{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:27:27Z","timestamp":1757705247982,"version":"3.37.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030228842"},{"type":"electronic","value":"9783030228859"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22885-9_15","type":"book-chapter","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T13:12:18Z","timestamp":1561036338000},"page":"163-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Road Safety Against Sybil Attacks Based on RSU Collaboration in VANET Environment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7095-4502","authenticated-orcid":false,"given":"Said","family":"Benkirane","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,21]]},"reference":[{"issue":"6","key":"15_CR1","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.trc.2008.07.002","volume":"17","author":"TG Crainic","year":"2009","unstructured":"Crainic, T.G., Gendreau, M., Potvin, J.Y.: Intelligent freight-transportation systems: assessment and the contribution of operations research. Transp. Res. Part C: Emerg. Technol. 17(6), 541\u2013557 (2009)","journal-title":"Transp. Res. Part C: Emerg. Technol."},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.adhoc.2016.02.017","volume":"44","author":"F Cunha","year":"2016","unstructured":"Cunha, F., et al.: Data communication in VANETs: protocols, applications and challenges. Ad Hoc Netw. 44, 90\u2013103 (2016)","journal-title":"Ad Hoc Netw."},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). \n                    https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"15_CR4","unstructured":"Mishra, A.: Security and Quality of Service in Ad Hoc Wireless Networks (chaps. 1, 3) (2008). ISBN 13 978-0-521-87824-1 Handbook"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","volume":"61","author":"F Sakiz","year":"2017","unstructured":"Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33\u201350 (2017)","journal-title":"Ad Hoc Netw."},{"key":"15_CR6","first-page":"19","volume":"9","author":"SS Manvi","year":"2017","unstructured":"Manvi, S.S., Tangade, S.: A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 9, 19\u201330 (2017)","journal-title":"Veh. Commun."},{"issue":"7","key":"15_CR7","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1049\/iet-com.2009.0191","volume":"4","author":"JT Isaac","year":"2010","unstructured":"Isaac, J.T., Zeadally, S., Camara, J.S.: Security attacks and solutions for vehicular ad hoc networks. Commun. IET 4(7), 894\u2013903 (2010)","journal-title":"Commun. IET"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2004, Philadelphia, PA, USA, pp. 29\u201337. ACM (2004)","DOI":"10.1145\/1023875.1023881"},{"issue":"3","key":"15_CR9","first-page":"1","volume":"7","author":"B Lee","year":"2013","unstructured":"Lee, B., Jeong, E., Jung, I.: A DTSA (detection technique against a Sybil attack) protocol using SKC (session key based certificate) on VANET. Int. J. Secur. Appl. 7(3), 1\u201310 (2013)","journal-title":"Int. J. Secur. Appl."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Xiao, B., Yu, B., Gao, C.: Detection and localization of Sybil nodes in VANETs. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, DIWANS 2006, Los Angeles, CA, USA, pp. 1\u20138. ACM (2006)","DOI":"10.1145\/1160972.1160974"},{"issue":"3","key":"15_CR11","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/JSAC.2011.110308","volume":"29","author":"T Zhou","year":"2011","unstructured":"Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: P2DAP-Sybil attacks detection in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 29(3), 582\u2013594 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"6","key":"15_CR12","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1016\/j.jpdc.2013.02.001","volume":"73","author":"B Yu","year":"2013","unstructured":"Yu, B., Xu, C.Z., Xiao, B.: Detecting Sybil attacks in VANETs. J. Parallel Distrib. Comput. 73(6), 746\u2013756 (2013)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"2","key":"15_CR13","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s12083-016-0431-x","volume":"10","author":"X Feng","year":"2017","unstructured":"Feng, X., Li, C., Chen, D., Tang, J.: A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw. Appl. 10(2), 305\u2013314 (2017)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259\u2013268. ACM, New York (2004)","DOI":"10.1145\/984622.984660"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/JRPROC.1946.234568","volume":"34","author":"HT Friis","year":"1946","unstructured":"Friis, H.T.: A note on a simple transmission formula. Proc. IRE 34, 254\u2013256 (1946)","journal-title":"Proc. IRE"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1002\/1097-024X(200102)31:2<103::AID-SPE358>3.0.CO;2-O","volume":"31","author":"F Bellifemine","year":"2001","unstructured":"Bellifemine, F., Poggi, A., Rimassa, G.: Developing multi-agent systems with a FIPA-compliant agent framework. Softw. Pract. Exp. 31, 103\u2013128 (2001)","journal-title":"Softw. Pract. Exp."}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22885-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T13:16:33Z","timestamp":1561036593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22885-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030228842","9783030228859"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22885-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"21 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MSPN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile, Secure, and Programmable Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mohammedia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mspn2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mspn-2019\/Home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"48","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}