Acknowledgement
This work was supported by the Deputyship for Research and Innovation, Ministry of Education, Saudi Arabia, under Grant UQU-IF-P2-20-001.
References
- Avleen Kaur Malhi, and Shalini Batra, (2016) "Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hoc net-works," Journal of Security and Communication Networks, vol. 9, no. 15, pp.2612-2626. https://doi.org/10.1002/sec.1506
- B. K. Pattanayak, (2019) "Design and Development of Secured Framework for Efficient Routing in Vehicular Ad-Hoc Network" International Journal of Business Data Communications and Networking, Vol.15, pp. 55-72. https://doi.org/10.4018/IJBDCN.2019070104
- Malhi, A., Batra, S. (2016). Privacy-preserving authentication framework using bloom filter for secure vehicular communications. International Journal of Information Security, 15(4), 433-453. https://doi.org/10.1007/s10207-015-0299-4
- Song J., He C., Yang F., Zhang H., (2016) "A privacy-preserving distance-based incentive scheme in opportunistic VANETs Security and Communication Networks" vol.9, pp- 2789-2801. https://doi.org/10.1002/sec.1211
- Bharati S; Sindhankeri, Shraddha K. (2017), "A Multi Constrained Qos Routing Algorithm for Vehicular Adhoc Networks". International Journal of Advanced Research in Computer Science, [S.l.], v. 8, n. 7, p. 736-740.
- Tahani Gazdar, Abdelfettah Belghith, Ahmad AlMogren, (2017) "DTCF: A distributed trust computing framework for vehicular ad hoc networks", KSII Transactions on Internet and Information Systems (TIIS).
- Gopikrishnan, S., Krishnaraj, C., and Kokilavani. K, (2018) "HAAC: Reinforcing VANET Security Using Ant Colony Optimization through Heuristic Approach", in International Journal of Vehicle Structures Systems, vol. 10, no. 1, pp. 345-351 (Impact factor: 0.25).
- J. Jenefa, E. A. Mary Anita, (2018) "Secure Vehicular Communication Using ID Based Signature Scheme". Wireless Personal Communications 98(1): 1383-1411. https://doi.org/10.1007/s11277-017-4923-7
- R. Pradweap , R. Hansdah, (2013) " A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET" , International Conference on Information Systems Security, ICISS 2013, LNCS 8303, pp. 314-328.
- I. Bhattacharya, S.Ghosh and D. Show, (2014) "An Efficient and Secured Routing Protocol for VANET" Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), vol. 2, pp. 775-783.
- Y. Wang, J. Hu, X. Li and Z. Feng (2019) "An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET" Collaborative Computing: Networking, Applications and worksharing, pp. 799-815.
- M. Kadam, S. Limkar (2013) "Detection and Mitigation of Misbehaving Vehicle from VANET" ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of CSI, Vol. 1, pp. 267-276.
- G. Kumaresan, T. Adiline Macriga (2016) "Group Key Authentication scheme for Vanet intrusion detection (GKAVIN)" Wireless Networks, vol. 23, pp. 935-945. https://doi.org/10.1007/s11276-016-1197-z
- M. Selvi, B. Ramakrishnan, (2019) "Lion optimization algorithm (LOA) based reliable emergency message broadcasting system in VANET" Soft Computing, pp. 1-18.
- M. Kaur, R. Rajni, and P. Singh (2012) " Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET" Advances in Computing and Information Technology, vol. 176 , pp.757-763. https://doi.org/10.1007/978-3-642-31513-8_77
- G. B. Santhi, D. Sheela (2020) " Reliability refinement in VANET with hybrid jamming attacks using novel index based voting algorithm" Peer-to-Peer Networking and Applications, vol.13.
- M. Rath, B. K. Pattanayak (2017) "SCICS: A Soft Computing Based Intelligent Communication System in VANET" Communications in Computer and Information Science, vol,808, pp. 255-261.
- P. Manickam, K. Shankar, E. Perumal, M. Ilayaraja and K. S. Kumar (2019) "Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography" Cybersecurity and Secure Information Systems, pp. 193-204.
- D. Chuan (2012) "Towards a Trusted Vehicular Routing in VANET" Information Technology Convergence, Secure and Trust Computing, and Data Management, vol. 180, pp 103-117. https://doi.org/10.1007/978-94-007-5083-8_15
- R. Hussain, S. Kim and H. Oh (2016) "Traffic Information Dissemination System: Extending Cooperative Awareness Among Smart Vehicles with only Single-Hop Beacons in VANET" Wireless Personal Communications , vol. 88, pp. 151-172. https://doi.org/10.1007/s11277-015-3084-9
- R. Sugumar, A. Rengarajan and C. Jayakumar (2018) "Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)" Wireless Networks, vol. 24, pp. 373-382. https://doi.org/10.1007/s11276-016-1336-6
- S. DasGupta, R. Chaki, and S. Choudhury (2013) "TruVAL: Trusted Vehicle Authentication Logic for VANET" Advances in Computing, Communication, and Control, vol. 361, pp. 309-322. https://doi.org/10.1007/978-3-642-36321-4_29
- H. Hu, R. Lu and Z. Zhang (2016) "VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications" 2015 IEEE Global Communications Conference (GLOBECOM).
- Haerri, F. Filali, and C. Bonnet. (2006) "Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility patterns." Proceedings of the 5th IFIP mediterranean ad-hoc networking workshop.
- Khairnar, D. Pradhan, N. (2013) "Simulation Based Evaluation of Highway Road Scenario between DSRC/802.11p MAC Protocol and STDMA for Vehicle-to-Vehicle Communication" . Journal of Transportation Technologies, 3, 88-104 https://doi.org/10.4236/jtts.2013.31009
- Azees, M., Vijayakumar, P., Deborah, L,J. (2016) "Comprehensive survey on security services in vehiclear ad-hoc network". Intell. Transp. Syst. 10(6), 12.
- Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H. and Zedan, H. (2014) "A Comprehensive Survey on Vehicular Ad Hoc Network". Journal of Network and Computer Applications, 37, 380-392. https://doi.org/10.1016/j.jnca.2013.02.036
- Cheng X., Chen C., Zhang W., Yang Y. (2017) "5G-Enabled Cooperative Intelligent Vehicular (5GenCIV) Framework" IEEE Intell. Syst. ;32:53-59. doi: 10.1109/MIS.2017.53.
- Hasrouny H., Abed Ellatif S., Bassil C., Laouiti, A. (2017). "VANET Security Challenges and Solutions: A Survey" Vehicular Communications 7:7-20 https://doi.org/10.1016/j.vehcom.2017.01.002
- S. S. Kaushik, (2013) "Review of different aproaches for privacy" International Journal of Advanced Engineering and Technology, vol. 5, no. 2, pp. 356-363.
- M. Gonzalez-Martin, M. Sepulcre, R. Molina-Masegosa, and J. Gozalvez, (2019) "Analytical models of the performance of C-V2X mode 4 vehicular communications," IEEE Transactions on Vehicular Technology, vol. 68, no. 2, pp. 1155-1166. https://doi.org/10.1109/tvt.2018.2888704
- Molina-Masegosa R., Gozalvez, J. (2017). "TE-V for Sidelink 5G V2X Vehicular Communications: A New 5G Technology for Short-Range Vehicle-to-Everything Communications", IEEE Vehicular Technology Magazine 12(4):30-39 https://doi.org/10.1109/MVT.2017.2752798
- S. Chen, J. Hu, Y. Shi, and L. Zhao, (2016) "LTE-V: a TD-LTE-based V2X solution for future vehicular network," IEEE Internet of Things Journal, vol. 3, no. 6, pp. 997-1005. https://doi.org/10.1109/JIOT.2016.2611605
- J. M. de Fuentes, A. I. Gonzalez-Tablas, and A. Ribagorda, (2010) "Overview of Security Issues in Vehicular Ad Hoc Networks", Hershey, Derry Township, PA, USA.
- Jakubiak J., Koucheryavy Y. (2008) "State of the Art and Research Challenges for VANETs", 5th IEEE Consumer Communications and Networking Conference.
- A. Dhamgaye and N. Chavhan, (2013) "Survey on security challenges in VANET," International Journal of Computer Science, vol. 2, pp. 88-96.
- Y. L. Morgan, (2010) "Notes on DSRC WAVE standards suite: its architecture, design, and characteristics," IEEE Communications Surveys Tutorials, vol. 12, no. 4, pp. 504-518. https://doi.org/10.1109/SURV.2010.033010.00024
- Yousefi S., Mousavi M., Fathy M., (2006) "Vehicular ad hoc networks (VANETs): challenges and perspectives", 6th International Conference on ITS Telecommunications, pp 761-766.
- Z. Lu, G. Qu, and Z. Liu, (2019) "A survey on recent advances in vehicular network security, trust, and privacy," IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 2, pp. 760-776. https://doi.org/10.1109/tits.2018.2818888
- Muhammad Sameer Sheikh, Jun Liang, (2019) "A Comprehensive Survey on VANET Security Services in Traffic Management System", Wireless Communications and Mobile Computing, Article ID 2423915, 23 pages.
- Muhammad Sameer Sheikh, Jun Liang, W. Wang, (2020)" Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey", Wireless Communications and Mobile Computing, vol. 2020, Article ID 5129620, 25 pages.
- Sheikh, Liang, Wang,. (2019). A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors. 19. 3589. 10.3390/s19163589.
- Y. R. B. Al-Mayouf, M. Ismail, N. F. Abdullah, S. M. Al-Qaraawi and O. A. Mahdi (2016). "Survey On Vanet Technologies And Simulation Models" , ARPN Journal of Engineering and Applied Sciences, VOL. 11, NO. 15
- M. A. Elsadig, Y. A. Fadlalla (2016) . "VANETs security issues and challenges: A survey", Indian Journal of Science and Technology, Vol (9).
- A. khan, M. Ishtiaq, S. Anwar and M. A. Shah (2019). "A Survey on secure routing strategies in VANETs", 2019 25th International Conference on Automation and Computing (ICAC)
- Sajjad Akbar Mohammad, Asim Rasheed, Amir Qayyum (2011) "VANET architectures and protocol stacks: a survey" International Workshop on Communication Technologies for Vehicles, Page 95-105.
- Abir Mchergui, Tarek Moulahi, Bechir Alaya, Salem Nasri (2017) . "A survey and comparative study of QoS aware broadcasting techniques in VANET", Telecommunication Systems, Vol (66), Pages 253-281. https://doi.org/10.1007/s11235-017-0280-9
- C. Chen, Y. Chen, C. Lee and Y. Deng (2018). "A Survey of Authentication Protocols in VANET Advances on Broadband and Wireless Computing, Communication and Applications (pp.572-577)
- MA Razzaque, Ahmad Salehi, Seyed M Cheraghi (2013). "Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead", Wireless Networks and Security, SCT, pp. 107-132.
- Irshad Ahmed Sumra, Halabi Bin Hasbullah, Jamalul-lail Bin AbManan (2015). "Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey", Vehicular Ad-Hoc Networks for Smart Cities, page 51-61.
- V. Vijayalakshmi ; M. Sathya ; S Saranya ; C. Selvaroopini (2015). "Survey on various mechanisms for secure and efficient VANET communication", International Conference on Information Communication and Embedded Systems.
- Aakash Luckshetty, Sindhu Dontal, Shrikant Tangade, Sunilkumar S Manvi (2016). "A survey: comparative study of applications, attacks, security and privacy in VANETs" International Conference on Communication and Signal Processing, April 6-8.
- N. S. Patel, S. Singh. (2016) "A Survey on Techniques for Collision Prevention in VANET", International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
- Fengzhong Qu ; Zhihui Wu ; Fei-Yue Wang ; Woong Cho (2015). "A Security and Privacy Review of VANETs", IEEE Transactions o Intelligent Transportation Systems (Volume): 16 , Issue: 6.
- M. Kim, (2018)" A Survey of Vehicular Ad-Hoc Network Security", Mobile and Wireless Technologies 2017, Volume 425.
- online:https://internetofthingsagenda.techtarget.com/definition/Cellular-Vehicle-to-Everything-C-V2X