Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (32)
  • Open Access

    ARTICLE

    Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs

    Nagaraju Pacharla, K. Srinivasa Reddy*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3089-3110, 2024, DOI:10.32604/cmc.2024.048133

    Abstract With the recent technological developments, massive vehicular ad hoc networks (VANETs) have been established, enabling numerous vehicles and their respective Road Side Unit (RSU) components to communicate with one another. The best way to enhance traffic flow for vehicles and traffic management departments is to share the data they receive. There needs to be more protection for the VANET systems. An effective and safe method of outsourcing is suggested, which reduces computation costs by achieving data security using a homomorphic mapping based on the conjugate operation of matrices. This research proposes a VANET-based data outsourcing… More >

  • Open Access

    REVIEW

    A Review on the Recent Trends of Image Steganography for VANET Applications

    Arshiya S. Ansari*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2865-2892, 2024, DOI:10.32604/cmc.2024.045908

    Abstract Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look. Whereas vehicular ad hoc networks (VANETs), which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services, as they are an essential component of modern smart transportation systems. VANETs steganography has been suggested by many authors for secure, reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection. This paper aims to determine whether using steganography is… More >

  • Open Access

    ARTICLE

    Leveraging Augmented Reality, Semantic-Segmentation, and VANETs for Enhanced Driver’s Safety Assistance

    Sitara Afzal1, Imran Ullah Khan1, Irfan Mehmood2, Jong Weon Lee1,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1443-1460, 2024, DOI:10.32604/cmc.2023.046707

    Abstract Overtaking is a crucial maneuver in road transportation that requires a clear view of the road ahead. However, limited visibility of ahead vehicles can often make it challenging for drivers to assess the safety of overtaking maneuvers, leading to accidents and fatalities. In this paper, we consider atrous convolution, a powerful tool for explicitly adjusting the field-of-view of a filter as well as controlling the resolution of feature responses generated by Deep Convolutional Neural Networks in the context of semantic image segmentation. This article explores the potential of seeing-through vehicles as a solution to enhance… More >

  • Open Access

    ARTICLE

    Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study

    Fayaz Hassan1,*, Jianguo Yu1, Zafi Sherhan Syed2, Arif Hussain Magsi3, Nadeem Ahmed4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3185-3208, 2023, DOI:10.32604/cmc.2023.044650

    Abstract Vehicular Ad-hoc Networks (VANETs) are mobile ad-hoc networks that use vehicles as nodes to create a wireless network. Whereas VANETs offer many advantages over traditional transportation networks, ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks. This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System (IDS) that merges Machine Learning (ML)–based attack detection with Explainable AI (XAI) explanations. This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest (RF) classifier that achieves a classification accuracy of 100%… More >

  • Open Access

    ARTICLE

    Flag-Based Vehicular Clustering Scheme for Vehicular Ad-Hoc Networks

    Fady Samann1,*, Shavan Askar2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2715-2734, 2023, DOI:10.32604/cmc.2023.043580

    Abstract Clustering schemes in vehicular networks organize vehicles into logical groups. They are vital for improving network performance, accessing the medium, and enabling efficient data dissemination. Most schemes rely on periodically broadcast hello messages to provide up-to-date information about the vehicles. However, the periodic exchange of messages overwhelms the system and reduces efficiency. This paper proposes the Flag-based Vehicular Clustering (FVC) scheme. The scheme leverages a combination of Fitness Score (FS), Link Expiration Time (LET), and clustering status flags to enable efficient cluster formation in a hybrid manner. The FVC relies on the periodic broadcast of… More >

  • Open Access

    ARTICLE

    Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts

    Abdulatif Alabdulatif1,*, Mada Alharbi1, Abir Mchergui2, Tarek Moulahi3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 2005-2022, 2024, DOI:10.32604/cmes.2023.029769

    Abstract The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency. Revolutionary advanced technology, such as Intelligent Transportation Systems (ITS), enables improved traffic management, helps eliminate congestion, and supports a safer environment. ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users. However, ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks (VANETs). This is because each vehicle plays the role of a router in this… More >

  • Open Access

    RETRACTION

    Retraction: An Adaptive BWO Algorithm with RSA for Anomaly Detection in VANETs

    Y. Sarada Devi, M. Roopa

    Journal of Cyber Security, Vol.4, No.4, pp. 299-299, 2022, DOI:10.32604/jcs.2022.040534

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    An Adaptive BWO Algorithm with RSA for Anomaly Detection in VANETs

    Y. Sarada Devi*, M. Roopa

    Journal of Cyber Security, Vol.4, No.3, pp. 153-167, 2022, DOI:10.32604/jcs.2022.033436

    Abstract Vehicular ad hoc networks (VANETs) are designed in accordance with the ad hoc mobile networks (MANETs), i.e., impulsive formation of a wireless network for V2V (vehicle-to-vehicle) communication. Each vehicle is preserved as a node which remains as share of network. All the vehicle in the network is made to be under communication in a VANET because of which all the vehicles in the range can be made connected to a to a unit & a wide network can be established with a huge range. Healthier traffic management, vehicle-to-vehicle communication and provision of road information can… More >

  • Open Access

    ARTICLE

    Adapted Speed System in a Road Bend Situation in VANET Environment

    Said Benkirane1, Azidine Guezzaz1, Mourade Azrour1, Akber Abid Gardezi2, Shafiq Ahmad3, Abdelaty Edrees Sayed3, Salman Naseer4, Muhammad Shafiq5,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3781-3794, 2023, DOI:10.32604/cmc.2023.033119

    Abstract Today, road safety remains a serious concern for governments around the world. In fact, approximately 1.35 million people die and 2–50 million are injured on public roads worldwide each year. Straight bends in road traffic are the main cause of many road accidents, and excessive and inappropriate speed in this very critical area can cause drivers to lose their vehicle stability. For these reasons, new solutions must be considered to stop this disaster and save lives. Therefore, it is necessary to study this topic very carefully and use new technologies such as Vehicle Ad Hoc… More >

  • Open Access

    ARTICLE

    Metaheuristics-based Clustering with Routing Technique for Lifetime Maximization in Vehicular Networks

    P. Muthukrishnan*, P. Muthu Kannan

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1107-1122, 2023, DOI:10.32604/cmc.2023.031962

    Abstract Recently, vehicular ad hoc networks (VANETs) finds applicability in different domains such as security, rescue operations, intelligent transportation systems (ITS), etc. VANET has unique features like high mobility, limited mobility patterns, adequate topology modifications, and wireless communication. Despite the benefits of VANET, scalability is a challenging issue which could be addressed by the use of cluster-based routing techniques. It enables the vehicles to perform intercluster communication via chosen CHs and optimal routes. The main drawback of VANET network is the network unsteadiness that results in minimum lifetime. In order to avoid reduced network lifetime in… More >

Displaying 1-10 on page 1 of 32. Per Page