{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:11:30Z","timestamp":1755598290341,"version":"3.37.3"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-2150394"],"award-info":[{"award-number":["IIS-2150394"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,8]]},"DOI":"10.1109\/ccwc57344.2023.10099187","type":"proceedings-article","created":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T17:28:01Z","timestamp":1681838881000},"page":"0585-0592","source":"Crossref","is-referenced-by-count":4,"title":["Eyes on the Road: A Survey on Cyber Attacks and Defense Solutions for Vehicular Ad-Hoc Networks"],"prefix":"10.1109","author":[{"given":"Amber","family":"Hankins","sequence":"first","affiliation":[{"name":"University of Nevada,Department of Computer Science and Engineering,Reno,USA"}]},{"given":"Tapadhir","family":"Das","sequence":"additional","affiliation":[{"name":"University of Nevada,Department of Computer Science and Engineering,Reno,USA"}]},{"given":"Shamik","family":"Sengupta","sequence":"additional","affiliation":[{"name":"University of Nevada,Department of Computer Science and Engineering,Reno,USA"}]},{"given":"David","family":"Feil-Seifer","sequence":"additional","affiliation":[{"name":"University of Nevada,Department of Computer Science and Engineering,Reno,USA"}]}],"member":"263","reference":[{"volume-title":"Road traffic injuries","year":"2022","key":"ref1"},{"issue":"17","key":"ref2","article-title":"Software-defined network-based vehicular networks: A position paper on their modeling and implementation","volume-title":"Sensors","volume":"19","author":"Nkenyereye","year":"2019"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TITS.2018.2818888"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MCOM.2009.4939288"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TVT.2016.2591558"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICCW.2015.7247447"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MNET.2013.6616115"},{"issue":"5","key":"ref8","first-page":"813","article-title":"Denial of service (dos) attack and its possible solutions in vanet","volume-title":"International Journal of Electronics and Communication Engineering","volume":"4","author":"Hasbullah","year":"2010"},{"issue":"5","key":"ref9","article-title":"An efficient dynamic solution for the detection and prevention of black hole attack in vanets","volume-title":"Sensors","volume":"22","author":"Malik","year":"2022"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.5120\/ijca2017913718"},{"issue":"6","key":"ref11","first-page":"746","article-title":"Detecting sybil attacks in vanets","volume-title":"Journal of Parallel and Distributed Computing","volume":"73","author":"Yu","year":"2013"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1051\/matecconf\/201815006038"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TITS.2018.2818888"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICICSP50920.2020.9232047"},{"issue":"11","key":"ref15","article-title":"Man-in-the-middle attacks in vehicular ad-hoc networks: Evaluating the impact of attackers strategies","volume-title":"Sensors","volume":"18","author":"Ahmad","year":"2018"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ACCESS.2019.2960367"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TSC.2019.2961992"},{"volume-title":"Trust based authentication technique for cluster based vehicular ad hoc networks (vanet) - wireless networks","year":"2016","author":"Sugumar","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CAIS.2019.8769454"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/OJVT.2021.3138354"},{"issue":"24","key":"ref21","article-title":"Sbtms: Scalable blockchain trust management system for vanet","volume-title":"Applied Sciences","volume":"11","author":"Ghajar","year":"2021"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TETC.2020.2978866"},{"volume-title":"A survey: Applications of blockchain in the internet of vehicles - eurasip journal on wireless communications and networking","year":"2021","author":"Wang","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/MWC.2010.5601954"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/APCASE.2014.6924489"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/SSIC.2015.7245328"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TVT.2016.2565001"},{"volume-title":"A trust based model (tbm) to detect rogue nodes in vehicular ad-hoc networks (vanets) - international journal of system assurance engineering and management","year":"2019","author":"Tripathi","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.11591\/ijece.v11i3.pp2535-2547"},{"key":"ref30","first-page":"56","article-title":"Jamming attack detection in a pair of rf communicating vehicles using unsupervised machine learning","volume-title":"Vehicular Communications","volume":"13","author":"Karagiannis","year":"2018"},{"issue":"8","key":"ref31","article-title":"The k-means algorithm: A comprehensive survey and performance evaluation","volume-title":"Electronics","volume":"9","author":"Ahmed","year":"2020"},{"volume-title":"Bbaas: Blockchain-based anonymous authentication scheme for providing secure communication in vanets","year":"2021","author":"Maria","key":"ref32"},{"issue":"6","key":"ref33","first-page":"1042","article-title":"An intelligent approach for building a secure decentralized public key infrastructure in vanet","volume-title":"Journal of Computer and System Sciences","volume":"81","author":"Kumar","year":"2015"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/3386723.3387829"},{"key":"ref35","first-page":"877","article-title":"Recent advances in machine-learning driven intrusion detection in transportation: Survey","volume-title":"Procedia Computer Science","volume":"184","author":"Bangui"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/TITS.2020.2973715"},{"key":"ref37","first-page":"100458","article-title":"Security of vehicular ad hoc networks using blockchain: A comprehensive review","volume-title":"Vehicular Communications","volume":"34","author":"Grover","year":"2022"}],"event":{"name":"2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2023,3,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2023,3,11]]}},"container-title":["2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10099037\/10098906\/10099187.pdf?arnumber=10099187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T23:53:26Z","timestamp":1709250806000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10099187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/ccwc57344.2023.10099187","relation":{},"subject":[],"published":{"date-parts":[[2023,3,8]]}}}