜,吴震,许江华,等. NDN中基于相交路径的多径数据传输策略[J]. 计算机工程与设计, 2016,37(3):581-585.
[7] WANG A W, CHEN T, CHEN H, et al. NDNVIC: Named data networking for vehicle infrastructure cooperation[J]. IEEE Access, 2019,7:62231-62239.
[8] KUMAR S, MANN K S. Prevention of DoS attacks by detection of multiple malicious nodes in VANETs[C]// 2019 International Conference on Automation, Computational and Technology Management (ICACTM). 2019:89-94.
[9] AFANASYEV A, MAHADEVAN P, MOISEENKO I, et al. Interest flooding attack and countermeasures in named data networking[C]// 2013 IFIP Networking Conference. 2013:1-9.
[10] COMPAGNO A, CONTI M, GASTI P, et al. Poseidon: Mitigating interest flooding DDoS attacks in named data networking[C]// 38th Annual IEEE Conference on Local Computer Networks. 2013:630-638.
[11] HOU R, HAN M, CHEN J, et al. Theil-based countermeasure against interest flooding attacks for named data networks[J]. IEEE Network, 2019,33(3):116-121.
[12] ZHI T, LUO H B, LIU Y. A Gini impurity-based interest flooding attack defence mechanism in NDN[J]. IEEE Communications Letters, 2018,22(3):538-541.
[13] BENMOUSSA A, TAHARI A E K, LAGAA N, et al. A novel congestion-aware interest flooding attacks detection mechanism in named data networking[C]// 2019 28th International Conference on Computer Communication and Networks (ICCCN). 2019:1-6.
[14] SALAH H, STRUFE T. Evaluating and mitigating a collusive version of the interest flooding attack in NDN[C]// 2016 IEEE Symposium on Computers and Communication (ISCC). 2016:938-945.
[15] SHIGEYASU T, SONODA A. Detection and mitigation of collusive interest flooding attack on content centric networking[J]. International Journal of Grid and Utility Computing, 2020,11(1):21-29.
[16] XIN Y H, LI Y, WANG W, et al. Detection of collusive interest flooding attacks in named data networking using wavelet analysis[C]// 2017 IEEE Military Communications Conference . 2017:557-562.
[17] WU Z J, FENG W Z, YUE M, et al. Mitigation measures of collusive interest flooding attacks in named data networking[J]. Computers & Security, 2020,97. DOI:10.1016/j.cose.2020.101971.
[18] LIU L, FENG W Z, WU Z J, et al. The detection method of collusive interest flooding attacks based on prediction error in NDN[J]. IEEE Access, 2020,8:128005-128017.
[19] TAHIR M U, REHMAN R A. CUIF: Control of useless interests flooding in vehicular named data networks[C]// 2018 International Conference on Frontiers of Information Technology (FIT). 2018:303-308.
[20] FAN N, LI C, ZHANG T Y, et al. BSMM: A broadcast storm mitigation model based on distributed data clusters and hybrid network architecture in vehicular named data network[J]. Journal of Physics Conference Series, 2020,1693(1). DOI:10.1088/1742-6596/1693/1/012029.
[21] SATTAR M U, REHMAN R A. Interest flooding attack mitigation in named data networking based VANETs[C]// 2019 International Conference on Frontiers of Information Technology (FIT). 2019. DOI:10.1109/FIT47737.2019.00053.
[22] RABARI J, KUMAR A R P. FIFA: Fighting against interest flooding attack in NDN-based VANET[C]// 2021 International Wireless Communications and Mobile Computing (IWCMC). 2021:1539-1544.
[23] ABDULLAH M, RAZA I, ZIA T, et al. Interest flooding attack mitigation in a vehicular named data network[J]. IET Intelligent Transport Systems, 2021,15(4):525-537.
[24] 于亚芳,潘耘,王励成. 命名数据网络中的DoS/DDoS攻击研究综述[J]. 信息技术, 2017,41(6):78-82.
[25] WANG R M, XU Z Q, ZHAO X M, et al. A V2V-based method for the detection of road traffic congestion[J]. IET Intelligent Transport Systems, 2019,13(5):880-885.
[26] KHELIFI H, LUO S, NOUR B, et al. Named data networking in vehicular ad hoc networks: State-of-the-art and challenges[J]. IEEE Communications Surveys & Tutorials, 2020,22(1):320-351.
[27] TOURANI R, MISRA S, MICK T, et al. Security, privacy, and access control in information-centric networking: A Survey[J]. IEEE Communications surveys & Tutorials, 2018,20(1):566-600.
[28] 章铭. 基于内容的未来网络命名与解析机制研究[D]. 北京:北京邮电大学, 2013.