DOI QR코드

DOI QR Code

Review on Software-Defined Vehicular Networks (SDVN)

  • Received : 2022.09.05
  • Published : 2022.09.30

Abstract

The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Keywords

References

  1. Mahmood A Al-Shareeda, Mohammed Anbar, Iznan Husainy Hasbullah, and Selvakumar Manickam. Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sensors Journal, 21(2):2422-2433, 2020.
  2. Mahmood A Al-Shareeda, Mohammed Anbar, Selvakumar Manickam, and Ali A Yassin. Vppcs: Vanet-based privacy-preserving communication scheme. IEEE Access, 8:150914-150928, 2020. https://doi.org/10.1109/access.2020.3017018
  3. [3] Mahmood A Al-Shareeda, Mohammed Anbar, Iznan Husainy Hasbullah, Selvakumar Manickam, and Sabri M Hanshi. Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks. IEEE Access, 8:144957-144968, 2020. https://doi.org/10.1109/ACCESS.2020.3014678
  4. Mahmoud Al Shareeda, Ayman Khalil, and Walid Fahs. Realistic heterogeneous genetic-based rsu placement solution for v2i networks. Int. Arab J. Inf. Technol., 16(3A):540-547, 2019.
  5. Mahmood A Al-shareeda, Mohammed Anbar, Selvakumar Manickam, and Iznan H Hasbullah. An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network. Symmetry, 12(10):1687, 2020.
  6. Mahmood A Al-Shareeda, Mohammed Anbar, Murtadha A Alazzawi, Selvakumar Manickam, and Ahmed Shakir Al-Hiti. Lswbvm: A lightweight security without using batch verification method scheme for a vehicle ad hoc network. IEEE Access, 8:170507-170518, 2020. https://doi.org/10.1109/access.2020.3024587
  7. Felipe Cunha, Leandro Villas, Azzedine Boukerche, Guilherme Maia, Aline Viana, Raquel AF Mini, and Antonio AF Loureiro. Data communication in vanets: Protocols, applications and challenges. Ad Hoc Networks, 44:90-103, 2016. https://doi.org/10.1016/j.adhoc.2016.02.017
  8. Wei-Hsun Lee, Kuo-Ping Hwang, and Wen-Bin Wu. An intersection-to-intersection travel time estimation and route suggestion approach using vehicular ad-hoc network. Ad Hoc Networks, 43:71-81, 2016. https://doi.org/10.1016/j.adhoc.2016.02.001
  9. Ahmed Nazar Hassan, Omprakash Kaiwartya, Abdul Hanan Abdullah, Dalya Khalid Sheet, and Ram Shringar Raw. Inter vehicle distance based connectivity aware routing in vehicular adhoc networks. Wireless Personal Communications, 98(1):33-54, 2018. https://doi.org/10.1007/s11277-017-4831-x
  10. Chakkaphong Suthaputchakun and Zhili Sun. Routing protocol in intervehicle communication systems: a survey. IEEE Communications Magazine, 49(12):150-156, 2011. https://doi.org/10.1109/MCOM.2011.6094020
  11. Mustafa Maad Hamdi, Lukman Audah, Sami Abduljabbar Rashid, and Mahmood Al Shareeda. Techniques of early incident detection and traffic monitoring centre in vanets: A review. J. Commun., 15(12):896-904, 2020.
  12. Mahmood A Al-shareeda, Mohammed Anbar, Iznan H Hasbullah, Selvakumar Manickam, Nibras Abdullah, and Mustafa Maad Hamdi. Review of prevention schemes for replay attack in vehicular ad hoc networks (vanets). In 2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP), pages 394-398. IEEE, 2020.
  13. Mahmood A Al-shareeda, Mohammed Anbar, Selvakumar Manickam, and Iznan H Hasbullah. Review of prevention schemes for man-in the middle (MITM) attack in vehicular ad hoc networks. International Journal of Engineering and Management Research, 10, 2020.
  14. Mahmoud Al Shareeda, Ayman Khalil, and Walid Fahs. Towards the optimization of road side unit placement using genetic algorithm. In 2018 International Arab Conference on Information Technology (ACIT), pages 1-5. IEEE, 2018.
  15. Naserali Noorani and Seyed Amin Hosseini Seno. Routing in vanets based on intersection using sdn and fog computing. In 2018 8th International Conference on Computer and Knowledge Engineering (ICCKE), pages 339-344. IEEE, 2018.
  16. Baraa T Sharef, Raed A Alsaqour, and Mahamod Ismail. Vehicular communication ad hoc routing protocols: A survey. Journal of network and computer applications, 40:363-396, 2014. https://doi.org/10.1016/j.jnca.2013.09.008
  17. Mattia Fogli, Carlo Giannelli, and Cesare Stefanelli. Software-defined networking in wireless ad hoc scenarios: Objectives and control architectures. Journal of Network and Computer Applications, page 103387, 2022.
  18. Dimitrios Kafetzis, Spyridon Vassilaras, Georgios Vardoulias, and Iordanis Koutsopoulos. Software-defined networking meets software-defined radio in mobile ad hoc networks: State of the art and future directions. IEEE Access, 2022.
  19. Maroua Abdelhafidh, Nadia Charef, Adel Ben Mnaouer, and Lamia Chaari Fourati. Software-defined networking for flying ad-hoc network security: A survey. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), pages 232-237. IEEE, 2022.
  20. Shanu Bhardwaj and Surya Narayan Panda. Performance evaluation using ryu sdn controller in software-defined networking environment. Wireless Personal Communications, 122(1):701-723, 2022. https://doi.org/10.1007/s11277-021-08920-3
  21. Alfred Raju M and Narendran Rajagopalan. A survey on various architectural models using software-defined networks. In Mobile Computing and Sustainable Informatics, pages 641-657. Springer, 2022.
  22. G Kirubasri, S Sankar, Digvijay Pandey, Binay Kumar Pandey, Vinay Kumar Nassa, and Pankaj Dadheech. Software-defined networking-based ad hoc networks routing protocols. In Software Defined Networking for Ad Hoc Networks, pages 95-123. Springer, 2022.
  23. Martin Casado, Tal Garfinkel, Aditya Akella, Michael J Freedman, Dan Boneh, Nick McKeown, and Scott Shenker. Sane: A protection architecture for enterprise networks. In USENIX Security Symposium, volume 49, page 50, 2006.
  24. Martin Casado, Michael J Freedman, Justin Pettit, Jianying Luo, Nick McKeown, and Scott Shenker. Ethane: Taking control of the enterprise. ACM SIGCOMM computer communication review, 37(4):1-12, 2007. https://doi.org/10.1145/1282427.1282382
  25. Natasha Gude, Teemu Koponen, Justin Pettit, Ben Pfaff, Mart'in Casado, Nick McKeown, and Scott Shenker. Nox: towards an operating system for networks. ACM SIGCOMM computer communication review, 38(3):105-110, 2008. https://doi.org/10.1145/1384609.1384625
  26. Floodlight Controller. Floodlight documentation, for developers, architecture.
  27. Hui Liu, Jie Li, Yan-Qing Zhang, and Yi Pan. An adaptive genetic fuzzy multi-path routing protocol for wireless ad-hoc networks. In Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-assembling Wireless Network, pages 468-475. IEEE, 2005.
  28. G Santhi and Alamelu Nachiappan. Fuzzy-cost based multiconstrained qos routing with mobility prediction in manets. Egyptian informatics journal, 13(1):19-25, 2012. https://doi.org/10.1016/j.eij.2011.12.001
  29. David Erickson. The beacon openflow controller. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 13-18, 2013.
  30. Vipul Narayan and AK Daniel. Rbchs: Region-based cluster head selection protocol in wireless sensor network. In Proceedings of Integrated Intelligence Enable Networks and Computing, pages 863-869. Springer, 2021.
  31. Martin Casado, Nate Foster, and Arjun Guha. Abstractions for software-defined networks. Communications of the ACM, 57(10):86-95, 2014. https://doi.org/10.1145/2661061.2661063
  32. Stephen Gutz, Alec Story, Cole Schlesinger, and Nate Foster. Splendid isolation: A slice abstraction for software-defined networks. In Proceedings of the first workshop on Hot topics in software defined networks, pages 79-84, 2012.
  33. Mark Reitblatt, Nate Foster, Jennifer Rexford, and David Walker. Consistent updates for software-defined networks: Change you can believe in! In Proceedings of the 10th ACM workshop on hot topics in networks, pages 1-6, 2011.
  34. Ken Barr, Prashanth Bungale, Stephen Deasy, Viktor Gyuris, Perry Hung, Craig Newell, Harvey Tuch, and Bruno Zoppis. The vmware mobile virtualization platform: is that a hypervisor in your pocket? ACM SIGOPS Operating Systems Review, 44(4):124-135, 2010. https://doi.org/10.1145/1899928.1899945
  35. Diego Kreutz, Fernando MV Ramos, Paulo Esteves Verissimo, Christian Esteve Rothenberg, Siamak Azodolmolky, and Steve Uhlig. Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1):14-76, 2014.
  36. Georgios Karagiannis, Onur Altintas, Eylem Ekici, Geert Heijenk, Boangoat Jarupan, Kenneth Lin, and Timothy Weil. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE communications surveys & tutorials, 13(4):584-616, 2011. https://doi.org/10.1109/SURV.2011.061411.00019
  37. Ram Shringar Raw, Manish Kumar, and Nanhay Singh. Security challenges, issues and their solutions for vanet. International journal of network security & its applications, 5(5):95, 2013.
  38. Nirbhay Kumar Chaubey. Security analysis of vehicular ad hoc networks (vanets): a comprehensive study. International Journal of Security and Its Applications, 10(5):261-274, 2016. https://doi.org/10.14257/ijsia.2016.10.5.25
  39. Mohamed Nidhal Mejri, Jalel Ben-Othman, and Mohamed Hamdi. Survey on vanet security challenges and possible cryptographic solutions. Vehicular Communications, 1(2):53-66, 2014. https://doi.org/10.1016/j.vehcom.2014.05.001
  40. Bassem Mokhtar and Mohamed Azab. Survey on security issues in vehicular ad hoc networks. Alexandria engineering journal, 54(4):1115-1126, 2015. https://doi.org/10.1016/j.aej.2015.07.011
  41. Mahmood A Al-shareeda, Mohammed Anbar, Selvakumar Manickam, and Iznan H Hasbullah. Review of prevention schemes for modification attack in vehicular ad hoc networks. International Journal of Engineering and Management Research, 10, 2020.
  42. Mustafa Maad Hamdi, Ahmed Shamil Mustafa, Hussain Falih Mahd, Mohammed Salah Abood, Chanakya Kumar, and Mahmood A Alshareeda. Performance analysis of qos in manet based on ieee 802.11b. In 2020 IEEE international conference for innovation in technology (INOCON), pages 1-5. IEEE, 2020.
  43. Murtadha A Alazzawi, Hasanain AH Al-behadili, Mohsin N Srayyih Almalki, Aqeel Luaibi Challoob, and Mahmood A Alshareeda. Id-ppa: robust identity-based privacy-preserving authentication scheme for a vehicular ad-hoc network. In International Conference on Advances in Cyber Security, pages 80-94. Springer, 2020.
  44. Mahmood A Al-Shareeda, Mohammed Anbar, Selvakumar Manickam, Ayman Khalil, and Iznan Husainy Hasbullah. Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey. IEEE Access, 9:121522-121531, 2021. https://doi.org/10.1109/ACCESS.2021.3109264
  45. Jalawi Sulaiman Alshudukhi, Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed. A lightweight authentication with privacy-preserving scheme for vehicular ad hoc networks based on elliptic curve cryptography. IEEE Access, 9: 15633-15642, 2021. https://doi.org/10.1109/ACCESS.2021.3053043
  46. Jalawi Sulaiman Alshudukhi, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi. Conditional privacy-preserving authentication scheme without using point multiplication operations based on elliptic curve cryptography (ECC). IEEE Access, 8: 222032-222040, 2020. https://doi.org/10.1109/ACCESS.2020.3044961
  47. Jalawi Sulaiman Alshudukhi, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi. An efficient conditional privacy-preserving authentication scheme for the prevention of side-channel attacks in vehicular ad hoc networks. IEEE Access,8: 226624-226636, 2020. https://doi.org/10.1109/ACCESS.2020.3045940
  48. Mahmood A Al-Shareeda, Mohammed Anbar, Selvakumar Manickam, and Iznan H Hasbullah. A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks. Sensors, 22(5):1696, 2022.
  49. Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, and Khalil Almekhlafi. Provably secure with efficient data sharing scheme for fifth-generation (5g)-enabled vehicular networks without road-side unit (rsu). Sustainability, 14(16):9961, 2022.
  50. MAASM Mahmood A Al-shareeda, Mohammed Anbar, Murtadha A Alazzawi, Selvakumar Manickam, and Iznan H Hasbullah. Security schemes based conditional privacy-preserving in vehicular ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science, 21(1), 2020.
  51. Mahmood A Al-Shareeda, Mohammed Anbar, Selvakumar Manickam, and Iznan H Hasbullah. Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks. Applied Sciences, 12(3):1383, 2022.
  52. Mahmood A Al-shareeda, Murtadha A Alazzawi, Mohammed Anbar, Selvakumar Manickam, and Ahmed K Al-Ani. A comprehensive survey on vehicular ad hoc networks (vanets). In 2021 International Conference on Advanced Computer Applications (ACA), pages 156-160. IEEE, 2021.
  53. Mahmood A Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J Alzahrani, Gharbi Alshammari, Amer A Sallam, and Khalil Almekhlafi. Cm-cppa: Chaotic map-based conditional privacypreserving authentication scheme in 5g-enabled vehicular networks. Sensors, 22(13):5026, 2022.
  54. Mahmood A Al-Shareeda and Selvakumar Manickam. Security methods in internet of vehicles. arXiv preprint arXiv:2207.05269, 2022.
  55. Samya Muhuri, Debasree Das, and Susanta Chakraborty. An automated game theoretic approach for cooperative road traffic management in disaster. In 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), pages 145-150. IEEE, 2017.
  56. Sabeen Javaid, Ali Sufian, Saima Pervaiz, and Mehak Tanveer. Smarttraffic management system using internet of things. In 2018 20th international conference on advanced communication technology (ICACT), pages 393-398. IEEE, 2018.
  57. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, page 21260, 2008.
  58. Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. In Proceedings of the thirteenth EuroSys conference, pages 1-15, 2018.
  59. Lixia Xie, Ying Ding, Hongyu Yang, and Xinmu Wang. Blockchainbased secure and trustworthy internet of things in sdn-enabled 5gvanets. IEEE Access, 7:56656-56666, 2019. https://doi.org/10.1109/access.2019.2913682
  60. Boubakr Nour, Adlen Ksentini, Nicolas Herbaut, Pantelis A Frangoudis, and Hassine Moungla. A blockchain-based network slice broker for 5g services. IEEE Networking Letters, 1(3):99-102, 2019. https://doi.org/10.1109/lnet.2019.2915117
  61. Chao Qiu, F Richard Yu, Haipeng Yao, Chunxiao Jiang, Fangmin Xu, and Chenglin Zhao. Blockchain-based software-defined industrial internet of things: A dueling deep q -learning approach. IEEE Internet of Things Journal, 6(3):4627-4639, 2018. https://doi.org/10.1109/jiot.2018.2871394
  62. Mauro Conti, E Sandeep Kumar, Chhagan Lal, and Sushmita Ruj. A survey on security and privacy issues of bitcoin. IEEE Communications Surveys & Tutorials, 20(4):3416-3452, 2018. https://doi.org/10.1109/COMST.2018.2842460
  63. Zhaojun Lu, Wenchao Liu, Qian Wang, Gang Qu, and Zhenglin Liu. A privacy-preserving trust model based on blockchain for vanets. IEEE Access, 6:45655-45664, 2018. https://doi.org/10.1109/access.2018.2864189
  64. Florian Tschorsch and Bjorn Scheuermann. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3):2084-2123, 2016. https://doi.org/10.1109/COMST.2016.2535718
  65. Mahmood A Al-shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan H Hasbullah, Ayman Khalil, Murtadha A Alazzawi, and Ahmed Shakir Al-Hiti. Proposed efficient conditional privacypreserving authentication scheme for v2v and v2i communications based on elliptic curve cryptography in vehicular ad hoc networks. In International Conference on Advances in Cyber Security, pages 588-603. Springer, 2020.
  66. Mahmood A Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J Alzahrani, Gharbi Alshammari, Amer A Sallam, and Khalil Almekhlafi. Chebyshev polynomial-based scheme for resisting sidechannel attacks in 5g-enabled vehicular networks. Applied Sciences, 12(12):5939, 2022.
  67. Mukesh Saini, Abdulhameed Alelaiwi, and Abdulmotaleb El Saddik. How close are we to realizing a pragmatic vanet solution? a metasurvey. ACM Computing Surveys (CSUR), 48(2):1-40, 2015.
  68. Hammad Shafiq, Rana Asif Rehman, and Byung-Seo Kim. Services and security threats in sdn based vanets: A survey. Wireless Communications and Mobile Computing, 2018, 2018.
  69. N Fares and Shavan Askar. A novel semi-symmetric encryption algorithm for internet applications. Journal of University of Duhok, 19(1):1-9, 2016.
  70. Sulaiman M Sulaiman and Shavan K Askar. Investigation of the impact of ddos attack on network efficiency of the university of zakho. Science Journal of University of Zakho, 3(2):275-280, 2015. https://doi.org/10.25271/2015.3.2.49
  71. Muhammad Arif, Guojun Wang, Oana Geman, Valentina Emilia Balas, Peng Tao, Adrian Brezulianu, and Jianer Chen. Sdn-based vanets, security attacks, applications, and challenges. Applied Sciences, 10(9):3217, 2020.
  72. Tolga O Atalay, Dragoslav Stojadinovic, Angelos Stavrou, and Haining Wang. Scaling network slices with a 5g testbed: A resource consumption study. In 2022 IEEE Wireless Communications and Networking Conference (WCNC), pages 2649-2654. IEEE, 2022.
  73. Zongjian He, Jiannong Cao, and Xuefeng Liu. Sdvn: Enabling rapid network innovation for heterogeneous vehicular communication. IEEE network, 30(4):10-15, 2016. https://doi.org/10.1109/MNET.2016.7513858
  74. Karima Smida, Hajer Tounsi, and Mounir Frikha. Intelligent and resizable control plane for software defined vehicular network: a deep reinforcement learning approach. Telecommunication Systems, 79(1):163-180, 2022. https://doi.org/10.1007/s11235-021-00838-2
  75. Ali Hussein, Imad H Elhajj, Ali Chehab, and Ayman Kayssi. Sdn vanets in 5g: An architecture for resilient security services. In 2017 Fourth international conference on software defined systems (SDS), pages 67-74. IEEE, 2017.
  76. Gagangeet Singh Aujla, Sahil Garg, Kuljeet Kaur, and Biplab Sikdar. Software defined internet of everything, 2022.
  77. Wuqiang Qi, Rui Chen, Minghui Chen, Meng Zhao, and Mingzhao Wang. Evaluation analysis of the nephrotoxicity of tripterygium wilfordii preparations with consort harms statement based on deep learning. Journal of Healthcare Engineering, 2022, 2022.
  78. Richard Skowyra, Lei Xu, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, and James Landry. Effective topology tampering attacks and defenses in software-defined networks. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 374-385. IEEE, 2018.
  79. Yuchuan Deng, Hao Jiang, Peijing Cai, Tong Wu, Pan Zhou, Beibei Li, Hao Lu, Jing Wu, Xin Chen, and Kehao Wang. Resource provisioning for mitigating edge ddos attacks in mec-enabled sdvn. IEEE Internet of Things Journal, 2022.
  80. Qiao Yan and F Richard Yu. Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communications Magazine, 53(4):52-59, 2015. https://doi.org/10.1109/MCOM.2015.7081075
  81. Esha Agarwal. A review on vanet security attacks. Call for Papers, page 45, 2022.
  82. Seung Won Shin, Phillip Porras, Vinod Yegneswara, Martin Fong, Guofei Gu, and Mabry Tyson. Fresco: Modular composable security services for software-defined networks. In 20th annual network & distributed system security symposium. Ndss, 2013.
  83. Ming Mao, Peng Yi, Jianhui Zhang, Liang Wang, Yuan Gu, and Guanying Zhang. Roadside units plane optimization scheme in softwaredefined vehicular networks. Transactions on Emerging Telecommunications Technologies, page e4499, 2022.
  84. Xiaoyu Zhang, Hong Zhong, Chunyang Fan, Irina Bolodurina, and Jie Cui. Cbacs: A privacy-preserving and efficient cache-based access control scheme for software defined vehicular networks. IEEE Transactions on Information Forensics and Security, 2022.
  85. Xiaoyu Zhang, Hong Zhong, Jie Cui, Chengjie Gu, Irina Bolodurina, and Lu Liu. Ac-sdvn: An access control protocol for video multicast in software defined vehicular networks. IEEE Transactions on Mobile Computing, 2022.
  86. Xiaodong Lin, Xiaoting Sun, Pin-Han Ho, and Xuemin Shen. Gsis: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on vehicular technology, 56(6):3442-3456, 2007. https://doi.org/10.1109/TVT.2007.906878
  87. Chenxi Zhang, Rongxing Lu, Pin-Han Ho, and Anyi Chen. A location privacy preserving authentication scheme in vehicular networks. In 2008 IEEE Wireless Communications and Networking Conference, pages 2543-2548. IEEE, 2008.
  88. Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, and Claudio E Palazzi. Fast and secure multihop broadcast solutions for intervehicular communication. IEEE Transactions on Intelligent Transportation Systems, 15(1):433-450, 2013. https://doi.org/10.1109/TITS.2013.2277890
  89. Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, and Claudio E Palazzi. The impact of malicious nodes positioning on vehicular alert messaging system. Ad Hoc Networks, 52:3-16, 2016. https://doi.org/10.1016/j.adhoc.2016.08.008
  90. Lokendra Vishwakarma, Ankur Nahar, and Debasis Das. Lbsv: Lightweight blockchain security protocol for secure storage and communication in sdn-enabled iov. IEEE Transactions on Vehicular Technology, 2022.
  91. Maxim Raya and Jean-Pierre Hubaux. Securing vehicular ad hoc networks. Journal of computer security, 15(1):39-68, 2007. https://doi.org/10.3233/JCS-2007-15103
  92. Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava, Unil Yun, and Amit Kumar Singh. Deep active learning intrusion detection and load balancing in software-defined vehicular networks. IEEE Transactions on Intelligent Transportation Systems, 2022.
  93. Qiyan Wang and Sanjay Sawhney. Vecure: A practical security framework to protect the can bus of vehicles. In 2014 International Conference on the Internet of Things (IOT), pages 13-18. IEEE, 2014.
  94. Hosein Shafiei, Ahmad Khonsari, Hazhir Derakhshi, and Payam Mousavi. Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3):644-653, 2014. https://doi.org/10.1016/j.jcss.2013.06.016
  95. Haonan Yang, Yongchao Zhong, Bo Yang, Yiyu Yang, Zifeng Xu, Longjuan Wang, and Yuqing Zhang. An overview of sybil attack detection mechanisms in vfc. In 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSNW), pages 117-122. IEEE, 2022.
  96. Mustafa Maad Hamdi, Majeed Dhafer, Ahmed Shamil Mustafa,Sami Abduljabbar Rashid, Ahmed Jamal Ahmed, and Ahmed Muhi Shantaf. Effect sybil attack on security authentication service in vanet. In 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pages 1-6. IEEE, 2022.
  97. Bo Yu, Cheng-Zhong Xu, and Bin Xiao. Detecting sybil attacks in vanets. Journal of Parallel and Distributed Computing, 73(6):746-756, 2013. https://doi.org/10.1016/j.jpdc.2013.02.001
  98. Tong Zhou, Romit Roy Choudhury, Peng Ning, and Krishnendu Chakrabarty. P2dap-sybil attacks detection in vehicular ad hoc networks. IEEE journal on selected areas in communications, 29(3):582-594, 2011. https://doi.org/10.1109/JSAC.2011.110308
  99. Dhia Eddine Laouiti, Marwane Ayaida, Nadhir Messai, Sameh Najeh, Leila Najjar, and Ferdaous Chaabane. Sybil attack detection in vanets using an adaboost classifier. In 2022 International Wireless Communications and Mobile Computing (IWCMC), pages 217-222. IEEE, 2022.
  100. Kalupahana Liyanage Kushan Sudheera, Maode Ma, and Peter Han Joo Chong. Link stability based optimized routing framework for software defined vehicular networks. IEEE Transactions on Vehicular Technology, 68(3):2934-2945, 2019. https://doi.org/10.1109/tvt.2019.2895274
  101. Yujie Tang, Nan Cheng, Wen Wu, Miao Wang, Yanpeng Dai, and Xuemin Shen. Delay-minimization routing for heterogeneous vanets with machine learning based mobility prediction. IEEE Transactions on Vehicular Technology, 68(4):3967-3979, 2019. https://doi.org/10.1109/tvt.2019.2899627
  102. Ahmed Soua and Samir Tohme. Multi-level sdn with vehicles as fog computing infrastructures: A new integrated architecture for 5gvanets. In 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), pages 1-8. IEEE, 2018.
  103. Weijing Qi, Qingyang Song, Xiaojie Wang, Lei Guo, and Zhaolong Ning. Sdn-enabled social-aware clustering in 5gvanet systems. IEEE Access, 6:28213-28224, 2018. https://doi.org/10.1109/access.2018.2837870
  104. Chung-Ming Huang, Meng-Shu Chiang, Duy-Tuan Dao, Wei-Long Su, Shouzhi Xu, and Huan Zhou. V2v data offloading for cellular network based on the software defined network (sdn) inside mobile edge computing (mec) architecture. IEEE Access, 6:17741-17755, 2018. https://doi.org/10.1109/access.2018.2820679