{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T22:18:45Z","timestamp":1770070725220,"version":"3.49.0"},"reference-count":102,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T00:00:00Z","timestamp":1547424000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003443","name":"Ministry of Education and Science of the Russian Federation","doi-asserted-by":"publisher","award":["RFMEFI60417X0165"],"award-info":[{"award-number":["RFMEFI60417X0165"]}],"id":[{"id":"10.13039\/501100003443","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>During the last decade there has been an essential development of wireless communication technologies for intelligent transportation system (ITS) applications for motor transport; these advanced infocommunication technologies are called vehicular ad hoc networks (VANET). VANET\/ITS, in particular, inform and warn drivers about possible obstacles, and also the possibility of how to organize coordinated actions. Therefore, any violation of its functioning by cyber attacks automatically influences the safety of people and automotive engineering on the road. The purpose of this article is to provide an analytical overview of cyber attacks on VANET\/ITS, presented in state-of-the-art publications on this topic by the prediction of its cyber resistance. We start with an analysis of the top 10 cyber threats, considered according to the following schemes: attack mechanism, vulnerability, damage, object of attack, and a counter measure. We then set out a synergistic approach for assessing the cyber resistance of the forward-looking VANET\/ITS conceptual model, formed by the merger of the internet of vehicles and software-defined networking technology. Finally, we identify open issues and associated research opportunities, the main ones being the formalization of threats, vulnerability stratification, the choice of the level of network management centralization and, last but not least, the modeling and prediction of VANET\/ITS cyber resistance.<\/jats:p>","DOI":"10.3390\/info10010027","type":"journal-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T12:20:07Z","timestamp":1547468407000},"page":"27","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Forecasting Issues of Wireless Communication Networks\u2019 Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks"],"prefix":"10.3390","volume":"10","author":[{"given":"Mikhail","family":"Buinevich","sequence":"first","affiliation":[{"name":"R&amp;D Department, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, Prospekt Bolshevikov 22-1, Saint Petersburg 193232, Russia"},{"name":"Department of Applied Mathematics and IT, Saint-Petersburg University of State Fire Service of Emercom of Russia, Moskovskiy prospekt 149, Saint Petersburg 196105, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8852-5607","authenticated-orcid":false,"given":"Andrei","family":"Vladyko","sequence":"additional","affiliation":[{"name":"R&amp;D Department, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, Prospekt Bolshevikov 22-1, Saint Petersburg 193232, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2019,1,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Lu, M. (2016). Evaluation of Intelligent Road Transport Systems: Methods and Results, IET.","DOI":"10.1049\/PBTR007E"},{"key":"ref_2","first-page":"322","article-title":"Sustaining Low-Carbon Emission Development: An Energy Efficient Transportation Plan for CPEC","volume":"14","author":"Zubedi","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.4236\/jcc.2016.416004","article-title":"A Systematic Approach for Cyber Security in Vehicular Networks","volume":"4","author":"Ahmad","year":"2016","journal-title":"J. Comput. Commun."},{"key":"ref_4","unstructured":"Wevers, K., and Lu, M. (2017). V2X Communication for ITS\u2014From IEEE 802.11p Towards 5G. IEEE 5G Tech. Focus, 1, Available online: https:\/\/5g.ieee.org\/tech-focus\/march-2017\/v2x-communication-for-its."},{"key":"ref_5","unstructured":"(2017). Federal Motor Vehicle Safety Standards; V2V Communications. Docket No. NHTSA-2016-0126. Proposed Rule. Federal Regist., 82, 3854\u20134019. Available online: https:\/\/www.gpo.gov\/fdsys\/pkg\/FR-2017-01-12\/pdf\/2016-31059.pdf."},{"key":"ref_6","unstructured":"Filippi, A., Moerman, K., Martinez, V., Turley, A., Haran, O., and Toledano, R. (2017). IEEE802.11p Ahead of LTE-V2V for Safety Applications, Autotalks. Available online: https:\/\/www.auto-talks.com\/wp-content\/uploads\/2017\/09\/Whitepaper-LTE-V2V-USletter-05.pdf."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/s00502-015-0343-0","article-title":"Standards for Vehicular Communication\u2014From IEEE 802.11p to 5G","volume":"132","author":"Festag","year":"2015","journal-title":"Elektrotech. Inftech."},{"key":"ref_8","first-page":"7","article-title":"VANet Security Challenges and Solutions: A Survey","volume":"7","author":"Hasrouny","year":"2017","journal-title":"Veh. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1109\/SURV.2011.061411.00019","article-title":"Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions","volume":"13","author":"Karagiannis","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","first-page":"95","article-title":"Security Challenges, Issues and Their Solutions for VANET","volume":"5","author":"Raw","year":"2013","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"He, L., and Zhu, W.T. (2012, January 25\u201327). Mitigating DoS Attacks Against Signature-Based Authentication in VANETs. Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China.","DOI":"10.1109\/CSAE.2012.6272951"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Raya, M., and Hubaux, J.P. (2005, January 7\u201310). The Security of Vehicular Ad Hoc Networks. Proceedings of the 3rd ACM workshop on Security of Ad Hoc and Sensor Networks (SASN\u201905), Alexandria, VA, USA.","DOI":"10.1145\/1102219.1102223"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-981-10-3503-6_6","article-title":"Security Risk Analysis of a Trust model for Secure Group Leader-based communication in VANET","volume":"548","author":"Hasrouny","year":"2017","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/JSYST.2012.2231792","article-title":"TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks","volume":"8","author":"Chuang","year":"2014","journal-title":"IEEE Syst. J."},{"key":"ref_15","unstructured":"Macaulay, T. (2013). The 7 Deadly Threats to 4G, McAfee."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/SURV.2009.090404","article-title":"A Survey on Jamming Attacks and Countermeasures in WSNs","volume":"11","author":"Mpitziopoulos","year":"2009","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MWC.2010.5601953","article-title":"Security and Privacy in Emerging Wireless Networks","volume":"17","author":"Ma","year":"2010","journal-title":"IEEE Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Samara, G., Al-Salihy, W.A.H., and Sures, R. (2010, January 22\u201323). Security Analysis of Vehicular Ad Hoc Networks (VANET). Proceedings of the Second International Conference on Network Applications Protocols and Services (NETAPPS), Kedah, Malaysia.","DOI":"10.1109\/NETAPPS.2010.17"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Whyte, W., Weimerskirch, A., Kumar, V., and Hehn, T. (2013, January 16\u201318). A Security credential management system for V2V communications. Proceedings of the IEEE Vehicular Networking Conference (VNC), Boston, MA, USA.","DOI":"10.1109\/VNC.2013.6737583"},{"key":"ref_20","unstructured":"Intelligent Transport Systems (ITS), and Security (2010). Threat, Vulnerability and Risk Analysis (TVRA), ETSI. ETSI TR 102 893 V1.1.1 (2010-03)."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Guo, J., Baugh, J.P., and Wang, S. (2007, January 11). A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework. Proceedings of the 2007 Mobile Networking for Vehicular Environments, Anchorage, AK, USA.","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Salem, F.M., Ibrahim, M.H., and Ibrahim, I.I. (2010, January 7\u201313). Non-Interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks. Proceedings of the 2010 Sixth International Conference on Networking and Services, Cancun, Mexico.","DOI":"10.1109\/ICNS.2010.28"},{"key":"ref_23","unstructured":"Intelligent Transport Systems (ITS), and Security (2012). Trust and Privacy Management, ETSI. ETSI TS 102 941 V1.1.1 (2012-06)."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","article-title":"VANET Security Surveys","volume":"44","author":"Engoulou","year":"2014","journal-title":"Comput. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Calandriello, G., Papadimitratos, P., Hubaux, J.P., and Lioy, A. (2007, January 10). Efficient and Robust Pseudonymous Authentication in VANET. Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET \u201907), Montreal, QC, Canada.","DOI":"10.1145\/1287748.1287752"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","article-title":"Securing Vehicular Communications","volume":"13","author":"Raya","year":"2006","journal-title":"IEEE Wirel. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Xiao, B., Yu, B., and Gao, C. (2006, January 26). Detection and Localization of Sybil Nodes in VANETs. Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS \u201906), Los Angeles, CA, USA.","DOI":"10.1145\/1160972.1160974"},{"key":"ref_28","unstructured":"Ohigashi, T., and Morii, M. (2009, January 6\u20137). A practical message falsification attack on WPA. Proceedings of the Fourth Joint Workshop on Information Security (JWIS 2009), Kaohsiung, Taiwan."},{"key":"ref_29","unstructured":"Christof, P., Pelzl, J., and Preneel, B. (2010). Understanding Cryptography: A Textbook for Students and Practitioners, Springer."},{"key":"ref_30","first-page":"301","article-title":"VANET: Security Attacks and Its Possible Solutions","volume":"3","author":"Rawat","year":"2012","journal-title":"J. Inf. Oper. Manag."},{"key":"ref_31","first-page":"1","article-title":"Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey","volume":"4","author":"Vinh","year":"2014","journal-title":"Int. J. Ad Hoc Netw. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1016\/j.procs.2015.03.112","article-title":"Trust Based Approaches for Secure Routing in VANET: A Survey","volume":"45","author":"Patel","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_33","unstructured":"Van der Heijden, R. (2010, January 21). Security Architectures in V2V and V2I Communication. Proceedings of the 13th Twente Student Conference on IT, Enschede, The Netherlands."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M.S. (2012, January 12\u201314). Survey on Security Attacks in Vehicular Ad Hoc Networks (VANETs). Proceedings of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS), Gold Coast, QLD, Australia.","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Rao, A., Sangwan, A., Kherani, A.A., Varghese, A., Bellur, B., and Shorey, R. (2007, January 11). Secure V2V Communication with Certificate Revocations. Proceedings of the Mobile Networking for Vehicular Environments, Anchorage, AK, USA.","DOI":"10.1109\/MOVE.2007.4300817"},{"key":"ref_36","unstructured":"Singelee, D., and Preneel, B. (2005, January 7\u201310). Location verification using secure distance bounding protocols. Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, USA."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/JSAC.2011.110308","article-title":"P2DAP\u2014Sybil Attacks Detection in Vehicular Ad Hoc Networks","volume":"29","author":"Zhou","year":"2011","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2883","DOI":"10.1016\/j.comcom.2008.01.009","article-title":"Use of Infrastructure in VANETs","volume":"31","author":"Yan","year":"2008","journal-title":"Comput. Commun."},{"key":"ref_39","first-page":"31","article-title":"A Survey on Sybil Attack in Vehicular Ad-hoc Network","volume":"98","author":"Kushwaha","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.csi.2008.03.007","article-title":"A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks","volume":"30","author":"Federrath","year":"2008","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Abuelela, M., Olariu, S., and Ibrahim, K. (2009, January 26\u201329). A Secure and Privacy Aware Data Dissemination for the Notification of Traffic Incidents. Proceedings of the VTC Spring 2009\u2014IEEE 69th Vehicular Technology Conference, Barcelona, Spain.","DOI":"10.1109\/VETECS.2009.5073340"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Raya, M., Aziz, A., and Hubaux, J.P. (2006, January 24\u201329). Efficient Secure Aggregation in VANETs. Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks (VANET \u201906), Los Angeles, CA, USA.","DOI":"10.1145\/1161064.1161076"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.procs.2015.06.024","article-title":"Traffic Analysis of Vehicular Ad-Hoc Networks of V2I Communication","volume":"54","author":"Mousumi","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/990680.990707","article-title":"Security in wireless sensor networks","volume":"47","author":"Perrig","year":"2004","journal-title":"Commun. ACM"},{"key":"ref_45","first-page":"45","article-title":"Security Attacks with an Effective Solution for Dos Attacks in VANET","volume":"66","author":"Malla","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Song, L., Han, Q., and Liu, J. (2011, January 9\u201311). Investigate Key Management and Authentication Models in VANETs. Proceedings of the 2011 International Conference on Electronics, Communications and Control (ICECC), Ningbo, China.","DOI":"10.1109\/ICECC.2011.6067807"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"e3312","DOI":"10.1002\/dac.3312","article-title":"Search me if you can: Multiple mix zones with location privacy protection for mapping services","volume":"30","author":"Memon","year":"2017","journal-title":"Int. J. Commun. Syst."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"24359","DOI":"10.1007\/s11042-016-4154-z","article-title":"DPMM: Dynamic Pseudonym-based Multiple Mix-zones Generation for Mobile Traveler","volume":"76","author":"Memon","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/s11277-016-3900-x","article-title":"Clustering Based Energy Efficient and Communication Protocol for Multiple Mix-zones over Road Networks","volume":"95","author":"Arain","year":"2018","journal-title":"Wirel. Pers. Commun."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/s11280-016-0403-3","article-title":"Dynamic Path Privacy Protection Framework for Continuous Query Service over Road Networks","volume":"20","author":"Memon","year":"2017","journal-title":"World Wide Web"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1007\/s11277-015-2833-0","article-title":"A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks","volume":"85","author":"Memon","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Domenic, M.K., Wang, Y., Zhang, F., Memon, I., and Gustav, Y.H. (2013, January 23\u201324). Preserving Users\u2019 Privacy for Continuous Query Services in Road Networks. Proceedings of the 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering, Xi\u2019an, China.","DOI":"10.1109\/ICIII.2013.6702947"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Gustav, Y.H., Wang, Y., Domenic, M.K., Zhang, F., and Memon, I. (2013, January 26\u201328). Velocity Similarity Anonymization for Continuous Query Location Based Services. Proceedings of the 2013 International Conference on Computational Problem-Solving (ICCP), Jiuzhai, China.","DOI":"10.1109\/ICCPS.2013.6893578"},{"key":"ref_54","first-page":"164","article-title":"A Survey on Securing User Authentication Vehicular Ad Hoc Networks","volume":"1","author":"Dahiya","year":"2001","journal-title":"Int. J. Inf. Secur."},{"key":"ref_55","first-page":"431","article-title":"Survey of Various Security Techniques in VANET","volume":"4","author":"Raiya","year":"2014","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Wang, X. (2011). Security Issues in Vehicular Ad Hoc Networks. Book Mobile Ad-Hoc Networks: Applications, IntechOpen.","DOI":"10.5772\/882"},{"key":"ref_57","first-page":"152","article-title":"Vehicular Network: Properties, Structure, Challenges, Attacks, Solution for Improving Scalability and Security","volume":"4","author":"Jayalakshmi","year":"2013","journal-title":"Int. J. Sci. Eng. Res."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MITP.2004.1265539","article-title":"The Threat of Intelligent Collisions","volume":"6","author":"Blum","year":"2004","journal-title":"IT Prof."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., and Zamboni, D. (1997, January 4\u20137). Analysis of a denial of service attack on TCP. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/TNET.2006.880180","article-title":"Low-rate TCP-targeted denial of service attacks and counter strategies","volume":"14","author":"Kuzmanovic","year":"2006","journal-title":"IEEE ACM Trans. Netw."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/LSP.2011.2178067","article-title":"Outage probability based power distribution between data and artificial noise for physical layer security","volume":"19","author":"Ghogho","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_62","first-page":"35","article-title":"A Robust Conditional Privacy-Preserving Authentication Protocol in VANET","volume":"Volume 17","author":"Schmidt","year":"2009","journal-title":"Book Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009"},{"key":"ref_63","unstructured":"Zhou, W., Marshall, A., and Gu, Q. (2006, January 3\u20136). A Novel Classification Scheme for 802.11 WLAN Active Attacking Traffic Patterns. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006), Las Vegas, NV, USA."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"3532","DOI":"10.1109\/TSP.2012.2191543","article-title":"Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks","volume":"60","author":"Wang","year":"2012","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","article-title":"Vehicular Ad Hoc Networks (VANETs): Status, Results, and Challenges","volume":"50","author":"Zeadally","year":"2012","journal-title":"Telecommun. Syst."},{"key":"ref_66","unstructured":"(2017). CA-1995.01: IP spoofing Attacks and Hijacked Terminal Connections. Book 1995 CERT Advisories, Carnegie Mellon University. Available online: https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/1995_019_001_496168.pdf."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/MSP.2004.54","article-title":"Quantum cryptography","volume":"2","author":"Elliott","year":"2004","journal-title":"IEEE Secur. Priv."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","article-title":"Defending against flooding-based distributed denial-of-service attacks: A tutorial","volume":"40","author":"Chang","year":"2002","journal-title":"IEEE Commun. Mag."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Aslam, B., and Zou, C.C. (2009, January 18\u201321). Distributed certificate and application architecture for VANETs. Proceedings of the MILCOM 2009\u20142009 IEEE Military Communications Conference, Boston, MA, USA.","DOI":"10.1109\/MILCOM.2009.5379867"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"He, X., Khisti, A., and Yener, A. (2011, January 5\u20139). MIMO broadcast channel with arbitrarily varying eavesdropper channel: Secrecy degrees of freedom. Proceedings of the 2011 IEEE Global Telecommunications Conference\u2014GLOBECOM 2011, Kathmandu, Nepal.","DOI":"10.1109\/Allerton.2011.6120301"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Wei, Y., Zengy, K., and Mohapatra, P. (2011, January 10\u201315). Adaptive Wireless channel probing for shared key generation. Proceedings of the IEEE INFOCOM, Shanghai, China.","DOI":"10.1109\/INFCOM.2011.5935028"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Araujo, A., Blesa, J., Romero, E., and Nieto-Taladriz, O. (2012, January 27\u201331). Artificial noise scheme to ensure secure communications in CWSN. Proceedings of the 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol, Cyprus.","DOI":"10.1109\/IWCMC.2012.6314346"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Park, J., and Kasera, S. (2007, January 11\u201315). Securing Ad Hoc wireless networks against data injection attacks using firewalls. Proceedings of the IEEE Wireless Communications and Networking Conference, Kowloon, China.","DOI":"10.1109\/WCNC.2007.527"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Stolyarova, E.S., Shiryaev, D.M., Vladyko, A.G., and Buinevich, M.V. (February, January 29). VANET\/ITS Cybersecurity Threats: Analysis, Categorization and Forecasting. Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, Russia.","DOI":"10.1109\/EIConRus.2018.8317048"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Sumra, I.A., Ahmad, I., Hasbullah, H., and Manan, J. (2011, January 24\u201326). Classes of attacks in VANET. Proceedings of the 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia.","DOI":"10.1109\/SIECPC.2011.5876939"},{"key":"ref_76","first-page":"2995","article-title":"Classification of Attacks in Vehicular Ad hoc Network (VANET)","volume":"16","author":"Sumra","year":"2013","journal-title":"Inf. Int. Interdiscip. J."},{"key":"ref_77","first-page":"831","article-title":"Analysis of Attacks and Challenges in VANET","volume":"4","author":"Nema","year":"2014","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Mostovich, D., Fabrikantov, P., Vladyko, A., and Buinevich, M. (February, January 29). High-Level Vulnerabilities of Software-Defined Networking in the Context of Telecommunication Network Evolution. Proceedings of the 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg, Russia.","DOI":"10.1109\/EIConRus.2017.7910524"},{"key":"ref_79","unstructured":"Chiasson, G., Hays, D., Nalinakshan, H., and Ranganna, S. (2015). Are Wi-Fi and 4G LTE on a collision course. PwC Commun. Rev., Available online: https:\/\/www.pwc.com\/id\/en\/publications\/assets\/ticepublications\/pwc-communications-review-wi-fi-4g-lte_final.pdf."},{"key":"ref_80","unstructured":"Khan, S., and Pathan, A.K. (2013). A Comparative Study on Security implementation in EPS\/LTE and WLAN\/802.11. Book Wireless Networks and Security, Springer."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-319-61382-6_10","article-title":"Interaction of the IoT Traffic Generated by a Smart City Segment with SDN Core Network","volume":"10372","author":"Volkov","year":"2017","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Di Maio, A., Palattella, M.R., Soua, R., Lamorte, L., Vilajosana, X., Alonso-Zarate, J., and Engel, T. (2016). Enabling SDN in VANETs: What is the Impact on Security?. Sensors, 16.","DOI":"10.3390\/s16122077"},{"key":"ref_83","unstructured":"(2018, August 31). The OWASP Foundation. Available online: https:\/\/www.owasp.org."},{"key":"ref_84","unstructured":"Shila, D.M., Cao, X., Cheng, Y., Yang, Z., Zhou, Y., and Chen, J. (2014). Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee. arXiv."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Kirichek, R., Kulik, V., and Koucheryavy, A. (February, January 31). False Clouds for Internet of Things and Methods of Protection. Proceedings of the 2016 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, South Korea.","DOI":"10.1109\/ICACT.2016.7423328"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Buinevich, M., Izrailov, K., and Vladyko, A. (February, January 31). The Life Cycle of Vulnerabilities in the Representations of Software for Telecommunication Devices. Proceedings of the 2016 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea.","DOI":"10.1109\/ICACT.2016.7423419"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","article-title":"Security in Software Defined Networks: A Survey","volume":"17","author":"Ahmad","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/COMST.2015.2453114","article-title":"A Survey of Security in Software Defined Networks","volume":"18","author":"Natarajan","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s40860-015-0008-0","article-title":"Modelling Cyber Security for Software-Defined Networks Those Grow Strong when Exposed to Threats","volume":"1","author":"Ahmed","year":"2015","journal-title":"J. Reliab. Intell. Environ."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1002\/sec.1243","article-title":"A Security and Trust Framework for Virtualized Networks and Software-Defined Networking","volume":"9","author":"Yan","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Dotcenko, S., Vladyko, A., and Letenko, I. (2014, January 16\u201319). A Fuzzy Logic-Based Information Security Management for Software-Defined Networks. Proceedings of the 16th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea.","DOI":"10.1109\/ICACT.2014.6778942"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","article-title":"Internet of Things\u2014New Security and Privacy Challenges","volume":"26","author":"Weber","year":"2010","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., and Liu, J. (2012, January 23\u201325). Security in the Internet of Things: A Review. Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, China.","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MC.2011.291","article-title":"Securing the Internet of Things","volume":"44","author":"Roman","year":"2011","journal-title":"Computer"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MNET.2011.5772059","article-title":"Multimedia Traffic Security Architecture for the Internet of Things","volume":"25","author":"Zhou","year":"2011","journal-title":"IEEE Netw."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","article-title":"A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications","volume":"4","author":"Lin","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/0377-2217(90)90057-I","article-title":"How to make a decision: The analytic hierarchy process","volume":"48","author":"Saaty","year":"1990","journal-title":"Eur. J. Oper. Res."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/S0377-2217(02)00227-8","article-title":"Decision-making with the AHP: Why is the principal eigenvector necessary","volume":"145","author":"Saaty","year":"2003","journal-title":"Eur. J. Oper. Res."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Buinevich, M., Fabrikantov, P., Stolyarova, E., Izrailov, K., and Vladyko, A. (2017, January 20\u201322). Software Defined Internet of Things: Cyber Antifragility and Vulnerability Forecast. Proceedings of the 2017 IEEE 11th International Conference on Application of Information and Communication Technologies (AICT), Moscow, Russia.","DOI":"10.1109\/ICAICT.2017.8687021"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Kazmi, A., Khan, M.A., and Akram, M.U. (2016, January 4\u20138). DeVANET: Decentralized Software-Defined VANET Architecture. Proceedings of the IEEE International Conference on Cloud Engineering Workshop (IC2EW), Berlin, Germany.","DOI":"10.1109\/IC2EW.2016.12"},{"key":"ref_101","unstructured":"European Commission (2016). European Strategy on Cooperative Intelligent Transport Systems, a Milestone Initiative Towards Cooperative, Connected and Automated Mobility, European Commission. Named Data Networking\u2019s Intrinsic Cyber-Resilience for Vehicular CPS."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"60570","DOI":"10.1109\/ACCESS.2018.2875890","article-title":"Named Data Networking\u2019s Intrinsic Cyber-Resilience for Vehicular CPS","volume":"6","author":"Bouk","year":"2018","journal-title":"IEEE Access"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/1\/27\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:25:46Z","timestamp":1760185546000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/1\/27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,14]]},"references-count":102,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,1]]}},"alternative-id":["info10010027"],"URL":"https:\/\/doi.org\/10.3390\/info10010027","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,14]]}}}