{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:54:30Z","timestamp":1773924870061,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/vtcfall.2015.7391111","type":"proceedings-article","created":{"date-parts":[[2016,1,28]],"date-time":"2016-01-28T16:40:58Z","timestamp":1453999258000},"page":"1-7","source":"Crossref","is-referenced-by-count":72,"title":["Recent Advances in VANET Security: A Survey"],"prefix":"10.1109","author":[{"given":"Lina","family":"Bariah","sequence":"first","affiliation":[]},{"given":"Dina","family":"Shehada","sequence":"additional","affiliation":[]},{"given":"Ehab","family":"Salahat","sequence":"additional","affiliation":[]},{"given":"Chan Yeob","family":"Yeun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5494212"},{"key":"ref38","article-title":"GrooveNet: A Hybrid Simulator for Vehicle-to-Vehicle Networks","author":"mangharam","year":"2006","journal-title":"Annual International Conference on Mobile and Ubiquitous Systems"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2011.11"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.467"},{"key":"ref31","article-title":"SUMO - Simulation of Urban MObility","year":"2015"},{"key":"ref30","article-title":"GrooveNet: A Hybrid Simulator for Vehicle-to-Vehicle Networks","author":"mangharam","year":"2006","journal-title":"Annual International Conference on Mobile and Ubiquitous Systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2014.7009345"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/278009.278027"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2008.76"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2007.4357627"},{"key":"ref10","article-title":"A Survey of Existing Approaches for Secure Ad Hoc Routing and their Applicability to VANETs","author":"fonseca","year":"2006"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2007.437"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2007.4437823"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1002\/9781118452189","author":"delgrossi","year":"2012","journal-title":"Vehicle Safety Communications Protocols"},{"key":"ref13","article-title":"Efficient Security Implementation for Emerging VANETs","volume":"4","author":"yeun","year":"2009","journal-title":"Special issue of Applied Computing Ubiquitous Computing and Communication Journal"},{"key":"ref14","article-title":"Security and Privacy of Intelligent VANETs","author":"al-qutayri","year":"2009","journal-title":"Computational Intelligence & Modern Heuristics"},{"key":"ref15","article-title":"Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison","author":"yeun","year":"1999","journal-title":"Proceedings of Cryptography and Coding at the 7th IMA International Conference Cirencester"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/9781118452189"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"The Sybil Attack","author":"douceur","year":"2002","journal-title":"International Workshop on Peer-to-Peer Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2011.5893820"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5621979"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.84"},{"key":"ref27","article-title":"A Security Framework with Strong Nonrepudiation and Privacy in VANETs","author":"choi","year":"2009","journal-title":"IEEE Consumer Communications and Networking Conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.188"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.66"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/TVT.2012.2226613","article-title":"A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks","volume":"62","author":"mershad","year":"2013","journal-title":"IEEE Trans on Vehicular Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601954"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.14"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7054724"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2245971"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2013.0065"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601954"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.38"},{"key":"ref21","first-page":"47","article-title":"Identity-Based Cryptosystems and Signiture Schemes","volume":"196","author":"shamir","year":"1993"},{"key":"ref24","article-title":"A Hierarchical Security Architecture of VANET","author":"liu","year":"2013","journal-title":"International Conference on Cyberspace Technology"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1165"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp.2012.6154869"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454834"}],"event":{"name":"2015 IEEE 82nd Vehicular Technology Conference (VTC Fall)","location":"Boston, MA, USA","start":{"date-parts":[[2015,9,6]]},"end":{"date-parts":[[2015,9,9]]}},"container-title":["2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7389774\/7390768\/07391111.pdf?arnumber=7391111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:44:51Z","timestamp":1498265091000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7391111\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/vtcfall.2015.7391111","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}