Article
Computer Science, Information Systems
Azzam Mourad, Hanine Tout, Omar Abdel Wahab, Hadi Otrok, Toufic Dbouk
Summary: The article discusses the challenges of intrusion detection in Internet of Vehicles and vehicular networks, and proposes a vehicular-edge computing (VEC) fog-enabled scheme to offload intrusion detection tasks with minimal latency. The scheme aims to maximize offloading survivability while minimizing computation execution time and energy consumption.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Mohammed Alzahrani, Mohd Yazid Idris, Fuad A. Ghaleb, Rahmat Budiarto
Summary: Vehicular Ad Hoc Networks (VANETs) aim to improve road safety, traffic efficiency, and passenger comfort. However, misbehaving vehicles that send false information can hinder the potential of VANETs. This study proposes an improved Robust Misbehavior Detection Scheme (iRMDS) by using a machine learning-based classifier instead of a statistics-based detection threshold. Results show that the proposed solution outperforms related work, indicating promising potential for reliable VANET applications.
Article
Computer Science, Information Systems
Ishtiaq Wahid, Sadaf Tanvir, Masood Ahmad, Fasee Ullah, Ahmed S. AlGhamdi, Murad Khan, Sultan S. Alshamrani
Summary: Vehicular ad hoc networks (VANETs) are becoming increasingly important in the field of intelligent transportation systems, with continuous research and proposed routing schemes to enhance functionality. Surveys of routing schemes proposed in the past eight years help new scholars understand the existing state-of-the-art systems and analyze them.
Article
Engineering, Civil
Shengchu Wang, Xianbo Jiang
Summary: In this paper, a three-dimensional universal cooperative localizer (3D UCL) is proposed for vehicular ad-hoc networks (VANETs), and a 3D geographical information enhanced UCL (3D GIE-UCL) is developed by combining 3D UCL with a NLOS identification mechanism assisted by geographical information. Both 3D UCL and 3D GIE-UCL show significant improvement in positioning performance after the application of acceleration techniques.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2021)
Article
Computer Science, Hardware & Architecture
Fillipe Santos, Andre L. L. Aquino, Edmundo R. M. Madeira, Raquel S. Cabral
Summary: This study proposed a method using both temporal graphs and temporal measures to model VANETs applications, with comparison showing that the aggregated model is inefficient in modeling the temporal aspects. Network evaluation through simulation revealed the impact of temporal modeling on RSUs deployment, demonstrating that temporal measures had better coverage area results.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, Christian Esposito
Summary: This paper proposes a novel routing protocol for vehicular ad hoc networks, called trustworthiness evaluation-based routing protocol (TERP), which calculates the trustworthiness of each individual using cloud computing and selects reliable forward nodes based on the trustworthiness to complete the route. The simulation results show that the protocol has good performance in terms of packet delivery ratio, normalized routing overhead, and average end-to-end delay.
IEEE TRANSACTIONS ON BIG DATA
(2022)
Article
Computer Science, Information Systems
Xincheng Li, Xinchun Yin
Summary: This paper proposes a decentralized group key agreement protocol for Vehicular ad hoc network (VANET) using blockchain technology. The protocol allows secure communication between roadside units (RSU) and onboard units (OBU) without relying on a trusted authority (TA). It also supports dynamic management of vehicles' public keys and shows lower computation costs and communication overheads compared to existing protocols.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Ammar Hawbani, Xingfu Wang, Ahmed Al-Dubai, Liang Zhao, Omar Busaileh, Ping Liu, Mohammed A. A. Al-Qaness
Summary: This study proposes a solution to the problem of multicriteria multihop routing in vehicular ad hoc networks (VANETs) and introduces the HERO protocol, which shows promising performance in terms of delivery success ratio, delivery delay, and communication overhead.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Engineering, Civil
Amit Chougule, Varun Kohli, Vinay Chamola, Fei Richard Yu
Summary: This research presents an intrusion detection system for Vehicular Ad-hoc Networks (VANETs) that effectively detects anomalies in data integrity, network availability, and user authentication. By using three convolutional neural network models to reconstruct vehicular behavior, it accurately classifies frequency, identity, and motion-based behavior. Additionally, the system showcases its practicality in cloud and edge environments.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Civil
Asad Ali, Farhan Aadil, Muhammad Fahad Khan, Muazzam Maqsood, Sangsoon Lim
Summary: Vehicular ad-hoc networks (VANETs) pose challenges for robust and scalable communication. Existing clustering techniques generate excessive clusters, leading to resource consumption and increased communication overhead. To address this, a novel clustering algorithm based on the Harris Hawks Optimization algorithm (HHOCNET) is proposed. Simulations show that HHOCNET outperforms state-of-the-art schemes in optimizing the multi-objective clustering problem in VANETs.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Information Systems
Yongje Shin, Hyun-Seok Choi, Youngju Nam, Hyunchong Cho, Euisin Lee
Summary: This paper proposes a protocol called PSOstreaming, which utilizes particle swarm optimization and mobility prediction algorithms to provide high-quality video streaming services. Experimental results show that PSOstreaming is flexible and achieves a high frame delivery ratio in dynamic topology changes and QoS and QoE.
Article
Engineering, Civil
Ping Liu, Xingfu Wang, Ammar Hawbani, Bei Hua, Liang Zhao, Zhi Liu
Summary: This article introduces the challenges and solutions for data transmission in Vehicular Ad Hoc Networks (VANETs). It proposes leveraging the beacon mechanism to realize traffic awareness, instead of using control packets. The feasibility of this approach is demonstrated through mathematical analysis and a concrete protocol to address technical challenges. Extensive simulation results show that the proposed protocol outperforms existing technologies in terms of packet delivery ratio, average delivery time, and network overhead.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2022)
Article
Telecommunications
Mehmet Aslan, Sevil Sen
Summary: This study proposes a dynamic trust management model for VANETs using genetic programming algorithm and evolutionary dynamic optimization techniques. The model successfully evaluates the trustworthiness of vehicles and messages, prevents the propagation of bogus messages, and detects changes in the network in a timely manner. The proposed model shows robustness to increasing malicious messages and achieves high detection rate and low false positive rate.
VEHICULAR COMMUNICATIONS
(2023)
Article
Multidisciplinary Sciences
Esraa Al-Ezaly, Hazem M. El-Bakry, Ahmed Abo-Elfetoh, Sara Elhishi
Summary: Car congestion is a global issue caused by accidents, traffic lights, driver behavior, and road capacity. Solutions such as road expansion and roundabouts are costly. The use of vehicular ad-hoc networks (VANETs) for traffic light recognition (VTLR) can reduce accidents and congestion caused by traffic lights.
SCIENTIFIC REPORTS
(2023)
Article
Telecommunications
Hamayoun Shahwani, Syed Attique Shah, Muhammad Ashraf, Muhammad Akram, Jaehoon (Paul) Jeong, Jitae Shin
Summary: This paper presents a systematic literature review on existing data dissemination techniques in VANET, analyzing from the perspective of data-related characteristics and applications. Its aim is to provide understanding of data dissemination in VANET, explore potential opportunities and challenges, and compare delay-tolerant and delay-sensitive data dissemination.
VEHICULAR COMMUNICATIONS
(2022)
Article
Computer Science, Hardware & Architecture
Mingkui Wei, Wenye Wang
Article
Computer Science, Information Systems
Zhuo Lu, Wenye Wang, Cliff Wang
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2016)
Article
Computer Science, Information Systems
Lei Sun, Wenye Wang, Yujin Li
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2016)
Article
Computer Science, Information Systems
Mingkui Wei, Zhuo Lu, Wenye Wang
IEEE SYSTEMS JOURNAL
(2018)
Article
Telecommunications
Ali Jalooli, Min Song, Wenye Wang
VEHICULAR COMMUNICATIONS
(2019)
Article
Computer Science, Information Systems
Jie Wang, Sigit Pambudi, Wenye Wang, Min Song
IEEE INTERNET OF THINGS JOURNAL
(2019)
Article
Computer Science, Information Systems
Jie Wang, Wenye Wang, Cliff Wang, Min Song
Summary: Spectrum activity surveillance is crucial for DSA systems, improving spectrum efficiency and detecting malicious users, but implementing it is challenging. To address these challenges, a three-factor space is introduced, with a two-step solution proposed to tackle the SAS problem.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Teng Fei, Wenye Wang
Summary: In this study, we investigate the vulnerabilities and potential attacks of the AKA protocol in LTE/5G networks. We identify three types of attacks and propose an enhanced AKA protocol that relies on asymmetric encryption and digital signatures to countermeasure these attacks.
Article
Computer Science, Information Systems
Rui Zou, Wenye Wang
Summary: Mobile networks are adopting Dynamic Spectrum Access (DSA) to increase data capacity by utilizing unused spectrum caused by fluctuations in network traffic. LTE, as the largest mobile system, operates in DSA mode and requires accurate knowledge of spectrum occupancy. Existing literature on spectrum sensing, measurement, and modeling cannot accurately acquire the spectrum occupancy of LTE systems. To address this issue, a system called U-CIMAN is developed to uncover spectrum occupancy and user information in mobile access networks. U-CIMAN parses LTE protocol fields to accurately reveal spectrum occupancy and provide important details such as user locations and traffic types. Additionally, a Vector Autoregression model is proposed to characterize LTE spectrum occupancy.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Proceedings Paper
Computer Science, Information Systems
Rui Zou, Wenye Wang, Huaiyu Dai
Summary: Dynamic Spectrum Access (DSA) aims to improve spectrum efficiency by facilitating opportunistic access to underutilized spectrum resources. The key to successful DSA operations lies in understanding spectrum hole distributions. Despite extensive research on spectrum tenancy, two overlooked aspects are measurement resolution and spectrum distribution in the spectral perspective.
2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)
(2021)
Proceedings Paper
Engineering, Electrical & Electronic
Yali Wang, Wenye Wang, Mei Song
GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE
(2017)
Proceedings Paper
Engineering, Electrical & Electronic
Sigit Aryo Pambudi, Wenye Wang, Cliff Wang
GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE
(2017)
Proceedings Paper
Engineering, Electrical & Electronic
Jie Wang, Wenye Wang, Cliff Wang
GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE
(2017)
Proceedings Paper
Engineering, Electrical & Electronic
Seyyedali Hosseinalipour, Jie Wang, Huaiyu Dai, Wenye Wang
GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE
(2017)
Proceedings Paper
Telecommunications
Mingkui Wei, Zhuo Lu, Wenye Wang
2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)
(2017)