{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T10:30:48Z","timestamp":1762338648690,"version":"build-2065373602"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100014013","name":"UKRI","doi-asserted-by":"crossref","award":["Swansea"],"award-info":[{"award-number":["Swansea"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Implementing Intelligent Transportation Systems (ITS) raises serious safety concerns, directly contributing to good health and well-being by enhancing road safety. Intelligent transport technologies are used by vehicular ad hoc networks (VANET) to enhance traffic flow and safety on the roads aligning with sustainable cities and communities. For this purpose, a variety of techniques have been examined in this article. The design and analysis of middleware architecture for VANET are also covered in this paper, promoting industry, innovation, and infrastructure. Since the automobiles travel deliberately rather than carelessly to connect with roadside equipment by limiting the range of motion, the first implementation of this relies on VANET networks, middleware, and heuristic technique. The VANET network is replacing wireless telephony, mobile nodes are evolving into vehicle nodes, and the transport system is changing to an intelligent transport system. In terms of latency (high 10.14%), power dissipation (less 2.46%), throughput (high 2.82%), and overall cumulative performance (high 3.12%) on different nodes ranging from 100 to 500, the experimentation results show that the middleware and VANET architecture are superior to the heuristic approach, contributing to responsible consumption and production through improved efficiency.<\/jats:p>","DOI":"10.1186\/s13638-025-02521-5","type":"journal-article","created":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T10:23:35Z","timestamp":1762338215000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Middleware architecture performance analysis for vehicular ad hoc network"],"prefix":"10.1186","volume":"2025","author":[{"given":"Rajender","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Punit","family":"Soni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8037-7152","authenticated-orcid":false,"given":"Purushottam","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Tajinder","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Mandeep","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Mrinal","family":"Paliwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,5]]},"reference":[{"issue":"1","key":"2521_CR1","first-page":"41","volume":"3","author":"R Kumar","year":"2014","unstructured":"R. Kumar, R. Khanna, P.K. Verma, Middleware architecture of VASNET and its review for urban monitoring & vehicle tracking. IJERMT J. 3(1), 41\u201345 (2014)","journal-title":"IJERMT J."},{"key":"2521_CR2","doi-asserted-by":"crossref","unstructured":"R. Kumar, R. Khanna, S. Kumar, Vehicular middleware and heuristic approaches for intelligent transportation system of smart cities, in Cognitive Computing for Human-Robot Interaction (2021), p. 163","DOI":"10.1016\/B978-0-323-85769-7.00019-7"},{"key":"2521_CR3","doi-asserted-by":"publisher","unstructured":"M. Aashkaar, P. Sharma, Enhanced energy efficient AODV routing protocol for MANET, in International Conference on Research Advances in Integrated Navigation Systems, RAINS 2016. https:\/\/doi.org\/10.1109\/RAINS.2016.7764376 (2016)","DOI":"10.1109\/RAINS.2016.7764376"},{"key":"2521_CR4","volume-title":"Ad Hoc Mobile Wireless Networks: Protocols and Systems","author":"CK Toh","year":"2001","unstructured":"C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems (Prentice-Hall, 2001)"},{"issue":"14","key":"2521_CR5","first-page":"1504","volume":"10","author":"R Kumar","year":"2018","unstructured":"R. Kumar, R. Khanna, S. Kumar, An effective framework for security and performance in intelligent vehicular ad-hoc network. J. Adv. Res. Dyn. Control Syst. 10(14), 1504\u20131507 (2018)","journal-title":"J. Adv. Res. Dyn. Control Syst."},{"issue":"14","key":"2521_CR6","first-page":"1508","volume":"10","author":"R Kumar","year":"2018","unstructured":"R. Kumar, R. Khanna, S. Kumar, Deep learning integrated approach for collision avoidance in internet of things based smart vehicular networks. J. Adv. Res. Dyn. Control Syst. 10(14), 1508\u20131512 (2018)","journal-title":"J. Adv. Res. Dyn. Control Syst."},{"issue":"1","key":"2521_CR7","first-page":"1","volume":"3","author":"MN Majeed","year":"2013","unstructured":"M.N. Majeed, S.P. Chattha, A. Akram, M. Zafrullah, Vehicular adhoc networks history and future development arenas. Inf. Technol. Electr. Eng. J. 3(1), 1\u20135 (2013)","journal-title":"Inf. Technol. Electr. Eng. J."},{"key":"2521_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-15497-8_1","volume-title":"Vehicular Adhoc Networks\u2014Standards, Solutions, and Research","author":"M Annoni","year":"2015","unstructured":"M. Annoni, B. Williams, Vehicular Adhoc Networks\u2014Standards, Solutions, and Research (Springer, Cham, 2015), pp.3\u201322"},{"key":"2521_CR9","doi-asserted-by":"crossref","unstructured":"S. Vinoski, An overview of middleware, in International Conference on Reliable Software Technologies (2004), pp. 35\u201351","DOI":"10.1007\/978-3-540-24841-5_3"},{"key":"2521_CR10","volume-title":"Introduction to Artificial Intelligence and Expert Systems","author":"DW Patterson","year":"2015","unstructured":"D.W. Patterson, Introduction to Artificial Intelligence and Expert Systems, 1st edn. (Pearson Education India, New Delhi, 2015)","edition":"1"},{"key":"2521_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100499","author":"AP Mdee","year":"2022","unstructured":"A.P. Mdee, M.M. Saad, M. Khan, M.T.R. Khan, D. Kim, Impacts of location-privacy preserving schemes on vehicular applications. Veh. Commun. (2022). https:\/\/doi.org\/10.1016\/j.vehcom.2022.100499","journal-title":"Veh. Commun."},{"key":"2521_CR12","doi-asserted-by":"crossref","unstructured":"N. Sharma, J. Sengupta, S.D. Bit, SACRIFICE: a secure road condition monitoring scheme over fog-based VANETs, in 2022 14th International Conference on COMmunication Systems &NETworkS (COMSNETS) (IEEE, 2022), pp. 464\u2013472","DOI":"10.1109\/COMSNETS53615.2022.9668509"},{"key":"2521_CR13","doi-asserted-by":"publisher","first-page":"104612","DOI":"10.1016\/j.micpro.2022.104612","volume":"93","author":"CP Lee","year":"2022","unstructured":"C.P. Lee, F.T.J. Leng, R.A.A. Habeeb, M.A. Amanullah, M.H. ur Rehman, Edge computing-enabled secure and energy-efficient smart parking: a review. Microprocess. Microsyst. 93, 104612 (2022)","journal-title":"Microprocess. Microsyst."},{"key":"2521_CR14","doi-asserted-by":"publisher","first-page":"100565","DOI":"10.1016\/j.iot.2022.100565","volume":"19","author":"A Rejeb","year":"2022","unstructured":"A. Rejeb, K. Rejeb, S. Simske, H. Treiblmaier, S. Zailani, The big picture on the internet of things and the smart city: a review of what we know and what we need to know. Internet of Things 19, 100565 (2022)","journal-title":"Internet of Things"},{"key":"2521_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100486","author":"B Ducourthial","year":"2022","unstructured":"B. Ducourthial, V. Cherfaoui, T. Fuhrmann, S. Bonnet, Experimentation of a road hazard anticipation system based on vehicle cooperation. Veh. Commun. (2022). https:\/\/doi.org\/10.1016\/j.vehcom.2022.100486","journal-title":"Veh. Commun."},{"issue":"5","key":"2521_CR16","first-page":"26","volume":"22","author":"DW Pyun","year":"2022","unstructured":"D.W. Pyun, J. Lim, K.S. Bok, J.S. Yoo, Cluster management scheme for safety message dissemination in a VANET environment. J. Korea Contents Assoc. 22(5), 26\u201336 (2022)","journal-title":"J. Korea Contents Assoc."},{"issue":"4","key":"2521_CR17","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.3390\/app12042083","volume":"12","author":"AM Farooqi","year":"2022","unstructured":"A.M. Farooqi, M.A. Alam, S.I. Hassan, S.M. Idrees, A fog computing model for VANET to reduce latency and delay using 5G network in smart city transportation. Appl. Sci. 12(4), 2083 (2022)","journal-title":"Appl. Sci."},{"issue":"8","key":"2521_CR18","doi-asserted-by":"publisher","first-page":"e5123","DOI":"10.1002\/dac.5123","volume":"35","author":"S Babu","year":"2022","unstructured":"S. Babu, A.R. Kumar P, A comprehensive survey on simulators, emulators, and testbeds for VANETs. Int. J. Commun. Syst. 35(8), e5123 (2022)","journal-title":"Int. J. Commun. Syst."},{"key":"2521_CR19","doi-asserted-by":"crossref","unstructured":"T. Chaymae, H. Elkhatir, A. Otman, Recent advances in machine learning and deep learning in vehicular ad-hoc networks: a comparative study, in International Conference on Electrical Systems & Automation (Springer, Singapore, 2022), pp. 1\u201314","DOI":"10.1007\/978-981-19-0039-6_1"},{"key":"2521_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103387","author":"M Fogli","year":"2022","unstructured":"M. Fogli, C. Giannelli, C. Stefanelli, Software-defined networking in wireless ad hoc scenarios: objectives and control architectures. J. Netw. Comput. Appl. (2022). https:\/\/doi.org\/10.1016\/j.jnca.2022.103387","journal-title":"J. Netw. Comput. Appl."},{"key":"2521_CR21","doi-asserted-by":"publisher","first-page":"101638","DOI":"10.1016\/j.pmcj.2022.101638","volume":"84","author":"FF De Mendon\u00e7a Junior","year":"2022","unstructured":"F.F. De Mendon\u00e7a Junior, Z. Kokkinogenis, K.L. Dias, P.M. d\u2019Orey, R.J.F. Rossetti, The trade-offs between fog processing and communications in latency-sensitive vehicular fog computing. Pervasive Mob. Comput. 84, 101638 (2022)","journal-title":"Pervasive Mob. Comput."},{"key":"2521_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100486","author":"B Ducourthial","year":"2022","unstructured":"B. Ducourthial, V. Cherfaoui, T. Fuhrmann, S. Bonnet, Experimentation of a road hazard anticipation system based on vehicle cooperation. Veh. Commun. (2022). https:\/\/doi.org\/10.1016\/j.vehcom.2022.100486","journal-title":"Veh. Commun."},{"key":"2521_CR23","doi-asserted-by":"crossref","unstructured":"S. Zeba, M. Amjad, D.R. Rizvi, Sustainable paradigm for computing the security of wireless Internet of Things: blockchain technology, in Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Real\u2010time Applications (2022), pp. 51\u201366","DOI":"10.1002\/9781119682554.ch3"},{"key":"2521_CR24","doi-asserted-by":"crossref","unstructured":"R. Kumar, R. Khanna, S. Kumar, Vehicular middleware and heuristic approaches for intelligent transportation system of smart cities, in Cognitive Computing for Human-Robot Interaction (Academic Press, 2021), pp. 163\u2013175","DOI":"10.1016\/B978-0-323-85769-7.00019-7"},{"key":"2521_CR25","doi-asserted-by":"crossref","unstructured":"S. Majumdar, A. Mathur, A.Y. Javaid, A study on recent applications of blockchain technology in vehicular adhoc network (VANET), in Advances in Intelligent Systems and Computing 1055, National Cyber Summit (NCS) (Springer, 2020), pp. 293\u2013308","DOI":"10.1007\/978-3-030-31239-8_22"},{"issue":"3","key":"2521_CR26","first-page":"192","volume":"40","author":"R Dhivya","year":"2020","unstructured":"R. Dhivya, R.R. Kanna, Detection of malicious node in network layer using Esmts technique to improve the energy efficiency in Vanet. Stud. Indian Place Names 40(3), 192\u2013200 (2020)","journal-title":"Stud. Indian Place Names"},{"issue":"1","key":"2521_CR27","first-page":"1","volume":"14","author":"MA Al-Shabi","year":"2020","unstructured":"M.A. Al-Shabi, Evaluation the performance of MAODV and AODV protocols in VANETs models. Int. J. Comput. Sci. Secur. 14(1), 1\u201312 (2020)","journal-title":"Int. J. Comput. Sci. Secur."},{"issue":"2","key":"2521_CR28","doi-asserted-by":"publisher","first-page":"330","DOI":"10.3390\/s20020330","volume":"20","author":"H Galeana-Zapi\u00e9n","year":"2020","unstructured":"H. Galeana-Zapi\u00e9n, M. Morales-Sandoval, C.A. Leyva-V\u00e1zquez, J. Rubio-Loyola, Smartphone-based platform for secure multi-hop message dissemination in VANETs. Sensors 20(2), 330 (2020). https:\/\/doi.org\/10.3390\/s20020330","journal-title":"Sensors"},{"key":"2521_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7082-3_64","author":"RV Reddy","year":"2019","unstructured":"R.V. Reddy, D. Murali, J. Rajeshwar, Context-aware middleware architecture for IoT-based smart healthcare applications. Lect. Notes Netw. Syst. (2019). https:\/\/doi.org\/10.1007\/978-981-13-7082-3_64","journal-title":"Lect. Notes Netw. Syst."},{"key":"2521_CR30","doi-asserted-by":"publisher","unstructured":"C. Kalaiarasy, N. Sreenath, A. Amuthan, Location privacy preservation in VANET using mix zones\u2014a survey, in 2019 International Conference on Computer Communication and Informatics (ICCCI) (2019), pp. 1\u20135. https:\/\/doi.org\/10.1109\/iccci.2019.8822028","DOI":"10.1109\/iccci.2019.8822028"},{"issue":"2","key":"2521_CR31","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/mnet.2019.1800236","volume":"33","author":"HA Khattak","year":"2019","unstructured":"H.A. Khattak, H. Farman, B. Jan, I.U. Din, Toward integrating vehicular clouds with IoT for smart city services. IEEE Netw. 33(2), 65\u201371 (2019). https:\/\/doi.org\/10.1109\/mnet.2019.1800236","journal-title":"IEEE Netw."},{"key":"2521_CR32","doi-asserted-by":"publisher","first-page":"12768","DOI":"10.1109\/ACCESS.2020.2964422","volume":"8","author":"Y Zheng","year":"2020","unstructured":"Y. Zheng, J. Luo, T. Zhong, Service recommendation middleware based on location privacy protection in VANET. IEEE Access 8, 12768\u201312786 (2020)","journal-title":"IEEE Access"},{"issue":"5","key":"2521_CR33","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TVT.2011.2148202","volume":"60","author":"Y Zhang","year":"2011","unstructured":"Y. Zhang, G. Cao, V-pada: vehicle-platoon-aware data access in VANETs. IEEE Trans. Veh. Technol. 60(5), 2326\u20132339 (2011)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2521_CR34","doi-asserted-by":"crossref","unstructured":"H. Ahmed, S. Pierre, A. Quintero, A flexible testbed architecture for VANET, in Vehicular Communications (2017), pp. 1\u201313","DOI":"10.1016\/j.vehcom.2017.04.004"},{"key":"2521_CR35","doi-asserted-by":"crossref","unstructured":"W. Zhang, R. Dechter, R.E. Korf, Heuristic search in artificial intelligence, in Artificial Intelligence, vol. 129 (Elsevier, 2001), pp. 1\u20134","DOI":"10.1016\/S0004-3702(01)00111-4"},{"key":"2521_CR36","doi-asserted-by":"publisher","unstructured":"M. Prabhakar, J.N. Singh, G. Mahadevan, Defensive mechanism for VANET security in game theoretic approach using heuristic based ant colony optimization, in International Conference on Computer Communication and Informatics (2013). https:\/\/doi.org\/10.1109\/iccci.2013.6466118","DOI":"10.1109\/iccci.2013.6466118"},{"issue":"23","key":"2521_CR37","doi-asserted-by":"publisher","first-page":"6235","DOI":"10.1109\/TSP.2014.2360146","volume":"62","author":"X Xie","year":"2014","unstructured":"X. Xie, M. Peng, Y. Li, W. Wang, H.V. Poor, Channel estimation for two-way relay networks in the presence of synchronization errors. IEEE Trans. Signal Process. 62(23), 6235\u20136248 (2014)","journal-title":"IEEE Trans. Signal Process."},{"issue":"2","key":"2521_CR38","first-page":"123","volume":"25","author":"S Majumdar","year":"2021","unstructured":"S. Majumdar, A. Patel, R. Sharma, Use of blockchain to reduce vulnerabilities in VANET. J. Intell. Transp. Syst. 25(2), 123\u2013134 (2021)","journal-title":"J. Intell. Transp. Syst."},{"issue":"4","key":"2521_CR39","first-page":"456","volume":"70","author":"J Smith","year":"2021","unstructured":"J. Smith, L. Jones, K. Brown, Enhanced security protocols for VANET. IEEE Trans. Veh. Technol. 70(4), 456\u2013465 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"2521_CR40","first-page":"35","volume":"19","author":"Y Zhao","year":"2022","unstructured":"Y. Zhao, M. Liu, T. Chen, Adaptive routing in VANETs. IEEE Trans. Network Serv. Manag. 19(1), 35\u201350 (2022)","journal-title":"IEEE Trans. Network Serv. Manag."},{"issue":"3","key":"2521_CR41","first-page":"215","volume":"12","author":"H Kim","year":"2022","unstructured":"H. Kim, R. Lee, Fog computing integration for VANET. Int. J. Cloud Comput. Serv. Sci. 12(3), 215\u2013226 (2022)","journal-title":"Int. J. Cloud Comput. Serv. Sci."},{"key":"2521_CR42","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/ACCESS.2022.3232853","volume":"11","author":"R Patel","year":"2023","unstructured":"R. Patel, M. Kumar, Privacy-preserving data sharing in VANET. IEEE Access 11, 144\u2013156 (2023)","journal-title":"IEEE Access"},{"issue":"7","key":"2521_CR43","doi-asserted-by":"crossref","first-page":"1650","DOI":"10.1109\/TMC.2022.3152480","volume":"22","author":"Y Chen","year":"2023","unstructured":"Y. Chen, L. Zhang, P. Wang, Game-theoretic models for resource allocation in VANET. IEEE Trans. Mob. Comput. 22(7), 1650\u20131662 (2023)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"2521_CR44","first-page":"12","volume":"25","author":"S Lee","year":"2023","unstructured":"S. Lee, D. Park, J. Cho, Energy-efficient VANET communication. J. Commun. Netw. 25(1), 12\u201322 (2023)","journal-title":"J. Commun. Netw."},{"issue":"5","key":"2521_CR45","first-page":"345","volume":"10","author":"T Davis","year":"2024","unstructured":"T. Davis, F. Martinez, A. Rodriguez, Integration of IoT with VANET. IEEE Internet Things J. 10(5), 345\u2013358 (2024)","journal-title":"IEEE Internet Things J."},{"key":"2521_CR46","doi-asserted-by":"publisher","unstructured":"C. Verma, NextGen learning: hybrid mode prediction with machine learning, in 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 2024 (2024), pp. 1\u20138. https:\/\/doi.org\/10.1109\/ICRITO61523.2024.10522445","DOI":"10.1109\/ICRITO61523.2024.10522445"},{"issue":"2","key":"2521_CR47","first-page":"101","volume":"12","author":"A Ahmed","year":"2024","unstructured":"A. Ahmed, K. Malik, Smart contract applications in VANET. IEEE Trans. Emerg. Top. Comput. 12(2), 101\u2013113 (2024)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"3","key":"2521_CR48","first-page":"234","volume":"19","author":"X Yang","year":"2024","unstructured":"X. Yang, J. Huang, Q. Zhang, Securing VANETs through decentralized ledgers. IEEE Trans. Inf. Forensics Secur. 19(3), 234\u2013245 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"2521_CR49","first-page":"59","volume":"190","author":"R Singh","year":"2024","unstructured":"R. Singh, T. Verma, M. Joshi, Real-time data analytics for VANET. J. Syst. Softw. 190(1), 59\u201372 (2024)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"2521_CR50","first-page":"101","volume":"25","author":"P Robinson","year":"2024","unstructured":"P. Robinson, A. Carter, Autonomous vehicles in VANET. IEEE Trans. Intell. Transp. Syst. 25(2), 101\u2013110 (2024)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"2521_CR51","first-page":"890","volume":"70","author":"L Martinez","year":"2024","unstructured":"L. Martinez, S. Alvarado, Cross-layer optimization in VANET. IEEE Trans. Veh. Technol. 70(5), 890\u2013901 (2024)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2521_CR52","first-page":"134","volume":"12","author":"C Garcia","year":"2024","unstructured":"C. Garcia, R. Torres, J. Nunez, Secure vehicle-to-vehicle communication. IEEE Access 12, 134\u2013145 (2024)","journal-title":"IEEE Access"},{"issue":"12","key":"2521_CR53","doi-asserted-by":"publisher","first-page":"9595","DOI":"10.1109\/TWC.2023.3272348","volume":"22","author":"H Zhou","year":"2023","unstructured":"H. Zhou et al., Distributed deep multi-agent reinforcement learning for cooperative edge caching in Internet-of-Vehicles. IEEE Trans. Wirel. Commun. 22(12), 9595\u20139609 (2023). https:\/\/doi.org\/10.1109\/TWC.2023.3272348","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"8","key":"2521_CR54","doi-asserted-by":"publisher","first-page":"11023","DOI":"10.1109\/JIOT.2024.3515075","volume":"12","author":"D Meng","year":"2025","unstructured":"D. Meng et al., Incentive-driven partial offloading and resource allocation in vehicular edge computing networks. IEEE Internet Things J. 12(8), 11023\u201311035 (2025). https:\/\/doi.org\/10.1109\/JIOT.2024.3515075","journal-title":"IEEE Internet Things J."},{"key":"2521_CR55","doi-asserted-by":"crossref","unstructured":"R. Kumar, R. Khanna, S. Kumar, Technological transformation of middleware and heuristic approaches for intelligent transport system, in Autonomous Vehicles Volume 1: Using Machine Intelligence (2022), pp. 61\u201382","DOI":"10.1002\/9781119871989.ch4"},{"key":"2521_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7717\/PEERJ-CS.437","volume":"7","author":"A Agarwal","year":"2021","unstructured":"A. Agarwal, P. Sharma, M. Alshehri, A.A. Mohamed, O. Alfarraj, Classification model for accuracy and intrusion detection using machine learning approach. PeerJ Comput. Sci. 7, 1\u201322 (2021). https:\/\/doi.org\/10.7717\/PEERJ-CS.437","journal-title":"PeerJ Comput. Sci."},{"issue":"6","key":"2521_CR57","first-page":"1","volume":"6","author":"RK Keshav Garg","year":"2022","unstructured":"R.K. Keshav Garg, A. Gupta, A. Nirwal, What and why you need to know about non-fungible tokens (NFTs). Int. J. Sci. Res. Eng. Manag. 6(6), 1\u20134 (2022)","journal-title":"Int. J. Sci. Res. Eng. Manag."},{"key":"2521_CR58","doi-asserted-by":"publisher","first-page":"98029","DOI":"10.1109\/ACCESS.2024.3428332","volume":"12","author":"C Verma","year":"2024","unstructured":"C. Verma, Z. Ill\u00e9s, D. Kumar, TCLPI: machine learning-driven framework for hybrid learning mode identification. IEEE Access 12, 98029\u201398045 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3428332","journal-title":"IEEE Access"},{"key":"2521_CR59","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1007\/s13198-021-01414-2","volume":"13","author":"AK Yadav","year":"2022","unstructured":"A.K. Yadav, P. Sharma, R.K. Yadav, A novel algorithm for wireless sensor network routing protocols based on reinforcement learning. Int. J. Syst. Assur. Eng. Manag. 13, 1198\u20131204 (2022). https:\/\/doi.org\/10.1007\/s13198-021-01414-2","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"issue":"2","key":"2521_CR60","first-page":"271","volume":"7","author":"S Sardana","year":"2016","unstructured":"S. Sardana, R. Kumar, Energy efficient target tracking in wireless sensor networks. Int. J. Innov. Eng. Technol. 7(2), 271\u2013275 (2016). (ISSN: 2319-1058)","journal-title":"Int. J. Innov. Eng. Technol."},{"issue":"1","key":"2521_CR61","doi-asserted-by":"publisher","first-page":"719","DOI":"10.32604\/cmc.2025.060836","volume":"83","author":"T Kumar","year":"2025","unstructured":"T. Kumar, P. Sharma, X. Cheng, S. Lalar, S. Kumar et al., Enhanced triple layered approach for mitigating security risks in cloud. Comput. Mater. Contin. 83(1), 719\u2013738 (2025). https:\/\/doi.org\/10.32604\/cmc.2025.060836","journal-title":"Comput. Mater. Contin."},{"issue":"1","key":"2521_CR62","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s13198-022-01793-0","volume":"14","author":"P Sharma","year":"2023","unstructured":"P. Sharma, S. Kapoor, R. Sharma, Ransomware detection, prevention and protection in IoT devices using ML techniques based on dynamic analysis approach. Int. J. Syst. Assur. Eng. Manag. 14(1), 287\u2013296 (2023). https:\/\/doi.org\/10.1007\/s13198-022-01793-0","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"2521_CR63","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s40031-024-01103-1","volume":"106","author":"S Gupta","year":"2025","unstructured":"S. Gupta, S. Singla, P. Sharma, Enhanced security in MANETs using AODV protocol. J. Inst. Eng. India Ser. B 106, 327\u2013338 (2025). https:\/\/doi.org\/10.1007\/s40031-024-01103-1","journal-title":"J. Inst. Eng. India Ser. B"},{"key":"2521_CR64","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/s13198-022-01820-0","volume":"14","author":"S Singla","year":"2023","unstructured":"S. Singla, P. Sharma, P.K. Sharma, Enhanced security using proxy signcryption technique for wireless mesh networks. Int. J. Syst. Assur. Eng. Manag. 14, 474\u2013482 (2023). https:\/\/doi.org\/10.1007\/s13198-022-01820-0","journal-title":"Int. J. Syst. Assur. Eng. Manag."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-025-02521-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-025-02521-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-025-02521-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T10:23:42Z","timestamp":1762338222000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-025-02521-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,5]]},"references-count":64,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["2521"],"URL":"https:\/\/doi.org\/10.1186\/s13638-025-02521-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,5]]},"assertion":[{"value":"27 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no conflicts of interest to report regarding the present study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"91"}}