A systematic literature review on security of vehicular ad-hoc network (vanet) based on veins framework

MA Al-Shareeda, S Manickam - IEEE Access, 2023 - ieeexplore.ieee.org
Innovative framework on Vehicles in Network Simulation (VEINS) for Vehicular Ad-hoc
Network (VANET) that use security aspect is mainly limited and dispersed. In order to offer …

[HTML][HTML] COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing

MA Al-Shareeda, S Manickam - International journal of environmental …, 2022 - mdpi.com
The COVID-19 pandemic is currently having disastrous effects on every part of human life
everywhere in the world. There have been terrible losses for the entire human race in all …

A review on various security attacks in vehicular ad hoc networks

MM Hamdi, L Audah, MS Abood, SA Rashid… - Bulletin of Electrical …, 2021 - beei.org
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc
networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide …

[HTML][HTML] Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation

MA Al-Shareeda, S Manickam - Symmetry, 2022 - mdpi.com
Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields,
including the environment, energy efficiency, smart transportation, intelligent agriculture, and …

[HTML][HTML] A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks

MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah - Sensors, 2022 - mdpi.com
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on
roadside units to offer conditional privacy-preservation authentication and are vulnerable to …

[HTML][HTML] Efficient authentication scheme for 5G-enabled vehicular networks using fog computing

ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Sensors, 2023 - mdpi.com
Several researchers have proposed secure authentication techniques for addressing
privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To …

FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks

BA Mohammed, MA Al-Shareeda, S Manickam… - IEEE …, 2023 - ieeexplore.ieee.org
The fifth-generation (5G) technology-enabled vehicular network has been widely used in
intelligent transportation in recent years. Since messages shared among vehicles are …

[HTML][HTML] Chebyshev polynomial-based scheme for resisting side-channel attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam, BA Mohammed… - Applied Sciences, 2022 - mdpi.com
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks
are often required to cope with schemes based on either bilinear pair cryptography (BPC) or …

[HTML][HTML] Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU)

MA Al-Shareeda, S Manickam, BA Mohammed… - Sustainability, 2022 - mdpi.com
The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data
about road conditions, since the message transmission rate and the downloading service …

Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam - IEEE Access, 2022 - ieeexplore.ieee.org
Traffic safety and efficiency are extremely significant in both private and public
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …