Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyFebruary 2025
Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities
ACM Computing Surveys (CSUR), Volume 57, Issue 6Article No.: 160, Pages 1–44https://doi.org/10.1145/3711681Vehicular ad-hoc networks (VANETs) have revolutionized the world with smart traffic management, better utilizing the road environment, and providing safety and convenience to the vehicles’ drivers. Despite the useful features of VANETs, there are some ...
- review-articleJanuary 2025
A comparative performance analysis of vehicular routing protocols in intelligent transportation systems: A comparative performance analysis of vehicular routing protocols...
AbstractVehicular Ad hoc Networks (VANETs) are integral to the development of intelligent transportation systems, designed to enhance road safety, traffic management, and overall transportation efficiency. VANETs enable seamless communication between ...
- research-articleJanuary 2025
Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs
- Girraj Kumar Verma,
- Vinay Chamola,
- Asheesh Tiwari,
- Neeraj Kumar,
- Dheerendra Mishra,
- Saurabh Rana,
- Ahmed Barnawi
AbstractTo enhance road safety, Vehicular Ad-hoc Networks (VANETs) facilitate the exchange of safety-critical messages between smart vehicles and road traffic authorities. However, VANET’s wireless channels are prone to several attacks, such as replay or ...
- research-articleDecember 2024
LB-CLAS: Lattice-based conditional privacy-preserving certificateless aggregate signature scheme for VANET
AbstractThe rapid development of vehicular ad-hoc networks (VANETs) has brought great convenience to intelligent transportation, and the secure transmission of information in VANETs has become a serious problem. In addition, the protection of private ...
- ArticleFebruary 2025
A Lightweight Detection Scheme for the Black-Hole Attacks and Gray-Hole Attacks in VANETs
Algorithms and Architectures for Parallel ProcessingPages 233–243https://doi.org/10.1007/978-981-96-1548-3_16AbstractThe development of VANETs brings hope for intelligent transportation. However, due to the dynamic and random feature of vehicles, the topology of the VANETs is constantly changing, making it vulnerable to hacker attacks that can lead to vehicle ...
-
- ArticleOctober 2024
MVDetector: Malicious Vehicles Detection Under Sybil Attacks in VANETs
AbstractA Sybil attack involves a Malicious vehicle node stealing fake identities to continuously generate fake vehicles on the road, creating an illusion of congestion and interfering with the normal traffic flow of legitimate vehicles. In the current ...
- research-articleAugust 2024
A Fuzzy-Based Greedy Behaviour Attack Detection Approach in VANETs
- Tayssir Ismail,
- Nasreddine Hajlaoui,
- Haifa Touati,
- Mohamed Elhadad,
- Paul Muhlethaler,
- Leila Azouz Saidane
AbstractVehicular Ad-Hoc Networks (VANETs) are susceptible to various types of attacks due to their characteristics. Among these threats, greedy behaviour attacks stand out, necessitating the update and adaptation of security measures to mitigate this ...
- research-articleAugust 2024
Improving VANET Data Dissemination Efficiency with Deep Neural Networks
Journal of Network and Systems Management (JNSM), Volume 32, Issue 4https://doi.org/10.1007/s10922-024-09858-0AbstractVehicular Ad-hoc Networks (VANETs) play a crucial role in Intelligent Transportation Systems (ITS), but their dynamic nature makes efficient data dissemination challenging. This paper proposes a novel deep learning-based method to optimize data ...
- research-articleAugust 2024
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments
AbstractVehicular networks are vulnerable to Distributed Denial of Service (DDoS), an extension of a Denial of Service (DoS) attack. The existing solutions for DDoS detection in vehicular networks use various Machine Learning (ML) algorithms. However, ...
- surveyJune 2024
Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions
ACM Computing Surveys (CSUR), Volume 56, Issue 10Article No.: 260, Pages 1–39https://doi.org/10.1145/3656166Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and applications. The increasing number of vehicles has made the vehicular network diverse, dynamic, and large-scale, making it difficult to meet the 5G network’s ...
- research-articleJune 2024
Trajectory tracking attack for vehicular ad‐hoc networks
AbstractMaintaining user privacy and security is a critical concern in vehicular ad hoc networks (VANETs). However, prior research has neglected the study of matrix recovery attack methods in VANETs and the challenge of reducing the number of roadside ...
- research-articleJune 2024
An efficient model for vehicular ad hoc networks using machine learning and high-performance computing
The Journal of Supercomputing (JSCO), Volume 80, Issue 14Pages 21412–21430https://doi.org/10.1007/s11227-024-06281-9AbstractVehicular ad hoc networks (VANETs) are recent advancements that permit vehicles to communicate with infrastructure and other vehicles, improving road safety and traffic efficiency. One of the difficulties in constructing and maintaining VANETs ...
- research-articleJune 2024
Shared group session key-based conditional privacy-preserving authentication protocol for VANETs
AbstractVehicular Ad-Hoc Networks (VANETs) have significantly enhanced driving safety and comfort by leveraging vehicular wireless communication technology. Due to the open nature of VANETs, conditional privacy-preserving authentication protocol should ...
Highlights- We propose a conditional privacy-preserving authentication protocol based share group session key (SGSK) by integrating the self-healing key distribution technique, blockchain, and MTI/C0 protocol to instead of the time-consuming ...
- research-articleJune 2024
S 2 DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs
AbstractAdvancements in technology and the adoption of innovative developments have significantly simplified our lives. One notable innovation in the networking domain is Software Defined Networking (SDN), which revolutionizes the network layer by ...
- review-articleJune 2024
Digital transformation in wireless networks: A comprehensive analysis of mobile data offloading techniques, challenges, and future prospects
- Noryusra Rosele,
- Khuzairi Mohd Zaini,
- Nurakmal Ahmad Mustaffa,
- Ahmad Abrar,
- Suzi Iryanti Fadilah,
- Mohammed Madi
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 36, Issue 5https://doi.org/10.1016/j.jksuci.2024.102071AbstractMobile data offloading is a highly promising approach in mobile networks that tackles network congestion at Base Stations (BSs) and greatly improves both the Quality of Service (QoS) and Quality of Experience (QoE) for users. It presents ...
- articleMay 2024
Distributed and Fair Beacon Power and Beaconing Rate Adaptation Based on Game Theoretic Approach for Connected Vehicles
International Journal of Cognitive Informatics and Natural Intelligence (IJCINI-IGI), Volume 18, Issue 1Pages 1–19https://doi.org/10.4018/IJCINI.344424In vehicular ad hoc networks, vehicles regularly transmit information through beacons to raise awareness among nearby vehicles about their presence. However, as the number of beacons increases, the wireless channel becomes congested, resulting in packet ...
- review-articleMay 2024
DIVA: A DID-based reputation system for secure transmission in VANETs using IOTA
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 244, Issue Chttps://doi.org/10.1016/j.comnet.2024.110332AbstractToday’s advancement in Vehicular Ad-hoc Networks (VANET) constitutes a cornerstone in ensuring traffic safety in Intelligent Transportation Systems (ITS). In this context, vehicle-to-vehicle (V2V) communications are a pivotal enabler for road ...
Highlights- We propose a DID-based reputation scheme for VANET compliant with ETSI standards.
- We provide the research community with the first ETSI-compliant V2V dataset.
- We implement and evaluate DIVA in 5G-enabled scenarios proving its ...
- research-articleApril 2024
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs
Cluster Computing (KLU-CLUS), Volume 27, Issue 7Pages 9851–9871https://doi.org/10.1007/s10586-024-04479-3AbstractAccess control refers to the mechanisms and policies determining which vehicles or entities can access certain network resources, services, or information. Nevertheless, the dynamic nature of a VANET, the necessity to support a wide range of ...
- research-articleApril 2024
An efficient group signature based certificate less verification scheme for vehicular ad-hoc network
Wireless Networks (WIRE), Volume 30, Issue 5Pages 3269–3298https://doi.org/10.1007/s11276-024-03709-1AbstractVehicular ad-hoc network (VANET) is widely applied in transportation applications to ensure safety and security during road transportation. In VANET, all the information’s are interchanged among vehicles with the available infrastructure on the ...
- ArticleJune 2024
Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs
Applied Cryptography and Network Security WorkshopsPages 162–179https://doi.org/10.1007/978-3-031-61489-7_10AbstractVehicle Ad Hoc Networks (VANETs) play a pivotal role in intelligent transportation systems, offering dynamic communication between vehicles, road side units, and the internet. Given the open-access nature of VANETs and the associated threats, such ...