{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:53:23Z","timestamp":1770335603329,"version":"3.49.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04791-2","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:34:52Z","timestamp":1770291292000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Threat Detection and Secure Data Management in VANETs Using Machine Learning"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5355-234X","authenticated-orcid":false,"given":"Aarsi","family":"Kumari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0427-5290","authenticated-orcid":false,"given":"Ritesh","family":"Rastogi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4073-5207","authenticated-orcid":false,"given":"K.","family":"Prakash","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5723-9665","authenticated-orcid":false,"given":"Satya Ranjan","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4082-1199","authenticated-orcid":false,"given":"N.","family":"Vasantha Kumari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,5]]},"reference":[{"key":"4791_CR1","doi-asserted-by":"publisher","unstructured":"Alsahli MS, Almasri MM, Al-Akhras M, Al-Issa AI, Alawairdhi M. Evaluation of machine learning algorithms for intrusion detection system in WSN. Int J Adv Comput Sci Appl. 2021;12(5). https:\/\/doi.org\/10.14569\/IJACSA.2021.0120503.","DOI":"10.14569\/IJACSA.2021.0120503"},{"key":"4791_CR2","doi-asserted-by":"publisher","first-page":"104892","DOI":"10.1016\/j.actpsy.2025.104892","volume":"255","author":"A Alsaleh","year":"2025","unstructured":"Alsaleh A. Toward a conceptual model to improve the user experience of a sustainable and secure intelligent transport system. Acta Psychol. 2025;255:104892. https:\/\/doi.org\/10.1016\/j.actpsy.2025.104892.","journal-title":"Acta Psychol"},{"key":"4791_CR3","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11277-020-07955-4","volume":"117","author":"DE Boubiche","year":"2021","unstructured":"Boubiche DE, Athmani S, Boubiche S, Toral-Cruz H. Cybersecurity issues in wireless sensor networks: current challenges and solutions. Wirel Pers Commun. 2021;117:177\u2013213. https:\/\/doi.org\/10.1007\/s11277-020-07955-4.","journal-title":"Wirel Pers Commun"},{"key":"4791_CR4","doi-asserted-by":"publisher","first-page":"100306","DOI":"10.1016\/j.array.2023.100306","volume":"19","author":"MA Hossain","year":"2023","unstructured":"Hossain MA, Islam MS. Ensuring network security with a robust intrusion detection system using ensemble-based machine learning. Array. 2023;19:100306. https:\/\/doi.org\/10.1016\/j.array.2023.100306.","journal-title":"Array"},{"issue":"4","key":"4791_CR5","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1007\/s10207-023-00662-6","volume":"22","author":"R Al-Ani","year":"2023","unstructured":"Al-Ani R, Baker T, Zhou B, Shi Q. Privacy and safety improvement of VANET data via a safety-related privacy scheme. Int J Inf Secur. 2023;22(4):763\u201383. https:\/\/doi.org\/10.1007\/s10207-023-00662-6.","journal-title":"Int J Inf Secur"},{"key":"4791_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3104310","author":"TT Nguyen","year":"2021","unstructured":"Nguyen TT, Reddi VJ. Deep reinforcement learning for cyber security. IEEE Trans Neural Netw Learn Syst. 2021. https:\/\/doi.org\/10.1109\/TNNLS.2021.3104310.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"4791_CR7","doi-asserted-by":"publisher","first-page":"9572992","DOI":"10.1155\/2022\/9572992","volume":"2022","author":"J Su","year":"2022","unstructured":"Su J, Ren R, Li Y, Lau RY, Shi Y. Trusted Blockchain-Based signcryption protocol and data management for authentication and authorization in VANETs. Wirel Commun Mob Comput. 2022;2022:9572992. https:\/\/doi.org\/10.1155\/2022\/9572992.","journal-title":"Wirel Commun Mob Comput"},{"issue":"3\u20134","key":"4791_CR8","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1049\/ntw2.12036","volume":"11","author":"W Ahmed","year":"2022","unstructured":"Ahmed W, Di W, Mukathe D. Privacy-preserving blockchain-based authentication and trust management in VANETs. IET Netw. 2022;11(3\u20134):89\u2013111. https:\/\/doi.org\/10.1049\/ntw2.12036.","journal-title":"IET Netw"},{"issue":"23","key":"4791_CR9","doi-asserted-by":"publisher","first-page":"12448","DOI":"10.3390\/app122312448","volume":"12","author":"S Younas","year":"2022","unstructured":"Younas S, Rehman F, Maqsood T, Mustafa S, Akhunzada A, Gani A. Collaborative detection of black hole and Gray hole attacks for secure data communication in VANETs. Appl Sci. 2022;12(23):12448. https:\/\/doi.org\/10.3390\/app122312448.","journal-title":"Appl Sci"},{"key":"4791_CR10","doi-asserted-by":"publisher","first-page":"5031112","DOI":"10.1155\/2022\/5031112","volume":"2022","author":"Z Wang","year":"2022","unstructured":"Wang Z, Xu Y, Liu J, Li Z, Li Z, Jia H, Wang D. An efficient data sharing scheme for privacy protection based on blockchain and edge intelligence in 6G-VANET. Wirel Commun Mob Comput. 2022;2022:5031112. https:\/\/doi.org\/10.1155\/2022\/5031112.","journal-title":"Wirel Commun Mob Comput"},{"issue":"1","key":"4791_CR11","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1016\/j.comcom.2019.12.022","volume":"70","author":"MA Saleem","year":"2023","unstructured":"Saleem MA, Li X, Mahmood K, Shamshad S, Ayub MF, Bashir AK, Omar M. Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in VANET. IEEE Trans Consum Electron. 2023;70(1):1747\u201356. https:\/\/doi.org\/10.1016\/j.comcom.2019.12.022.","journal-title":"IEEE Trans Consum Electron"},{"key":"4791_CR12","doi-asserted-by":"publisher","unstructured":"Soni G, Chandravanshi K. A Novel Privacy-Preserving and Denser Traffic Management System in 6G-VANET Routing Against Black Hole Attack. In: Sustainable Communication Networks and Application: Proceedings of ICSCN 2021. Singapore: Springer Nature; 2022. pp. 649\u2013663. https:\/\/doi.org\/10.1007\/978-981-16-6605-6_49","DOI":"10.1007\/978-981-16-6605-6_49"},{"issue":"5","key":"4791_CR13","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1007\/s12083-023-01532-7","volume":"16","author":"X Zhang","year":"2023","unstructured":"Zhang X, Lai J, Moshayedi AJ. Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs. Peer-to-Peer Netw Appl. 2023;16(5):2349\u201366. https:\/\/doi.org\/10.1007\/s12083-023-01532-7.","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"2","key":"4791_CR14","doi-asserted-by":"publisher","first-page":"405","DOI":"10.18576\/jsap\/120207","volume":"12","author":"A Alhaj","year":"2023","unstructured":"Alhaj A, Zanoon N, Alrabea A, Alnatsheh H, Jawabreh O, Abu-Faraj M, Ali BJ. Improving the smart cities traffic management systems using VANETs and IoT features. J Stat Appl Probab. 2023;12(2):405\u201314. https:\/\/doi.org\/10.18576\/jsap\/120207.","journal-title":"J Stat Appl Probab"},{"issue":"10","key":"4791_CR15","doi-asserted-by":"publisher","first-page":"19837","DOI":"10.1109\/TITS.2022.3193369","volume":"23","author":"T Li","year":"2022","unstructured":"Li T, Xie S, Zeng Z, Dong M, Liu A. ATPS: an AI based trust-aware and privacy-preserving system for vehicle managements in sustainable VANETs. IEEE Trans Intell Transp Syst. 2022;23(10):19837\u201351. https:\/\/doi.org\/10.1109\/TITS.2022.3193369.","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"2","key":"4791_CR16","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s11277-022-09974-7","volume":"128","author":"S Sajini","year":"2023","unstructured":"Sajini S, Anita EM, Janet J. Improved security of the data communication in VANET environment using ASCII-ECC algorithm. Wirel Pers Commun. 2023;128(2):759\u201376. https:\/\/doi.org\/10.1007\/s11277-022-09974-7.","journal-title":"Wirel Pers Commun"},{"key":"4791_CR17","doi-asserted-by":"publisher","unstructured":"Luo X, Zhang D, Yang LT, Liu J, Chang X, Ning H. A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for cyber-physical systems. Cyber- Enabled Intell. 2019;37\u201366. https:\/\/doi.org\/10.1016\/j.future.2015.10.022.","DOI":"10.1016\/j.future.2015.10.022"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04791-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04791-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04791-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:34:53Z","timestamp":1770291293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04791-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,5]]},"references-count":17,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["4791"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04791-2","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,5]]},"assertion":[{"value":"6 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"177"}}