References
- Raya, M., & Hubaux, J. The security of vehicular ad hoc networks. In Proceedings of the 3rdACM workshop on the security of ad hoc and sensor networks, SASN-2005, pp. 1–11 (2005).
- Nayyar, A., & Singh, R. A comprehensive review of simulation tools for wireless sensor networks (WSNs). Journal of Wireless Networking and Communications, 5(1), 19-47 (2015).
- Dhaka, V. S., Poonia, R. C., & Raja, L. The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 5(2), 1 (2014).
- Dhaka, V. S., Poonia, R. C., & Raja, L. A literature review on dedicated short range communication for intelligent transport. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 3(9), 1066-1071 (2013).
- He, Y., Yu, F. R., Wei, Z., & Leung, V. Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Networks, 86, pp. 154-165 (2019). doi: 10.1016/j.adhoc.2018.11.006
- Yao, X., Zhang, X., Ning, H., & Li, P. Using trust model to ensure reliable data acquisition in VANETs, Ad Hoc Networks, 55, pp. 107-118 (2017). doi: 10.1016/j.adhoc.2016.10.011
- Salehi, Mahmood, Azzedine Boukerche, and Amir Darehshoorzadeh. Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks,Ad Hoc Networks, 50: pp. 88-101 (2016). doi: 10.1016/j.adhoc.2016.07.004
- Singh, V., Poonia, R. C., Raja, L., Sharma, G., & Trivedi, N. K. Source Redundancy Management and Host Intrusion Detection in Wireless Sensor Networks. Recent Patents on Computer Science, 12(1) (2019).
- Raksha Mehra, Gourav Shrivastava, Amrit Suman, NAODV A Routing Protocol to Prevent Wormhole Attack in Ad-hoc Network, HCTL Open Int. J. of Technology Innovations and Research, Volume 3, e-ISSN: 2321-1814 (2013), ISBN (Print): 978-1-62776-443-8.
- Kaushik, Ramesh C. Poonia & Sunil Kumar Khatri. Comparative study of various protocols of DDS, Journal of Statistics and Management Systems, 20:4, pp. 647-658 (2017), DOI: 10.1080/09720510.2017.1395184
- Ramesh C. Poonia (2018). Integration of traffic and network simulators for vehicular ad-hoc networks, Journal of Information and Optimization Sciences, 39:7, pp. 1583-1589, DOI: 10.1080/02522667.2017.1406580
- Manish Kumar, Vanita Jain, Achin Jain, Uttam Singh Bisht & Neha Gupta. Evaluation of black hole attack with avoidance scheme using AODV protocol in VANET, Journal of Discrete Mathematical Sciences and Cryptography, 22:2, pp. 277-291 (2019). doi: 10.1080/09720529.2019.1585635
- Gupta, S., Poonia, R. C., Singh, V., & Raja, L. Tier Application in Multi-Cloud Databases to Improve Security and Service Availability. In Handbook of Research on Cloud Computing and Big Data Applications in IoT (pp. 82-93) (2019). IGI Global.
- Mr.Ankit Kumar, Dr.Dinesh Goyal, Mr.Pankaj Dadheech, A Novel Framework for Performance Optimization of Routing Protocol in VANET Network, Journal of Advanced Research in Dynamical & Control Systems, Vol. 10, 02-Special Issue, 2018, pp-2110-2121 (2018). ISSN: 1943-023X.