To see the other types of publications on this topic, follow the link: Ad hoc vehicle networks.

Journal articles on the topic 'Ad hoc vehicle networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Ad hoc vehicle networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Akwirry, Brian, Nik Bessis, Hassan Malik, and Sarah McHale. "A Multi-Tier Trust-Based Security Mechanism for Vehicular Ad-Hoc Network Communications." Sensors 22, no. 21 (2022): 8285. http://dx.doi.org/10.3390/s22218285.

Full text
Abstract:
Securing communications in vehicle ad hoc networks is crucial for operations. Messages exchanged in vehicle ad hoc network communications hold critical information such as road safety information, or road accident information and it is essential these packets reach their intended destination without any modification. A significant concern for vehicle ad hoc network communications is that malicious vehicles can intercept or modify messages before reaching their intended destination. This can hamper vehicle ad hoc network operations and create safety concerns. The multi-tier trust management system proposed in this paper addresses the concern of malicious vehicles in the vehicle ad hoc network using three security tiers. The first tier of the proposed system assigns vehicles in the vehicle ad hoc network a trust value based on behaviour such as processing delay, packet loss and prior vehicle behavioural history. This will be done by selecting vehicles as watchdogs to observe the behaviour of neighbouring vehicles and evaluate the trust value. The second tier is to protect the watchdogs, which is done by watchdogs’ behaviour history. The third security tier is to protect the integrity of data used for trust value calculation. Results show that the proposed system is successful in identifying malicious vehicles in the VANET. It also improves the packet delivery ratio and end-to-end delay of the vehicle ad hoc network in the presence of malicious vehicles.
APA, Harvard, Vancouver, ISO, and other styles
2

Danda, Nandhini, and K. Suresh Babu Dr. "Vehicular Ad-Hoc Networks (VANET)." International Journal of Innovative Science and Research Technology 7, no. 4 (2022): 533–40. https://doi.org/10.5281/zenodo.6519390.

Full text
Abstract:
Wir simulate VANET connection using NS2 and several protocols such as ADV, DSDV and DSR and then compare their performance using PDR (PDR). High PDR protocols are regarded as efficient and dependable. We're utilising packet encryption and decryption in our project to keep communications between cars safe. Both vehicles will send and receive encrypted signals about the distance and other traffic conditions while they are in close proximity, and these messages will be decoded when they are received. The VANET sensor cannot be hacked by anyone who is able to decipher the messages that are exchanged in the network. Our SUMO simulator is used to produce traffic mobility traces, which are then used to calculate protocol performance in NS2. The NS2 protocol will send alerts when a car arrives within a certain distance of another vehicle in this trail. When two vehicles get within a certain distance of one another, they exchange encrypted and decrypted distance messages, and one of the vehicles will halt and resume motion when the road is clear. I'll present the implementation in video so you can see the results for yourself. I'll plot the PDR performance of the DSDV, AODV, and DSR protocols after they've all been run
APA, Harvard, Vancouver, ISO, and other styles
3

Tippannavar, Sanjay, Meghana N, and Yashwanth S D. "A Security Protocol for V2V Communication using NS2 Network Simulator." International Journal of Innovative Research in Advanced Engineering 10, no. 03 (2023): 49–57. http://dx.doi.org/10.26562/ijirae.2023.v1003.02.

Full text
Abstract:
The principles of MANETs, or mobile ad hoc networks, form the foundation of vehicular ad hoc networks (VANETs). Vanet was first introduced as "Car to Vehicle ad hoc mobile communication and networking" in 2001. In order to build a communication network and transfer data among vehicles, Vanet were invented. Vanet uses a variety of means to establish communication, including vehicle-to-vehicle communication. In this project, both roadside-to-roadside and vehicle-to-roadside communications are employed, and vehicle-to-roadside communication is taken into consideration. A different term for VANETs is Intelligent Transportation Networks. The "Internet of Vehicles" (Vanet) has expanded into a larger system and will ultimately become the internet. There will be a "Internet of autonomous vehicles" in the not too distant future. Wireless networking is used by Vanets for networking and communication; even LTE and 5G may be used by vanets. In this project, a protocol is being developed to provide security for the established connection in Vanet, i.e., to recognise and stop any network intrusions. The NS2 network simulator is used to implement this protocol for testing purposes.
APA, Harvard, Vancouver, ISO, and other styles
4

Ragab, Ahmed Refaat, and Pablo Flores. "Adapting Ad-hoc Routing Protocol for Unmanned Aerial Vehicle Systems." International Journal of Data Science 2, no. 1 (2021): 1–8. http://dx.doi.org/10.18517/ijods.2.1.1-8.2021.

Full text
Abstract:
The field of the ad-hoc network and its routing protocols had attracted a lot of researchers for many years, due to the various usage of the ad-hoc networks in many fields and especially the field of Unmanned Aerial Vehicles (UAVs). Routing protocols in the ad-hoc network are the main focused problem, for their characteristics and role during the communication process of the ad-hoc networks, with its different types. In this paper, we are going to analyze and sheds the light on the performance of ad-hoc routing protocols, for both Flying ad-hoc network (FANET) and vehicle ad-hoc network (VANET) when applying three different ad-hoc routing protocols, respectively Reactive routing protocol, Proactive routing protocol, and Hybrid routing protocol, in order to shed light on the ambiguous misunderstanding of ad-hoc routing protocols functionality and to choose the best routing protocol to be used and adapted for UAVs.
APA, Harvard, Vancouver, ISO, and other styles
5

Farhood, Zahra, Ali Abed, and Sarah Al-Shareeda. "Privacy Issues in Vehicular Ad-hoc Networks: A Review." Iraqi Journal for Electrical and Electronic Engineering 20, no. 1 (2023): 25–36. http://dx.doi.org/10.37917/ijeee.20.1.3.

Full text
Abstract:
Vehicle Ad-hoc Network (VANET) is a type of wireless network that enables communication between vehicles and Road Side Units (RSUs) to improve road safety, traffic efficiency, and service delivery. However, the widespread use of vehicular networks raises serious concerns about users’ privacy and security. Privacy in VANET refers to the protection of personal information and data exchanged between vehicles, RSUs, and other entities. Privacy issues in VANET include unauthorized access to location and speed information, driver and passenger identification, and vehicle tracking. To ensure privacy in VANET, various technologies such as pseudonymization, message authentication, and encryption are employed. When vehicles frequently change their identity to avoid tracking, message authentication ensures messages are received from trusted sources, and encryption is used to prevent unauthorized access to messages. Therefore, researchers have presented various schemes to improve and enhance the privacy efficiency of vehicle networks. This survey article provides an overview of privacy issues as well as an in-depth review of the current state-of-the-art pseudonym-changing tactics and methodologies proposed.
APA, Harvard, Vancouver, ISO, and other styles
6

Kaur, Sukhpreet, and Er Sharad. "Multicasting technique for path establishment in vehicular ad hoc networks." International Journal of Engineering & Technology 7, no. 2.4 (2018): 204. http://dx.doi.org/10.14419/ijet.v7i2.4.13040.

Full text
Abstract:
The vehicular adhoc network is the decentralized type of network in which vehicles can move from one location to another. In the network two type of communication is possible which are vehicle to vehicle and vehicle to infrastructure. In the vehicle to vehicle type of path establishment is the major issue of the network. In this research work, multicasting routing technique is proposed for the path establishment from source to destination. The proposed technique is implemented in NS2 and simulation results shows improvement in network delay for path establishment
APA, Harvard, Vancouver, ISO, and other styles
7

Seth, Ishita, Kalpna Guleria, and Surya Narayan Panda. "Introducing Intelligence in Vehicular Ad Hoc Networks Using Machine Learning Algorithms." ECS Transactions 107, no. 1 (2022): 8395–406. http://dx.doi.org/10.1149/10701.8395ecst.

Full text
Abstract:
The automotive industry has gained popularity in the past decade, leading to tremendous advancements in intelligent vehicular networks. The increase in the number of vehicles on the roads makes it essential for vehicles to act intelligently as humans do. The concept of machine learning is that when vehicles learn and improve to operate by the previously processed data. The machine learning techniques have helped the automotive industry develop the driverless car. With the help of sensors and cameras, it is quite possible to use the machine learning algorithms and provide the user with its benefits. It helps to allow the vehicle to perform specific tasks that actually can replace the vehicle's driver. The Artificial Intelligence (AI) chips integrated into the vehicles enable the vehicle to navigate roads. This paper provides insight into the machine learning algorithms widely used by the automotive industries, and a comparison is made between them concerning the Vehicular Ad Hoc Network (VANET) applications.
APA, Harvard, Vancouver, ISO, and other styles
8

Mr., Girish Tiwari, and Sanket Gupta Mr. "PERFORMANCE EVOLUTION OF VEHICULAR AD-HOC NETWORK FOR INTER VEHICLE COMMUNICATION UNDER DIFFERENT MODULATION TECHNIQUE." International Journal of Engineering Sciences & Research Technology 5, no. 2 (2016): 842–48. https://doi.org/10.5281/zenodo.46531.

Full text
Abstract:
Vehicular Ad-hoc Networks (VANETs) are self-organized networks built up from moving vehicles, and are part of the broader class of Mobile Ad-hoc Networks (MANETs).   Inter vehicle communication is the part of VANET and play major role in many applications of VANET. This paper compares the performance of inter vehicle communication in different modulation technique for this we use matlab simulation plate form. Second part of this paper shows the relation between Bit Error Rate and Distance of wireless channel under different modulations.  
APA, Harvard, Vancouver, ISO, and other styles
9

Niknamian, Sorush. "Data Fast Transmission Method in Wireless Vehicle Ad-hoc Network." Journal of Applied Science, Engineering, Technology, and Education 1, no. 2 (2019): 149–61. http://dx.doi.org/10.35877/454ri.asci1294.

Full text
Abstract:
In vehicular ad hoc networks, the current method does not consider the delay of data transmission, resulting in slower vehicle data transmission speed. A vehicle data transmission method based on backbone network is proposed in this paper. Firstly, the characteristics of vehicle ad hoc network are analyzed. Based on the statistics of the road, the vehicle cluster is composed of the vehicles parking on the roadside and no roadside according to the different directions of the vehicle driving. The backbone network is constructed on the basis of the cluster of vehicles, and the data transmission between the vehicles is implemented by the data transmission method of overlay network. This method can overcome the disadvantages of traditional data transmission methods, improve the efficiency of on-board data transmission, and complete the research on fast data transmission method in wireless vehicle ad hoc network. The experimental results show that the proposed method can achieve higher data transmission success rate with lower data transmission overhead and smaller transmission delay.
APA, Harvard, Vancouver, ISO, and other styles
10

Neelambike, S., C. Amith Shekhar, B. H. Rekha, and Bhavana S. Patil. "Ad Hoc Vehicle Networks: Recapitulation and Challenges." Asian Journal of Computer Science and Technology 10, no. 1 (2021): 45–52. http://dx.doi.org/10.51983/ajcst-2021.10.1.2700.

Full text
Abstract:
Being ad-hoc in design, VA NET is a form of networks generated by the idea of building up a network of cars for a specific needs or circumstance. In addition to the benefits, VANET poses a large number of challenges such as providing QoS, high bandwidth and connectivity, and vehicle and individual privacy security. Each report discusses VANET 's state-of-the-art, explaining the relevant problems. We address in depth network design, signal modelling and propagation mechanisms m, usability modeling, routing protocols and network security. The paper's key results are that an effective and stable VANET satisfies all architecture criteria such as QoS, minimal latency, low BER and high PDR. At the end of the paper are addressed several primary work areas and challenges at VANET.
APA, Harvard, Vancouver, ISO, and other styles
11

Sivaparvathi, Mandalapu, Dr J. Dillibabu, Nelaturi Sandhya Rani, and Shaik Reshma. "Vehicular Ad-Hoc Networks (VANETs) for Autonomous Driving Systems." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 2087–93. https://doi.org/10.22214/ijraset.2025.70672.

Full text
Abstract:
Abstract: Vehicular Ad-Hoc Networks (VANETs) represent a cornerstone technology in the advancement of autonomous driving systems. By enabling vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication, VANETs facilitate real-time data sharing essential for the dynamic decision-making required in autonomous navigation. This paper investigates the architecture, protocols, and applications of VANETs, particularly focusing on their integration into autonomous driving systems. Through a review of literature, case studies, and analysis of current methodologies, the research identifies the core benefits, existing challenges, and future potential of VANET-enabled autonomous vehicles. Key themes include low-latency communication, security frameworks, mobility modeling, and network scalability. The findings suggest that despite current limitations in standardization, interoperability, and security, VANETs are instrumental to realizing fully autonomous, safe, and efficient vehicular systems.
APA, Harvard, Vancouver, ISO, and other styles
12

Ragab, Ahmed Refaat Sobhy Ahmed. "A New Classification for Ad-Hoc Network." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 14 (2020): 214. http://dx.doi.org/10.3991/ijim.v14i14.14871.

Full text
Abstract:
<span>This paper focus on developing a new practical classification for ad-hoc networks, were all the past classifications revolve upon three main categories respectively, mobile ad- hoc network (MANET), Vehicle ad-hoc network (VANET) and Flying ad-hoc network (FANET). My new classification will illustrate Underwater vehicle ad-hoc network (UWVANET) as the fourth category in ad-hoc main classification, showing the powerful and the weakness of each category defined.</span>
APA, Harvard, Vancouver, ISO, and other styles
13

Rasa Iffat Helmi and Shiek Md. Anwar Hussain Mizan. "Routing Protocols for Vehicle-to-Vehicle (V2V) Networks." World Journal of Advanced Research and Reviews 19, no. 1 (2023): 334–39. http://dx.doi.org/10.30574/wjarr.2023.19.1.1321.

Full text
Abstract:
VANET, short for Vehicle Ad-hoc Network, is an emerging technology with unique characteristics that differentiate it from previous ad-hoc networks. Designing an effective routing protocol for V2V (vehicle-to-vehicle) communication and V2I (vehicle-to-roadside infrastructure) communication is particularly challenging due to the dynamic nature of topology and frequent disconnections. VANET plays a crucial role in the development of Intelligent Transportation Systems (ITS) aimed at enhancing traffic flow and safety, primarily due to the high occurrence of traffic accidents. However, existing VANET routing protocols face limitations in effectively handling diverse traffic scenarios. To ensure future communication between vehicles for road safety, it is essential to develop appropriate routing protocols. This paper focuses on analyzing the advantages and disadvantages of routing protocols that can contribute to the development of new or improved routing protocols in the near future.
APA, Harvard, Vancouver, ISO, and other styles
14

Rasa, Iffat Helmi, and Md. Anwar Hussain Mizan Shiek. "Routing Protocols for Vehicle-to-Vehicle (V2V) Networks." World Journal of Advanced Research and Reviews 19, no. 1 (2023): 334–39. https://doi.org/10.5281/zenodo.10250852.

Full text
Abstract:
VANET, short for Vehicle Ad-hoc Network, is an emerging technology with unique characteristics that differentiate it from previous ad-hoc networks. Designing an effective routing protocol for V2V (vehicle-to-vehicle) communication and V2I (vehicle-to-roadside infrastructure) communication is particularly challenging due to the dynamic nature of topology and frequent disconnections. VANET plays a crucial role in the development of Intelligent Transportation Systems (ITS) aimed at enhancing traffic flow and safety, primarily due to the high occurrence of traffic accidents. However, existing VANET routing protocols face limitations in effectively handling diverse traffic scenarios. To ensure future communication between vehicles for road safety, it is essential to develop appropriate routing protocols. This paper focuses on analyzing the advantages and disadvantages of routing protocols that can contribute to the development of new or improved routing protocols in the near future.
APA, Harvard, Vancouver, ISO, and other styles
15

Kuthe, Annaji, Tejas Chaudhari, Shekhar Thakare, Praful Dohtare, and Divyadeep Waghmare. "Design and Implementation of VANET in Ad hoc Network using MATLAB." International Journal of Computer Science and Mobile Computing 11, no. 3 (2022): 49–55. http://dx.doi.org/10.47760/ijcsmc.2022.v11i03.007.

Full text
Abstract:
Today wireless communications is becoming the most useful means of transferring data, and the most active research sector. In this I will demonstrate one of the most useful types of the Ad-Hoc networks; the Vehicular Ad-Hoc Networks. VANET is the sort of technology of constructing an Ad-Hoc network with resilience between vehicles and each other, as well as, between mobile vehicles and with all roadside unit additionally. To facilitate the communication between automobiles, a special type of MANET known as VANET has been developed. Using realistic vehicle mobility models, we develop VANET simulators and models for representing vehicle communication and mobility. This test necessitates the use of both a traffic and network simulator. However, because it is simple, easy, and inexpensive, the MATLAB has been preferred to the traffic simulation. An urban scenario Vehicular Ad-Hoc Network (VAN) simulation is the goal of this paper, which can be used for testing. MAC protocols in VANETs can benefit from this type of environment.
APA, Harvard, Vancouver, ISO, and other styles
16

Raza, Ali, Syed Hashim Raza Bukhari, Farhan Aadil, and Zeshan Iqbal. "An UAV-assisted VANET architecture for intelligent transportation system in smart cities." International Journal of Distributed Sensor Networks 17, no. 7 (2021): 155014772110317. http://dx.doi.org/10.1177/15501477211031750.

Full text
Abstract:
Vehicular ad hoc network is a pretty research vibrant area since last decade. It has been successfully used for intelligent transportation system and entertainment purposes for realization of smart cities. However, intermittent connectivity, high routing overhead, inflexible communication infrastructure, unscalable networks, and high packet collision are the key challenges that put hindrances on the wide applications of vehicular ad hoc network. The severity of these challenges become even more intensified when deployed in urban areas. To overcome these hurdles, integrating micro unmanned aerial vehicles with vehicular ad hoc network provides a viable solution. In this article, we proposed an unmanned aerial vehicle–assisted vehicular ad hoc network communication architecture in which unmanned aerial vehicles fly over the deployed area and provide communication services to underlying coverage area. Unmanned aerial vehicle–assisted vehicular ad hoc network avails the advantages of line-of-sight communication, load balancing, flexible, and cost effective deployment. The performance of the proposed model is evaluated against a case study of vehicle collision on highway. Results show that utilization of unmanned aerial vehicles ensures the guaranteed and timely delivery of emergency messages to nearby vehicles so that a safe action can be taken to avoid further damages.
APA, Harvard, Vancouver, ISO, and other styles
17

Soumya, S., Prasad K. Krishna, and N. Bappalige Navin. "Performance Analysis of Mobile Ad Hoc Routing Protocols in Vehicular Ad Hoc Networks using NS3." International Journal of Applied Engineering and Management Letters (IJAEML) 5, no. 1 (2021): 19–28. https://doi.org/10.5281/zenodo.4615742.

Full text
Abstract:
Vehicular Ad hoc Networks (VANET) is an emerging technology that brings tremendous technological advancement in the method of communication among smart vehicles. Due to its complex infrastructure and vehicle speed, data routing remains difficult at VANET. A VANET is also considered similar to Mobile Ad Hoc Network (MANET), and MANET routing protocols can be adapted for VANETs for performance evaluation. In this work, we have selected a real world scenario from our locality with high traffic issues, Nanthoor Mangalore City Karnataka, India and a Map is generated using Open Street Map using SUMO and the MANET routing protocols AODV, OLSR, DSDV and OLSR are evaluated using NS3.
APA, Harvard, Vancouver, ISO, and other styles
18

Hussain, Syed Asad, Muddesar Iqbal, Atif Saeed, et al. "An Efficient Channel Access Scheme for Vehicular Ad Hoc Networks." Mobile Information Systems 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/8246050.

Full text
Abstract:
Vehicular Ad Hoc Networks (VANETs) are getting more popularity due to the potential Intelligent Transport Systems (ITS) technology. It provides many efficient network services such as safety warnings (collision warning), entertainment (video and voice), maps based guidance, and emergency information. VANETs most commonly use Road Side Units (RSUs) and Vehicle-to-Vehicle (V2V) referred to as Vehicle-to-Infrastructure (V2I) mode for data accessing. IEEE 802.11p standard which was originally designed for Wireless Local Area Networks (WLANs) is modified to address such type of communication. However, IEEE 802.11p uses Distributed Coordination Function (DCF) for communication between wireless nodes. Therefore, it does not perform well for high mobility networks such as VANETs. Moreover, in RSU mode timely provision of data/services under high density of vehicles is challenging. In this paper, we propose a RSU-based efficient channel access scheme for VANETs under high traffic and mobility. In the proposed scheme, the contention window is dynamically varied according to the times (deadlines) the vehicles are going to leave the RSU range. The vehicles with shorter time deadlines are served first and vice versa. Simulation is performed by using the Network Simulator (NS-3) v. 3.6. The simulation results show that the proposed scheme performs better in terms of throughput, backoff rate, RSU response time, and fairness.
APA, Harvard, Vancouver, ISO, and other styles
19

Ali, Wajid, and Shalini Ninoria. "Enhanced route reliability algorithm for vehicular ad hoc networks." International Journal on Information Technologies and Security 17, no. 2 (2025): 101–10. https://doi.org/10.59035/jphw2885.

Full text
Abstract:
Vehicular Ad Hoc Networks (VANETs) play a crucial role in facilitating road communication. By transmitting real-time traffic information to nearby vehicles and infrastructure, VANETs help address various real-world challenges, enhancing traffic management and road safety. To achieve this a secure and reliable scheme is needed. Reliable communication in VANER struggles with many problems like varying speed of vehicles, dynamic vehicle movement etc. To address this, we propose the Clustering Based Enhanced Route Reliability Algorithm (ERRAV), which uses clustering technique to improve route stability. In this geographical area is divided into clusters, each cluster is managed by a Cluster Head (CH). CH is selected based on signal strength, mobility, and vehicle density, ensuring stable communication. After clustering Reliable routes are established and maintained through periodic link monitoring, route updates, and backup routes. Simulations of ERRAV show the enhancement of scalability by reducing congestion, optimizing route discovery, and adaptation to network changes. EERAV been compared to AODV, DSR, and OLSR and experimental results show the reduced routing overhead, improves packet delivery, and minimizes link failures, making it highly effective in mobile environments.
APA, Harvard, Vancouver, ISO, and other styles
20

Tiwari, Rovin, and Megha Nema. "Privacy Preserving Authentication Approaches over Mobile Ad-Hoc Networks." SMART MOVES JOURNAL IJOSCIENCE 5, no. 8 (2019): 10–13. http://dx.doi.org/10.24113/ijoscience.v5i8.288.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are normal in improving road wellbeing and traffic conditions, in which security is basic. In MANETs, the authentication of the mobile access control is a vital security administration for both inter‐vehicle and vehicle–roadside unit correspondences. In the mean time, vehicles additionally must be kept from the abuse of the private data and the assaults on their privacy. There is various research works concentrating on giving the mysterious authentication protected privacy in MANETs. In this paper, we explicitly give a review on the privacy‐preserving authentication (PPA) plans proposed for MANETs. We research and sort the current PPA plots by their key cryptographies for authentication and the systems for privacy safeguarding. We likewise give a near report/rundown of the advantages and disadvantages of the current PPA plans.
APA, Harvard, Vancouver, ISO, and other styles
21

Muhamad Yusuf and Ramdhani Syahputra. "Analisa Kinerja Protokol Routing Destination Sequenced Distance Vector Di Jaringan VANET." Jurnal Teknik Mesin, Industri, Elektro dan Informatika 3, no. 2 (2024): 121–33. http://dx.doi.org/10.55606/jtmei.v3i2.3786.

Full text
Abstract:
Vehicular network is a network where vehicles communicate via an ad-hoc network system that runs based on certain ad-hoc routing protocols. A vehicle ad-hoc network consists of two communication parts known as vehicle-to-vehicle communication and vehicle-to-infrastructure communication. Even though the roads have become very congested with many vehicles, controlling vehicle movement has become an urgent need. Automatic traffic control, critical moment notifications, post-accident notifications, correct route selection become very important and these can be implemented using vehicle ad-hoc network systems. For good communication between vehicles, vehicle ad-hoc networks use several protocols. One of the problems faced by VANET is routing. Routing in VANETs can perform challenging tasks due to high mobility, network topology interference, and path selection processes. DSDV is one of the routing used in VANET and simulations were carried out with NS2 to obtain DSDV routing performance in the VANET network based on quality of service with scenarios of 25 and 33 nodes. DSDV routing was chosen because it has the best performance in its class. From the simulation results, the end to end delay for 25 nodes is 22.22 and 33 nodes is 24.07, the packet drop obtained for 25 nodes is 0.85, and 33 nodes is 0.80. Furthermore, the throughput value obtained in the simulation for 25 nodes is 274.19 and 33 nodes 351.12, then the packet delivery ratio for 25 nodes is 2990, and 33 nodes is 4888
APA, Harvard, Vancouver, ISO, and other styles
22

Farman, Haleem, Bilal Jan, Muhammad Talha, et al. "Multicriteria-Based Location Privacy Preservation in Vehicular Ad Hoc Networks." Complexity 2018 (June 4, 2018): 1–12. http://dx.doi.org/10.1155/2018/7697324.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) are the preferable choice for Intelligent Transportation Systems (ITS) because of its prevailing significance in both safety and nonsafety applications. Information dissemination in a multihop fashion along with privacy preservation of source node is a serious but challenging issue. We have used the idea of the phantom node as the next forwarder for data dissemination. The phantom node (vehicle) hides the identity of actual source node thus preserving the location privacy. The selection of the phantom node among the set of alternatives’ candidate vehicles is considered as a multicriteria-based problem. The phantom node selection problem is solved by using an analytical network process (ANP) by considering different traffic scenarios. The selection is based on different parameters which are distance, speed, trust, acceleration, and direction. The best alternative (target phantom vehicle) is selected through an ANP where all the alternatives are ranked from best to worst. The vehicle having maximum weight is considered to be the best choice as a phantom node. In order to check the stability of the alternatives’ ranking, sensitivity analysis is performed by taking into account different traffic scenarios and interest level of candidate vehicles.
APA, Harvard, Vancouver, ISO, and other styles
23

Yuan, Jia Lu, Hai Lin Jiang, and Hua Shen Wang. "HLA Based Vehicular Ad-Hoc Networks Simulation." Advanced Materials Research 846-847 (November 2013): 1458–61. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1458.

Full text
Abstract:
Vehicular Ad-hoc network (VANET) is a promising technology in enabling highway active safety applications such as collision warning and information broadcasting. Nowadays, VANET is extended to offer more services like vehicle tracking, WI-FI access, and Global Positioning System (GPS) services. However, there`s still serious challenges in enabling information disseminated while avoiding broadcast storm. In this paper, we develop an HLA Federation with two federates to evaluate the VANET performance with or without Road-side Unit (RSU) in the same scenarios. We use OPNET Modeler to evaluate the performance of VANET and use Paramics to set the trajectory of vehicle node in OPNET Modeler and find out the improvement of communication quality brought by RSU.
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Hao, Liangyin Chen, Shijia Liu, et al. "Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks." Journal of Sensors 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/4236789.

Full text
Abstract:
This paper proposes a Trajectory-Based Hierarchical Adaptive Forwarding (THAF) scheme, tailored and optimized for the efficient multihop vehicle-to-vehicle (v2v) data delivery in vehicular ad hoc networks. We utilize the trajectories of vehicles provided by GPS-based navigation systems to predict forward delay and access area in a privacy-preserving manner. Different from existing trajectory-based forwarding schemes, we establish a hierarchical VANET topology to optimize forwarding path and adopt adaptive diffusion strategy to forward data in light-traffic situations. Through theoretical analysis and extensive simulation, it is shown that our design performs better than the existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
25

Gazdar, Tahani, Abdelfettah Belghith, and Abderrahim Benslimane. "A Distributed Secure Architecture for Vehicular Ad Hoc Networks." International Journal of Business Data Communications and Networking 6, no. 4 (2010): 38–63. http://dx.doi.org/10.4018/jbdcn.2010100103.

Full text
Abstract:
In this paper, the authors propose a dynamic Public Key Infrastructure (PKI) for vehicular ad hoc networks to distribute the role of the central certification authority (CA) among a set of dynamically elected CAs. The election process is based on a clustering algorithm relying on trust levels and relative mobility. Furthermore, the authors have adapted the Dynamic Demilitarized Zones to protect the elected CAs from malicious nodes and enable them to act as registration authorities (RA). Extensive simulations are conducted to evaluate the performance of the clustering algorithm and investigate the impact of the vehicle speed, the vehicle average arrival rate, and the percentage of confident vehicles on the stability and efficiency of the security infrastructure. The authors demonstrate the percentage of confident nodes has a little impact on these performance metrics and that the minimum number of CAs to cover the entire platoon.
APA, Harvard, Vancouver, ISO, and other styles
26

Yan, Gongjun, and Danda B. Rawat. "Vehicle-to-vehicle connectivity analysis for vehicular ad-hoc networks." Ad Hoc Networks 58 (April 2017): 25–35. http://dx.doi.org/10.1016/j.adhoc.2016.11.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hadi Saleh, Hassan, and Saad Talib Hasoon. "A Survey on VANETs: Challenges and Solutions." International Journal of Engineering & Technology 7, no. 4.19 (2018): 711–19. http://dx.doi.org/10.14419/ijet.v7i4.19.27987.

Full text
Abstract:
Vehicular Ad-hoc Network (VANET) is an advanced style and subcategory of a Mobile Ad hoc Network (MANET), the main objective of VANET's is to create an Intelligent Transport System (ITS), to reduce traffic congestion, accidents or assistance as gates to other networks such as the Internet. VANET is responsible for the communication between moving vehicles in a certain environment. A vehicle can communicate with another vehicle directly which is termed Vehicle to Vehicle (V2V) communication, or a vehicle can communicate to an infrastructure such as a Road Side Unit (RSU), identified as Vehicle-to-Infrastructure (V2I). VANET networks have now been established as reliable networks used by vehicles for communication on highways or urban environments. The goal of VANET is to help a group of vehicles to establish and maintain a network of communications between them without using any central base station. Along with benefits, there are a large number of challenges facing VANET. In this research, we present a comprehensive review of the challenges facing these networks with some of the proposed solutions, Researchers will gain best understand of VANETs challenges and research trends from the study. Â
APA, Harvard, Vancouver, ISO, and other styles
28

Gupta, Sonali. "Performance Evaluation of Routing Protocols in Vehicular Ad-Hoc Networks (VANETs): A Comparative Study." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 1 (2020): 847–56. http://dx.doi.org/10.17762/turcomat.v11i1.13567.

Full text
Abstract:
VANET is a novel way for fast-moving autos to connect. VANET provided traffic engineering, management, emergency information to avoid accidents, and other user applications. VANETs are similar to Mobile Ad hoc Networks (MANETs), but they have fast speeds, mobility, adequate storage and processing power, unexpected node density, difficult communication environments with limited connection lifespans, etc. Hence, VANET protocol testing needs realism. Vehicular Ad hoc Network (VANET) is a new communication paradigm that allows road network V2V and V2I communication (V2I). It supports traffic engineering, emergency information transfer, and other user applications. Vehicular networks distribute data about road traffic conditions to keep vehicles safe and efficient. VANET Applications' characteristics—different network density, fast vehicle movement—make data dissemination difficult. Performance requirements determine these protocols' vehicle area network applicability. Vehicles talking with each other and roadside units constitute Vehicular Ad-Hoc Networks (VANETs), a specific type of MANET (RSUs). VANETs allow safety, traffic management, and infotainment. Due to vehicle mobility and frequent network topology changes, VANETs have routing difficulties. This paper compares VANET routing protocols. . Simulations reveal that mobility pattern, network density, and traffic load affect protocol performance.
APA, Harvard, Vancouver, ISO, and other styles
29

Ren, Shihai, Junhui Zhao, Huan Zhang, and Xuan Li. "Connectivity Analysis with Co-Channel Interference for Urban Vehicular Ad Hoc Networks." Electronics 12, no. 9 (2023): 2021. http://dx.doi.org/10.3390/electronics12092021.

Full text
Abstract:
In urban vehicular ad hoc networks (VANETs), the complex channel environment and co-channel interference resulted in the uncertain delay of inter-vehicle packet transmission, which causes serious delay jitter. Connectivity is proposed as a key metric to describe this uncertainty. However, existing works lack a discussion of inter-vehicle connectivity in urban VANETs, particularly with regards to the process of transmitting packets between vehicles. In this paper, we analyze the connectivity probability of urban VANETs under co-channel interference with both complete and incomplete information. When the information is complete, we model the time-varying nature of co-channel interference and channel fading as delay jitter and analyze inter-vehicle connectivity in a time-varying environment. Then, when complete information is unavailable, we estimate the probability distribution of co-channel interference by combining the distribution of multiple parameters with the free space propagation model (Friss) model and Nakagami-m fading model. The expression for the connectivity performance of vehicle-to-vehicle (V2V) links is derived from the signal interference plus noise ratio (SINR) of the destination V2V link. Finally, we analyze the implications of various factors on connectivity, such as the transmit power of the signal, the arrival rate of packets, the number of channels and vehicles, and the distance between the transmitting vehicle and the receiving vehicle. The numerical analysis shows that co-channel interference and signal fading significantly affect inter-vehicle connectivity.
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Jiang Feng, Shuo Nie, Xue Dong Yan, and Wang Xiang. "Multi-Scenarios Vehicle Traces Modeling in Co-Simulation of Vehicular Ad-Hoc Networks." Applied Mechanics and Materials 178-181 (May 2012): 2694–98. http://dx.doi.org/10.4028/www.scientific.net/amm.178-181.2694.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) form when vehicles are equipped with devices capable of short-range wireless communication. Realistic vehicle trace modeling for VANETs simulations is a challenging task, which requires the reliable characterization of vehicular mobility. In this study, three different vehicle scenarios are proposed to analyze the difference between vehicle traces in multi-scenarios: city road, expressway and highway. Common trace modeling tools and characters of the scenarios are explored. Furthermore, three experimental scenarios are established using VanetMobiSim to produce vehicle traces. The experimental results show that the trend of the average speed versus the number of vehicles is different, and the vehicular density distribution demonstrates the realism of vehicle trace under multi-scenarios.
APA, Harvard, Vancouver, ISO, and other styles
31

REYES, A., C. BARRADO, and A. GUERRERO. "COMMUNICATION TECHNOLOGIES TO DESIGN VEHICLE-TO VEHICLE AND VEHICLE-TO-INFRASTRUCTURES APPLICATIONS." Latin American Applied Research - An international journal 46, no. 1 (2016): 29–35. http://dx.doi.org/10.52292/j.laar.2016.323.

Full text
Abstract:
Intelligent Transport Systems use communication technologies to offer real-time traffic information services to road users and government managers. Vehicular Ad Hoc Networks is an important component of ITS where vehicles communicate with other vehicles and road-side infrastructures, analyze and process received information, and make decisions according to that. However, features like high vehicle speeds, constant mobility, varying topology, traffic density, etc. induce challenges that make conventional wireless technologies unsuitable for vehicular networks. This paper focuses on the process of designing efficient vehicle-to-vehicle and vehicle-to road-side infrastructure applications.
APA, Harvard, Vancouver, ISO, and other styles
32

Gao, Tianhan, Yanqiang Li, Nan Guo, and Ilsun You. "An anonymous access authentication scheme for vehicular ad hoc networks under edge computing." International Journal of Distributed Sensor Networks 14, no. 2 (2018): 155014771875658. http://dx.doi.org/10.1177/1550147718756581.

Full text
Abstract:
With the rapid booming of intelligent traffic system, vehicular ad hoc networks have attracted wide attention from both academic and industry. However, security is the main obstacle for the wide deployment of vehicular ad hoc networks. Vehicular ad hoc networks security has two critical issues: access authentication and privacy preservation. How to ensure privacy preservation and improve the efficiency of authentication has become the urgent needs. However, the existing access authentication schemes for vehicular ad hoc networks with different flaws cannot maintain the balance between security and efficiency. Thus, an anonymous access authentication scheme for vehicular ad hoc networks under edge computing based on ID-based short group signature mechanism is proposed in this article to improve the efficiency and anonymity of access authentication. Multiple pseudonyms are presented to preserve the privacy of vehicle node. Besides, a new method is designed to identify and revoke malicious vehicles in the evaluation manner. The core protocols of the proposed scheme are proved to be secure by SVO logic. According to the computation cost and transmission overhead analysis, we indicate that our scheme owns better performance. Moreover, in this article, we combine vehicular ad hoc networks with edge computing together to provide a new clue for the development of mobile edge computing.
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Jian Hong, and Yu Wei Xu. "On the Security of a Secure Batch Verification Scheme for VANET." Advanced Materials Research 760-762 (September 2013): 862–66. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.862.

Full text
Abstract:
Vehicular ad hoc networks is a special mobile ad hoc networks. Due to the limited bandwidth, high vehicle mobility and density of vehicles, scalability is a major challenge in VANETs. Recently, Sagarika Mohanty et al. proposed a secure RSU-Aided Aggregation and Batch-Verification Scheme for Vehicular Networks by using data aggregation technique. And they had shown that their scheme could provide conditional Privacy Preservation and Identity Traceability. Unfortunately, in this paper, we show that their scheme does not achieve these functions by analyzing the security of the scheme. Any one can distinguish whether the different messages is from the same vehicle. And the scheme is also not to resist replay attack. Finally, the corresponding attacks are given.
APA, Harvard, Vancouver, ISO, and other styles
34

Ali, G. G. Md Nawaz, and Edward Chan. "Co-Operative Load Balancing in Vehicular Ad Hoc Networks (VANETs)." International Journal of Wireless Networks and Broadband Technologies 1, no. 4 (2011): 1–21. http://dx.doi.org/10.4018/ijwnbt.2011100101.

Full text
Abstract:
Recently data dissemination using Road Side Units (RSUs) in Vehicular Ad Hoc Networks (VANETs) received considerable attention for overcoming the vehicle to vehicle frequent disconnection problem. An RSU becomes overloaded due to its mounting location and/or during rush hour overload. As an RSU has short wireless transmission coverage range and vehicles are mobile, a heavily overloaded RSU may experience high deadline miss rate in effect of serving too many requests beyond its capacity. In this work, the authors propose a co-operative multiple-RSU model, which offers the opportunity to the RSUs with high volume workload to transfer some of its overloaded requests to other RSUs that have light workload and located in the direction in which the vehicle is heading. Moreover, for performing the load balancing, the authors propose three different heuristic load transfer approaches. By a series of simulation experiments, the authors demonstrate the proposed co-operative multiple-RSU based load balancing model significantly outperforms the non-load balancing multiple-RSU based VANETs model against a number of performance metrics.
APA, Harvard, Vancouver, ISO, and other styles
35

Yu, Ping, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu, and Qiaoyan Wen. "Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks." Security and Communication Networks 2021 (February 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6638453.

Full text
Abstract:
Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle is defined by using a set of attributes, and each message is signed with multiple attributes, enabling the anonymity of vehicles. First, a batch verification algorithm is developed to accelerate the verification processes of a massive volume of messages in large-scale VANETs. Second, replicate messages captured by different vehicles and signed under different sets of attributes can be dereplicated with the traceability of all the signers preserved. Third, the malicious vehicles forging data can be traced from their signatures and revoked from attribute groups. The security aspects of the proposed approach are also analyzed by proving the anonymity of vehicles and the unforgeability of signatures. The efficiency of the proposed approach is numerically verified, as compared to the state of the art.
APA, Harvard, Vancouver, ISO, and other styles
36

Fernandes, Pascoal Daniel, and Dr M. N. Nachappa. "Networking in Vehicular Ad-Hoc Networks (VANET) for Accident Prevention." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1519–25. http://dx.doi.org/10.22214/ijraset.2022.41559.

Full text
Abstract:
Abstract: VANET (Vehicular Ad Hoc Network) is an emerging technology for intelligent inter-vehicle communications. It is a specialized derivation of pure multi-hop ad hoc networking that is currently undergoing industrial prototyping; however, the dreamed idea of a general purpose vehicular ad hoc network is still a long way off. For the past few years, vehicular communication has been a hot topic. The VANET objective is to use short-range wireless technology to provide road safety and commercial comfort applications. Many routing protocols have been designed specifically for such networks, with the majority of them attempting to make use of information that may be available at the vehicle by the time a routing choice is required. We have investigated the AODV and GPSR in this study. Keywords: AODV, GPSR, Vehicular Ad Hoc Networks, Ad-Hoc Routing, Routing Protocols.
APA, Harvard, Vancouver, ISO, and other styles
37

Wahid, Ishtiaq, Sadaf Tanvir, Masood Ahmad, et al. "Vehicular Ad Hoc Networks Routing Strategies for Intelligent Transportation System." Electronics 11, no. 15 (2022): 2298. http://dx.doi.org/10.3390/electronics11152298.

Full text
Abstract:
The upcoming models of vehicles will be able to communicate with each other and will thus be able to share and/or transfer information. A vehicular ad hoc network (VANET) is an application of this vehicular communication that leads to an intelligent transportation system (ITS). Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) are the two distinct types of vehicular ad hoc networks (VANET). V2V and V2I technologies are together known as V2X and are recently being tested. Continuous research to enhance routing considers different characteristics and exciting aspects of VANETs. The proposed schemes are classified based on the operational scenario. A survey of proposed routing schemes in the last eight years is presented to determine the design considerations and the approach used in every proposed system, along with their shortcomings. This survey will assist new scholars in this field to analyze existing state-of-the-art systems. The table at the end of each routing scheme shows the proposed routing scheme’s simulation, routing, and scenario parameters. This paper also reviews VANET technology, its role in the intelligent transportation system, recent development in the field, and the timeline for implementation of the system.
APA, Harvard, Vancouver, ISO, and other styles
38

Begum, Shaeista, Nagaraj B. Patil, and Vishwanath P. "An Optimal Route Discovery using Biogeography based Optimization for Vehicular Ad Hoc Networks." International journal of Computer Networks & Communications 13, no. 1 (2021): 19–32. http://dx.doi.org/10.5121/ijcnc.2021.13102.

Full text
Abstract:
Vehicular ad hoc network (VANET) is a subdivision of the mobile ad hoc networks which uses the moving vehicles as mobile nodes to form the mobile network. In conventional vehicular communications, the restricted radio frequency bandwidth affects the network performances. Therefore, Visible Light Communication (VLC) is integrated with the growing vehicular ad hoc network to obtain high data rate and less energy consumption during the communication. In this paper, vehicular communication is integrated with visible light communication to avoid the issues caused by the restricted radio frequency bandwidth. Moreover, the Routing using Biogeography Based Optimization (RBBO) is proposed to develop an optimal route between the source vehicles to the destination. This research performs two different communications such as vehicle to vehicle and vehicle to the infrastructure. The performance of the RBBOVLC-VANET method is analyzed by means of throughput, packet delivery ratio, delay and routing overhead as well as these performances are compared with the existing method namely ant colony optimization based routing protocol. The throughput of the routing using the biogeography based optimization method is 589.763 kbps for 500 nodes which is high when compared to the existing method.
APA, Harvard, Vancouver, ISO, and other styles
39

Pavan, Kumar Pagadala. "ROUTING PROTOCOLS IN VEHICULAR AD HOC NETWORKS: A SURVEY." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 4, no. 12 (2017): 93–107. https://doi.org/10.5281/zenodo.1133199.

Full text
Abstract:
The networks that interconnect vehicles on road are called Vehicular Ad hoc Networks (VANETs).  VANET is a unique type of network which comes under the shades of MANET, where the communication occurs between various vehicles moving on the paths. It is a different approach for intelligent transport system (ITS). The main target of research in VANETs is the improvements of vehicle safety by means of inter vehicular communication (IVC). Here the nodes are dynamic in nature because of this finding and maintaining route and routing process is very difficult. The performance of communication is depended on choosing the best path while communicating. The routing process is done by various routing protocols in Vehicular Adhoc Networks. The aim of this paper is to give a brief idea of VANET and focusing on categorization of routing protocols for improving the smartness of Intelligent Transport System.
APA, Harvard, Vancouver, ISO, and other styles
40

AKINYEDE, Raphael. "Modeling of Situation Response Time in Vehicular Ad-Hoc Network." MATICS 10, no. 1 (2018): 1. http://dx.doi.org/10.18860/mat.v10i1.4785.

Full text
Abstract:
<p class="Text"><strong>—<em> </em></strong>In Vehicular Ad-Hoc Networks (VANETs), wireless-equipped vehicles form a network spontaneously while traveling along the road. The direct wireless transmission from vehicle to vehicle makes it possible for them to communicate even where there is no telecommunication infrastructure; this emerging new technology provide ubiquitous connectivity to vehicular nodes while on the move, The main idea is to provide ubiquitous connectivity to vehicular nodes while on the move, and to create efficient vehicle-to-vehicle communications that enable the Intelligent Transportation Systems (ITS). This is achieved by allowing nodes within certain ranges to connect with each other in order to exchange information. Since accident happens in split seconds, to avoid communication inefficiency, there is need for this information to get to the intended vehicle on time. To solve this problem, this work models each vehicle in a chain of others and how it responds to the traffic around it using Microscopic (also known as car-following) method for modeling traffic flow; driver- to-driver and driver-to-road interactions within a traffic stream and the interaction between a driver and another driver on road were considered. The essence of this modeling is to determine the minimum response time required for a vehicle in VANET to respond and communicate situations on the road. A simulated scenario was carried out for two vehicles, a leading vehicle and following vehicle. The result shows that with an average of 32 meters apart with average difference in velocity of 1.23m/s, a minimum of 0.9secs is required for efficient situation response communication to ensue between them.</p>
APA, Harvard, Vancouver, ISO, and other styles
41

Hussen, Skala Hassan, and Marwan Aziz Mohammed. "Review Article: Problems and the Approaches of Machine Learning in Vehicle Ad Hoc Networks." ITM Web of Conferences 64 (2024): 01004. http://dx.doi.org/10.1051/itmconf/20246401004.

Full text
Abstract:
In recent years, there has been a notable surge in research interest in vehicular ad-hoc networks (VANETs) due to advancements in wireless communication technology and the vehicle sector. Vehicles to vehicles (V2V) and vehicles to infrastructure comprise a vehicular network. The potential machine learning (ML) method can offer practical solutions for various application fields. Machine learning is a technique where a system uses data that has already been processed to learn from and improve itself automatically. Vehicular networks are a significant application domain where ML-based techniques are highly helpful in solving various issues. Vehicular nodes and infrastructure communicating wirelessly are susceptible to many kinds of assaults. Intelligent transportation systems (ITS) rely heavily on vehicle ad hoc networks (VANETs). These methods enable effective supervised and unsupervised learning of the acquired data, hence accomplishing the goal of VANETs. Because of identifying security concerns in-vehicle networks from source to destination, this evaluation attempts to apply it. We outlined the problems with traffic, safety, and communication in VANET systems, discussed whether or not they could be implemented, and investigated the potential solutions provided by machine learning techniques.
APA, Harvard, Vancouver, ISO, and other styles
42

Hamdi, Mustafa Maad, Lukman Audah, Mohammed Salah Abood, et al. "A review on various security attacks in vehicular ad hoc networks." Bulletin of Electrical Engineering and Informatics 10, no. 5 (2021): 2627–35. http://dx.doi.org/10.11591/eei.v10i5.3127.

Full text
Abstract:
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
APA, Harvard, Vancouver, ISO, and other styles
43

Legashev, Leonid, Irina Bolodurina, Lubov Zabrodina, et al. "Message Authentication and Network Anomalies Detection in Vehicular Ad Hoc Networks." Security and Communication Networks 2022 (February 24, 2022): 1–18. http://dx.doi.org/10.1155/2022/9440886.

Full text
Abstract:
Intelligent transport systems are the future in matters of safe roads and comfortable driving. Integration of vehicles into a unified intelligent network leads to all kinds of security issues and cyber threats common to conventional networks. Rapid development of mobile ad hoc networks and machine learning methods allows us to ensure security of intelligent transport systems. In this paper, we design an authentication scheme that can be used to ensure message integrity and preserve conditional privacy for the vehicle user. The proposed authentication scheme is designed with lightweight cryptography methods, so that it only brings little computational and communication overhead. We also conduct experiments on vehicular ad hoc network segment traffic generation in OMNeT++ tool and apply up-to-date machine learning methods to detect malicious behavior in a given simulated environment. The results of the study show high accuracy in distributed denial-of-service attack detection.
APA, Harvard, Vancouver, ISO, and other styles
44

Albinhamad, Haitham, Abdullah Alotibi, Ali Alagnam, Mohammed Almaiah, and Said Salloum. "Vehicular Ad-hoc Networks (VANETs): A Key Enabler for Smart Transportation Systems and Challenges." Jordanian Journal of Informatics and Computing 2025, no. 1 (2025): 4–15. https://doi.org/10.63180/jjic.thestap.2025.1.2.

Full text
Abstract:
Vehicular Ad-hoc Networks (VANETs) are a specialized subset of Mobile Ad-hoc Networks (MANETs) designed to facilitate data exchange between vehicles and infrastructure. These networks operate in two primary modes: Vehicle-to-Vehicle (V2V) communication, which is decentralized and mobile, and Vehicle-to-Infrastructure (V2I) communication, which is centralized and relies on Road Side Units (RSUs). VANETs play a crucial role in Smart City applications, particularly in Intelligent Transportation Systems (ITS), which enhance road safety, reduce traffic congestion, and minimize environmental impact by leveraging real-time data collected from vehicle sensors. The unique characteristics of VANETs, such as high mobility and dynamic topology, enable critical functionalities like collision detection, traffic management, and emergency response coordination. Public service entities, including traffic police, ambulances, and firefighters, benefit significantly from VANETs by receiving real-time alerts and optimizing response times. However, several challenges hinder the widespread deployment of VANETs, including high vehicle speeds, data transmission delays, and cybersecurity concerns. Addressing these challenges is essential to fully realizing the potential of VANETs as a transformative technology in modern transportation systems.
APA, Harvard, Vancouver, ISO, and other styles
45

M, Azees, Arun Sekar Rajasekaran, and Muhammad Islam Satti. "An Anonymous Signature-Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks." Security and Communication Networks 2022 (July 18, 2022): 1–9. http://dx.doi.org/10.1155/2022/1222660.

Full text
Abstract:
Anonymous authentication is a critical step in safeguarding vehicle privacy and security in VANETs. VANETs connected with blockchain are gaining popularity as a means to increase the effectiveness of anonymous authentication across many security domains. However, present blockchain-assisted authentication systems cannot successfully achieve anonymity since colluding RSUs or vehicles may acquire linkability via the same retrieved record, hence destroying anonymity. To solve the problem, the proposed work offers an unlinkable anonymous signature-based authentication for VANET to ensure collusion resistance. To provide V2R unlinkability, a trusted authority issues anonymous parameters that conceal the vehicle's identification from RSUs and other vehicles in the VANET system. The vehicle user produces anonymous signatures, and RSUs validate them during anonymous authentication. Moreover, the proposed authentication methods are based on an anonymous certificateless signature (ACS) approach that is computationally more efficient and provably safe against eternal forgery in the random oracle model. Additionally, the proposed work guarantees that neither an RSU nor a vehicle has the authority to divulge users’ true identities. Hence, the proposed system has stringent unlinkability and better anonymity, and it enhances the efficiency of V2R and V2V communications considerably according to security analysis and performance assessment.
APA, Harvard, Vancouver, ISO, and other styles
46

Shrestha, Rakesh, and Seung Yeob Nam. "Trustworthy Event-Information Dissemination in Vehicular Ad Hoc Networks." Mobile Information Systems 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/9050787.

Full text
Abstract:
In vehicular networks, trustworthiness of exchanged messages is very important since a fake message might incur catastrophic accidents on the road. In this paper, we propose a new scheme to disseminate trustworthy event information while mitigating message modification attack and fake message generation attack. Our scheme attempts to suppress those attacks by exchanging the trust level information of adjacent vehicles and using a two-step procedure. In the first step, each vehicle attempts to determine the trust level, which is referred to as truth-telling probability, of adjacent vehicles. The truth-telling probability is estimated based on the average of opinions of adjacent vehicles, and we apply a new clustering technique to mitigate the effect of malicious vehicles on this estimation by removing their opinions as outliers. Once the truth-telling probability is determined, the trustworthiness of a given message is determined in the second step by applying a modified threshold random walk (TRW) to the opinions of the majority group obtained in the first step. We compare our scheme with other schemes using simulation for several scenarios. The simulation results show that our proposed scheme has a low false decision probability and can efficiently disseminate trustworthy event information to neighboring vehicles in VANET.
APA, Harvard, Vancouver, ISO, and other styles
47

Alowish, Mazen, Yoshiaki Shiraishi, Yasuhiro Takano, Masami Mohri, and Masakatu Morii. "A novel software-defined networking controlled vehicular named-data networking for trustworthy emergency data dissemination and content retrieval assisted by evolved interest packet." International Journal of Distributed Sensor Networks 16, no. 3 (2020): 155014772090928. http://dx.doi.org/10.1177/1550147720909280.

Full text
Abstract:
Vehicle ad hoc network is the key technology for a future Internet of vehicles and intelligent transport system. However, involvement of vast number of vehicles in Internet of vehicles limits the performance of vehicle ad hoc network. To tackle this problem, a novel vehicle ad hoc network architecture with two different technologies such as software-defined networking and named-data networking is proposed in this article. In the proposed software-defined networking controlled vehicular named-data networking, IP addressing issue is resolved by named-data networking and global view of the network is attained by software-defined networking. Emergency data dissemination is initiated with packet classification. For packet classification, policy-based bifold classifier is proposed in roadside unit and supported by evolved interest packet. Subsequently, best disseminator selection is carried out by trustworthy weighted graph scheme based on novel weight value, which is computed by considering significant metrics. Content retrieval is accomplished by roadside unit and assisted by a controller. Location of content producer is obtained from a controller and optimal route is selected by roadside unit. Optimal route selection is performed by roadside unit for both content retrieval and vehicle-to-vehicle communication using novel region-based hybrid cuckoo search algorithm. Hybrid algorithm combines cuckoo search and particle swarm optimization algorithm to perform efficient route selection. Involvement of software-defined networking controller supports numerous users by providing a global view of the network, which includes network status and traffic information. Extensive simulation in NS-3 assures better interest satisfaction rate, interest satisfaction delay, forwarder interest packets, average hop count, and gain of scalability in software-defined networking controlled vehicular named-data networking than traditional vehicle ad hoc network.
APA, Harvard, Vancouver, ISO, and other styles
48

Di, Chaofan, and Wanqing Wu. "A Novel Identity-Based Mutual Authentication Scheme for Vehicle Ad Hoc Networks." Wireless Communications and Mobile Computing 2022 (April 19, 2022): 1–13. http://dx.doi.org/10.1155/2022/7881079.

Full text
Abstract:
The vehicle ad hoc network (VANET) is an emerging industry that deeply integrates a new generation of network communication technology with automotive and road transportation. As the basic nodes of VANETs, vehicles can communicate and share information with other peer vehicles. However, with the rapid development of the industry, the security risks of VANETs, especially the problem of privacy leakage, have become increasingly prominent. To solve this problem, we propose a novel identity-based mutual authentication scheme (IBMA) for vehicle ad hoc networks. In this scheme, we adopt identity-based cryptography (IBC) to generate keys, which reduces the storage burden of the central authority and eliminates the need to rely on the certificate to distribute the public key. Meanwhile, the key escrow issue can be solved, which is a common problem in IBC. Then, the scheme adjusts central authority to semihonest and realizes unconditional privacy protection. In addition, our scheme achieves complete anonymity, which can prevent any other entities such as peer vehicles and central authorities from tracking vehicles. Finally, our scheme provides efficient traceability while protecting vehicle privacy. Security analysis shows that the proposed scheme satisfies a variety of security requirements such as anonymity, reliability, and nonrepudiation. Performance analysis demonstrates that our proposed scheme is efficient and requires less communication and storage cost compared with related schemes.
APA, Harvard, Vancouver, ISO, and other styles
49

Cai, Zhen, Zizhen Deng, Jinglei Li, Jinghan Zhang, and Mangui Liang. "An Intersection Signal Control Mechanism Assisted by Vehicular Ad Hoc Networks." Electronics 8, no. 12 (2019): 1402. http://dx.doi.org/10.3390/electronics8121402.

Full text
Abstract:
The urban intersection signal decision-making in traditional control methods are mostly based on the vehicle information within an intersection area. The far vehicles that have not reached the intersection area are not taken into account, which results in incomplete information and even incorrectness in decision-making. This paper presents an intersection signal control mechanism assisted by far vehicle information. Using the aid of real-time information collection for far vehicles through vehicular ad hoc networks (VANETs), we can consider them together and calculate the accumulative waiting time for each intersection traffic flow at a future moment to make the optimal signal decision. Simulation results show that, under three different traffic flow environments—same even traffic flows, same uneven traffic flows, and different traffic flows—the two proposed implementation schemes based on the mechanism (fixed phase and period timing improvement scheme, and dynamic phase and period control scheme) show good performances, in which the average waiting time and the ratio of long-waiting vehicles are both less than the results of the traditional signal timing scheme. Especially, in the second scheme, the waiting time was reduced by an average of 38.6% and the ratio of long-waiting vehicles was reduced by an average of 7.67%.
APA, Harvard, Vancouver, ISO, and other styles
50

S. Ragavi, Dr. D. Banumathy, Dr. M. Rameshkumar, and Dr. G. Madasamyraja. "Efficient Authentication Steps for Vehicle Transmission in Ad-Hoc Networks." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (2024): 294–301. http://dx.doi.org/10.32628/ijsrset24113132.

Full text
Abstract:
Vehicular ad-hoc networks (VANETs) are underactive development, thanks in part to recent advances in wireless communication and networking technologies. The most fundamental part of VANET is to enable message authentications between vehicles and roadside units. Message authentication using proxy vehicles has been proposed to reduce the computational overhead of roadside units significantly. In this message authentication scheme, a proxy vehicle that verifies multiple messages at the same time improves roadside units’ efficiency. In this paper first, we show that the only proxy-based authentication scheme (PBAS) presented for this goal by Liu et al. cannot guarantee message authenticity and also it is not resistant to impersonation and modification attacks and false acceptance of batched invalid signatures. Next, we propose a new identity-based message authentication scheme using proxy vehicles (ID-MAP). Then guarantee that it can satisfy the message authentication requirements, existential unforgeability of underlying signatures against adaptability chosen message, and identity attack is proved under the Elliptic Curve discrete logarithm problem (ECDLP) in the random oracle model. It should be highlighted that ID MAP not only is more efficient than PBAS since it is pairing-free and identity based and also it does not use map-to-point hash functions, also, it satisfies the security and privacy requirements of VANETs. Furthermore, analysis shows that the required time to verify 3000 messages in ID-MAP is reduced by 76% compared to that PBAS.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!