{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:47:12Z","timestamp":1775040432666,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,22]]},"DOI":"10.1109\/acit57182.2022.9994082","type":"proceedings-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T18:38:43Z","timestamp":1672857523000},"page":"1-5","source":"Crossref","is-referenced-by-count":15,"title":["Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures"],"prefix":"10.1109","author":[{"given":"Ghassan","family":"Samara","sequence":"first","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa-Jordan"}]},{"given":"Mohammed Bhaa","family":"Eid","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa-Jordan"}]},{"given":"Mohammad","family":"Aljaidi","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa-Jordan"}]},{"given":"Sattam","family":"Almatarneh","sequence":"additional","affiliation":[{"name":"Zarqa University,Artificial Intelligence Department,Zarqa-Jordan"}]},{"given":"Mohammad","family":"Rasmi","sequence":"additional","affiliation":[{"name":"Zarqa University,Cyber Security Department,Zarqa-Jordan"}]},{"given":"Raed","family":"Alazaideh","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa-Jordan"}]},{"given":"Yasser","family":"Al-Lahham","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa-Jordan"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"100","article-title":"Increasing Network Visibility Using Coded Repetition Beacon Piggybacking","volume":"13","author":"Samara","year":"2011","journal-title":"World Applied Sciences Journal"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2011.2606.2612"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246119"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2018.094399"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2012.1235.1242"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v9.i3.pp439-447"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT50332.2020.9300065"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2010.1056.1061"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2010.5497419"},{"issue":"10","key":"ref10","article-title":"Dynamic Safety Message Power Control in V ANET Using PSO","volume":"3","author":"Samara","year":"2013","journal-title":"World of Computer Science & Information Technology Journal"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT53391.2021.9677341"},{"issue":"1","key":"ref12","article-title":"A Low Cost ZigBee Sensor Network Architecture for Indoor Air Quality Monitoring","volume":"15","author":"Alhmiedat","year":"2017","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860535"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT53391.2021.9677453"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69548-8_2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250356"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JEEIT.2019.8717412"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IECON43393.2020.9255254"},{"issue":"3a","key":"ref19","first-page":"592","article-title":"Aware-routing protocol using best first search algorithm in wireless sensor","volume":"15","author":"Samara","year":"2018","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref20","author":"Rahman","year":"2009","journal-title":"Security & Privacy for DSRC-based Automotive Collision Reporting"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v9i1.pp496-504"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079980"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/127912020"},{"issue":"1","key":"ref24","first-page":"4415","article-title":"Energy-efficiency routing algorithms in wireless sensor networks: A survey","volume":"9","author":"Samara","year":"2020","journal-title":"International Journal of Scientific and Technology Research"},{"issue":"8","key":"ref25","first-page":"180","article-title":"Congestion control approach based on effective random early detection and fuzzy logic","volume":"3","author":"Khatari","year":"2015","journal-title":"MA GNT Research Report"},{"issue":"2","key":"ref26","article-title":"Performance Analysis of Dynamic Source Routing Protocol","volume":"5","author":"Salem","year":"2014","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"issue":"8","key":"ref27","article-title":"Cache Discovery Policies of MANET","volume":"3","author":"Salem","year":"2013","journal-title":"World of Computer Science & Information Technology Journal"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v9i5.2848"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239501"},{"issue":"1","key":"ref30","first-page":"301","article-title":"VANET: Security attacks and its possible solutions","volume":"3","author":"Rawat","year":"2012","journal-title":"Journal of Information and Operations Management"},{"issue":"22","key":"ref31","article-title":"Security attacks with an effective solution for dos attacks in V ANET","volume":"66","author":"MalIa","year":"2013","journal-title":"International Journal of Computer Applications"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5121\/ijans.2014.4201"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0191"},{"key":"ref34","first-page":"1","article-title":"Challenges in securing vehicular networks","volume-title":"Workshop on hot topics in networks (HotNets- IV)","author":"Parno"},{"issue":"1","key":"ref35","first-page":"301","article-title":"VANET: Security attacks and its possible solutions","volume":"3","author":"Rawat","year":"2012","journal-title":"Journal of Information and Operations Management"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"ref37","first-page":"1","article-title":"Behavior of attacker and some new possible attacks in vehicular ad hoc network (V ANET)","author":"Sumra","year":"2011","journal-title":"2011 3rd international congress on ultra modern telecommunications and control systems and workshops (ICUMT)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/netapps.2010.17"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2020.12.005"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/GC-ElecEng52322.2021.9788270"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1161-5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79966-5_8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/HONET.2007.4600258"},{"key":"ref44","article-title":"Secure communication for intersection assistance","volume-title":"Proceedings of the 2nd International Workshop on Intelligent Transportation","author":"Doetzer"}],"event":{"name":"2022 International Arab Conference on Information Technology (ACIT)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2022,11,22]]},"end":{"date-parts":[[2022,11,24]]}},"container-title":["2022 International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9994070\/9994081\/09994082.pdf?arnumber=9994082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:39:02Z","timestamp":1706791142000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9994082\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/acit57182.2022.9994082","relation":{},"subject":[],"published":{"date-parts":[[2022,11,22]]}}}