A systematic literature review on security of vehicular ad-hoc network (vanet) based on veins framework

MA Al-Shareeda, S Manickam - IEEE Access, 2023 - ieeexplore.ieee.org
Innovative framework on Vehicles in Network Simulation (VEINS) for Vehicular Ad-hoc
Network (VANET) that use security aspect is mainly limited and dispersed. In order to offer …

A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks

S Dong, H Su, Y Xia, F Zhu, X Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As Vehicular Ad-hoc Networks (VANETs) bring fantastic revolution to intelligent
transportation systems, their own security has become an important research topic …

COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing

MA Al-Shareeda, S Manickam - International journal of environmental …, 2022 - mdpi.com
The COVID-19 pandemic is currently having disastrous effects on every part of human life
everywhere in the world. There have been terrible losses for the entire human race in all …

Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS/GEM communications

MA Al-Shareeda, S Manickam, SA Laghari, A Jaisan - Sustainability, 2022 - mdpi.com
Starting from the First Industrial Revolution to the current and Fourth Industrial Revolution (or
Industry 4.0), various industrial machines are present in the market and manufacturing …

DDoS attacks detection using machine learning and deep learning techniques: Analysis and comparison

MA Al-Shareeda, S Manickam, M Ali - Bulletin of Electrical …, 2023 - papers.ssrn.com
The security of the internet is seriously threatened by a distributed denial of service (DDoS)
attacks. The purpose of a DDoS assault is to disrupt service and prevent legitimate users …

Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation

MA Al-Shareeda, S Manickam - Symmetry, 2022 - mdpi.com
Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields,
including the environment, energy efficiency, smart transportation, intelligent agriculture, and …

Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks

ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Electronics, 2023 - mdpi.com
The privacy and security of the information exchanged between automobiles in 5G-enabled
vehicular networks is at risk. Several academics have offered a solution to these problems in …

Efficient authentication scheme for 5G-enabled vehicular networks using fog computing

ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Sensors, 2023 - mdpi.com
Several researchers have proposed secure authentication techniques for addressing
privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To …

L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system

AA Almazroi, MA Alqarni, MA Al-Shareeda… - Plos one, 2023 - journals.plos.org
The role that vehicular fog computing based on the Fifth Generation (5G) can play in
improving traffic management and motorist safety is growing quickly. The use of wireless …

Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU)

MA Al-Shareeda, S Manickam, BA Mohammed… - Sustainability, 2022 - mdpi.com
The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data
about road conditions, since the message transmission rate and the downloading service …