2Shim K A. CPAS. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks[J].IEEE Transactio. n on vehicular technology, 2012,61 (04):1874-1883.
4Zhang C, Lu R, Lin X, et al. An efficient identity-based batch verification scheme for vehicular sensor networks[C]. In The 27th IEEE Conference on Computer Communicat ions, 2008: 246-250.
6VISWANATH K, OBRACZKA K. Modeling the performance of flooding in wireless multi-hop ad hoc networks[J]. Computer Communications, 2006, 29(8): 949-956.
7PERKINS C, BELDING-ROYER E, DAS S. Ad hoc On-Demand Distance Vector (AODV)Routing[S]. IETF RFC 3561, 2003.
8JOHNSON D, MALTZ D, HU Y C. The Dynamic Source Routing Protocol for Mobile Ad hoc Networks(DSR)[S]. IETF Intemet Draft, draft-ietf-manet-dsr- 10.txt, 2004.
9CLAUSEN T, JACQUET P. Optimized Link State Routing Protocol (OLSR)[S]. IETF RFC 3626, 2003.
10PASSMANN C, BRENZEL C, MESCHENMOSER R. Wireless vehicle to vehicle warning system[A]. SAE2000 World Congress, Detroit, MI[C]. USA, 2002.