Open Access
Issue
MATEC Web Conf.
Volume 173, 2018
2018 International Conference on Smart Materials, Intelligent Manufacturing and Automation (SMIMA 2018)
Article Number 02024
Number of page(s) 6
Section Automation and Nontraditional Manufacturing
DOI https://doi.org/10.1051/matecconf/201817302024
Published online 19 June 2018
  1. J. Harding, G. Powell, R. Yoon, J. Fikentscher, C. Doyle, D. Sade, et al., “Vehicle-to-vehicle communications: Readiness of V2V technology for application,” (2014). [Google Scholar]
  2. M. Raya, P. Papadimitratos, and J.-P. Hubaux, “Securing vehicular communications,” IEEE Wireless Communications, vol. 13, (2006). [CrossRef] [Google Scholar]
  3. M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, H. M. Zhang, J. Rowe, et al., “Security vulnerabilities of connected vehicle streams and their impact on cooperative driving,” IEEE Communications Magazine, vol. 53, pp. 126-132, 2015. [CrossRef] [Google Scholar]
  4. C. Laurendeau and M. Barbeau, “Threats to Security in DSRC/WAVE,” in International Conference on Ad-Hoc Networks and Wireless, (2006), pp. 266-279. [Google Scholar]
  5. A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, et al., “Attacks on inter vehicle communication systems-an analysis,” Proc. WIT, pp. 189-194, (2006). [Google Scholar]
  6. J.-P. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security & Privacy, vol. 2, pp. 49-55, (2004). [CrossRef] [Google Scholar]
  7. J. Guo, J. P. Baugh, and S. Wang, “A group signature based secure and privacy-preserving vehicular communication framework,” in 2007 Mobile Networking for Vehicular Environments, (2007), pp. 103-108. [CrossRef] [Google Scholar]
  8. D. Sperling and D. Gordon, Two billion cars: driving toward sustainability: Oxford University Press, (2009). [Google Scholar]
  9. N. N. Alotaibi and K. A. Hamdi, “A low-complexity antenna subset modulation for secure millimeter-wave communication,” in 2016 IEEE Wireless Communications and Networking Conference, (2016), pp. 1-6. [Google Scholar]
  10. A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas I: The MISOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, pp. 3088-3104, (2010). [CrossRef] [Google Scholar]
  11. M. P. Daly and J. T. Bernhard, “Directional modulation and coding in arrays,” in Antennas and Propagation (APSURSI), 2011 IEEE International Symposium on, (2011), pp. 1984-1987. [CrossRef] [Google Scholar]
  12. Y. Ding and V. F. Fusco, “Constraining directional modulation transmitter radiation patterns,” IET Microwaves, Antennas & Propagation, vol. 8, pp. 1408-1415, (2014). [CrossRef] [Google Scholar]
  13. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE transactions on wireless communications, vol. 7, (2008). [CrossRef] [Google Scholar]
  14. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Wireless secrecy regions with friendly jamming,” IEEE Transactions on Information Forensics and Security, vol. 6, pp. 256-266, (2011). [CrossRef] [Google Scholar]
  15. E. J. Baghdady, “Directional signal modulation by means of switched spaced antennas,” in Military Communications Conference-Crisis Communications: The Promise and Reality, 1987. MILCOM 1987. IEEE, (1987), pp. 0938-0942. [CrossRef] [Google Scholar]
  16. M. P. Daly and J. T. Bernhard, “Beamsteering in pattern reconfigurable arrays using directional modulation,” IEEE Transactions on Antennas and Propagation, vol. 58, pp. 2259-2265, (2010). [CrossRef] [Google Scholar]
  17. N. N. Alotaibi and K. A. Hamdi, “Switched phased-array transmission architecture for secure millimeter-wave wireless communication,” IEEE Transactions on Communications, vol. 64, pp. 1303-1312, (2016). [CrossRef] [Google Scholar]
  18. N. Valliappan, A. Lozano, and R. W. Heath, “Antenna subset modulation for secure millimeter-wave wireless communication,” IEEE Transactions on Communications, vol. 61, pp. 3231-3245, (2013). [CrossRef] [Google Scholar]
  19. S. Liu, Y. Hong, and E. Viterbo, “Practical secrecy using artificial noise,” IEEE Communications Letters, vol. 17, pp. 1483-1486, (2013). [CrossRef] [Google Scholar]
  20. X. Zhang, X. Zhou, and M. R. McKay, “Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks,” IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1802-1814, (2013). [CrossRef] [Google Scholar]
  21. Z. Pi and F. Khan, “An introduction to millimeter-wave mobile broadband systems,” IEEE communications magazine, vol. 49, (2011). [Google Scholar]
  22. C. Rusu, N. González-Prelcic, and R. W. Heath, “An attack on antenna subset modulation for millimeter wave communication,” in Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on, (2015), pp. 2914-2918. [CrossRef] [Google Scholar]
  23. M. Boban, J. Barros, and O. K. Tonguz, “Geometry-based vehicle-to-vehicle channel modeling for large-scale simulation,” IEEE Transactions on Vehicular Technology, vol. 63, pp. 4146-4164, (2014). [CrossRef] [Google Scholar]
  24. V. Va, J. Choi, and R. W. Heath, “The impact of beamwidth on temporal channel variation in vehicular channels and its implications,” IEEE Transactions on Vehicular Technology, vol. 66, pp. 5014-5029, (2017). [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.