Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    Artificial Intelligence Based Clustering with Routing Protocol for Internet of Vehicles

    Manar Ahmed Hamza1,*, Haya Mesfer Alshahrani2, Fahd N. Al-Wesabi3,4, Mesfer Al Duhayyim5, Anwer Mustafa Hilal1, Hany Mahgoub3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5835-5853, 2022, DOI:10.32604/cmc.2022.021059

    Abstract With recent advances made in Internet of Vehicles (IoV) and Cloud Computing (CC), the Intelligent Transportation Systems (ITS) find it advantageous in terms of improvement in quality and interactivity of urban transportation service, mitigation of costs incurred, reduction in resource utilization, and improvement in traffic management capabilities. Many traffic-related problems in future smart cities can be sorted out with the incorporation of IoV in transportation. IoV communication enables the collection and distribution of real-time essential data regarding road network condition. In this scenario, energy-efficient and reliable intercommunication routes are essential among vehicular nodes in sustainable urban computing. With this motivation,… More >

  • Open Access

    ARTICLE

    An Intelligent Forwarding Strategy in SDN-Enabled Named-Data IoV

    Asadullah Tariq1, Irfan ud din1, Rana Asif Rehman2, Byung-Seo Kim3,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2949-2966, 2021, DOI:10.32604/cmc.2021.017658

    Abstract Internet of Vehicles (IoV), a rapidly growing technology for efficient vehicular communication and it is shifting the trend of traditional Vehicular Ad Hoc Networking (VANET) towards itself. The centralized management of IoV endorses its uniqueness and suitability for the Intelligent Transportation System (ITS) safety applications. Named Data Networking (NDN) is an emerging internet paradigm that fulfills most of the expectations of IoV. Limitations of the current IP internet architecture are the main motivation behind NDN. Software-Defined Networking (SDN) is another emerging networking paradigm of technology that is highly capable of efficient management of overall networks and transforming complex networking architectures… More >

  • Open Access

    ARTICLE

    A Mixture Model Parameters Estimation Algorithm for Inter-Contact Times in Internet of Vehicles

    Cheng Gong1,2, Xinzhu Yang1, Wei Huangfu3,4,*, Qinghua Lu5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2445-2457, 2021, DOI:10.32604/cmc.2021.016713

    Abstract Communication opportunities among vehicles are important for data transmission over the Internet of Vehicles (IoV). Mixture models are appropriate to describe complex spatial-temporal data. By calculating the expectation of hidden variables in vehicle communication, Expectation Maximization (EM) algorithm solves the maximum likelihood estimation of parameters, and then obtains the mixture model of vehicle communication opportunities. However, the EM algorithm requires multiple iterations and each iteration needs to process all the data. Thus its computational complexity is high. A parameter estimation algorithm with low computational complexity based on Bin Count (BC) and Differential Evolution (DE) (PEBCDE) is proposed. It overcomes the… More >

  • Open Access

    ARTICLE

    Security and Privacy in 5G Internet of Vehicles (IoV) Environment

    Benjamin Kwapong Osibo1, Chengbo Zhang1, Changsen Xia1, Guanzhe Zhao2, Zilong Jin1,3,*

    Journal on Internet of Things, Vol.3, No.2, pp. 77-86, 2021, DOI:10.32604/jiot.2021.017943

    Abstract Modern vehicles are equipped with sensors, communication, and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety. The main aim of communication in vehicular networks is to achieve an autonomous driving environment that is accident-free alongside increasing road use quality. However, the demanding specifications such as high data rate, low latency, and high reliability in vehicular networks make 5G an emerging solution for addressing the current vehicular network challenges. In the 5G IoV environment, various technologies and models are deployed, making the environment open to attacks such as Sybil,… More >

  • Open Access

    ARTICLE

    Container Application Migration Algorithm in Internet of Vehicles

    Xiaoliang Lin1,*, Junxiao Shi1, Yanbo Wang1, Chenyang Liu1, Bin Lu1, Siwen Xu2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 915-926, 2021, DOI:10.32604/iasc.2021.018513

    Abstract Internet of Vehicles (IoV) is a popular application scenario that combines edge computing and the Internet of Things. Among them, service migration caused by IoV application mobility is a research hotspot in this field. This paper studies the migration strategy of container applications based on edge computing in the IoV business scenario. In order to solve the difficulty in selecting the target server of the application to be migrated in the crossroads scenario, this paper converts the migration decision to the shortest path problem based on dynamic programming, and obtains the best migration choice at the current time by finding… More >

  • Open Access

    ARTICLE

    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    Abdul Rehman1,*, Mohd Fadzil Hassan1, Yew Kwang Hooi1, Muhammad Aasim Qureshi2, Tran Duc Chung3, Rehan Akbar4, Sohail Safdar5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4125-4142, 2021, DOI:10.32604/CMC.2021.017620

    Abstract Trust is one of the core components of any ad hoc network security system. Trust management (TM) has always been a challenging issue in a vehicular network. One such developing network is the Internet of vehicles (IoV), which is expected to be an essential part of smart cities. IoV originated from the merger of Vehicular ad hoc networks (VANET) and the Internet of things (IoT). Security is one of the main barriers in the on-road IoV implementation. Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements. Trust plays a vital role in ensuring security,… More >

  • Open Access

    ARTICLE

    Intelligent Framework for Secure Transportation Systems Using Software-Defined-Internet of Vehicles

    Mohana Priya Pitchai1, Manikandan Ramachandran1,*, Fadi Al-Turjman2, Leonardo Mostarda3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3947-3966, 2021, DOI:10.32604/cmc.2021.015568

    Abstract The Internet of Things plays a predominant role in automating all real-time applications. One such application is the Internet of Vehicles which monitors the roadside traffic for automating traffic rules. As vehicles are connected to the internet through wireless communication technologies, the Internet of Vehicles network infrastructure is susceptible to flooding attacks. Reconfiguring the network infrastructure is difficult as network customization is not possible. As Software Defined Network provide a flexible programming environment for network customization, detecting flooding attacks on the Internet of Vehicles is integrated on top of it. The basic methodology used is crypto-fuzzy rules, in which cryptographic… More >

  • Open Access

    ARTICLE

    Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme

    Geetanjali Rathee1, Razi Iqbal2,*, Adel Khelifi3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2755-2769, 2021, DOI:10.32604/cmc.2021.017000

    Abstract Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention. Recently Internet of Vehicles (IoVs) has been introduced as one of the applications of pervasive computing that addresses the road safety challenges. Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues. Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data. Due to the lack of existing transportation integration schemes, IoV has not been completely explored by business organizations.… More >

  • Open Access

    ARTICLE

    Game-Oriented Security Strategy Against Hotspot Attacks for Internet of Vehicles

    Juan Guo1, Yanzhu Liu2,*, Shan Li3, Zhi Li4, Sonia Kherbachi5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2145-2157, 2021, DOI:10.32604/cmc.2021.016411

    Abstract With the rapid development of mobile communication technology, the application of internet of vehicles (IoV) services, such as for information services, driving safety, and traffic efficiency, is growing constantly. For businesses with low transmission delay, high data processing capacity and large storage capacity, by deploying edge computing in the IoV, data processing, encryption and decision-making can be completed at the local end, thus providing real-time and highly reliable communication capability. The roadside unit (RSU), as an important part of edge computing in the IoV, fulfils an important data forwarding function and provides an interactive communication channel for vehicles and server… More >

  • Open Access

    ARTICLE

    A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles

    Xiaoliang Wang1, Xinhui She1, Liang Bai2,*, Yang Qing1, Frank Jiang3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3349-3361, 2021, DOI:10.32604/cmc.2021.012454

    Abstract The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying traffic management applications. However, cloud computing has disadvantages such as high delay, low privacy and high communication cost, which can not meet the needs of real-time interactive information of Internet of vehicles. Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges. Therefore, in order to ensure the user information security and improve the real-time of vehicle information interaction, this paper proposes an anonymous authentication scheme based on edge computing. In this scheme, the concept of edge computing… More >

Displaying 21-30 on page 3 of 34. Per Page