J Zhang - International Journal of Distributed Systems and …, 2012 - igi-global.com
An increasingly large number of cars are being equipped with GPS and Wi-Fi devices, forming vehicular ad-hoc networks (VANETs) and enabling vehicle to vehicle …
X Li, J Liu, X Li, H Li - … Journal of Grid and Utility Computing, 2015 - inderscienceonline.com
In recent years trust management has become a main method to ensure the security of vehicular ad-hoc networks (VANETs). However, most of the existing trust establishment …
Z Liu, J Weng, J Ma, J Guo, B Feng… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Vehicular ad-hoc networks (VANETs) have recently attracted considerable attention from both industry and academia for improving road safety and traffic efficiency. Trust modeling …
MB Monir, M Aziz, AAA Hamid - International Journal of Emerging …, 2013 - academia.edu
In Vehicular Ad Hoc Networks (VANET), trust establishment among communicating vehicles is important to be built to secure messages' exchange and reliability. In this paper, the …
Routing in vehicular ad hoc networks (VANETs) enables efficient communication and data exchange between vehicles and infrastructure components, which is a critical aspect of …
CC Lam, Y Song, Y Cao, B Cai… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
With the development of vehicular ad-hoc networks (VANETs), several data security challenges are revealed, such as data hijacking and interception. Although vehicles are …
Vehicular Ad hoc Networks (VANETs) are used to improve traffic management and reduce the number of road accidents by providing safety applications. However, VANETs are …
Y Su - IEEE Open Journal of the Computer Society, 2021 - ieeexplore.ieee.org
With the increasing demands of social services, Unmanned Aerial Vehicles (UAVs)-assisted networks promote promising prospect for improving social services. The sensing data can …
D Wang, Y Yi, S Yan, N Wan, J Zhao - Ad Hoc Networks, 2023 - Elsevier
As the vehicle-road-cloud collaboration system develops rapidly, it is accompanied by serious information security problems while solving the data transmission issues. For …