Results 71 to 80 of about 15,747 (147)

Efficient Pairing-Free Certificateless Authentication Scheme With Batch Verification for Vehicular Ad-Hoc Networks

open access: yesIEEE Access, 2018
The continuous progress of the wireless communication technology provides an intelligent and efficient transportation system through vehicular ad-hoc networks (VANETS) to mitigate traffic jams and road fatalities, which improves safety of passengers and ...
N.B. Gayathri   +3 more
doaj   +1 more source

ECPR: Environment- and Context-aware Combined Power and Rate Distributed Congestion Control for Vehicular Communications

open access: yes, 2016
Safety and efficiency applications in vehicular networks rely on the exchange of periodic messages between vehicles. These messages contain position, speed, heading, and other vital information that makes the vehicles aware of their surroundings.
Aygun, Bengi   +2 more
core   +1 more source

A Machine Learning Approach for Secure Communication Using Blockchain for IoT‐Based VANETs

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This article is based on the Secure Data communication over VANET through 5G communication. The data is handled using the Blockchain secure mechanism and Decision making is possible using Machine Learning. ABSTRACT Vehicular ad hoc networks (VANETs) have a dynamic topology. This nature makes them highly susceptible to security attacks. It also leads to
Jarallah Alqahtani   +3 more
wiley   +1 more source

A Review of Deep Learning‐Based Medical Image Segmentation

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
Comprehensive overview of supervised medical image segmentation using deep learning. Summary of technological innovations and empirical results. Exploration of future research directions for deep learning‐based medical image segmentation. ABSTRACT Medical image segmentation, the process of precisely delineating regions of interest (e.g. organs, lesions,
Xinyue Zhang   +3 more
wiley   +1 more source

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Communication patterns in VANETs [PDF]

open access: yesIEEE Communications Magazine, 2008
Vehicular networks are a very promising technology to increase traffic safety and efficiency, and to enable numerous other applications in the domain of vehicular communication. Proposed applications for VANETs have very diverse properties and often require nonstandard communication protocols.
Elmar Schoch, Frank Kargl, Michael Weber
openaire   +1 more source

A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud‐Edge Environments

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation. However, the security issues of open channel transmission in IoT still persist. Researchers have proposed a lot
Xiong Wang   +5 more
wiley   +1 more source

Comunicação segura em VANET

open access: yesAnais da XIX Escola Regional de Redes de Computadores (ERRC 2021), 2021
No contexto das redes VANETs, sobretudo considerando suas aplicabilidades, é de fundamental importância a comunicação entre os dispositivos ser realizada em um meio seguro e sem a interferência de dispositivos externos à essa comunicação. Este artigo apresenta a implementação de uma comunicação segura através de módulos RF, utilizando uma biblioteca de
João L. M. Freitas   +3 more
openaire   +2 more sources

Detection of malicious data in vehicular ad-hoc networks for traffic signal control applications

open access: yes, 2016
Effective applications of vehicular ad hoc networks in traffic signal control require new methods for detection of malicious data. Injection of malicious data can result in significantly decreased performance of such applications, increased vehicle ...
Bernas, Marcin, Placzek, Bartlomiej
core   +1 more source

Design of Linkable Ring Signature Scheme Based on the MP‐LWE Problem and Its Application in IoV

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks. This article designs an efficient linkable ring signature (LRS) scheme on the basis of the middle‐product learning with errors (MP‐LWE) problem and applies it to vehicular ...
Lansheng Han   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy