Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (49)

Search Parameters:
Keywords = advanced vehicular ad-hoc network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 3403 KiB  
Review
A Review of Physical Layer Security in Aerial–Terrestrial Integrated Internet of Things: Emerging Techniques, Potential Applications, and Future Trends
by Yixin He, Jingwen Wu, Lijun Zhu, Fanghui Huang, Baolei Wang, Deshan Yang and Dawei Wang
Drones 2025, 9(4), 312; https://doi.org/10.3390/drones9040312 - 16 Apr 2025
Viewed by 1079
Abstract
The aerial–terrestrial integrated Internet of Things (ATI-IoT) utilizes both aerial platforms (e.g., drones and high-altitude platform stations) and terrestrial networks to establish comprehensive and seamless connectivity across diverse geographical regions. The integration offers significant advantages, including expanded coverage in remote and underserved areas, [...] Read more.
The aerial–terrestrial integrated Internet of Things (ATI-IoT) utilizes both aerial platforms (e.g., drones and high-altitude platform stations) and terrestrial networks to establish comprehensive and seamless connectivity across diverse geographical regions. The integration offers significant advantages, including expanded coverage in remote and underserved areas, enhanced reliability of data transmission, and support for various applications such as emergency communications, vehicular ad hoc networks, and intelligent agriculture. However, due to the inherent openness of wireless channels, ATI-IoT faces potential network threats and attacks, and its security issues cannot be ignored. In this regard, incorporating physical layer security techniques into ATI-IoT is essential to ensure data integrity and confidentiality. Motivated by the aforementioned factors, this review presents the latest advancements in ATI-IoT that facilitate physical layer security. Specifically, we elucidate the endogenous safety and security of wireless communications, upon which we illustrate the current status of aerial–terrestrial integrated architectures along with the functions of their components. Subsequently, various emerging techniques (e.g., intelligent reflective surfaces-assisted networks, device-to-device communications, covert communications, and cooperative transmissions) for ATI-IoT enabling physical layer security are demonstrated and categorized based on their technical principles. Furthermore, given that aerial platforms offer flexible deployment and high re-positioning capabilities, comprehensive discussions on practical applications of ATI-IoT are provided. Finally, several significant unresolved issues pertaining to technical challenges as well as security and sustainability concerns in ATI-IoT enabling physical layer security are outlined. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications—2nd Edition)
Show Figures

Figure 1

20 pages, 9115 KiB  
Article
Optimized Real-Time Decision Making with EfficientNet in Digital Twin-Based Vehicular Networks
by Qasim Zia, Avais Jan, Dong Yang, Haijing Zhang and Yingshu Li
Electronics 2025, 14(6), 1084; https://doi.org/10.3390/electronics14061084 - 9 Mar 2025
Viewed by 1274
Abstract
Real-time decision-making is vital in vehicular ad hoc networks (VANETs). It is essential to improve road safety and ensure traffic efficiency and flow. Integrating digital twins within VANET (DT-VANET) creates virtual replicas of physical vehicles, allowing in-depth analysis and effective decision-making. Many vehicular [...] Read more.
Real-time decision-making is vital in vehicular ad hoc networks (VANETs). It is essential to improve road safety and ensure traffic efficiency and flow. Integrating digital twins within VANET (DT-VANET) creates virtual replicas of physical vehicles, allowing in-depth analysis and effective decision-making. Many vehicular ad hoc network applications now use convolutional neural networks (CNNs). However, the growing model size and latency make implementing them in real-time systems challenging, and most previous studies focusing on using CNNs still face significant challenges. Some effective models with sustainable performances have recently been proposed. One of the most advanced models among them is EfficientNet. One may consider it a family of network models with significantly fewer parameters and computational costs. This paper proposes EfficientNet-based optimized real-time decision-making in the DT-VANET architecture. This paper investigates the performance of EfficientNet in digital-based vehicular ad hoc networks. Extensive experiments have proved that EfficientNet outperforms CNN models (ResNet50, VGG16) in accuracy, latency, computational efficiency, and convergence time, which proves its effectiveness in real-time applications of DT-VANET. Full article
Show Figures

Figure 1

25 pages, 2389 KiB  
Review
A Critical Analysis of Cooperative Caching in Ad Hoc Wireless Communication Technologies: Current Challenges and Future Directions
by Muhammad Ali Naeem, Rehmat Ullah, Sushank Chudhary and Yahui Meng
Sensors 2025, 25(4), 1258; https://doi.org/10.3390/s25041258 - 19 Feb 2025
Cited by 1 | Viewed by 952
Abstract
The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use. Caching, especially cooperative caching, has become a revolutionary paradigm shift to advance environments based on wireless technologies to enable [...] Read more.
The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use. Caching, especially cooperative caching, has become a revolutionary paradigm shift to advance environments based on wireless technologies to enable efficient data distribution and support the mobility, scalability, and manageability of wireless networks. Mobile ad hoc networks (MANETs), wireless mesh networks (WMNs), Wireless Sensor Networks (WSNs), and Vehicular ad hoc Networks (VANETs) have adopted caching practices to overcome these hurdles progressively. In this paper, we discuss the problems and issues in the current wireless ad hoc paradigms as well as spotlight versatile cooperative caching as the potential solution to the increasing complications in ad hoc networks. We classify and discuss multiple cooperative caching schemes in distinct wireless communication contexts and highlight the advantages of applicability. Moreover, we identify research directions to further study and enhance caching mechanisms concerning new challenges in wireless networks. This extensive review offers useful findings on the design of sound caching strategies in the pursuit of enhancing next-generation wireless networks. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

40 pages, 3190 KiB  
Review
Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review
by Navdeep Bohra, Ashish Kumari, Vikash Kumar Mishra, Pramod Kumar Soni and Vipin Balyan
Future Internet 2025, 17(2), 79; https://doi.org/10.3390/fi17020079 - 10 Feb 2025
Cited by 2 | Viewed by 1395
Abstract
Advancements in intelligent vehicular networks and computing systems have created new possibilities for innovative approaches that enhance traffic safety, comfort, and transportation performance. Machine Learning (ML) has become widely employed for boosting conventional data-driven methodologies in various scientific study domains. The integration of [...] Read more.
Advancements in intelligent vehicular networks and computing systems have created new possibilities for innovative approaches that enhance traffic safety, comfort, and transportation performance. Machine Learning (ML) has become widely employed for boosting conventional data-driven methodologies in various scientific study domains. The integration of a Vehicle-to-Everything (V2X) system with ML enables the acquisition of knowledge from multiple places, enhances the operator’s awareness, and predicts future crashes to prevent them. The information serves multiple functions, such as determining the most efficient route, increasing the driver’s knowledge, forecasting movement strategy to avoid risky circumstances, and eventually improving user convenience, security, and overall highway experiences. This article thoroughly examines Artificial Intelligence (AI) and ML methods that are now investigated through different study endeavors in vehicular ad hoc networks (VANETs). Furthermore, it examines the benefits and drawbacks accompanying such intelligent methods in the context of the VANETs system and simulation tools. Ultimately, this study pinpoints prospective domains for vehicular network development that can utilize the capabilities of AI and ML. Full article
Show Figures

Figure 1

24 pages, 617 KiB  
Article
A Secure and Efficient Authentication Scheme for Fog-Based Vehicular Ad Hoc Networks
by Sangjun Lee, Seunghwan Son, DeokKyu Kwon, Yohan Park and Youngho Park
Appl. Sci. 2025, 15(3), 1229; https://doi.org/10.3390/app15031229 - 25 Jan 2025
Cited by 1 | Viewed by 924
Abstract
Recently, the application of fog-computing technology to vehicular ad hoc networks (VANETs) has rapidly advanced. Despite these advancements, challenges remain in ensuring efficient communication and security. Specifically, there are issues such as the high communication and computation load of authentications and insecure communication [...] Read more.
Recently, the application of fog-computing technology to vehicular ad hoc networks (VANETs) has rapidly advanced. Despite these advancements, challenges remain in ensuring efficient communication and security. Specifically, there are issues such as the high communication and computation load of authentications and insecure communication over public channels between fog nodes and vehicles. To address these problems, a lightweight and secure authenticated key agreement protocol for confidential communication is proposed. However, we found that the protocol does not offer perfect forward secrecy and is vulnerable to several attacks, such as privileged insider, ephemeral secret leakage, and stolen smart card attacks. Furthermore, their protocol excessively uses elliptic curve cryptography (ECC), resulting in delays in VANET environments where authentication occurs frequently. Therefore, this paper proposes a novel authentication protocol that outperforms other related protocols regarding security and performance. The proposed protocol reduced the usage frequency of ECC primarily using hash and exclusive OR operations. We analyzed the proposed protocol using informal and formal methods, including the real-or-random (RoR) model, Burrows–Abadi–Nikoogadam (BAN) logic, and automated validation of internet security protocols and applications (AVISPA) simulation to show that the proposed protocol is correct and secure against various attacks. Moreover, We compared the computational cost, communication cost, and security features of the proposed protocol with other related protocols and show that the proposed methods have better performance and security than other schemes. As a result, the proposed scheme is more secure and efficient for fog-based VANETs. Full article
Show Figures

Figure 1

26 pages, 5616 KiB  
Article
Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks
by Usman Tariq and Tariq Ahamed Ahanger
World Electr. Veh. J. 2025, 16(1), 24; https://doi.org/10.3390/wevj16010024 - 3 Jan 2025
Cited by 2 | Viewed by 1839
Abstract
Vehicle Ad hoc Networks (VANETs) play an essential role in intelligent transportation systems (ITSs) by improving road safety and traffic management through robust decentralized communication between vehicles and infrastructure. Yet, decentralization introduces security vulnerabilities, including spoofing, tampering, and denial-of-service attacks, which can compromise [...] Read more.
Vehicle Ad hoc Networks (VANETs) play an essential role in intelligent transportation systems (ITSs) by improving road safety and traffic management through robust decentralized communication between vehicles and infrastructure. Yet, decentralization introduces security vulnerabilities, including spoofing, tampering, and denial-of-service attacks, which can compromise the reliability and safety of vehicular communications. Traditional centralized security mechanisms are often inadequate in providing the real-time response and scalability required by such dispersed networks. This research promotes a shift toward distributed and real-time technologies, including blockchain and secure multi-party computation, to enhance communication integrity and privacy, ultimately strengthening system resilience by eliminating single points of failure. A core aspect of this study is the novel D-CASBR framework, which integrates three essential components. First, it employs hybrid machine learning methods, such as ElasticNet and Gradient Boosting, to facilitate real-time anomaly detection, identifying unusual activities as they occur. Second, it utilizes a consortium blockchain to provide secure and transparent information exchange among authorized participants. Third, it implements a fog-enabled reputation system that uses distributed fog computing to effectively manage trust within the network. This comprehensive approach addresses latency issues found in conventional systems while significantly improving the reliability and efficacy of threat detection, achieving 95 percent anomaly detection accuracy with minimal false positives. The result is a substantial advancement in securing vehicular networks. Full article
Show Figures

Figure 1

20 pages, 3207 KiB  
Article
Computer-Aided Efficient Routing and Reliable Protocol Optimization for Autonomous Vehicle Communication Networks
by Alaa Kamal Yousif Dafhalla, Mohamed Elshaikh Elobaid, Amira Elsir Tayfour Ahmed, Ameni Filali, Nada Mohamed Osman SidAhmed, Tahani A. Attia, Badria Abaker Ibrahim Mohajir, Jawaher Suliman Altamimi and Tijjani Adam
Computers 2025, 14(1), 13; https://doi.org/10.3390/computers14010013 - 3 Jan 2025
Cited by 3 | Viewed by 1360
Abstract
The rise of autonomous vehicles necessitates advanced communication networks for effective data exchange. The routing protocols Ad hoc On-Demand Distance Vector (AODV) and Greedy Perimeter Stateless Routing (GPSR) are vital in mobile networks (MANETs) and vehicular ad hoc networks (VANETs). However, their performance [...] Read more.
The rise of autonomous vehicles necessitates advanced communication networks for effective data exchange. The routing protocols Ad hoc On-Demand Distance Vector (AODV) and Greedy Perimeter Stateless Routing (GPSR) are vital in mobile networks (MANETs) and vehicular ad hoc networks (VANETs). However, their performance is affected by changing network conditions. This study examines key routing parameters—MaxJitter, Hello/Beacon Interval, and route validity time—and their impact on AODV and GPSR performance in urban and highway scenarios. The simulation results reveal that increasing MaxJitter enhances AODV throughput by 12% in cities but decreases it by 8% on highways, while GPSR throughput declines by 15% in cities and 10% on highways. Longer Hello intervals improve AODV performance by 10% in urban settings but reduce it by 6% on highways. Extending route validity time increases GPSR’s Packet Delivery Ratio (PDR) by 10% in cities, underscoring the need to optimize routing parameters for enhanced VANET performance. Full article
Show Figures

Figure 1

20 pages, 308 KiB  
Article
Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems
by Stefan Iordache, Catalina Camelia Patilea and Ciprian Paduraru
Future Internet 2024, 16(12), 471; https://doi.org/10.3390/fi16120471 - 18 Dec 2024
Cited by 3 | Viewed by 2209
Abstract
In recent years, the rapid development of autonomous vehicles (AVs) has brought new challenges in terms of data security, privacy, and communication integrity. Our research investigates the potential of blockchain technology to improve the security of AVs by securing vehicle communication systems. By [...] Read more.
In recent years, the rapid development of autonomous vehicles (AVs) has brought new challenges in terms of data security, privacy, and communication integrity. Our research investigates the potential of blockchain technology to improve the security of AVs by securing vehicle communication systems. By integrating blockchain with AI-based predictive algorithms, this approach aims to secure vehicle peer-to-peer communication, reduce traffic congestion, and improve safety for drivers and pedestrians. Blockchain’s decentralized ledger ensures the integrity of data exchange between vehicles and smart city infrastructure and mitigates the risks of cyberattacks such as data manipulation and identity forgery. This paper also examines recent advances in vehicular ad hoc networks (VANETs) and vehicular social networks (VSNs), and it demonstrates how the immutability and cryptographic security of the blockchain can strengthen AV systems. The proposed architecture not only protects user privacy but also decentralizes access to critical data needed for AI-driven decisions, ultimately promoting a safer and more reliable environment for autonomous vehicles. Full article
Show Figures

Figure 1

33 pages, 629 KiB  
Article
Enhancing Smart City Connectivity: A Multi-Metric CNN-LSTM Beamforming Based Approach to Optimize Dynamic Source Routing in 6G Networks for MANETs and VANETs
by Vincenzo Inzillo, David Garompolo and Carlo Giglio
Smart Cities 2024, 7(5), 3022-3054; https://doi.org/10.3390/smartcities7050118 - 17 Oct 2024
Cited by 6 | Viewed by 2278
Abstract
The advent of Sixth Generation (6G) wireless technologies introduces challenges and opportunities for Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), necessitating a reevaluation of traditional routing protocols. This paper introduces the Multi-Metric Scoring Dynamic Source Routing (MMS-DSR), a novel [...] Read more.
The advent of Sixth Generation (6G) wireless technologies introduces challenges and opportunities for Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), necessitating a reevaluation of traditional routing protocols. This paper introduces the Multi-Metric Scoring Dynamic Source Routing (MMS-DSR), a novel enhancement of the Dynamic Source Routing (DSR) protocol, designed to meet the demands of 6G-enabled MANETs and the dynamic environments of VANETs. MMS-DSR integrates advanced technologies and methodologies to enhance routing performance in dynamic scenarios. Key among these is the use of a CNN-LSTM-based beamforming algorithm, which optimizes beamforming vectors dynamically, exploiting spatial-temporal variations characteristic of 6G channels. This enables MMS-DSR to adapt beam directions in real time based on evolving network conditions, improving link reliability and throughput. Furthermore, MMS-DSR incorporates a multi-metric scoring mechanism that evaluates routes based on multiple QoS parameters, including latency, bandwidth, and reliability, enhanced by the capabilities of Massive MIMO and the IEEE 802.11ax standard. This ensures route selection is context-aware and adaptive to changing dynamics, making it effective in urban settings where vehicular and mobile nodes coexist. Additionally, the protocol uses machine learning techniques to predict future route performance, enabling proactive adjustments in routing decisions. The integration of dynamic beamforming and machine learning allows MMS-DSR to effectively handle the high mobility and variability of 6G networks, offering a robust solution for future wireless communications, particularly in smart cities. Full article
Show Figures

Figure 1

20 pages, 5667 KiB  
Article
Optimized Feature Selection for DDoS Attack Recognition and Mitigation in SD-VANETs
by Usman Tariq
World Electr. Veh. J. 2024, 15(9), 395; https://doi.org/10.3390/wevj15090395 - 28 Aug 2024
Cited by 6 | Viewed by 1990
Abstract
Vehicular Ad-Hoc Networks (VANETs) are pivotal to the advancement of intelligent transportation systems (ITS), enhancing safety and efficiency on the road through secure communication networks. However, the integrity of these systems is severely threatened by Distributed Denial-of-Service (DDoS) attacks, which can disrupt the [...] Read more.
Vehicular Ad-Hoc Networks (VANETs) are pivotal to the advancement of intelligent transportation systems (ITS), enhancing safety and efficiency on the road through secure communication networks. However, the integrity of these systems is severely threatened by Distributed Denial-of-Service (DDoS) attacks, which can disrupt the transmission of safety-critical messages and put lives at risk. This research paper focuses on developing robust detection methods and countermeasures to mitigate the impact of DDoS attacks in VANETs. Utilizing a combination of statistical analysis and machine learning techniques (i.e., Autoencoder with Long Short-Term Memory (LSTM), and Clustering with Classification), the study introduces innovative approaches for real-time anomaly detection and system resilience enhancement. Emulation results confirm the effectiveness of the proposed methods in identifying and countering DDoS threats, significantly improving (i.e., 94 percent anomaly detection rate) the security posture of a high mobility-aware ad hoc network. This research not only contributes to the ongoing efforts to secure VANETs against DDoS attacks but also lays the groundwork for more resilient intelligent transportation systems architectures. Full article
Show Figures

Figure 1

17 pages, 4387 KiB  
Article
Adaptive Load Balancing Approach to Mitigate Network Congestion in VANETS
by Syed Ehsan Haider, Muhammad Faizan Khan and Yousaf Saeed
Computers 2024, 13(8), 194; https://doi.org/10.3390/computers13080194 - 13 Aug 2024
Cited by 5 | Viewed by 2016
Abstract
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, [...] Read more.
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, RSU-based medium access control (MAC) schemes, simplified clustering, and network activity control, a significant gap persists in employing a load-balancing server for effective traffic management. We propose a server-based network congestion handling mechanism (SBNC) in VANETs to bridge this gap. Our approach clusters RSUs within specified ranges and incorporates dedicated load balancing and network scheduler RSUs to manage route selection and request–response scheduling, thereby balancing RSU loads. We introduce three key algorithms: optimal placement of dedicated RSUs, a scheduling policy for packets/data/requests/responses, and a congestion control algorithm for load balancing. Using the VanetMobiSim library of Network Simulator-2 (NS-2), we evaluate our approach based on residual energy consumption, end-to-end delay, packet delivery ratio (PDR), and control packet overhead. Results indicate substantial improvements in load balancing through our proposed server-based approach. Full article
Show Figures

Figure 1

47 pages, 2597 KiB  
Review
A Survey on Artificial-Intelligence-Based Internet of Vehicles Utilizing Unmanned Aerial Vehicles
by Syed Ammad Ali Shah, Xavier Fernando and Rasha Kashef
Drones 2024, 8(8), 353; https://doi.org/10.3390/drones8080353 - 29 Jul 2024
Cited by 7 | Viewed by 3834
Abstract
As Autonomous Vehicles continue to advance and Intelligent Transportation Systems are implemented globally, vehicular ad hoc networks (VANETs) are increasingly becoming a part of the Internet, creating the Internet of Vehicles (IoV). In an IoV framework, vehicles communicate with each other, roadside units [...] Read more.
As Autonomous Vehicles continue to advance and Intelligent Transportation Systems are implemented globally, vehicular ad hoc networks (VANETs) are increasingly becoming a part of the Internet, creating the Internet of Vehicles (IoV). In an IoV framework, vehicles communicate with each other, roadside units (RSUs), and the surrounding infrastructure, leveraging edge, fog, and cloud computing for diverse tasks. These networks must support dynamic vehicular mobility and meet strict Quality of Service (QoS) requirements, such as ultra-low latency and high throughput. Terrestrial wireless networks often fail to satisfy these needs, which has led to the integration of Unmanned Aerial Vehicles (UAVs) into IoV systems. UAV transceivers provide superior line-of-sight (LOS) connections with vehicles, offering better connectivity than ground-based RSUs and serving as mobile RSUs (mRSUs). UAVs improve IoV performance in several ways, but traditional optimization methods are inadequate for dynamic vehicular environments. As a result, recent studies have been incorporating Artificial Intelligence (AI) and Machine Learning (ML) algorithms into UAV-assisted IoV systems to enhance network performance, particularly in complex areas like resource allocation, routing, and mobility management. This survey paper reviews the latest AI/ML research in UAV-IoV networks, with a focus on resource and trajectory management and routing. It analyzes different AI techniques, their training features, and architectures from various studies; addresses the limitations of AI methods, including the demand for computational resources, availability of real-world data, and the complexity of AI models in UAV-IoV contexts; and considers future research directions in UAV-IoV. Full article
(This article belongs to the Special Issue Wireless Networks and UAV)
Show Figures

Figure 1

23 pages, 1699 KiB  
Article
A Privacy-Preserving V2I Fast Authentication Scheme in VANETs
by Yusheng Gan, Xiaolan Xie and Yining Liu
Electronics 2024, 13(12), 2369; https://doi.org/10.3390/electronics13122369 - 17 Jun 2024
Viewed by 1668
Abstract
Due to the characteristics of high-speed movement of vehicles, authentication between vehicles and roadside units (RSUs) needs to be performed quickly. Vehicles can obtain the authentication information of the relevant RSUs from the certification authority (CA) in advance through route planning. Fast authentication [...] Read more.
Due to the characteristics of high-speed movement of vehicles, authentication between vehicles and roadside units (RSUs) needs to be performed quickly. Vehicles can obtain the authentication information of the relevant RSUs from the certification authority (CA) in advance through route planning. Fast authentication can be performed when the vehicle enters the RSU range. However, in most of the current vehicle-to-infrastructure (V2I) fast authentication schemes, when the vehicle requests the authentication information of an RSU from the CA, the vehicle often needs to provide the CA with the travel path information, which leads to the CA easily obtaining the travel path of the vehicle. In addition, the CA encrypts the private keys of RSUs and sends them to vehicles as authentication keys, and the vehicles can obtain the private key information of RSUs directly after decryption. Once the private keys of RSUs are leaked, vehicular ad hoc networks (VANETs) can be attacked by malicious access. In order to protect the confidentiality of RSU private keys and the route privacy of vehicles, we propose a privacy-preserving V2I fast authentication scheme in VANETs. The scheme realizes the confidentiality of RSU private keys and the route privacy protection of vehicles by improving the oblivious transfer (OT) algorithm. Security analysis proves that our scheme has good privacy and attack resistance. Finally, performance evaluation shows that the proposed scheme performs better in terms of computational overhead and communication overhead compared to related schemes. Full article
(This article belongs to the Special Issue Unmanned Aerial Vehicles (UAVs) Communication and Networking)
Show Figures

Figure 1

21 pages, 4594 KiB  
Article
Multiple-Junction-Based Traffic-Aware Routing Protocol Using ACO Algorithm in Urban Vehicular Networks
by Seung-Won Lee, Kyung-Soo Heo, Min-A Kim, Do-Kyoung Kim and Hoon Choi
Sensors 2024, 24(9), 2913; https://doi.org/10.3390/s24092913 - 2 May 2024
Cited by 2 | Viewed by 1798
Abstract
The burgeoning interest in intelligent transportation systems (ITS) and the widespread adoption of in-vehicle amenities like infotainment have spurred a heightened fascination with vehicular ad-hoc networks (VANETs). Multi-hop routing protocols are pivotal in actualizing these in-vehicle services, such as infotainment, wirelessly. This study [...] Read more.
The burgeoning interest in intelligent transportation systems (ITS) and the widespread adoption of in-vehicle amenities like infotainment have spurred a heightened fascination with vehicular ad-hoc networks (VANETs). Multi-hop routing protocols are pivotal in actualizing these in-vehicle services, such as infotainment, wirelessly. This study presents a novel protocol called multiple junction-based traffic-aware routing (MJTAR) for VANET vehicles operating in urban environments. MJTAR represents an advancement over the improved greedy traffic-aware routing (GyTAR) protocol. MJTAR introduces a distributed mechanism capable of recognizing vehicle traffic and computing curve metric distances based on two-hop junctions. Additionally, it employs a technique to dynamically select the most optimal multiple junctions between source and destination using the ant colony optimization (ACO) algorithm. We implemented the proposed protocol using the network simulator 3 (NS-3) and simulation of urban mobility (SUMO) simulators and conducted performance evaluations by comparing it with GSR and GyTAR. Our evaluation demonstrates that the proposed protocol surpasses GSR and GyTAR by over 20% in terms of packet delivery ratio, with the end-to-end delay reduced to less than 1.3 s on average. Full article
(This article belongs to the Special Issue Advanced Vehicular Ad Hoc Networks: 2nd Edition)
Show Figures

Figure 1

25 pages, 3579 KiB  
Article
A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks
by Shaoqiang Wang, Ziyao Fan, Yu Su, Baosen Zheng, Zhaoyuan Liu and Yinfei Dai
Electronics 2024, 13(8), 1418; https://doi.org/10.3390/electronics13081418 - 9 Apr 2024
Cited by 7 | Viewed by 1998
Abstract
In the contemporary era, Vehicular Ad Hoc Networks (VANETs) have emerged as a vital technology in intelligent transportation systems, substantially enhancing the overall travel experience by providing advanced services to vehicles while ensuring driver safety. Despite the notable improvements, the inherent complexity of [...] Read more.
In the contemporary era, Vehicular Ad Hoc Networks (VANETs) have emerged as a vital technology in intelligent transportation systems, substantially enhancing the overall travel experience by providing advanced services to vehicles while ensuring driver safety. Despite the notable improvements, the inherent complexity of VANETs presents persistent security challenges, encompassing issues such as privacy preservation for vehicles, message authentication, and constraints in computational power and network bandwidth. Various authentication protocols have been designed for VANETs. However, many of these protocols exhibit significant vulnerabilities, rendering them insecure and unreliable in the face of diverse security threats, such as denial of service, replay, forgery, and impersonation attacks. Moreover, some existing schemes encounter limitations, including high computational complexity and the introduction of additional communication overhead and computational costs. To tackle these concerns, we designed a lightweight and secure identity authentication protocol based on elliptic curve cryptography with the objective of furnishing an effective and secure data transmission mechanism across a public communication channel for the Internet of Vehicles. In addition, we introduce Physically Unclonable Functions (PUFs) to ensure physical layer security during the communication process. A detailed security analysis demonstrates that the proposed protocol is resilient against various attacks. Through a comparative analysis with existing relevant protocols, in scenarios with a high density of vehicles, the algorithm demonstrates significantly lower computational costs and communication overhead than the related protocols, indicating that the proposed protocol is lightweight and efficient. Consequently, the empirical findings indicate that our protocol surpasses others in terms of reliability, user convenience, and practicality for ensuring secure data transmission within VANETs. Full article
(This article belongs to the Special Issue Vehicular Communication Systems and Networks)
Show Figures

Figure 1

Back to TopTop