{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:50:32Z","timestamp":1774630232561,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811313271","type":"print"},{"value":"9789811313288","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T00:00:00Z","timestamp":1543449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1328-8_71","type":"book-chapter","created":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T15:12:12Z","timestamp":1543417932000},"page":"547-555","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Sybil Attacks in Intelligent Vehicular Ad Hoc Networks: A Review"],"prefix":"10.1007","author":[{"given":"Aveen","family":"Muhamad","sequence":"first","affiliation":[]},{"given":"Mourad","family":"Elhadef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,29]]},"reference":[{"key":"71_CR1","unstructured":"Al Qatari M, Yeun C, Al-Hawi F (2010) Security and privacy of intelligent VANETs. Comput Intell Modern Heuristics"},{"key":"71_CR2","doi-asserted-by":"crossref","unstructured":"Toor Y, M\u00fchlethaler P, Laouiti A, Fortelle ADL (2008) Vehicle ad hoc networks: applications and related technical issues. IEEE Com. Surveys & Tutorials, Oct 2008","DOI":"10.1109\/COMST.2008.4625806"},{"key":"71_CR3","doi-asserted-by":"crossref","unstructured":"Chawla A, Patial RK, Kumar D (2016) Comparative analysis of sybil attack detection techniques in VANETs. Indian J Sci Technol 9(47)","DOI":"10.17485\/ijst\/2015\/v8i1\/106423"},{"key":"71_CR4","unstructured":"Malathi K, Manavalan R (2014) Detection and localization of sybil attack in VANET: a review. Int J Res Appl Sci Eng Technol 2"},{"key":"71_CR5","unstructured":"Bojnord AS, Bojnord HS (2017) A secure model for prevention of sybil attack in vehicular ad hoc networks. IJCSNS Int J Comput Sci Netw Secur 17(1):30"},{"key":"71_CR6","unstructured":"Kamani J, Parikh D (2015) A review on sybil attack detection techniques. J Res 01(01). ISSN:2395\u20137549"},{"key":"71_CR7","doi-asserted-by":"crossref","unstructured":"Dak AY, Yahya S, Kassim (2012) A literature survey on security challenges in VANETs. Int J Comput Theory Eng 4(6)","DOI":"10.7763\/IJCTE.2012.V4.627"},{"issue":"15","key":"71_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.5120\/17262-7614","volume":"98","author":"Deepak Kushwaha","year":"2014","unstructured":"Kushwaha D, Shukla PK, Baraskar R (2014) A survey on sybil attack in vehicular ad-hoc network. Int J Comput Appl 98(15)","journal-title":"International Journal of Computer Applications"},{"key":"71_CR9","unstructured":"Kaur H, Devgan S, Singh P (2006) Sybil attack in VANET. In: International conference on computing for sustainable global development"},{"key":"71_CR10","doi-asserted-by":"crossref","unstructured":"Grover J, Gaur MS, Laxmi V (2011) A sybil attack detection approach using neighboring vehicles in VANET. In: Conference: proceedings of the 4th international conference on security of information and networks, SIN 2011, Sydney, NSW, Australia, 14\u201319 Nov 2011","DOI":"10.1145\/2070425.2070450"},{"key":"71_CR11","doi-asserted-by":"crossref","unstructured":"Kaur Saggi M, Kaur R (2015) Isolation of sybil attack in VANET using neighboring information. In: IEEE international advance computing conference (IACC)","DOI":"10.1109\/IADCC.2015.7154666"},{"key":"71_CR12","doi-asserted-by":"crossref","unstructured":"Al-Mutaz M, Malott L, Chellappan S (2014) Detecting sybil attacks in vehicular networks. J Trust Manag","DOI":"10.1186\/2196-064X-1-4"},{"key":"71_CR13","doi-asserted-by":"crossref","unstructured":"Arpita M. Bhise, Shailesh D. Kamble,\u201d Detection and Mitigation of Sybil Attack in Peer-to-peer Network\u201d, I. J. Computer Network and Information Security, 2016","DOI":"10.1016\/j.procs.2016.02.080"},{"issue":"6","key":"71_CR14","doi-asserted-by":"publisher","first-page":"185","DOI":"10.5121\/ijnsa.2011.3614","volume":"3","author":"Mina Rahbari","year":"2011","unstructured":"Rahbari M, Jamali MAJ (2011) Efficient detection of sybil attack based on cryptography in VANET. Int J Netw Secur Its Appl (IJNSA) 3(6)","journal-title":"International Journal of Network Security & Its Applications"},{"key":"71_CR15","doi-asserted-by":"crossref","unstructured":"Park S, Aslam B, Turgut D, Zou CC (2009) Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: Proceedings of the 28th IEEE conference on military communications","DOI":"10.1109\/MILCOM.2009.5379844"},{"key":"71_CR16","doi-asserted-by":"crossref","unstructured":"Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi,\u201d A Novel Defense Mechanism against Sybil Attacks in VANET\u201d, Sept. 7\u201311, 2010, Taganrog, Russian Federation","DOI":"10.1145\/1854099.1854150"},{"key":"71_CR17","unstructured":"Grover J, Gaur MS, Prajapati N, Laxmi V (2010) RSS-based sybil attack detection in VANETs. In: Conference: TENCON, Japan"},{"key":"71_CR18","unstructured":"Bouassida MS, Guette G, Shawky M, Ducourthial B (2009) Sybil nodes detection based on received signal strength variations within VANET, Int J Netw Secur 9"},{"key":"71_CR19","unstructured":"Krishna N (2016) Detection and prevention of sybil attack in networks Nidhiya Krishna"},{"key":"71_CR20","unstructured":"Rawat P, Sharma S (2016) Review on sybil attack in vehicular ad hoc network. Int J Sci Eng Technology Res (IJSETR), 5(4)"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1328-8_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T05:51:58Z","timestamp":1573019518000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1328-8_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,29]]},"ISBN":["9789811313271","9789811313288"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1328-8_71","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"value":"1876-1100","type":"print"},{"value":"1876-1119","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,29]]},"assertion":[{"value":"MUE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia and Ubiquitous Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salerno","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mue2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mue-conference.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}