Results 91 to 100 of about 28,898 (235)

A New Framework for Secure Routing in VANET [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2018
Background and Objectives: Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by ...
S. Goli-Bidgoli, M. SofarAli
doaj   +1 more source

Smart cross‐layer approach to multi‐access terrestrial and non‐terrestrial networks (NTNs): Real‐time mobile‐health use case

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 18, December 2024.
Delivering healthcare in remote rural regions using vehicular communications has become increasingly important. This paper presents a smart multi‐access approach combining terrestrial and non‐terrestrial networks (NTNs) for real‐time video streaming to enhancing healthcare services.
Hana Elhachi   +4 more
wiley   +1 more source

Key technology of VANET in terminal-management-cloud model

open access: yesDianxin kexue, 2016
With the increasing of traffic problems,such as traffic congestion,intelligent transportation system(ITS)becomes an effective way to solve the increasing transportation issues of the current traffic.Vehicular Ad Hoc networks(VANET)and vehicles as ...
Junhui ZHAO   +3 more
doaj   +2 more sources

Exploring Analytical Model to Performance Optimization for Mobile Application Using End-to-End Network Slicing in Cloud-Based Vehicular Networks

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2019
Today, many large usages of cloud-based vehicular networks and applications have rapidly increased. This rapid increase causes the requirement of systems to be reliable to share their resources without delay in order to ensure a better quality of service
Yonal Kırsal
doaj   +1 more source

Trust Models in VANETs [PDF]

open access: yesJournal of Electronics and Information Science, 2017
The paper introduces trust models in VANETs. A vehicle is able to identify facticity of messages that are received by using a trust model. Models are generally divided into three categories, which are entity-oriented models, data-oriented models and combined models.
openaire   +2 more sources

Mobile Cloud Computing Paradigm: A Survey of Operational Concerns, Challenges and Open Issues

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 35, Issue 12, December 2024.
This survey on mobile cloud computing provides a critical analysis of the operational concerns, challenges, and open issues of this paradigm, highlighting its potential to revolutionize mobile computing and IoT. The work offers new research directions and valuable insights for the scientific community.
Higinio Mora   +3 more
wiley   +1 more source

HYBRID SIMULATION NETWORK FOR VEHICULAR AD HOC NETWORK (VANET)

open access: yesICTACT Journal on Communication Technology, 2018
Intelligent Transportation Systems (ITS) plays a vital role in providing different means of traffic management and enables users to be better informed of traffic condition, promoting safer, coordinated and efficient use of transport network. Vehicular Ad
Chun Hoe Lee   +4 more
doaj   +1 more source

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

open access: yes, 2017
The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges.
Boualouache, Abdelwahab   +2 more
core   +2 more sources

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Delay management for heterogeneous traffic in vehicular sensor networks using packet fragmentation of low priority data

open access: yesIET Communications, Volume 18, Issue 20, Page 1753-1764, December 2024.
The paper presents performance analysis of MAC protocol for vehicular sensor networks. The protocol FROG‐MAC takes a unique approach of fragmenting the lower priority data, so data of higher priority should be transmitted first, ensuring safety of people and infrastructure.
Anwar Ahmed Khan   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy