{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:36:10Z","timestamp":1774895770131,"version":"3.50.1"},"reference-count":168,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Canada Research Chair Program Tier-II entitled \u201cTowards a Novel and Intelligent Framework for the Next Generations of IoT Networks.\u201d"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3152767","type":"journal-article","created":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T20:28:15Z","timestamp":1645216095000},"page":"23022-23050","source":"Crossref","is-referenced-by-count":60,"title":["A Survey of VANET\/V2X Routing From the Perspective of Non-Learning- and Learning-Based Approaches"],"prefix":"10.1109","volume":"10","author":[{"given":"Twinkle","family":"Chatterjee","sequence":"first","affiliation":[{"name":"Department of Information Technology, Techno International New Town, Kolkata, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1916-7743","authenticated-orcid":false,"given":"Raja","family":"Karmakar","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5025-6624","authenticated-orcid":false,"given":"Georges","family":"Kaddoum","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8929-9605","authenticated-orcid":false,"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Jadavpur University, Kolkata, India"}]},{"given":"Sandip","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India"}]}],"member":"263","reference":[{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/3284748"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2923230"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884708"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8424605"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.05.002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963424"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689254"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958743"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2884525"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2499205"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2806996"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.11.003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/9781118648759.ch3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2808444"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3100472"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3029723"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2817552"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.09.001"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2840088"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijtst.2017.12.001"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.08.009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISS1.2019.8908065"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3053958"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2973859"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017079"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906436"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/IDEA49133.2020.9170685"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05755-8_41"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3025684"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5809-z"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/ICETET.2013.18"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIS50930.2021.9395882"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/NMIC.2019.00008"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30859-9_34"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2016.2608500"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2017.8256727"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2018.8777690"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS48256.2020.9027379"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES45898.2019.9002562"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2018.8777331"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2212189"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2706756"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288307"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986035"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1057-6"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22720-2_68"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00993-4"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36625-4_11"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892180"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3046275"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3068074"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02148-y"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4539481"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3008612"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2899627"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090403"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp48618.2020.00-64"},{"key":"ref8","volume":"306","author":"laouiti","year":"2014","journal-title":"Vehicular Ad-Hoc Networks for Smart Cities First International Workshop 2014"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3272036.3272037"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MOVE.2007.4300825"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2016.7751655"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997401"},{"key":"ref9","first-page":"913","article-title":"Routing protocols in vehicular ad hoc networks: A survey and future perspectives","volume":"26","author":"lin","year":"2010","journal-title":"J Inf Sci Eng"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2643665"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2938871"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2963850"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2481464"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2592915"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3038465"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2971111"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2529178"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948315"},{"key":"ref126","first-page":"472","article-title":"Detection and mitigation of DoS attacks in VANET using secured minimum delay routing protocol","author":"duduku","year":"2016","journal-title":"Proc Int Conf Soft Comput Pattern Recognit"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2126-5_46"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644431"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0473"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3014584"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1475-4"},{"key":"ref71","first-page":"163","article-title":"Taguchi methods for ad hoc on demand distance vector routing protocol performances improvement in VANETs","author":"elshaikh","year":"2017","journal-title":"Proc Int Conf Reliable Inf Commun Technol"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0970-8"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2895274"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2867177"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923840"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2828025"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s40031-014-0081-4"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2976937"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6086-6"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2015.7387250"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2504129"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-8798-7_85"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2017.8015079"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2405478"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2490341"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2855195"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ITOEC49072.2020.9141805"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2273945"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2516027"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.102"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-019-00410-x"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2014455"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11167-4_14"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-6996-0_5"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/CCSSP49278.2020.9151466"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155880"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3021430"},{"key":"ref66","article-title":"Multihop routing for data delivery in V2X networks","author":"li","year":"2019","journal-title":"arXiv 1901 04962"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14825-5_20"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2954159"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3048250"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2188552"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2015.7370257"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2934991"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3030982"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2014.0053"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2929020"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3055504"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02279-2"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3032753"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05432-3"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-0487-9_26"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2900767"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2841348"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22720-2_65"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2018.000026"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974105"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2586382"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992580"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.6214"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2918255"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3477-5_23"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1368-y"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071349"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1104-z"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2952860"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2990174"},{"key":"ref97","first-page":"349","article-title":"Exploring the effects of Sybil attack on pure ad hoc deployment of VANET","author":"sood","year":"2020","journal-title":"Proc ICRIC"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2371828"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSCITA.2014.6839290"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SmartTechCon.2017.8358362"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3503-6_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2893067"},{"key":"ref15","first-page":"79","article-title":"Exploring the possibility of Sybil attack in position based routing protocols in VANETs: A case study of greedy perimeter coordinator routing (GPCR)","author":"sood","year":"2019","journal-title":"Proc Int Conf Recent Develop Sci Eng Technol"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02931-9_24"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989790"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2600481"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3503-6_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3058388"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2620-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SSD52085.2021.9429353"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5839-6"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2715719"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3089688"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2960236"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2725469"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3403953"},{"key":"ref116","first-page":"171","article-title":"Optimization of the 5G VANET routing protocol on AODV communication with static intersection node","author":"achmad","year":"2021","journal-title":"Proc 3rd East Indonesia Conf Comput Inf Technol (EIConCIT)"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2898776"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/IEMTRONICS52119.2021.9422592"},{"key":"ref120","first-page":"3","article-title":"Route lifetime prediction method in VANET by using AODV routing protocol (AODV-LP)","author":"kulla","year":"2018","journal-title":"Proc Conf Complex Intell Softw Intensive Syst"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2788014"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2983835"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072922"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06610-9"},{"key":"ref85","first-page":"464","article-title":"Analysis of enhanced hybrid approach using greedy perimeter stateless routing in VANET","author":"luhach","year":"2018","journal-title":"Proc Int Conf Futuristic Trends Netw Commun Technol"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9375830"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS51430.2021.9441969"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2016.0117"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09716935.pdf?arnumber=9716935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T20:58:04Z","timestamp":1653339484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9716935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":168,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3152767","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}