[
[1] R. Bibi, Y. Saeed, A. Zeb, T. M. Ghazal, T. Rahman, R. A. Said, S. Abbas, M. Ahmad, and M. A. Khan, “Edge AI-based automated detection and classification of road anomalies in VANET using deep learning,” Computational Intelligence and Neuroscience, vol. 2021, Art. no. 6262194, Sep. 2021. https://doi.org/10.1155/2021/6262194849456434630550
]Search in Google Scholar
[
[2] M. Gayathri and C. Gomathy, “A deep survey on types of cyber attacks in VANET,” J Crit Rev, vol. 8, no. 1, pp. 1029–1039, 2021. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.jcreview.com/admin/Uploads/Files/61c07bf6658ea1.10579682.pdf
]Search in Google Scholar
[
[3] S. Lahdya and T. Mazri, “Security study of routing attacks in vehicular ad-hoc networks (autonomous car),” The International Archives of Photogrammetry, Remote Sensing and Spatial Information Sciences, vol. 46, pp. 349–353, 2021. https://doi.org/10.5194/isprs-archives-XLVI-4-W5-2021-349-2021
]Search in Google Scholar
[
[4] A. E. C. Mondragon, C. S. Lalwani, E. S. C. Mondragon, and C. E. C. Mondragon, “Facilitating multimodal logistics and enabling information systems connectivity through wireless vehicular networks,” International Journal of Production Economics, vol. 122, no. 1, pp. 229–240, Nov. 2009. https://doi.org/10.1016/j.ijpe.2009.05.023
]Search in Google Scholar
[
[5] J. I. Katuka and M. S. A. Latiff, “VANETs and its related issues: An extensive survey,” Journal of Theoretical & Applied Information Technology, vol. 66, no. 1, pp. 693–697, 2014.
]Search in Google Scholar
[
[6] P. Pandey, “Effect of selfish behavior on network performance in VANET,” in Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, Apr. 2015, pp. 693–697. https://doi.org/10.1109/CSNT.2015.63
]Search in Google Scholar
[
[7] S. Harrabi, I. B. Jaafar, and K. Ghedira, “Performance analysis of VANETs routing protocols,” Res. Square, Univ. Mannouba, Manouba, Tunisia, Tech. Rep., 2021.10.21203/rs.3.rs-487685/v1
]Search in Google Scholar
[
[8] E. Singh, “Mobility and scalability management issues in VANET,” Int J Adv Res Sci Eng, vol. 7, pp. 151–155, 2018.
]Search in Google Scholar
[
[9] A. Ahamed and H. Vakilzadian, “Issues and challenges in VANET routing protocols,” in Proc. IEEE Int. Conf. Electro/Inf. Technol. (EIT), Rochester, MI, USA, May 2018, pp. 723–728. https://doi.org/10.1109/EIT.2018.8500180
]Search in Google Scholar
[
[10] P. Mundhe, S. Verma, and S. Venkatesan, “A comprehensive survey on authentication and privacy-preserving schemes in VANETs,” Computer Science Review, vol. 41, Art. no. 100411, Aug. 2021. https://doi.org/10.1016/j.cosrev.2021.100411
]Search in Google Scholar
[
[11] J. Cui, D. Wu, J. Zhang, Y. Xu, and H. Zhong, “An efficient authentication scheme based on semi-trusted authority in VANETs,” IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2972–2986, Mar. 2019. https://doi.org/10.1109/TVT.2019.2896018
]Search in Google Scholar
[
[12] A. Quyoom, A. A. Mir, and A. Sarwar, “Security attacks and challenges of VANETs: a literature survey,” Journal of Multimedia Information System, vol. 7, no. 1, pp. 45–54, Mar. 2020. https://doi.org/10.33851/JMIS.2020.7.1.45
]Search in Google Scholar
[
[13] M. Arif, G. Wang, M. Z. A. Bhuiyan, T. Wang, and J. Chen, “A survey on security attacks in VANETs: Communication, applications and challenges,” Vehicular Communications, vol. 19, Art. no. 100179, Oct. 2019. https://doi.org/10.1016/j.vehcom.2019.100179
]Search in Google Scholar
[
[14] C. Sun, J. Liu, X. Xu, and J. Ma, “A privacy-preserving mutual authentication resisting dos attacks in VANETs,” IEEE Access, vol. 5, pp. 24012–24022, 2017. https://doi.org/10.1109/ACCESS.2017.2768499
]Search in Google Scholar
[
[15] I. A. Sumra, H. B. Hasbullah, and J.-l. B. AbManan, “Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey,” in Vehicular Ad-Hoc Networks for Smart Cities, vol. 306, A. Laouiti, A. Qayyum, M. S. Mohamad, Eds. Springer, Singapore, 2015, pp. 51–61. https://doi.org/10.1007/978-981-287-158-9_5
]Search in Google Scholar
[
[16] R. Kaur, T. P. Singh, and V. Khajuria, “Security issues in vehicular Adhoc network (VANET),” in 2018 2nd International conference on trends in Electronics and Informatics (ICOEI), Tirunelveli, India, May 2018, pp. 884–889. https://doi.org/10.1109/ICOEI.2018.8553852
]Search in Google Scholar
[
[17] M. Azees, P. Vijayakumar, and L. Jegatha Deborah, “Comprehensive survey on security services in vehicular ad-hoc networks,” IET Intelligent Transport Systems, vol. 10, no. 6, pp. 379–388, Aug. 2016. https://doi.org/10.1049/iet-its.2015.0072
]Search in Google Scholar
[
[18] M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Vehicular Communications, vol. 1, no. 2, pp. 53–66, Apr. 2014. https://doi.org/10.1016/j.vehcom.2014.05.001
]Search in Google Scholar
[
[19] J. Contreras-Castillo, S. Zeadally, and J. A. G Ibañez, “Solving vehicular ad hoc network challenges with big data solutions,” IET Networks, vol. 5, no. 4, pp. 81–84, Jul. 2016. https://doi.org/10.1049/iet-net.2016.0001
]Search in Google Scholar
[
[20] A. Mchergui, T. Moulahi, and S. Zeadally, “Survey on artificial intelligence (AI) techniques for vehicular ad-hoc networks (VANETs),” Vehicular Communications, vol. 34, Art. no. 100403, Apr. 2021. https://doi.org/10.1016/j.vehcom.2021.100403
]Search in Google Scholar
[
[21] R. Shrestha, R. Bajracharya, and S. Y. Nam, “Challenges of future VANET and cloud-based approaches,” Wireless Communications and Mobile Computing, vol. 2018, Art. no. 5603518, May 2018. https://doi.org/10.1155/2018/5603518
]Search in Google Scholar
[
[22] M. Pourkiani, S. Adabi, S. Jabbehdari, and A. Khademzadeh, “Improving QoS in VANETs: A survey,” Journal of Advances in Computer Engineering and Technology, vol. 3, no. 3, pp. 153–166, 2017.
]Search in Google Scholar
[
[23] M. Pourkiani, S. Jabbehdari, and A. Khademzadeh, “A novel protocol stack for improving QoS in vehicular networks,” International Journal of Computer Science and Information Security, vol. 14, no. 6, pp. 358–367, June 2016.
]Search in Google Scholar
[
[24] H. Fatemidokht and M. K. Rafsanjani, “QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks,” Journal of Systems and Software, vol. 165, Art. no. 110561, Jul. 2020. https://doi.org/10.1016/j.jss.2020.110561
]Search in Google Scholar
[
[25] A. Srivastava, S. Verma, N. Jhanjhi, M. Talib, A. Malhotra et al., “Analysis of quality of service in VANET,” IOP Conference Series: Materials Science and Engineering, vol. 993, no. 1, Art. no. 012061, 2020. https://doi.org/10.1088/1757-899X/993/1/012061
]Search in Google Scholar
[
[26] S. Tabar and A. Azadmanesh, “Quality of service in vehicular ad hoc networks,” in IAENG Transactions on Engineering Sciences: Special Issue for the International Association of Engineers Conferences 2016, World Scientific, 2018, pp. 388–401. https://doi.org/10.1142/9789813230774_0028
]Search in Google Scholar
[
[27] P. D. Dorge, S. S. Dorle, M. B. Chakole, and D. K. Thote, “Improvement of QoS in VANET with different mobility patterns,” in International Conference on Radar, Communication and Computing (ICRCC), Tiruvannamalai, India, Dec. 2012, pp. 206–209. https://doi.org/10.1109/ICRCC.2012.6450578
]Search in Google Scholar
[
[28] G. Parimala, S. Nageswararao, and K. LakshmiNadh, “Ddsrc: Algorithm for improving QoS in VANET,” International Journal of Recent Technology and Engineering (IJRTE), vol. 7, no. 6S5, pp. 1327–1331, Apr. 2019.
]Search in Google Scholar
[
[29] M. J. Sayadi, M. Fathy, and L. Mahaki, “Improving the quality of service in the VANET by detecting and removing unused messages,” International Journal of Information & Communication Technology Research, vol. 4, no. 3, pp. 107–112, 2012.
]Search in Google Scholar
[
[30] N. K. Kitson, A. C. Constantinou, Z. Guo, Y. Liu, and K. Chobtham, “A survey of Bayesian network structure learning,” arXiv preprint, arXiv:2109.11415, 2021. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://arxiv.org/ftp/arxiv/papers/2109/2109.11415.pdf
]Search in Google Scholar
[
[31] M. Scanagatta, A. Salmeron, and F. Stella, “A survey on Bayesian network structure learning from data,” Progress in Artificial Intelligence, vol. 8, no. 4, pp. 425–439, May 2019. https://doi.org/10.1007/s13748-019-00194-y
]Search in Google Scholar
[
[32] N. R. Siddiqui, K. A. Khaliq, and J. Pannek, “VANET security analysis on the basis of attacks in authentication,” in Dynamics in Logistics, Lecture Notes in Logistics, M. H. Kotzab and J. Pannek, Eds. Springer, 2017, pp. 491–502. https://doi.org/10.1007/978-3-319-45117-6_43
]Search in Google Scholar
[
[33] K. B. Kelarestaghi, M. Foruhandeh, K. Heaslip, and R. Gerdes, “Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures,” arXiv preprint, arXiv:1903.01541, 2019. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://arxiv.org/ftp/arxiv/papers/1903/1903.01541.pdf
]Search in Google Scholar
[
[34] M. B. Mansour, C. Salama, H. K. Mohamed, and S. A. Hammad, “VANET security and privacy-an overview,” International Journal of Network Security & Its Applications (IJNSA), vol. 10, no. 2, Mar. 2018. https://doi.org/10.2139/ssrn.3290553
]Search in Google Scholar
[
[35] G.-U. Rehman, A. Ghani, S. Muhammad, M. Singh, and D. Singh, “Selfishness in vehicular delay-tolerant networks: A review,” Sensors, vol. 20, no. 10, Art. no. 3000, 2020. https://doi.org/10.3390/s20103000728550432466315
]Search in Google Scholar
[
[36] A. Reyes, C. Barrado, M. Lopez, and C. Excelente, “Vehicle density in VANET applications,” Journal of Ambient Intelligence and Smart Environments, vol. 6, no. 4, pp. 469–481, 2014. https://doi.org/10.3233/AIS-140271
]Search in Google Scholar
[
[37] A. V. Ostroukh and H. Elhadi, “Comparative study of routing protocols in vehicular ad-hoc networks (VANETs),” International Journal of Advanced Studies (iJAS), vol. 4, no. 2, pp. 9–14, 2014. https://doi.org/10.12731/2227-930X-2014-2-2
]Search in Google Scholar
[
[38] C. Tripp-Barba, M. A. Igartua, L. U. Aguiar, A. M. Mezher, A. Zaldívar-Colado, and I. Guerin-Lassous, “Available bandwidth estimation in GPSR for VANETs,” in Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, Nov. 2013, pp. 1–8. https://doi.org/10.1145/2512921.2516961
]Search in Google Scholar
[
[39] T. Takagi and M. Sugeno, “Fuzzy identification of systems and its applications to modeling and control,” IEEE transactions on systems, man, and cybernetics, vol. SMC-15, no. 1, pp. 116–132, Jan.-Feb. 1985. https://doi.org/10.1109/TSMC.1985.6313399
]Search in Google Scholar
[
[40] K. A. Hafeez, L. Zhao, Z. Liao, and B. N.-W. Ma, “The optimal radio propagation model in VANET,” in 2009 Fourth International Conference on Systems and Networks Communications. Porto, Portugal, Sep. 2009, pp. 6–11. https://doi.org/10.1109/ICSNC.2009.101
]Search in Google Scholar
[
[41] F. Li, W. Chen, and Y. Shui, “Study on connectivity probability of VANETs under adverse weather conditions at 5.9 Ghz,” IEEE Access, vol. 8, pp. 547–555, Dec. 2019. https://doi.org/10.1109/ACCESS.2019.2962089
]Search in Google Scholar
[
[42] M. C. Surugiu and I. N. Stancel, “Monitoring and warning system of a route based on roadside sensors in VANET,” Procedia Manufacturing, vol. 32, pp. 745–752, 2019. https://doi.org/10.1016/j.promfg.2019.02.281
]Search in Google Scholar
[
[43] S. Abdelhamid, H. S. Hassanein, and G. Takahara, “Vehicle as a resource (VaaR),” IEEE Network, vol. 29, no. 1, pp. 12–17, Jan. 2015. https://doi.org/10.1109/MNET.2015.7018198
]Search in Google Scholar
[
[44] N. Mohamed, S. Sahib, N. Suryana, and B. Hussin, “Understanding network congestion effects on performance-articles review,” Journal of Theoretical and Applied Information Technology, vol. 92, no. 2, Art. no. 311, 2016.
]Search in Google Scholar
[
[45] R. Chen, Z. Sheng, Z. Zhong, M. Ni, D. G. Michelson, and V. C. Leung, “Analysis on connectivity performance for vehicular ad hoc networks subjected to user behavior,” in 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). Dubrovnik, Croatia, Aug. 2015, pp. 26–31. https://doi.org/10.1109/IWCMC.2015.7288932
]Search in Google Scholar
[
[46] R. K. Aswed and M. A. Abdala, “End-to-end delay enhancement with aodv in VANET,” International Journal of Enhanced Research in Science, Technology & Engineering, vol. 3, no. 11, pp. 227–232, Nov. 2014,
]Search in Google Scholar
[
[47] S. Renooij, “Probability elicitation for belief networks: issues to consider,” The Knowledge Engineering Review, vol. 16, no. 3, pp. 255–269, Feb. 2001. https://doi.org/10.1017/S0269888901000145
]Search in Google Scholar
[
[48] H. Sattar, I. S. Bajwa, J. Muhammad, M. F. Mushtaq, R. Kazmi, M. Akram, M. Ashraf, U. Shafi et al., “Smart wound hydration monitoring using biosensors and fuzzy inference system,” Wireless Communications and Mobile Computing, vol. 2019, Art. no. 8059629, 2019. https://doi.org/10.1155/2019/8059629
]Search in Google Scholar
[
[49] M.-D. Pop, O. Prostean, T.-M. David, and G. Prostean, “Hybrid solution combining Kalman filtering with Takagi–Sugeno fuzzy inference system for online car-following model calibration,” Sensors, vol. 20, no. 19, Art. no. 5539, Sep. 2020. https://doi.org/10.3390/s20195539758267332992622
]Search in Google Scholar
[
[50] E. H. Mamdani and S. Assilian, “An experiment in linguistic synthesis with a fuzzy logic controller,” International Journal of Man-Machine Studies, vol. 7, no. 1, pp. 1–13, 1975. https://doi.org/10.1016/S0020-7373(75)80002-2
]Search in Google Scholar
[
[51] M. H. Rad and M. Abdolrazzagh-Nezhad, “Data cube clustering with improved DBSCAN based on fuzzy logic and genetic algorithm: Designing and improving data cube clustering,” Information Technology and Control, vol. 49, no. 1, pp. 127–143, Mar. 2020. https://doi.org/10.5755/j01.itc.49.1.23780
]Search in Google Scholar
[
[52] A. Omar, A. Aous, A. Ali, and S. S. Balasem, “Comparison between the effects of different types of membership functions on fuzzy logic controller performance,” International Journal of Emerging Engineering Research and Technology, vol. 76, pp. 76–83, 2015.
]Search in Google Scholar
[
[53] S. N. Mandal, J. P. Choudhury, and S. B. Chaudhuri, “In search of suitable fuzzy membership function in prediction of time series data,” International Journal of Computer Science Issues, vol. 9, no. 3, pp. 293–302, 2012.
]Search in Google Scholar
[
[54] K.-R. Liu, J.-Y. Kuo, K. Yeh, C.-W. Chen, H.-H. Liang, and Y.-H. Sun, “Using fuzzy logic to generate conditional probabilities in Bayesian belief networks: a case study of ecological assessment,” International Journal of Environmental Science and Technology, vol. 12, no. 3, pp. 871–884, Dec. 2015. https://doi.org/10.1007/s13762-013-0459-x
]Search in Google Scholar
[
[55] V. Zarikas, E. Papageorgiou, and P. Regner, “Bayesian network construction using a fuzzy rule based approach for medical decision support,” Expert Systems, vol. 32, no. 3, pp. 344–369, Jun. 2015. https://doi.org/10.1111/exsy.12089
]Search in Google Scholar
[
[56] O. E. Bouhadi, M. Azmani, A. Azmani, and M. A. el ftouh, “Using a fuzzy-Bayesian approach for predictive analysis of delivery delay risk,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 7, pp. 316–326, 2022. https://doi.org/10.14569/IJACSA.2022.0130740
]Search in Google Scholar