Skip to main content
. 2022 Nov 24;22(23):9123. doi: 10.3390/s22239123

Table 5.

Review articles.

ID Authors Title Aim Search Strategy Number of Studies Year
RV01 Islam et al. [37] A Comprehensive Survey on Attacks and Security Protocols for VANETs It informs about fundamentals, application areas, security services, and possible attacks in vehicular networks. Not defined 11 2021
RV02 Hamdi et al. [38] A review on various security attacks in vehicular ad hoc networks It discusses security concerns, security services, and advances in authentication. It also describes attacks and threats. Not defined 13 2021
RV03 Sheikh et al. [39] A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs) It presents an overview of VANET that includes architecture, communication methods, standards, and characteristics. It also presents security services, security threats and attacks, simulation tools, and challenges. Not defined >65 2019
RV04 Singh et al. [40] Advanced Security Attacks on Vehicular AD HOC Network (VANET) It presents security requirements, challenges, attacks, and privacy issues in VANET. Not defined Not defined 2019
RV05 Azam et al. [41] An outline of the security challenges in VANET It informs about security attacks and solutions. Not defined 6 2020
RV06 Kohli et al. [42] Future Trends of Security and Privacy in Next Generation VANET It addresses security and privacy issues in next-generation VANET. It also presents solutions for those issues. Not defined 11 2020
RV07 Mitsakis et al. [43] Recent Developments on Security and Privacy of V2V & V2I Communications: A Literature Review It presents solutions to both the attacks and challenges in a VANET. Not defined 15 2020
RV08 Mihai et al. [44] Security Aspects of Communications in VANETs It presents relevant proposals for privacy, authentication, and integrity in the context of vehicular networks. Not defined 12 2020
RV09 Goyal et al. [45] Security Attacks, Requirements, and Authentication Schemes in VANET It provides a classification of attacks, security requirements, and authentication schemes Not defined 8 2019
N/A Our review Security in V2I Communications: A Systematic Literature Review It informs the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. Available 47 2022