{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:28:08Z","timestamp":1774801688444,"version":"3.50.1"},"reference-count":164,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","funder":[{"DOI":"10.13039\/501100003593","name":"Brazilian National Council for Research and Development","doi-asserted-by":"publisher","award":["304315\/2017-6,430274\/2018-1"],"award-info":[{"award-number":["304315\/2017-6,430274\/2018-1"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/CAA J. Autom. Sinica"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1109\/jas.2021.1003862","type":"journal-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T21:33:48Z","timestamp":1612388028000},"page":"491-511","source":"Crossref","is-referenced-by-count":84,"title":["Computing Paradigms in Emerging Vehicular Environments: A Review"],"prefix":"10.1109","volume":"8","author":[{"given":"Lion","family":"Silva","sequence":"first","affiliation":[]},{"given":"Naercio","family":"Magaia","sequence":"additional","affiliation":[]},{"given":"Breno","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Kobusinska","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Casimiro","sequence":"additional","affiliation":[]},{"given":"Constandinos X.","family":"Mavromoustakis","sequence":"additional","affiliation":[]},{"given":"George","family":"Mastorakis","sequence":"additional","affiliation":[]},{"given":"Victor Hugo C.","family":"de Albuquerque","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496100"},{"key":"ref38","first-page":"7","article-title":"The NIST-national institute of standars and technology - definition of cloud computing","author":"mell","year":"2011","journal-title":"NIST Spec Publ 800-145"},{"key":"ref33","article-title":"Injury facts: The source for injury stats","year":"2018","journal-title":"Injury facts"},{"key":"ref32","year":"2019","journal-title":"The Mobile Economy 2020"},{"key":"ref31","first-page":"6","year":"2019","journal-title":"Connected society the state of mobile internet connectivity 2019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.08.001"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946468"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2929740"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2868076"},{"key":"ref34","first-page":"53","year":"2018","journal-title":"Annual accident report 2018 European Road Safety Observatory"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2603219"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690902"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2886572"},{"key":"ref20","year":"2009","journal-title":"Intelligent transport systems (ITS) Vehicular communications Basic set of applications Definitions"},{"key":"ref22","first-page":"1","article-title":"Introduction to vehicular networks","author":"moustafa","year":"2013","journal-title":"Springer Briefs in Computer Science"},{"key":"ref21","first-page":"210","article-title":"Intelligent transport systems","author":"mand\u017euka","year":"2010","journal-title":"A Dict Transp Anal"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"44","DOI":"10.20943\/01201602.4455","article-title":"Vehicular Ad-Hoc networks: Introduction, standards, routing protocols and challenges","volume":"13","author":"jindal","year":"2016","journal-title":"International Journal of Computer Science Issue"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.101912.00184"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1201\/9780203488652"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s19163589"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2870113"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/fi11020027"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/qre.1927"},{"key":"ref51","first-page":"235","article-title":"Relational cloud: A database-as-a-service for the cloud","author":"curino","year":"2011","journal-title":"Proc 5th Biennial Conf Innovative Data Systems Research"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569698"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2874509"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07549-y"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2019.8667147"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.3390\/s19040965"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00016"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-019-00871-0"},{"key":"ref146","first-page":"634","article-title":"Privacy-preserving cloud establishment and data dissemination scheme for vehicular cloud","volume":"17","author":"zhang","year":"2020","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2910217"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2985050"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2480244"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2019.10.012"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1080\/02763893.2013.858092"},{"key":"ref57","year":"2017","journal-title":"OpenFog Reference Architecture for Fog Computing"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2574766"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2503325"},{"key":"ref53","first-page":"206","article-title":"Function-as-a-service X Platform-as-a-service: Towards a comparative study on FaaS and PaaS","author":"albuquerque","year":"0","journal-title":"Proc 12th Int Conf Softw Eng Adv Funct"},{"key":"ref52","first-page":"1","article-title":"NaaS: Network-as-a-service in the cloud","author":"costa","year":"2012","journal-title":"Proc 2nd Usenix Conf Hot Topics in Management of Internet Cloud and Enterprise Networks and Services"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.187"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.3390\/s20143928"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975207"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2861430"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422447"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2012.27"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14209\/jcis.2016.14"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700322"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2008.458"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600089WC"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769454"},{"key":"ref8","first-page":"1689","article-title":"Commission delegated regulation directive 2010\/40\/EU","volume":"53","author":"comission","year":"2019","journal-title":"J Chem Inf Model"},{"key":"ref49","author":"rittinghouse","year":"2010","journal-title":"Cloud Computing Implementation Management and Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00502-015-0343-0"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2019.05.002"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854567"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/fi11060122"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1855118.1855137"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13119-6_2"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.008"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.292"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2168"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSA.2018.8439638"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-014-9147-2"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.016"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917508"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1001\/jama.1964.03060360088018","article-title":"The challenge of the computer","volume":"188","author":"wiggins","year":"1964","journal-title":"JAMA"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05081-8_1"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-020-01624-1"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2773645"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref128","author":"routray","year":"2019","journal-title":"Why 6G? Motivation and expectations of next-generation cellular networks"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2019.1800050"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2016.11.009"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2956241"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2532863"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874398"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2014.6857112"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2497312"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6059343"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2957648"},{"key":"ref78","first-page":"14","article-title":"Moving from vehicular cloud computing to vehicular fog computing: Issues and challenges","volume":"9","author":"menon","year":"2017","journal-title":"Int J Comput Sci Eng"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510736"},{"key":"ref136","author":"jonas","year":"2019","journal-title":"Cloud programming simplified A berkeley view on serverless computing"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800371"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746516"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09489-9"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2990984"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866491"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100186"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63618-4_15"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00060"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900143"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.009"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736756"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2800281"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427481"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.4.36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2018.1800027"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2667499"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3003802"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719853984"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2804"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909004"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2491281"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002711"},{"key":"ref107","first-page":"288","article-title":"An analysis of the cloud computing security problem","volume":"47","author":"muller","year":"2014","journal-title":"Int Surg"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894944"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2954595"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.09.002"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900311"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC.2018.8703272"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.008"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1201\/b19290-22"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101937"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2893674"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.018"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864782"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2017.8264835"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/JPROC.2019.2951169","article-title":"SDNINFV-empowered future IoV with enhanced communication, computing, and caching","volume":"108","author":"zhuang","year":"0","journal-title":"Proc IEEE"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2882064"},{"key":"ref10","author":"slovick","year":"0","journal-title":"DSRC vs C-V2X Looking to Impress the Regulators"},{"key":"ref11","first-page":"375","article-title":"5G for V2X communications","author":"molinaro","year":"2019","journal-title":"The 5G Italy Book 2019 a Multiperspective View of 5G"},{"key":"ref12","author":"rebbeck","year":"2017","journal-title":"Socio-Economic Benefits of Cellular V2X Final Report for 5GAA"},{"key":"ref13","first-page":"25","article-title":"V2X functional and performance test report; test procedures and results","year":"2018","journal-title":"5GAA P-190033"},{"key":"ref14","author":"yoshida","year":"2019","journal-title":"The DSRC vs 5G debate continues"},{"key":"ref15","first-page":"8","year":"2018","journal-title":"V2X system cost analysis Dsrc+Lte and C-V2X+Lte"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100182"},{"key":"ref16","first-page":"49","article-title":"Intelligent transport systems","author":"hasegawa","year":"2015","journal-title":"Traffic and Safety Science &#x2013; Interdiciplinary Wisdom of IATSS"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2369742"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.04.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.7227\/TJTH.27.1.8"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet47604.2019.9064133"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2001.948835"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1108\/SR-08-2017-0168"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/WITS.2019.8723723"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9781118557495.ch6"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC48513.2020.9064975"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048527"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.008"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.ICIOT.2017.13"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2808242"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308189"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8040455"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2937079"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2014.10.1.103"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.006"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700341"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981397"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2016.7850097"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2771519"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44907-0_13"}],"container-title":["IEEE\/CAA Journal of Automatica Sinica"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570654\/9346068\/09346073.pdf?arnumber=9346073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T20:37:39Z","timestamp":1617050259000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9346073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":164,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jas.2021.1003862","relation":{},"ISSN":["2329-9266","2329-9274"],"issn-type":[{"value":"2329-9266","type":"print"},{"value":"2329-9274","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}