{"id":"https://openalex.org/W3095730025","doi":"https://doi.org/10.23919/softcom50211.2020.9238259","title":"Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks","display_name":"Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks","publication_year":2020,"publication_date":"2020-09-17","ids":{"openalex":"https://openalex.org/W3095730025","doi":"https://doi.org/10.23919/softcom50211.2020.9238259","mag":"3095730025"},"language":"en","primary_location":{"id":"doi:10.23919/softcom50211.2020.9238259","is_oa":false,"landing_page_url":"https://doi.org/10.23919/softcom50211.2020.9238259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070330391","display_name":"Sihem Baccari","orcid":"https://orcid.org/0000-0002-7979-4864"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sihem Baccari","raw_affiliation_strings":["Unit\u00e9 de Recherche Hatem Bettahar, IResCoMath, Gabes, Tunisie"],"affiliations":[{"raw_affiliation_string":"Unit\u00e9 de Recherche Hatem Bettahar, IResCoMath, Gabes, Tunisie","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068104494","display_name":"Haifa Touati","orcid":"https://orcid.org/0000-0002-8391-3061"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haifa Touati","raw_affiliation_strings":["Unit\u00e9 de Recherche Hatem Bettahar, IResCoMath, Gabes, Tunisie"],"affiliations":[{"raw_affiliation_string":"Unit\u00e9 de Recherche Hatem Bettahar, IResCoMath, Gabes, Tunisie","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087382811","display_name":"Mohamed Hadded","orcid":"https://orcid.org/0000-0003-2294-2237"},"institutions":[{"id":"https://openalex.org/I4210108314","display_name":"VeDeCoM Institute","ror":"https://ror.org/01ssrp339","country_code":"FR","type":"facility","lineage":["https://openalex.org/I4210108314"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mohamed Hadded","raw_affiliation_strings":["Institut VEDECOM 23 bis All\u00e9e des Marronniers, Versailles, France"],"affiliations":[{"raw_affiliation_string":"Institut VEDECOM 23 bis All\u00e9e des Marronniers, Versailles, France","institution_ids":["https://openalex.org/I4210108314"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064401998","display_name":"Paul M\u00fchlethaler","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I117841876","display_name":"Universit\u00e9 Paris-Panth\u00e9on-Assas","ror":"https://ror.org/04qb2qm38","country_code":"FR","type":"education","lineage":["https://openalex.org/I117841876"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Paul Muhlethaler","raw_affiliation_strings":["INRIA Paris 2 Rue Simone IFF, Paris, France"],"affiliations":[{"raw_affiliation_string":"INRIA Paris 2 Rue Simone IFF, Paris, France","institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I117841876"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070330391"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.411,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.6189589,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8492962121963501},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8030973672866821},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5957369804382324},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5389929413795471},{"id":"https://openalex.org/keywords/zone-routing-protocol","display_name":"Zone Routing Protocol","score":0.45461970567703247},{"id":"https://openalex.org/keywords/wireless-routing-protocol","display_name":"Wireless Routing Protocol","score":0.39580631256103516},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.3546685576438904},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3540131449699402},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.17030590772628784},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10052669048309326}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8492962121963501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8030973672866821},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5957369804382324},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5389929413795471},{"id":"https://openalex.org/C189884158","wikidata":"https://www.wikidata.org/wiki/Q8073926","display_name":"Zone Routing Protocol","level":5,"score":0.45461970567703247},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.39580631256103516},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3546685576438904},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3540131449699402},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.17030590772628784},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10052669048309326}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/softcom50211.2020.9238259","is_oa":false,"landing_page_url":"https://doi.org/10.23919/softcom50211.2020.9238259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2003151772","https://openalex.org/W2101167671","https://openalex.org/W2111414907","https://openalex.org/W2594972167","https://openalex.org/W2602750704","https://openalex.org/W2603688380","https://openalex.org/W2625693110","https://openalex.org/W2738656413","https://openalex.org/W2794864288","https://openalex.org/W2899134098","https://openalex.org/W2995754454"],"related_works":["https://openalex.org/W2126842185","https://openalex.org/W2546592407","https://openalex.org/W2011277702","https://openalex.org/W1593279778","https://openalex.org/W3022598921","https://openalex.org/W2544170366","https://openalex.org/W2145414295","https://openalex.org/W3192945866","https://openalex.org/W2035482066","https://openalex.org/W1680412704"],"abstract_inverted_index":{"Recently,":[0],"several":[1,80],"cross-layer":[2,27,97],"protocols":[3],"have":[4],"been":[5],"designed":[6],"for":[7,33],"vehicular":[8,75],"networks":[9,76],"to":[10,41,60,79,115,129,136],"optimize":[11],"data":[12,72],"dissemination":[13,73],"by":[14],"ensuring":[15],"internal":[16],"communications":[17,35],"between":[18],"routing":[19,68],"and":[20,69,103],"MAC":[21,56,70,117],"layers.":[22],"In":[23,84],"this":[24,85],"context,":[25],"a":[26,44],"protocol,":[28],"called":[29],"TDMA-aware":[30],"Routing":[31],"Protocol":[32],"Multi-hop":[34],"(TRPM),":[36],"was":[37],"proposed":[38],"in":[39,74],"order":[40],"efficiently":[42],"select":[43],"relay":[45],"node":[46],"based":[47],"on":[48,66,107],"time":[49],"slot":[50,118],"scheduling":[51,119],"information":[52],"obtained":[53],"from":[54],"the":[55,61,67,89,96,100,116,139],"layer.":[57],"However,":[58],"due":[59],"constant":[62],"evolution":[63],"of":[64,82,99,124,138],"cyber-attacks":[65],"layers,":[71],"is":[77],"vulnerable":[78],"types":[81],"attack.":[83],"paper,":[86],"we":[87],"identify":[88],"different":[90],"attack":[91],"models":[92],"that":[93],"can":[94],"disrupt":[95],"operation":[98],"TRPM":[101],"protocol":[102],"assess":[104],"their":[105],"impact":[106],"performance":[108],"through":[109],"simulation.":[110],"Several":[111],"new":[112],"vulnerabilities":[113,126],"related":[114],"process":[120],"are":[121],"identified.":[122],"Exploiting":[123],"these":[125],"would":[127],"lead":[128],"severe":[130],"channel":[131],"capacity":[132],"wastage":[133],"where":[134],"up":[135],"half":[137],"free":[140],"slots":[141],"could":[142],"not":[143],"be":[144],"reserved.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
