|
Year of publish | Author name | Title of paper | Brief description of paper |
|
2015 | Indu et al. | An analytic study of security solutions for VANET | The majority of network assaults target the network layer, a safe routing protocol is essential to thwart these attacks. Analytical study of security solution are discussed in this paper. |
2015 | Anju et al. | Secure data access through multiuser so-VANET | Service-oriented VANET security and privacy provide a difficult challenge. Using an innovative and proven cryptographic technique, the proposed privacy-preserving data gathering and forwarding system overcomes these concerns. Clustering was also included as a factor in designing network and application systems. |
2018 | Mansour et al. | VANET security and privacy—an overview | VANET security and privacy related issues are discussed along with the current state-of-the-art methods for meeting these needs. Most prevalent VCS attacks and attackers have also been discussed. |
2019 | Muhammad et al. | A comprehensive survey on VANET security services in traffic management system | In this paper, VANET security and privacy related issues are discussed for traffic management system. Safety alerts among cars provide comfort services for passengers and protect human life on the roadway. |
2020 | Farouk et al. | Efficient privacy-preserving scheme for location based services in VANET system | In this paper, for location privacy, P2 FHE-AES method is suggested that uses FHE over AES symmetric encryption to eliminate data noise and then outsources LBS data to the cloud while maintaining privacy. |
2021 | Khan et al. | Security challenges of location privacy in VANETs and state-of-the-art solutions: a survey | In this survey paper, various methods for protecting the privacy of roles in VANETs were laid forth. An introduction to VANET design and risk classes was provided by the authors. |
2022 | Gillani et al. | Data collection protocols for VANETs: a survey | Data collecting protocols for VANETs based on DTN, BE, and RT were discussed in detail in this article. |
2020 | Dukiya et al. | A location privacy framework using edge computing in VANET | In this paper, the authors combine cutting-edge technology with essential aspects like as authentication, anonymity, and the analysis of accessible digital evidence. |
2014 | Saranya et al. | Data confidentiality and users’ location privacy in VANETs | Data confidentiality and location privacy is accessed by a new cryptographic function proposed by the authors that allows RSU and users to get desired security level to exchanged communications. They utilise a portion of current packet’s data to create a new set of encryption keys for use in the following packet. |
2012 | Hu et al. | Efficient and multilevel privacy-preserving communication protocol for VANET | The improved ring signature-based system developed by the authors, which is focused at securing vehicular communications. It is multilevel conditional privacy-preserving scheme. |
2018 | Taleb et al. | VANET routing protocols and architectures: an overview | In this paper, the authors address demands and applications of VANETs, categories of VANET routing protocols and architectures, and primary benefits and drawbacks of the various types of network routing protocols. |
2013 | Konstantinos et al. | Effective implementation of location services for VANETs in hybrid network infrastructures | A homogeneous network and heterogeneous network that combines 802.11p with LTE are both proposed and evaluated in this study for centralised location service in a VANET urban scenario. |
2016 | Poornima et al. | Review of security in VANET | Various security vulnerabilities, assaults, possible remedies, current difficulties, and solutions are explored in this article for vehicle-to-vehicle communication in intelligent transportation systems. |
2015 | Soleymani et al. | Trust management in vehicular ad hoc network: a systematic review | Trust management is discussed in a systematic manner for VANET in this review paper. Authors discussed the influence of trustworthiness on the quality of applications and data. |
2017 | Kaushik et al. | Comparative study of various protocols of DDS | Keeping in mind the features of DDS protocols, the authors compared these protocols in this review article. |
2018 | Kaushik et al. | Evolutionary study of service location protocol | The SLP protocol is discussed from its initial stage to current stage and its different areas of recent research in VANET is discussed in this paper. |
2019 | Muhammad et al. | A survey of security services, attacks, and applications for vehicular ad hoc networks (VANETs) | Security services with threats and assaults on these services are described, and most current methods for every security service are presented in this paper. |
2020 | Goyal et al. | Development of hybrid ad hoc on demand distance vector routing protocol in mobile ad hoc network | Hybrid AODV technique is proposed in this paper that will incorporate with the MFR (most forward within radius) and firefly algorithm for detecting shortest path. |
2020 | Goyal et al. | Design and implementation of modified local link repair multicast routing protocol for manets | A new protocol named modified local link repair (MLLR) multicasting routing protocol is proposed in this paper. |
2021 | Mahmood et al. | Security schemes based on conditional privacy-preserving vehicular ad hoc networks | Strengths and limitations of security schemes are discussed in this paper. Different schemes of security are also compared. |
2021 | Dwivedi et al. | Blockchain-based secured IPFS-enable event storage technique with authentication protocol in VANET | A blockchain-based protocol is proposed in this paper. This novel decentralized architecture for VANET is without the cloud server. |
2021 | Kumar et al. | Black hole attack detection in vehicular ad hoc network using secure AODV routing algorithm | For detection of black hole, a secure AODV routing protocol is developed. RREQ and RREP packets are improved in these protocols. Cryptography function-based encryption and decryption is used for security. |
2021 | Tejasvi et al. | Framework for anomaly detection in VANETs | Based on deep neural network, an anomaly detection framework is developed for VANET using sequence reconstruction and thresholding algorithm. |
2020 | Bensaber et al. | Design and modeling an adaptive neuro-fuzzy inference system (ANFIS) for the prediction of a security index in VANET | To get a prediction model of security for VANET, the authors proposed an applied adaptive neuro-fuzzy inference system (ANFIS). The authors simulate the network, then obtain database of attacks occurred, then analyzed it statistically, and show results using MATLAB. |
2019 | Neelaveni et al. | Performance enhancement and security assistance for VANET using cloud computing | RSUs are replaced by cloud computing to enhance security during transmission of information, and the authors named this proposed work as modified vehicular-adhocNet |
2016 | Kirti et al. | VANET and its security aspects: a review | VANET security aspects are focused in this review article. The authors conceptually analyse these aspects. |
|