{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:42Z","timestamp":1750220862531,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1145\/3365921.3365926","type":"proceedings-article","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T09:35:56Z","timestamp":1582364156000},"page":"127-135","source":"Crossref","is-referenced-by-count":3,"title":["Security solution methods in the Vehicular Ad-Hoc Networks"],"prefix":"10.1145","author":[{"given":"Krzysztof","family":"St\u0119pie\u0144","sequence":"first","affiliation":[{"name":"Institute of Information Technology, Lodz University of Technology, Lodz, Poland"}]},{"given":"Aneta","family":"Poniszewska-Mara\u0144da","sequence":"additional","affiliation":[{"name":"Institute of Information Technology, Lodz University of Technology, Lodz, Poland"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Car network structure https:\/\/www.globalcarsbrands.com\/top-10-newest-car-technologies-that-have-revolutionized-the-auto-industry\/. Last accessed 14.04.2018  Car network structure https:\/\/www.globalcarsbrands.com\/top-10-newest-car-technologies-that-have-revolutionized-the-auto-industry\/. Last accessed 14.04.2018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"M. Al-Qutayri Ch. Yeun F. Al-Hawi Security and Privacy of Intelligent VANETs. Computational Intelligence and Modern Heuristics (2010)  M. Al-Qutayri Ch. Yeun F. Al-Hawi Security and Privacy of Intelligent VANETs. Computational Intelligence and Modern Heuristics (2010)","DOI":"10.5772\/7815"},{"key":"e_1_3_2_1_3_1","unstructured":"Ad-hoc networks structure https:\/\/www.researchgate.net\/figure\/VANET-Structure.fig1263545192. Last accessed 14.04.2018  Ad-hoc networks structure https:\/\/www.researchgate.net\/figure\/VANET-Structure.fig1263545192. Last accessed 14.04.2018"},{"key":"e_1_3_2_1_4_1","unstructured":"Vehicle weakest points http:\/\/www.intel.com\/content\/www\/us\/en\/automotive\/automotive-security-best-practices-white-paper.html. Last accessed 14.04.2018  Vehicle weakest points http:\/\/www.intel.com\/content\/www\/us\/en\/automotive\/automotive-security-best-practices-white-paper.html. Last accessed 14.04.2018"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Proceedings of 6th International Conference on Signal Processing and Communication Systems (ICSPCS)","author":"Al-Kahtani A.","year":"2012"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Proceedings of Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","author":"Sumra I.A.","year":"2013"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"Security and Privacy Issues for Inter-vehicle Communications in VANETs. Proceedings of Sensor, Mesh and Ad Hoc Communications and Networks Workshops, IEEE","author":"Chim T.","year":"2009"},{"key":"e_1_3_2_1_8_1","unstructured":"C.T. Wing Secure and Privacy-preserving Protocols for VANETs PhD thesis Hong Kong (2011)  C.T. Wing Secure and Privacy-preserving Protocols for VANETs PhD thesis Hong Kong (2011)"},{"key":"e_1_3_2_1_9_1","unstructured":"L. Zhang Research on Security and Privacy in Vehicular Ad Hoc Networks PhD thesis Universitat Rovira i Virgili (2010)  L. Zhang Research on Security and Privacy in Vehicular Ad Hoc Networks PhD thesis Universitat Rovira i Virgili (2010)"},{"key":"e_1_3_2_1_10_1","first-page":"339","volume-title":"WimoA","author":"Raw R.S.","year":"2013"},{"key":"e_1_3_2_1_11_1","first-page":"55","volume-title":"Proc. of 2nd International Conference on Network Applications, Protocols and Services, National Advanced IPv6 Center","author":"Samara G.","year":"2010"},{"key":"e_1_3_2_1_12_1","volume":"3","author":"Parmar U.","year":"2015","journal-title":"International Journal of Engineering Research and General Science"},{"volume-title":"International Journal of Advanced Research in Computer Science","author":"Kaur N.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"W. Ahmed M. Elhadef Securing Intelligent Vehicular Ad Hoc Networks: A Survey. Advances in Computer Science and Ubiquitous Computing CSA-CUTE 17 (2017)  W. Ahmed M. Elhadef Securing Intelligent Vehicular Ad Hoc Networks: A Survey. Advances in Computer Science and Ubiquitous Computing CSA-CUTE 17 (2017)","DOI":"10.1007\/978-981-10-7605-3_2"},{"issue":"1","key":"e_1_3_2_1_15_1","first-page":"16","volume":"1","author":"Bhatti F.N.","year":"2015","journal-title":"Journal of Advanced Research in Computing and Applications"},{"volume-title":"Timing Attack in Vehicular Network. Proceedings of 15th World Scientific and Engineering Academy and Society (WSEAS)At: Corfu Island, Greece (2011)","author":"Sumra I.A.","key":"e_1_3_2_1_16_1"},{"volume-title":"Classification of Security Attacks in VANET: A Review of Requirements and Perspectives. MATEC Web of Conferences (2017)","author":"Junaid M.A.H.","key":"e_1_3_2_1_17_1"},{"volume-title":"Proceedings of IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC)","year":"2017","author":"Mohamed M.S.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","first-page":"233","article-title":"Poniszewska-Maranda, Towards the security measures of the Vehicular Ad-Hoc Networks, Internet of Vehicles. Technologies and Services Towards Smart City (IOV 2018)","volume":"11253","author":"Stepien K.","journal-title":"LNCS"},{"key":"e_1_3_2_1_20_1","unstructured":"I.A. Sumra J.A. Manan H. Hasbullah Timing Attack in Vehicular Network. Recent Researches in Computer Science pp. 151--155 (2011)  I.A. Sumra J.A. Manan H. Hasbullah Timing Attack in Vehicular Network. Recent Researches in Computer Science pp. 151--155 (2011)"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"M.S. Mohamed S. Hussein A. Krings An enhanced voting algorithm for hybrid jamming attacks in VANET. IEEE (2017)  M.S. Mohamed S. Hussein A. Krings An enhanced voting algorithm for hybrid jamming attacks in VANET. IEEE (2017)","DOI":"10.1109\/CCWC.2017.7868347"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2577035"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2015.07.011"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4539481"},{"key":"e_1_3_2_1_25_1","unstructured":"A. Agrawal A. Garg N. Chaudhiri S. Gupta D. Pandey T.Roy Security on Vehicular Ad Hoc Networks (VANET): A Review Paper vol. 3 no. 1 (2013)  A. Agrawal A. Garg N. Chaudhiri S. Gupta D. Pandey T.Roy Security on Vehicular Ad Hoc Networks (VANET): A Review Paper vol. 3 no. 1 (2013)"},{"key":"e_1_3_2_1_26_1","unstructured":"M. Bharat K.S. Sree T.M. Kumar Authentication Solution for Security Attacks in VANETs vol. 3 no. 8 pp. 7661\u00e2\u0102\u015e-7664 (2014)  M. Bharat K.S. Sree T.M. Kumar Authentication Solution for Security Attacks in VANETs vol. 3 no. 8 pp. 7661\u00e2\u0102\u015e-7664 (2014)"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"T. Karimireddy A. Bakshi A hybrid security framework for the vehicular communications in VANET. IEEE WiSPNET (2016)  T. Karimireddy A. Bakshi A hybrid security framework for the vehicular communications in VANET. IEEE WiSPNET (2016)","DOI":"10.1109\/WiSPNET.2016.7566479"},{"key":"e_1_3_2_1_28_1","first-page":"28","volume-title":"Security Issues and Simulation Tools. IOSR Journal of Computer Engineering (IOSRJCE)","volume":"3","author":"Gadkari M.Y.","year":"2012"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2670024"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2565001"}],"event":{"name":"MoMM2019: The 17th International Conference on Advances in Mobile Computing & Multimedia","sponsor":["Johannes Kepler University, Linz, Austria","@WAS International Organization of Information Integration and Web-based Applications and Services"],"location":"Munich Germany","acronym":"MoMM2019"},"container-title":["Proceedings of the 17th International Conference on Advances in Mobile Computing &amp; Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365921.3365926","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365921.3365926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:37Z","timestamp":1750202617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365921.3365926"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":30,"alternative-id":["10.1145\/3365921.3365926","10.1145\/3365921"],"URL":"https:\/\/doi.org\/10.1145\/3365921.3365926","relation":{},"subject":[],"published":{"date-parts":[[2019,12,2]]}}}