{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:02Z","timestamp":1740099062314,"version":"3.37.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788159"},{"type":"electronic","value":"9783319788166"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_6","type":"book-chapter","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:02:48Z","timestamp":1524524568000},"page":"69-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Secure Communication in VANET Broadcasting"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Jafer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6112-8874","authenticated-orcid":false,"given":"M. Arif","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Sabih","family":"ur Rehman","sequence":"additional","affiliation":[]},{"given":"Tanveer A.","family":"Zia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"issue":"4","key":"6_CR1","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/JIOT.2015.2388588","volume":"2","author":"Neeraj Kumar","year":"2015","unstructured":"Kumar, N., Misra, S., Rodrigues, J., Obaidat, M.: Coalition games for spatio-temporal big data in internet of vehicles environment: a comparative analysis (2015)","journal-title":"IEEE Internet of Things Journal"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/ACCESS.2015.2416657","volume":"3","author":"K Alam","year":"2015","unstructured":"Alam, K., Saini, M., El Saddik, A.: Toward social internet of vehicles: concept, architecture, and applications. IEEE Access 3, 343\u2013357 (2015)","journal-title":"IEEE Access"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Gerla, M., Lee, E.-K., Pau, G., Lee, U.: Internet of vehicles: from intelligent grid to autonomous cars and vehicular clouds. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 241\u2013246, March 2014","DOI":"10.1109\/WF-IoT.2014.6803166"},{"issue":"3","key":"6_CR4","first-page":"29","volume":"3","author":"S Rehman ur","year":"2013","unstructured":"ur Rehman, S., Khan, M.A., Zia, T.A., Zheng, L.: Vehicular ad-hoc networks (VANETs)-an overview and challenges. J. Wirel. Netw. Commun. 3(3), 29\u201338 (2013)","journal-title":"J. Wirel. Netw. Commun."},{"key":"6_CR5","volume-title":"Data Communications & Networking (SIE)","author":"AB Forouzan","year":"2006","unstructured":"Forouzan, A.B.: Data Communications & Networking (SIE). Tata McGraw-Hill Education, New York City (2006)"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1186\/1687-1499-2011-11","volume":"2011","author":"H-K Choi","year":"2011","unstructured":"Choi, H.-K., Kim, I.-H., Yoo, J.-C.: Secure and efficient protocol for vehicular ad hoc network with privacy preservation. EURASIP J. Wirel. Commun. Netw. 2011, 11 (2011)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"6_CR7","unstructured":"Armknecht, F., Festag, A., Westhoff, D., Zeng, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: 2007 ITG-GI Conference Communication in Distributed Systems (KiVS), pp. 1\u201312 (2007)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Hesham, A., Abdel-Hamid, A., El-Nasr, M.A.: A dynamic key distribution protocol for PKI-based VANETs. In: 2011 IFIP Wireless Days (WD), pp. 1\u20133. IEEE (2011)","DOI":"10.1109\/WD.2011.6098221"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Al Falasi, H., Barka, E.: Revocation in VANETs: a survey. In: 2011 International Conference on Innovations in Information Technology (IIT), pp. 214\u2013219. IEEE (2011)","DOI":"10.1109\/INNOVATIONS.2011.5893820"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M.S.: Survey on security attacks in vehicular ad hoc networks (VANETs). In: 2012 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1\u20139. IEEE (2012)","DOI":"10.1109\/ICSPCS.2012.6507953"},{"issue":"6","key":"6_CR11","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.1016\/j.jnca.2011.07.006","volume":"34","author":"DA Rivas","year":"2011","unstructured":"Rivas, D.A., Barcel\u00f3-Ordinas, J.M., Zapata, M.G., Morillo-Pozo, J.D.: Security on VANETs: privacy, misbehaving nodes, false information and secure data aggregation. J. Netw. Comput. Appl. 34(6), 1942\u20131955 (2011). Control and Optimization over Wireless Networks","journal-title":"J. Netw. Comput. Appl."},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.cose.2016.03.008","volume":"60","author":"C Djamaludin","year":"2016","unstructured":"Djamaludin, C., Foo, E., Camtepe, S., Corke, P.: Revocation and update of trust in autonomous delay tolerant networks. Comput. Secur. 60, 15\u201336 (2016)","journal-title":"Comput. Secur."},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.adhoc.2015.05.016","volume":"36","author":"C Caballero-Gil","year":"2016","unstructured":"Caballero-Gil, C., Molina-Gil, J., Hern\u00e1ndez-Serrano, J., Le\u00f3n, O., Soriano-Ibanez, M.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. 36, 482\u2013494 (2016)","journal-title":"Ad Hoc Netw."},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","volume":"44","author":"RG Engoulou","year":"2014","unstructured":"Engoulou, R.G., Bella\u00efche, M., Pierre, S., Quintero, A.: Vanet security surveys. Comput. Commun. 44, 1\u201313 (2014)","journal-title":"Comput. Commun."},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1201\/EBK1439819197-13","volume-title":"Security of Self-Organizing Networks","author":"VIKAS YADAV","year":"2010","unstructured":"Yadav, V., Misra, S., Afaque, M.: Security in vehicular ad hoc networks. In: Security of Self-organizing Networks: MANET, WSN, WMN, VANET, p. 227 (2010)"},{"key":"6_CR16","unstructured":"Stampoulis, A., Chai, Z.: A survey of security in vehicular networks. Project CPSC, vol. 534 (2007)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Qian, Y., Moayeri, N.: Design of secure and application-oriented VANETs. In: IEEE Vehicular Technology Conference on VTC Spring 2008, pp. 2794\u20132799 (2008)","DOI":"10.1109\/VETECS.2008.610"},{"key":"6_CR18","unstructured":"Kargl, F., Ma, Z., Schoch, E.: Security engineering for VANETs. In: Proceedings of 4th Workshop on Embedded Security in Cars, pp. 15\u201322 (2006)"},{"issue":"11","key":"6_CR19","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MCOM.2008.4689252","volume":"46","author":"P Papadimitratos","year":"2008","unstructured":"Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.-P.: Secure vehicular communication systems: design and architecture. IEEE Commun. Mag. 46(11), 100\u2013109 (2008)","journal-title":"IEEE Commun. Mag."},{"issue":"7","key":"6_CR20","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1049\/iet-com.2009.0191","volume":"4","author":"JT Isaac","year":"2010","unstructured":"Isaac, J.T., Zeadally, S., Camara, J.S.: Security attacks and solutions for vehicular ad hoc networks. IET Commun. 4(7), 894\u2013903 (2010)","journal-title":"IET Commun."},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.9790\/0661-1520116","volume":"15","author":"S Rehman ur","year":"2013","unstructured":"ur Rehman, S., Khan, M.A., Zia, T.A., Khokhar, R.H.: A synopsis of simulation and mobility modeling in vehicular ad-hoc networks (VANETs). IOSR J. Comput. Eng. (IOSR-JCE) 15, 1\u201316 (2013). e-ISSN 2278-0661","journal-title":"IOSR J. Comput. Eng. (IOSR-JCE)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Jiang, D., Delgrossi, L.: IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In: IEEE Vehicular Technology Conference on VTC Spring 2008, pp. 2036\u20132040 (2008)","DOI":"10.1109\/VETECS.2008.458"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Jafer, M., Khan, M.A., Rehman, S.U., Zia, T.A.: Optimizing broadcasting scheme for VANETs using genetic algorithm. In: 2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops), pp. 222\u2013229, November 2016","DOI":"10.1109\/LCN.2016.051"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Jafer, M., Khan, M.A., Rehman, S.U., Zia, T.A.: Broadcasting under highway environment in VANETs using genetic algorithm. In: 2016 IEEE 85th Vehicular Technology Conference (VTC-Spring) (VTC Workshops), June 2017","DOI":"10.1109\/VTCSpring.2017.8108637"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Saeed, R., Naemat, A., Bin Aris, A., Bin Awang, M.: Design and evaluation of lightweight IEEE 802.11p-based TDMA MAC method for road side-to-vehicle communications. In: The 12th International Conference on Advanced Communication Technology (ICACT), vol. 2, pp. 1483\u20131488, February 2010","DOI":"10.1109\/ICCCE.2010.5556774"},{"key":"6_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224","volume-title":"Wireless Communications","author":"A Goldsmith","year":"2005","unstructured":"Goldsmith, A.: Wireless Communications. Cambridge University Press, Cambridge (2005)"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Hussain, M., Rasheed, H., Ali, N., Saqib, N.: Roadside infrastructure transmission of VANET using power line communication. In: 2017 International Conference on Communication, Computing and Digital Systems (C-CODE), pp. 139\u2013143, March 2017","DOI":"10.1109\/C-CODE.2017.7918917"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"283","DOI":"10.2528\/PIERB12081104","volume":"44","author":"AG Lazaropoulos","year":"2012","unstructured":"Lazaropoulos, A.G.: Deployment concepts for overhead high voltage broadband over power lines connections with two-hop repeater system: capacity countermeasures against aggravated topologies and high noise environments. Prog. Electromagnetics Res. 44, 283\u2013307 (2012)","journal-title":"Prog. Electromagnetics Res."},{"issue":"2","key":"6_CR29","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/2817552","volume":"48","author":"M Saini","year":"2015","unstructured":"Saini, M., Alelaiwi, A., Saddik, A.E.: How close are we to realizing a pragmatic vanet solution? A meta-survey. ACM Comput. Surv. (CSUR) 48(2), 29 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T18:46:21Z","timestamp":1571251581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}