{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T13:02:51Z","timestamp":1765803771082,"version":"3.48.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. ITS Res."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s13177-025-00555-z","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T03:12:00Z","timestamp":1759979520000},"page":"1963-1978","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Stable and Secure Clustering Methodology for Vehicles in VANET"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2134-2961","authenticated-orcid":false,"given":"Atul","family":"Barve","sequence":"first","affiliation":[]},{"given":"Pushpinder Singh","family":"Patheja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"issue":"23","key":"555_CR1","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.3390\/rs11232852","volume":"11","author":"FA Ghaleb","year":"2019","unstructured":"Ghaleb, F.A., Maarof, M.A., Zainal, A., Al-Rimy, B.A.S., Alsaeedi, A., Boulila, W.: Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network. Remote Sens. 11(23), 2852 (2019)","journal-title":"Remote Sens."},{"key":"555_CR2","doi-asserted-by":"crossref","unstructured":"Surutkar, R., Jadhav, C.: Vanet for autonomous vehicles. In: 2024 IEEE International Students Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1\u20137 (2024)","DOI":"10.1109\/SCEECS61402.2024.10482135"},{"issue":"16","key":"555_CR3","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.3390\/s19163589","volume":"19","author":"MS Sheikh","year":"2019","unstructured":"Sheikh, M.S., Liang, J., Wang, W.: A survey of security services, attacks, and applications for vehicular ad hoc networks (vanets). Sensors 19(16), 3589 (2019)","journal-title":"Sensors"},{"key":"555_CR4","doi-asserted-by":"crossref","unstructured":"Guo, M., Liu, Y.: A clustering method based on k-means and motion similarity in vehicle ad hoc network. In: 2024 6th International Conference on Communications, Information System and Computer Engineering (CISCE), pp. 563\u2013568 (2024). IEEE","DOI":"10.1109\/CISCE62493.2024.10653116"},{"issue":"3","key":"555_CR5","doi-asserted-by":"publisher","first-page":"68","DOI":"10.24057\/2071-9388-2019-143","volume":"13","author":"AS Dastgerdi","year":"2020","unstructured":"Dastgerdi, A.S., Sargolini, M., Pierantoni, I., Stimilli, F., et al.: Toward an innovative strategic approach for sustainable management of natural protected areas in Italy. Geogr. Environ. Sustain. 13(3), 68\u201375 (2020)","journal-title":"Geogr. Environ. Sustain."},{"key":"555_CR6","first-page":"100745","volume":"47","author":"A Jalooli","year":"2024","unstructured":"Jalooli, A., Marefat, A.: Cluster stability-driven optimization for enhanced routing in heterogeneous vehicular networks. Veh. Commun. 47, 100745 (2024)","journal-title":"Veh. Commun."},{"issue":"1","key":"555_CR7","doi-asserted-by":"publisher","first-page":"2576182","DOI":"10.1155\/2022\/2576182","volume":"2022","author":"S Huang","year":"2022","unstructured":"Huang, S., Huang, C., Wu, D., Yin, Y., Ashraf, M.W.A., Fu, B.: Uav-assisted sensor data dissemination in mmwave vehicular networks based on network coding. Wirel. Commun. Mob. Comput. 2022(1), 2576182 (2022)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"15","key":"555_CR8","doi-asserted-by":"publisher","first-page":"5811","DOI":"10.3390\/s22155811","volume":"22","author":"Y Pramitarini","year":"2022","unstructured":"Pramitarini, Y., Perdana, R.H.Y., Tran, T.-N., Shim, K., An, B.: A hybrid price auction-based secure routing protocol using advanced speed and cosine similarity-based clustering against sinkhole attack in vanets. Sensors 22(15), 5811 (2022)","journal-title":"Sensors"},{"issue":"3","key":"555_CR9","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/TITS.2020.2975226","volume":"22","author":"A Mansour","year":"2020","unstructured":"Mansour, A., Malik, K.M., Alkaff, A., Kanaan, H.: Alms: asymmetric lightweight centralized group key management protocol for vanets. IEEE Trans. Intell. Transp. Syst. 22(3), 1663\u20131678 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"6","key":"555_CR10","doi-asserted-by":"publisher","first-page":"5836","DOI":"10.1109\/TVT.2020.2972923","volume":"69","author":"Z Ma","year":"2020","unstructured":"Ma, Z., Zhang, J., Guo, Y., Liu, Y., Liu, X., He, W.: An efficient decentralized key management mechanism for vanet with blockchain. IEEE Trans. Veh. Technol. 69(6), 5836\u20135849 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"555_CR11","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/s13198-019-00871-0","volume":"11","author":"KN Tripathi","year":"2020","unstructured":"Tripathi, K.N., Sharma, S.C.: A trust based model (tbm) to detect rogue nodes in vehicular ad-hoc networks (vanets). Int. J. Syst. Assur. Eng. Manag. 11(2), 426\u2013440 (2020)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"issue":"1","key":"555_CR12","first-page":"9936299","volume":"2021","author":"MA Saleem","year":"2021","unstructured":"Saleem, M.A., Shijie, Z., Sarwar, M.U., Ahmad, T., Maqbool, A., Shivachi, C.S., Tariq, M.: Deep learning-based dynamic stable cluster head selection in vanet. J. Adv. Transp. 2021(1), 9936299 (2021)","journal-title":"J. Adv. Transp."},{"key":"555_CR13","doi-asserted-by":"publisher","first-page":"103352","DOI":"10.1016\/j.micpro.2020.103352","volume":"80","author":"A Kumar","year":"2021","unstructured":"Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S.S., Kumar, V.A., Panigrahi, B.K., Veluvolu, K.C.: Black hole attack detection in vehicular ad-hoc network using secure aodv routing algorithm. Microprocess. Microsyst. 80, 103352 (2021)","journal-title":"Microprocess. Microsyst."},{"key":"555_CR14","doi-asserted-by":"publisher","first-page":"6599","DOI":"10.1007\/s12652-020-02279-2","volume":"12","author":"R Kolandaisamy","year":"2021","unstructured":"Kolandaisamy, R., Noor, R.M., Kolandaisamy, I., Ahmedy, I., Kiah, M.L.M., Tamil, M.E.M., Nandy, T.: A stream position performance analysis model based on ddos attack detection for cluster-based routing in vanet. J. Ambient. Intell. Humaniz. Comput. 12, 6599\u20136612 (2021)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"555_CR15","doi-asserted-by":"publisher","first-page":"102961","DOI":"10.1016\/j.adhoc.2022.102961","volume":"136","author":"G Kaur","year":"2022","unstructured":"Kaur, G., Kakkar, D.: Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in vanet. Ad Hoc Netw. 136, 102961 (2022)","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"555_CR16","first-page":"304","volume":"18","author":"N Jyothi","year":"2021","unstructured":"Jyothi, N., Patil, R.: An optimized deep learning-based trust mechanism in vanet for selfish node detection. International Journal of Pervasive Computing and Communications. 18(3), 304\u2013318 (2021)","journal-title":"International Journal of Pervasive Computing and Communications."},{"key":"555_CR17","doi-asserted-by":"crossref","unstructured":"Quevedo, C.H., Quevedo, A.M., Campos, G.A., Gomes, R.L., Celestino, J., Serhrouchni, A.: An intelligent mechanism for sybil attacks detection in vanets. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2020). IEEE","DOI":"10.1109\/ICC40277.2020.9149371"},{"key":"555_CR18","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1016\/j.procs.2019.04.168","volume":"151","author":"H Moudni","year":"2019","unstructured":"Moudni, H., Er-rouidi, M., Mouncif, H., Hadadi, B.: Black hole attack detection using fuzzy based intrusion detection systems in manet. Procedia Comput. Sci. 151, 1176\u20131181 (2019)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"555_CR19","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1186\/s13638-024-02408-x","volume":"2024","author":"W Ali","year":"2024","unstructured":"Ali, W., Ninoria, S.Z., Khan, G., Gola, K.K.: Robust cryptographic scheme for reliable data communication in vanet (rcsrc) using clustering approach. EURASIP J. Wirel. Commun. Netw. 2024(1), 82 (2024)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"555_CR20","doi-asserted-by":"publisher","first-page":"6693316","DOI":"10.1155\/2021\/6693316","volume":"2021","author":"MI Talukdar","year":"2021","unstructured":"Talukdar, M.I., Hassan, R., Hossen, M.S., Ahmad, K., Qamar, F., Ahmed, A.S.: Performance improvements of aodv by black hole attack detection using ids and digital signature. Wirel. Commun. Mob. Comput. 2021(1), 6693316 (2021)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"18","key":"555_CR21","doi-asserted-by":"publisher","first-page":"6934","DOI":"10.3390\/s22186934","volume":"22","author":"S Azam","year":"2022","unstructured":"Azam, S., Bibi, M., Riaz, R., Rizvi, S.S., Kwon, S.J.: Collaborative learning based sybil attack detection in vehicular ad-hoc networks (vanets). Sensors 22(18), 6934 (2022)","journal-title":"Sensors"},{"issue":"9","key":"555_CR22","doi-asserted-by":"publisher","first-page":"0309920","DOI":"10.1371\/journal.pone.0309920","volume":"19","author":"A Ali","year":"2024","unstructured":"Ali, A., Assam, M., Alajmi, M., Ghadi, Y.Y., Indira, S., Akhmediyarova, A., Alahmadi, T.J., Alkahtani, H.K.: Arithmetic optimization based secure intelligent clustering algorithm for vehicular adhoc network. PLoS ONE 19(9), 0309920 (2024)","journal-title":"PLoS ONE"},{"key":"555_CR23","doi-asserted-by":"crossref","unstructured":"Leinonen, M., Al-Tachmeesschi, A., Turkmen, B., Atashi, N., Ruotsalainen, L.: Long short term memory based traffic prediction using multi-source data. Int. J. Intell. Transp. Syst. Res. (2024)","DOI":"10.1007\/s13177-024-00451-y"},{"issue":"1","key":"555_CR24","doi-asserted-by":"crossref","first-page":"0296331","DOI":"10.1371\/journal.pone.0296331","volume":"19","author":"VR Yerrathi","year":"2024","unstructured":"Yerrathi, V.R., et al.: Load-optimized clustering in vanet using adaptive vortex optimization clustering algorithm. PLoS ONE 19(1), 0296331 (2024)","journal-title":"PLoS ONE"},{"key":"555_CR25","unstructured":"Morton, J.: Decentralized sybil attack prevention in vehicular ad hoc networks. PhD thesis, Oklahoma State University (2024)"},{"key":"555_CR26","unstructured":"Chen, X., et al.: Temporal heterogeneous graph attention network for sybil attack detection in vehicular ad hoc networks. Comput. Netw. (2025)"},{"issue":"14","key":"555_CR27","doi-asserted-by":"publisher","first-page":"7859","DOI":"10.3390\/app15147859","volume":"15","author":"S Huang","year":"2025","unstructured":"Huang, S., Huang, C., Wu, D., Yin, Y., Ashraf, M.W.A., Fu, B.: An extended lstm model for traffic flow prediction in smart cities. Appl. Sci. 15(14), 7859 (2025)","journal-title":"Appl. Sci."},{"issue":"11","key":"555_CR28","doi-asserted-by":"publisher","first-page":"5129","DOI":"10.1007\/s12652-020-01825-2","volume":"11","author":"B Cherkaoui","year":"2020","unstructured":"Cherkaoui, B., Beni-hssane, A., Erritali, M.: Variable control chart for detecting black hole attack in vehicular ad-hoc networks. J. Ambient. Intell. Humaniz. Comput. 11(11), 5129\u20135138 (2020)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"555_CR29","doi-asserted-by":"publisher","first-page":"121755","DOI":"10.1109\/ACCESS.2020.3004692","volume":"8","author":"P Rani","year":"2020","unstructured":"Rani, P., Verma, S., Nguyen, G.N., et al.: Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access 8, 121755\u2013121764 (2020)","journal-title":"IEEE Access"},{"key":"555_CR30","doi-asserted-by":"crossref","unstructured":"Kaur, G., Khurana, M., Kaur, A.: Gray hole attack detection and prevention system in vehicular adhoc network (vanet). In: 2022 3rd International Conference on Computing, Analytics and Networks (ICAN), pp. 1\u20136 (2022). IEEE","DOI":"10.1109\/ICAN56228.2022.10007192"},{"key":"555_CR31","doi-asserted-by":"crossref","unstructured":"Khan, I., Khan, F., Ali, A., Alshawi, B., Alturki, R., Wedyan, M.: A secured and optimized clustering approch in vehicular ad-hoc network. In: 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET, pp. 1\u20136 (2024). IEEE","DOI":"10.1109\/ICECET61485.2024.10698508"},{"issue":"1","key":"555_CR32","first-page":"1","volume":"23","author":"M Banihosseini","year":"2025","unstructured":"Banihosseini, M., Baradaran, V., Doroudyan, M.H.: Clustering approach to identifying and analyzing the traffic conditions: a novel hybrid cloud density and fuzzy clustering algorithm. Int. J. Intell. Transp. Syst. Res. 23(1), 1\u201315 (2025)","journal-title":"Int. J. Intell. Transp. Syst. Res."},{"issue":"2","key":"555_CR33","doi-asserted-by":"publisher","first-page":"155014771982750","DOI":"10.1177\/1550147719827500","volume":"15","author":"Y Xin","year":"2019","unstructured":"Xin, Y., Feng, X.: Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment. Int. J. Distrib. Sens. Netw. 15(2), 1550147719827500 (2019)","journal-title":"Int. J. Distrib. Sens. Netw."}],"container-title":["International Journal of Intelligent Transportation Systems Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13177-025-00555-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13177-025-00555-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13177-025-00555-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T12:56:38Z","timestamp":1765803398000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13177-025-00555-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["555"],"URL":"https:\/\/doi.org\/10.1007\/s13177-025-00555-z","relation":{},"ISSN":["1348-8503","1868-8659"],"issn-type":[{"type":"print","value":"1348-8503"},{"type":"electronic","value":"1868-8659"}],"subject":[],"published":{"date-parts":[[2025,10,9]]},"assertion":[{"value":"12 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Consent for publication is not applicable as this study did not involve human participants, animal subjects, or any data collection requiring ethics approval or consent.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable. This study did not involve human participants, human data, or personal information of any individual requiring consent for publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"No potential conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}