Results 81 to 90 of about 51,839 (288)

A Hybrid Approach for Optimal Cluster Head Selection in Diverse VANETs Using Fuzzy Logic, Moth Flame Optimization, and Machine Learning

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this paper, we propose a method for routing and optimal CH selection among all. In each cycle and across all VANETs with different topologies, various Vs features are first collected, and then using a heuristic method, the FIS, the OFF value of all Vs is calculated to determine the optimal CHs.
Mosayeb Soleymaninasab   +2 more
wiley   +1 more source

T-Coin: Dynamic Traffic Congestion Pricing System for the Internet of Vehicles in Smart Cities

open access: yesInformation, 2020
Alleviating traffic congestion is one of the main challenges for the Internet of Vehicles (IoV) in smart cities. Many congestion pricing systems have been proposed recently.
Nyothiri Aung   +3 more
doaj   +1 more source

A Machine Learning Approach for Secure Communication Using Blockchain for IoT‐Based VANETs

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This article is based on the Secure Data communication over VANET through 5G communication. The data is handled using the Blockchain secure mechanism and Decision making is possible using Machine Learning. ABSTRACT Vehicular ad hoc networks (VANETs) have a dynamic topology. This nature makes them highly susceptible to security attacks. It also leads to
Jarallah Alqahtani   +3 more
wiley   +1 more source

Proactive certificate validation for VANETs [PDF]

open access: yes2016 IEEE Vehicular Networking Conference (VNC), 2016
Security and privacy in Vehicular Ad-hoc Networks (VANETs) mandates use of short-lived credentials (pseudonyms) and cryptographic key pairs. This implies significant computational overhead for vehicles, needing to validate often numerous such pseudonyms within a short period.
Jin, Hongyu, Papadimitratos, Panagiotis
openaire   +3 more sources

A Review of Deep Learning‐Based Medical Image Segmentation

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
Comprehensive overview of supervised medical image segmentation using deep learning. Summary of technological innovations and empirical results. Exploration of future research directions for deep learning‐based medical image segmentation. ABSTRACT Medical image segmentation, the process of precisely delineating regions of interest (e.g. organs, lesions,
Xinyue Zhang   +3 more
wiley   +1 more source

Trusted FPGA‐based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles

open access: yesIET Networks, 2019
Internet of Things assisted vehicular ad‐hoc network VANET (I‐VANET) is one of the preferred technologies to provide fast and reliable communication in smart transportation systems.
Ahilan Appathurai   +2 more
doaj   +1 more source

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Local density estimation for VANETs [PDF]

open access: yes2016 Global Information Infrastructure and Networking Symposium (GIIS), 2016
Local vehicle density estimation is an integral part of various applications of Vehicular Ad-hoc Networks (VANETs) such as congestion control and congestion traffic estimation. Currently, many applications use beacons to estimate this density. However, many studies show that the reception rate of these beacons can significantly drop at short distances ...
Haouari, Noureddine   +3 more
openaire   +2 more sources

A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud‐Edge Environments

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation. However, the security issues of open channel transmission in IoT still persist. Researchers have proposed a lot
Xiong Wang   +5 more
wiley   +1 more source

VANET Security and Privacy - An Overview [PDF]

open access: yesInternational Journal of Network Security & Its Applications, 2018
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise many challenges where the security and privacy concerns are the most critical ones. In this paper, we provide a detailed overview of the state-of-the-art security and privacy requirements in VANET.
Marvy B. Mansour   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy