Results 61 to 70 of about 20,677 (249)

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

An Optimized Node Selection Routing Protocol for Vehicular Ad-hoc Networks – A Hybrid Model

open access: yesJournal of Communications Software and Systems, 2015
Vehicular Ad-hoc networks (VANETs) are a subset of Mobile Ad-hoc Networks made by vehicles communicating among themselves on roadways. The Routing protocols implemented for MANETs such as Ad-hoc on Demand Distance Vector Routing Protocol (AODV), Dynamic ...
Thangakumar Jeyaprakash   +1 more
doaj  

Improving QoS in VANET

open access: yesAl-Iraqia Journal for Scientific Engineering Research
 The Vehicular Ad Hoc Network (VANET) is a novel and auspicious performance within the Intelligent Transportation Systems (ITS) field. Numerous scholars endeavoured to enhance the VANETs' Quality of Service (QoS) by creating routing procedures that were
Sukaina Hasan Mousa   +2 more
doaj   +1 more source

A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud‐Edge Environments

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation. However, the security issues of open channel transmission in IoT still persist. Researchers have proposed a lot
Xiong Wang   +5 more
wiley   +1 more source

Design of Linkable Ring Signature Scheme Based on the MP‐LWE Problem and Its Application in IoV

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks. This article designs an efficient linkable ring signature (LRS) scheme on the basis of the middle‐product learning with errors (MP‐LWE) problem and applies it to vehicular ...
Lansheng Han   +3 more
wiley   +1 more source

A Reliable Routing Protocol for Wireless Vehicular Networks [PDF]

open access: yesJournal of Intelligent Procedures in Electrical Technology, 2012
Recently, much attention has been paid to Vehicular Ad hoc Network (VANET). VANETs address direct communication between vehicle-to-vehicle and vehicles to roadside units (RSUs).
Mohsen Madani   +2 more
doaj  

Energy Efficient Adaptive Bit‐Mapping Based Collision‐Free MAC Protocol for VANETs

open access: yesIET Intelligent Transport Systems, Volume 19, Issue 1, January/December 2025.
In the present work, an energy‐efficient medium access control (MAC) protocol is proposed for the adaptive data traffic condition in VANET. The proposed protocol optimizes communication efficiency and energy conservation through a holistic approach that considers the dynamic nature of both the vehicles' energy resources and their data buffering ...
Manoj Tolani   +2 more
wiley   +1 more source

Cross-Layer and SDN Based Routing Scheme for P2P Communication in Vehicular Ad-Hoc Networks

open access: yesApplied Sciences, 2019
Conventional routing protocols proposed for Vehicular Ad-hoc Network (VANET) are usually inefficient and vulnerable for multi-hop data forwarding due to the unavailability of global information and inefficiencies in their route discovering schemes ...
Ziyi You   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy