[1]
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer networks, vol. 54, no. 15, pp.2787-2805, 2010.FF
DOI: 10.1016/j.comnet.2010.05.010
Google Scholar
[2]
T. Le, P. Sinha, and D. Xuan, "Turning heterogeneity into an advantage in wireless ad-hoc network routing," Ad Hoc Networks, vol. 8, no. 1, pp.108-118, 2010.
DOI: 10.1016/j.adhoc.2009.06.001
Google Scholar
[3]
I. F. Akyildiz and M. C. Vuran, Wireless sensor networks. John Wiley & Sons, 2010.
Google Scholar
[4]
M. Turkanović, B. Brumen, and M. Hölbl, "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion," Ad Hoc Networks, vol. 20, pp.96-112, 2014.
DOI: 10.1016/j.adhoc.2014.03.009
Google Scholar
[5]
H. Yoo and D. Kim, "Repetition-based cooperative broadcasting for vehicular ad-hoc networks," Computer Communications, vol. 34, no. 15, pp.1870-1882, 2011.
DOI: 10.1016/j.comcom.2011.05.007
Google Scholar
[6]
F. G. Abdulkadhim, Z. Yi, C. Tang, M. Khalid, and S. A. Waheeb, "A Survey on the applications of IoT: an investigation into existing environments, present challenges and future opportunities," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 18, no. 3, pp.1447-1458, 2020.
DOI: 10.12928/telkomnika.v18i3.15604
Google Scholar
[7]
G. De Masi, "The impact of topology on Internet of Things: A multidisciplinary review," in 2018 Advances in Science and Engineering Technology International Conferences (ASET), 2018: IEEE, pp.1-6.
DOI: 10.1109/icaset.2018.8376837
Google Scholar
[8]
Saoud, B., et al., Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey. ICT Express, 2024.
DOI: 10.1016/j.icte.2024.05.008
Google Scholar
[9]
Muslam, M.M.A., Enhancing security in vehicle-to-vehicle communication: a comprehensive review of protocols and techniques. Vehicles, 2024. 6(1): pp.450-467.
DOI: 10.3390/vehicles6010020
Google Scholar
[10]
Abdulkadhim FG, Yi Z, Tang C, Khalid M, Waheeb SA. A Survey on the applications of IoT: an investigation into existing environments, present challenges and future opportunities. TELKOMNIKA (Telecommunication Computing Electronics and Control). 2020 Jun 1;18(3):1447-58..
DOI: 10.12928/telkomnika.v18i3.15604
Google Scholar
[11]
G. Zhao, X. Si, J. Wang, X. Long, and T. Hu, "A novel mutual authentication scheme for Internet of Things," in Proceedings of 2011 international conference on modelling, identification and control, 2011: IEEE, pp.563-566.
DOI: 10.1109/icmic.2011.5973767
Google Scholar
[12]
X. Zeng, S. K. Garg, P. Strazdins, P. P. Jayaraman, D. Georgakopoulos, and R. Ranjan, "IOTSim: A simulator for analysing IoT applications," Journal of Systems Architecture, vol. 72, pp.93-107, 2017.
DOI: 10.1016/j.sysarc.2016.06.008
Google Scholar
[13]
N. Kouzayha, Z. Dawy, J. G. Andrews, and H. ElSawy, "Joint downlink/uplink RF wake-up solution for IoT over cellular networks," IEEE Transactions on Wireless Communications, vol. 17, no. 3, pp.1574-1588, 2017.
DOI: 10.1109/twc.2017.2781696
Google Scholar
[14]
C. M. Sosa-Reyna, E. Tello-Leal, and D. Lara-Alabazares, "Methodology for the model-driven development of service oriented IoT applications," Journal of Systems Architecture, vol. 90, pp.15-22, 2018.
DOI: 10.1016/j.sysarc.2018.08.008
Google Scholar
[15]
R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, "VANET security surveys," Computer Communications, vol. 44, pp.1-13, 2014.
DOI: 10.1016/j.comcom.2014.02.020
Google Scholar
[16]
J. Contreras-Castillo, S. Zeadally, and J. A. Guerrero-Ibañez, "Internet of vehicles: architecture, protocols, and security," IEEE internet of things Journal, vol. 5, no. 5, pp.3701-3709, 2017.
DOI: 10.1109/jiot.2017.2690902
Google Scholar
[17]
M. H. Eiza and Q. Ni, "Driving with sharks: Rethinking connected vehicles with vehicle cybersecurity," IEEE Vehicular Technology Magazine, vol. 12, no. 2, pp.45-51, 2017.
DOI: 10.1109/mvt.2017.2669348
Google Scholar
[18]
S. Parkinson, P. Ward, K. Wilson, and J. Miller, "Cyber threats facing autonomous and connected vehicles: Future challenges," IEEE transactions on intelligent transportation systems, vol. 18, no. 11, pp.2898-2915, 2017.
DOI: 10.1109/tits.2017.2665968
Google Scholar
[19]
S. Michel, S. L. Vargo, and R. F. Lusch, "Reconfiguration of the conceptual landscape: a tribute to the service logic of Richard Normann," Journal of the Academy of Marketing Science, vol. 36, no. 1, pp.152-155, 2008.
DOI: 10.1007/s11747-007-0067-8
Google Scholar
[20]
R. F. Lusch and S. Nambisan, "Service innovation," MIS quarterly, vol. 39, no. 1, pp.155-176, 2015.
Google Scholar
[21]
R. F. Lusch, S. L. Vargo, and M. Tanniru, "Service, value networks and learning," Journal of the academy of marketing science, vol. 38, pp.19-31, 2010.
DOI: 10.1007/s11747-008-0131-z
Google Scholar
[22]
M. Benaroch, "Option-Based Management of Risk in Information Systems Planning," in Planning for Information Systems: Routledge, 2015, pp.330-352.
DOI: 10.4324/9781315701745-24
Google Scholar
[23]
L. Da Xu, W. He, and S. Li, "Internet of things in industries: A survey," IEEE Transactions on industrial informatics, vol. 10, no. 4, pp.2233-2243, 2014.
DOI: 10.1109/tii.2014.2300753
Google Scholar
[24]
E. Welbourne et al., "Building the internet of things using RFID: the RFID ecosystem experience," IEEE Internet computing, vol. 13, no. 3, pp.48-55, 2009.
DOI: 10.1109/mic.2009.52
Google Scholar
[25]
G. De Masi and G. Ricchiuti, "From FDI network topology to macroeconomic instability," Journal of Economic Interaction and Coordination, vol. 15, no. 1, pp.133-158, 2020.
DOI: 10.1007/s11403-019-00275-0
Google Scholar
[26]
B. Yao et al., "Applying graph theory to the internet of things," in 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013: IEEE, pp.2354-2361.
DOI: 10.1109/hpcc.and.euc.2013.339
Google Scholar
[27]
T. Kanter, R. Rahmani, and A. Mahmud, "Conceptual framework for internet of things' virtualization via openflow in context-aware networks," arXiv preprint arXiv:1401.7437, 2014.
Google Scholar
[28]
H. Ning and Z. Wang, "Future internet of things architecture: like mankind neural system or social organization framework?," IEEE Communications Letters, vol. 15, no. 4, pp.461-463, 2011.
DOI: 10.1109/lcomm.2011.022411.110120
Google Scholar
[29]
I. Stojmenovic and S. Wen, "The fog computing paradigm: Scenarios and security issues," in 2014 federated conference on computer science and information systems, 2014: IEEE, pp.1-8.
DOI: 10.15439/2014f503
Google Scholar
[30]
M. Aazam and E.-N. Huh, "Fog computing and smart gateway based communication for cloud of things," in 2014 International conference on future internet of things and cloud, 2014: IEEE, pp.464-470.
DOI: 10.1109/ficloud.2014.83
Google Scholar
[31]
P. Sethi and S. R. Sarangi, "Internet of things: architectures, protocols, and applications," Journal of electrical and computer engineering, vol. 2017, 2017.
Google Scholar
[32]
F. G. Abdulkadhim, Z. Yi, A. N. Onaizah, F. Rabee, and A. M. A. Al-Muqarm, "Optimizing the roadside unit deployment mechanism in VANET with efficient protocol to prevent data loss," Wireless Personal Communications, vol. 127, no. 1, pp.815-843, 2022.
DOI: 10.1007/s11277-021-08410-6
Google Scholar
[33]
A. Dua, N. Kumar, and S. Bawa, "A systematic review on routing protocols for vehicular ad hoc networks," Vehicular Communications, vol. 1, no. 1, pp.33-52, 2014.
DOI: 10.1016/j.vehcom.2014.01.001
Google Scholar
[34]
T. Qiu, D. Luo, F. Xia, N. Deonauth, W. Si, and A. Tolba, "A greedy model with small world for improving the robustness of heterogeneous Internet of Things," Computer Networks, vol. 101, pp.127-143, 2016.
DOI: 10.1016/j.comnet.2015.12.019
Google Scholar
[35]
S. Askar, "SDN based 5G VANET: a review," Available at SSRN 3963000, 2021.
Google Scholar
[36]
S. Ali, Exponential Growth of Graph Resolvent, Iranian Journal of Mathematical Chemistry, 12 (3), 187-195, (2021)
Google Scholar
[37]
S. Ali, H. Shelash, Multi-Monad Graph, Italian Journal of Pure and Applied Mathematics, 48, 1174-1180, 2022.
Google Scholar