{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:08:43Z","timestamp":1776182923424,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-024-01895-5","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T09:38:03Z","timestamp":1741685883000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A multi-objective approach for secure cluster based routing &amp; attack classification in VANETs"],"prefix":"10.1007","volume":"18","author":[{"given":"Aradhana","family":"Behura","sequence":"first","affiliation":[]},{"given":"Arun","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Puneet Kumar","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,11]]},"reference":[{"key":"1895_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102961","volume":"136","author":"G Kaur","year":"2022","unstructured":"Kaur G, Kakkar D (2022) Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in vanet. Ad Hoc Netw 136:102961","journal-title":"Ad Hoc Netw"},{"key":"1895_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102996","volume":"138","author":"A Nahar","year":"2023","unstructured":"Nahar A, Das D (2023) Metalearn: Optimizing routing heuristics with a hybrid meta-learning approach in vehicular ad-hoc networks. Ad Hoc Netw 138:102996","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"1895_CR3","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11277-023-10612-z","volume":"132","author":"MV Kadam","year":"2023","unstructured":"Kadam MV, Vaze VM, Todmal SR (2023) Tacr: Trust aware clustering-based routing for secure and reliable vanet communications. Wireless Pers Commun 132(1):305\u2013328","journal-title":"Wireless Pers Commun"},{"key":"1895_CR4","doi-asserted-by":"crossref","unstructured":"Sohail M, Latif Z, Javed S, Biswas S, Ajmal S, Iqbal U, Raza M et\u00a0al (2023) Routing protocols in vehicular adhoc networks (vanets): A comprehensive survey. Internet of Things, p 100837","DOI":"10.1016\/j.iot.2023.100837"},{"issue":"12","key":"1895_CR5","doi-asserted-by":"publisher","first-page":"10611","DOI":"10.1109\/TVT.2017.2715719","volume":"66","author":"AM Mezher","year":"2017","unstructured":"Mezher AM, Igartua MA (2017) Multimedia multimetric map-aware routing protocol to send video-reporting messages over vanets in smart cities. IEEE Trans Veh Technol 66(12):10611\u201310625","journal-title":"IEEE Trans Veh Technol"},{"key":"1895_CR6","doi-asserted-by":"crossref","unstructured":"Lv C, Lam CC, Cao Y, Wang Y, Kaiwartya O, Wu C (2024) Leveraging geographic information and social indicators for misbehavior detection in vanets. IEEE Transactions on consumer electronics","DOI":"10.1109\/TCE.2024.3365616"},{"issue":"10","key":"1895_CR7","doi-asserted-by":"publisher","first-page":"19613","DOI":"10.1109\/TITS.2022.3202439","volume":"23","author":"H Feng","year":"2022","unstructured":"Feng H, Chen D, Lv Z (2022) Blockchain in digital twins-based vehicle management in vanets. IEEE Trans Intell Transp Syst 23(10):19613\u201319623","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1895_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104569","volume":"93","author":"A Ali","year":"2022","unstructured":"Ali A, Iqbal MM, Jabbar S, Asghar MN, Raza U, Al-Turjman F (2022) Vablock: A blockchain-based secure communication in v2v network using icn network support technology. Microprocess Microsyst 93:104569","journal-title":"Microprocess Microsyst"},{"key":"1895_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2022.06.009","volume":"169","author":"MS Azhdari","year":"2022","unstructured":"Azhdari MS, Barati A, Barati H (2022) A cluster-based routing method with authentication capability in vehicular ad hoc networks (vanets). J Parallel Distrib Comput 169:1\u201323","journal-title":"J Parallel Distrib Comput"},{"key":"1895_CR10","doi-asserted-by":"crossref","unstructured":"Darabkh KA, Alkhader BZ, Ala\u2019F K, Jubair F, Abdel-Majeed M (2022) Icdrp-f-sdvn: An innovative cluster-based dual-phase routing protocol using fog computing and software-defined vehicular network. Veh Commun 34:100453","DOI":"10.1016\/j.vehcom.2021.100453"},{"issue":"7","key":"1895_CR11","doi-asserted-by":"publisher","first-page":"7108","DOI":"10.1109\/TVT.2019.2919681","volume":"68","author":"H Xia","year":"2019","unstructured":"Xia H, Zhang S-s, Ye Li, Pan Z-k, Peng X, Cheng X-z (2019) An attack-resistant trust inference model for securing routing in vehicular ad hoc networks. IEEE Trans Veh Technol 68(7):7108\u20137120","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1895_CR12","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1007\/s11277-022-09582-5","volume":"125","author":"NMS Kumar","year":"2022","unstructured":"Kumar NMS, Pagadala PK, Vijayakumar V, Kavinya A (2022) Multi objective glow swarm based situation and quality aware routing in vanet. Wireless Pers Commun 125(1):879\u2013895","journal-title":"Wireless Pers Commun"},{"issue":"12","key":"1895_CR13","doi-asserted-by":"publisher","first-page":"23254","DOI":"10.1109\/TITS.2022.3198507","volume":"23","author":"T Zhang","year":"2022","unstructured":"Zhang T, Xu C, Zhang B, Shen J, Kuang X (2022) Grieco LA (2022) Toward attack-resistant route mutation for vanets: an online and adaptive multiagent reinforcement learning approach. IEEE Trans Intell Transp Syst 23(12):23254\u201323267","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1895_CR14","doi-asserted-by":"crossref","unstructured":"Chougule A, Kohli V, Chamola V, Yu FR (2022) Multibranch reconstruction error (mbre) intrusion detection architecture for intelligent edge-based policing in vehicular ad-hoc networks. IEEE Transactions on intelligent transportation systems","DOI":"10.1109\/TITS.2022.3201548"},{"key":"1895_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102995","volume":"137","author":"LL C\u00e1rdenas","year":"2022","unstructured":"C\u00e1rdenas LL, Le\u00f3n JPA, Mezher AM (2022) Gratree: A gradient boosting decision tree based multimetric routing protocol for vehicular ad hoc networks. Ad Hoc Netw 137:102995","journal-title":"Ad Hoc Netw"},{"key":"1895_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109960","volume":"235","author":"M Mukhtaruzzaman","year":"2023","unstructured":"Mukhtaruzzaman M, Atiquzzaman M (2023) Stable dynamic feedback-based predictive clustering protocol for vehicular ad hoc networks. Comput Netw 235:109960","journal-title":"Comput Netw"},{"key":"1895_CR17","doi-asserted-by":"crossref","unstructured":"Ali A, Aadil F, Khan MF, Maqsood M, Lim S (2023) Harris hawks optimization-based clustering algorithm for vehicular ad-hoc networks. IEEE Transactions on intelligent transportation systems","DOI":"10.1109\/TITS.2023.3257484"},{"issue":"4","key":"1895_CR18","doi-asserted-by":"publisher","first-page":"4239","DOI":"10.1109\/JSEN.2022.3233903","volume":"23","author":"A Salim","year":"2023","unstructured":"Salim A, Khedr AM, Osamy W (2023) Iovssa: efficient mobility-aware clustering algorithm in internet of vehicles using sparrow search algorithm. IEEE Sens J 23(4):4239\u20134255","journal-title":"IEEE Sens J"},{"key":"1895_CR19","doi-asserted-by":"crossref","unstructured":"Kumari A, Kumar S, Raw RS (2024) Modified clustering and incentivized stable ch selection for reliable vanet communication. Clust Comput pp 1\u201323","DOI":"10.1007\/s10586-024-04559-4"},{"key":"1895_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111773","volume":"294","author":"MH Badole","year":"2024","unstructured":"Badole MH, Thakare AD (2024) Cluster-based multicast optimized routing in vanets using elite knowledge-based genetic algorithm. Knowl-Based Syst 294:111773","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"1895_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4914","volume":"35","author":"A Choksi","year":"2024","unstructured":"Choksi A, Shah M (2024) Machine learning based centralized dynamic clustering algorithm for energy efficient routing in vehicular ad hoc networks. Trans Emerg Telecommun Technol 35(1):e4914","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"1","key":"1895_CR22","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s11276-023-03473-8","volume":"30","author":"Y Rajkumar","year":"2024","unstructured":"Rajkumar Y, Kumar SVNS (2024) An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. Wireless Netw 30(1):335\u2013362","journal-title":"Wireless Netw"},{"key":"1895_CR23","doi-asserted-by":"crossref","unstructured":"Honarmand F, Keshavarz-Haddad A (2024) T-aodv: A trust-based routing against black-hole attacks in vanets. Peer-to-Peer Netw Appl pp 1\u201313","DOI":"10.21203\/rs.3.rs-3354407\/v1"},{"issue":"7","key":"1895_CR24","doi-asserted-by":"publisher","first-page":"6902","DOI":"10.1109\/TVT.2020.2994407","volume":"69","author":"H Nguyen","year":"2020","unstructured":"Nguyen H, Xiaoli X, Noor-A-Rahim Md, Guan YL, Pesch D, Li H, Filippi A (2020) Impact of big vehicle shadowing on vehicle-to-vehicle communications. IEEE Trans Veh Technol 69(7):6902\u20136915","journal-title":"IEEE Trans Veh Technol"},{"key":"1895_CR25","volume":"45","author":"S Brindha","year":"2024","unstructured":"Brindha S et al (2024) Maximizing vanet performance in cluster head selection using intelligent fuzzy bald eagle optimization. Veh Commun 45:100660","journal-title":"Veh Commun"},{"key":"1895_CR26","doi-asserted-by":"crossref","unstructured":"Chughtai O, Nawaz N, Kaleem Z, Yuen C (2024) Drone-assisted cooperative routing scheme for seamless connectivity in v2x communication. IEEE Access","DOI":"10.1109\/ACCESS.2024.3359273"},{"key":"1895_CR27","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/JRFID.2022.3161391","volume":"6","author":"E Abuhdima","year":"2022","unstructured":"Abuhdima E, Liu J, Zhao C, Elqaouaq A, Comert G (2022) Chin-Tser Huang, Pierluigi Pisu, and Amir Hossein Nazeri. Impact of dust and sand on 5g communications for connected vehicles applications. IEEE Journal of radio frequency identification 6:229\u2013239","journal-title":"IEEE Journal of radio frequency identification"},{"issue":"10","key":"1895_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3656166","volume":"56","author":"M AlMarshoud","year":"2024","unstructured":"AlMarshoud M, Sabir Kiraz M, Al-Bayatti AH (2024) Security, privacy, and decentralized trust management in vanets: a review of current research and future directions. ACM Comput Surv 56(10):1\u201339","journal-title":"ACM Comput Surv"},{"key":"1895_CR29","doi-asserted-by":"crossref","unstructured":"Jamil M, Farhan M, Ullah F, Srivastava G (2024) A lightweight zero trust framework for secure 5g vanet vehicular communication. IEEE Wireless communications","DOI":"10.1109\/MWC.015.2300418"},{"key":"1895_CR30","volume":"49","author":"P Surapaneni","year":"2024","unstructured":"Surapaneni P, Bojjagani S, Khan MK (2024) Vesecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment. Veh Commun 49:100822","journal-title":"Veh Commun"},{"issue":"12","key":"1895_CR31","doi-asserted-by":"publisher","first-page":"34175","DOI":"10.1007\/s11042-024-18191-2","volume":"83","author":"MSB Praba","year":"2024","unstructured":"Praba MSB, Ramesh SSS (2024) A novel tt-sho qos aware and secured vehicular adhoc network (vanet) routing protocol for smart intelligent transportation. Multimed Tool Appl 83(12):34175\u201334198","journal-title":"Multimed Tool Appl"},{"key":"1895_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-016-0529-0","volume":"2016","author":"W Xiong","year":"2016","unstructured":"Xiong W, Xu J, Li Y, Zhao N, Wan X, Liang J (2016) Minimum node degree of k-connected vehicular ad hoc networks in highway scenarios. EURASIP J Wirel Commun Netw 2016:1\u201310","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"1895_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103298","volume":"151","author":"G Kaur","year":"2023","unstructured":"Kaur G, Kakkar D (2023) Fr-aro: Secure interference aware fuzzy based clustering and hybrid optimization driven data routing in vanets. Ad Hoc Netw 151:103298","journal-title":"Ad Hoc Netw"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01895-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01895-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01895-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:32:43Z","timestamp":1746844363000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01895-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,11]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1895"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01895-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,11]]},"assertion":[{"value":"6 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors consented to the publication of a report to the journal with subscription.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"119"}}