Check access to the full text by signing in through your organization. Access through your organization Section snippets Related works The domain of Vehicular Ad-Hoc Networks (VANET) has garnered substantial attention due to the heightened importance of security and privacy in dynamic vehicular com...
Vehicular Ad-hoc Networks (VANET) have recently been an essential element for the Internet of Things (IoT) as it allows the communication among vehicles and ad-hoc transfer of information between them [1]. In the emerging VANETs, vehicles are connected through vehicle-to-vehicle (V2V), vehicl...
is one of the main objectives in multi-hop broadcasting. In fact, a too large number of transmissions acts unavoidably leads to unsustainable levels of latency, retransmissions, and collisions: the overall phenomenon is typically referred to as broadcast storm problem [1] and it mainly affects...
In VANET, the devices are equipped with wireless communication devices and computing technologies for inter-vehicle and intra-vehicle communication. Inter-vehicle communication, in the form of caching, is one of the promising fields of research in these development perspectives for standardization, ...
Upon receiving the Interest, if the PIT is full, the 𝑃𝐼𝑇𝐸 with the longest remaining LT and the fewest requests is replaced with a new one. In the event of PIT overflow, the scheme replaces the 𝑃𝐼𝑇𝐸 for the upcoming Interest with the 𝑃𝐼𝑇𝐸 with a ...
The working of fog depends on intelligent gateways, which have more computation power and processing capabilities than the IoT devices. With fog and IoT devices, the bandwidth minimizes and enhances the fog devices’ performance. The servers in the fog are called cloudlets and are like central ...
In VANETs, this kind of assault is known as a full packet drop attack. A Black Hole node might enter the network invisibly due to the open medium and dynamic topology of MANETs and remain there indefinitely. During the route discovery phase, the emergence of Black Hole nodes is a common...
Achieving Full Secrecy Rate With Energy-Efficient Transmission Control. IEEE Trans. Commun. 2017, 65, 5386–5400. [Google Scholar] [CrossRef] Figure 1. A RFID-integrated framework in UAV-aided VANETs. Figure 3. A sample illustration of the multifrequency tag identification method. Figure 4. ...
However, from the above works, we can conclude that machine learning techniques, especially DL, can be used to avoid attacks in VANETs. Table 1 shows the full comparison of the existing approach and our proposed approach to easily compare and identify the research gap of our study. It is ...
In the microgrid system, all distributed energy resources combine together to provide a better energy solution. The IoT microgrid system depends on the supervisory control and data acquisition (SCADA), and the integration of domains can increase the chances of possible cyber-attacks, which may ...