Open Access
ITM Web Conf.
Volume 43, 2022
The International Conference on Artificial Intelligence and Engineering 2022 (ICAIE’2022)
Article Number 01025
Number of page(s) 6
Published online 14 March 2022
  1. E. Universal and T. Radio, “LTE Overall description ;,” vol. 0, p. 148, 2009. [Google Scholar]
  2. M. Iwamura, “NGMN view on 5G architecture,” IEEE Veh. Technol. Conf., vol. 2015, 2015, doi:10.1109/VTCSpring.2015.7145953. [Google Scholar]
  3. B. Bertenyi, R. Burbidge, G. Masini, S. Sirotkin, and Y. Gao, “NG Radio Access Network (NG-RAN),” J. ICT Stand., vol. 6, no. 1, pp. 59–76, 2018, doi:10.13052/jicts2245-800x.614. [Google Scholar]
  4. T. Yoshizawa and B. Preneel, “Survey of Security Aspect of V2X Standards and Related Issues,” 2019 IEEE Conf. Stand. Commun. Networking, CSCN 2019, pp. 1–5, 2019, doi:10.1109/CSCN.2019.89313113. [Google Scholar]
  5. A. Festag, “Cooperative intelligent transport systems standards in Europe,” IEEE Commun. Mag., vol. 52, no. 12, pp. 166–172, 2014, doi:10.1109/MCOM.2014.6979970. [CrossRef] [Google Scholar]
  6. F. Perry and A.V. Program, “Overview of DSRC messages and performance requirements,” 2017. [Google Scholar]
  7. R. Lu, L. Zhang, J. Ni, and Y. Fang, “5G Vehicle-to-Everything Services: Gearing up for Security and Privacy,” Proc. IEEE, vol. 108, no. 2, pp. 373–389, 2020, doi:10.1109/JPROC.2019.2948302. [CrossRef] [Google Scholar]
  8. T. Specification, “LTE; User Equipment (UE) to V2X control function; protocol aspects; Stage 3 (3GPP TS 24.386 version 15.0.0 Release 15),” vol. 0, pp. 0–34, 2017. [Google Scholar]
  9. Patil VP, “Reactive and Proactive Routing Protocol Performance Evaluation for Qualitative and Quantitative Analysis in Mobile Ad Hoc Network,” Int. J. Sci. Res. Publ., vol. 2, no. 1, pp. 2250–3153, 2012, [Online]. Available: [Google Scholar]
  10. A. Gupta and R.K. Jha, “A Survey of 5G Network: Architecture and Emerging Technologies,” IEEE Access, vol. 3, pp. 1206–1232, 2015, doi:10.1109/ACCESS.2015.2461602. [CrossRef] [Google Scholar]
  11. S. Ur Rehman, M.A. Khan, T.A. Zia, and L. Zheng, “Vehicular Ad-Hoc Networks (VANETs) - An Overview and Challenges,” J. Wirel. Netw. Commun., vol. 2013, no. 3, pp. 29–38, 2013, doi:10.5923/j.jwnc.20130303.02. [CrossRef] [MathSciNet] [Google Scholar]
  12. L. Zhang, “OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks,” IEEE Trans. Inf. Forensics Secur., vol. 12, no. 12, pp. 2998–3010, 2017, doi:10.1109/TIFS.2017.2730479. [CrossRef] [Google Scholar]
  13. Q.G. Fan, L. Wang, Y.N. Cai, Y.Q. Li, and J. Chen, “VANET Routing Replay Attack Detection Research Based on SVM,” MATEC Web Conf., vol. 63, pp. 4–7, 2016, doi:10.1051/matecconf/20166305020. [CrossRef] [EDP Sciences] [Google Scholar]
  14. G. Han, L. Xiao, and H.V. Poor, “Two-dimensional anti-jamming communication based on deep reinforcement learning,” in ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Jun. 2017, pp. 2087–2091, doi:10.1109/ICASSP.2017.7952524. [Google Scholar]
  15. L. T. Tan and R.Q. Hu, “Mobility-aware edge caching and computing in vehicle networks: A deep reinforcement learning,” IEEE Trans. Veh. Technol., vol. 67, no. 11, pp. 10190–10203, 2018, doi:10.1109/TVT.2018.2867191. [CrossRef] [Google Scholar]
  16. M. S.I. Mamun, A. Miyaji, and H. Takada, “A multi-purpose group signature for vehicular network security,” Proc. - 2014 Int. Conf. Network-Based Inf. Syst. NBiS 2014, pp. 511–516, 2014, doi:10.1109/NBiS.2014.93. [Google Scholar]
  17. U. Khan, S. Agrawal, and S. Silakari, “Detection of Malicious Nodes (DMN) in vehicular ad-hoc networks,” in Procedia Computer Science, 2015, vol. 46, pp. 965–972, doi:10.1016/j.procs.2015.01.006. [CrossRef] [Google Scholar]
  18. H. Sedjelmaci and S.M. Senouci, “An accurate and efficient collaborative intrusion detection framework to secure vehicular networks,” Comput. Electr. Eng., vol. 43, pp. 33–47, 2015, doi:10.1016/j.compeleceng.2015.02.018. [CrossRef] [Google Scholar]
  19. B. Manale and T. Mazri, “5G, Vehicle to everything communication: Opportunities, constraints and future directions,” Adv. Sci. Technol. Eng. Syst., vol. 5, no. 6, pp. 1089–1095, 2020, doi:10.25046/aj0506132. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.