{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:38:29Z","timestamp":1773693509448,"version":"3.50.1"},"reference-count":33,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"project A-MoVeR-\u201cMobilizing agenda for the Development of Products &amp; Systems towards an Intelligent and Green Mobility\u201d","award":["02\/C05-i01.01\/2022.PC646908627-00000069"],"award-info":[{"award-number":["02\/C05-i01.01\/2022.PC646908627-00000069"]}]},{"name":"project A-MoVeR-\u201cMobilizing agenda for the Development of Products &amp; Systems towards an Intelligent and Green Mobility\u201d","award":["02\/C05-i01\/2022"],"award-info":[{"award-number":["02\/C05-i01\/2022"]}]},{"name":"Mobilizing Agendas for Business Innovation, financed by European funds provided to Portugal by the Recovery and Resilience Plan (RRP)","award":["02\/C05-i01.01\/2022.PC646908627-00000069"],"award-info":[{"award-number":["02\/C05-i01.01\/2022.PC646908627-00000069"]}]},{"name":"Mobilizing Agendas for Business Innovation, financed by European funds provided to Portugal by the Recovery and Resilience Plan (RRP)","award":["02\/C05-i01\/2022"],"award-info":[{"award-number":["02\/C05-i01\/2022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This research examined the domain of intelligent transportation systems (ITS) by analyzing the impact of scholarly work and thematic prevalence, as well as focusing attention on vehicles, their technologies, cybersecurity, and related scholarly technologies. This was performed by examining the scientific literature indexed in the Scopus database. This study analysed 2919 documents published between 2018 and 2025. The findings indicated that the highest and most significant journal was derived from IEEE Transactions on Vehicular Technology, with significant standing to the growth of communication and computing on vehicles with edge computing and AI optimization of vehicular systems. In addition, important PST research conferences highlighted the growing interest in academic research in cybersecurity for vehicle networks. Sensor networks, pose forensics, and privacy-preserving communication frameworks were some of the significant contributing fields marking the significance of the interdisciplinary nature of this research. Employing bibliometric analysis, the literature illustrated the multiple channels integrating knowledge creation and innovation in ITS through citation analysis. The outcome suggested an increasingly sophisticated research area, weighing technical progress and increasing concern about security and privacy measures. Further studies must investigate edge computing integrated with AI, advanced privacy-preserving linguistic protocols, and new vehicular network intrusion detection systems.<\/jats:p>","DOI":"10.3390\/fi17060268","type":"journal-article","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T08:43:58Z","timestamp":1750322638000},"page":"268","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Bibliometric Analysis and Visualization of In-Vehicle Communication Protocols"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4972-8456","authenticated-orcid":false,"given":"Iftikhar","family":"Hussain","sequence":"first","affiliation":[{"name":"Department of Engineering, School of Sciences and Technology, University of Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8872-5721","authenticated-orcid":false,"given":"Manuel J. C. S.","family":"Reis","sequence":"additional","affiliation":[{"name":"Engineering Department, Institute of Electronics and Informatics Engineering of Aveiro (IEETA), University of Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4632-9664","authenticated-orcid":false,"given":"Carlos","family":"Ser\u00f4dio","sequence":"additional","affiliation":[{"name":"Department of Engineering, School of Sciences and Technology, University of Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"},{"name":"Algoritmi Center, University of Minho, 4710-057 Braga, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8434-4887","authenticated-orcid":false,"given":"Frederico","family":"Branco","sequence":"additional","affiliation":[{"name":"Department of Engineering, School of Sciences and Technology, University of Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"},{"name":"INESC TEC-Institute for Systems and Computer Engineering, Technology and Science, Rua Dr. Roberto Frias, 4200-465 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,19]]},"reference":[{"key":"ref_1","unstructured":"Prerana, S., Reddy, N.N., Varghese, S.G., and Sabhahit, J.N. (2024, January 18\u201319). Review on Communication Technologies used in Electric Vehicles. Proceedings of the 2024 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), Mangalore, India."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3431233","article-title":"Cyberattacks and Countermeasures for In-Vehicle Networks","volume":"54","author":"Aliwa","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ma, B., Yang, S., Zuo, Z., Zou, B., Cao, Y., Yan, X., Zhou, S., and Li, J. (2022). An authentication and secure communication scheme for in-vehicle networks based on SOME\/IP. Sensors, 22.","DOI":"10.3390\/s22020647"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/TVT.2021.3050399","article-title":"An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs","volume":"70","author":"Ali","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Lo Bello, L., Patti, G., and Leonardi, L. (2023). A Perspective on Ethernet in Automotive Communications\u2014Current Status and Future Trends. Appl. Sci., 13.","DOI":"10.3390\/app13031278"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"19644","DOI":"10.1109\/TITS.2021.3088862","article-title":"Communication Quality Prediction for Internet of Vehicle (IoV) Networks: An Elman Approach","volume":"23","author":"Xu","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"15298","DOI":"10.1109\/TITS.2022.3140219","article-title":"On-Ramp Merging Strategies of Connected and Automated Vehicles Considering Communication Delay","volume":"23","author":"Fang","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/TITS.2020.3019101","article-title":"Investigating the Prospect of Leveraging Blockchain and Machine Learning to Secure Vehicular Networks: A Survey","volume":"23","author":"Dibaei","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_9","first-page":"100214","article-title":"Cybersecurity challenges in vehicular communications","volume":"23","author":"Sadatsharan","year":"2020","journal-title":"Veh. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Pranckut\u0117, R. (2021). Web of Science (WoS) and Scopus: The Titans of Bibliographic Information in Today\u2019s Academic World. Publications, 9.","DOI":"10.3390\/publications9010012"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1948","DOI":"10.1108\/JKM-06-2022-0443","article-title":"Knowledge management and performance: A bibliometric analysis based on Scopus and WOS data (1988\u20132021)","volume":"27","author":"Farooq","year":"2022","journal-title":"J. Knowl. Manag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"102137","DOI":"10.1016\/j.sysarc.2021.102137","article-title":"Time-Sensitive Networking in automotive embedded systems: State of the art and research opportunities","volume":"117","author":"Ashjaei","year":"2021","journal-title":"J. Syst. Archit."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Zanbouri, K., Noor-A-Rahim, M., John, J., Sreenan, C.J., Poor, H.V., and Pesch, D. (2024). A Comprehensive Survey of Wireless Time-Sensitive Networking (TSN): Architecture, Technologies, Applications, and Open Issues. IEEE Commun. Surv. Tutor., Available online: https:\/\/ieeexplore.ieee.org\/document\/10735349.","DOI":"10.1109\/COMST.2024.3486618"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kwon, J.-H., Kim, H.-J., and Lee, S. (2024). Optimizing Traffic Scheduling in Autonomous Vehicle Networks Using Machine Learning Techniques and Time-Sensitive Networking. Electronics, 13.","DOI":"10.3390\/electronics13142837"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Luo, F., Ren, Y., Yu, Y., Li, Y., and Wang, Z. (2024). A Centralized Discovery-Based Method for Integrating Data Distribution Service and Time-Sensitive Networking in In-Vehicle Networks. arXiv.","DOI":"10.1016\/j.adhoc.2025.103950"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Alanazi, F. (2023). Development of Smart Mobility Infrastructure in Saudi Arabia: A Benchmarking Approach. Sustainability, 15.","DOI":"10.3390\/su15043158"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.jbusres.2021.04.070","article-title":"How to conduct a bibliometric analysis: An overview and guidelines","volume":"133","author":"Donthu","year":"2021","journal-title":"J. Bus. Res."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"450","DOI":"10.3390\/vehicles6010020","article-title":"Enhancing Security in Vehicle-to-Vehicle Communication: A Comprehensive Review of Protocols and Techniques","volume":"6","author":"Muslam","year":"2024","journal-title":"Vehicles"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"11158","DOI":"10.1109\/TVT.2019.2935450","article-title":"Deep Reinforcement Learning for Offloading and Resource Allocation in Vehicle Edge Computing and Networks","volume":"68","author":"Liu","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2524491","DOI":"10.1155\/2022\/2524491","article-title":"Analyzing Interdisciplinary Research Using Co-Authorship Networks","volume":"2022","author":"Ullah","year":"2022","journal-title":"Complexity"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1080\/07350015.2021.1978469","article-title":"Co-citation and Co-authorship Networks of Statisticians","volume":"40","author":"Ji","year":"2022","journal-title":"J. Bus. Econ. Stat."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2621","DOI":"10.1007\/s11192-022-04338-1","article-title":"Interdisciplinarity and impact: The effects of the citation time window","volume":"127","author":"Chen","year":"2022","journal-title":"Scientometrics"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"10190","DOI":"10.1109\/TVT.2018.2867191","article-title":"Mobility-Aware Edge Caching and Computing in Vehicle Networks: A Deep Reinforcement Learning","volume":"67","author":"Tan","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., and Kim, H.K. (2018, January 28\u201330). GIDS: GAN based Intrusion Detection System for In-Vehicle Network. Proceedings of the 2018 16th Annual Conference on Privacy, Security and Trust (PST), Belfast, Ireland.","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2114","DOI":"10.1109\/TIFS.2018.2812149","article-title":"VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System","volume":"13","author":"Choi","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3012","DOI":"10.1109\/TVT.2017.2774762","article-title":"IEEE 802.11ad-Based Radar: An Approach to Joint Vehicular Communication-Radar System","volume":"67","author":"Kumari","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Guerrero-Ib\u00e1\u00f1ez, J., Zeadally, S., and Contreras-Castillo, J. (2018). Sensor Technologies for Intelligent Transportation Systems. Sensors, 18.","DOI":"10.3390\/s18041212"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/COMST.2020.3029723","article-title":"Challenges and Solutions for Cellular Based V2X Communications","volume":"23","author":"Gyawali","year":"2021","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1109\/TITS.2019.2908074","article-title":"A Survey of Intrusion Detection for In-Vehicle Networks","volume":"21","author":"Wu","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/TDSC.2019.2904274","article-title":"PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks","volume":"18","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1080\/14778238.2021.1945963","article-title":"Mapping the knowledge-hiding field and its future prospects: A bibliometric co-citation, co-word, and coupling analysis","volume":"20","year":"2022","journal-title":"Knowl. Manag. Res. Pract."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"35561","DOI":"10.1109\/ACCESS.2022.3161639","article-title":"Understanding the Bibliometric Patterns of Publications in IEEE Access","volume":"10","author":"Raman","year":"2022","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3167","DOI":"10.11591\/eei.v13i5.7549","article-title":"Handover management in vehicle communication: Applications, techniques, issues, and challenges: A review","volume":"13","author":"Qasim","year":"2024","journal-title":"Bull. Electr. Eng. Inform."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/6\/268\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:54:59Z","timestamp":1760032499000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/6\/268"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,19]]},"references-count":33,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["fi17060268"],"URL":"https:\/\/doi.org\/10.3390\/fi17060268","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,19]]}}}