A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)

Vehicular ad hoc networks (VANETs) are an emerging type of mobile ad hoc networks (MANETs) with robust applications in intelligent traffic management systems. VANET has drawn significant attention from the wireless communication research community and has become one of the most prominent research fields in intelligent transportation system (ITS) because of the potential to provide road safety and precautionary measures for the drivers and passengers. In this survey, we discussed the basic overview of the VANET from the architecture, communication methods, standards, characteristics, and VANET security services. Second, we presented the threats and attacks and the recent state-of-the-art methods of the VANET security services. Then, we comprehensively reviewed the authentication schemes that can protect vehicular networks from malicious nodes and fake messages. Third, we discussed the latest simulation tools and the performance of the authentication schemes in terms of simulation tools, which was followed by the VANET applications. Lastly, we identified the open research challenges and gave future research directions. In sum, this survey fills the gap of existing surveys and summarizes the latest research development. All the security attacks in VANETs and their related countermeasures are discussed with respect to ensuring secure communication. The authentication schemes and comprehensive applications were introduced and analyzed in detail. In addition, open research challenges and future research directions were issued.

[1]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[2]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[3]  MengChu Zhou,et al.  Routing in Internet of Vehicles: A Review , 2015, IEEE Transactions on Intelligent Transportation Systems.

[4]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[5]  Jinsong Wu,et al.  Adaptive Quality-of-Service-Based Routing for Vehicular Ad Hoc Networks With Ant Colony Optimization , 2017, IEEE Transactions on Vehicular Technology.

[6]  Jinhua Guo,et al.  A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework , 2007, 2007 Mobile Networking for Vehicular Environments.

[7]  Pandi Vijayakumar,et al.  EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.

[8]  Xiaohui Liang,et al.  A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs , 2012, IEEE Transactions on Intelligent Transportation Systems.

[9]  Yang Li,et al.  Efficient authentication and access control of message dissemination over vehicular ad hoc network , 2016, Neurocomputing.

[10]  Teruo Higashino,et al.  Efficient VANET-Based Traffic Information Sharing using Buses on Regular Routes , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[11]  Kyung-Ah Shim,et al.  ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks , 2012, IEEE Transactions on Vehicular Technology.

[12]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[13]  Joseph Mouzna,et al.  An optimized adaptive algorithm for authentication of safety critical messages in VANET , 2013, 2013 8th International Conference on Communications and Networking in China (CHINACOM).

[14]  Azim Eskandarian,et al.  Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.

[15]  Marios D. Dikaiakos,et al.  Low-Cost Adaptive Monitoring Techniques for the Internet of Things , 2018, IEEE Transactions on Services Computing.

[16]  Lukas Malina,et al.  Short-Term Linkable Group Signatures with Categorized Batch Verification , 2012, FPS.

[17]  John Fagan,et al.  Countermeasures for GPS Signal Spoofing , 2005 .

[18]  Yasser L. Morgan,et al.  Notes on DSRC & WAVE Standards Suite: Its Architecture, Design, and Characteristics , 2010, IEEE Communications Surveys & Tutorials.

[19]  Pin-Han Ho,et al.  TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.

[20]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[21]  R. Jueneman,et al.  Message authentication , 1985, IEEE Communications Magazine.

[22]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[23]  George F. Riley,et al.  The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.

[24]  Lei Zhang,et al.  OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Information Forensics and Security.

[25]  Jelena V. Misic,et al.  DDoS attack on WAVE-enabled VANET through synchronization , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[26]  Ian F. Blake,et al.  Refinements of Miller's algorithm for computing the Weil/Tate pairing , 2006, J. Algorithms.

[27]  Arobinda Gupta,et al.  Distributed Misbehavior Detection in VANETs , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[28]  Mahamod Ismail,et al.  Vehicular communication ad hoc routing protocols: A survey , 2014, J. Netw. Comput. Appl..

[29]  Xiaoyan Zhu,et al.  An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.

[30]  Ozan K. Tonguz,et al.  Feasibility of virtual traffic lights in non-line-of-sight environments , 2012, VANET '12.

[31]  Nai-Wei Lo,et al.  Illusion Attack on VANET Applications - A Message Plausibility Problem , 2007, 2007 IEEE Globecom Workshops.

[32]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[33]  Sungjin Park,et al.  Improving Data Accessibility in Vehicle Ad hoc Network , 2012 .

[34]  Xiaodong Lin,et al.  Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[35]  Josep Domingo-Ferrer,et al.  Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response , 2015, IEEE Transactions on Computers.

[36]  Jie Cui,et al.  An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks , 2018, Inf. Sci..

[37]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[38]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[39]  Stephan Olariu,et al.  Taking VANET to the clouds , 2010, Int. J. Pervasive Comput. Commun..

[40]  Sunilkumar S. Manvi,et al.  A survey on authentication schemes in VANETs for secured communication , 2017, Veh. Commun..

[41]  Rex Chen,et al.  TARI: Meeting Delay Requirements in VANETs with Efficient Authentication and Revocation , 2009 .

[42]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[43]  Michael Weber,et al.  V-Tokens for Conditional Pseudonymity in VANETs , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[44]  Y. Koucheryavy,et al.  State of the Art and Research Challenges for VANETs , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[45]  András Varga,et al.  An overview of the OMNeT++ simulation environment , 2008, SimuTools.

[46]  Pandi Vijayakumar,et al.  Comprehensive survey on security services in vehicular ad-hoc networks , 2016 .

[47]  Tao Zhang,et al.  Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).

[48]  Rajkumar Buyya,et al.  A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..

[49]  Chun-I Fan,et al.  Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings , 2011, J. Inf. Sci. Eng..

[50]  Ajay Kaul,et al.  A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..

[51]  S. A. Kulkarni,et al.  A secure message authentication scheme for VANET using ECDSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[52]  Li He,et al.  Mitigating DoS attacks against signature-based authentication in VANETs , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[53]  Murizah Kassim,et al.  Mobile ad hoc network (MANET) routing protocols comparison for wireless sensor network , 2011, 2011 IEEE International Conference on System Engineering and Technology.

[54]  Yael Tauman Kalai,et al.  Improved Online/Offline Signature Schemes , 2001, CRYPTO.

[55]  Seema Bawa,et al.  A systematic review on routing protocols for Vehicular Ad Hoc Networks , 2014, Veh. Commun..

[56]  Li Zhao,et al.  LTE-V: A TD-LTE-Based V2X Solution for Future Vehicular Network , 2016, IEEE Internet of Things Journal.

[57]  S. Yousefi,et al.  Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.

[58]  Rajkumar Buyya,et al.  A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[59]  Feng Xia,et al.  Vehicular Social Networks: A survey , 2018, Pervasive Mob. Comput..

[60]  Rakesh Kumar,et al.  VANET security: Issues, challenges and solutions , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[61]  S. Eichler Strategies for Pseudonym Changes in Vehicular Ad Hoc Networks depending on Node Mobility , 2007, 2007 IEEE Intelligent Vehicles Symposium.

[62]  Pin-Han Ho,et al.  An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.

[63]  V. Vijayalakshmi,et al.  Survey on various mechanisms for secure and efficient VANET communication , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[64]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[65]  Miguel Sepulcre,et al.  Analytical Models of the Performance of C-V2X Mode 4 Vehicular Communications , 2018, IEEE Transactions on Vehicular Technology.

[66]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[67]  Srinivas Sampalli,et al.  A novel sender authentication scheme based on hash chain for Vehicular Ad-Hoc Networks , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).

[68]  E. Nowatkowski Michael,et al.  Scalable certificate revocation list distribution in vehicular ad hoc networks , 2010, 2010 IEEE Globecom Workshops.

[69]  Rongqing Zhang,et al.  Interference-free pilot design and channel estimation using ZCZ sequences for MIMO-OFDM-based C-V2X communications , 2018, China Communications.

[70]  Daniel Krajzewicz,et al.  iTETRIS: Adaptation of ITS Technologies for Large Scale Integrated Simulation , 2010, 2010 IEEE 71st Vehicular Technology Conference.

[71]  Qiaoyan Wen,et al.  Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.

[72]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[73]  Sevil Sen,et al.  A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.

[74]  Prathima Agrawal,et al.  Analysis of Certificate Revocation List Distribution Protocols for Vehicular Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[75]  Yanheng Liu,et al.  Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..

[76]  Yuanfei Zhang,et al.  Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud , 2020, IEEE Transactions on Dependable and Secure Computing.

[77]  Daniel Krajzewicz,et al.  SUMO - Simulation of Urban MObility An Overview , 2011 .

[78]  Rashid Minhas,et al.  Effects of jamming on IEEE 802.11p systems , 2010 .

[79]  Rajen Akalu Privacy, consent and vehicular ad hoc networks (VANETs) , 2018, Comput. Law Secur. Rev..

[80]  Chan Yeob Yeun,et al.  Security Challenges for Emerging VANETs , 2009 .

[81]  Laurie L. Joiner,et al.  Interference aware bandwidth estimation for load balancing in EMHR-energy based with mobility concerns hybrid routing protocol for VANET-WSN communication , 2017, Ad Hoc Networks.

[82]  Markus Jakobsson,et al.  Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.

[83]  Xiaohui Liang,et al.  STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.

[84]  Wen-Long Jin,et al.  Broadcasting safety information in vehicular networks: issues and approaches , 2010, IEEE Network.

[85]  Dr.Irshad Ahmed Sumra,et al.  Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey , 2015 .

[86]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[87]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[88]  Amir Hossein Jahangir,et al.  Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).

[89]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[90]  Lee Armstrong,et al.  DEDICATED SHORT RANGE COMMUNICATIONS (DSRC) HOME , 2002 .

[91]  Urmila Shrawankar,et al.  Secured Communication in Real Time VANET , 2009, 2009 Second International Conference on Emerging Trends in Engineering & Technology.

[92]  Susumu Ishihara,et al.  Distributing location-dependent data in VANETs by guiding data traffic to high vehicle density areas , 2010, 2010 IEEE Vehicular Networking Conference.

[93]  Martin Fränzle,et al.  A Traffic Aware Segment-based Routing protocol for VANETs in urban scenarios , 2018, Comput. Electr. Eng..

[94]  Marios D. Dikaiakos,et al.  ADMin: Adaptive monitoring dissemination for the Internet of Things , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[95]  Mohsen Guizani,et al.  ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.

[96]  Christof Paar,et al.  Elliptic Curve Cryptography on Smart Cards without Coprocessors , 2001, CARDIS.

[97]  Juan-Carlos Cano,et al.  Trust Management for Vehicular Networks: An Adversary-Oriented Overview , 2016, IEEE Access.

[98]  Josep Domingo-Ferrer,et al.  Distributed Aggregate Privacy-Preserving Authentication in VANETs , 2017, IEEE Transactions on Intelligent Transportation Systems.

[99]  Fagen Li,et al.  Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey , 2019, Veh. Commun..

[100]  Alexey V. Vinel,et al.  AI-Based Malicious Network Traffic Detection in VANETs , 2018, IEEE Network.

[101]  Ke Zeng,et al.  Pseudonymous PKI for Ubiquitous Computing , 2006, EuroPKI.

[102]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[103]  Seung-Woo Seo,et al.  RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications , 2011, IEEE Journal on Selected Areas in Communications.

[104]  Jing Zhang,et al.  An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks , 2019, IEEE Transactions on Intelligent Transportation Systems.

[105]  Anis Laouiti,et al.  Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.

[106]  Reinhard German,et al.  Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.

[107]  Leonard Barolli,et al.  Effect of security and trustworthiness for a fuzzy cluster management system in VANETs , 2019, Cognitive Systems Research.

[108]  Josep Domingo-Ferrer,et al.  Practical secure and privacy-preserving scheme for value-added applications in VANETs , 2015, Comput. Commun..

[109]  Tan Yan,et al.  A Distributed Intersection Management Protocol for Safety, Efficiency, and Driver’s Comfort , 2018, IEEE Internet of Things Journal.

[110]  Ashutosh Saxena,et al.  A novel remote user authentication scheme using bilinear pairings , 2006, Comput. Secur..

[111]  Christian Bonnet,et al.  Vehicular Mobility Simulation for VANETs , 2007, 40th Annual Simulation Symposium (ANSS'07).

[112]  Javier Gozalvez,et al.  LTE-V for Sidelink 5G V2X Vehicular Communications: A New 5G Technology for Short-Range Vehicle-to-Everything Communications , 2017, IEEE Vehicular Technology Magazine.

[113]  Md Zakirul Alam Bhuiyan,et al.  Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.

[114]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[115]  Soumyadev Maity,et al.  A Protocol for Authentication with Multiple Levels of Anonymity (AMLA) in VANETs , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[116]  Abdelwahab Boualouache,et al.  A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks , 2017, IEEE Communications Surveys & Tutorials.

[117]  Jia-Lun Tsai,et al.  Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings , 2014, Int. J. Commun. Syst..

[118]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[119]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[120]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[121]  L. Hui Security and Privacy Issues for Inter-vehicle Communcations in VANETs , 2009 .

[122]  Jinshu Su,et al.  An efficient distributed key management scheme for group-signature based anonymous authentication in VANET , 2012, Secur. Commun. Networks.

[123]  Rutvij H. Jhaveri,et al.  Trust Based Approaches for Secure Routing in VANET: A Survey , 2015 .

[124]  Kuo-Yu Tsai,et al.  An efficient certificateless signature scheme without bilinear pairings , 2014, Multimedia Tools and Applications.

[125]  Maxim Raya,et al.  TraCI: an interface for coupling road traffic and network simulators , 2008, CNS '08.

[126]  Stephan Olariu,et al.  Vehicular Networks: From Theory to Practice , 2009 .

[127]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[128]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[129]  Xuemin Shen,et al.  EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.

[130]  Maxim Raya,et al.  Security Aspects of Inter-Vehicle Communications , 2005 .

[131]  Panagiotis Papadimitratos,et al.  TraNS: realistic joint traffic and network simulator for VANETs , 2008, MOCO.

[132]  Bo Sun,et al.  A Traffic-Light-Aware Routing Protocol Based on Street Connectivity for Urban Vehicular Ad Hoc Networks , 2016, IEEE Communications Letters.

[133]  Lei Zhang,et al.  Key Management Scheme for Secure Channel Establishment in Fog Computing , 2021, IEEE Transactions on Cloud Computing.

[134]  Jia-Lun Tsai,et al.  An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings , 2016, IEEE Transactions on Intelligent Transportation Systems.

[135]  Jochen Seitz,et al.  Vehicle-to-Pedestrian Communication for Vulnerable Road Users: Survey, Design Considerations, and Challenges , 2019, Sensors.

[136]  Daniel Krajzewicz,et al.  Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .

[137]  Xiang Cheng,et al.  5G-Enabled Cooperative Intelligent Vehicular (5GenCIV) Framework: When Benz Meets Marconi , 2017, IEEE Intelligent Systems.

[138]  Jian Wang,et al.  A Survey of Vehicle to Everything (V2X) Testing , 2019, Sensors.

[139]  Gang Qu,et al.  A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy , 2019, IEEE Transactions on Intelligent Transportation Systems.

[140]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[141]  Kemal Akkaya,et al.  A survey of authentication schemes for vehicular ad hoc networks , 2011, Secur. Commun. Networks.

[142]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[143]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[144]  Akbar Ghaffar Pour Rahbar,et al.  Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks , 2011, Multimedia Tools and Applications.

[145]  Ana I. González-Tablas,et al.  Overview of security issues in Vehicular Ad-hoc Networks , 2011 .

[146]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[147]  Klaus Wehrle,et al.  Modeling and Tools for Network Simulation , 2010, Modeling and Tools for Network Simulation.

[148]  Javier Gozalvez,et al.  LTE-V for Sidelink 5 G V 2 X Vehicular Communications , 2022 .

[149]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[150]  Dong Hoon Lee,et al.  Efficient Message Authentication Scheme for VANET , 2009, INSCRYPT 2009.

[151]  Victor I. Chang,et al.  Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , 2018, Future Gener. Comput. Syst..

[152]  M.S. Kakkasageri,et al.  Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach , 2009, 2009 International Conference on Future Computer and Communication.

[153]  Mohammad S. Obaidat,et al.  A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..

[154]  G. H. Raisoni,et al.  Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .

[155]  Huang Lu,et al.  A novel ID-based authentication framework with adaptive privacy preservation for VANETs , 2012, 2012 Computing, Communications and Applications Conference.

[156]  Todd R. Andel,et al.  On the credibility of manet simulations , 2006, Computer.

[157]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[158]  Sudip Misra,et al.  Guide to Wireless Ad Hoc Networks , 2009, Computer Communications and Networks.

[159]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[160]  Qi Chen,et al.  Overhaul of ieee 802.11 modeling and simulation in ns-2 , 2007, MSWiM '07.

[161]  Jeng-Farn Lee,et al.  TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.

[162]  Xian Wang,et al.  An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks , 2015, Inf. Sci..