{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T07:51:45Z","timestamp":1778053905528,"version":"3.51.4"},"reference-count":319,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100008561","name":"Universiti Tenaga Nasional","doi-asserted-by":"publisher","award":["BOLDREFRESH 2025 (J510050002 (IC-6C))"],"award-info":[{"award-number":["BOLDREFRESH 2025 (J510050002 (IC-6C))"]}],"id":[{"id":"10.13039\/501100008561","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3198656","type":"journal-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T19:51:16Z","timestamp":1660593076000},"page":"86127-86180","source":"Crossref","is-referenced-by-count":176,"title":["A Comprehensive Survey on Vehicular Networking: Communications, Applications, Challenges, and Upcoming Research Directions"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4621-6910","authenticated-orcid":false,"given":"Nehad Hameed","family":"Hussein","sequence":"first","affiliation":[{"name":"College of Graduate Studies (COGS), Universiti Tenaga Nasional (The Energy University), Kajang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5044-6110","authenticated-orcid":false,"given":"Chong Tak","family":"Yaw","sequence":"additional","affiliation":[{"name":"Institute of Sustainable Energy, Universiti Tenaga Nasional (The Energy University), Kajang, Malaysia"}]},{"given":"Siaw Paw","family":"Koh","sequence":"additional","affiliation":[{"name":"Institute of Sustainable Energy, Universiti Tenaga Nasional (The Energy University), Kajang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4447-262X","authenticated-orcid":false,"given":"Sieh Kiong","family":"Tiong","sequence":"additional","affiliation":[{"name":"Institute of Sustainable Energy, Universiti Tenaga Nasional (The Energy University), Kajang, Malaysia"}]},{"given":"Kok Hen","family":"Chong","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics, College of Engineering, Universiti Tenaga Nasional (The Energy University), Kajang, Malaysia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100182"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100310"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.04.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.01.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2014.7297650"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2013.058235"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2012.6232136"},{"issue":"6","key":"ref9","first-page":"2278","article-title":"Implementation of VANET in transportation using wireless sensors","volume":"4","author":"Kumar","year":"2015","journal-title":"Int. J. Sci. Res. Eng. Technol."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2016.1191114"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2997936"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/su13116187"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100359"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923840"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3048250"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2989790"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326346"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09447-9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100418"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00993-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100403"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17762\/turcomat.v12i2.1179"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08414-2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v18.i1.pp188-198"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100247"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100231"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992580"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3159762"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICNAS.2019.8807870"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AICAI.2019.8701312"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.20532\/cit.2018.1004278"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.03.010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SmartTechCon.2017.8358491"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0280-9"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2472395"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2440103"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.09.001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3008612"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/s21041121"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/c2015-0-04087-4"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2020.119970"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2423915"},{"key":"ref45","volume-title":"Number of Passenger Cars and Commercial Vehicles in use Worldwide From 2006 to 2014 in (1,000 Units) 2014","year":"2016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.086"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3078-7"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2016.7835924"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345422"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2872122"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689254"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2010.5561568"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2893067"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.09.008"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.17"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2837870"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6840-4_56"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2962089"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-9979-7"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106591"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0551-6"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhydene.2015.03.132"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102779"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/s21227712"},{"key":"ref65","first-page":"72","article-title":"Security threats in VANETS: A review","volume":"2","author":"Malik","year":"2014","journal-title":"Int. J. Recent Res. Aspects"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.1900053"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6048-4_50"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1504\/IJAIP.2019.096957"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3000797"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/computers10010002"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.12.016"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0598-2"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2791487"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2008.4537038"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.247"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2016.07.004"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.04.009"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP53232.2021.9674090"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870166"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6515060"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2421277"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600071CM"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1561\/1300000054"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700467"},{"key":"ref85","volume-title":"The Cost-Benefit Analysis on Cellular Vehicle to Everything (C-V2X) Technology and its Evolution to 5G-V2X","year":"2022"},{"key":"ref86","volume-title":"IEEE ComSoc Technology Blog","author":"Weissberger","year":"2021"},{"issue":"2","key":"ref87","first-page":"5","article-title":"V2X communication for its-from IEEE 802.11 p towards 5G","volume":"1","author":"Wevers","year":"2017","journal-title":"IEEE 5G Tech Focus"},{"key":"ref88","volume-title":"Ready to Roll: Why 802.11 p Beats LTE and 5G for V2X","author":"Filippi","year":"2021"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700053"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010544"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2014.6814729"},{"key":"ref92","article-title":"Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures","author":"Kelarestaghi","year":"2019","journal-title":"arXiv:1903.01541"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.11.001"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.02.017"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2015.10.001"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2019.08.002"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/IICETA50496.2020.9318863"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875906"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2015.7359228"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.5121\/ijwmn.2012.4118"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2015.03.002"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2015.7148411"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6605-6_32"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249492"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2015.10"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7637-6_6"},{"issue":"3","key":"ref107","first-page":"27","article-title":"A review of various VANET data dissemination protocols","volume":"5","author":"Kumar","year":"2012","journal-title":"Int. J. u- and e-Service"},{"issue":"6","key":"ref108","first-page":"713","article-title":"A detail survey on applications of vehicular ad-hoc networks (VANETs)","volume":"3","author":"Mittal","year":"2014","journal-title":"Int. J. Comput. Sci. Mobile Comput."},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0176-3"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245328"},{"issue":"2","key":"ref111","first-page":"2077","article-title":"Advancement in infotainment system in automotive sector with vehicular cloud network and current state of art","volume":"10","author":"Reshma","year":"2020","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.021"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625806"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08118-7"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/HORA49412.2020.9152928"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.12694\/scpe.v21i3.1741"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2019.03.001"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON51285.2020.9298031"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMI.2017.8265773"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982636"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbenv.2020.05.002"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-5062-5.ch008"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2603219"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/491756"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2010.11.009"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s13177-019-00184-3"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00555-x"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.3390\/jsan9020022"},{"key":"ref130","article-title":"Data communication in VANETs: A survey, challenges and applications","author":"Cunha","year":"2014"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65726-0_25"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2641903"},{"key":"ref133","first-page":"2865","article-title":"VANET based health monitoring through wireless body sensor network","volume-title":"Proc. 3rd Int. Conf. Comput. Sustain. Global Develop. (INDIACom)","author":"Kamal"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-020-00551-4"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-021-00136-3"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.3390\/s21010056"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijtst.2017.12.001"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2764-1.ch008"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2015.64"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.002"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.08.004"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3697733"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.118"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.004"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.3390\/jsan11010009"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7907-3_15"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2013.6691819"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.3390\/s18051461"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3043716"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.3390\/jsan9010003"},{"key":"ref151","article-title":"Advancing transportation in Uganda with automation advancing transportation in Uganda with automation, connectivity and intelligence","author":"Namugenyi","year":"2018"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2017.12.018"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.033010.00024"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100303"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00867-7"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2019.8905260"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2019.8835238"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-9012-9_46"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2750452"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348783"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.10.011"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766717"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2011.29"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0207-x"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2015.7343614"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24043-0_33"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.042"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9396-x"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/190607"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.6029\/smartcr.2014.06.009"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN50884.2021.9333974"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06962-2"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9936299"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6504006"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3017018"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771522"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2973715"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2019.01.008"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.049"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707926"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-021-02726-8"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866759"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032935"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.39"},{"key":"ref185","volume-title":"Security Architecture for Systems Providing End-to-End Communications","year":"2003"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053233"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i6.pp6423-6434"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706020"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0324-5_10"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.11.003"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387555"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0801-z"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2991372"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799546"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100391"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2011.5982649"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148950"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2591558"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.12.010"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.011.2000541"},{"key":"ref201","article-title":"6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities","author":"Noor-A-Rahim","year":"2020","journal-title":"arXiv:2012.07753"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2795381"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2815678"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2015.11.006"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/ICOA51614.2021.9442671"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00910-9"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/CDS52072.2021.00012"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700460"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.02.008"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100395"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7031-5_8"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v12.i1.pp218-224"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1002\/9781119761846.ch4"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800236"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT.2019.8869157"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100117"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.02.006"},{"key":"ref218","article-title":"Security, privacy and trust: Cognitive Internet of Vehicles","author":"Hasan","year":"2021","journal-title":"arXiv:2104.12878"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100285"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9290-4_8"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/AEMCSE51986.2021.00240"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08067-1"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1002\/eng2.12467"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2997460"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2021.3106147"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3056461"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2982292"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900659"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2957798"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW49093.2021.9419986"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-021-00750-6"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22277-2_22"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2815638"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460131"},{"key":"ref235","article-title":"Softwarization, virtualization, & machine learning for intelligent & effective V2X communications","author":"Moubayed","year":"2020","journal-title":"arXiv:2006.04595"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800036"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343125"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800324"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/CLEI.2018.00090"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2882248"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000430"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2990686"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3017474"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2021.3132226"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3081560"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2956472"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3062053"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.5753\/courb.2020.12361"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3099597"},{"key":"ref251","article-title":"Federated learning on the road: Autonomous controller design for connected and autonomous vehicles","author":"Zeng","year":"2021","journal-title":"arXiv:2102.03401"},{"key":"ref252","article-title":"Federated learning in vehicular networks","author":"Elbir","year":"2020","journal-title":"arXiv:2006.01412"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2019.0317"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.011.2100061"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3100700"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2897356"},{"key":"ref257","article-title":"Neurosciences and 6G: Lessons from and needs of communicative brains","author":"Moioli","year":"2020","journal-title":"arXiv:2004.01834"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3090778"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2789-y"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2969444"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1145\/3436286.3436495"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/BCI51272.2021.9385312"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3128611"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000105"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3095437"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885970"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3001682"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3013990"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3064426"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900489"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/632\/3\/032031"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2867519"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876004"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3038049"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3127923"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980369"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921162"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2888904"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800553"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.4018\/JCIT.20210701.oa5"},{"key":"ref281","article-title":"Can terahertz provide high-rate reliable low latency communications for wireless VR?","author":"Chaccour","year":"2020","journal-title":"arXiv:2005.00536"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2867835"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3025995"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2764181"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010896"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2882385"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900488"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761723"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/IMCOM48794.2020.9001682"},{"issue":"3","key":"ref290","first-page":"293","article-title":"Physical layer security of autonomous driving: Secure vehicle-to-vehicle communication in a security cluster","volume":"45","author":"Ahn","year":"2019","journal-title":"Ad-hoc Sensor Wireless Netw."},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.3390\/su11143971"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1007\/s42354-020-0257-9"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800509"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2014.7023142"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2994407"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2829897"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3034224"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476474"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-3218-8"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2020.3010270"},{"issue":"11","key":"ref301","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCOM.2016.1600337CM","article-title":"On the waveform for 5G","volume":"54","author":"Zhang","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601107"},{"key":"ref303","volume-title":"Orthogonal Waveforms and Filter Banks for Future Communication Systems","author":"Renfors","year":"2017"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925924"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2860011"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2909205"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.4108\/eai.11-11-2020.166959"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.4108\/eai.13-7-2018.163972"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2018.5187"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF52925.2021.00074"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.3390\/info11050273"},{"key":"ref312","first-page":"94","article-title":"Threat modeling as a basis for security requirements","volume-title":"Proc. Symp. Requirements Eng. Inf. Secur.","author":"Myagmar"},{"key":"ref313","volume-title":"Threat Modeling: Designing for Security","author":"Shostack","year":"2014"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967568"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/LCN52139.2021.9524960"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.3390\/s22030878"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3084396"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1002\/9781119761846.ch6"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6262194"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09856630.pdf?arnumber=9856630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T05:06:19Z","timestamp":1709355979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9856630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":319,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3198656","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}