{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T07:17:59Z","timestamp":1773731879656,"version":"3.50.1"},"reference-count":103,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11334-025-00603-7","type":"journal-article","created":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T18:25:24Z","timestamp":1747074324000},"page":"453-474","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Sybil attack detection in vehicular ad hoc networks (VANETs): a comprehensive survey"],"prefix":"10.1007","volume":"21","author":[{"given":"Habiba","family":"Hadri","sequence":"first","affiliation":[]},{"given":"Mourad","family":"Ouadou","sequence":"additional","affiliation":[]},{"given":"Laila","family":"Chakour","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Minaoui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,12]]},"reference":[{"key":"603_CR1","doi-asserted-by":"crossref","unstructured":"Bariah L, Shehada D, Salahat E, Yeun CY (2015) Recent advances in VANET security: a survey. In: 2015 IEEE 82nd vehicular technology conference (VTC2015-fall). IEEE. pp. 1\u20137","DOI":"10.1109\/VTCFall.2015.7391111"},{"issue":"2","key":"603_CR2","first-page":"53","volume":"1","author":"MN Mejri","year":"2014","unstructured":"Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1(2):53\u201366","journal-title":"Veh Commun"},{"issue":"2","key":"603_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijans.2014.4201","volume":"4","author":"VH La","year":"2014","unstructured":"La VH, Cavalli AR (2014) Security attacks and solutions in vehicular ad hoc networks: a survey. Int J AdHoc Netw Syst 4(2):1\u201320","journal-title":"Int J AdHoc Netw Syst"},{"key":"603_CR4","doi-asserted-by":"crossref","unstructured":"Samara G, Al-Salihy W A, Sures R (2010) Security analysis of vehicular ad hoc nerworks (VANET). In: 2010 second international conference on network applications, protocols and services. IEEE, pp. 55\u201360","DOI":"10.1109\/NETAPPS.2010.17"},{"key":"603_CR5","doi-asserted-by":"crossref","unstructured":"Quevedo C H, Quevedo A M, Campos G A, Gomes R L, Celestino J, Serhrouchni A (2020, June) An intelligent mechanism for Sybil attacks detection in VANETs. In: ICC 2020-2020 IEEE international conference on communications (ICC). IEEE. pp. 1\u20136","DOI":"10.1109\/ICC40277.2020.9149371"},{"issue":"1","key":"603_CR6","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39\u201368","journal-title":"J Comput Secur"},{"issue":"2","key":"603_CR7","first-page":"53","volume":"1","author":"M Nidhal","year":"2014","unstructured":"Nidhal M, Ben-othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1(2):53\u201366","journal-title":"Veh Commun"},{"key":"603_CR8","first-page":"7","volume":"7","author":"H Hasrouny","year":"2017","unstructured":"Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANet security challenges and solutions: a survey. Veh Commun 7:7\u201320","journal-title":"Veh Commun"},{"key":"603_CR9","doi-asserted-by":"crossref","unstructured":"Smita M, Pathak N (2009) Secured communication in real time VANET. In: Proceedings of the international conference on emerging trends in engineering and technology (ICETET), pp. 1151\u20131155, Nagpur, India","DOI":"10.1109\/ICETET.2009.198"},{"issue":"1","key":"603_CR10","first-page":"33","volume":"1","author":"A Dua","year":"2014","unstructured":"Dua A, Kumar N, Bawa S (2014) A systematic review on routing protocols for vehicular ad hoc networks. Veh Commun 1(1):33\u201352","journal-title":"Veh Commun"},{"key":"603_CR11","unstructured":"Stampoulis A, Chai Z (2007) A survey of security in vehicular networks. Project CPSC, vol. 534"},{"key":"603_CR12","volume-title":"Security of self-organizing networks MANET, WSN, WMN, VANET","author":"G Jyoti","year":"2010","unstructured":"Jyoti G, Gaur MS (2010) Security of self-organizing networks MANET, WSN, WMN, VANET. CRC Press, London"},{"key":"603_CR13","volume-title":"Vehicular ad hoc networks","author":"Y Wang","year":"2009","unstructured":"Wang Y, Li F (2009) Vehicular ad hoc networks. Springer, London"},{"issue":"6","key":"603_CR14","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/MCOM.2008.4539481","volume":"46","author":"H Hartenstein","year":"2008","unstructured":"Hartenstein H, Laberteaux KP (2008) A Tutorial survey on vehicular ad hoc networks. IEEE Commun Mag 46(6):164\u2013171","journal-title":"IEEE Commun Mag"},{"key":"603_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","volume":"44","author":"RG Engoulou","year":"2014","unstructured":"Engoulou RG, Bella\u00efche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1\u201313","journal-title":"Comput Commun"},{"issue":"6","key":"603_CR16","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","volume":"16","author":"F Qu","year":"2015","unstructured":"Qu F, Wu Z, Wang F, Cho W (2015) A security and privacy review of VANETs. IEEE Trans Intell Transp Syst 16(6):2985\u20132996","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"603_CR17","doi-asserted-by":"crossref","unstructured":"Mishra R, Singh A, Kumar R (2016) VANET security: issues, challenges and solutions. In: Proceedings of the international conference on electrical, electronics, and optimization techniques (ICEEOT), pp. 1050\u20131055, Chennai, India","DOI":"10.1109\/ICEEOT.2016.7754846"},{"issue":"5","key":"603_CR18","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","volume":"20","author":"J Cui","year":"2019","unstructured":"Cui J, Wei L, Zhang J, Xu Y, Zhong H (2019) An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 20(5):1621\u20131632","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"603_CR19","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.cogsys.2019.01.008","volume":"55","author":"K Bylykbashi","year":"2019","unstructured":"Bylykbashi K, Elmazi D, Matsuo K, Ikeda M, Barolli L (2019) Effect of security and trustworthiness for a fuzzy cluster management system in VANETs. Cogn Syst Res 55:153\u2013163","journal-title":"Cogn Syst Res"},{"issue":"3","key":"603_CR20","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"2","author":"JP Hubaux","year":"2004","unstructured":"Hubaux JP, Capkun S, Jun Luo J (2004) +e security and privacy of smart vehicles. IEEE Secur Priv Mag 2(3):49\u201355","journal-title":"IEEE Secur Priv Mag"},{"key":"603_CR21","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.jnca.2013.02.036","volume":"37","author":"S Al-Sultan","year":"2014","unstructured":"Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (2014) A comprehensive survey on vehicular Ad Hoc network. J Netw Comput Appl 37:380\u2013392","journal-title":"J Netw Comput Appl"},{"key":"603_CR22","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.jnca.2013.09.008","volume":"40","author":"BT Sharef","year":"2014","unstructured":"Sharef BT, Alsaqour RA, Ismail M (2014) Vehicular communication ad hoc routing protocols: a survey. J Netw Comput Appl 40:363\u2013396","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"603_CR23","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1049\/iet-its.2015.0072","volume":"10","author":"M Azees","year":"2016","unstructured":"Azees M, Jegatha Deborah L, Vijayakumar P (2016) Comprehensive survey on security services in vehicular adhoc networks. IET Intell Transp Syst 10(6):379\u2013388","journal-title":"IET Intell Transp Syst"},{"issue":"2","key":"603_CR24","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","volume":"20","author":"Z Lu","year":"2019","unstructured":"Lu Z, Qu G, Liu Z (2019) A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans Intell Transp Syst 20(2):760\u2013776","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"603_CR25","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/COMST.2017.2771522","volume":"20","author":"A Boualouache","year":"2018","unstructured":"Boualouache A, Senouci S-M, Moussaoui S (2018) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun Surv Tutor 20(1):770\u2013790","journal-title":"IEEE Commun Surv Tutor"},{"key":"603_CR26","first-page":"45","volume":"16","author":"I Ali","year":"2019","unstructured":"Ali I, Hassan A, Li F (2019) Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey. Veh Commun 16:45\u201361","journal-title":"Veh Commun"},{"issue":"3","key":"603_CR27","doi-asserted-by":"publisher","first-page":"1924","DOI":"10.1109\/JIOT.2018.2817459","volume":"5","author":"X Liang","year":"2018","unstructured":"Liang X, Yan T, Lee J, Wang G (2018) A distributed intersection management protocol for safety, efficiency, and driver\u2019s comfort. IEEE Internet Eings J 5(3):1924\u20131935","journal-title":"IEEE Internet Eings J"},{"issue":"37","key":"603_CR28","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.jnca.2013.02.036","volume":"31","author":"S Al-Sultan","year":"2014","unstructured":"Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (2014) A comprehensive survey on vehicular Ad Hoc network. J Netw Comput Appl 31(37):380\u201392","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"603_CR29","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.7763\/IJCTE.2012.V4.627","volume":"4","author":"AY Dak","year":"2012","unstructured":"Dak AY, Yahya S, Kassim M (2012) A Literature survey on security challenges in VANETs. Int J Comput Theor Eng 4(6):1007","journal-title":"Int J Comput Theor Eng"},{"issue":"2","key":"603_CR30","first-page":"53","volume":"1","author":"MN Mejri","year":"2014","unstructured":"Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1(2):53\u201366","journal-title":"Veh Commun"},{"key":"603_CR31","doi-asserted-by":"crossref","unstructured":"Al-kahtani MS (2012) Survey on security attacks in vehicular ad hoc networks (VANETs). In: Proceedings of the 2012 6th international conference on signal processing and communication systems (ICSPCS), Gold Coast, Australia, 12\u201314 December","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"603_CR32","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1049\/iet-com.2009.0191","volume":"4","author":"JT Isaac","year":"2010","unstructured":"Isaac JT, Zeadally S, C\u00e1 mara JS (2010) Security attacks and solutions for vehicular ad hoc networks. IET Commun 4:894","journal-title":"IET Commun"},{"key":"603_CR33","unstructured":"Chen R, Ma D, Regan A (2009) TARI: meeting delay requirements in VANETs with efficient authentication and revocation. In: Proceedings of the 2nd international conference on wireless access in vehicular environments (WAVE), Shanghai, China, 21\u201322 December"},{"key":"603_CR34","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/MCOM.2008.4539481","volume":"46","author":"H Hartenstein","year":"2008","unstructured":"Hartenstein H, Laberteaux KP (2008) A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag 46:164\u2013171","journal-title":"IEEE Commun Mag"},{"key":"603_CR35","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MCOM.2008.4481346","volume":"46","author":"X Lin","year":"2008","unstructured":"Lin X, Lu R, Zhang C, Zhu H, Ho P, Shen X (2008) Security in vehicular Ad-hoc networks. IEEE Commun Mag 46:88\u201395","journal-title":"IEEE Commun Mag"},{"key":"603_CR36","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1049\/iet-com.2009.0191","volume":"4","author":"JT Isaac","year":"2010","unstructured":"Isaac JT, Zeadally S, C\u00e1mara JS (2010) Security attacks and solutions for vehicular ad hoc networks. IET Commun 4:894","journal-title":"IET Commun"},{"key":"603_CR37","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1002\/sec.239","volume":"4","author":"M Riley","year":"2011","unstructured":"Riley M, Akkaya K, Fong K (2011) A survey of authentication schemes for vehicular ad hoc networks. Secur Commun Netw 4:1137\u20131152","journal-title":"Secur Commun Netw"},{"key":"603_CR38","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.jnca.2013.09.008","volume":"40","author":"BT Sharef","year":"2014","unstructured":"Sharef BT, Alsaqour RA, Ismail M (2014) Vehicular communication ad hoc routing protocols: a survey. J Netw Comput Appl 40:363\u2013396","journal-title":"J Netw Comput Appl"},{"key":"603_CR39","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1049\/iet-its.2015.0072","volume":"10","author":"M Azees","year":"2016","unstructured":"Azees M, Vijayakumar P, Deborah LJ (2016) A comprehensive survey on security services in vehicular ad-hoc networks (VANETs). IET Intell Transp Syst 10:379\u2013388","journal-title":"IET Intell Transp Syst"},{"key":"603_CR40","first-page":"19","volume":"9","author":"SS Manvi","year":"2017","unstructured":"Manvi SS, Tangade S (2017) A survey on authentication schemes in VANETs for secured communication. Veh Commun 9:19\u201330","journal-title":"Veh Commun"},{"key":"603_CR41","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","volume":"61","author":"F Sakiz","year":"2017","unstructured":"Sakiz F, Sen S (2017) A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw 61:33\u201350","journal-title":"Ad Hoc Netw"},{"key":"603_CR42","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.pmcj.2017.12.004","volume":"43","author":"A Rahim","year":"2018","unstructured":"Rahim A, Kong X, Xia F, Ning Z, Ullah N, Wang J, Das SK (2018) Vehicular social networks: a survey. Pervasive Mob Comput 43:96\u2013113","journal-title":"Pervasive Mob Comput"},{"key":"603_CR43","first-page":"138","volume":"12","author":"S Sharma","year":"2018","unstructured":"Sharma S, Kaul A (2018) A survey on intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET cloud. Veh Commun 12:138\u2013164","journal-title":"Veh Commun"},{"key":"603_CR44","doi-asserted-by":"publisher","first-page":"358","DOI":"10.3390\/s19020358","volume":"19","author":"P Sewalkar","year":"2019","unstructured":"Sewalkar P, Seitz J (2019) Vehicle-to-pedestrian communication for vulnerable road users: survey, design considerations, and challenges. Sensors 19:358","journal-title":"Sensors"},{"key":"603_CR45","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","volume":"20","author":"Z Lu","year":"2019","unstructured":"Lu Z, Qu G, Liu Z (2019) A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans Intell Transp Syst 20:760\u2013776","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"603_CR46","first-page":"45","volume":"16","author":"I Ali","year":"2019","unstructured":"Ali I, Hassan A, Li F (2019) Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey. Veh Commun 16:45\u201361","journal-title":"Veh Commun"},{"key":"603_CR47","doi-asserted-by":"publisher","first-page":"1924","DOI":"10.1109\/JIOT.2018.2817459","volume":"5","author":"X Liang","year":"2018","unstructured":"Liang X, Yan T, Lee J, Wang G (2018) A distributed intersection management protocol for safety, efficiency, and driver\u2019s comfort. IEEE Internet Things J 5:1924\u20131935","journal-title":"IEEE Internet Things J"},{"key":"603_CR48","doi-asserted-by":"crossref","unstructured":"Ghosh M, Varghese A, Kherani AA, Gupta A (2009) Distributed misbehavior detection in VANETs. In: Proceedings of the IEEE wireless communication and networking conference (WCNC), Budapest, Hungary, 5\u20138 April","DOI":"10.1109\/WCNC.2009.4917675"},{"key":"603_CR49","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MIS.2017.53","volume":"32","author":"X Cheng","year":"2017","unstructured":"Cheng X, Chen C, Zhang W, Yang Y (2017) 5G-enabled cooperative intelligent vehicular (5GenCIV) framework: when Benz mets Marconi. IEEE Intell Syst 32:53\u201359","journal-title":"IEEE Intell Syst"},{"key":"603_CR50","unstructured":"Federal Communications Commission (2002) Amendment of the commission\u2019s rules regarding dedicated short-range communication service in the 5.850-5.925 ghz Band, fcc 02-302. Tech. Rep., FCC, Washington, USA, November"},{"key":"603_CR51","unstructured":"Dedicated Short Range Communications (DSRC) Home"},{"key":"603_CR52","unstructured":"ITS, ITS Standard Fact Sheets of IEEE, IEEE Standards 1609, ITS. Germany, 2002; pp. 251\u2013260"},{"key":"603_CR53","doi-asserted-by":"crossref","unstructured":"Al-kahtani MS (2012) Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs). In Proceedings of the 2012 6th international conference on signal processing and communication systems (ICSPCS), Gold Coast, Australia, 12\u201314 December","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"603_CR54","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally S, Hunt R, Chen YS, Irwin A, Hassan A (2012) Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun Syst 50:217\u2013241","journal-title":"Telecommun Syst"},{"key":"603_CR55","doi-asserted-by":"crossref","unstructured":"Sumra IA, Hasbullah HB, AbManan JB (2015) Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey. In Vehicular ad-hoc networks smart cities; Springer: Singapore; pp. 51\u201361","DOI":"10.1007\/978-981-287-158-9_5"},{"key":"603_CR56","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.cose.2005.09.002","volume":"25","author":"M Lal","year":"2006","unstructured":"Lal M, Saxena A, Gulati VP, Phatak DB (2006) A novel remote user authentication scheme using bilinear pairings. Comput Secur 25:184\u2013189","journal-title":"Comput Secur"},{"key":"603_CR57","unstructured":"Raya M, Hubaux JP (2005) Security aspects of inter-vehicle communications. In: Proceedings of the 5th Swiss transport research conference (STRC), Monte Verita, Ascona, Switzerland, 9\u201311 March"},{"key":"603_CR58","unstructured":"Masquerade. Available online: http:\/\/searchsecurity.techtarget.com\/definition\/masquerade. Accessed 5 June 2018"},{"key":"603_CR59","unstructured":"Replay Attacks. Available online: http:\/\/careerride.com\/Networking-replay-attacks.aspx. Accessed 5 June 2018"},{"key":"603_CR60","doi-asserted-by":"crossref","unstructured":"Zaidi T, Faisal S (2018) An overview: various attacks in VANET. In 2018 4th international conference on computing communication and automation (ICCCA). IEEE. pp. 1\u20136","DOI":"10.1109\/CCAA.2018.8777538"},{"issue":"1","key":"603_CR61","first-page":"45","volume":"6","author":"C Kumar Karn","year":"2016","unstructured":"Kumar Karn C, Prakash Gupta C (2016) A survey on VANETs security attacks and sybil attack detection. Int J Sens Wirel Commun Control 6(1):45\u201362","journal-title":"Int J Sens Wirel Commun Control"},{"issue":"6","key":"603_CR62","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1016\/j.jpdc.2013.02.001","volume":"73","author":"B Yu","year":"2013","unstructured":"Yu B, Xu CZ, Xiao B (2013) Detecting sybil attacks in VANETs. J Parallel Distrib Comput 73(6):746\u2013756","journal-title":"J Parallel Distrib Comput"},{"key":"603_CR63","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.comcom.2013.12.005","volume":"41","author":"OA Wahab","year":"2014","unstructured":"Wahab OA, Otrok H, Mourad A (2014) A cooperative watchdog model based on Dempster-Safer for detecting misbehaving vehicles. Comput Commun 41:43\u201354","journal-title":"Comput Commun"},{"key":"603_CR64","unstructured":"Grover J, Gaur M, Laxmi V (2016) Sybil attack in VANETs. Security of Sybil attack in VANETs. Security of self-organizing networks: MANET, WSN, WMN, VANET. p 269"},{"issue":"16","key":"603_CR65","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.3390\/s19163589","volume":"19","author":"MS Sheikh","year":"2019","unstructured":"Sheikh MS, Liang J, Wang W (2019) A survey of security services, attacks, and applications for vehicular ad hoc networks (VANETs). Sensors 19(16):3589","journal-title":"Sensors"},{"key":"603_CR66","doi-asserted-by":"publisher","unstructured":"Chaubey N, Yadav D (2020) A taxonomy of Sybil attacks in vehicular ad-hoc network (VANET). https:\/\/doi.org\/10.4018\/978-1-7998-2570-8.ch009","DOI":"10.4018\/978-1-7998-2570-8.ch009"},{"key":"603_CR67","doi-asserted-by":"crossref","unstructured":"Rahbari M, Jamali MAJ (2011) Efficient detection of Sybil attack based on cryptography in VANET. arXiv preprint arXiv: 1112.2257","DOI":"10.5121\/ijnsa.2011.3614"},{"issue":"5","key":"603_CR68","first-page":"116","volume":"3","author":"R Prakash","year":"2014","unstructured":"Prakash R, Kamal S (2014) Improved session key-based certificate to detect sybil attack. IJERT 3(5):116\u2013119","journal-title":"IJERT"},{"issue":"8","key":"603_CR69","first-page":"230","volume":"5","author":"P Mittal","year":"2016","unstructured":"Mittal P, Ahlawat D (2016) Sybil Node Detection Using Neighbourhood Information Passing. Int J Comput Sci Mob Comput 5(8):230\u2013240","journal-title":"Int J Comput Sci Mob Comput"},{"key":"603_CR70","doi-asserted-by":"publisher","first-page":"172","DOI":"10.17148\/IARJSET.2017.4631","volume":"4","author":"A Panchal","year":"2017","unstructured":"Panchal A, Singh D (2017) Segregation of sybil attack using neighbouring information in VANET. Int Adv Res J Sci Eng Technol 4:172","journal-title":"Int Adv Res J Sci Eng Technol"},{"key":"603_CR71","doi-asserted-by":"publisher","first-page":"6703","DOI":"10.1109\/TVT.2015.2480244","volume":"65","author":"K Zaidi","year":"2016","unstructured":"Zaidi K, Milojevic M, Rakocevic V, Nallanathan A, Rajarajan M (2016) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65:6703","journal-title":"IEEE Trans Veh Technol"},{"key":"603_CR72","doi-asserted-by":"crossref","unstructured":"Putra G D, Sulistyo S (2017) Trust-based approach in adjacent vehicles to mitigate Sybil attacks in VANET. In: International conference on software and e-Business","DOI":"10.1145\/3178212.3178231"},{"key":"603_CR73","doi-asserted-by":"crossref","unstructured":"Ahmed S, Tepe K (2017) Recommendation trust for improved malicious node detection in ad hoc networks. IEEE 86th vehicular technology conference (VTC-Fall)","DOI":"10.1109\/VTCFall.2017.8288217"},{"key":"603_CR74","doi-asserted-by":"publisher","first-page":"47258","DOI":"10.1109\/ACCESS.2018.2864111","volume":"6","author":"C Iwendi","year":"2018","unstructured":"Iwendi C et al (2018) On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access 6:47258","journal-title":"IEEE Access"},{"key":"603_CR75","doi-asserted-by":"publisher","unstructured":"Garip MT, Kim PH, Reiher P, Gerla M (2017) INTERLOC: an interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks. https:\/\/doi.org\/10.1109\/ccnc.2017.8013424","DOI":"10.1109\/ccnc.2017.8013424"},{"issue":"5","key":"603_CR76","doi-asserted-by":"publisher","first-page":"10","DOI":"10.26438\/ijsrcse\/v6i5.1015","volume":"6","author":"K Singh","year":"2018","unstructured":"Singh K, Kaur H (2018) Evaluation of proposed technique for detection of Sybil attack in VANET. Int J Sci Res Comput Sci Eng 6(5):10\u201315. https:\/\/doi.org\/10.26438\/ijsrcse\/v6i5.1015","journal-title":"Int J Sci Res Comput Sci Eng"},{"issue":"11","key":"603_CR77","doi-asserted-by":"publisher","first-page":"2588","DOI":"10.1109\/JSAC.2019.2933888","volume":"37","author":"Y Yao","year":"2019","unstructured":"Yao Y, Xiao B, Yang G, Hu Y, Wang L, Zhou X (2019) Power control identification: a novel Sybil attack detection scheme in VANETs using RSSI. IEEE J Sel Areas Commun 37(11):2588\u20132602. https:\/\/doi.org\/10.1109\/JSAC.2019.2933888","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"603_CR78","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TDSC.2020.2993769","volume":"19","author":"M Baza","year":"2020","unstructured":"Baza M, Nabil M, Mahmoud MM, Bewermeier N, Fidan K, Alasmary W, Abdallah M (2020) Detecting Sybil attacks using proofs of work and location in VANETs. IEEE Trans Dependable Secure Comput 19(1):39\u201353","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"603_CR79","doi-asserted-by":"publisher","first-page":"101845","DOI":"10.1016\/j.adhoc.2019.01.010","volume":"90","author":"Marwane Ayaida","year":"2019","unstructured":"Ayaida Marwane et al (2019) A macroscopic traffic model-based approach for Sybil attack detection in VANETs. Ad Hoc Netw 90:101845","journal-title":"Ad Hoc Netw"},{"key":"603_CR80","doi-asserted-by":"crossref","unstructured":"Ayaida M, Messai N, Wilhelm G, Najeh S (2019) A novel Sybil attack detection mechanism for C-ITS. In: 2019 15th international wireless communications and mobile computing conference (IWCMC). IEEE. pp. 913\u2013918","DOI":"10.1109\/IWCMC.2019.8766572"},{"key":"603_CR81","doi-asserted-by":"publisher","unstructured":"Sharma AK, Saroj SK, Chauhan SK, Saini SK (2017) Sybil attack prevention and detection in vehicular ad hoc network. In: Proceeding - IEEE international conference on computing, communication, and automation, ICCCA 2016(April):594\u2013599. https:\/\/doi.org\/10.1109\/CCAA.2016.7813790","DOI":"10.1109\/CCAA.2016.7813790"},{"issue":"2","key":"603_CR82","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1080\/17445760.2019.1617865","volume":"36","author":"S Hamdan","year":"2021","unstructured":"Hamdan S, Hudaib A, Awajan A (2021) Detecting Sybil attacks in vehicular ad hoc networks. Int J Parallel Emerg Distrib Syst 36(2):69\u201379","journal-title":"Int J Parallel Emerg Distrib Syst"},{"key":"603_CR83","doi-asserted-by":"crossref","unstructured":"Haddaji A, Ayed S, Chaari L (2020) Blockchain-based multi-levels trust mechanism against Sybil attacks for vehicular networks. In: 14th international conference on big data science and engineering","DOI":"10.1109\/BigDataSE50710.2020.00028"},{"key":"603_CR84","doi-asserted-by":"publisher","first-page":"4954","DOI":"10.3390\/s19224954","volume":"19","author":"AS Khan","year":"2019","unstructured":"Khan AS, Balan K, Javed Y, Tarmizi S, Abdullah J (2019) Secure trust-based blockchain architecture to prevent attacks in VANET. Sensors 19:4954","journal-title":"Sensors"},{"key":"603_CR85","first-page":"145","volume":"13","author":"S Choudhary","year":"2022","unstructured":"Choudhary S, Dorle S (2022) Secured SDN based blockchain: an architecture to improve the security of VANET. Int J Electr Comput Eng Syst 13:145","journal-title":"Int J Electr Comput Eng Syst"},{"key":"603_CR86","doi-asserted-by":"crossref","unstructured":"Laouiti DE et al (2022) Sybil attack detection in VANETs using an AdaBoost classifier. Int Wireless Comm Mobile Computing (IWCMC)","DOI":"10.1109\/IWCMC55113.2022.9824974"},{"key":"603_CR87","doi-asserted-by":"crossref","unstructured":"Kamel J et al (2019) A misbehavior authority system for Sybil attack detection in C-ITS. In: IEEE 10th ubiquitous computing, electronics & mobile communication conference (UEMCON)","DOI":"10.1109\/UEMCON47517.2019.8993045"},{"key":"603_CR88","doi-asserted-by":"publisher","first-page":"6934","DOI":"10.3390\/s22186934","volume":"22","author":"S Azam","year":"2022","unstructured":"Azam S, Bibi M, Riaz R, Rizvi SS, Kwon SJ (2022) Collaborative learning based Sybil attack detection in vehicular ad-hoc networks (VANETS). Sensors 22:6934","journal-title":"Sensors"},{"key":"603_CR89","doi-asserted-by":"crossref","unstructured":"Velayudhan N C, Anitha A, Madanan M (2022) Sybil attack with RSU detection and location privacy in urban VANETs: an efficient EPORP technique. Wirel Pers Commun. pp 1\u201329","DOI":"10.21203\/rs.3.rs-680396\/v1"},{"key":"603_CR90","doi-asserted-by":"crossref","unstructured":"Hamdan S, Hudaib A, Awajan A (2018, October) Hybrid algorithm to detect the Sybil attacks in VANET. In: 2018 fifth international symposium on innovation in information and communication technology (ISIICT). IEEE. pp. 1\u20136","DOI":"10.1109\/ISIICT.2018.8613724"},{"issue":"1","key":"603_CR91","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/JIOT.2018.2841969","volume":"6","author":"R Silva","year":"2018","unstructured":"Silva R, Iqbal R (2018) Ethical implications of social internet of vehicles systems. IEEE Internet Things J 6(1):517\u2013531","journal-title":"IEEE Internet Things J"},{"key":"603_CR92","unstructured":"Thomas M, Borah A, Paranjothi A (2024) Trust-aware Sybil attack detection for resilient vehicular communication. arXiv preprint arXiv:2411.07520"},{"issue":"10","key":"603_CR93","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.3390\/electronics13101901","volume":"13","author":"J Li","year":"2024","unstructured":"Li J, Lin Y, Li Y, Zhuang Y, Cao Y (2024) BPA: a novel blockchain-based privacy-preserving authentication scheme for the internet of vehicles. Electronics 13(10):1901","journal-title":"Electronics"},{"key":"603_CR94","unstructured":"Khanduja S (2024) Traffic congestion Sybil attack detection in VANETs using machine learning techniques (Master\u2019s thesis, University of Windsor (Canada))"},{"issue":"8","key":"603_CR95","doi-asserted-by":"publisher","first-page":"3435","DOI":"10.1007\/s11276-023-03399-1","volume":"29","author":"A Balaram","year":"2023","unstructured":"Balaram A, Nabi SA, Rao KS, Koppula N (2023) Highly accurate Sybil attack detection in VANET using extreme learning machine with preserved location. Wireless Netw 29(8):3435\u20133443","journal-title":"Wireless Netw"},{"key":"603_CR96","unstructured":"Hassan A (2009) VANET simulation"},{"key":"603_CR97","unstructured":"https:\/\/ns2simulator.com\/vanet-simulation-in-ns2\/"},{"key":"603_CR98","unstructured":"https:\/\/omnetpp.org\/"},{"key":"603_CR99","doi-asserted-by":"crossref","unstructured":"Lim KG, Lee CH, Chin RKY, Yeo KB, Teo KTK (2017) SUMO enhancement for vehicular ad hoc network (VANET) simulation. In: 2017 IEEE 2nd international conference on automatic control and intelligent systems (I2CACIS). IEEE. pp. 86\u201391","DOI":"10.1109\/I2CACIS.2017.8239038"},{"key":"603_CR100","doi-asserted-by":"crossref","unstructured":"Sommer C, Eckhoff D, Brummer A, Buse D S, Hagenauer F, Joerer S, Segata M (2019) Veins: the open source vehicular network simulation framework. Recent advances in network simulation: the OMNeT++ environment and its ecosystem, 215\u2013252","DOI":"10.1007\/978-3-030-12842-5_6"},{"issue":"1","key":"603_CR101","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1515\/comp-2015-0006","volume":"5","author":"J Grover","year":"2015","unstructured":"Grover J, Gaur MS, Laxmi V (2015) Multivariate verification for Sybil attack detection in VANET. Open Comput Sci 5(1):60\u201378","journal-title":"Open Comput Sci"},{"issue":"10","key":"603_CR102","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101842","volume":"35","author":"O Benoudifa","year":"2023","unstructured":"Benoudifa O, Wakrime AA, Benaini R (2023) Autonomous solution for controller placement problem of software-defined networking using MuZero based intelligent agents. J King Saud Univ Comput Inf Sci 35(10):101842","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"603_CR103","doi-asserted-by":"crossref","unstructured":"Elgharbi S E, Ouchani S, Ait Wakrime A, Ouhammou Y (2023) Smart mining and consensus protocols in blockchain-enabled industrial cyber-physical systems: a survey. In: Proceedings of the 7th international conference on future networks and distributed systems. pp. 769\u2013778","DOI":"10.1145\/3644713.3644845"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00603-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11334-025-00603-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00603-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T08:02:59Z","timestamp":1750320179000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11334-025-00603-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,12]]},"references-count":103,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["603"],"URL":"https:\/\/doi.org\/10.1007\/s11334-025-00603-7","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"value":"1614-5046","type":"print"},{"value":"1614-5054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,12]]},"assertion":[{"value":"31 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}