Results 71 to 80 of about 10,369 (193)

A Machine Learning Approach for Secure Communication Using Blockchain for IoT‐Based VANETs

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This article is based on the Secure Data communication over VANET through 5G communication. The data is handled using the Blockchain secure mechanism and Decision making is possible using Machine Learning. ABSTRACT Vehicular ad hoc networks (VANETs) have a dynamic topology. This nature makes them highly susceptible to security attacks. It also leads to
Jarallah Alqahtani   +3 more
wiley   +1 more source

Development of a Low Mobility IEEE 802.15.4 Compliant VANET System for Urban Environments

open access: yesSensors, 2013
The use of Vehicular Ad-Hoc Networks (VANETs) is growing nowadays and it includes both roadside-to-vehicle communication (RVC) and inter-vehicle communication (IVC).
Ignacio Raúl Matías   +3 more
doaj   +1 more source

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

A topology-oblivious routing protocol for NDN-VANETs

open access: yes, 2018
Vehicular Ad Hoc Networks (VANETs) are characterized by intermittent connectivity, which leads to failures of end-to-end paths between nodes. Named Data Networking (NDN) is a network paradigm that deals with such problems, since information is forwarded ...
Braun, Torsten   +2 more
core   +1 more source

A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud‐Edge Environments

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation. However, the security issues of open channel transmission in IoT still persist. Researchers have proposed a lot
Xiong Wang   +5 more
wiley   +1 more source

The Dynamics of Vehicular Networks in Urban Environments [PDF]

open access: yes, 2010
Vehicular Ad hoc NETworks (VANETs) have emerged as a platform to support intelligent inter-vehicle communication and improve traffic safety and performance.
Dikaiakos, Marios D.   +2 more
core  

Design of Linkable Ring Signature Scheme Based on the MP‐LWE Problem and Its Application in IoV

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks. This article designs an efficient linkable ring signature (LRS) scheme on the basis of the middle‐product learning with errors (MP‐LWE) problem and applies it to vehicular ...
Lansheng Han   +3 more
wiley   +1 more source

Towards low-delay and high-throughput cognitive radio vehicular networks

open access: yesICT Express, 2017
Cognitive Radio Vehicular Ad-hoc Networks (CR-VANETs) exploit cognitive radios to allow vehicles to access the unused channels in their radio environment.
Nada Elgaml   +2 more
doaj   +1 more source

Energy Efficient Adaptive Bit‐Mapping Based Collision‐Free MAC Protocol for VANETs

open access: yesIET Intelligent Transport Systems, Volume 19, Issue 1, January/December 2025.
In the present work, an energy‐efficient medium access control (MAC) protocol is proposed for the adaptive data traffic condition in VANET. The proposed protocol optimizes communication efficiency and energy conservation through a holistic approach that considers the dynamic nature of both the vehicles' energy resources and their data buffering ...
Manoj Tolani   +2 more
wiley   +1 more source

Detection of malicious data in vehicular ad-hoc networks for traffic signal control applications

open access: yes, 2016
Effective applications of vehicular ad hoc networks in traffic signal control require new methods for detection of malicious data. Injection of malicious data can result in significantly decreased performance of such applications, increased vehicle ...
Bernas, Marcin, Placzek, Bartlomiej
core   +1 more source

Home - About - Disclaimer - Privacy