Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (462)

Search Parameters:
Keywords = VANET Networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
42 pages, 2129 KiB  
Review
Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey
by Manal Alharthi, Faiza Medjek and Djamel Djenouri
Future Internet 2025, 17(7), 317; https://doi.org/10.3390/fi17070317 - 19 Jul 2025
Viewed by 385
Abstract
The emergence of the Internet of Vehicles (IoV) has revolutionized intelligent transportation and communication systems. However, IoV presents many complex and ever-changing security challenges and thus requires robust cybersecurity protocols. This paper comprehensively describes and evaluates ensemble learning approaches for multi-class intrusion detection [...] Read more.
The emergence of the Internet of Vehicles (IoV) has revolutionized intelligent transportation and communication systems. However, IoV presents many complex and ever-changing security challenges and thus requires robust cybersecurity protocols. This paper comprehensively describes and evaluates ensemble learning approaches for multi-class intrusion detection systems in the IoV environment. The study evaluates several approaches, such as stacking, voting, boosting, and bagging. A comprehensive review of the literature spanning 2020 to 2025 reveals important trends and topics that require further investigation and the relative merits of different ensemble approaches. The NSL-KDD, CICIDS2017, and UNSW-NB15 datasets are widely used to evaluate the performance of Ensemble Learning-Based Intrusion Detection Systems (ELIDS). ELIDS evaluation is usually carried out using some popular performance metrics, including Precision, Accuracy, Recall, F1-score, and Area Under Receiver Operating Characteristic Curve (AUC-ROC), which were used to evaluate and measure the effectiveness of different ensemble learning methods. Given the increasing complexity and frequency of cyber threats in IoV environments, ensemble learning methods such as bagging, boosting, and stacking enhance adaptability and robustness. These methods aggregate multiple learners to improve detection rates, reduce false positives, and ensure more resilient intrusion detection models that can evolve alongside emerging attack patterns. Full article
Show Figures

Figure 1

15 pages, 1301 KiB  
Article
Applying a Deep Neural Network and Feature Engineering to Assess the Impact of Attacks on Autonomous Vehicles
by Sara Ftaimi and Tomader Mazri
World Electr. Veh. J. 2025, 16(7), 388; https://doi.org/10.3390/wevj16070388 - 9 Jul 2025
Viewed by 308
Abstract
Autonomous vehicles are expected to reduce traffic accident casualties, as driver distraction accounts for 90% of accidents. These vehicles rely on sensors and controllers to operate independently, requiring robust security mechanisms to prevent malicious takeovers. This research proposes a novel approach to assessing [...] Read more.
Autonomous vehicles are expected to reduce traffic accident casualties, as driver distraction accounts for 90% of accidents. These vehicles rely on sensors and controllers to operate independently, requiring robust security mechanisms to prevent malicious takeovers. This research proposes a novel approach to assessing the impact of cyber-attacks on autonomous vehicles and their surroundings, with a strong focus on prioritizing human safety. The system evaluates the severity of incidents caused by attacks, distinguishing between different events—for example, a pedestrian injury is classified as more critical than a collision with an inanimate object. By integrating deep neural network technology with feature engineering, the proposed system provides a comprehensive impact assessment. It is validated using metrics such as MAE, loss function, and Spearman’s correlation through experiments on a dataset of 5410 samples. Beyond enhancing autonomous vehicle security, this research contributes to real-world attack impact assessment, ensuring human safety remains a priority in the evolving autonomous landscape. Full article
Show Figures

Figure 1

29 pages, 973 KiB  
Article
Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks
by Muawia A. Elsadig, Abdelrahman Altigani, Yasir Mohamed, Abdul Hakim Mohamed, Akbar Kannan, Mohamed Bashir and Mousab A. E. Adiel
World Electr. Veh. J. 2025, 16(6), 324; https://doi.org/10.3390/wevj16060324 - 11 Jun 2025
Viewed by 1957
Abstract
Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. However, owing to their nature, the security of VANETs remains a significant concern. This study provides insightful information regarding VANET vulnerabilities and attacks. It investigates a [...] Read more.
Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. However, owing to their nature, the security of VANETs remains a significant concern. This study provides insightful information regarding VANET vulnerabilities and attacks. It investigates a number of security models that have recently been introduced to counter VANET security attacks with a focus on machine learning detection methods. This confirms that several challenges remain unsolved. Accordingly, this study introduces a lightweight machine learning model with a gain information feature selection method to detect VANET attacks. A balanced version of the well-known and recent dataset CISDS2017 was developed by applying a random oversampling technique. The developed dataset was used to train, test, and evaluate the proposed model. In other words, two layers of enhancements were applied—using a suitable feature selection technique and fixing the dataset imbalance problem. The results show that the proposed model, which is based on the Random Forest (RF) classifier, achieved excellent performance in terms of classification accuracy, computational cost, and classification error. It achieved an accuracy rate of 99.8%, outperforming all benchmark classifiers, including AdaBoost, decision tree (DT), K-nearest neighbors (KNNs), and multi-layer perceptron (MLP). To the best of our knowledge, this model outperforms all the existing classification techniques. In terms of processing cost, it consumes the least processing time, requiring only 69%, 59%, 35%, and 1.4% of the AdaBoost, DT, KNN, and MLP processing times, respectively. It causes negligible classification errors. Full article
Show Figures

Figure 1

33 pages, 917 KiB  
Systematic Review
Publish/Subscribe-Middleware-Based Intelligent Transportation Systems: Applications and Challenges
by Basem Almadani, Ekhlas Hashem, Raneem R. Attar, Farouq Aliyu and Esam Al-Nahari
Appl. Sci. 2025, 15(12), 6449; https://doi.org/10.3390/app15126449 - 8 Jun 2025
Viewed by 560
Abstract
Countries are embracing intelligent transportation systems (ITSs), the application of information and communication technologies to transportation, to address growing challenges in urban mobility, congestion, safety, and sustainability. Architecture Reference for Cooperative and Intelligent Transportation (ARC-IT) is a notable ITS framework comprising Enterprise, Functional, [...] Read more.
Countries are embracing intelligent transportation systems (ITSs), the application of information and communication technologies to transportation, to address growing challenges in urban mobility, congestion, safety, and sustainability. Architecture Reference for Cooperative and Intelligent Transportation (ARC-IT) is a notable ITS framework comprising Enterprise, Functional, Physical, and Communications Views (or layers). This review focuses on the Communications View, examining how publish/subscribe middleware enhances ITS through the communication layer. It identified application areas across ITS infrastructure, transportation modes, and communication technologies, and highlights key challenges. In the infrastructure domain, publish/subscribe middleware enhances responsiveness and real-time processing in systems such as traffic surveillance, VANETs, and road sensor networks, especially when replacing legacy infrastructure is cost-prohibitive. Moreover, the middleware supports scalable, low-latency communication in land, air, and marine modes, enabling public transport coordination, cooperative driving, and UAV integration. At the communications layer, publish/subscribe systems facilitate interoperable, delay-tolerant data dissemination over heterogeneous platforms, including 4G/5G, ICN, and peer-to-peer networks. However, integrating publish/subscribe middleware in ITS has several challenges, including privacy risks, real-time data constraints, fault tolerance, bandwidth limitations, and security vulnerabilities. This paper provides a domain-informed foundation for researchers and practitioners developing resilient, scalable, and interoperable communication systems in next-generation ITSs. Full article
Show Figures

Figure 1

26 pages, 2368 KiB  
Article
Connectivity Analysis in VANETS with Dynamic Ranges
by Kenneth Okello, Elijah Mwangi and Ahmed H. Abd El-Malek
Telecom 2025, 6(2), 33; https://doi.org/10.3390/telecom6020033 - 21 May 2025
Viewed by 420
Abstract
Vehicular Ad Hoc Networks (VANETs) serve as critical platforms for inter-vehicle communication within constrained ranges, facilitating information exchange. However, the inherent challenge of dynamic network topology poses persistent disruptions, hindering safety and emergency information exchange. An alternative generalised statistical model of the channel [...] Read more.
Vehicular Ad Hoc Networks (VANETs) serve as critical platforms for inter-vehicle communication within constrained ranges, facilitating information exchange. However, the inherent challenge of dynamic network topology poses persistent disruptions, hindering safety and emergency information exchange. An alternative generalised statistical model of the channel is proposed to capture the varying transmission range of the vehicle node. The generalised model framework uses simple wireless fading channel models (Weibull, Nakagami-m, Rayleigh, and lognormal) and the large vehicle obstructions to model the transmission range. This approach simplifies analysis of connection of vehicular nodes in environments were communication links are very unstable from obstructions from large vehicles and varying speeds. The connectivity probability is computed for two traffic models—free-flow and synchronized Gaussian unitary ensemble (GUE)—to simulate vehicle dynamics within a multi-lane road, enhancing the accuracy of VANET modeling. Results show that indeed the dynamic range distribution is impacted at shorter inter-vehicle distances and vehicle connectivity probability is lower with many obstructing vehicles. These findings offer valuable insights into the overall effects of parameters like path loss exponents and vehicle density on connectivity probability, thus providing knowledge on optimizing VANETs in diverse traffic scenarios. Full article
(This article belongs to the Special Issue Performance Criteria for Advanced Wireless Communications)
Show Figures

Figure 1

21 pages, 1847 KiB  
Article
A Certificateless Aggregated Signcryption Scheme Based on Edge Computing in VANETs
by Wenfeng Zou, Qiang Guo and Xiaolan Xie
Electronics 2025, 14(10), 1993; https://doi.org/10.3390/electronics14101993 - 14 May 2025
Viewed by 386
Abstract
The development of Vehicle AD Hoc Networks (VANETs) has significantly enhanced the efficiency of intelligent transportation systems. Through real-time communication between vehicles and roadside units (RSUs), the immediate sharing of traffic information has been achieved. However, challenges such as network congestion, data privacy, [...] Read more.
The development of Vehicle AD Hoc Networks (VANETs) has significantly enhanced the efficiency of intelligent transportation systems. Through real-time communication between vehicles and roadside units (RSUs), the immediate sharing of traffic information has been achieved. However, challenges such as network congestion, data privacy, and low computing efficiency still exist. Data privacy is at risk of leakage due to the sensitivity of vehicle information, especially in a resource-constrained vehicle environment, where computing efficiency becomes a bottleneck restricting the development of VANETs. To address these challenges, this paper proposes a certificateless aggregated signcryption scheme based on edge computing. This scheme integrates online/offline encryption (OOE) technology and a pseudonym mechanism. It not only solves the problem of key escrow, generating part of the private key through collaboration between the user and the Key Generation Center (KGC), but also uses pseudonyms to protect the real identities of the vehicle and RSU, effectively preventing privacy leakage. This scheme eliminates bilinear pairing operations, significantly improves efficiency, and supports conditional traceability and revocation of malicious vehicles while maintaining anonymity. The completeness analysis shows that under the assumptions of calculating the Diffie–Hellman (CDH) and elliptic curve discrete logarithm problem (ECDLP), this scheme can meet the requirements of IND-CCA2 confidentiality and EUF-CMA non-forgeability. The performance evaluation further confirmed that, compared with the existing schemes, this scheme performed well in both computing and communication costs and was highly suitable for the resource-constrained VANET environment. Full article
(This article belongs to the Special Issue Unmanned Aerial Vehicles (UAVs) Communication and Networking)
Show Figures

Figure 1

24 pages, 2548 KiB  
Article
CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks
by Junchao Wang, Honglin Li, Yan Sun, Chris Phillips, Alexios Mylonas and Dimitris Gritzalis
Future Internet 2025, 17(4), 165; https://doi.org/10.3390/fi17040165 - 9 Apr 2025
Viewed by 468
Abstract
The mix-zone method is effective in preserving real-time vehicle identity and location privacy in Vehicular Ad Hoc Networks (VANETs). However, it has limitations in low-vehicle-density scenarios, where adversaries can still identify the real trajectories of the victim vehicle. To address this issue, researchers [...] Read more.
The mix-zone method is effective in preserving real-time vehicle identity and location privacy in Vehicular Ad Hoc Networks (VANETs). However, it has limitations in low-vehicle-density scenarios, where adversaries can still identify the real trajectories of the victim vehicle. To address this issue, researchers often generate numerous fake beacons to deceive attackers, but this increases transmission overhead significantly. Therefore, we propose the Communication-Efficient Pseudonym-Changing Scheme within the Restricted Online Knowledge Scheme (CPCROK) to protect vehicle privacy without causing significant communication overhead in low-density VANETs by generating highly authentic fake beacons to form a single fabricated trajectory. Specifically, the CPCROK consists of three main modules: firstly, a special Kalman filter module that provides real-time, coarse-grained vehicle trajectory estimates to reduce the need for real-time vehicle state information; secondly, a Recurrent Neural Network (RNN) module that enhances predictions within the mix zone by incorporating offline data engineering and considering online vehicle steering angles; and finally, a trajectory generation module that collaborates with the first two to generate highly convincing fake trajectories outside the mix zone. The experimental results confirm that CPCROK effectively reduces the attack success rate by over 90%, outperforming the plain mix-zone scheme and beating other fake beacon schemes by more than 60%. Additionally, CPCROK effectively minimizes transmission overhead by 67%, all while ensuring a high level of protection. Full article
(This article belongs to the Special Issue IoT, Edge, and Cloud Computing in Smart Cities)
Show Figures

Figure 1

20 pages, 9115 KiB  
Article
Optimized Real-Time Decision Making with EfficientNet in Digital Twin-Based Vehicular Networks
by Qasim Zia, Avais Jan, Dong Yang, Haijing Zhang and Yingshu Li
Electronics 2025, 14(6), 1084; https://doi.org/10.3390/electronics14061084 - 9 Mar 2025
Viewed by 1284
Abstract
Real-time decision-making is vital in vehicular ad hoc networks (VANETs). It is essential to improve road safety and ensure traffic efficiency and flow. Integrating digital twins within VANET (DT-VANET) creates virtual replicas of physical vehicles, allowing in-depth analysis and effective decision-making. Many vehicular [...] Read more.
Real-time decision-making is vital in vehicular ad hoc networks (VANETs). It is essential to improve road safety and ensure traffic efficiency and flow. Integrating digital twins within VANET (DT-VANET) creates virtual replicas of physical vehicles, allowing in-depth analysis and effective decision-making. Many vehicular ad hoc network applications now use convolutional neural networks (CNNs). However, the growing model size and latency make implementing them in real-time systems challenging, and most previous studies focusing on using CNNs still face significant challenges. Some effective models with sustainable performances have recently been proposed. One of the most advanced models among them is EfficientNet. One may consider it a family of network models with significantly fewer parameters and computational costs. This paper proposes EfficientNet-based optimized real-time decision-making in the DT-VANET architecture. This paper investigates the performance of EfficientNet in digital-based vehicular ad hoc networks. Extensive experiments have proved that EfficientNet outperforms CNN models (ResNet50, VGG16) in accuracy, latency, computational efficiency, and convergence time, which proves its effectiveness in real-time applications of DT-VANET. Full article
Show Figures

Figure 1

34 pages, 2273 KiB  
Article
SimulatorOrchestrator: A 6G-Ready Simulator for the Cell-Free/Osmotic Infrastructure
by Rohin Gillgallon, Reham Almutairi, Giacomo Bergami and Graham Morgan
Sensors 2025, 25(5), 1591; https://doi.org/10.3390/s25051591 - 5 Mar 2025
Viewed by 1014
Abstract
To the best of our knowledge, we offer the first IoT-Osmotic simulator supporting 6G and Cloud infrastructures, leveraging the similarities in Software-Defined Wide Area Network (SD-WAN) architectures when used in Osmotic architectures and User-Centric Cell-Free mMIMO (massive multiple-input multiple-output) architectures. Our simulator acts [...] Read more.
To the best of our knowledge, we offer the first IoT-Osmotic simulator supporting 6G and Cloud infrastructures, leveraging the similarities in Software-Defined Wide Area Network (SD-WAN) architectures when used in Osmotic architectures and User-Centric Cell-Free mMIMO (massive multiple-input multiple-output) architectures. Our simulator acts as a simulator orchestrator, supporting the interaction with a patient digital twin generating patient healthcare data (vital signs and emergency alerts) and a VANET simulator (SUMO), both leading to IoT data streams towards the cloud through pre-initiated MQTT protocols. This contextualises our approach within the healthcare domain while showcasing the possibility of orchestrating different simulators at the same time. The combined provision of these two aspects, joined with the addition of a ring network connecting all the first-mile edge nodes (i.e., access points), enables the definition of new packet routing algorithms, streamlining previous solutions from SD-WAN architectures, thus showing the benefit of 6G architectures in achieving better network load balancing, as well as showcasing the limitations of previous approaches. The simulated 6G architecture, combined with the optimal routing algorithm and MEL (Microelements software components) allocation policy, was able to reduce the time required to route all communications from IoT devices to the cloud by up to 50.4% compared to analogous routing algorithms used within 5G architectures. Full article
(This article belongs to the Special Issue e-Health Systems and Technologies)
Show Figures

Figure 1

21 pages, 11212 KiB  
Article
A Dynamic Shortest Travel Time Path Planning Algorithm with an Overtaking Function Based on VANET
by Chunxiao Li, Changhao Fan, Mu Wang, Jiajun Shen and Jiang Liu
Symmetry 2025, 17(3), 345; https://doi.org/10.3390/sym17030345 - 25 Feb 2025
Viewed by 940
Abstract
With the rapid development of the economy, urban road congestion has become more serious. The travel times for vehicles are becoming more uncontrollable, making it challenging to reach destinations on time. In order to find an optimal route and arrive at the destination [...] Read more.
With the rapid development of the economy, urban road congestion has become more serious. The travel times for vehicles are becoming more uncontrollable, making it challenging to reach destinations on time. In order to find an optimal route and arrive at the destination with the shortest travel time, this paper proposes a dynamic shortest travel time path planning algorithm with an overtaking function (DSTTPP-OF) based on a vehicular ad hoc network (VANET) environment. Considering the uncertainty of driving vehicles, the target vehicle (vehicle for special tasks) is influenced by surrounding vehicles, leading to possible deadlock or congestion situations that extend travel time. Therefore, overtaking planning should be conducted through V2V communication, enabling surrounding vehicles to coordinate with the target vehicle to avoid deadlock and congestion through lane changing and overtaking. In the proposed DSTTPP-OF, vehicles may queue up at intersections, so we take into account the impact of traffic signals. We classify road segments into congested and non-congested sections, calculating travel times for each section separately. Subsequently, in front of each intersection, the improved Dijkstra algorithm is employed to find the shortest travel time path to the destination, and the overtaking function is used to prevent the target vehicle from entering a deadlocked state. The real-time traffic data essential for dynamic path planning were collected through a VANET of symmetrically deployed roadside units (RSUs) along the roadway. Finally, simulations were conducted using the SUMO simulator. Under different traffic flows, the proposed DSTTPP-OF demonstrates good performance; the target vehicle can travel smoothly without significant interruptions and experiences the fewest stops, thanks to the proposed algorithm. Compared to the shortest distance path planning (SDPP) algorithm, the travel time is reduced by approximately 36.9%, and the waiting time is reduced by about 83.2%. Compared to the dynamic minimum time path planning (DMTPP) algorithm, the travel time is reduced by around 18.2%, and the waiting time is reduced by approximately 65.6%. Full article
(This article belongs to the Section Engineering and Materials)
Show Figures

Figure 1

22 pages, 2122 KiB  
Article
VehiCast: Real-Time Highway Traffic Incident Forecasting System Using Federated Learning and Vehicular Ad Hoc Network
by Hani Alnami and Muhammad Mohzary
Electronics 2025, 14(5), 900; https://doi.org/10.3390/electronics14050900 - 25 Feb 2025
Viewed by 872
Abstract
Road safety is a critical concern, as accidents happen globally. Despite efforts to enhance roads and enforce stricter driving rules, the number of accidents remains high. These issues arise from distracted driving, speeding, and driving under the influence. In the United States, fatal [...] Read more.
Road safety is a critical concern, as accidents happen globally. Despite efforts to enhance roads and enforce stricter driving rules, the number of accidents remains high. These issues arise from distracted driving, speeding, and driving under the influence. In the United States, fatal accidents increased by 16% from 2018 to 2022. The number of deaths rose from 36,835 in 2018 to 42,795 in 2022. This trend reveals a critical need for new solutions to reduce traffic incidents and improve road safety. Machine learning (ML) can help make roads safer and reduce traffic-related deaths. This paper presents an ML-based real-time highway traffic incident forecasting system named “VehiCast”. VehiCast utilizes vehicular ad hoc networks (VANETs) and federated learning (FL) to collect real-time traffic data, such as average delay, average speed, and the total number of vehicles across several highway zones, to enhance traffic incident prediction accuracy in real-time. Our extensive experimental results showcase that VehiCast reaches an impressive prediction accuracy of 91%, highlighting the power of innovation and determination. Full article
Show Figures

Figure 1

25 pages, 2389 KiB  
Review
A Critical Analysis of Cooperative Caching in Ad Hoc Wireless Communication Technologies: Current Challenges and Future Directions
by Muhammad Ali Naeem, Rehmat Ullah, Sushank Chudhary and Yahui Meng
Sensors 2025, 25(4), 1258; https://doi.org/10.3390/s25041258 - 19 Feb 2025
Cited by 1 | Viewed by 956
Abstract
The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use. Caching, especially cooperative caching, has become a revolutionary paradigm shift to advance environments based on wireless technologies to enable [...] Read more.
The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use. Caching, especially cooperative caching, has become a revolutionary paradigm shift to advance environments based on wireless technologies to enable efficient data distribution and support the mobility, scalability, and manageability of wireless networks. Mobile ad hoc networks (MANETs), wireless mesh networks (WMNs), Wireless Sensor Networks (WSNs), and Vehicular ad hoc Networks (VANETs) have adopted caching practices to overcome these hurdles progressively. In this paper, we discuss the problems and issues in the current wireless ad hoc paradigms as well as spotlight versatile cooperative caching as the potential solution to the increasing complications in ad hoc networks. We classify and discuss multiple cooperative caching schemes in distinct wireless communication contexts and highlight the advantages of applicability. Moreover, we identify research directions to further study and enhance caching mechanisms concerning new challenges in wireless networks. This extensive review offers useful findings on the design of sound caching strategies in the pursuit of enhancing next-generation wireless networks. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

25 pages, 5328 KiB  
Article
Hybrid Trust Model for Node-Centric Misbehavior Detection in Dynamic Behavior-Homogeneous Clusters
by Xiaoya Xu, Weijie Zhu, Xiufeng Fu, Guang Yang, Longlong Jin, Wanting Yu and Lingfei You
Appl. Sci. 2025, 15(4), 2020; https://doi.org/10.3390/app15042020 - 14 Feb 2025
Cited by 1 | Viewed by 725
Abstract
In vehicular ad hoc networks (VANETs), the presence of untrustworthy nodes poses a significant threat, impacting the network’s reliability. This has led to the emergence of node-centric misbehavior detection as a crucial aspect of VANET security, focusing on the behavior of vehicles rather [...] Read more.
In vehicular ad hoc networks (VANETs), the presence of untrustworthy nodes poses a significant threat, impacting the network’s reliability. This has led to the emergence of node-centric misbehavior detection as a crucial aspect of VANET security, focusing on the behavior of vehicles rather than the content of their interactions. While the trust model is a popular approach, the computational complexity of trust computations and management in VANETs is attributed to the intricate relationships among vehicles and the dynamic autonomous movement of nodes. To tackle these challenges, we developed a hybrid trust model scheme for node-centric misbehavior detection. Our method represents complex vehicular relationships using a hyper-graph within a dynamic behavior-homogeneous cluster. The model incorporates direct and indirect trust in a multi-layered hybrid trust framework, enabling accurate computation of the aggregate trust level for each cluster member vehicle. Experimental results demonstrate the effectiveness of our scheme, particularly in high-density vehicle cooperation scenarios, highlighting its promising ability to detect misbehaving nodes. Full article
Show Figures

Figure 1

40 pages, 3190 KiB  
Review
Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review
by Navdeep Bohra, Ashish Kumari, Vikash Kumar Mishra, Pramod Kumar Soni and Vipin Balyan
Future Internet 2025, 17(2), 79; https://doi.org/10.3390/fi17020079 - 10 Feb 2025
Cited by 2 | Viewed by 1400
Abstract
Advancements in intelligent vehicular networks and computing systems have created new possibilities for innovative approaches that enhance traffic safety, comfort, and transportation performance. Machine Learning (ML) has become widely employed for boosting conventional data-driven methodologies in various scientific study domains. The integration of [...] Read more.
Advancements in intelligent vehicular networks and computing systems have created new possibilities for innovative approaches that enhance traffic safety, comfort, and transportation performance. Machine Learning (ML) has become widely employed for boosting conventional data-driven methodologies in various scientific study domains. The integration of a Vehicle-to-Everything (V2X) system with ML enables the acquisition of knowledge from multiple places, enhances the operator’s awareness, and predicts future crashes to prevent them. The information serves multiple functions, such as determining the most efficient route, increasing the driver’s knowledge, forecasting movement strategy to avoid risky circumstances, and eventually improving user convenience, security, and overall highway experiences. This article thoroughly examines Artificial Intelligence (AI) and ML methods that are now investigated through different study endeavors in vehicular ad hoc networks (VANETs). Furthermore, it examines the benefits and drawbacks accompanying such intelligent methods in the context of the VANETs system and simulation tools. Ultimately, this study pinpoints prospective domains for vehicular network development that can utilize the capabilities of AI and ML. Full article
Show Figures

Figure 1

34 pages, 3129 KiB  
Article
Social-Aware Link Reliability Prediction Model Based Minimum Delay Routing for CR-VANETs
by Jing Wang, Wenshi Dan, Hong Li, Lingyu Yan, Aoxue Mei and Xing Tang
Electronics 2025, 14(3), 627; https://doi.org/10.3390/electronics14030627 - 5 Feb 2025
Viewed by 766
Abstract
Cognitive radio vehicle ad hoc networks (CR-VANETs) can utilize spectrum resources flexibly and efficiently and mitigate the conflict between limited spectrum resources and the ever-increasing demand for vehicular communication services. However, in CR-VANETs, the mobility characteristics of vehicles as well as the dynamic [...] Read more.
Cognitive radio vehicle ad hoc networks (CR-VANETs) can utilize spectrum resources flexibly and efficiently and mitigate the conflict between limited spectrum resources and the ever-increasing demand for vehicular communication services. However, in CR-VANETs, the mobility characteristics of vehicles as well as the dynamic topology changes and frequent disruptions of links can lead to large end-to-end delays. To address this issue, we propose the social-based minimum end-to-end delay routing (SMED) algorithm, which leverages the social attributes of both primary and secondary users to reduce end-to-end delay and packet loss. We analyze the influencing factors of vehicle communication in urban road segments and at intersections, formulate the end-to-end delay minimization problem as a nonlinear integer programming problem, and utilize two sub-algorithms to solve this problem. Simulation results show that, compared to the intersection delay-aware routing algorithm (IDRA) and the expected path duration maximization routing algorithm (EPDMR), our method demonstrates significant improvements in both end-to-end delay and packet loss rate. Specifically, the SMED routing algorithm achieved an average reduction of 11.7% in end-to-end delay compared to EPDMR and 25.0% compared to IDRA. Additionally, it lowered the packet loss rate by 24.9% on average compared to EPDMR and 32.5% compared to IDRA. Full article
(This article belongs to the Special Issue AI in Signal and Image Processing)
Show Figures

Figure 1

Back to TopTop