Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (40)
  • Open Access

    ARTICLE

    Machine Learning-Based Detection of DDoS Attacks in VANETs for Emergency Vehicle Communication

    Bappa Muktar*, Vincent Fono, Adama Nouboukpo

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4705-4727, 2025, DOI:10.32604/cmc.2025.067733 - 23 October 2025

    Abstract Vehicular Ad Hoc Networks (VANETs) are central to Intelligent Transportation Systems (ITS), especially for real-time communication involving emergency vehicles. Yet, Distributed Denial of Service (DDoS) attacks can disrupt safety-critical channels and undermine reliability. This paper presents a robust, scalable framework for detecting DDoS attacks in highway VANETs. We construct a new dataset with Network Simulator 3 (NS-3) and Simulation of Urban Mobility (SUMO), enriched with real mobility traces from Germany’s A81 highway (OpenStreetMap). Three traffic classes are modeled: DDoS, Voice over IP (VoIP), and Transmission Control Protocol Based (TCP-based) video streaming (VideoTCP). The pipeline includes normalization,… More >

  • Open Access

    ARTICLE

    Light-Weighted Mutual Authentication and Key Agreement in V2N VANET

    Yanan Liu1, Lei Cao1,*, Zheng Zhang1,*, Ge Li2, Shuo Qiu1, Suhao Wang1

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4997-5019, 2025, DOI:10.32604/cmc.2025.066836 - 30 July 2025

    Abstract As the adoption of Vehicular Ad-hoc Networks (VANETs) grows, ensuring secure communication between smart vehicles and remote application servers (APPs) has become a critical challenge. While existing solutions focus on various aspects of security, gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments. This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function (PUF) for authentication and key agreement, offering a comprehensive solution to the security challenges in VANETs. The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs, ensuring the confidentiality and integrity of vehicle-to-network… More >

  • Open Access

    ARTICLE

    Efficient One-Way Time Synchronization for VANET with MLE-Based Multi-Stage Update

    Hyeontae Joo, Sangmin Lee, Kiseok Kim, Hwangnam Kim*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2789-2804, 2025, DOI:10.32604/cmc.2025.066304 - 03 July 2025

    Abstract As vehicular networks become increasingly pervasive, enhancing connectivity and reliability has emerged as a critical objective. Among the enabling technologies for advanced wireless communication, particularly those targeting low latency and high reliability, time synchronization is critical, especially in vehicular networks. However, due to the inherent mobility of vehicular environments, consistently exchanging synchronization packets with a fixed base station or access point is challenging. This issue is further exacerbated in signal shadowed areas such as urban canyons, tunnels, or large-scale indoor halls where other technologies, such as global navigation satellite system (GNSS), are unavailable. One-way synchronization… More >

  • Open Access

    ARTICLE

    A Clustering Model Based on Density Peak Clustering and the Sparrow Search Algorithm for VANETs

    Chaoliang Wang1,*, Qi Fu2, Zhaohui Li1

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3707-3729, 2025, DOI:10.32604/cmc.2025.062795 - 03 July 2025

    Abstract Cluster-based models have numerous application scenarios in vehicular ad-hoc networks (VANETs) and can greatly help improve the communication performance of VANETs. However, the frequent movement of vehicles can often lead to changes in the network topology, thereby reducing cluster stability in urban scenarios. To address this issue, we propose a clustering model based on the density peak clustering (DPC) method and sparrow search algorithm (SSA), named SDPC. First, the model constructs a fitness function based on the parameters obtained from the DPC method and deploys the SSA for iterative optimization to select cluster heads (CHs). More >

  • Open Access

    ARTICLE

    Enhancing ITS Reliability and Efficiency through Optimal VANET Clustering Using Grasshopper Optimization Algorithm

    Seongsoo Cho1, Yeonwoo Lee2,*, Cheolhee Yoon3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3769-3793, 2025, DOI:10.32604/cmes.2025.066298 - 30 June 2025

    Abstract As vehicular networks grow increasingly complex due to high node mobility and dynamic traffic conditions, efficient clustering mechanisms are vital to ensure stable and scalable communication. Recent studies have emphasized the need for adaptive clustering strategies to improve performance in Intelligent Transportation Systems (ITS). This paper presents the Grasshopper Optimization Algorithm for Vehicular Network Clustering (GOA-VNET) algorithm, an innovative approach to optimal vehicular clustering in Vehicular Ad-Hoc Networks (VANETs), leveraging the Grasshopper Optimization Algorithm (GOA) to address the critical challenges of traffic congestion and communication inefficiencies in Intelligent Transportation Systems (ITS). The proposed GOA-VNET employs an… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Graph Neural Network Framework with Attention Mechanism for Computational Offloading in the Internet of Vehicles

    Aishwarya Rajasekar*, Vetriselvi Vetrian

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 225-254, 2025, DOI:10.32604/cmes.2025.062642 - 11 April 2025

    Abstract The integration of technologies like artificial intelligence, 6G, and vehicular ad-hoc networks holds great potential to meet the communication demands of the Internet of Vehicles and drive the advancement of vehicle applications. However, these advancements also generate a surge in data processing requirements, necessitating the offloading of vehicular tasks to edge servers due to the limited computational capacity of vehicles. Despite recent advancements, the robustness and scalability of the existing approaches with respect to the number of vehicles and edge servers and their resources, as well as privacy, remain a concern. In this paper, a lightweight… More >

  • Open Access

    ARTICLE

    Dynamic Networking Method of Vehicles in VANET

    Qingkun Chen, Qinmu Wu*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1301-1318, 2024, DOI:10.32604/cmc.2024.054799 - 15 October 2024

    Abstract Vehicular Ad-hoc Networks (VANETs) make it easy to transfer information between vehicles, and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety, economy, and entertainment of vehicle operation. The high mobility of vehicles leads to a time-varying topology between vehicles, which makes inter-vehicle information transfer challenging in terms of delay control and ensuring the stability of collaborative decision-making among vehicles. The clustering algorithm is a method aimed at improving the efficiency of VANET communication. Currently, most of the research based on this method focuses on maintaining the stability of vehicle… More >

  • Open Access

    ARTICLE

    Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks

    Vincent Omollo Nyangaresi1,2, Arkan A. Ghaib3, Hend Muslim Jasim4, Zaid Ameen Abduljabbar4,5,6,*, Junchao Ma5,*, Mustafa A. Al Sibahee7,8, Abdulla J. Y. Aldarwish4, Ali Hasan Ali9,10, Husam A. Neamah11

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1029-1057, 2024, DOI:10.32604/cmc.2024.053854 - 15 October 2024

    Abstract Vehicular ad hoc networks (VANETs) provide intelligent navigation and efficient route management, resulting in time savings and cost reductions in the transportation sector. However, the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations. To address these challenges, several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently. However, most of these schemes are limited by a long execution time and massive communication costs, which make them inefficient for on-board units (OBUs). Additionally, some… More >

  • Open Access

    ARTICLE

    Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs

    Nagaraju Pacharla, K. Srinivasa Reddy*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3089-3110, 2024, DOI:10.32604/cmc.2024.048133 - 15 May 2024

    Abstract With the recent technological developments, massive vehicular ad hoc networks (VANETs) have been established, enabling numerous vehicles and their respective Road Side Unit (RSU) components to communicate with one another. The best way to enhance traffic flow for vehicles and traffic management departments is to share the data they receive. There needs to be more protection for the VANET systems. An effective and safe method of outsourcing is suggested, which reduces computation costs by achieving data security using a homomorphic mapping based on the conjugate operation of matrices. This research proposes a VANET-based data outsourcing… More >

  • Open Access

    REVIEW

    A Review on the Recent Trends of Image Steganography for VANET Applications

    Arshiya S. Ansari*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2865-2892, 2024, DOI:10.32604/cmc.2024.045908 - 26 March 2024

    Abstract Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look. Whereas vehicular ad hoc networks (VANETs), which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services, as they are an essential component of modern smart transportation systems. VANETs steganography has been suggested by many authors for secure, reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection. This paper aims to determine whether using steganography is… More >

Displaying 1-10 on page 1 of 40. Per Page