(2015). Intelligent Transport Systems (ITS); Security; Se-
curity header and certificate formats. V1.2.1.
Behrisch, M., Bieker, L., Erdmann, J., and Krajzewicz, D.
(2011). SUMO - Simulation of Urban MObility: An
Overview. In The Third International Conference on
Advances in System Simulation, pages 63–68.
Bittl, S., Aydinli, B., and Roscher, K. (2015a). Effec-
tive Certificate Distribution in ETSI ITS VANETs
using Implicit and Explicit Requests. In M.
Kassab et al., editor, 8th International Workshop
Nets4Cars/Nets4Trains/Nets4Aircraft, LNCS 9066,
pages 72–83.
Bittl, S., Gonzalez, A. A., Sp
¨
ahn, M., and Heidrich, W.
(2015b). Performance Comparison of Data Serial-
ization Schemes for ETSI ITS Car-to-X Communica-
tion Systems. International Journal On Advances in
Telecommunications, 8:48 – 58.
Blum, B., He, T., and Son, S. (2003). IGF: A State-Free
Robust Communication Protocol for Wireless Sensor
Networks. Technical Report CS-2003-11, Department
of Computer Science, University of Virginia.
Boban, M. (2012). Realistic and Efficient Channel Mod-
eling for Vehicular Networks. Phd thesis, Dept. of
Electrical and Computer Engineering, Carnegie Mel-
lon University.
Cheng, L., Henty, B. E., Stancil, D. D., Bai, F., and Mu-
dalige, P. (2007). Mobile Vehicle-to-Vehicle Narrow-
Band Channel Measurement and Characterization of
the 5.9 GHz Dedicated Short Range Communication
(DSRC) Frquency Band. IEEE Journal on Selected
Areas in Communications, 25(8):1501–1516.
Feiri, M., Petit, J., and Kargl, F. (2012). Evaluation of
Congestion-based Certificate Omission in VANETs.
In IEEE Vehicular Networking Conference, pages 101
– 108.
F
¨
ußler, H., Hartenstein, H., Martin, M., Effelsberg, W., and
Widmer, J. (2004). Contention-Based Forwarding for
Street Scenarios. In 1st International Workshop in In-
telligent Transportation, pages 155–160.
F
¨
ußler, H., Widmer, J., K
¨
asemann, M., Mauve, M., and
Hartenstein, H. (2003). Contention-Based Forward-
ing for Mobile Ad Hoc Networks. Elsevier’s Ad Hoc
Networks, 1(4):351–369.
J. Harding et al. (2014). Vehicle-to-Vehicle Communica-
tions: Readiness of V2V Technology for Application.
Technical Report DOT HS 812 014, Washington, DC:
National Highway Traffic Safety Administration.
Heissenb
¨
uttel, M., Braun, T., Bernoulli, T., and W
¨
alchli,
M. (2004). BLR: Beacon-Less Routing Algorithm for
Mobile Ad-Hoc Networks. Elsevier’s Computer Com-
munications Journal (Special Issue), 27(11):1076–
1086.
Kargl, F., Schoch, E., Wiedersheim, B., and Leinm
¨
uller, T.
(2008). Secure and Efficient Beaconing for Vehicular
Networks. In Fifth ACM international workshop on
VehiculAr Inter-NETworking, pages 82–83.
Kloiber, B., Strang, T., de Ponte-Mueller, F., Rico Garcia,
C., and Roeckl, M. (2010). An Approach for Perfor-
mance Analysis of ETSI ITS-G5A MAC for Safety
Applications. In The 10th International Conference
on Intelligent Transport Systems Telecommunications.
Kraftfahrt-Bundesamt (2014). Neuzulassungen von
Personenkraftwagen im August 2014 nach
Marken und Modellreihen. online. available
http://www.kba.de/DE/Statistik/Fahrzeuge/Neuzulas
sungen/MonatlicheNeuzulassungen/monatl neuzulas
sungen node.html.
Masdari, M. and Barbin, J. P. (2012). Distributed Certifi-
cate Management in Mobile Ad Hoc Networks. In-
ternational Journal of Applied Information Systems,
1(1):33–40.
Morogan, M. S. and Muftic, S. (2003). Certificate Manage-
ment in ad hoc Networks. In Symposium on Applica-
tions and the Internet Workshops, pages 337–341.
Riley, G. F. and Henderson, T. R. (2010). The ns-3 Network
Simulator. In Wehrle, K., G
¨
unes, M., and Gross, J.,
editors, Modeling and Tools for Network Simulation,
pages 15–34. Springer Berlin Heidelberg.
Roscher, K., Bittl, S., Gonzalez, A. A., Myrtus, M., and
Jiru, J. (2014). ezCar2X: Rapid-Prototyping of Com-
munication Technologies and Cooperative ITS Appli-
cations on Real Targets and Inside Simulation Envi-
ronments. In 11th Wireless Communication and In-
formation, pages 51 – 62.
Sen, J., Chandra, M. G., Balamuradlidhar, P., and Harihara,
S. G. (2007). A Scheme of Certificate Authority for
Ad Hoc Networks. In 18th International Workshop
on Database and Expert Systems Applications, pages
615–619.
Sommer, C. and Dressler, F. (2015). Vehiclular Networking.
Cambridge University Press.
Task Force PKI, WG Security C2C-CC (2012). C2C-CC
PKI Memo. Technical Report 1.7, Car2Car Commu-
nication Consortium.
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
96