@incollection{, D2C196B71221B19BB788AA5AE9E8D223 , author={{Oladayo O.Olakanmi} and {Mbadiwe S.Benyeogor} and {Kehinde O.Odeyemi} and {University of Ibadan}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}2214147 } @incollection{b0, , title={{Black-hole Attack Detection in Vehicular Ad Hoc Networks Using Statistical Process Control}} , author={{ BadreddineCherkaoui } and { AbderrahimBeni-Hssane } and { MohammedErritali }} , journal={{International Journal on Communication Antenna and Propagation}} 7 3 , year={2017} } @incollection{b1, , title={{Using trust model to ensure reliable data acquisition in VANETs}} , author={{ XYao } and { XZhang } and { HNing } and { PLi }} , journal={{Ad Hoc Networks}} 55 , year={Feb. 2017} } @incollection{b2, , title={{Detecting attacks in QoS-OLSR protocol}} , author={{ HSanadiki } and { HOtrok } and { AMourad } and { J.-MRobert }} , booktitle={{2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)}} , year={2013} } @incollection{b3, , title={{Packet leashes: a defense against wormhole attacks in wireless networks}} , author={{ YCHu } and { APerrig } and { DBJohnson }} , booktitle={{INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications}} , publisher={IEEE Societies} , year={2003} 3 } @incollection{b4, , title={{A Survey of Attacks and Detection Mechanisms on Intelligent Transportation Systems: VANETs and IoV}} , author={{ FatihSakiz } and { SevilSen }} , journal={{Ad hoc Network}} 61 , year={2017} } @incollection{b5, , title={{Evaluating the usefulness of watchdogs for intrusion detection in VANETs}} , author={{ JHortelano } and { JCRuiz } and { PManzoni }} , booktitle={{Proc. IEEE Int. Conf. Commun. Workshops}} IEEE Int. Conf. Commun. WorkshopsCapetown, South Africa , year={May 2010} } @incollection{b6, , title={{EAODV: Detection and removal of multiple black hole attacks through sending forged packets in MANETs}} , author={{ TDelkesh } and { MJamali }} , journal={{J. Ambient Intell. Hum. Comput}} 10 5 , year={2019} } @incollection{b7, , title={{Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks}} , author={{ ADaeinabi } and { AGRahbar }} , journal={{Multimedia Tools Appl}} 66 2 , year={Sep. 2013} } @incollection{b8, , title={{Performance investigation of DMV (detecting malicious vehicle) and DPMV (detection and prevention of misbehave/malicious vehicles): Future road map}} , author={{ MKadam } and { SLimkar }} , booktitle={{Proc. Int. Conf. Frontiers Intell. Comput., Theory Appl. (FICTA)}} Int. Conf. Frontiers Intell. Comput., Theory Appl. (FICTA) , year={2014} } @incollection{b9, , title={{Detection of malicious nodes (DMN) in vehicular ad-hoc networks}} , author={{ UKhan } and { SAgrawal } and { SSilakari }} , journal={{Procedia Comput. Sci}} 46 , year={Jan. 2015} } @incollection{b10, , title={{Using trust model to ensure reliable data acquisition in VANETs}} , author={{ XYao } and { XZhang } and { HNing } and { PLi }} , journal={{Ad Hoc Netw}} 55 , year={Feb. 2017} } @incollection{b11, , title={{A Dempster-Shafer based tit-fortat strategy to regulate the cooperation in VANET using QoS-OLSR protocol}} , author={{ OAWahab } and { HOtrok } and { AMourad }} , journal={{Wireless Pers. Commun}} 75 3 , year={Apr. 2014} } @incollection{b12, , title={{Cooperative crosslayer detection for blackhole attack in VANET-OLSR}} , author={{ RBaiad } and { HOtrok } and { SMuhaidat } and { JBentahar }} , booktitle={{Proc. Int. Wireless Commun. Mobile Comput. Conf. (IWCMC)}} Int. Wireless Commun. Mobile Comput. Conf. (IWCMC)Nicosia, Cyprus , year={Aug. 2014} } @book{b13, , title={{}} , author={{ YSun } and { LWu } and { SWu } and { SLi } and { TZhang } and { LZhang }} } @incollection{b14, , title={{Attacks and countermeasures in the internet of vehicles}} , author={{ XCui }} doi:10.10 07/s12243-016-0551-6 , journal={{Annals of Telecommunications}} 72 5-6 , year={2016} } @incollection{b15, , title={{A novel approach for avoiding wormhole attacks in VANET}} , author={{ SMSafi } and { AMovaghar } and { MMohammadizadeh }} , booktitle={{2009 First Asian Himalayas International Conference on Internet}} , year={2009} } @incollection{b16, , title={{A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE Enabled VANETs}} , author={{ SBiswas } and { JMisic }} , journal={{IEEE Transactions on Vehicular Technology}} 62 5 , year={Jun. 2013} } @incollection{b17, , title={{Packet leashes: a defense against wormhole attacks in wireless networks}} , author={{ YHu } and { APerrig } and { DBJohnson }} , booktitle={{Proceedings of the 22 nd Annual Joint Conference on the IEEE Computer and Communications Societies}} the 22 nd Annual Joint Conference on the IEEE Computer and Communications Societies , year={April 2003} 3 } @incollection{b18, , title={{SECTOR: secure tracking of node encounters in multi-hop wireless networks}} , author={{ SC ? Apkun } and { LButtya´n } and { J. -PHubaux }} , booktitle={{Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03)}} the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03)Fairfax, Va, USA , year={2003} , note={View at: Publisher Site -Google Scholar} } @incollection{b19, , title={{TrueLink: a practical countermeasure to the wormhole attack in wireless networks}} , author={{ JEriksson } and { SVKrishnamurthy } and { MFaloutsos }} , booktitle={{Proceedings of the 14th IEEE International Conference on Network Protocols (ICNP '06)}} the 14th IEEE International Conference on Network Protocols (ICNP '06) , year={November 2006} }