Table 5.
Review articles.
| ID | Authors | Title | Aim | Search Strategy | Number of Studies | Year |
|---|---|---|---|---|---|---|
| RV01 | Islam et al. [37] | A Comprehensive Survey on Attacks and Security Protocols for VANETs | It informs about fundamentals, application areas, security services, and possible attacks in vehicular networks. | Not defined | 11 | 2021 |
| RV02 | Hamdi et al. [38] | A review on various security attacks in vehicular ad hoc networks | It discusses security concerns, security services, and advances in authentication. It also describes attacks and threats. | Not defined | 13 | 2021 |
| RV03 | Sheikh et al. [39] | A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs) | It presents an overview of VANET that includes architecture, communication methods, standards, and characteristics. It also presents security services, security threats and attacks, simulation tools, and challenges. | Not defined | >65 | 2019 |
| RV04 | Singh et al. [40] | Advanced Security Attacks on Vehicular AD HOC Network (VANET) | It presents security requirements, challenges, attacks, and privacy issues in VANET. | Not defined | Not defined | 2019 |
| RV05 | Azam et al. [41] | An outline of the security challenges in VANET | It informs about security attacks and solutions. | Not defined | 6 | 2020 |
| RV06 | Kohli et al. [42] | Future Trends of Security and Privacy in Next Generation VANET | It addresses security and privacy issues in next-generation VANET. It also presents solutions for those issues. | Not defined | 11 | 2020 |
| RV07 | Mitsakis et al. [43] | Recent Developments on Security and Privacy of V2V & V2I Communications: A Literature Review | It presents solutions to both the attacks and challenges in a VANET. | Not defined | 15 | 2020 |
| RV08 | Mihai et al. [44] | Security Aspects of Communications in VANETs | It presents relevant proposals for privacy, authentication, and integrity in the context of vehicular networks. | Not defined | 12 | 2020 |
| RV09 | Goyal et al. [45] | Security Attacks, Requirements, and Authentication Schemes in VANET | It provides a classification of attacks, security requirements, and authentication schemes | Not defined | 8 | 2019 |
| N/A | Our review | Security in V2I Communications: A Systematic Literature Review | It informs the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. | Available | 47 | 2022 |