Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks

    Youseef Alotaibi1, B. Rajasekar2, R. Jayalakshmi3, Surendran Rajendran4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4243-4262, 2024, DOI:10.32604/cmc.2024.047608

    Abstract Rapid development in Information Technology (IT) has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle (V2V) transmission. Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data. The communication occurs directly between V2V and Base Station (BS) units such as the Road Side Unit (RSU), named as a Vehicle to Infrastructure (V2I). However, the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time. Therefore, the scheme of an effectual routing protocol for reliable and stable communications is significant. Current research demonstrates… More >

  • Open Access

    ARTICLE

    Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study

    Fayaz Hassan1,*, Jianguo Yu1, Zafi Sherhan Syed2, Arif Hussain Magsi3, Nadeem Ahmed4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3185-3208, 2023, DOI:10.32604/cmc.2023.044650

    Abstract Vehicular Ad-hoc Networks (VANETs) are mobile ad-hoc networks that use vehicles as nodes to create a wireless network. Whereas VANETs offer many advantages over traditional transportation networks, ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks. This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System (IDS) that merges Machine Learning (ML)–based attack detection with Explainable AI (XAI) explanations. This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest (RF) classifier that achieves a classification accuracy of 100% for the binary classification task… More >

  • Open Access

    ARTICLE

    Examining the Use of Scott’s Formula and Link Expiration Time Metric for Vehicular Clustering

    Fady Samann1,*, Shavan Askar2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2421-2444, 2024, DOI:10.32604/cmes.2023.031265

    Abstract Implementing machine learning algorithms in the non-conducive environment of the vehicular network requires some adaptations due to the high computational complexity of these algorithms. K-clustering algorithms are simplistic, with fast performance and relative accuracy. However, their implementation depends on the initial selection of clusters number (K), the initial clusters’ centers, and the clustering metric. This paper investigated using Scott’s histogram formula to estimate the K number and the Link Expiration Time (LET) as a clustering metric. Realistic traffic flows were considered for three maps, namely Highway, Traffic Light junction, and Roundabout junction, to study the effect of road layout on… More >

  • Open Access

    ARTICLE

    A Trusted Edge Resource Allocation Framework for Internet of Vehicles

    Yuxuan Zhong1, Siya Xu1, Boxian Liao1, Jizhao Lu2, Huiping Meng2, Zhili Wang1, Xingyu Chen1,*, Qinghan Li3

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2629-2644, 2023, DOI:10.32604/cmc.2023.035526

    Abstract With the continuous progress of information technique, assisted driving technology has become an effective technique to avoid traffic accidents. Due to the complex road conditions and the threat of vehicle information being attacked and tampered with, it is difficult to ensure information security. This paper uses blockchain to ensure the safety of driving information and introduces mobile edge computing technology to monitor vehicle information and road condition information in real time, calculate the appropriate speed, and plan a reasonable driving route for the driver. To solve these problems, this paper proposes a trusted edge resource allocation framework for assisted driving… More >

  • Open Access

    ARTICLE

    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    Arif Hussain Magsi1,*, Ali Ghulam2, Saifullah Memon1, Khalid Javeed3, Musaed Alhussein4, Imad Rida5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1445-1465, 2023, DOI:10.32604/cmc.2023.040290

    Abstract Named Data Networking (NDN) is gaining a significant attention in Vehicular Ad-hoc Networks (VANET) due to its in-network content caching, name-based routing, and mobility-supporting characteristics. Nevertheless, existing NDN faces three significant challenges, including security, privacy, and routing. In particular, security attacks, such as Content Poisoning Attacks (CPA), can jeopardize legitimate vehicles with malicious content. For instance, attacker host vehicles can serve consumers with invalid information, which has dire consequences, including road accidents. In such a situation, trust in the content-providing vehicles brings a new challenge. On the other hand, ensuring privacy and preventing unauthorized access in vehicular (VNDN) is another… More >

  • Open Access

    ARTICLE

    Push-Based Content Dissemination and Machine Learning-Oriented Illusion Attack Detection in Vehicular Named Data Networking

    Arif Hussain Magsi1, Ghulam Muhammad2,*, Sajida Karim3, Saifullah Memon1, Zulfiqar Ali4

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3131-3150, 2023, DOI:10.32604/cmc.2023.040784

    Abstract Recent advancements in the Vehicular Ad-hoc Network (VANET) have tremendously addressed road-related challenges. Specifically, Named Data Networking (NDN) in VANET has emerged as a vital technology due to its outstanding features. However, the NDN communication framework fails to address two important issues. The current NDN employs a pull-based content retrieval network, which is inefficient in disseminating crucial content in Vehicular Named Data Networking (VNDN). Additionally, VNDN is vulnerable to illusion attackers due to the administrative-less network of autonomous vehicles. Although various solutions have been proposed for detecting vehicles’ behavior, they inadequately addressed the challenges specific to VNDN. To deal with… More >

  • Open Access

    ARTICLE

    A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks

    Muhammad Firdaus1, Harashta Tatimma Larasati2, Kyung-Hyune Rhee3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2959-2978, 2023, DOI:10.32604/cmc.2023.039487

    Abstract The enormous volume of heterogeneous data from various smart device-based applications has growingly increased a deeply interlaced cyber-physical system. In order to deliver smart cloud services that require low latency with strong computational processing capabilities, the Edge Intelligence System (EIS) idea is now being employed, which takes advantage of Artificial Intelligence (AI) and Edge Computing Technology (ECT). Thus, EIS presents a potential approach to enforcing future Intelligent Transportation Systems (ITS), particularly within a context of a Vehicular Network (VNets). However, the current EIS framework meets some issues and is conceivably vulnerable to multiple adversarial attacks because the central aggregator server… More >

  • Open Access

    ARTICLE

    A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network

    Muhammad Yasir Khan1, Muhammad Adnan1,2, Jawaid Iqbal3, Noor ul Amin1, Byeong-Hee Roh4, Jehad Ali4,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1185-1208, 2023, DOI:10.32604/csse.2023.039352

    Abstract An Information-Centric Network (ICN) provides a promising paradigm for the upcoming internet architecture, which will struggle with steady growth in data and changes in access models. Various ICN architectures have been designed, including Named Data Networking (NDN), which is designed around content delivery instead of hosts. As data is the central part of the network. Therefore, NDN was developed to get rid of the dependency on IP addresses and provide content effectively. Mobility is one of the major research dimensions for this upcoming internet architecture. Some research has been carried out to solve the mobility issues, but it still has… More >

  • Open Access

    ARTICLE

    Design of Evolutionary Algorithm Based Energy Efficient Clustering Approach for Vehicular Adhoc Networks

    V. Dinesh1, S. Srinivasan2, Gyanendra Prasad Joshi3, Woong Cho4,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 687-699, 2023, DOI:10.32604/csse.2023.035459

    Abstract In a vehicular ad hoc network (VANET), a massive quantity of data needs to be transmitted on a large scale in shorter time durations. At the same time, vehicles exhibit high velocity, leading to more vehicle disconnections. Both of these characteristics result in unreliable data communication in VANET. A vehicle clustering algorithm clusters the vehicles in groups employed in VANET to enhance network scalability and connection reliability. Clustering is considered one of the possible solutions for attaining effectual interaction in VANETs. But one such difficulty was reducing the cluster number under increasing transmitting nodes. This article introduces an Evolutionary Hide… More >

  • Open Access

    ARTICLE

    Metaheuristics-based Clustering with Routing Technique for Lifetime Maximization in Vehicular Networks

    P. Muthukrishnan*, P. Muthu Kannan

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1107-1122, 2023, DOI:10.32604/cmc.2023.031962

    Abstract Recently, vehicular ad hoc networks (VANETs) finds applicability in different domains such as security, rescue operations, intelligent transportation systems (ITS), etc. VANET has unique features like high mobility, limited mobility patterns, adequate topology modifications, and wireless communication. Despite the benefits of VANET, scalability is a challenging issue which could be addressed by the use of cluster-based routing techniques. It enables the vehicles to perform intercluster communication via chosen CHs and optimal routes. The main drawback of VANET network is the network unsteadiness that results in minimum lifetime. In order to avoid reduced network lifetime in VANET, this paper presents an… More >

Displaying 1-10 on page 1 of 22. Per Page