Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (37)

Search Parameters:
Keywords = inter-vehicle communication vehicular networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 2368 KiB  
Article
Connectivity Analysis in VANETS with Dynamic Ranges
by Kenneth Okello, Elijah Mwangi and Ahmed H. Abd El-Malek
Telecom 2025, 6(2), 33; https://doi.org/10.3390/telecom6020033 - 21 May 2025
Viewed by 427
Abstract
Vehicular Ad Hoc Networks (VANETs) serve as critical platforms for inter-vehicle communication within constrained ranges, facilitating information exchange. However, the inherent challenge of dynamic network topology poses persistent disruptions, hindering safety and emergency information exchange. An alternative generalised statistical model of the channel [...] Read more.
Vehicular Ad Hoc Networks (VANETs) serve as critical platforms for inter-vehicle communication within constrained ranges, facilitating information exchange. However, the inherent challenge of dynamic network topology poses persistent disruptions, hindering safety and emergency information exchange. An alternative generalised statistical model of the channel is proposed to capture the varying transmission range of the vehicle node. The generalised model framework uses simple wireless fading channel models (Weibull, Nakagami-m, Rayleigh, and lognormal) and the large vehicle obstructions to model the transmission range. This approach simplifies analysis of connection of vehicular nodes in environments were communication links are very unstable from obstructions from large vehicles and varying speeds. The connectivity probability is computed for two traffic models—free-flow and synchronized Gaussian unitary ensemble (GUE)—to simulate vehicle dynamics within a multi-lane road, enhancing the accuracy of VANET modeling. Results show that indeed the dynamic range distribution is impacted at shorter inter-vehicle distances and vehicle connectivity probability is lower with many obstructing vehicles. These findings offer valuable insights into the overall effects of parameters like path loss exponents and vehicle density on connectivity probability, thus providing knowledge on optimizing VANETs in diverse traffic scenarios. Full article
(This article belongs to the Special Issue Performance Criteria for Advanced Wireless Communications)
Show Figures

Figure 1

12 pages, 1157 KiB  
Article
Multi-Layered Unsupervised Learning Driven by Signal-to-Noise Ratio-Based Relaying for Vehicular Ad Hoc Network-Supported Intelligent Transport System in eHealth Monitoring
by Ali Nauman, Adeel Iqbal, Tahir Khurshaid and Sung Won Kim
Sensors 2024, 24(20), 6548; https://doi.org/10.3390/s24206548 - 11 Oct 2024
Cited by 1 | Viewed by 1710
Abstract
Every year, about 1.19 million people are killed in traffic accidents; hence, the United Nations has a goal of halving the number of road traffic deaths and injuries by 2030. In line with this objective, technological innovations in telecommunication, particularly brought about by [...] Read more.
Every year, about 1.19 million people are killed in traffic accidents; hence, the United Nations has a goal of halving the number of road traffic deaths and injuries by 2030. In line with this objective, technological innovations in telecommunication, particularly brought about by the rise of 5G networks, have contributed to the development of modern Vehicle-to-Everything (V2X) systems for communication. A New Radio V2X (NR-V2X) was introduced in the latest Third Generation Partnership Project (3GPP) releases which allows user devices to exchange information without relying on roadside infrastructures. This, together with Massive Machine Type Communication (mMTC) and Ultra-Reliable Low Latency Communication (URLLC), has led to the significantly increased reliability, coverage, and efficiency of vehicular communication networks. The use of artificial intelligence (AI), especially K-means clustering, has been very promising in terms of supporting efficient data exchange in vehicular ad hoc networks (VANETs). K-means is an unsupervised machine learning (ML) technique that groups vehicles located near each other geographically so that they can communicate with one another directly within these clusters while also allowing for inter-cluster communication via cluster heads. This paper proposes a multi-layered VANET-enabled Intelligent Transportation System (ITS) framework powered by unsupervised learning to optimize communication efficiency, scalability, and reliability. By leveraging AI in VANET solutions, the proposed framework aims to address road safety challenges and contribute to global efforts to meet the United Nations’ 2030 target. Additionally, this framework’s robust communication and data processing capabilities can be extended to eHealth monitoring systems, enabling real-time health data transmission and processing for continuous patient monitoring and timely medical interventions. This paper’s contributions include exploring AI-driven approaches for enhanced data interaction, improved safety in VANET-based ITS environments, and potential applications in eHealth monitoring. Full article
(This article belongs to the Special Issue Intelligent Sensors and Control for Vehicle Automation)
Show Figures

Figure 1

20 pages, 3271 KiB  
Article
Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model
by Mostafa Mahmoud El-Gayar, Faheed A. F. Alrslani and Shaker El-Sappagh
Information 2024, 15(10), 583; https://doi.org/10.3390/info15100583 - 24 Sep 2024
Cited by 7 | Viewed by 2497
Abstract
The advent of the Fourth Industrial Revolution has positioned the Internet of Things as a pivotal force in intelligent vehicles. With the source of vehicle-to-everything (V2X), Internet of Things (IoT) networks, and inter-vehicle communication, intelligent connected vehicles are at the forefront of this [...] Read more.
The advent of the Fourth Industrial Revolution has positioned the Internet of Things as a pivotal force in intelligent vehicles. With the source of vehicle-to-everything (V2X), Internet of Things (IoT) networks, and inter-vehicle communication, intelligent connected vehicles are at the forefront of this transformation, leading to complex vehicular networks that are crucial yet susceptible to cyber threats. The complexity and openness of these networks expose them to a plethora of cyber-attacks, from passive eavesdropping to active disruptions like Denial of Service and Sybil attacks. These not only compromise the safety and efficiency of vehicular networks but also pose a significant risk to the stability and resilience of the Internet of Vehicles. Addressing these vulnerabilities, this paper proposes a Dynamic Forest-Structured Ensemble Network (DFSENet) specifically tailored for the Internet of Vehicles (IoV). By leveraging data-balancing techniques and dimensionality reduction, the DFSENet model is designed to detect a wide range of cyber threats effectively. The proposed model demonstrates high efficacy, with an accuracy of 99.2% on the CICIDS dataset and 98% on the car-hacking dataset. The precision, recall, and f-measure metrics stand at 95.6%, 98.8%, and 96.9%, respectively, establishing the DFSENet model as a robust solution for securing the IoV against cyber-attacks. Full article
(This article belongs to the Special Issue Intrusion Detection Systems in IoT Networks)
Show Figures

Graphical abstract

40 pages, 1958 KiB  
Article
BeHarmony: Blockchain-Enabled Trustworthy Communication and Legitimate Decision Making in Multi-Party Internet of Vehicles Systems
by Guodong Jin, Linyi Xu, Zihan Zhou, Qi Shi, Zihao Li, Hao Xu and Yinuo Liu
Electronics 2024, 13(16), 3219; https://doi.org/10.3390/electronics13163219 - 14 Aug 2024
Viewed by 1549
Abstract
The rapid development of the Internet of Vehicles using centralized systems faces significant challenges, including reliability and security vulnerabilities and high latency. This paper introduces a blockchain-enabled authentication and communication network for scalable IoV to enhance security, reduce latency, and relieve the dependency [...] Read more.
The rapid development of the Internet of Vehicles using centralized systems faces significant challenges, including reliability and security vulnerabilities and high latency. This paper introduces a blockchain-enabled authentication and communication network for scalable IoV to enhance security, reduce latency, and relieve the dependency on centralized infrastructures. The network applies blockchain-enabled domain name services and mutual authentication for fault tolerance consensus, such as PBFT and RAFT, featuring a primary layer of road side units and edge servers for inter-vehicle communication and a sub-layer within each vehicle for intra-vehicle communication. The study evaluates various scenarios and assesses roadside unit availability based on random distribution along vehicle routes. This paper also discusses the legal issues involved in the proposed model, highlighting that the IoV system should be governed by a contract-based decentralized IoV system comprising both smart contracts and traditional contracts. This model offers a novel approach to developing a decentralized, secure, efficient, and ethical IoV ecosystem, advancing autonomous and reliable vehicular networks. Full article
(This article belongs to the Special Issue Signal Processing and AI Applications for Vehicles)
Show Figures

Figure 1

30 pages, 8466 KiB  
Article
Resource Cluster-Based Resource Search and Allocation Scheme for Vehicular Clouds in Vehicular Ad Hoc Networks
by Hyunseok Choi, Yoonhyeong Lee, Gayeong Kim, Euisin Lee and Youngju Nam
Sensors 2024, 24(7), 2175; https://doi.org/10.3390/s24072175 - 28 Mar 2024
Cited by 2 | Viewed by 1260
Abstract
Vehicular clouds represent an appealing approach, leveraging vehicles’ resources to generate value-added services. Thus, efficiently searching for and allocating resources is a challenge for the successful construction of vehicular clouds. Many recent schemes have relied on hierarchical network architectures using clusters to address [...] Read more.
Vehicular clouds represent an appealing approach, leveraging vehicles’ resources to generate value-added services. Thus, efficiently searching for and allocating resources is a challenge for the successful construction of vehicular clouds. Many recent schemes have relied on hierarchical network architectures using clusters to address this challenge. These clusters are typically constructed based on vehicle proximity, such as being on the same road or within the same region. However, this approach struggles to rapidly search for and consistently allocate resources, especially considering the diverse resource types and varying mobility of vehicles. To address these limitations, we propose the Resource Cluster-based Resource Search and Allocation (RCSA) scheme. RCSA constructs resource clusters based on resource types rather than vehicle proximity. This allows for more efficient resource searching and allocation. Within these resource clusters, RCSA supports both intra-resource cluster search for the same resource type and inter-resource cluster search for different resource types. In RCSA, vehicles with longer connection times and larger resource capacities are allocated in vehicular clouds to minimize cloud breakdowns and communication traffic. To handle the reconstruction of resource clusters due to vehicle mobility, RCSA implements mechanisms for replacing Resource Cluster Heads (RCHs) and managing Resource Cluster Members (RCMs). Simulation results validate the effectiveness of RCSA, demonstrating its superiority over existing schemes in terms of resource utilization, allocation efficiency, and overall performance. Full article
Show Figures

Figure 1

22 pages, 6977 KiB  
Article
Optimizing Autonomous Vehicle Communication through an Adaptive Vehicle-to-Everything (AV2X) Model: A Distributed Deep Learning Approach
by Radwa Ahmed Osman
Electronics 2023, 12(19), 4023; https://doi.org/10.3390/electronics12194023 - 24 Sep 2023
Cited by 8 | Viewed by 3542
Abstract
Autonomous intelligent transportation systems consistently require effective and secure communication through vehicular networks, enabling autonomous vehicle communication. The reduction of traffic congestion, the alerting of approaching emergency vehicles, and assistance in low visibility traffic are all made possible by effective communication between autonomous [...] Read more.
Autonomous intelligent transportation systems consistently require effective and secure communication through vehicular networks, enabling autonomous vehicle communication. The reduction of traffic congestion, the alerting of approaching emergency vehicles, and assistance in low visibility traffic are all made possible by effective communication between autonomous vehicles and everything (AV2X). Therefore, a new adaptive AV2X model is proposed in this paper to improve the connectivity of vehicular networks. This proposed model is based on the optimization method and a distributed deep learning model. The presented approach optimizes the inter-vehicle location if required for ensuring effective communication between the autonomous vehicle (AV) and everything (X) using the Lagrange optimization algorithm. Furthermore, the system is evaluated in terms of energy efficiency and achievable data rate based on the optimal inter-vehicle position to show the significance of the proposed approach. To meet the stated goals, the ideal inter-vehicle position is predicted using a distributed deep learning model by learning from mathematically generated data and defined as a restricted optimization problem using the Lagrange optimization technique to improve communication between AV2X under various environmental conditions. To demonstrate the efficiency of the suggested model, the following characteristics are considered: vehicle dispersion, vehicle density, vehicle mobility, and speed. The simulation results show the significance of the proposed model in terms of energy efficiency and achievable data rate compared with other proposed models. Full article
(This article belongs to the Special Issue 5G and 6G Wireless Systems: Challenges, Insights, and Opportunities)
Show Figures

Figure 1

19 pages, 4618 KiB  
Article
V-SOC4AS: A Vehicle-SOC for Improving Automotive Security
by Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera and Manuel Ángel Serrano Martín
Algorithms 2023, 16(2), 112; https://doi.org/10.3390/a16020112 - 14 Feb 2023
Cited by 28 | Viewed by 5346
Abstract
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable [...] Read more.
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks. The paper presents a vehicle-security operation center for improving automotive security (V-SOC4AS) to enhance the detection, response, and prevention of cyber-attacks in the automotive context. The goal is to monitor in real-time each subsystem of intra-vehicle communication, that is controller area network (CAN), local interconnect network (LIN), FlexRay, media oriented systems transport (MOST), and Ethernet. Therefore, to achieve this goal, security information and event management (SIEM) was used to monitor and detect malicious attacks in intra-vehicle and inter-vehicle communications: messages transmitted between vehicle ECUs; infotainment and telematics systems, which provide passengers with entertainment capabilities and information about the vehicle system; and vehicular ports, which allow vehicles to connect to diagnostic devices, upload content of various types. As a result, this allows the automation and improvement of threat detection and incident response processes. Furthermore, the V-SOC4AS allows the classification of the received message as malicious and non-malicious and acquisition of additional information about the type of attack. Thus, this reduces the detection time and provides more support for response activities. Experimental evaluation was conducted on two state-of-the-art attacks: denial of service (DoS) and fuzzing. An open-source dataset was used to simulate the vehicles. V-SOC4AS exploits security information and event management to analyze the packets sent by a vehicle using a rule-based mechanism. If the payload contains a CAN frame attack, it is notified to the SOC analysts. Full article
(This article belongs to the Section Evolutionary Algorithms and Machine Learning)
Show Figures

Figure 1

17 pages, 2642 KiB  
Article
Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs)
by Asif Ali Laghari, Abdullah Ayub Khan, Reem Alkanhel, Hela Elmannai and Sami Bourouis
Electronics 2023, 12(3), 677; https://doi.org/10.3390/electronics12030677 - 29 Jan 2023
Cited by 76 | Viewed by 4189
Abstract
The vast enhancement in the development of the Internet of Vehicles (IoV) is due to the impact of the distributed emerging technology and topology of the industrial IoV. It has created a new paradigm, such as the security-related resource constraints of Industry 5.0. [...] Read more.
The vast enhancement in the development of the Internet of Vehicles (IoV) is due to the impact of the distributed emerging technology and topology of the industrial IoV. It has created a new paradigm, such as the security-related resource constraints of Industry 5.0. A new revolution and dimension in the IoV popup raise various critical challenges in the existing information preservation, especially in node transactions and communication, transmission, trust and privacy, and security-protection-related problems, which have been analyzed. These aspects pose serious problems for the industry to provide vehicular-related data integrity, availability, information exchange reliability, provenance, and trustworthiness for the overall activities and service delivery prospects against the increasing number of multiple transactions. In addition, there has been a lot of research interest that intersects with blockchain and Internet of Vehicles association. In this regard, the inadequate performance of the Internet of Vehicles and connected nodes and the high resource requirements of the consortium blockchain ledger have not yet been tackled with a complete solution. The introduction of the NuCypher Re-encryption infrastructure, hashing tree and allocation, and blockchain proof-of-work require more computational power as well. This paper contributes in two different folds. First, it proposes a blockchain sawtooth-enabled modular architecture for protected, secure, and trusted execution, service delivery, and acknowledgment with immutable ledger storage and security and peer-to-peer (P2P) network on-chain and off-chain inter-communication for vehicular activities. Secondly, we design and create a smart contract-enabled data structure in order to provide smooth industrial node streamlined transactions and broadcast content. Substantially, we develop and deploy a hyperledger sawtooth-aware customized consensus for multiple proof-of-work investigations. For validation purposes, we simulate the exchange of information and related details between connected devices on the IoV. The simulation results show that the proposed architecture of BIoV reduces the cost of computational power down to 37.21% and the robust node generation and exchange up to 56.33%. Therefore, only 41.93% and 47.31% of the Internet of Vehicles-related resources and network constraints are kept and used, respectively. Full article
(This article belongs to the Special Issue Vehicles Technologies for Sustainable Smart Cities)
Show Figures

Figure 1

17 pages, 2242 KiB  
Article
DSVN: A Flexible and Secure Data-Sharing Model for VANET Based on Blockchain
by Xiaoxuan Chen, Yineng Chen, Xiayu Wang, Xinghui Zhu and Kui Fang
Appl. Sci. 2023, 13(1), 217; https://doi.org/10.3390/app13010217 - 24 Dec 2022
Cited by 5 | Viewed by 2666
Abstract
Vehicular Ad Hoc Network (VANET) is an important part of the modern intelligent transportation system, which can provide vehicle communication at a certain distance. More importantly, VANET can provide route planning and autonomous driving for drivers by analyzing data. However, VANET’s data privacy [...] Read more.
Vehicular Ad Hoc Network (VANET) is an important part of the modern intelligent transportation system, which can provide vehicle communication at a certain distance. More importantly, VANET can provide route planning and autonomous driving for drivers by analyzing data. However, VANET’s data privacy and security are a huge challenge when serving drivers. In this paper, we propose a VANET data-sharing model (DSVN) that combines ciphertext-based attribute encryption (CP-ABE), blockchain, and InterPlanetary File System (IPFS). DSVN uses an outsourced and revocable ciphertext policy attribute-based encryption (ORCP-ABE) scheme, which is improved based on CP-ABE. ORCP-ABE uses key encryption key (KEK) trees to manage user attribute groups and revoke user-level attributes. It eliminates redundant attributes in the access policy by attribute-weighted access trees. Moreover, DSVN has no single point of failure. We demonstrate the indistinguishability under the chosen-plaintext attack (IND-CPA) security of DSVN by a game based on the computational Diffie–Hellman (CDH) assumption. Experimental results show that DSVN can store and share data with low overhead. Additionally, it can revoke attributes of users safely. Full article
(This article belongs to the Topic Recent Trends in Blockchain and Its Applications)
Show Figures

Figure 1

20 pages, 2518 KiB  
Article
UGAVs-MDVR: A Cluster-Based Multicast Routing Protocol for Unmanned Ground and Aerial Vehicles Communication in VANET
by Waqar Farooq, Saif ul Islam, Muazzam Ali Khan, Saad Rehman, Usman Ali Gulzari and Jalil Boudjadar
Appl. Sci. 2022, 12(23), 11995; https://doi.org/10.3390/app122311995 - 24 Nov 2022
Cited by 11 | Viewed by 2520
Abstract
Unmanned ground vehicles (UGVs) are becoming the foremost part of rescue teams for protecting human lives from severe disasters and reducing human casualties by informing them about the risks ahead, such as mine detection and clearance. In mine detection, a centralized system is [...] Read more.
Unmanned ground vehicles (UGVs) are becoming the foremost part of rescue teams for protecting human lives from severe disasters and reducing human casualties by informing them about the risks ahead, such as mine detection and clearance. In mine detection, a centralized system is required so that the UGVs can communicate with each other efficiently to disseminate the mine detection messages (MDMs) to incoming vehicles of military and civilians. Therefore, in this piece of research, a novel unmanned ground and aerial vehicle (UGAV)-based mine-detection-vehicle routing (MDVR) protocol has been proposed, mainly for the mine detection and clearance teams using a vehicular ad hoc network (VANET). The protocol disseminates the MDMs using UGVs and unmanned aerial vehicles (UAVs) in combination to overcome the limitations of only inter-UGV communication. The proposed protocol performs cluster-based multicast communication in real time using UAVs so that the dynamic mobility of UGVs cannot affect the performance of MDM dissemination. Hence, the proposed scheme is adaptable because any failure in message delivery can cause a high level of destruction. The proposed cluster-based scheme can adapt to any real-time scenario by introducing the level-based cluster-head election scheme (LBCHE), which works concerning its assigned priority for reducing the delay incurred in MDMs dissemination. The simulation of the proposed protocol in the network simulator (NS) shows that the overhead and delay are reduced in MDMs dissemination. At the same time, the throughput, packet delivery ratio, and stability increased compared to the other competing protocols. Full article
Show Figures

Figure 1

19 pages, 4510 KiB  
Article
TACRP: Traffic-Aware Clustering-Based Routing Protocol for Vehicular Ad-Hoc Networks
by Mohammed I. Habelalmateen, Ahmed Jamal Ahmed, Ali Hashim Abbas and Sami Abduljabbar Rashid
Designs 2022, 6(5), 89; https://doi.org/10.3390/designs6050089 - 2 Oct 2022
Cited by 52 | Viewed by 3003
Abstract
On account of the highly dynamic topology of vehicular networks, network congestion and energy utilization are greatly increased, which directly affects the performance of VANETs. So, managing traffic and reducing energy consumption in the network becomes a challenging task in such huge mobility-based [...] Read more.
On account of the highly dynamic topology of vehicular networks, network congestion and energy utilization are greatly increased, which directly affects the performance of VANETs. So, managing traffic and reducing energy consumption in the network becomes a challenging task in such huge mobility-based VANET networks. Thus, in this paper a new traffic and cluster-based network method is introduced, namely, Traffic-Aware Clustering based Routing Protocol (TACRP). The main aim of the approach is to improve traffic management in the network as well as to reduce energy consumption in it. In the constructed network, a Traffic Management Unit (TMU) is introduced to control the entire network traffic with the help of RSUs. Vehicles with similar speed and direction are grouped into a cluster to increase the network stability and help to reduce the energy consumption of the network. The clustering model provides principles associated with vehicles leaving the clusters, joining the clusters, cluster updates and inter-cluster communication, which makes the network more stable and reliable. For instance, in the proposed work the CH selection is based on centralization, weight, distance, and energy calculation. Such network settings facilitate successfully clustering of vehicles on the road. Simulation experimental analysis showed that the proposed TACRP routing protocol achieved better results in terms of energy efficiency, throughput, packet delivery ratio, and end to end delay of the network when compared with earlier methods, such as ECHS and NRHCS. Full article
(This article belongs to the Section Vehicle Engineering Design)
Show Figures

Figure 1

19 pages, 715 KiB  
Article
A Self-Adaptable Angular Based K-Medoid Clustering Scheme (SAACS) for Dynamic VANETs
by Akhilesh Bijalwan, Kamlesh Chandra Purohit, Preeti Malik and Mohit Mittal
Electronics 2022, 11(19), 3071; https://doi.org/10.3390/electronics11193071 - 26 Sep 2022
Cited by 10 | Viewed by 1910
Abstract
Prior study suggests that VANET has two types of communications: Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications. V2V is very important and ensures cooperative communications between vehicles and safety measures. It is also defined as Inter-Vehicle Communication (IVC).The communication is [...] Read more.
Prior study suggests that VANET has two types of communications: Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications. V2V is very important and ensures cooperative communications between vehicles and safety measures. It is also defined as Inter-Vehicle Communication (IVC).The communication is based on clustering the nodes to transmit the data from vehicle to vehicle. The overhead and stability are considered as main challenges that need to be addressed during vehicle intersections. In this paper, a novel self-adaptable Angular based k-medoid Clustering Scheme (SAACS) is proposed to form flexible clusters. The clusters are formed by estimating the road length and transmission ranges to minimize the network delay. And the Cluster Head (CH) is elected from a novel performance metric, ‘cosine-based node uncoupling frequency,’ that finds the best nodes irrespective of their current network statistics. The parametric analysis varies according to the number of vehicular nodes with the transmission range. The experimental results have proven that the proposed technique serves better in comparison to existing approaches such as Cluster Head Lifetime (CHL), Cluster Member Lifetime (CML), Cluster Number (CL), Cluster Overhead (CO), Packet Loss Ratio (PLR) and Average Packet Delay (APD). CHL is enhanced 40% as compare to Real-Time Vehicular Communication (RTVC), Efficient Cluster Head Selection (ECHS) whereas CML is 50% better than RTVC and ECHS. Packet loss ratio and overhead is 45% better in our proposed algorithm than RTVC and ECHS. It is observed from the results that the incorporation of cosine-based node uncoupling frequency has minimized the incongruity between vehicular nodes placed in dense and sparse zones of highways. Full article
Show Figures

Figure 1

28 pages, 2270 KiB  
Article
An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems
by Tehreem Ashfaq, Rabiya Khalid, Adamu Sani Yahaya, Sheraz Aslam, Ahmad Taher Azar, Tamim Alkhalifah and Mohamed Tounsi
Sensors 2022, 22(17), 6318; https://doi.org/10.3390/s22176318 - 23 Aug 2022
Cited by 15 | Viewed by 2883
Abstract
The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure [...] Read more.
The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure communication, traffic congestion, security, and privacy issues in vehicular networks (VNs). In addition, detecting malicious IVs, data integration, and data validation are major issues in VNs that affect network performance. A blockchain-based model for secure communication and malicious IV detection is proposed to address the above issues. In addition, this system also addresses data integration and transaction validation using an encryption scheme for secure communication. A multi-chain concept separates the legitimate and malicious data into two chains: the Integrity chain (I-chain) and Fraud chain (F-chain). This multi-chain mechanism solves the storage problem and reduces the computing power. The integration of blockchain in the proposed model provides privacy, network security, transparency, and immutability. To address the storage issue, the InterPlanetary File System (IPFS) is integrated with Certificate Authority (CA). A reputation mechanism is introduced to detect malicious IVs in the network based on ratings. This reputation mechanism is also used to prevent Sybil attack. The evaluation of the proposed work is based on the cost of smart contracts and computation time. Furthermore, two attacker models are presented to prevent the selfish mining attack and the Sybil attack. Finally, a security analysis of the proposed smart contracts with their security vulnerabilities is also presented. Full article
(This article belongs to the Special Issue Smart Grids and Green Communications)
Show Figures

Figure 1

18 pages, 4632 KiB  
Article
Enhancing OLSR Protocol by an Advanced Greedy Forwarding Mechanism for VANET in Smart Cities
by MyDriss Laanaoui and Said Raghay
Smart Cities 2022, 5(2), 650-667; https://doi.org/10.3390/smartcities5020034 - 17 May 2022
Cited by 12 | Viewed by 3415
Abstract
The future Intelligent Transport System "ITS" is one of the major challenges of the smart city. It requires fast and efficient communication between vehicles (vehicle-to-vehicle “V2V”), to ensure information exchange in order to improve safety, which reduces accidents and consequently save lives, hence [...] Read more.
The future Intelligent Transport System "ITS" is one of the major challenges of the smart city. It requires fast and efficient communication between vehicles (vehicle-to-vehicle “V2V”), to ensure information exchange in order to improve safety, which reduces accidents and consequently save lives, hence the need of the Vehicular Ad Hoc Network “VANET”, which makes possible the inter-vehicle communication. This network is characterized by a variable topology. Therefore, MANET (Mobile Adhoc NETwork) routing protocols need a few tweaks to be available for the vehicle environment. In this paper, we start by exposing some works related to the evaluation of the most well-known protocols. After a comparative study, we deduce that the OLSR (Optimized Link State Routing) protocol outperforms other routing protocols in terms of End-to-End Delay (EED) and Packet Delivery Ratio (PDR). In addition, we note that the Greedy forwarding “GF” mechanism is suited for the VANET environment, which has been improved and called Greedy forwarding Advanced “GFA”, to overcome the stationary node problem. Our approach improves the OLSR protocol to be more suitable and efficient for VANET by introducing the GFA mechanism. Moreover, we compare our approach to the OLSR classic version. In this work, we use a realistic scenario from Open Street Map (OSM), and simulations are performed using SUMO (Simulation of Urban MObility). The trace files generated from SUMO are used for further simulation in NS-3 (Network Simulator) to validate our proposition. The simulation results are analyzed and discussed. Our approach performs best compared to OLSR in terms of EED and PDR, especially for dense traffic. Full article
(This article belongs to the Section Smart Transportation)
Show Figures

Figure 1

18 pages, 700 KiB  
Article
Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks
by Mahmood A. Al-Shareeda, Mohammed Anbar, Selvakumar Manickam and Iznan H. Hasbullah
Appl. Sci. 2022, 12(3), 1383; https://doi.org/10.3390/app12031383 - 27 Jan 2022
Cited by 34 | Viewed by 3966
Abstract
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs) to store the system’s master key. However, it only takes [...] Read more.
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs) to store the system’s master key. However, it only takes a single compromised TPD to render the whole system insecure. We propose a password-guessing attack-aware authentication scheme based on the Chinese Remainder Theorem (CRT) to secure inter-vehicle communication on 5G-enabled vehicular networks to address this issue. The trusted authorities (TAs) in the proposed scheme generate and broadcast new group keys to the vehicles assisted by CRT. Moreover, since the system’s master key does not need to be preloaded, the proposed scheme only requires realistic TPDs. The proposed scheme overcomes password-guessing attacks and guarantees top-level security for entire 5G-enabled vehicular networks. The security analysis indicates that the proposed scheme is secure against adaptive chosen-message attacks under the random oracle model and meets the security requirements of a 5G-enabled vehicular network. Since cryptographic operations based on elliptic curve cryptography are employed, the performance evaluation shows that the proposed scheme outperforms the eight existing schemes in terms of computation and communication costs. Full article
Show Figures

Figure 1

Back to TopTop