Article
Computer Science, Information Systems
Lunzhi Deng, Jianxin Shao, Zhenyu Hu
Summary: The text discusses the challenges of achieving secure information sharing in Vehicular ad hoc network and the security proofs of known identity based two-party authenticated key agreement schemes. The authors point out the insecurity of a new scheme and propose a new scheme suitable for VANET. The proposed scheme does not require pairing operations and only needs four scalar multiplication operations.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2021)
Article
Chemistry, Analytical
Mahmood A. Al-Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan H. Hasbullah
Summary: This paper presents a secure pseudonym-based conditional privacy-preserving authentication scheme for communication security in VANETs, utilizing Elliptic Curve Cryptography and secure hash cryptographic function. The proposed scheme effectively defends against insider attacks and achieves rapid message signing and verification.
Article
Computer Science, Information Systems
Mahmood A. Al-Shareeda, Mohammed Anbar, Selvakumar Manickam, Ayman Khalil, Iznan Husainy Hasbullah
Summary: VANET broadcasts messages about road and environmental conditions, but introduces security and privacy issues. Identity-based schemes are proposed to mitigate these problems.
Article
Computer Science, Information Systems
Gowri Thumbur, G. Srinivasa Rao, P. Vasudeva Reddy, N. B. Gayathri, D. V. R. Koti Reddy, M. Padmavathamma
Summary: By utilizing IoT technology, VANET aims to improve secure communication among vehicles to prevent privacy attacks and misuse of personal information. The proposed authentication scheme in this research reduces computation overhead while enhancing security and efficiency in VANET systems.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Chemistry, Analytical
Mahmood A. Al-Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan H. Hasbullah
Summary: This paper proposes a Secure and Efficient Conditional Privacy-Preserving Authentication (SE-CPPA) scheme based on cryptographic hash function and bilinear pair cryptography to address security and privacy issues in Vehicular Ad-Hoc Networks. The scheme can resist impersonation attacks, improve performance efficiency, and outperform existing schemes in terms of computation and communication costs.
Article
Computer Science, Information Systems
Bhanumathi Velusamy, Kalaivanan Karunanithy, Damien Sauveron, Raja Naeem Akram, Jaehyuk Cho
Summary: The main goal is to find multiple node-disjoint paths that meet the multi-objective optimization problem in terms of energy consumption minimization and network lifetime improvement. By using a multi-objective function to select the optimal path, the proposed system is proven to achieve less energy consumption and improved network lifetime compared to existing routing methods.
Article
Computer Science, Information Systems
Ying Cai, Hao Zhang, Yuguang Fang
Summary: Vehicular ad hoc networks aim to improve transportation systems by leveraging information technology, but face serious privacy concerns due to potential leakage. A novel conditional privacy protection scheme based on ring signcryption was designed to address these issues, showing advantages over existing solutions through security analysis and experiments.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
Bohan Li, Xinyang Song, Tianlun Dai, Wenlong Wu, Di Zhu, Xiangping Zhai, Hao Wen, Qinyong Lin, Huazhou Chen, Ken Cai
Summary: Vehicular ad hoc networks (VANETs) are essential for improving traffic efficiency and safety through real-time information sharing. Digital Twins (DT) have been used to facilitate the design and deployment of VANETs, but face interference from malicious vehicles. To address this, a decentralized trust management scheme embedded with blockchain is proposed to detect malicious DT-vehicles.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2023)
Article
Telecommunications
Nayoung Kim, Minhae Kwon, Hyunggon Park
Summary: This letter proposes a distributed solution for building mobile ad hoc networks using reinforcement learning. The mobile nodes autonomously determine their positions and form a cohesive team to maximize network throughput. By designing a curriculum, nodes converge quickly and work in optimal locations, improving learning efficiency and team performance.
IEEE COMMUNICATIONS LETTERS
(2022)
Article
Computer Science, Theory & Methods
Mohammad Sadegh Azhdari, Ali Barati, Hamid Barati
Summary: This paper proposes a fuzzy logic-based routing method with authentication capability in vehicular ad hoc networks. The method achieves superior performance in terms of end-to-end delay, packet collision, packet delivery rate, but slightly increases routing overhead.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2022)
Article
Computer Science, Information Systems
Muhammad Fayaz, Gulzar Mehmood, Ajab Khan, Sohail Abbas, M. Fayaz, Jeonghwan Gwak
Summary: A mobile ad hoc network (MANET) is a network without predefined architecture, where nodes can communicate freely. However, malicious and selfish nodes can severely degrade network performance. This study proposes a reputation-based scheme to detect selfish nodes and enforce cooperation, improving network performance.
Article
Automation & Control Systems
B. V. V. Siva Prasad, Sridhar Mandapati, Lakshmana Kumar Ramasamy, Rajasekhar Boddu, Pranayanath Reddy, B. Suresh Kumar
Summary: Information technology plays a vital role in collecting, transmitting, and executing data from disaster-prone areas such as battlefields and international borders. This paper presents a system that tracks the location and health of lost or injured soldiers on the battlefield, reducing search and rescue efforts in the military control room. It utilizes body sensors and a Mobile Ad hoc Network (MANET) to send soldiers' health parameters to the control room. To ensure data security, a cryptographic ensemble approach combining Symmetric Key Encryption, Identity Based Encryption (IBE), and Identity Based Signature (IBS) is proposed.
Article
Computer Science, Artificial Intelligence
Tiantian Miao, Jian Shen, Chin-Feng Lai, Sai Ji, Huaqun Wang
Summary: In this article, a fuzzy-based trustworthiness evaluation scheme for privilege management in VANETs is proposed to ensure the reliability of messages and the allocation of privileges by evaluating the behavioral big data of vehicles. The research results demonstrate that the proposed scheme performs well in terms of security and efficiency.
IEEE TRANSACTIONS ON FUZZY SYSTEMS
(2021)
Article
Computer Science, Information Systems
Ayush Dusia, Ram Ramanathan, Warren Ramanathan, Christophe Servaes, Adarshpal S. Sethi
Summary: The study presents a novel protocol called ECHO that allows network-wide broadcasting in low-rate mobile ad hoc networks without using any control packets. ECHO is deterministic, fully distributed, accommodates mobility, and balances battery consumption.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Information Systems
Kahkashan Tabassum, Hadil Shaiba, Nada Ahmed Essa, Hafiza A. Elbadie
Summary: Medical sensors implanted in vital organs record and monitor key vital signs to ensure effective functioning. Wireless sensor networks enable storage and analysis of this information, allowing doctors to remotely diagnose patients' health conditions. This is crucial for emergency healthcare.
JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING
(2022)