Results 41 to 50 of about 15,747 (147)

Towards low-delay and high-throughput cognitive radio vehicular networks

open access: yesICT Express, 2017
Cognitive Radio Vehicular Ad-hoc Networks (CR-VANETs) exploit cognitive radios to allow vehicles to access the unused channels in their radio environment.
Nada Elgaml   +2 more
doaj   +1 more source

Comprehensive Review on Misbehavior Detection for Vehicular Ad Hoc Networks

open access: yesJournal of Advanced Transportation, 2022
Vehicular ad hoc networks (VANETs) can increase road safety and comfort. It needs strong demand for security because the data sent in VANETs influence vehicles’ behavior. Existing studies have summarized VANET security, challenge, and attacks. This study
Xiaoya Xu, Yunpeng Wang, Pengcheng Wang
doaj   +1 more source

DSDV, DYMO, OLSR: Link Duration and Path Stability

open access: yes, 2012
In this paper, we evaluate and compare the impact of link duration and path stability of routing protocols; Destination Sequence Distance vector (DSDV), Dynamic MANET On- Demand (DYMO) and Optimized Link State Routing (OLSR) at different number of ...
Bibi, A.   +5 more
core   +1 more source

FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs

open access: yesApplied Sciences, 2023
Vehicular ad hoc networks (VANETs) are used for vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. They are a special type of mobile ad hoc networks (MANETs) that can share useful information to improve road traffic and safety ...
Sara Amaouche   +6 more
doaj   +1 more source

A topology-oblivious routing protocol for NDN-VANETs

open access: yes, 2018
Vehicular Ad Hoc Networks (VANETs) are characterized by intermittent connectivity, which leads to failures of end-to-end paths between nodes. Named Data Networking (NDN) is a network paradigm that deals with such problems, since information is forwarded ...
Braun, Torsten   +2 more
core   +1 more source

Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain [PDF]

open access: yes, 2019
Unmanned aerial vehicles (UAVs) can support surveillance even in areas without network infrastructure. However, UAV networks raise security challenges because of its dynamic topology.
García-Magariño, I.   +3 more
core   +2 more sources

Enhancement in Performance Metrics for Mobile Ad Hoc Networks (MANETs) Using Hybrid Ant Lion Optimization (HALO) Algorithm

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
Mobile ad hoc networks (MANETs) are constantly confronted with issues including variable quality of service (QoS) metrics, route optimization, and flexible topology. Here, a novel hybrid ant lion optimization (HALO) algorithm is proposed that integrates the cooperative foraging behavior of ant colonies from ant colony optimization and the hunting ...
Aparna P. More   +3 more
wiley   +1 more source

A survey of local/cooperative-based malicious information detection techniques in VANETs

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
Vehicular ad hoc networks (VANETs) are emerged technology where vehicles and roadside units (RSUs) communicate with each other. VANETs can be categorized as a subbranch of mobile ad hoc networks (MANETs).
Muhammad Arshad   +5 more
doaj   +1 more source

Emergency response vehicle routing allowing lane straddling in congested traffic conditions under connected and autonomous vehicle environment

open access: yesComputer-Aided Civil and Infrastructure Engineering, Volume 40, Issue 31, Page 6552-6576, 29 December 2025.
Abstract Routing an emergency response vehicle (ERV) is essential to sustain the society and save people in high risk. ERV must have top priority on highways to pass through without interference with other non‐ERVs. Congested road traffic conditions, however, might not allow for such a priority.
Jiyoung Kim, Keemin Sohn
wiley   +1 more source

Proactive certificate validation for VANETs [PDF]

open access: yes2016 IEEE Vehicular Networking Conference (VNC), 2016
Security and privacy in Vehicular Ad-hoc Networks (VANETs) mandates use of short-lived credentials (pseudonyms) and cryptographic key pairs. This implies significant computational overhead for vehicles, needing to validate often numerous such pseudonyms within a short period.
Jin, Hongyu, Papadimitratos, Panagiotis
openaire   +3 more sources

Home - About - Disclaimer - Privacy