Proceedings of International Conference on Applied Innovation in IT
2026/03/31, Volume 14, Issue 1, pp.679-702

A Multidimensional Taxonomy and Systematic Review of Security Threats in VANETs


Dana Kareem Hama, Foad Salem Mubarek and Firas Abdulhameed Abdullatif


Abstract: Vehicular Ad hoc Networks (VANETs) are essential in modern Intelligent Transportation Systems (ITS) by facilitating real-time communication between vehicles and roadside infrastructure to enhance road safety, traffic management, and passenger comfort. But several security issues can arise due to its decentralised and wireless nature. This work comprehensively reviews security attacks and mitigation solutions in VANETs. Research articles were sorted according to communication level, security service, and attack type using a systematic literature review. In contrast to previous assessments that mostly focused on descriptive classifications, this work introduces an integrated multidimensional taxonomy that evaluates attacks via three criteria: impact degree, detectability, and target scope. In addition, the article lays out a model for prioritising security services based on the correlation between attack categories and VANET's five core security principles: non-repudiation, authenticity, availability, integrity, and secrecy. Although VANET security has come a long way, current techniques aren't always scalable, flexible, or compatible with emerging technologies such as edge computing and AI-driven detection systems, according to key findings. Future studies and the creation of VANET systems that are safe, scalable, and robust can be organised around the proposed paradigm.

Keywords: Intelligent Transportation Systems (ITS), VANET Security, Attacks on VANET, Sybil Attack, DoS Attack.

DOI: Under indexing

Download: PDF

References:

  1. H. Amari, Z. A. El Houda, L. Khoukhi, and L. H. Belguith, “Trust Management in Vehicular Ad-Hoc Networks: Extensive Survey,” IEEE Access, vol. 11, no. May, pp. 47659-47680, 2023, [Online]. Available: https://doi.org/10.1109/ACCESS.2023.3268991.
  2. H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, “VANet security challenges and solutions: A survey,” Vehicular Communications, vol. 7, pp. 7-20, 2017, [Online]. Available: https://doi.org/10.1016/j.vehcom.2017.01.002.
  3. A. M. Farooqi, M. A. Alam, S. I. Hassan, and S. M. Idrees, “A Fog Computing Model for VANET to Reduce Latency and Delay Using 5G Network in Smart City Transportation,” Applied Sciences (Switzerland), vol. 12, no. 4, 2022, [Online]. Available: https://doi.org/10.3390/app12042083.
  4. Z. Ghaleb Al-Mekhlafi et al., “Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review,” IEEE Sensors Journal, vol. 24, no. 19, pp. 29575-29602, 2024, [Online]. Available: https://doi.org/10.1109/JSEN.2024.3436612.
  5. M. A. Al-Shareeda, M. Anbar, S. Manickam, A. Khalil, and I. H. Hasbullah, “Security and Privacy Schemes in Vehicular Ad-Hoc Network with Identity-Based Cryptography Approach: A Survey,” IEEE Access, vol. 9, pp. 121522-121531, 2021, [Online]. Available: https://doi.org/10.1109/ACCESS.2021.3109264.
  6. M. Noman, M. Iqbal, and A. Manzoor, “A survey on detection and prevention of web vulnerabilities,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 6, pp. 521-540, 2020, [Online]. Available: https://doi.org/10.14569/IJACSA.2020.0110665.
  7. S. Babu, I. Ghosh, and B. S. Manoj, “Effort: A New Metric for Roadside Unit Placement in 5G Enabled Vehicular Networks,” 2020 IEEE 3rd 5G World Forum (5GWF), pp. 263-268, 2020, [Online]. Available: https://doi.org/10.1109/5GWF49715.2020.9221228.
  8. M. J. N. Mahi, S. Chaki, E. Humayun, H. Imran, A. Barros, and M. Whaiduzzaman, “A Review on VANET Security: Future Challenges and Open Issues,” Indonesian Journal of Electrical Engineering and Informatics, vol. 11, no. 1, pp. 180-193, 2023, [Online]. Available: https://doi.org/10.52549/IJEEI.V11I1.4295.
  9. Y. Amol Rathod et al., “Energy Meter Tamper Detection and Alert Messaging System,” International Journal of Technology Engineering Arts Mathematics Science, vol. 1, no. 2, pp. 2583-1224, 2022, [Online]. Available: https://doi.org/10.11591/eei.v9i3.xxxx.
  10. S. A. Jan, N. U. Amin, M. Othman, M. Ali, A. I. Umar, and A. Basir, “A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues,” IEEE Access, vol. 9, pp. 153701-153726, 2021, [Online]. Available: https://doi.org/10.1109/ACCESS.2021.3125521.
  11. S. Ajjaj, S. El Houssaini, M. Hain, and M. A. El Houssaini, “A New Multivariate Approach for Real Time Detection of Routing Security Attacks in VANETs,” Information (Switzerland), vol. 13, no. 6, pp. 1-19, 2022, [Online]. Available: https://doi.org/10.3390/info13060282.
  12. A. K. Goyal et al., “A Comprehensive Cost Analysis of Intra-Domain Handoff with Authentication Cost in PMIPv6 for Vehicular Ad Hoc Networks (VANETs),” Electronics (Switzerland), vol. 11, no. 10, 2022, [Online]. Available: https://doi.org/10.3390/electronics11101625.
  13. M. U. Ghazi, M. A. Khan Khattak, B. Shabir, A. W. Malik, and M. Sher Ramzan, “Emergency Message Dissemination in Vehicular Networks: A Review,” IEEE Access, vol. 8, pp. 38606-38621, 2020, [Online]. Available: https://doi.org/10.1109/ACCESS.2020.2975110.
  14. N. H. Hussein, C. T. Yaw, S. P. Koh, S. K. Tiong, and K. H. Chong, “A Comprehensive Survey on Vehicular Networking: Communications, Applications, Challenges, and Upcoming Research Directions,” IEEE Access, vol. 10, pp. 86127-86180, 2022, [Online]. Available: https://doi.org/10.1109/ACCESS.2022.3198656.
  15. M. Arif, G. Wang, M. Zakirul Alam Bhuiyan, T. Wang, and J. Chen, “A survey on security attacks in VANETs: Communication, applications and challenges,” Vehicular Communications, vol. 19, p. 100179, 2019, [Online]. Available: https://doi.org/10.1016/j.vehcom.2019.100179.
  16. M. M. Hamdi, Y. A. Yussen, and A. S. Mustafa, “Integrity and Authentications for service security in vehicular ad hoc networks (VANETs): A Review,” 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2021, [Online]. Available: https://doi.org/10.1109/HORA52670.2021.9461327.
  17. R. Hussain, F. Hussain, S. Zeadally, and J. Y. Lee, “On the Adequacy of 5G Security for Vehicular Ad Hoc Networks,” IEEE Communications Standards Magazine, vol. 5, no. 1, pp. 32-39, 2021, [Online]. Available: https://doi.org/10.1109/MCOMSTD.001.2000066.
  18. A. Islam, S. Ranjan, A. P. Rawat, and S. Maity, “A comprehensive survey on attacks and security protocols for VANETs,” Lecture Notes in Networks and Systems, vol. 171, pp. 583-595, 2021, [Online]. Available: https://doi.org/10.1007/978-981-33-4543-0_62.
  19. M. Houmer and M. L. Hasnaoui, “A risk and security assessment of VANET availability using attack tree concept,” International Journal of Electrical and Computer Engineering, vol. 10, no. 6, pp. 6039-6044, 2020, [Online]. Available: https://doi.org/10.11591/ijece.v10i6.pp6039-6044.
  20. F. Oberti, “Cybersecurity for future interconnected and smart vehicles,” School of Politecnico di Torino (ScuDo), p. Page 2, 2024.
  21. D. Zelle, C. Plappert, R. Rieke, D. Scheuermann, and C. Krauß, “ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering,” Microprocessors and Microsystems, vol. 90, p. 104461, 2022, [Online]. Available: https://doi.org/10.1016/j.micpro.2022.104461.
  22. A. Aldweesh, A. Derhab, and A. Z. Emam, “Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Systems, vol. 189, p. 105124, 2020, [Online]. Available: https://doi.org/10.1016/j.knosys.2019.105124.
  23. I. Naqvi and A. Chaudhary, “A Systematic Review of the Intrusion Detection Techniques in VANETS,” TEM Journal, vol. 11, no. 2, pp. 900-907, 2022, [Online]. Available: https://doi.org/10.18421/TEM112-51.
  24. A. K. Goyal, G. Agarwal, A. K. Tripathi, and G. Sharma, “Systematic Study of VANET: Applications, Challenges, Threats, Attacks, Schemes and Issues in Research,” 2022, [Online]. Available: https://doi.org/10.1201/9781003097198-3.
  25. K. Vamshi Krishna and K. Ganesh Reddy, “Classification of Distributed Denial of Service Attacks in VANET: A Survey,” Wireless Personal Communications, vol. 132, no. 2, 2023, [Online]. Available: https://doi.org/10.1007/s11277-023-10643-6.
  26. M. A. Hezam Al Junaid, A. A. Syed, M. N. Mohd Warip, K. N. Fazira Ku Azir, and N. H. Romli, “Classification of Security Attacks in VANET: A Review of Requirements and Perspectives,” MATEC Web of Conferences, vol. 150, 2018, [Online]. Available: https://doi.org/10.1051/matecconf/201815006038.
  27. M. A. Elsadig et al., “Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks,” World Electric Vehicle Journal, vol. 16, no. 6, pp. 1-29, 2025, [Online]. Available: https://doi.org/10.3390/wevj16060324.
  28. W. El-Shafai, A. T. Azar, and S. Ahmed, “AI-Driven Ensemble Classifier for Jamming Attack Detection in VANETs to Enhance Security in Smart Cities,” IEEE Access, vol. PP, p. 1, 2025, [Online]. Available: https://doi.org/10.1109/ACCESS.2025.3552544.
  29. R. Hussain, “Integration of VANET and 5G Security: A review of design and implementation issues,” Future Generation Computer Systems, vol. 101, pp. 843-864, 2019, [Online]. Available: https://doi.org/10.1016/j.future.2019.07.006.
  30. I. Naqvi and A. Chaudhary, “Intrusion Detection in VANETs: A Review,” 9th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO), 2021, [Online]. Available: https://doi.org/10.1109/ICRITO51393.2021.9596141.
  31. C. Huang, M. Yao, X. Wang, Q. Gan, and Y. Lin, “An Improved and Privacy-Preserving Mutual Authentication Scheme,” Security and Communication Networks, 2021, [Online]. Available: https://doi.org/10.1155/2021/6698099.
  32. B. K. Soujanya and F. Azam, “Ensuring Security and Privacy in VANET: A Comprehensive Survey of Authentication Approaches,” Journal of Computer Networks and Communications, vol. 2024, no. 1, 2024, [Online]. Available: https://doi.org/10.1155/2024/1818079.
  33. I. A. Sumra, A. Abdullah, I. Ahmad, and A. Alghamdi, “Towards improving security in VANET: Some new possible attacks and their possible solutions,” Journal of Internet Technology, vol. 17, no. 4, pp. 821-829, 2016, [Online]. Available: https://doi.org/10.6138/JIT.2016.17.4.20160501c.
  34. D. Ramsamooj, P. Sharma, and H. Liu, “GenVRAM: Dataset Generator for Vehicle to Roadside Attacks and Misbehavior,” IEEE Access, vol. 12, pp. 86176-86193, 2024, [Online]. Available: https://doi.org/10.1109/ACCESS.2024.3416840.
  35. M. Hasan, S. Mohan, T. Shimizu, and H. Lu, “Securing Vehicle-to-Everything (V2X) Communication Platforms,” IEEE Transactions on Intelligent Vehicles, vol. 5, no. 4, pp. 693-713, 2020, [Online]. Available: https://doi.org/10.1109/TIV.2020.2987430.
  36. S. Gyawali, Y. Qian, and R. Q. Hu, “Machine Learning and Reputation Based Misbehavior Detection in Vehicular Communication Networks,” IEEE Transactions on Vehicular Technology, vol. 69, no. 8, pp. 8871-8885, 2020, [Online]. Available: https://doi.org/10.1109/TVT.2020.2996620.
  37. I. A. Sumra, H. Bin Hasbullah, and J. L. Bin AbManan, “Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey,” Advances in Intelligent Systems and Computing, vol. 306, pp. 51-61, 2015, [Online]. Available: https://doi.org/10.1007/978-981-287-158-9_5.
  38. S. Gillani, F. Shahzad, A. Qayyum, and A. Mehmood, “A Survey on Security in Vehicular Ad Hoc Networks: Major Security Threats in VANETs,” pp. 59-74, 2013, [Online]. Available: https://doi.org/10.1007/978-3-642-37974-1_5.
  39. N. C. Velayudhan, A. Anitha, and M. Madanan, “Sybil Attack with RSU Detection and Location Privacy in Urban VANETs: An Efficient EPORP Technique,” Wireless Personal Communications, vol. 122, no. 4, pp. 3573-3601, 2022, [Online]. Available: https://doi.org/10.1007/s11277-021-09102-x.
  40. R. Hostak and I. Baronak, “Security in VANET,” pp. 0-20, 2023.
  41. Y. Khayati and T. Mazri, “Security study of routing attacks in vehicular AD-HOC networks (VANETs),” ISPRS Archives, vol. 44, no. 4/W3, pp. 267-272, 2020, [Online]. Available: https://doi.org/10.5194/isprs-archives-XLIV-4-W3-2020-267-2020.
  42. A. Anwar, A. Anwar, L. Moukahal, and M. Zulkernine, “Security assessment of in-vehicle communication protocols,” Vehicular Communications, vol. 44, p. 100639, 2023, [Online]. Available: https://doi.org/10.1016/j.vehcom.2023.100639.
  43. M. A. R. Baee, L. Simpson, E. Foo, and J. Pieprzyk, “The Security of ‘2FLIP’ Authentication Scheme for VANETs: Attacks and Rectifications,” IEEE Open Journal of Vehicular Technology, vol. 4, pp. 101-113, 2023, [Online]. Available: https://doi.org/10.1109/OJVT.2022.3217552.
  44. T. Pavithra and B. S. Nagabhushana, “A Survey on Security in VANETs,” 2nd International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 881-889, 2020, [Online]. Available: https://doi.org/10.1109/ICIRCA48905.2020.9182823.
  45. A. Quyoom, A. A. Mir, and A. Sarwar, “Security Attacks and Challenges of VANETs: A Literature Survey,” Journal of Multimedia Information System, vol. 7, no. 1, pp. 45-54, 2020, [Online]. Available: https://doi.org/10.33851/jmis.2020.7.1.45.
  46. K. V. Krishna and K. G. Reddy, “VANET Vulnerabilities Classification and Countermeasures: A Review,” Majlesi Journal of Electrical Engineering, vol. 16, no. 3, pp. 63-83, 2022, [Online]. Available: https://doi.org/10.52547/mjee.16.3.63.
  47. H. Setia et al., “Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments,” Cyber Security and Applications, vol. 2, p. 100037, 2024, [Online]. Available: https://doi.org/10.1016/j.csa.2024.100037.
  48. S. Tanwar, J. Vora, S. Tyagi, N. Kumar, and M. S. Obaidat, “A systematic review on security issues in vehicular ad hoc network,” Security and Privacy, vol. 1, no. 5, pp. 1-26, 2018, [Online]. Available: https://doi.org/10.1002/spy2.39.
  49. K. Singh and S. Sharma, “Advanced Security Attacks on Vehicular AD HOC Network (VANET),” International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 2, pp. 3057-3064, 2019, [Online]. Available: https://doi.org/10.35940/ijitee.b7687.129219.
  50. V. Nampally and M. R. Sharma, “A Survey on Security Attacks for VANET,” Security Challenges, vol. 5, no. 10, 2017.
  51. A. C. Ali Hussein and A. K. Elhajj, “Fourth International Conference on Software Defined Systems (SDS), Valencia, Spain, 8-11 May 2017,” pp. 67-74, 2020.
  52. M. Arif et al., “Applied sciences and challenges,” Applied Sciences, vol. 10, no. 9, 2020.
  53. S. A. Soleymani, S. Goudarzi, M. H. Anisi, M. Zareei, A. H. Abdullah, and N. Kama, “A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET,” Vehicular Communications, vol. 29, p. 100335, 2021, [Online]. Available: https://doi.org/10.1016/j.vehcom.2021.100335.
  54. T. Nandy, R. Md Noor, R. Kolandaisamy, M. Y. I. Idris, and S. Bhattacharyya, “A review of security attacks and intrusion detection in the vehicular networks,” Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 2, p. 101945, 2024, [Online]. Available: https://doi.org/10.1016/j.jksuci.2024.101945.
  55. N. Phull and P. Singh, “A review on security issues in VANETs,” 6th International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1084-1088, 2019.
  56. Z. Lu, G. Qu, and Z. Liu, “A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy,” IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 2, pp. 760-776, 2019, [Online]. Available: https://doi.org/10.1109/TITS.2018.2818888.
  57. G. Mahalakshmi et al., “Machine Learning based Feature Selection for Intrusion Detection System in VANET,” ResearchGate, 2021.
  58. T. Ismail et al., “A Comprehensive Survey on Vehicular Communication Security,” Journal of Cyber Security and Mobility, vol. 13, no. 5, pp. 1007-1038, 2024, [Online]. Available: https://doi.org/10.13052/jcsm2245-1439.1359.
  59. A. Mchergui, T. Moulahi, and S. Zeadally, “Survey on Artificial Intelligence (AI) techniques for Vehicular Ad-hoc Networks (VANETs),” Vehicular Communications, vol. 34, p. 100403, 2022, [Online]. Available: https://doi.org/10.1016/j.vehcom.2021.100403.
  60. R. Sultana, J. Grover, and M. Tripathi, “Intelligent defense strategies: Comprehensive attack detection in VANET with deep reinforcement learning,” Pervasive and Mobile Computing, vol. 103, p. 101962, 2024, [Online]. Available: https://doi.org/10.1016/j.pmcj.2024.101962.
  61. M. A. Abdelmaguid, H. S. Hassanein, and M. Zulkernine, “Securing the unforeseen: Enhancing VANET security with dynamic honeypots and attack rate analysis,” Vehicular Communications, vol. 55, p. 100946, 2025, [Online]. Available: https://doi.org/10.1016/j.vehcom.2025.100946.
  62. D. Balta, Ü. Çavuşoğlu, and M. Balta, “A Comprehensive Survey On Machine Learning-Based Intrusion Detection System for Vehicular Area Network Architectures,” Düzce Üniversitesi Bilim ve Teknoloji Dergisi, vol. 12, no. 3, pp. 1536-1556, 2024, [Online]. Available: https://doi.org/10.29130/dubited.1372131.
  63. A. Hankins, T. Das, S. Sengupta, and D. Feil-Seifer, “Eyes on the Road: A Survey on Cyber Attacks and Defense Solutions for Vehicular Ad-Hoc Networks,” IEEE Computing and Communication Workshop and Conference (CCWC), pp. 585-592, 2023, [Online]. Available: https://doi.org/10.1109/CCWC57344.2023.10099187.
  64. J. Liang, M. S. Sheikh, and W. Wang, “A survey of security services, attacks, and applications for vehicular ad hoc networks (VANETs),” Sensors (Switzerland), vol. 19, no. 16, 2019, [Online]. Available: https://doi.org/10.3390/s19163589.
  65. H. Kim and J. M. Chung, “VANET jamming and adversarial attack defense for autonomous vehicle safety,” Computers, Materials and Continua, vol. 71, no. 2, pp. 3589-3605, 2022, [Online]. Available: https://doi.org/10.32604/cmc.2022.023073.
  66. Y. Huang and M. Ma, “ILL-IDS: An incremental lifetime learning IDS for VANETs,” Computers & Security, vol. 124, p. 102992, 2023, [Online]. Available: https://doi.org/10.1016/j.cose.2022.102992.
  67. S. Hakak et al., “Autonomous vehicles in 5G and beyond: A survey,” Vehicular Communications, vol. 39, pp. 1-34, 2022, [Online]. Available: https://doi.org/10.1016/j.vehcom.2022.100551.
  68. M. Arif et al., “Applied sciences and challenges,” Applied Sciences, vol. 10, no. 9, 2020.
  69. T. Nandy, R. Md Noor, R. Kolandaisamy, M. Y. I. Idris, and S. Bhattacharyya, “A review of security attacks and intrusion detection in the vehicular networks,” Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 2, p. 101945, 2024, [Online]. Available: https://doi.org/10.1016/j.jksuci.2024.101945.
  70. S. H. A. Kazmi, F. Qamar, R. Hassan, K. Nisar, and B. S. Chowdhry, “Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions,” Wireless Personal Communications, vol. 130, no. 4, pp. 2753-2800, 2023, [Online]. Available: https://doi.org/10.1007/s11277-023-10402-7.
  71. T. Mekki, I. Jabri, A. Rachedi, and L. Chaari, “Software-defined networking in vehicular networks: A survey,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 10, pp. 1-29, 2021, [Online]. Available: https://doi.org/10.1002/ett.4265.


    HOME

       - Conference
       - Journal
       - Paper Submission to Conference
       - Paper Submission to Journal
       - Fee Payment
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceeding


    PROCEEDINGS

       - Volume 14, Issue 1 (ICAIIT 2026)
       - Volume 13, Issue 5 (ICAIIT 2025)
       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    LAST CONFERENCE

       ICAIIT 2026
         - Photos
         - Reports

    PAST CONFERENCES

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.