Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (391)

Search Parameters:
Keywords = vehicular ad hoc networks (VANETs)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 4376 KB  
Article
Spatio-Temporal Heterogeneity-Oriented Graph Convolutional Network for Urban Traffic Flow Prediction
by Xuan Li, Muyang He, Dong Qin, Tianqing Zhou and Nan Jiang
Sensors 2025, 25(16), 5127; https://doi.org/10.3390/s25165127 - 18 Aug 2025
Viewed by 529
Abstract
In the realm of urban vehicular ad hoc networks (VANETs), cross-domain data has constituted a multifaceted amalgamation of information sources, which significantly enhances the accuracy and response speed of traffic prediction. However, the interplay between spatial and temporal heterogeneity will complicate the complexity [...] Read more.
In the realm of urban vehicular ad hoc networks (VANETs), cross-domain data has constituted a multifaceted amalgamation of information sources, which significantly enhances the accuracy and response speed of traffic prediction. However, the interplay between spatial and temporal heterogeneity will complicate the complexity of geographical locations or physical connections in the data normalization. Besides, the traffic pattern differences incurred by dynamic external factors also bring cumulative and sensitive impacts during the construction of the prediction model. In this work, we propose the spatio-temporal heterogeneity-oriented graph convolutional network (SHGCN) to tackle the above challenges. First, the SHGCN analytically employs spatial heterogeneity between urban streets rather than simple adjacency relationships to reveal the spatio-temporal correlations of traffic stream movement. Then, the air quality data is taken as external factors to identify the traffic forecasting trend at the street level. The hybrid model of the graph convolutional network (GCN) and gated recurrent unit (GRU) is designed to investigate cross-correlation characteristics. Finally, with the real-world urban datasets, experimental results demonstrate that the SHGCN achieves improvements, with the RMSE and MAE reductions ranging from 2.91% to 41.26% compared to baseline models. Ablation studies confirm that integrating air quality factors with traffic patterns enhances prediction performance at varying degrees, validating the method’s effectiveness in capturing the complex correlations among air pollutants, traffic flow dynamics, and road network topology. Full article
Show Figures

Figure 1

24 pages, 1981 KB  
Article
A Lightweight Batch Authenticated Key Agreement Scheme Based on Fog Computing for VANETs
by Lihui Li, Huacheng Zhang, Song Li, Jianming Liu and Chi Chen
Symmetry 2025, 17(8), 1350; https://doi.org/10.3390/sym17081350 - 18 Aug 2025
Viewed by 271
Abstract
In recent years, fog-based vehicular ad hoc networks (VANETs) have become a hot research topic. Due to the inherent insecurity of open wireless channels between vehicles and fog nodes, establishing session keys through authenticated key agreement (AKA) protocols is critically important for securing [...] Read more.
In recent years, fog-based vehicular ad hoc networks (VANETs) have become a hot research topic. Due to the inherent insecurity of open wireless channels between vehicles and fog nodes, establishing session keys through authenticated key agreement (AKA) protocols is critically important for securing communications. However, existing AKA schemes face several critical challenges: (1) When a large number of vehicles initiate AKA requests within a short time window, existing schemes that process requests one by one individually incur severe signaling congestion, resulting in significant quality of service degradation. (2) Many AKA schemes incur excessive computational and communication overheads due to the adoption of computationally intensive cryptographic primitives (e.g., bilinear pairings and scalar multiplications on elliptic curve groups) and unreasonable design choices, making them unsuitable for the low-latency requirements of VANETs. To address these issues, we propose a lightweight batch AKA scheme based on fog computing. In our scheme, when a group of vehicles requests AKA sessions with the same fog node within the set time interval, the fog node aggregates these requests and, with assistance from the traffic control center, establishes session keys for all vehicles by a round of operations. It has significantly reduced the operational complexity of the entire system. Moreover, our scheme employs Lagrange interpolation and lightweight cryptographic tools, thereby significantly reducing both computational and communication overheads. Additionally, our scheme supports conditional privacy preservation and includes a revocation mechanism for malicious vehicles. Security analysis demonstrates that the proposed scheme meets the security and privacy requirements of VANETs. Performance evaluation indicates that our scheme outperforms existing state-of-the-art solutions in terms of efficiency. Full article
(This article belongs to the Special Issue Applications Based on Symmetry in Applied Cryptography)
Show Figures

Figure 1

31 pages, 1321 KB  
Article
A Method for Fault Tolerance of AES Encryption Systems Focused on Improving the Cybersecurity of VANET Through the Use of Residue Codes
by Igor Anatolyevich Kalmykov, Alexandr Anatolyevich Olenev, Daniil Vyacheslavovich Dukhovnyj, Igor Alexandrovich Provornov and Vladimir Sergeyevich Slyadnev
World Electr. Veh. J. 2025, 16(8), 462; https://doi.org/10.3390/wevj16080462 - 13 Aug 2025
Viewed by 239
Abstract
The problem of cybersecurity of vehicular ad hoc network (VANET) is far from being fully solved. This is due to the fact that when exchanging data between On Board Units (OBUs) and Roadside Units (RSUs) a wireless channel is used, which is subject [...] Read more.
The problem of cybersecurity of vehicular ad hoc network (VANET) is far from being fully solved. This is due to the fact that when exchanging data between On Board Units (OBUs) and Roadside Units (RSUs) a wireless channel is used, which is subject to many cyberattacks. It is known that the use of encryption algorithms, particularly Advanced Encryption Standard (AES), can effectively counter many of them. However, during the operation of AES encryption systems, failures may occur, as a result of which closed communication channels may become open and accessible to attackers. Therefore, giving the property of fault tolerance to the used encryption systems is an urgent task. To solve this problem, the article proposes to use redundant residue codes in the polynomial ring (RCPR). The article describes a method of providing fault tolerance of AES encryption systems based on RCPR. Using the developed error correction algorithm for RCPR with one control module, the redundant RCPR can detect 100% of single and double errors, as well as correct 100% of single and 75% of double errors that occur during encryption and decryption. Thus, the developed method based on error correction of AES encryption system allows to parry cyberattacks on vehicles and ensure a higher level of cyber security of VANET. Full article
Show Figures

Figure 1

24 pages, 1486 KB  
Article
Improving Vehicular Network Authentication with Teegraph: A Hashgraph-Based Efficiency Approach
by Rubén Juárez Cádiz, Ruben Nicolas-Sans and José Fernández Tamámes
Sensors 2025, 25(15), 4856; https://doi.org/10.3390/s25154856 - 7 Aug 2025
Viewed by 266
Abstract
Vehicular ad hoc networks (VANETs) are a critical aspect of intelligent transportation systems, improving safety and comfort for drivers. These networks enhance the driving experience by offering timely information vital for safety and comfort. Yet, VANETs come with their own set of challenges [...] Read more.
Vehicular ad hoc networks (VANETs) are a critical aspect of intelligent transportation systems, improving safety and comfort for drivers. These networks enhance the driving experience by offering timely information vital for safety and comfort. Yet, VANETs come with their own set of challenges concerning security, privacy, and design reliability. Traditionally, vehicle authentication occurs every time a vehicle enters the domain of the roadside unit (RSU). In our study, we suggest that authentication should take place only when a vehicle has not covered a set distance, increasing system efficiency. The rise of the Internet of Things (IoT) has seen an upsurge in the use of IoT devices across various fields, including smart cities, healthcare, and vehicular IoT. These devices, while gathering environmental data and networking, often face reliability issues without a trusted intermediary. Our study delves deep into implementing Teegraph in VANETs to enhance authentication. Given the integral role of VANETs in Intelligent Transportation Systems and their inherent challenges, we turn to Hashgraph—an alternative to blockchain. Hashgraph offers a decentralized, secure, and trustworthy database. We introduce an efficient authentication system, which triggers only when a vehicle has not traversed a set distance, optimizing system efficiency. Moreover, we shed light on the indispensable role Hashgraph can occupy in the rapidly expanding IoT landscape. Lastly, we present Teegraph, a novel Hashgraph-based technology, as a superior alternative to blockchain, ensuring a streamlined, scalable authentication solution. Our approach leverages the logical key hierarchy (LKH) and packet update keys to ensure data privacy and integrity in vehicular networks. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

24 pages, 3366 KB  
Article
Towards Intelligent 5G Infrastructures: Performance Evaluation of a Novel SDN-Enabled VANET Framework
by Abiola Ifaloye, Haifa Takruri and Rabab Al-Zaidi
Network 2025, 5(3), 28; https://doi.org/10.3390/network5030028 - 5 Aug 2025
Viewed by 393
Abstract
Critical Internet of Things (IoT) data in Fifth Generation Vehicular Ad Hoc Networks (5G VANETs) demands Ultra-Reliable Low-Latency Communication (URLLC) to support mission-critical vehicular applications such as autonomous driving and collision avoidance. Achieving the stringent Quality of Service (QoS) requirements for these applications [...] Read more.
Critical Internet of Things (IoT) data in Fifth Generation Vehicular Ad Hoc Networks (5G VANETs) demands Ultra-Reliable Low-Latency Communication (URLLC) to support mission-critical vehicular applications such as autonomous driving and collision avoidance. Achieving the stringent Quality of Service (QoS) requirements for these applications remains a significant challenge. This paper proposes a novel framework integrating Software-Defined Networking (SDN) and Network Functions Virtualisation (NFV) as embedded functionalities in connected vehicles. A lightweight SDN Controller model, implemented via vehicle on-board computing resources, optimised QoS for communications between connected vehicles and the Next-Generation Node B (gNB), achieving a consistent packet delivery rate of 100%, compared to 81–96% for existing solutions leveraging SDN. Furthermore, a Software-Defined Wide-Area Network (SD-WAN) model deployed at the gNB enabled the efficient management of data, network, identity, and server access. Performance evaluations indicate that SDN and NFV are reliable and scalable technologies for virtualised and distributed 5G VANET infrastructures. Our SDN-based in-vehicle traffic classification model for dynamic resource allocation achieved 100% accuracy, outperforming existing Artificial Intelligence (AI)-based methods with 88–99% accuracy. In addition, a significant increase of 187% in flow rates over time highlights the framework’s decreasing latency, adaptability, and scalability in supporting URLLC class guarantees for critical vehicular services. Full article
Show Figures

Figure 1

42 pages, 2129 KB  
Review
Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey
by Manal Alharthi, Faiza Medjek and Djamel Djenouri
Future Internet 2025, 17(7), 317; https://doi.org/10.3390/fi17070317 - 19 Jul 2025
Viewed by 691
Abstract
The emergence of the Internet of Vehicles (IoV) has revolutionized intelligent transportation and communication systems. However, IoV presents many complex and ever-changing security challenges and thus requires robust cybersecurity protocols. This paper comprehensively describes and evaluates ensemble learning approaches for multi-class intrusion detection [...] Read more.
The emergence of the Internet of Vehicles (IoV) has revolutionized intelligent transportation and communication systems. However, IoV presents many complex and ever-changing security challenges and thus requires robust cybersecurity protocols. This paper comprehensively describes and evaluates ensemble learning approaches for multi-class intrusion detection systems in the IoV environment. The study evaluates several approaches, such as stacking, voting, boosting, and bagging. A comprehensive review of the literature spanning 2020 to 2025 reveals important trends and topics that require further investigation and the relative merits of different ensemble approaches. The NSL-KDD, CICIDS2017, and UNSW-NB15 datasets are widely used to evaluate the performance of Ensemble Learning-Based Intrusion Detection Systems (ELIDS). ELIDS evaluation is usually carried out using some popular performance metrics, including Precision, Accuracy, Recall, F1-score, and Area Under Receiver Operating Characteristic Curve (AUC-ROC), which were used to evaluate and measure the effectiveness of different ensemble learning methods. Given the increasing complexity and frequency of cyber threats in IoV environments, ensemble learning methods such as bagging, boosting, and stacking enhance adaptability and robustness. These methods aggregate multiple learners to improve detection rates, reduce false positives, and ensure more resilient intrusion detection models that can evolve alongside emerging attack patterns. Full article
Show Figures

Figure 1

15 pages, 1301 KB  
Article
Applying a Deep Neural Network and Feature Engineering to Assess the Impact of Attacks on Autonomous Vehicles
by Sara Ftaimi and Tomader Mazri
World Electr. Veh. J. 2025, 16(7), 388; https://doi.org/10.3390/wevj16070388 - 9 Jul 2025
Viewed by 418
Abstract
Autonomous vehicles are expected to reduce traffic accident casualties, as driver distraction accounts for 90% of accidents. These vehicles rely on sensors and controllers to operate independently, requiring robust security mechanisms to prevent malicious takeovers. This research proposes a novel approach to assessing [...] Read more.
Autonomous vehicles are expected to reduce traffic accident casualties, as driver distraction accounts for 90% of accidents. These vehicles rely on sensors and controllers to operate independently, requiring robust security mechanisms to prevent malicious takeovers. This research proposes a novel approach to assessing the impact of cyber-attacks on autonomous vehicles and their surroundings, with a strong focus on prioritizing human safety. The system evaluates the severity of incidents caused by attacks, distinguishing between different events—for example, a pedestrian injury is classified as more critical than a collision with an inanimate object. By integrating deep neural network technology with feature engineering, the proposed system provides a comprehensive impact assessment. It is validated using metrics such as MAE, loss function, and Spearman’s correlation through experiments on a dataset of 5410 samples. Beyond enhancing autonomous vehicle security, this research contributes to real-world attack impact assessment, ensuring human safety remains a priority in the evolving autonomous landscape. Full article
Show Figures

Figure 1

29 pages, 973 KB  
Article
Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks
by Muawia A. Elsadig, Abdelrahman Altigani, Yasir Mohamed, Abdul Hakim Mohamed, Akbar Kannan, Mohamed Bashir and Mousab A. E. Adiel
World Electr. Veh. J. 2025, 16(6), 324; https://doi.org/10.3390/wevj16060324 - 11 Jun 2025
Viewed by 2195
Abstract
Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. However, owing to their nature, the security of VANETs remains a significant concern. This study provides insightful information regarding VANET vulnerabilities and attacks. It investigates a [...] Read more.
Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. However, owing to their nature, the security of VANETs remains a significant concern. This study provides insightful information regarding VANET vulnerabilities and attacks. It investigates a number of security models that have recently been introduced to counter VANET security attacks with a focus on machine learning detection methods. This confirms that several challenges remain unsolved. Accordingly, this study introduces a lightweight machine learning model with a gain information feature selection method to detect VANET attacks. A balanced version of the well-known and recent dataset CISDS2017 was developed by applying a random oversampling technique. The developed dataset was used to train, test, and evaluate the proposed model. In other words, two layers of enhancements were applied—using a suitable feature selection technique and fixing the dataset imbalance problem. The results show that the proposed model, which is based on the Random Forest (RF) classifier, achieved excellent performance in terms of classification accuracy, computational cost, and classification error. It achieved an accuracy rate of 99.8%, outperforming all benchmark classifiers, including AdaBoost, decision tree (DT), K-nearest neighbors (KNNs), and multi-layer perceptron (MLP). To the best of our knowledge, this model outperforms all the existing classification techniques. In terms of processing cost, it consumes the least processing time, requiring only 69%, 59%, 35%, and 1.4% of the AdaBoost, DT, KNN, and MLP processing times, respectively. It causes negligible classification errors. Full article
Show Figures

Figure 1

26 pages, 2368 KB  
Article
Connectivity Analysis in VANETS with Dynamic Ranges
by Kenneth Okello, Elijah Mwangi and Ahmed H. Abd El-Malek
Telecom 2025, 6(2), 33; https://doi.org/10.3390/telecom6020033 - 21 May 2025
Viewed by 486
Abstract
Vehicular Ad Hoc Networks (VANETs) serve as critical platforms for inter-vehicle communication within constrained ranges, facilitating information exchange. However, the inherent challenge of dynamic network topology poses persistent disruptions, hindering safety and emergency information exchange. An alternative generalised statistical model of the channel [...] Read more.
Vehicular Ad Hoc Networks (VANETs) serve as critical platforms for inter-vehicle communication within constrained ranges, facilitating information exchange. However, the inherent challenge of dynamic network topology poses persistent disruptions, hindering safety and emergency information exchange. An alternative generalised statistical model of the channel is proposed to capture the varying transmission range of the vehicle node. The generalised model framework uses simple wireless fading channel models (Weibull, Nakagami-m, Rayleigh, and lognormal) and the large vehicle obstructions to model the transmission range. This approach simplifies analysis of connection of vehicular nodes in environments were communication links are very unstable from obstructions from large vehicles and varying speeds. The connectivity probability is computed for two traffic models—free-flow and synchronized Gaussian unitary ensemble (GUE)—to simulate vehicle dynamics within a multi-lane road, enhancing the accuracy of VANET modeling. Results show that indeed the dynamic range distribution is impacted at shorter inter-vehicle distances and vehicle connectivity probability is lower with many obstructing vehicles. These findings offer valuable insights into the overall effects of parameters like path loss exponents and vehicle density on connectivity probability, thus providing knowledge on optimizing VANETs in diverse traffic scenarios. Full article
(This article belongs to the Special Issue Performance Criteria for Advanced Wireless Communications)
Show Figures

Figure 1

24 pages, 2548 KB  
Article
CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks
by Junchao Wang, Honglin Li, Yan Sun, Chris Phillips, Alexios Mylonas and Dimitris Gritzalis
Future Internet 2025, 17(4), 165; https://doi.org/10.3390/fi17040165 - 9 Apr 2025
Viewed by 526
Abstract
The mix-zone method is effective in preserving real-time vehicle identity and location privacy in Vehicular Ad Hoc Networks (VANETs). However, it has limitations in low-vehicle-density scenarios, where adversaries can still identify the real trajectories of the victim vehicle. To address this issue, researchers [...] Read more.
The mix-zone method is effective in preserving real-time vehicle identity and location privacy in Vehicular Ad Hoc Networks (VANETs). However, it has limitations in low-vehicle-density scenarios, where adversaries can still identify the real trajectories of the victim vehicle. To address this issue, researchers often generate numerous fake beacons to deceive attackers, but this increases transmission overhead significantly. Therefore, we propose the Communication-Efficient Pseudonym-Changing Scheme within the Restricted Online Knowledge Scheme (CPCROK) to protect vehicle privacy without causing significant communication overhead in low-density VANETs by generating highly authentic fake beacons to form a single fabricated trajectory. Specifically, the CPCROK consists of three main modules: firstly, a special Kalman filter module that provides real-time, coarse-grained vehicle trajectory estimates to reduce the need for real-time vehicle state information; secondly, a Recurrent Neural Network (RNN) module that enhances predictions within the mix zone by incorporating offline data engineering and considering online vehicle steering angles; and finally, a trajectory generation module that collaborates with the first two to generate highly convincing fake trajectories outside the mix zone. The experimental results confirm that CPCROK effectively reduces the attack success rate by over 90%, outperforming the plain mix-zone scheme and beating other fake beacon schemes by more than 60%. Additionally, CPCROK effectively minimizes transmission overhead by 67%, all while ensuring a high level of protection. Full article
(This article belongs to the Special Issue IoT, Edge, and Cloud Computing in Smart Cities)
Show Figures

Figure 1

20 pages, 9115 KB  
Article
Optimized Real-Time Decision Making with EfficientNet in Digital Twin-Based Vehicular Networks
by Qasim Zia, Avais Jan, Dong Yang, Haijing Zhang and Yingshu Li
Electronics 2025, 14(6), 1084; https://doi.org/10.3390/electronics14061084 - 9 Mar 2025
Viewed by 1425
Abstract
Real-time decision-making is vital in vehicular ad hoc networks (VANETs). It is essential to improve road safety and ensure traffic efficiency and flow. Integrating digital twins within VANET (DT-VANET) creates virtual replicas of physical vehicles, allowing in-depth analysis and effective decision-making. Many vehicular [...] Read more.
Real-time decision-making is vital in vehicular ad hoc networks (VANETs). It is essential to improve road safety and ensure traffic efficiency and flow. Integrating digital twins within VANET (DT-VANET) creates virtual replicas of physical vehicles, allowing in-depth analysis and effective decision-making. Many vehicular ad hoc network applications now use convolutional neural networks (CNNs). However, the growing model size and latency make implementing them in real-time systems challenging, and most previous studies focusing on using CNNs still face significant challenges. Some effective models with sustainable performances have recently been proposed. One of the most advanced models among them is EfficientNet. One may consider it a family of network models with significantly fewer parameters and computational costs. This paper proposes EfficientNet-based optimized real-time decision-making in the DT-VANET architecture. This paper investigates the performance of EfficientNet in digital-based vehicular ad hoc networks. Extensive experiments have proved that EfficientNet outperforms CNN models (ResNet50, VGG16) in accuracy, latency, computational efficiency, and convergence time, which proves its effectiveness in real-time applications of DT-VANET. Full article
Show Figures

Figure 1

21 pages, 11212 KB  
Article
A Dynamic Shortest Travel Time Path Planning Algorithm with an Overtaking Function Based on VANET
by Chunxiao Li, Changhao Fan, Mu Wang, Jiajun Shen and Jiang Liu
Symmetry 2025, 17(3), 345; https://doi.org/10.3390/sym17030345 - 25 Feb 2025
Viewed by 1067
Abstract
With the rapid development of the economy, urban road congestion has become more serious. The travel times for vehicles are becoming more uncontrollable, making it challenging to reach destinations on time. In order to find an optimal route and arrive at the destination [...] Read more.
With the rapid development of the economy, urban road congestion has become more serious. The travel times for vehicles are becoming more uncontrollable, making it challenging to reach destinations on time. In order to find an optimal route and arrive at the destination with the shortest travel time, this paper proposes a dynamic shortest travel time path planning algorithm with an overtaking function (DSTTPP-OF) based on a vehicular ad hoc network (VANET) environment. Considering the uncertainty of driving vehicles, the target vehicle (vehicle for special tasks) is influenced by surrounding vehicles, leading to possible deadlock or congestion situations that extend travel time. Therefore, overtaking planning should be conducted through V2V communication, enabling surrounding vehicles to coordinate with the target vehicle to avoid deadlock and congestion through lane changing and overtaking. In the proposed DSTTPP-OF, vehicles may queue up at intersections, so we take into account the impact of traffic signals. We classify road segments into congested and non-congested sections, calculating travel times for each section separately. Subsequently, in front of each intersection, the improved Dijkstra algorithm is employed to find the shortest travel time path to the destination, and the overtaking function is used to prevent the target vehicle from entering a deadlocked state. The real-time traffic data essential for dynamic path planning were collected through a VANET of symmetrically deployed roadside units (RSUs) along the roadway. Finally, simulations were conducted using the SUMO simulator. Under different traffic flows, the proposed DSTTPP-OF demonstrates good performance; the target vehicle can travel smoothly without significant interruptions and experiences the fewest stops, thanks to the proposed algorithm. Compared to the shortest distance path planning (SDPP) algorithm, the travel time is reduced by approximately 36.9%, and the waiting time is reduced by about 83.2%. Compared to the dynamic minimum time path planning (DMTPP) algorithm, the travel time is reduced by around 18.2%, and the waiting time is reduced by approximately 65.6%. Full article
(This article belongs to the Section Engineering and Materials)
Show Figures

Figure 1

22 pages, 2122 KB  
Article
VehiCast: Real-Time Highway Traffic Incident Forecasting System Using Federated Learning and Vehicular Ad Hoc Network
by Hani Alnami and Muhammad Mohzary
Electronics 2025, 14(5), 900; https://doi.org/10.3390/electronics14050900 - 25 Feb 2025
Viewed by 1021
Abstract
Road safety is a critical concern, as accidents happen globally. Despite efforts to enhance roads and enforce stricter driving rules, the number of accidents remains high. These issues arise from distracted driving, speeding, and driving under the influence. In the United States, fatal [...] Read more.
Road safety is a critical concern, as accidents happen globally. Despite efforts to enhance roads and enforce stricter driving rules, the number of accidents remains high. These issues arise from distracted driving, speeding, and driving under the influence. In the United States, fatal accidents increased by 16% from 2018 to 2022. The number of deaths rose from 36,835 in 2018 to 42,795 in 2022. This trend reveals a critical need for new solutions to reduce traffic incidents and improve road safety. Machine learning (ML) can help make roads safer and reduce traffic-related deaths. This paper presents an ML-based real-time highway traffic incident forecasting system named “VehiCast”. VehiCast utilizes vehicular ad hoc networks (VANETs) and federated learning (FL) to collect real-time traffic data, such as average delay, average speed, and the total number of vehicles across several highway zones, to enhance traffic incident prediction accuracy in real-time. Our extensive experimental results showcase that VehiCast reaches an impressive prediction accuracy of 91%, highlighting the power of innovation and determination. Full article
Show Figures

Figure 1

25 pages, 2389 KB  
Review
A Critical Analysis of Cooperative Caching in Ad Hoc Wireless Communication Technologies: Current Challenges and Future Directions
by Muhammad Ali Naeem, Rehmat Ullah, Sushank Chudhary and Yahui Meng
Sensors 2025, 25(4), 1258; https://doi.org/10.3390/s25041258 - 19 Feb 2025
Cited by 1 | Viewed by 1075
Abstract
The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use. Caching, especially cooperative caching, has become a revolutionary paradigm shift to advance environments based on wireless technologies to enable [...] Read more.
The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use. Caching, especially cooperative caching, has become a revolutionary paradigm shift to advance environments based on wireless technologies to enable efficient data distribution and support the mobility, scalability, and manageability of wireless networks. Mobile ad hoc networks (MANETs), wireless mesh networks (WMNs), Wireless Sensor Networks (WSNs), and Vehicular ad hoc Networks (VANETs) have adopted caching practices to overcome these hurdles progressively. In this paper, we discuss the problems and issues in the current wireless ad hoc paradigms as well as spotlight versatile cooperative caching as the potential solution to the increasing complications in ad hoc networks. We classify and discuss multiple cooperative caching schemes in distinct wireless communication contexts and highlight the advantages of applicability. Moreover, we identify research directions to further study and enhance caching mechanisms concerning new challenges in wireless networks. This extensive review offers useful findings on the design of sound caching strategies in the pursuit of enhancing next-generation wireless networks. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

25 pages, 5328 KB  
Article
Hybrid Trust Model for Node-Centric Misbehavior Detection in Dynamic Behavior-Homogeneous Clusters
by Xiaoya Xu, Weijie Zhu, Xiufeng Fu, Guang Yang, Longlong Jin, Wanting Yu and Lingfei You
Appl. Sci. 2025, 15(4), 2020; https://doi.org/10.3390/app15042020 - 14 Feb 2025
Cited by 1 | Viewed by 816
Abstract
In vehicular ad hoc networks (VANETs), the presence of untrustworthy nodes poses a significant threat, impacting the network’s reliability. This has led to the emergence of node-centric misbehavior detection as a crucial aspect of VANET security, focusing on the behavior of vehicles rather [...] Read more.
In vehicular ad hoc networks (VANETs), the presence of untrustworthy nodes poses a significant threat, impacting the network’s reliability. This has led to the emergence of node-centric misbehavior detection as a crucial aspect of VANET security, focusing on the behavior of vehicles rather than the content of their interactions. While the trust model is a popular approach, the computational complexity of trust computations and management in VANETs is attributed to the intricate relationships among vehicles and the dynamic autonomous movement of nodes. To tackle these challenges, we developed a hybrid trust model scheme for node-centric misbehavior detection. Our method represents complex vehicular relationships using a hyper-graph within a dynamic behavior-homogeneous cluster. The model incorporates direct and indirect trust in a multi-layered hybrid trust framework, enabling accurate computation of the aggregate trust level for each cluster member vehicle. Experimental results demonstrate the effectiveness of our scheme, particularly in high-density vehicle cooperation scenarios, highlighting its promising ability to detect misbehaving nodes. Full article
Show Figures

Figure 1

Back to TopTop