Skip to main content

Showing 1–34 of 34 results for author: Samara, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.01655  [pdf, other

    cs.CY cs.AI cs.LG

    A Deep Learning Approach Towards Student Performance Prediction in Online Courses: Challenges Based on a Global Perspective

    Authors: Abdallah Moubayed, MohammadNoor Injadat, Nouh Alhindawi, Ghassan Samara, Sara Abuasal, Raed Alazaidah

    Abstract: Analyzing and evaluating students' progress in any learning environment is stressful and time consuming if done using traditional analysis methods. This is further exasperated by the increasing number of students due to the shift of focus toward integrating the Internet technologies in education and the focus of academic institutions on moving toward e-Learning, blended, or online learning models.… ▽ More

    Submitted 10 January, 2024; originally announced February 2024.

    Comments: Accepted and presented in 24th International Arab Conference on Information Technology (ACIT'2023)

  2. Internet of Robotic Things: Current Technologies and Applications

    Authors: Ghassan Samara, Abla Hussein, Israa Abdullah Matarneh, Mohammed Alrefai, Maram Y Al-Safarini

    Abstract: The Internet of Robotic Things (IoRT) is a new domain that aims to link the IoT environment with robotic systems and technologies. IoRT connects robotic systems, connects them to the cloud, and transfers critical information as well as knowledge exchange to conduct complicated and intricate activities that a human cannot readily perform. The pertinent notion of IoRT has been discussed in this pape… ▽ More

    Submitted 30 March, 2022; originally announced April 2022.

    Comments: 6 pages

    Journal ref: 2021 22nd International Arab Conference on Information Technology (ACIT)

  3. Internet of Things Protection and Encryption: A Survey

    Authors: Ghassan Samara, Ruzayn Quaddoura, Mooad Imad Al-Shalout, AL-Qawasmi Khaled, Ghadeer Al Besani

    Abstract: The Internet of Things (IoT) has enabled a wide range of sectors to interact effectively with their consumers in order to deliver seamless services and products. Despite the widespread availability of (IoT) devices and their Internet connectivity, they have a low level of information security integrity. A number of security methods were proposed and evaluated in our research, and comparisons were… ▽ More

    Submitted 30 March, 2022; originally announced April 2022.

    Comments: 7 pages

    Journal ref: 2021 22nd International Arab Conference on Information Technology (ACIT)

  4. Improving VANET's Performance by Incorporated Fog-Cloud Layer (FCL)

    Authors: Ghassan Samara, Mohammed Rasmi, Nael A Sweerky, Essam Al Daoud, Amer Abu Salem

    Abstract: Because of its usefulness in various fields including as safety applications, traffic control applications, and entertainment applications, VANET is an essential topic that is now being investigated intensively. VANET confronts numerous challenges in terms of reaction time, storage capacity, and reliability, particularly in real-time applications. As a result, merging cloud computing and cloud com… ▽ More

    Submitted 30 March, 2022; originally announced April 2022.

    Comments: 5 pages

    Journal ref: 2021 22nd International Arab Conference on Information Technology (ACIT)

  5. arXiv:2203.15733  [pdf

    cs.NI

    Energy Balancing Algorithm for Wireless Sensor Network

    Authors: Ghassan Samara, Mohammad A. Hassan, Munir Al-Okour

    Abstract: A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy efficiency is a critical issue with WSNs. As a result,… ▽ More

    Submitted 17 March, 2022; originally announced March 2022.

    Comments: 11 pages

    Journal ref: Journal of Theoretical and Applied Information Technology 28th February 2022. Vol.100. No 4

  6. Scheduling UET-UCT DAGs of Depth Two on Two Processors

    Authors: Ruzayn Quaddoura, Gassan Samara

    Abstract: Given unit execution time (UET) tasks whose precedence constraints form a directed acyclic graph (DAG), the arcs are associated with unit communication time (UCT) delays. The problem is to schedule the tasks on two processors in order to minimize the makespan. Several polynomial algorithms in the literature are proposed for special classes of digraphs, but the complexity of solving this problem in… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: 6 pages

    Journal ref: 2021 22nd International Arab Conference on Information Technology (ACIT) | 978-1-6654-1995-6/21 2021 IEEE

  7. IoT Forensic Frameworks (DFIF, IoTDOTS,FSAIoT): A Comprehensive Study

    Authors: Mohammad A. Hassan, Ghassan Samara, Mohammad Abu Fadda

    Abstract: In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, the other concerning aspect is the achievement of pr… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: 15 pages

    Journal ref: Int. J. Advance Soft Compu. Appl, Vol. 14, No. 1, March 2022 Print ISSN: 2710-1274, Online ISSN: 2074-8523

  8. arXiv:2112.01310  [pdf

    cs.NI

    An Intelligent Vice Cluster Head Election Protocol in WSN

    Authors: Ghassan Samara, Mohammad A. Hassan, Yahya Zayed

    Abstract: Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wireless sensor networks from being used in a wide r… ▽ More

    Submitted 26 November, 2021; originally announced December 2021.

    Comments: 22 pages

    Journal ref: Int. J. Advance Soft Compu. Appl, Vol. 13, No. 3, November 2021 Print ISSN: 2710-1274, Online ISSN: 2074-8523

  9. Wireless Sensor Network MAC Energy -- efficiency Protocols: A Survey

    Authors: Ghassan Samara

    Abstract: Energy Efficiency in wireless sensor networks is an important topic in which the nodes rely on battery power, and efficient energy usage is a key issue for sensitive applications that require long working times. This stimulates many scientists at all levels of communication protocols Medium Access Control (MAC) who control the use of the wireless transmitter and receiver unit to create new protoco… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

    Comments: 5 pages. 2020 21st International Arab Conference on Information Technology (ACIT)

  10. Lane prediction optimization in VANET

    Authors: Ghassan Samara

    Abstract: Among the current advanced driver assistance systems, Vehicle-to-Vehicle (V2V) technology has great potential to increase Vehicular Ad Hoc Network (VANET) performance in terms of security, energy efficiency, and comfortable driving. In reality, vehicle drivers regularly change lanes depending on their assumptions regarding visual distances. However, many systems are not quite well-designed, becaus… ▽ More

    Submitted 5 January, 2021; originally announced February 2021.

    Comments: 6 pages

    Journal ref: Egyptian Informatics Journal, 2020

  11. Intelligent Reputation System for Safety Messages in VANET

    Authors: Ghassan Samara

    Abstract: Nowadays, Vehicle Ad - hoc Nets (VANET) applications have become very important in our lives because VANET provides drivers with safety messages, warnings, and instructions to ensure drivers have a safe and enjoyable journey. VANET Security is one of the hottest topics in computer networks research, Falsifying VANET system information violates VANET safety objectives and may lead to hazardous situ… ▽ More

    Submitted 12 June, 2020; originally announced July 2020.

    Comments: 9 pages

    Journal ref: IAES International Journal of Artificial Intelligence (IJ-AI) Vol. 9, No. 3, September 2020, pp. 439~447, ISSN: 2252-8938, DOI: 10.11591/ijai.v9.i3.pp439-447

  12. arXiv:2003.13765  [pdf

    cs.NI

    Optimal Number of Cluster Heads in Wireless Sensors Networks Based on LEACH

    Authors: Ghassan Samara, Munir Al-okour

    Abstract: The Wireless Sensor Network (WSN) has been one of the leading research fields of wireless networks, particularly in recent year. Sensors are randomly positioned in the region, every node senses the surroundings and sends the data collected to the cluster head (CH), which aggregates and transmits obtained information to the Base Station (BS). A non-rechargeable battery is included on each WSN node.… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: 5 pages

    Journal ref: International Journal of Advanced Trends in Computer Science and Engineering, ISSN 2278-3091, Volume 9, No.1, 2020

  13. arXiv:2002.07178  [pdf

    cs.NI

    Energy-Efficiency Routing algorithms in Wireless Sensor Networks: a Survey

    Authors: Ghassan Samara, Ghadeer Al Besani, Mohammad Alauthman, Mohammad Al Khaldy

    Abstract: A Wireless Sensor Network (WSN) is a collection of tiny nodes that have low energy levels and have become an essential component of the modern communication infrastructure and very important in industry and academia. Energy is crucial in WSN, and thus the design of WSN in the research community is based on energy efficiency, and node energy consumption is a great challenge to enhance WSN's lifetim… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: 5 pages

    Journal ref: International Journal of Scientific & Technology Research, Vol 9, ISSUE 1, Jan 2020 ISSN 2277-8616

  14. An Improved CF-MAC Protocol for VANET

    Authors: Ghassan Samara

    Abstract: Vehicular Ad hoc Network (VANET) is one of the emerging research areas in the mobile computing field which is considered as a future technology and promising topic in the computer science and computer networks. Which provides road safety, updated traffic information, and infotainment. VANET consists of a large number of vehicles moving in high speeds while broadcasting important information like s… ▽ More

    Submitted 14 June, 2019; originally announced June 2019.

    Comments: 7 pages

    Journal ref: International Journal of Electrical and Computer Engineering (IJECE) Vol. 9, No. 4, August 2019, pp. 2668~2675 ISSN: 2088-8708

  15. Efficient energy, cost reduction, and QoS based routing protocol for wireless sensor networks

    Authors: Ghassan Samara, Mohammad Aljaidi

    Abstract: Recent developments and widespread in wireless sensor network have led to many routing protocols, many of these protocols consider the efficiency of energy as the ultimate factor to maximize the WSN lifetime. The quality of Service (QoS) requirements for different applications of wireless sensor networks has posed additional challenges. Imaging and data transmission needs both QoS aware routing an… ▽ More

    Submitted 23 March, 2019; originally announced March 2019.

    Comments: 10 pages

    Journal ref: International Journal of Electrical and Computer Engineering (IJECE),Vol. 9, No. 1, February 2019, pp. 496~504, ISSN: 2088-8708, DOI: 10.11591/ijece.v9i1.pp496-504

  16. arXiv:1712.04622  [pdf

    cs.NI

    Performance Analysis of Dynamic Source Routing Protocol

    Authors: Amer O. Abu Salem, Ghassan Samara, Tareq Alhmiedat

    Abstract: Dynamic Source Routing (DSR) is an efficient on-demand routing protocol for mobile ad-hoc networks (MANET). It depends on two main procedures: Route Discovery and Route Maintenance. Route discovery is the procedure used at the source of the packets to discover a route to the destination. Route Maintenance is the procedure that discovers link failures and repairs them. Route caching is the sub proc… ▽ More

    Submitted 13 December, 2017; originally announced December 2017.

    Comments: 4 pages

    Report number: Vol. 5, No. 2 February 2014

    Journal ref: Journal of Emerging Trends in Computing and Information Sciences, 2014

  17. arXiv:1712.04263  [pdf

    cs.NI cs.CR

    Security Issues in Vehicular Ad Hoc Networks (VANET): a survey

    Authors: Ghassan Samara, Yousef Al-Raba'nah

    Abstract: Vehicular Ad Hoc Networks (VANET) is a technology that has been recently emerged, and bring a lot of interests. VANET can be used to improve road safety, reduce road traffic, serve interests of its users, and provide emergency services. The security is one of the most important issues in VANET, it is considered a critical point in the development of robust VANET systems. In this paper, a diverse t… ▽ More

    Submitted 12 December, 2017; originally announced December 2017.

    Report number: IJSAR, 2(4), 2015; 50-55

    Journal ref: International Journal of Sciences & Applied Research, 2015

  18. arXiv:1712.04247  [pdf

    cs.NI

    Congestion Control Approach based on Effective Random Early Detection and Fuzzy Logic

    Authors: Maimuna Khatari, Ghassan Samara

    Abstract: Congestion in router buffer increases the delay and packet loss. Active Queue Management (AQM) methods are able to detect congestion in early stage and control it by packet drop**. Effective Random Early Detection (ERED) method, among many other AQM methods, gives a good performance in detect and control congestion and preserve packet loss. However, the ERED neglect the delay factor, which is ef… ▽ More

    Submitted 12 December, 2017; originally announced December 2017.

    Comments: 14 pages

    Report number: Vol.3 (8). PP: 180-193,

    Journal ref: MAGNT Research Report (ISSN. 1444-8939) 2015

  19. arXiv:1712.04245  [pdf

    cs.NI

    Coordinator Location Effects in AODV Routing Protocol in ZigBee Mesh Network

    Authors: Abla Hussein, Ghassan Samara

    Abstract: ZigBee mesh network is very important research field in computer networks. However, the location of ZigBee coordinator plays a significant role in design and routing performance. In this paper, an extensive study on the factors that influence the performance of AODV routing protocol had been performed through the study of battery voltage decaying of nodes, neighboring tables, time delay and networ… ▽ More

    Submitted 12 December, 2017; originally announced December 2017.

    Comments: 7 pages

    Journal ref: International Journal of Computer Applications (0975-8887), October 2015 Volume 127 - No.8

  20. arXiv:1712.04190  [pdf

    cs.NI

    A Low Cost ZigBee Sensor Network Architecture for Indoor Air Quality Monitoring

    Authors: Tareq Alhmiedat, Ghassan Samara

    Abstract: This paper presents a low-cost system architecture that has been proposed for automatically monitoring air quality indoors and continuously in real-time. The designed system is in pilot phase where 4 sensor nodes are deployed in indoor environment, and data over 4 weeks has been collected and performance analysis and assessment are performed. Environmental data from sensor nodes are sent through Z… ▽ More

    Submitted 12 December, 2017; originally announced December 2017.

    Comments: 5 pages

    Report number: Vol. 15, No. 1

    Journal ref: International Journal of Computer Science and Information Security (IJCSIS), January 2017

  21. arXiv:1712.04189  [pdf

    cs.SE

    A Practical Approach for Detecting Logical Error in Object Oriented Environment

    Authors: Ghassan Samara

    Abstract: A programming language is a formally constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behavior of a machine or to express algorithms. Most programs that are written by programmers are often compiled correctly with no syntax or semantic errors. However, some other errors appear after… ▽ More

    Submitted 12 December, 2017; originally announced December 2017.

    Comments: 10 pages, Vol. 7, No. 2, 10-19, 2017

    Journal ref: World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741, 2017

  22. arXiv:1712.04186  [pdf

    cs.NI

    Mathematical Modeling and Analysis of ZigBee Node Battery Characteristics and Operation

    Authors: Abla Hussein, Ghassan Samara

    Abstract: ZigBee network technology has been used widely in different commercial, medical and industrial applications, and the importance of kee** the network operating at a longer time was the main objective of ZigBee manufacturers. In this paper, ZigBee battery characteristics and operation has been researched extensively and a mathematical modeling has been applied on existed practical data provided by… ▽ More

    Submitted 12 December, 2017; originally announced December 2017.

    Comments: 8 pages

    Report number: Vol.3 (6). PP: 99-106, 2015

    Journal ref: MAGNT Research Report, ISSN. 1444-8939, 2015

  23. arXiv:1604.03318  [pdf

    cs.AI cs.CL

    Applying Ontological Modeling on Quranic Nature Domain

    Authors: A. B. M. Shamsuzzaman Sadi, Towfique Anam, Mohamed Abdirazak, Abdillahi Hasan Adnan, Sazid Zaman Khan, Mohamed Mahmudur Rahman, Ghassan Samara

    Abstract: The holy Quran is the holy book of the Muslims. It contains information about many domains. Often people search for particular concepts of holy Quran based on the relations among concepts. An ontological modeling of holy Quran can be useful in such a scenario. In this paper, we have modeled nature related concepts of holy Quran using OWL (Web Ontology Language) / RDF (Resource Description Framewor… ▽ More

    Submitted 12 April, 2016; originally announced April 2016.

    Comments: 2016 7th International Conference on Information and Communication Systems (ICICS)

  24. arXiv:1406.7399  [pdf

    cs.NI cs.NE

    Intelligent Emergency Message Broadcasting in VANET Using PSO

    Authors: Ghassan Samara, Tareq Alhmiedat

    Abstract: The new type of Mobile Ad hoc Network which is called Vehicular Ad hoc Networks (VANET) created a fertile environment for research. In this research, a protocol Particle Swarm Optimization Contention Based Broadcast (PCBB) is proposed, for fast andeffective dissemination of emergency messages within a geographical area to distribute the emergency message and achieve the safety system, this researc… ▽ More

    Submitted 28 June, 2014; originally announced June 2014.

    Comments: 11 pages

    Journal ref: World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 4, No. 7, 90-100, 2014

  25. arXiv:1401.2405  [pdf

    cs.NI

    Dynamic Safety Message Power Control in VANET Using PSO

    Authors: Ghassan Samara, Tareq Alhmiedat, Amer O. Abu Salem

    Abstract: In the recent years Vehicular Ad hoc Networks (VANET) became one of the most challenging research area in the field of Mobile Ad hoc Networks (MANET). Vehicles in VANET send emergency and safety periodic messages through one control channel having a limited bandwidth, which causes a growing collision to the channel especially in dense traffic situations. In this paper a protocol Particle swarm opt… ▽ More

    Submitted 21 January, 2014; v1 submitted 10 January, 2014; originally announced January 2014.

    Comments: 9 pages. arXiv admin note: substantial text overlap with arXiv:1311.2364

    Journal ref: The World of Computer Science and Information Technology Journal (WSCIT). 2013, Volume 3, Issue 10. pp. 176.184

  26. arXiv:1311.2364  [pdf

    cs.NI

    Power Control Protocols in VANET

    Authors: Ghassan Samara, Amer O Abu Salem, Tareq Alhmiedat

    Abstract: Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated… ▽ More

    Submitted 11 November, 2013; originally announced November 2013.

    Comments: 6 pages

  27. arXiv:1310.1552  [pdf

    cs.NI

    Cache Discovery Policies of MANET

    Authors: Amer O. Abu Salem, Tareq Alhmiedat, Ghassan Samara

    Abstract: In situations where establishing a network infrastructure is impossible, Ad-hoc networks are considered particularly important. Most of the previous research in Ad-hoc networks concentrated on the development and enhancement of dynamic routing protocols, which could efficiently discover routes between two communicating nodes. Although routing strategies is an important topic in MANETs, other topic… ▽ More

    Submitted 6 October, 2013; originally announced October 2013.

    Comments: 9 pages

    Journal ref: World of Computer Science and Information TechnologyJournal (WCSIT), ISSN: 2221-0741, Vol. 3, No. 8, 135-143, 2013,

  28. arXiv:1308.1809  [pdf

    cs.NI

    An Indoor Fingerprinting Localization Approach for ZigBee Wireless Sensor Networks

    Authors: Tareq Alhmiedat, Ghassan Samara, Amer O. Abu Salem

    Abstract: Location tracking systems are increasingly becoming the focus of research in the field of Wireless Sensor Network (WSN). Received Signal Strength (RSS)-based localization systems are at the forefront of tracking research applications. Radio location fingerprinting is one of the most promising indoor positioning approaches due to its powerful in terms of accuracy and cost. However, fingerprinting s… ▽ More

    Submitted 8 August, 2013; originally announced August 2013.

    Comments: 13 pages

    Journal ref: European Journal of Scientific Research ISSN 1450-216X / 1450-202X Vol. 105 No 2 July, 2013, pp.190-202

  29. arXiv:1301.7170  [pdf

    cs.NI

    Increasing Network Visibility Using Coded Repetition Beacon Piggybacking

    Authors: Ghassan Samara

    Abstract: Vehicular Ad hoc Networks (VANET) is one of the most challenging research areas in the field of Mobile Ad Hoc Networks. In this research, we propose a new mechanism for increasing network visibility, by taking the information gained from periodic safety messages (beacons), and inserting it into a 'neighbor' table. The table will be propagated to all neighbors giving a wider vision for each vehicle… ▽ More

    Submitted 30 January, 2013; originally announced January 2013.

    Comments: 8 Pages

    Journal ref: World Applied Sciences Journal 13 (1); 100-108, 2011, ISSN 1818-4952, \c{opyright}IDOSI Publications, 2011

  30. arXiv:1207.0967  [pdf

    cs.CR

    A New Security Mechanism for Vehicular Communication Networks

    Authors: Ghassan Samara

    Abstract: Vehicular communication networks is a promising and emerging technology to facilitat road safety, Safety of life, traffic management, and infotainment dissemination for drivers and passengers. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this research new security mechanisms are proposed to achieve secure certificate revo… ▽ More

    Submitted 4 July, 2012; originally announced July 2012.

    Comments: 5 Pages

    Journal ref: International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec2012), Kuala Lumpur, Malaysia. P. 18 - 22

  31. Security Analysis of Vehicular Ad Hoc Networks (VANET)

    Authors: Ghassan Samara

    Abstract: Vehicular Ad Hoc Networks (VANET) has mostly gained the attention of today's research efforts, while current solutions to achieve secure VANET, to protect the network from adversary and attacks still not enough, trying to reach a satisfactory level, for the driver and manufacturer to achieve safety of life and infotainment. The need for a robust VANET networks is strongly dependent on their securi… ▽ More

    Submitted 6 June, 2012; originally announced June 2012.

    Comments: 6 pages; 2010 Second International Conference on Network Applications, Protocols and Services

  32. arXiv:1206.0305  [pdf

    cs.NI

    Efficient Certificate Management in VANET

    Authors: Ghassan Samara

    Abstract: Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobile Ad Hoc Networks, in this research We propose a flexible, simple, and scalable design for VANET certificates, and new methods for efficient certificate management, which will Reduce channel overhead by eliminating the use of CRL, and make Better certificate Revocation Management. Also it will increase the… ▽ More

    Submitted 1 June, 2012; originally announced June 2012.

    Comments: 5 pages. arXiv admin note: text overlap with arXiv:1006.5113, and with arXiv:1112.2257 by other authors

    Journal ref: 2010 2nd International Conference on Future Computer and Communication

  33. arXiv:1007.3058  [pdf

    cs.NI

    Safety Message Power Transmission Control for Vehicular Ad hoc Networks

    Authors: Ghassan Samara, Sureswaran Ramadas, Wafaa A. H. Al-Salihy

    Abstract: Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of Mobile Ad Hoc Networks. In this research we proposed a dynamic power adjustment protocol that will be used for sending the periodical safety message. (Beacon)based on the analysis of the channel status depending on the channel congestion and the power used for transmission. The Beacon Power Control (BPC)… ▽ More

    Submitted 18 July, 2010; originally announced July 2010.

    Journal ref: Journal of Computer Science 6 (10): 1027-1032, 2010 ISSN 1549-3636, 2010 Science Publications

  34. arXiv:1006.5113  [pdf

    cs.NI

    Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET's

    Authors: Ghassan Samara, Sureswaran Ramadas, Wafaa A. H. Al-Salihy

    Abstract: Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobile Ad Hoc Networks, in this research we propose a flexible, simple, and scalable design for revocation list distribution in VANET, which will reduce channel overhead and eliminate the use of CRL. Also it will increase the security of the network and helps in identifying the adversary vehicles.

    Submitted 26 June, 2010; originally announced June 2010.

    Comments: 5 pages

    Journal ref: (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1, April 2010