Reference Papers
Reference Papers
References:
[1] A. Malik, M. Z. Khan, M. Faisal, F. Khan, and J. T. Seo, “An Efficient Dynamic Solution for the
Detection and Prevention of Black Hole Attack in VANETs,” Sensors (Basel)., vol. 22, no. 5, pp. 1–
27, 2022, doi: 10.3390/s22051897.
[2] A. Maria, V. Pandi, J. D. Lazarus, M. Karuppiah, and M. S. Christo, “BBAAS: Blockchain-Based
Anonymous Authentication Scheme for Providing Secure Communication in VANETs,” Secur.
Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/6679882.
[3] R. Kolandaisamy et al., “A stream position performance analysis model based on DDoS attack
detection for cluster-based routing in VANET,” J. Ambient Intell. Humaniz. Comput., vol. 12, no. 6,
pp. 6599–6612, 2021, doi: 10.1007/s12652-020-02279-2.
[4] N. C. Velayudhan, A. Anitha, and M. Madanan, “Sybil Attack with RSU Detection and Location
Privacy in Urban VANETs: An Efficient EPORP Technique,” Wirel. Pers. Commun., vol. 122, no. 4,
pp. 3573–3601, 2022, doi: 10.1007/s11277-021-09102-x.
[5] C. Wang, R. Huang, J. Shen, J. Liu, P. Vijayakumar, and N. Kumar, “A Novel Lightweight
Authentication Protocol for Emergency Vehicle Avoidance in VANETs,” IEEE Internet Things J., vol.
8, no. 18, pp. 14248–14257, 2021, doi: 10.1109/JIOT.2021.3068268.
[6] Z. Lu, W. Liu, Q. Wang, G. Qu, and Z. Liu, “A privacy-preserving trust model based on blockchain
for VANETs,” IEEE Access, vol. 6, pp. 45655–45664, 2018, doi: 10.1109/ACCESS.2018.2864189.
[7] S. Iqbal, P. Ball, M. H. Kamarudin, and A. Bradley, “Simulating Malicious Attacks on VANETs for
Connected and Autonomous Vehicle Cybersecurity: A Machine Learning Dataset,” 2022, [Online].
Available: http://arxiv.org/abs/2202.07704
[8] M. Baza et al., “Detecting Sybil Attacks Using Proofs of Work and Location in VANETs,” IEEE
Trans. Dependable Secur. Comput., vol. 19, no. 1, pp. 39–53, 2022, doi:
10.1109/TDSC.2020.2993769.
[9] A. Yang, J. Weng, N. Cheng, J. Ni, X. Lin, and X. Shen, “DeQoS Attack: Degrading Quality of Service
in VANETs and Its Mitigation,” IEEE Trans. Veh. Technol., vol. 68, no. 5, pp. 4834–4845, 2019, doi:
10.1109/TVT.2019.2905522.
[10] C. H. O. O. Quevedo, A. M. B. C. Quevedo, G. A. Campos, R. L. Gomes, J. Celestino, and A.
Serhrouchni, “An Intelligent Mechanism for Sybil Attacks Detection in VANETs,” IEEE Int. Conf.
Commun., vol. 2020-June, 2020, doi: 10.1109/ICC40277.2020.9149371.
[11] K. Adhikary, S. Bhushan, S. Kumar, and K. Dutta, “Hybrid Algorithm to Detect DDoS Attacks in
VANETs,” Wirel. Pers. Commun., vol. 114, no. 4, pp. 3613–3634, 2020, doi: 10.1007/s11277-020-
07549-y.
[12] S. Son, J. Lee, Y. Park, Y. Park, and A. K. Das, “Design of Blockchain-Based Lightweight V2I
Handover Authentication Protocol for VANET,” IEEE Trans. Netw. Sci. Eng., vol. 9, no. 3, pp. 1346–
1358, 2022, doi: 10.1109/TNSE.2022.3142287.
[13] L. Xie, Y. Ding, H. Yang, and X. Wang, “Blockchain-based secure and trustworthy internet of things
in SDN-enabled 5G-VANETs,” IEEE Access, vol. 7, pp. 56656–56666, 2019, doi:
10.1109/ACCESS.2019.2913682.
[14] H. Liu, D. Han, and D. Li, “Behavior analysis and blockchain based trust management in VANETs,”
J. Parallel Distrib. Comput., vol. 151, pp. 61–69, 2021, doi: 10.1016/j.jpdc.2021.02.011.
[15] Y. Inedjaren, M. Maachaoui, B. Zeddini, and J. P. Barbot, “Blockchain-based distributed
management system for trust in VANET,” Veh. Commun., vol. 30, p. 100350, 2021, doi:
10.1016/j.vehcom.2021.100350.
[16] Z. Ma, J. Zhang, Y. Guo, Y. Liu, X. Liu, and W. He, “An Efficient Decentralized Key Management
Mechanism for VANET with Blockchain,” IEEE Trans. Veh. Technol., vol. 69, no. 6, pp. 5836–5849,
2020, doi: 10.1109/TVT.2020.2972923.
[17] P. Shah and T. Kasbe, “Detecting Sybil Attack, Black Hole Attack and DoS Attack in VANET Using
RSA Algorithm,” 2021 IEEE Int. Conf. Emerg. Trends Ind. 4.0, ETI 4.0 2021, 2021, doi:
10.1109/ETI4.051663.2021.9619414.
[18] C. Wang, J. Shen, J. F. Lai, and J. Liu, “B-TSCA: Blockchain Assisted Trustworthiness Scalable
Computation for V2I Authentication in VANETs,” IEEE Trans. Emerg. Top. Comput., vol. 9, no. 3,
pp. 1386–1396, 2021, doi: 10.1109/TETC.2020.2978866.