{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T04:23:20Z","timestamp":1769833400425,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T00:00:00Z","timestamp":1635552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T00:00:00Z","timestamp":1635552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11277-021-09261-x","type":"journal-article","created":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T02:02:27Z","timestamp":1635559347000},"page":"2699-2719","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Detecting Sybil Attack in Vehicular Ad-hoc Networks (Vanets) by Using Fitness Function, Signal Strength Index and Throughput"],"prefix":"10.1007","volume":"123","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7208-3576","authenticated-orcid":false,"given":"Seyed Salar","family":"Sefati","sequence":"first","affiliation":[]},{"given":"Sara Ghiasi","family":"Tabrizi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,30]]},"reference":[{"key":"9261_CR1","doi-asserted-by":"crossref","unstructured":"Alheeti, K. M.A., Gruebler, A., McDonald-Maier, K. D. (2015). An intrusion detection system against malicious attacks on the communication network of driverless cars. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), IEEE, pp. 916\u2013921.","DOI":"10.1109\/CCNC.2015.7158098"},{"key":"9261_CR2","doi-asserted-by":"crossref","unstructured":"Alheeti, K. M. A. Gruebler, A., McDonald-Maier, K. D., Fernando, A. Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model. In 2016 IEEE International Conference on Consumer Electronics (ICCE), IEEE, pp. 502\u2013503.","DOI":"10.1109\/ICCE.2016.7430705"},{"issue":"4","key":"9261_CR3","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.vehcom.2015.08.001","volume":"2","author":"C Bian","year":"2015","unstructured":"Bian, C., Zhao, T., Li, X., & Yan, W. (2015). Boosting named data networking for data dissemination in urban VANET scenarios. Vehicular Communications, 2(4), 195\u2013207.","journal-title":"Vehicular Communications"},{"issue":"3","key":"9261_CR4","first-page":"397","volume":"22","author":"SM Faisal","year":"2020","unstructured":"Faisal, S. M., & Zaidi, T. (2020). Timestamp Based Detection of Sybil Attack in VANET. Int. J. Netw. Secur., 22(3), 397\u2013408.","journal-title":"Int. J. Netw. Secur."},{"issue":"5","key":"9261_CR5","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1109\/TITS.2015.2423667","volume":"16","author":"J Cheng","year":"2015","unstructured":"Cheng, J., Cheng, J., Zhou, M., Liu, F., Gao, S., & Liu, C. (2015). Routing in internet of vehicles: A review. IEEE Transactions on Intelligent Transportation Systems, 16(5), 2339\u20132352.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"9261_CR6","doi-asserted-by":"crossref","unstructured":"Yao, Y., et al. (2017). Voiceprint: A novel Sybil attack detection method based on RSSI for VANETs. In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN),: IEEE, pp. 591\u2013602.","DOI":"10.1109\/DSN.2017.10"},{"key":"9261_CR7","doi-asserted-by":"publisher","unstructured":"Sefati, S., Mousavinasab, M., Zare hFarkhady, R. (2021). Load balancing in cloud computing environment using the Grey wolf optimization algorithm based on the reliability: performance evaluation. The Journal of Supercomputing, https:\/\/doi.org\/10.1007\/s11227-021-03810-8.","DOI":"10.1007\/s11227-021-03810-8"},{"key":"9261_CR8","first-page":"1122","volume":"5","author":"P Pukale","year":"2013","unstructured":"Pukale, P., & Gupta, P. (2013). Analysis of end-to-end delay in vehicular networks. International Journal of Science Research, 5, 1122\u20131125.","journal-title":"International Journal of Science Research"},{"key":"9261_CR9","doi-asserted-by":"crossref","unstructured":"Walters, J. P., Liang, Z., Shi, W., Chaudhary, V. (2007). Wireless sensor network security: A survey. In Security in distributed, grid, mobile, and pervasive computing: Auerbach Publications, pp. 367\u2013409.","DOI":"10.1201\/9780429119347-20"},{"issue":"5","key":"9261_CR10","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1109\/TMC.2007.1036","volume":"6","author":"K Liu","year":"2007","unstructured":"Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536\u2013550.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"4","key":"9261_CR11","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046\u20132069.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"12","key":"9261_CR12","doi-asserted-by":"publisher","first-page":"2838","DOI":"10.1016\/j.comcom.2007.12.004","volume":"31","author":"A Boukerche","year":"2008","unstructured":"Boukerche, A., Oliveira, H. A., Nakamura, E. F., & Loureiro, A. A. (2008). Vehicular ad hoc networks: A new challenge for localization-based systems. Computer communications, 31(12), 2838\u20132849.","journal-title":"Computer communications"},{"issue":"21","key":"9261_CR13","doi-asserted-by":"publisher","first-page":"7560","DOI":"10.1016\/j.eswa.2015.05.057","volume":"42","author":"P Sarigiannidis","year":"2015","unstructured":"Sarigiannidis, P., Karapistoli, E., & Economides, A. A. (2015). \"Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 42(21), 7560\u20137572.","journal-title":"Expert Systems with Applications"},{"key":"9261_CR14","doi-asserted-by":"publisher","first-page":"100312","DOI":"10.1016\/j.cosrev.2020.100312","volume":"38","author":"MM Ogonji","year":"2020","unstructured":"Ogonji, M. M., Okeyo, G., & Wafula, J. M. (2020). A survey on privacy and security of Internet of Things. Computer Science Review, 38, 100312.","journal-title":"Computer Science Review"},{"issue":"4","key":"9261_CR15","doi-asserted-by":"publisher","first-page":"100","DOI":"10.11648\/j.jeee.20210904.12","volume":"9","author":"SS Sefati","year":"2021","unstructured":"Sefati, S. S., & Tabrizi, S. G. (2021). Cluster head selection and routing protocol for wireless sensor networks (WSNs) based on software-defined network (SDN) via game of theory. Journal of Electrical and Electronic Engineering, 9(4), 100\u2013115.","journal-title":"Journal of Electrical and Electronic Engineering"},{"issue":"10","key":"9261_CR16","doi-asserted-by":"publisher","first-page":"7745","DOI":"10.1109\/JIOT.2020.3038848","volume":"8","author":"P Park","year":"2020","unstructured":"Park, P., Di Marco, P., Nah, J., & Fischione, C. (2020). Wireless avionics intracommunications: A survey of benefits, challenges, and solutions. IEEE Internet of Things Journal, 8(10), 7745\u20137767.","journal-title":"IEEE Internet of Things Journal"},{"issue":"9","key":"9261_CR17","doi-asserted-by":"publisher","first-page":"e4768","DOI":"10.1002\/dac.4768","volume":"34","author":"S Sefati","year":"2021","unstructured":"Sefati, S., Abdi, M., & Ghaffari, A. (2021). Cluster-based data transmission scheme in wireless sensor networks using black hole and ant colony algorithms. International Journal of Communication Systems, 34(9), e4768. https:\/\/doi.org\/10.1002\/dac.4768","journal-title":"International Journal of Communication Systems"},{"key":"9261_CR18","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1016\/j.future.2020.06.028","volume":"112","author":"S Sengan","year":"2020","unstructured":"Sengan, S., Subramaniyaswamy, V., Nair, S. K., Indragandhi, V., Manikandan, J., & Ravi, L. (2020). Enhancing cyber\u2013physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Generation Computer Systems, 112, 724\u2013737.","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"9261_CR19","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s11277-013-1161-5","volume":"73","author":"K Verma","year":"2013","unstructured":"Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless personal communications, 73(1), 95\u2013126.","journal-title":"Wireless personal communications"},{"key":"9261_CR20","doi-asserted-by":"publisher","first-page":"47258","DOI":"10.1109\/ACCESS.2018.2864111","volume":"6","author":"C Iwendi","year":"2018","unstructured":"Iwendi, C., Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., & Bashir, A. K. (2018). On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access, 6, 47258\u201347267.","journal-title":"IEEE Access"},{"issue":"6","key":"9261_CR21","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1016\/j.jpdc.2013.02.001","volume":"73","author":"B Yu","year":"2013","unstructured":"Yu, B., Xu, C.-Z., & Xiao, B. (2013). Detecting sybil attacks in VANETs. Journal of Parallel and Distributed Computing, 73(6), 746\u2013756.","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"3","key":"9261_CR22","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1007\/s11277-013-1273-y","volume":"73","author":"C-L Chen","year":"2013","unstructured":"Chen, C.-L., Chang, C., Chang, C.-H., & Wang, Y.-F. (2013). A secure ambulance communication protocol for VANET. Wireless personal communications, 73(3), 1187\u20131213.","journal-title":"Wireless personal communications"},{"issue":"6","key":"9261_CR23","doi-asserted-by":"publisher","first-page":"2538","DOI":"10.1109\/TVT.2014.2344633","volume":"64","author":"M Fogue","year":"2014","unstructured":"Fogue, M., et al. (2014). Securing warning message dissemination in VANETs using cooperative neighbor position verification. IEEE Transactions on Vehicular Technology, 64(6), 2538\u20132550.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"9261_CR24","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s11277-018-6107-5","volume":"105","author":"M Jamshidi","year":"2019","unstructured":"Jamshidi, M., Zangeneh, E., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145\u2013173.","journal-title":"Wireless Personal Communications"},{"key":"9261_CR25","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.asoc.2018.12.001","volume":"75","author":"J Liang","year":"2019","unstructured":"Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing, 75, 712\u2013727.","journal-title":"Applied Soft Computing"},{"key":"9261_CR26","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.adhoc.2016.02.017","volume":"44","author":"F Cunha","year":"2016","unstructured":"Cunha, F., et al. (2016). Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44, 90\u2013103.","journal-title":"Ad Hoc Networks"},{"key":"9261_CR27","doi-asserted-by":"publisher","unstructured":"Sefati, S. S., Navimipour, N. J. (2021). A QoS-aware service composition mechanism in the Internet of things using a hidden Markov model-based optimization algorithm. IEEE Internet of Things Journal, https:\/\/doi.org\/10.1109\/JIOT.2021.3074499.","DOI":"10.1109\/JIOT.2021.3074499"},{"issue":"2","key":"9261_CR28","doi-asserted-by":"publisher","first-page":"155014772090639","DOI":"10.1177\/1550147720906390","volume":"16","author":"J Liu","year":"2020","unstructured":"Liu, J., Yang, W., Zhang, J., & Yang, C. (2020). Detecting false messages in vehicular ad hoc networks based on a traffic flow model. International Journal of Distributed Sensor Networks, 16(2), 1550147720906390.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"4","key":"9261_CR29","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1007\/s11277-019-06836-7","volume":"110","author":"H Rajadurai","year":"2020","unstructured":"Rajadurai, H., & Gandhi, U. D. (2020). Fuzzy based collaborative verification system for Sybil attack detection in MANET. Wireless Personal Communications, 110(4), 2179\u20132193.","journal-title":"Wireless Personal Communications"},{"key":"9261_CR30","doi-asserted-by":"crossref","unstructured":"Barnwal, R. P., Ghosh, S.K. (2012). Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks. In 2012 International Conference on Connected Vehicles and Expo (ICCVE): IEEE, pp. 29\u201334.","DOI":"10.1109\/ICCVE.2012.14"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09261-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09261-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09261-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T17:58:06Z","timestamp":1647971886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09261-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,30]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["9261"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09261-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,30]]},"assertion":[{"value":"19 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors confirm that there is no conflict of interest in this research paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}