Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Flag-Based Vehicular Clustering Scheme for Vehicular Ad-Hoc Networks

    Fady Samann1,*, Shavan Askar2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2715-2734, 2023, DOI:10.32604/cmc.2023.043580

    Abstract Clustering schemes in vehicular networks organize vehicles into logical groups. They are vital for improving network performance, accessing the medium, and enabling efficient data dissemination. Most schemes rely on periodically broadcast hello messages to provide up-to-date information about the vehicles. However, the periodic exchange of messages overwhelms the system and reduces efficiency. This paper proposes the Flag-based Vehicular Clustering (FVC) scheme. The scheme leverages a combination of Fitness Score (FS), Link Expiration Time (LET), and clustering status flags to enable efficient cluster formation in a hybrid manner. The FVC relies on the periodic broadcast of the basic safety message in… More >

  • Open Access

    ARTICLE

    LSTDA: Link Stability and Transmission Delay Aware Routing Mechanism for Flying Ad-Hoc Network (FANET)

    Farman Ali1, Khalid Zaman2, Babar Shah3, Tariq Hussain4, Habib Ullah5, Altaf Hussain5, Daehan Kwak6,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 963-981, 2023, DOI:10.32604/cmc.2023.040628

    Abstract The paper presents a new protocol called Link Stability and Transmission Delay Aware (LSTDA) for Flying Ad-hoc Network (FANET) with a focus on network corridors (NC). FANET consists of Unmanned Aerial Vehicles (UAVs) that face challenges in avoiding transmission loss and delay while ensuring stable communication. The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network. The protocol uses a Red-Black (R-B) tree to achieve maximum channel utilization and an advanced relay approach. The paper evaluates LSTDA in terms of End-to-End Delay (E2ED), Packet Delivery Ratio… More >

  • Open Access

    ARTICLE

    Energy Efficient Green Routing for UAVs Ad-Hoc Network

    M. Muthukumar1, Rajasekar Rangasamy2, Irshad Hussain3,4, Salman A. AlQahtani4,*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1111-1127, 2023, DOI:10.32604/iasc.2023.034369

    Abstract The purpose of this article is to propose Stability-based Energy-Efficient Link-State Hybrid Routing (S-ELHR), a low latency routing protocol that aims to provide a stable mechanism for routing in unmanned aerial vehicles (UAV). The S-ELHR protocol selects a number of network nodes to create a Connected Dominating Set (CDS) using a parameter known as the Stability Metric (SM). The SM considers the node’s energy usage, connectivity time, and node’s degree. Only the highest SM nodes are chosen to form CDS. Each node declares a Willingness to indicate that it is prepared to serve as a relay for its neighbors, by… More >

  • Open Access

    ARTICLE

    Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation

    Y. M. Mahaboob John1,*, G. Ravi2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3653-3666, 2023, DOI:10.32604/csse.2023.036916

    Abstract Mobile Ad-hoc Network (MANET) routing problems are thoroughly studied several approaches are identified in support of MANET. Improve the Quality of Service (QoS) performance of MANET is achieving higher performance. To reduce this drawback, this paper proposes a new secure routing algorithm based on real-time partial ME (Mobility, energy) approximation. The routing method RRME (Real-time Regional Mobility Energy) divides the whole network into several parts, and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly. It is done in the path discovery phase, estimated to identify and remove malicious nodes. In addition, Trusted Forwarding Factor (TFF)… More >

  • Open Access

    ARTICLE

    Connected Vehicles Computation Task Offloading Based on Opportunism in Cooperative Edge Computing

    Duan Xue1,2, Yan Guo1,*, Ning Li1, Xiaoxiang Song1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 609-631, 2023, DOI:10.32604/cmc.2023.035177

    Abstract The traditional multi-access edge computing (MEC) capacity is overwhelmed by the increasing demand for vehicles, leading to acute degradation in task offloading performance. There is a tremendous number of resource-rich and idle mobile connected vehicles (CVs) in the traffic network, and vehicles are created as opportunistic ad-hoc edge clouds to alleviate the resource limitation of MEC by providing opportunistic computing services. On this basis, a novel scalable system framework is proposed in this paper for computation task offloading in opportunistic CV-assisted MEC. In this framework, opportunistic ad-hoc edge cloud and fixed edge cloud cooperate to form a novel hybrid cloud.… More >

  • Open Access

    ARTICLE

    Task Offloading Based on Vehicular Edge Computing for Autonomous Platooning

    Sanghyuck Nam1, Suhwan Kwak1, Jaehwan Lee2, Sangoh Park1,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 659-670, 2023, DOI:10.32604/csse.2023.034994

    Abstract Autonomous platooning technology is regarded as one of the promising technologies for the future and the research is conducted actively. The autonomous platooning task generally requires highly complex computations so it is difficult to process only with the vehicle’s processing units. To solve this problem, there are many studies on task offloading technique which transfers complex tasks to their neighboring vehicles or computation nodes. However, the existing task offloading techniques which mainly use learning-based algorithms are difficult to respond to the real-time changing road environment due to their complexity. They are also challenging to process computation tasks within 100 ms which… More >

  • Open Access

    ARTICLE

    Prediction of Link Failure in MANET-IoT Using Fuzzy Linear Regression

    R. Mahalakshmi1,*, V. Prasanna Srinivasan2, S. Aghalya3, D. Muthukumaran4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1627-1637, 2023, DOI:10.32604/iasc.2023.032709

    Abstract A Mobile Ad-hoc NETwork (MANET) contains numerous mobile nodes, and it forms a structure-less network associated with wireless links. But, the node movement is the key feature of MANETs; hence, the quick action of the nodes guides a link failure. This link failure creates more data packet drops that can cause a long time delay. As a result, measuring accurate link failure time is the key factor in the MANET. This paper presents a Fuzzy Linear Regression Method to measure Link Failure (FLRLF) and provide an optimal route in the MANET-Internet of Things (IoT). This work aims to predict link… More >

  • Open Access

    ARTICLE

    Genetic-based Fuzzy IDS for Feature Set Reduction and Worm Hole Attack Detection

    M. Reji1,*, Christeena Joseph2, K. Thaiyalnayaki2, R. Lathamanju2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1265-1278, 2023, DOI:10.32604/csse.2023.026776

    Abstract The wireless ad-hoc networks are decentralized networks with a dynamic topology that allows for end-to-end communications via multi-hop routing operations with several nodes collaborating themselves, when the destination and source nodes are not in range of coverage. Because of its wireless type, it has lot of security concerns than an infrastructure networks. Wormhole attacks are one of the most serious security vulnerabilities in the network layers. It is simple to launch, even if there is no prior network experience. Signatures are the sole thing that preventive measures rely on. Intrusion detection systems (IDS) and other reactive measures detect all types… More >

  • Open Access

    ARTICLE

    Dipper Throated Optimization for Detecting Black-Hole Attacks in MANETs

    Reem Alkanhel1, El-Sayed M. El-kenawy2,3, Abdelaziz A. Abdelhamid4,5, Abdelhameed Ibrahim6, Mostafa Abotaleb7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1905-1921, 2023, DOI:10.32604/cmc.2023.032157

    Abstract In terms of security and privacy, mobile ad-hoc network (MANET) continues to be in demand for additional debate and development. As more MANET applications become data-oriented, implementing a secure and reliable data transfer protocol becomes a major concern in the architecture. However, MANET’s lack of infrastructure, unpredictable topology, and restricted resources, as well as the lack of a previously permitted trust relationship among connected nodes, contribute to the attack detection burden. A novel detection approach is presented in this paper to classify passive and active black-hole attacks. The proposed approach is based on the dipper throated optimization (DTO) algorithm, which… More >

  • Open Access

    ARTICLE

    Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET

    S. Maheswari, R. Vijayabhasker*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3677-3692, 2023, DOI:10.32604/iasc.2023.031422

    Abstract Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by the day. Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes. The trust values are estimated based on the reputation values of each node in the network by using different mechanisms. However, these mechanisms have various challenging issues which degrade the network performance. Hence, a novel Quality of Service (QoS) Trust Estimation with Black/Gray hole Attack Detection approach is proposed in this research work. Initially, the QoS-based trust estimation is proposed by using a Fuzzy logic scheme. The trust… More >

Displaying 1-10 on page 1 of 31. Per Page