{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:04:36Z","timestamp":1770750276158,"version":"3.50.0"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s11277-024-11525-1","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T03:43:38Z","timestamp":1726112618000},"page":"819-859","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs"],"prefix":"10.1007","volume":"138","author":[{"given":"Upinder","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Aparna N.","family":"Mahajan","sequence":"additional","affiliation":[]},{"given":"Sunil","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Kamlesh","family":"Dutta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"issue":"4","key":"11525_CR1","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally, S., Hunt, R., Chen, Y. S., Irwin, A., & Hassan, A. (2012). Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunication Systems, 50(4), 217\u2013241.\u00a0","journal-title":"Telecommunication Systems"},{"key":"11525_CR2","doi-asserted-by":"crossref","unstructured":"Shrestha, R., Bajracharya, R., & Nam, S. Y. (2018). Challenges of future VANET and cloud-based approaches. Wireless Communications and Mobile Computing, 2018, 603518.","DOI":"10.1155\/2018\/5603518"},{"key":"11525_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.vehcom.2017.01.002","volume":"7","author":"H Hasrouny","year":"2017","unstructured":"Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7\u201320.","journal-title":"Vehicular Communications"},{"key":"11525_CR4","doi-asserted-by":"publisher","first-page":"101664","DOI":"10.1016\/j.cose.2019.101664","volume":"89","author":"AK Malhi","year":"2020","unstructured":"Malhi, A. K., Batra, S., & Pannu, H. S. (2020). Security of vehicular ad-hoc networks: A comprehensive survey. Computers & Security, 89, 101664.","journal-title":"Computers & Security"},{"issue":"7","key":"11525_CR5","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.2017.1601183","volume":"55","author":"I Yaqoob","year":"2017","unstructured":"Yaqoob, I., Ahmad, I., Ahmed, E., Gani, A., Imran, M., & Guizani, N. (2017). Overcoming the key challenges to establishing vehicular communication: Is SDN the answer? IEEE Communications Magazine, 55(7), 128\u2013134.","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"11525_CR6","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications surveys & tutorials, 16(3), 1617\u20131634.","journal-title":"IEEE Communications surveys & tutorials"},{"key":"11525_CR7","doi-asserted-by":"publisher","first-page":"91028","DOI":"10.1109\/ACCESS.2020.2992580","volume":"8","author":"OS Al-Heety","year":"2020","unstructured":"Al-Heety, O. S., Zakaria, Z., Ismail, M., Shakir, M. M., Alani, S., & Alsariera, H. (2020). A comprehensive survey: Benefits, services, recent works, challenges, security, and use cases for sdn-vanet. IEEE Access, 8, 91028\u201391047.","journal-title":"IEEE Access"},{"issue":"12","key":"11525_CR8","doi-asserted-by":"publisher","first-page":"2077","DOI":"10.3390\/s16122077","volume":"16","author":"A Di Maio","year":"2016","unstructured":"Di Maio, A., Palattella, M. R., Soua, R., Lamorte, L., Vilajosana, X., Alonso-Zarate, J., & Engel, T. (2016). Enabling SDN in VANETs: What is the impact on security? Sensors, 16(12), 2077.","journal-title":"Sensors"},{"key":"11525_CR9","doi-asserted-by":"publisher","first-page":"107099","DOI":"10.1016\/j.comnet.2020.107099","volume":"169","author":"WB Jaballah","year":"2020","unstructured":"Jaballah, W. B., Conti, M., & Lal, C. (2020). Security and design requirements for software-defined VANETs. Computer Networks, 169, 107099.","journal-title":"Computer Networks"},{"issue":"1","key":"11525_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1155\/2018\/8631851","volume":"2018","author":"H Shafiq","year":"2018","unstructured":"Shafiq, H., Rehman, R. A., & Kim, B. S. (2018). Services and security threats in sdn based vanets: A survey. Wireless Communications and Mobile Computing, 2018,\u00a0631851.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"11525_CR11","doi-asserted-by":"publisher","first-page":"100284","DOI":"10.1016\/j.vehcom.2020.100284","volume":"27","author":"R Sultana","year":"2021","unstructured":"Sultana, R., Grover, J., & Tripathi, M. (2021). Security of SDN-based vehicular ad hoc networks: State-of-the-art and challenges. Vehicular Communications, 27, 100284.","journal-title":"Vehicular Communications"},{"key":"11525_CR12","doi-asserted-by":"crossref","unstructured":"Nam, T. M., Phong, P. H., Khoa, T. D., Huong, T. T., Nam, P. N., Thanh, N. H., Tuan, P. A., Quang, L.  & Loi, V. D. (2018, January). Self-organizing map-based approaches in DDoS flooding detection using SDN. In 2018 International Conference on Information Networking (ICOIN) (pp. 249\u2013254). IEEE.","DOI":"10.1109\/ICOIN.2018.8343119"},{"key":"11525_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/8891758","volume":"2021","author":"M Al-Mehdhara","year":"2021","unstructured":"Al-Mehdhara, M., & Ruan, N. (2021). MSOM: Efficient mechanism for defense against DDoS attacks in VANET. Wireless Communications and Mobile Computing, 2021,\u00a0891758.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"11525_CR14","doi-asserted-by":"publisher","first-page":"3127","DOI":"10.1007\/s11277-021-09280-8","volume":"123","author":"K Adhikary","year":"2022","unstructured":"Adhikary, K., Bhushan, S., Kumar, S., & Dutta, K. (2022). Evaluating the performance of various SVM kernel functions based on basic features extracted from KDDCUP\u201999 dataset by random forest method for detecting DDoS attacks. Wireless Personal Communications, 123, 3127\u20133145.","journal-title":"Wireless Personal Communications"},{"key":"11525_CR15","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1007\/s11277-020-07549-y","volume":"114","author":"K Adhikary","year":"2020","unstructured":"Adhikary, K., Bhushan, S., Kumar, S., & Dutta, K. (2020). Hybrid algorithm to detect DDoS attacks in VANETs. Wireless Personal Communications, 114, 3613\u20133634.","journal-title":"Wireless Personal Communications"},{"key":"11525_CR16","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for internet of things. Future Generation Computer Systems, 82, 761\u2013768.","journal-title":"Future Generation Computer Systems"},{"key":"11525_CR17","doi-asserted-by":"publisher","first-page":"100723","DOI":"10.1016\/j.iot.2023.100723","volume":"22","author":"M Kumar Pulligilla","year":"2023","unstructured":"Kumar Pulligilla, M., & Vanmathi, C. (2023). An authentication approach in SDN-VANET architecture with rider-sea lion optimized neural network for intrusion detection. Internet of Things, 22, 100723.","journal-title":"Internet of Things"},{"issue":"1","key":"11525_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TIM.2018.2836058","volume":"68","author":"D Binu","year":"2018","unstructured":"Binu, D., & Kariyappa, B. S. (2018). RideNN: A new rider optimization algorithm-based neural network for fault diagnosis in analog circuits. IEEE Transactions on Instrumentation and Measurement, 68(1), 2\u201326.","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"11525_CR19","doi-asserted-by":"crossref","unstructured":"Masadeh, R., Mahafzah, B. A., & Sharieh, A. (2019). Sea lion optimization algorithm. International Journal of Advanced Computer Science and Applications, 10(5).","DOI":"10.14569\/IJACSA.2019.0100548"},{"key":"11525_CR20","doi-asserted-by":"publisher","first-page":"102961","DOI":"10.1016\/j.adhoc.2022.102961","volume":"136","author":"G Kaur","year":"2022","unstructured":"Kaur, G., & Kakkar, D. (2022). Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in VANET. Ad Hoc Networks, 136, 102961.","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"11525_CR21","first-page":"12","volume":"2014","author":"PR Bhaladhare","year":"2014","unstructured":"Bhaladhare, P. R., & Jinwala, D. C. (2014). A clustering approach for the-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm. Advances in Computer Engineering, 2014, 96529.","journal-title":"Advances in Computer Engineering"},{"key":"11525_CR22","doi-asserted-by":"publisher","first-page":"107250","DOI":"10.1016\/j.cie.2021.107250","volume":"157","author":"L Abualigah","year":"2021","unstructured":"Abualigah, L., Yousri, D., Abd Elaziz, M., Ewees, A. A., Al-Qaness, M. A., & Gandomi, A. H. (2021). Aquila optimizer: A novel meta-heuristic optimization algorithm. Computers & Industrial Engineering, 157, 107250.","journal-title":"Computers & Industrial Engineering"},{"key":"11525_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s12293-013-0128-0","volume":"6","author":"JC Bansal","year":"2014","unstructured":"Bansal, J. C., Sharma, H., Jadon, S. S., & Clerc, M. (2014). Spider monkey optimization algorithm for numerical optimization. Memetic computing, 6, 31\u201347.","journal-title":"Memetic computing"},{"key":"11525_CR24","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.neucom.2017.05.103","volume":"278","author":"W Sun","year":"2018","unstructured":"Sun, W., Su, F., & Wang, L. (2018). Improving deep neural networks with multi-layer maxout networks and a novel initialization method. Neurocomputing, 278, 34\u201340.","journal-title":"Neurocomputing"},{"key":"11525_CR25","doi-asserted-by":"publisher","first-page":"125535","DOI":"10.1016\/j.amc.2020.125535","volume":"389","author":"JS Chou","year":"2021","unstructured":"Chou, J. S., & Truong, D. N. (2021). A novel metaheuristic optimizer inspired by behavior of jellyfish in ocean. Applied Mathematics and Computation, 389, 125535.","journal-title":"Applied Mathematics and Computation"},{"key":"11525_CR26","doi-asserted-by":"publisher","first-page":"113338","DOI":"10.1016\/j.eswa.2020.113338","volume":"149","author":"M Khishe","year":"2020","unstructured":"Khishe, M., & Mosavi, M. R. (2020). Chimp optimization algorithm. Expert systems with applications, 149, 113338.","journal-title":"Expert systems with applications"},{"issue":"1","key":"11525_CR27","doi-asserted-by":"publisher","first-page":"19157","DOI":"10.1038\/s41598-022-23121-z","volume":"12","author":"JS Chou","year":"2022","unstructured":"Chou, J. S., & Molla, A. (2022). Recent advances in use of bio-inspired jellyfish search algorithm for solving optimization problems. Scientific Reports, 12(1), 19157.","journal-title":"Scientific Reports"},{"key":"11525_CR28","doi-asserted-by":"publisher","first-page":"100911","DOI":"10.1109\/ACCESS.2021.3097006","volume":"9","author":"M Farhat","year":"2021","unstructured":"Farhat, M., Kamel, S., Atallah, A. M., & Khan, B. (2021). Optimal power flow solution based on jellyfish search optimization considering uncertainty of renewable energy sources. IEEE Access, 9, 100911\u2013100933.","journal-title":"IEEE Access"},{"issue":"4","key":"11525_CR29","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1093\/jcde\/qwad060","volume":"10","author":"X Yuan","year":"2023","unstructured":"Yuan, X., Hu, G., Zhong, J., & Wei, G. (2023). HBWO-JS: Jellyfish search boosted hybrid beluga whale optimization algorithm for engineering applications. Journal of Computational Design and Engineering, 10(4), 1615\u20131656.","journal-title":"Journal of Computational Design and Engineering"},{"issue":"2","key":"11525_CR30","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1007\/s11277-022-09784-x","volume":"126","author":"L Raja","year":"2022","unstructured":"Raja, L., & Periasamy, P. S. (2022). A Trusted distributed routing scheme for wireless sensor networks using block chain and jelly fish search optimizer based deep generative adversarial neural network (Deep-GANN) technique. Wireless Personal Communications, 126(2), 1101\u20131128.","journal-title":"Wireless Personal Communications"},{"key":"11525_CR31","doi-asserted-by":"crossref","unstructured":"Jia, H., Sun, K., Zhang, W., & Leng, X. (2022). An enhanced chimp optimization algorithm for continuous optimization domains. Complex & Intelligent Systems, 8, 65\u201382.","DOI":"10.1007\/s40747-021-00346-5"},{"key":"11525_CR32","doi-asserted-by":"publisher","first-page":"63523","DOI":"10.1007\/s11042-023-18071-1","volume":"23","author":"S Rokade","year":"2024","unstructured":"Rokade, S., & Mishra, N. (2024). Privacy preservation of medical data in blockchain with secret key generation using RideNN. Multimedia Tools and Applications, 83, 63523\u201363545.","journal-title":"Multimedia Tools and Applications"},{"key":"11525_CR33","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/s12652-020-02051-6","volume":"12","author":"M Mishra","year":"2021","unstructured":"Mishra, M., Choudhury, P., & Pati, B. (2021). Modified ride-NN optimizer for the IoT based plant disease detection. Journal of Ambient Intelligence and Humanized Computing, 12, 691\u2013703.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"22","key":"11525_CR34","doi-asserted-by":"publisher","first-page":"4089","DOI":"10.1049\/iet-com.2020.0477","volume":"14","author":"H Polat","year":"2020","unstructured":"Polat, H., Turkoglu, M., & Polat, O. (2020). Deep network approach with stacked sparse autoencoders in detection of DDoS attacks on SDN-based VANET. IET Communications, 14(22), 4089\u20134100.","journal-title":"IET Communications"},{"key":"11525_CR35","doi-asserted-by":"publisher","first-page":"102729","DOI":"10.1016\/j.jisa.2020.102729","volume":"58","author":"R Amin","year":"2021","unstructured":"Amin, R., Pali, I., & Sureshkumar, V. (2021). Software-defined network enabled vehicle to vehicle secured data transmission protocol in VANETs. Journal of Information Security and Applications, 58, 102729.","journal-title":"Journal of Information Security and Applications"},{"key":"11525_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, D., Yu, F. R., & Yang, R. (2018, December). A machine learning approach for software-defined vehicular ad hoc networks with trust management. In\u00a02018 IEEE Global Communications Conference (GLOBECOM)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/GLOCOM.2018.8647426"},{"key":"11525_CR37","doi-asserted-by":"crossref","unstructured":"Arif, M., Wang, G., Wang, T., & Peng, T. (2018). SDN-based secure VANETs communication with fog computing. In\u00a0Security, Privacy, and Anonymity in Computation, Communication, and Storage: 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11\u201313, 2018, Proceedings 11\u00a0(pp. 46\u201359). Springer International Publishing.","DOI":"10.1007\/978-3-030-05345-1_4"},{"key":"11525_CR38","unstructured":"Savitha, K., & Chandrasekar, C. (2021). A Hybrid Intrusion Detection Model for VANET Using SDN and Growing Hierarchical Self-Organizing Maps. Webology (ISSN: 1735\u2013188X), 18(5)."},{"key":"11525_CR39","doi-asserted-by":"publisher","first-page":"56656","DOI":"10.1109\/ACCESS.2019.2913682","volume":"7","author":"L Xie","year":"2019","unstructured":"Xie, L., Ding, Y., Yang, H., & Wang, X. (2019). Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs. IEEE Access, 7, 56656\u201356666.","journal-title":"IEEE Access"},{"key":"11525_CR40","doi-asserted-by":"crossref","unstructured":"Kim, M., Jang, I., Choo, S., Koo, J., & Pack, S. (2017, September). Collaborative security attack detection in software-defined vehicular networks. In\u00a02017 19th Asia-Pacific network operations and management symposium (APNOMS)\u00a0(pp. 19\u201324). IEEE.","DOI":"10.1109\/APNOMS.2017.8094172"},{"issue":"1","key":"11525_CR41","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s13204-021-01908-2","volume":"13","author":"FG Abdulkadhim","year":"2023","unstructured":"Abdulkadhim, F. G., Yi, Z., Tang, C., Onaizah, A. N., & Ahmed, B. (2023). Design and development of a hybrid (SDN+ SOM) approach for enhancing security in VANET. Applied Nanoscience, 13(1), 799\u2013810.","journal-title":"Applied Nanoscience"},{"key":"11525_CR42","doi-asserted-by":"crossref","unstructured":"Arsalan, A., & Rehman, R. A. (2018, December). Prevention of timing attack in software defined named data network with VANETs. In:2018 International Conference on Frontiers of Information Technology (FIT)\u00a0(pp. 247\u2013252). IEEE.","DOI":"10.1109\/FIT.2018.00050"},{"key":"11525_CR43","doi-asserted-by":"crossref","unstructured":"Arsalan, A., & Rehman, R. A. (2019, January). Distance-based scheme for broadcast storm mitigation in named software defined vehicular networks (NSDVN). In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)\u00a0(pp. 1\u20134). IEEE.","DOI":"10.1109\/CCNC.2019.8651700"},{"key":"11525_CR44","doi-asserted-by":"crossref","unstructured":"de Biasi, G., Vieira, L. F., & Loureiro, A. A. (2018, May). Sentinel: Defense mechanism against DDoS flooding attack in software defined vehicular network. In: 2018 IEEE International Conference on Communications (ICC)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/ICC.2018.8422303"},{"key":"11525_CR45","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.future.2019.10.020","volume":"104","author":"M Balta","year":"2020","unstructured":"Balta, M., & \u00d6z\u00e7eli\u0307k, \u0130. (2020). A 3-stage fuzzy-decision tree model for traffic signal optimization in urban city via a SDN based VANET architecture. Future Generation Computer Systems, 104, 142\u2013158.","journal-title":"Future Generation Computer Systems"},{"key":"11525_CR46","doi-asserted-by":"crossref","unstructured":"Indira, K., Ajitha, P., Reshma, V., & Tamizhselvi, A. (2019, February). An efficient secured routing protocol for software defined internet of vehicles. In: 2019 International Conference on Computational Intelligence in Data Science (ICCIDS)\u00a0(pp. 1\u20134). IEEE.","DOI":"10.1109\/ICCIDS.2019.8862042"},{"key":"11525_CR47","doi-asserted-by":"crossref","unstructured":"Vasudev, H., & Das, D. (2018, January). A trust based secure communication for software defined VANETs. In: 2018 International conference on information networking (ICOIN)\u00a0(pp. 316\u2013321). IEEE.","DOI":"10.1109\/ICOIN.2018.8343132"},{"key":"11525_CR48","doi-asserted-by":"crossref","unstructured":"Bousselham, M., Abdellaoui, A., & Chaoui, H. (2017, December). Security against malicious node in the vehicular cloud computing using a software-defined networking architecture. In: 2017 international conference on soft computing and its engineering applications (IcSoftComp)\u00a0(pp. 1\u20135). IEEE.","DOI":"10.1109\/ICSOFTCOMP.2017.8280084"},{"key":"11525_CR49","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.adhoc.2018.09.018","volume":"84","author":"AJ Kadhim","year":"2019","unstructured":"Kadhim, A. J., & Seno, S. A. H. (2019). Energy-efficient multicast routing protocol based on SDN and fog computing for vehicular networks. Ad Hoc Networks, 84, 68\u201381.","journal-title":"Ad Hoc Networks"},{"key":"11525_CR50","doi-asserted-by":"crossref","unstructured":"Sultana, R., Grover, J., & Tripathi, M. (2020, December). A novel framework for misbehavior detection in SDN-based VANET. In: 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/ANTS50601.2020.9342778"},{"issue":"8","key":"11525_CR51","doi-asserted-by":"publisher","first-page":"5730","DOI":"10.1109\/TII.2020.3012166","volume":"17","author":"G Raja","year":"2020","unstructured":"Raja, G., Anbalagan, S., Vijayaraghavan, G., Dhanasekaran, P., Al-Otaibi, Y. D., & Bashir, A. K. (2020). Energy-efficient end-to-end security for software-defined vehicular networks. IEEE transactions on industrial informatics, 17(8), 5730\u20135737.","journal-title":"IEEE transactions on industrial informatics"},{"key":"11525_CR52","doi-asserted-by":"crossref","unstructured":"Boualouache, A., Soua, R., & Engel, T. (2020, May). Sdn-based misbehavior detection system for vehicular networks. In: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)\u00a0(pp. 1\u20135). IEEE.","DOI":"10.1109\/VTC2020-Spring48590.2020.9128604"},{"issue":"9","key":"11525_CR53","doi-asserted-by":"publisher","first-page":"7407","DOI":"10.1109\/JIOT.2020.3038465","volume":"8","author":"K Mershad","year":"2020","unstructured":"Mershad, K. (2020). SURFER: A secure SDN-based routing protocol for internet of vehicles. IEEE Internet of Things Journal, 8(9), 7407\u20137422.","journal-title":"IEEE Internet of Things Journal"},{"key":"11525_CR54","doi-asserted-by":"publisher","first-page":"9142","DOI":"10.1109\/ACCESS.2022.3142811","volume":"10","author":"GD Singh","year":"2022","unstructured":"Singh, G. D., Prateek, M., Kumar, S., Verma, M., Singh, D., & Lee, H. N. (2022). Hybrid genetic firefly algorithm-based routing protocol for VANETs. IEEE Access, 10, 9142\u20139151.","journal-title":"IEEE Access"},{"key":"11525_CR55","doi-asserted-by":"crossref","unstructured":"Wang, J., Tan, Y., & Liu, J. (2020, December). Topology poisoning attacks and countermeasures in SDN-enabled vehicular networks. In\u00a0GLOBECOM 2020\u20132020 IEEE Global Communications Conference\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/GLOBECOM42002.2020.9348183"},{"key":"11525_CR56","doi-asserted-by":"crossref","unstructured":"Singh, P. K., Jha, S. K., Nandi, S. K., & Nandi, S. (2018, October). ML-based approach to detect DDoS attack in V2I communication under SDN architecture. In\u00a0TENCON 2018\u20132018 IEEE region 10 conference\u00a0(pp. 0144\u20130149). IEEE.","DOI":"10.1109\/TENCON.2018.8650452"},{"key":"11525_CR57","doi-asserted-by":"publisher","first-page":"44570","DOI":"10.1109\/ACCESS.2018.2854567","volume":"6","author":"Y Yu","year":"2018","unstructured":"Yu, Y., Guo, L., Liu, Y., Zheng, J., & Zong, Y. U. E. (2018). An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks. IEEE access, 6, 44570\u201344579.","journal-title":"IEEE access"},{"issue":"10","key":"11525_CR58","doi-asserted-by":"publisher","first-page":"4188","DOI":"10.48048\/tis.2022.4188","volume":"19","author":"R Ramamoorthy","year":"2022","unstructured":"Ramamoorthy, R., & Thangavelu, M. (2022). An Enhanced bio-inspired routing algorithm for vehicular ad hoc networks. Trends in Sciences, 19(10), 4188\u20134188.","journal-title":"Trends in Sciences"},{"issue":"18","key":"11525_CR59","doi-asserted-by":"publisher","first-page":"13950","DOI":"10.1109\/JIOT.2021.3069642","volume":"8","author":"S Anbalagan","year":"2021","unstructured":"Anbalagan, S., Bashir, A. K., Raja, G., Dhanasekaran, P., Vijayaraghavan, G., Tariq, U., & Guizani, M. (2021). Machine-learning-based efficient and secure RSU placement mechanism for software-defined-IoV. IEEE Internet of Things Journal, 8(18), 13950\u201313957.","journal-title":"IEEE Internet of Things Journal"},{"key":"11525_CR60","doi-asserted-by":"crossref","unstructured":"De Rango, F., Tropea, M., Raimondo, P., Santamaria, A. F., & Fazio, P. (2019, July). Bio inspired strategy for improving platoon management in the future autonomous electrical VANET environment. In: 2019 28th International Conference on Computer Communication and Networks (ICCCN) (pp. 1\u20137). IEEE.","DOI":"10.1109\/ICCCN.2019.8847088"},{"key":"11525_CR61","doi-asserted-by":"crossref","unstructured":"Tandon, A., & Srivastava, P. (2019, August). Trust-based enhanced secure routing against rank and sybil attacks in IoT. In: 2019 twelfth international conference on contemporary computing (IC3) (pp. 1\u20137). IEEE.","DOI":"10.1109\/IC3.2019.8844935"},{"issue":"2","key":"11525_CR62","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/TDSC.2011.57","volume":"9","author":"A Das","year":"2011","unstructured":"Das, A., & Islam, M. M. (2011). SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems. IEEE transactions on dependable and secure computing, 9(2), 261\u2013274.","journal-title":"IEEE transactions on dependable and secure computing"},{"issue":"7","key":"11525_CR63","doi-asserted-by":"publisher","first-page":"6078","DOI":"10.1109\/JIOT.2019.2956964","volume":"7","author":"J Bhatia","year":"2019","unstructured":"Bhatia, J., Kakadia, P., Bhavsar, M., & Tanwar, S. (2019). SDN-enabled network coding-based secure data dissemination in VANET environment. IEEE Internet of Things Journal, 7(7), 6078\u20136087.","journal-title":"IEEE Internet of Things Journal"},{"key":"11525_CR64","doi-asserted-by":"crossref","unstructured":"Veeraiah, N., & Krishna, B. T. (2022). An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evolutionary Intelligence, 15, 1313\u20131327.","DOI":"10.1007\/s12065-020-00388-7"},{"key":"11525_CR65","unstructured":"Krishnavenia, R., & Shakila, S. (2021). Congruence coefficient ephemeral niederreiter cryptography for secured and privacy preserved data transmission in cloud. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(14), 44\u201362."},{"key":"11525_CR66","unstructured":"Python https:\/\/www.python.org\/"},{"key":"11525_CR67","unstructured":"VeReMi dataset https:\/\/github.com\/VeReMi-dataset\/VeReMi"},{"key":"11525_CR68","doi-asserted-by":"crossref","unstructured":"Wehrle, K., G\u00fcne\u015f, M., & Gross, J. (Eds.). (2010). Modeling and tools for network simulation. Berlin, Heidelberg: Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-12331-3"},{"key":"11525_CR69","volume-title":"Recent advances in network simulation: the OMNeT++ environment and its ecosystem","author":"C Sommer","year":"2019","unstructured":"Sommer, C., Eckhoff, D., Brummer, A., Buse, D. S., Hagenauer, F., Joerer, S., & Segata, M. (2019). Veins: The open source vehicular network simulation framework. In A. Virdis & M. Kirsche (Eds.), Recent advances in network simulation: the OMNeT++ environment and its ecosystem. Cham: Springer International Publishing."},{"issue":"2","key":"11525_CR70","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MITS.2017.2666585","volume":"9","author":"L Codec\u00e1","year":"2017","unstructured":"Codec\u00e1, L., Frank, R., Faye, S., & Engel, T. (2017). Luxembourg sumo traffic (lust) scenario: Traffic demand evaluation. IEEE Intelligent Transportation Systems Magazine, 9(2), 52\u201363.","journal-title":"IEEE Intelligent Transportation Systems Magazine"},{"key":"11525_CR71","doi-asserted-by":"publisher","first-page":"135944","DOI":"10.1109\/ACCESS.2023.3337378","volume":"11","author":"O Slama","year":"2023","unstructured":"Slama, O., Tarhouni, M., Zidi, S., & Alaya, B. (2023). One versus all binary tree method to classify misbehaviors in imbalanced VeReMi dataset. IEEE Access, 11, 135944\u2013135958.","journal-title":"IEEE Access"},{"key":"11525_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compstruc.2016.03.001","volume":"169","author":"A Askarzadeh","year":"2016","unstructured":"Askarzadeh, A. (2016). A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm. Computers & structures, 169, 1\u201312.","journal-title":"Computers & structures"},{"key":"11525_CR73","doi-asserted-by":"publisher","first-page":"115352","DOI":"10.1016\/j.eswa.2021.115352","volume":"183","author":"I Naruei","year":"2021","unstructured":"Naruei, I., & Keynia, F. (2021). A new optimization method based on COOT bird natural life model. Expert Systems with Applications, 183, 115352.","journal-title":"Expert Systems with Applications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11525-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11525-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11525-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T17:04:49Z","timestamp":1727543089000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11525-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":73,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["11525"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11525-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"28 July 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not involve any study with human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}