首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
MAFSID: Multi-Agent Few-Shot Intrusion Detection for VANETs Through Rapid Collaborative Learning 基于快速协同学习的多智能体少次入侵检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-06 DOI: 10.1002/ett.70285
Sidra Shafiq, Hassan Moatasam Awan, Abdullah Aman Khan, Afzaal Hussain, Iram Javed

The convergence of Internet of Things (IoT) technologies with Vehicular Ad-hoc Networks (VANETs) serves as a critical infrastructure for intelligent transportation systems. It enables vehicle-to-vehicle and vehicle-to-infrastructure communications. However, the dynamic and heterogeneous nature of VANETs creates significant security challenges. Particularly, in detecting novel intrusion patterns when labeled data is limited. Traditional intrusion detection systems struggle with rapid adaptation to emerging attack vectors, often requiring extensive retraining and substantial labeled datasets. We present MAFSID (Multi-Agent Few-Shot Intrusion Detection), a collaborative learning framework utilizing multiple specialized detection agents through few-shot learning paradigms. Our system employs five distinct agents, i.e., Network Traffic Analyzer, Anomaly Detector, Behavior Analyzer, Protocol Analyzer, and Threat Classifier. These agents communicate and share knowledge to collectively identify intrusions with minimal training samples. Comprehensive evaluations on public datasets such as NSL-KDD, CICIDS2017, and In-Vehicle datasets demonstrate MAFSID's superior performance. Furthermore, robustness analysis reveals high resilience against adversarial attacks, especially communication jamming, showing minimal impact on performance. Notably, the collaborative agent framework enables rapid adaptation to new attack patterns while maintaining robust performance across diverse network conditions.

物联网(IoT)技术与车辆自组织网络(VANETs)的融合是智能交通系统的关键基础设施。它可以实现车对车和车对基础设施的通信。然而,VANETs的动态性和异构性带来了重大的安全挑战。特别是在标记数据有限的情况下,检测新的入侵模式。传统的入侵检测系统难以快速适应新出现的攻击向量,通常需要大量的再训练和大量的标记数据集。我们提出了MAFSID (Multi-Agent Few-Shot Intrusion Detection),这是一个利用多个专门的检测代理通过几次学习范式进行协作学习的框架。我们的系统采用五种不同的代理,即网络流量分析器,异常检测器,行为分析器,协议分析器和威胁分类器。这些智能体通过通信和共享知识,以最小的训练样本共同识别入侵。对NSL-KDD、CICIDS2017和In-Vehicle数据集等公共数据集的综合评估表明,MAFSID具有优越的性能。此外,鲁棒性分析揭示了对对抗性攻击的高弹性,特别是通信干扰,对性能的影响最小。值得注意的是,协作代理框架能够快速适应新的攻击模式,同时在不同的网络条件下保持健壮的性能。
{"title":"MAFSID: Multi-Agent Few-Shot Intrusion Detection for VANETs Through Rapid Collaborative Learning","authors":"Sidra Shafiq,&nbsp;Hassan Moatasam Awan,&nbsp;Abdullah Aman Khan,&nbsp;Afzaal Hussain,&nbsp;Iram Javed","doi":"10.1002/ett.70285","DOIUrl":"https://doi.org/10.1002/ett.70285","url":null,"abstract":"<div>\u0000 \u0000 <p>The convergence of Internet of Things (IoT) technologies with Vehicular Ad-hoc Networks (VANETs) serves as a critical infrastructure for intelligent transportation systems. It enables vehicle-to-vehicle and vehicle-to-infrastructure communications. However, the dynamic and heterogeneous nature of VANETs creates significant security challenges. Particularly, in detecting novel intrusion patterns when labeled data is limited. Traditional intrusion detection systems struggle with rapid adaptation to emerging attack vectors, often requiring extensive retraining and substantial labeled datasets. We present MAFSID (Multi-Agent Few-Shot Intrusion Detection), a collaborative learning framework utilizing multiple specialized detection agents through few-shot learning paradigms. Our system employs five distinct agents, i.e., Network Traffic Analyzer, Anomaly Detector, Behavior Analyzer, Protocol Analyzer, and Threat Classifier. These agents communicate and share knowledge to collectively identify intrusions with minimal training samples. Comprehensive evaluations on public datasets such as NSL-KDD, CICIDS2017, and In-Vehicle datasets demonstrate MAFSID's superior performance. Furthermore, robustness analysis reveals high resilience against adversarial attacks, especially communication jamming, showing minimal impact on performance. Notably, the collaborative agent framework enables rapid adaptation to new attack patterns while maintaining robust performance across diverse network conditions.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145469930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedNCV: Optimizing Federated Learning With Networked Control Variates FedNCV:基于网络控制变量的优化联邦学习
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-04 DOI: 10.1002/ett.70287
Yaling Liu, Xu Yang, Xingyan Chen, Huaming Du, Liang Xu

Federated learning (FL), as an advanced distributed learning paradigm, faces significant challenges, particularly in terms of slow convergence and instability, which are exacerbated by heterogeneous data distributions. A critical issue in this context is data heterogeneity, which increases gradient estimation variance and drives the model toward local minima that are distant from the global optimum. Previous studies have primarily focused on using Control Variates (CVs) to reduce gradient estimate variance without introducing bias. In this work, we propose a novel distributed gradient optimization framework, FedNCV, aimed at effectively reducing gradient variance. Central to this approach is the use of the REINFORCE Leave-One-Out (RLOO), a CV-based technology, which serves as the core gradient estimator for FedNCV at both the client and server levels. We have developed an algorithm based on FedNCV and provided three theoretical results. Experimental evaluations demonstrate that the proposed method enhances performance. The dual structure of FedNCV equips it to address the challenges of data heterogeneity and scalability in federated networks, offering a promising solution for applications in heterogeneous FL environments. Additionally, the efficacy of FedNCV was validated across four diverse datasets under a Dirichlet distribution with , setting new performance benchmarks when compared to six leading methods.

联邦学习(FL)作为一种先进的分布式学习范式,面临着巨大的挑战,特别是在缓慢的收敛和不稳定性方面,异构数据分布加剧了这些挑战。在这种情况下,一个关键问题是数据异质性,它增加了梯度估计方差,并推动模型走向远离全局最优的局部最小值。以前的研究主要集中在使用控制变量(cv)来减少梯度估计方差而不引入偏差。在这项工作中,我们提出了一个新的分布式梯度优化框架,FedNCV,旨在有效地减少梯度方差。该方法的核心是使用基于cv的强化留一(RLOO)技术,该技术在客户端和服务器层面都是FedNCV的核心梯度估计器。我们开发了一种基于FedNCV的算法,并给出了三个理论结果。实验结果表明,该方法提高了性能。FedNCV的双重结构使其能够解决联邦网络中数据异构和可扩展性的挑战,为异构FL环境中的应用提供了一个有前途的解决方案。此外,在Dirichlet分布下,在四个不同的数据集上验证了FedNCV的有效性,与六种主要方法相比,设定了新的性能基准。
{"title":"FedNCV: Optimizing Federated Learning With Networked Control Variates","authors":"Yaling Liu,&nbsp;Xu Yang,&nbsp;Xingyan Chen,&nbsp;Huaming Du,&nbsp;Liang Xu","doi":"10.1002/ett.70287","DOIUrl":"https://doi.org/10.1002/ett.70287","url":null,"abstract":"<div>\u0000 \u0000 <p>Federated learning (FL), as an advanced distributed learning paradigm, faces significant challenges, particularly in terms of slow convergence and instability, which are exacerbated by heterogeneous data distributions. A critical issue in this context is data heterogeneity, which increases gradient estimation variance and drives the model toward local minima that are distant from the global optimum. Previous studies have primarily focused on using Control Variates (CVs) to reduce gradient estimate variance without introducing bias. In this work, we propose a novel distributed gradient optimization framework, FedNCV, aimed at effectively reducing gradient variance. Central to this approach is the use of the REINFORCE Leave-One-Out (RLOO), a CV-based technology, which serves as the core gradient estimator for FedNCV at both the client and server levels. We have developed an algorithm based on FedNCV and provided three theoretical results. Experimental evaluations demonstrate that the proposed method enhances performance. The dual structure of FedNCV equips it to address the challenges of data heterogeneity and scalability in federated networks, offering a promising solution for applications in heterogeneous FL environments. Additionally, the efficacy of FedNCV was validated across four diverse datasets under a Dirichlet distribution with <span></span><math></math>, setting new performance benchmarks when compared to six leading methods.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145469404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal Hierarchical Attention Framework for Efficient Weakly Supervised Few-Shot Segmentation Under SAGIN Environment SAGIN环境下有效弱监督少镜头分割的多模态分层注意框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-28 DOI: 10.1002/ett.70286
Wenqiang Yuan, Yin Tang, Xinhao Cai, Tao Chen, Yazhou Yao

In the evolving landscape of the Space Air Ground-Integrated Network (SAGIN), addressing the challenges of limited labeled data and the need for adaptable models is crucial for effective data processing across diverse and heterogeneous sources. Weakly supervised few-shot semantic segmentation (WSFSS), aims to segment the unseen targets by solely relying on support images with class-level annotations, offering a robust solution to the complexities inherent in SAGIN environments. Existing works usually generate pseudo masks for training images, and then convert WSFSS to the plain few-shot semantic segmentation task. However, these rough pseudo masks, almost always, contain background noise due to imprecise object localization during mask generation, which thus leads to undesirable segmentation results. To mitigate the above challenge, we inject implicit text supervision into WSFSS, and propose an efficient text-guided hierarchical attention (ETHA) framework to explicitly alleviate the mask noise issue. Specifically, we first propose a cross-modal interaction attention module to capture comprehensive object guidance from text embeddings and refocus the model's attention toward the area of the focused object. In addition, we propose a lightweight dual visual cross-attention module to efficiently aggregate the contextual information among each branch and common object clues from both branches, which provides enhanced visual features to facilitate the cross-modal information interaction. Based on single-scale features, ETHA has established new state-of-the-art results on the golden WSFSS datasets, that is, PASCAL- and COCO-. These results highlight ETHA's potential for improving accessibility and efficiency for robust applications in SAGIN environment.

在空间-空气-地面综合网络(SAGIN)不断发展的环境中,解决有限标记数据的挑战和对适应性模型的需求对于跨不同和异构来源的有效数据处理至关重要。弱监督少镜头语义分割(WSFSS)旨在通过仅依赖带有类级注释的支持图像来分割未见目标,为SAGIN环境中固有的复杂性提供了一个健壮的解决方案。现有的工作通常是对训练图像生成伪掩码,然后将WSFSS转换为简单的少镜头语义分割任务。然而,这些粗糙的伪掩码在生成掩码时,由于目标定位不精确,几乎总是含有背景噪声,从而导致不理想的分割结果。为了缓解上述挑战,我们将隐式文本监督注入WSFSS,并提出了一个有效的文本引导分层注意(ETHA)框架来显式缓解掩模噪声问题。具体来说,我们首先提出了一个跨模态交互关注模块,以从文本嵌入中获取全面的对象指导,并将模型的注意力重新聚焦到被聚焦对象的区域。此外,我们提出了一个轻量级的双视觉交叉注意模块,以有效地聚合每个分支之间的上下文信息和两个分支的共同对象线索,为跨模态信息交互提供了增强的视觉特征。基于单尺度特征,ETHA在黄金WSFSS数据集PASCAL-和COCO-上建立了新的最先进的结果。这些结果突出了ETHA在提高SAGIN环境中健壮应用程序的可访问性和效率方面的潜力。
{"title":"Multimodal Hierarchical Attention Framework for Efficient Weakly Supervised Few-Shot Segmentation Under SAGIN Environment","authors":"Wenqiang Yuan,&nbsp;Yin Tang,&nbsp;Xinhao Cai,&nbsp;Tao Chen,&nbsp;Yazhou Yao","doi":"10.1002/ett.70286","DOIUrl":"https://doi.org/10.1002/ett.70286","url":null,"abstract":"<div>\u0000 \u0000 <p>In the evolving landscape of the Space Air Ground-Integrated Network (SAGIN), addressing the challenges of limited labeled data and the need for adaptable models is crucial for effective data processing across diverse and heterogeneous sources. Weakly supervised few-shot semantic segmentation (WSFSS), aims to segment the unseen targets by solely relying on support images with class-level annotations, offering a robust solution to the complexities inherent in SAGIN environments. Existing works usually generate pseudo masks for training images, and then convert WSFSS to the plain few-shot semantic segmentation task. However, these rough pseudo masks, almost always, contain background noise due to imprecise object localization during mask generation, which thus leads to undesirable segmentation results. To mitigate the above challenge, we inject implicit text supervision into WSFSS, and propose an efficient text-guided hierarchical attention (ETHA) framework to explicitly alleviate the mask noise issue. Specifically, we first propose a cross-modal interaction attention module to capture comprehensive object guidance from text embeddings and refocus the model's attention toward the area of the focused object. In addition, we propose a lightweight dual visual cross-attention module to efficiently aggregate the contextual information among each branch and common object clues from both branches, which provides enhanced visual features to facilitate the cross-modal information interaction. Based on single-scale features, ETHA has established new state-of-the-art results on the golden WSFSS datasets, that is, PASCAL-<span></span><math></math> and COCO-<span></span><math></math>. These results highlight ETHA's potential for improving accessibility and efficiency for robust applications in SAGIN environment.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145406517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variable Grid-Based Path-Planning Approach for UAVs in Air-Ground Integrated Network 地空一体化网络中无人机基于变网格的路径规划方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-24 DOI: 10.1002/ett.70276
Yilong Ren, Ya Gao, Wenxiang Xu, Chien-Ming Chen, Mohammed Amoon

The operation of Unmanned Aerial Vehicles (UAVs) in low-altitude airspace is a key component in the Space-Air-Ground Integrated Network (SAGIN). Efficient and rational path planning is essential for UAV operations. Existing path-planning algorithms typically rely on uniform-grid models based on Cartesian coordinate systems, which seldom account for the unique characteristics of UAV terminal airspaces. UAV terminal airspaces are often defined as cylindrical volumes where multiple UAVs converge at vertiports, allowing for higher operational densities compared to en-route airspaces. While a fine-grained grid model is essential for UAV terminal airspace, it is inefficient for en-route airspace due to excessive computational costs. This paper presents a path-planning approach based on a variable grid model to find the optimal path while effectively utilizing airspace resources and minimizing computational overhead. Specifically, for the UAV terminal airspace, we propose the Grid-Optimized A* Path-Planning (GO-APP) algorithm, which establishes a sector-grid model based on a cylindrical coordinate system to find the optimal path. Extending to the en-route airspace, the Variable-Grid A* Path-Planning (VG-APP) algorithm integrates the GO-APP and A* algorithms to search the optimal path by stages. Simulations indicate that as the obstacle density in terminal airspace increases from 10% to 40%, GO-APP demonstrates a path length improvement ranging from 0.78% to 24.46% relative to A*. In generating a path from en-route airspace to terminal airspace, VG-APP significantly outperforms A*, reducing path length by up to 15.39% along with improving computational efficiency by 30.54%. Additionally, experiments in the real-world city of Hangzhou validate the effectiveness of the proposed approach.

无人机在低空空域的操作是天空地一体化网络(SAGIN)的关键组成部分。高效、合理的路径规划是无人机作战的关键。现有的路径规划算法通常依赖于基于笛卡尔坐标系的均匀网格模型,很少考虑无人机终端空域的独特性。无人机终端空域通常被定义为圆柱形体,其中多架无人机在垂直端口汇聚,与航线空域相比,允许更高的操作密度。对于无人机终端空域,细粒度网格模型是必不可少的,但对于航路空域,由于计算成本过高,其效率低下。本文提出了一种基于可变网格模型的路径规划方法,在有效利用空域资源和最小化计算开销的前提下找到最优路径。具体而言,针对无人机终端空域,提出了网格优化A*路径规划(GO-APP)算法,该算法基于柱坐标系建立扇形网格模型,寻找最优路径。变网格A*路径规划(VG-APP)算法扩展到航路空域,将GO-APP和A*算法相结合,分阶段搜索最优路径。仿真结果表明,当终端空域障碍物密度从10%增加到40%时,GO-APP相对于a *的路径长度改善幅度为0.78% ~ 24.46%。在生成从航路空域到终端空域的路径时,vag - app显著优于a *,路径长度最多减少15.39%,计算效率提高30.54%。此外,在现实城市杭州的实验验证了该方法的有效性。
{"title":"Variable Grid-Based Path-Planning Approach for UAVs in Air-Ground Integrated Network","authors":"Yilong Ren,&nbsp;Ya Gao,&nbsp;Wenxiang Xu,&nbsp;Chien-Ming Chen,&nbsp;Mohammed Amoon","doi":"10.1002/ett.70276","DOIUrl":"https://doi.org/10.1002/ett.70276","url":null,"abstract":"<div>\u0000 \u0000 <p>The operation of Unmanned Aerial Vehicles (UAVs) in low-altitude airspace is a key component in the Space-Air-Ground Integrated Network (SAGIN). Efficient and rational path planning is essential for UAV operations. Existing path-planning algorithms typically rely on uniform-grid models based on Cartesian coordinate systems, which seldom account for the unique characteristics of UAV terminal airspaces. UAV terminal airspaces are often defined as cylindrical volumes where multiple UAVs converge at vertiports, allowing for higher operational densities compared to en-route airspaces. While a fine-grained grid model is essential for UAV terminal airspace, it is inefficient for en-route airspace due to excessive computational costs. This paper presents a path-planning approach based on a variable grid model to find the optimal path while effectively utilizing airspace resources and minimizing computational overhead. Specifically, for the UAV terminal airspace, we propose the Grid-Optimized A* Path-Planning (GO-APP) algorithm, which establishes a sector-grid model based on a cylindrical coordinate system to find the optimal path. Extending to the en-route airspace, the Variable-Grid A* Path-Planning (VG-APP) algorithm integrates the GO-APP and A* algorithms to search the optimal path by stages. Simulations indicate that as the obstacle density in terminal airspace increases from 10% to 40%, GO-APP demonstrates a path length improvement ranging from 0.78% to 24.46% relative to A*. In generating a path from en-route airspace to terminal airspace, VG-APP significantly outperforms A*, reducing path length by up to 15.39% along with improving computational efficiency by 30.54%. Additionally, experiments in the real-world city of Hangzhou validate the effectiveness of the proposed approach.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145341516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing 5G-Enabled CPS and IoT With VANET: Key Agreement Methods for Enhanced Identification 使用VANET保护支持5g的CPS和IoT:增强识别的密钥协议方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-17 DOI: 10.1002/ett.70259
P. B. Smitha, P. Kavipriya

Despite presenting significant safety concerns, the proliferation of Cyber-Physical Systems (CPS) in industries such as electricity distribution and medicine has spurred innovative applications. The integration of 5G technology, Software-Defined Networking (SDN), and Vehicular Ad Hoc Networks (VANET) within Industrial CPS (ICPS) enables dynamic, real-time interactions but also exposes these systems to vulnerabilities and potential malicious activities. Addressing these risks requires robust security strategies that safeguard both the physical and digital components of CPS. In this context, the Strengthening the Safety of 5G-Enabled CPS using Key Agreement Method (SSKAM) framework is proposed. It incorporates a triple-element user identification technique leveraging user passwords, mobile devices, and unique biometrics. This approach ensures two-way authentication and facilitates the establishment of secure session keys for encrypted communication between registered users, CPS smart devices, and VANETs. The study also explores advanced key agreement methods tailored for 5G-enabled CPS, focusing on enhancing identification protocols while maintaining a balance between computational efficiency, communication overhead, and resilience to emerging threats. By integrating SDN, the framework enforces dynamic security measures at the network level, ensuring real-time adaptability to potential threats. Comprehensive evaluations demonstrate the efficacy of the proposed SSKAM framework in mitigating risks such as replay attacks, impersonation, and man-in-the-middle assaults. The results highlight its viability in safeguarding the integrity and confidentiality of CPS, offering a scalable, efficient, and practical solution to address the evolving security challenges in 5G-enabled CPS integrated with IoT ecosystems and VANETs.

尽管存在严重的安全问题,但网络物理系统(CPS)在电力分配和医疗等行业的激增刺激了创新应用。5G技术、软件定义网络(SDN)和车载自组织网络(VANET)在工业CPS (ICPS)中的集成实现了动态、实时的交互,但也使这些系统暴露于漏洞和潜在的恶意活动中。解决这些风险需要强大的安全策略来保护CPS的物理和数字组件。在此背景下,提出了使用密钥协议方法(SSKAM)框架加强5g支持的CPS的安全性。它结合了一种利用用户密码、移动设备和独特生物识别技术的三元素用户识别技术。这种方式既保证了认证的双向性,又便于建立安全会话密钥,用于注册用户、CPS智能设备和vanet之间的加密通信。该研究还探讨了为支持5g的CPS量身定制的高级关键协议方法,重点是增强识别协议,同时保持计算效率、通信开销和应对新威胁的弹性之间的平衡。该框架通过集成SDN,在网络层面实施动态安全措施,确保对潜在威胁的实时适应能力。综合评估证明了所提出的SSKAM框架在减轻诸如重放攻击、冒充和中间人攻击等风险方面的有效性。结果突出了其在保护CPS完整性和保密性方面的可行性,提供了可扩展、高效和实用的解决方案,以应对与物联网生态系统和vanet集成的5g CPS中不断变化的安全挑战。
{"title":"Securing 5G-Enabled CPS and IoT With VANET: Key Agreement Methods for Enhanced Identification","authors":"P. B. Smitha,&nbsp;P. Kavipriya","doi":"10.1002/ett.70259","DOIUrl":"https://doi.org/10.1002/ett.70259","url":null,"abstract":"<div>\u0000 \u0000 <p>Despite presenting significant safety concerns, the proliferation of Cyber-Physical Systems (CPS) in industries such as electricity distribution and medicine has spurred innovative applications. The integration of 5G technology, Software-Defined Networking (SDN), and Vehicular Ad Hoc Networks (VANET) within Industrial CPS (ICPS) enables dynamic, real-time interactions but also exposes these systems to vulnerabilities and potential malicious activities. Addressing these risks requires robust security strategies that safeguard both the physical and digital components of CPS. In this context, the Strengthening the Safety of 5G-Enabled CPS using Key Agreement Method (SSKAM) framework is proposed. It incorporates a triple-element user identification technique leveraging user passwords, mobile devices, and unique biometrics. This approach ensures two-way authentication and facilitates the establishment of secure session keys for encrypted communication between registered users, CPS smart devices, and VANETs. The study also explores advanced key agreement methods tailored for 5G-enabled CPS, focusing on enhancing identification protocols while maintaining a balance between computational efficiency, communication overhead, and resilience to emerging threats. By integrating SDN, the framework enforces dynamic security measures at the network level, ensuring real-time adaptability to potential threats. Comprehensive evaluations demonstrate the efficacy of the proposed SSKAM framework in mitigating risks such as replay attacks, impersonation, and man-in-the-middle assaults. The results highlight its viability in safeguarding the integrity and confidentiality of CPS, offering a scalable, efficient, and practical solution to address the evolving security challenges in 5G-enabled CPS integrated with IoT ecosystems and VANETs.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Dynamic Window Approach for UAV Local Path Planning in Multi-Dynamic Obstacles Environments Using Sparrow Search Algorithm 基于麻雀搜索算法的多动态障碍物环境下无人机局部路径规划改进动态窗口法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-17 DOI: 10.1002/ett.70284
Lin Zhang, Yan Li, Yang Yu, Yao Zhao, Wei Song, Gunther Retscher

The traditional Dynamic Window Approach (DWA) for local path planning of unmanned aerial vehicles (UAVs) exhibits limitations in flexibility and robustness. Specifically, its fixed evaluation function weights, velocity sampling resolution, and dynamic window ranges fail to adapt to changing environmental conditions, resulting in reduced adaptability of the velocity search space. To address this issue, this study proposes an improved DWA based on the Sparrow Search Algorithm (SSA). First, the proposed algorithm adaptively adjusts dynamic window parameters according to the complexity of the obstacle environment, thereby optimizing the UAV's velocity search space. Second, a velocity sampling resolution strategy is introduced to achieve an effective trade-off between the quality and quantity of predicted trajectories based on the density of dynamic obstacles. Third, by leveraging the strong global search capability and rapid convergence properties of the SSA, the weights of the evaluation function are adaptively optimized to enhance global optimality. Experimental results show that, compared with DWA in a dense multiple dynamic-static obstacles scenario, the proposed algorithm achieves improvements of 8.8%, 66.7%, and 18% in path length, safety distance, and number of iterations, respectively. These enhancements contribute to improved planning efficiency, safety, and overall optimality in UAV operations.

传统的动态窗口法(DWA)用于无人机局部路径规划,在灵活性和鲁棒性方面存在局限性。具体而言,其固定的评价函数权值、速度采样分辨率和动态窗口范围不能适应不断变化的环境条件,导致速度搜索空间的适应性降低。针对这一问题,本文提出了一种基于麻雀搜索算法(SSA)的改进DWA算法。首先,该算法根据障碍物环境的复杂性自适应调整动态窗口参数,从而优化无人机的速度搜索空间;其次,引入了速度采样分辨率策略,实现了基于动态障碍物密度的预测轨迹质量和数量之间的有效权衡。第三,利用SSA强大的全局搜索能力和快速收敛的特性,自适应优化评价函数的权重,增强全局最优性。实验结果表明,与密集多动-静态障碍物场景下的DWA相比,本文算法在路径长度、安全距离和迭代次数方面分别提高了8.8%、66.7%和18%。这些增强有助于改进无人机操作的规划效率、安全性和整体最优性。
{"title":"Improved Dynamic Window Approach for UAV Local Path Planning in Multi-Dynamic Obstacles Environments Using Sparrow Search Algorithm","authors":"Lin Zhang,&nbsp;Yan Li,&nbsp;Yang Yu,&nbsp;Yao Zhao,&nbsp;Wei Song,&nbsp;Gunther Retscher","doi":"10.1002/ett.70284","DOIUrl":"https://doi.org/10.1002/ett.70284","url":null,"abstract":"<div>\u0000 <p>The traditional Dynamic Window Approach (DWA) for local path planning of unmanned aerial vehicles (UAVs) exhibits limitations in flexibility and robustness. Specifically, its fixed evaluation function weights, velocity sampling resolution, and dynamic window ranges fail to adapt to changing environmental conditions, resulting in reduced adaptability of the velocity search space. To address this issue, this study proposes an improved DWA based on the Sparrow Search Algorithm (SSA). First, the proposed algorithm adaptively adjusts dynamic window parameters according to the complexity of the obstacle environment, thereby optimizing the UAV's velocity search space. Second, a velocity sampling resolution strategy is introduced to achieve an effective trade-off between the quality and quantity of predicted trajectories based on the density of dynamic obstacles. Third, by leveraging the strong global search capability and rapid convergence properties of the SSA, the weights of the evaluation function are adaptively optimized to enhance global optimality. Experimental results show that, compared with DWA in a dense multiple dynamic-static obstacles scenario, the proposed algorithm achieves improvements of 8.8%, 66.7%, and 18% in path length, safety distance, and number of iterations, respectively. These enhancements contribute to improved planning efficiency, safety, and overall optimality in UAV operations.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain Framework for Ensuring Medical Data Security in Internet of Medical Things 医疗物联网下医疗数据安全保障区块链框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-16 DOI: 10.1002/ett.70271
Siddharth Chhinal, Bipal Khanal, Manvendra Singh, Md. Sarfaraj Alam Ansari

The rapid evolution of the Internet of Things (IoT) has led to the growth of the Internet of Medical Things (IoMT), encompassing interconnected medical devices, wearable sensors, and healthcare systems. IoMT extends the capabilities of IoT into the healthcare sector, representing a promising technology for the future of healthcare. The underlying technology has transformed the healthcare landscape by continuously collecting patient data in real time and providing a remote monitoring and diagnostic system. However, IoMT introduces significant challenges in data security, privacy, and system reliability due to centralized data storage models, which can create a single point of failure and raise concerns about privacy and security. To address these challenges, this research proposes a blockchain-based framework to enhance data security and privacy by decentralizing data storage and managing device authentication using smart contracts. Given the sensitive nature of medical data and the potential repercussions of security breaches, each medical device has a unique digital identity represented by a blockchain-based smart contract, supporting the multi-device mapping required for managing multiple diseases in healthcare diagnosis and treatment. This approach enhances healthcare security and efficiency. A proof-of-work mechanism ensures secure transaction validation and experimental results demonstrate that the proposed framework significantly improves data integrity and security while optimizing system performance, as measured by gas consumption and latency. The assessment demonstrates the feasibility of employing blockchain technology to enhance the security and privacy of the IoMT healthcare system, providing a robust solution to existing security challenges and protecting patient data.

物联网(IoT)的快速发展带动了医疗物联网(IoMT)的发展,包括互联医疗设备、可穿戴传感器和医疗保健系统。IoMT将物联网的功能扩展到医疗保健领域,代表了医疗保健未来的一项有前途的技术。底层技术通过持续实时收集患者数据并提供远程监控和诊断系统,改变了医疗保健领域。然而,由于集中的数据存储模型,IoMT在数据安全性、隐私性和系统可靠性方面带来了重大挑战,这可能会造成单点故障,并引起对隐私和安全性的担忧。为了应对这些挑战,本研究提出了一个基于区块链的框架,通过分散数据存储和使用智能合约管理设备身份验证来增强数据安全和隐私。鉴于医疗数据的敏感性和安全漏洞的潜在影响,每个医疗设备都有一个独特的数字身份,由基于区块链的智能合约代表,支持在医疗诊断和治疗中管理多种疾病所需的多设备映射。这种方法提高了医疗保健安全性和效率。工作证明机制确保了安全的交易验证,实验结果表明,所提出的框架显着提高了数据完整性和安全性,同时优化了系统性能(通过气体消耗和延迟来衡量)。该评估证明了采用区块链技术增强IoMT医疗保健系统的安全性和隐私性的可行性,为现有的安全挑战提供了一个强大的解决方案,并保护了患者数据。
{"title":"A Blockchain Framework for Ensuring Medical Data Security in Internet of Medical Things","authors":"Siddharth Chhinal,&nbsp;Bipal Khanal,&nbsp;Manvendra Singh,&nbsp;Md. Sarfaraj Alam Ansari","doi":"10.1002/ett.70271","DOIUrl":"https://doi.org/10.1002/ett.70271","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid evolution of the Internet of Things (IoT) has led to the growth of the Internet of Medical Things (IoMT), encompassing interconnected medical devices, wearable sensors, and healthcare systems. IoMT extends the capabilities of IoT into the healthcare sector, representing a promising technology for the future of healthcare. The underlying technology has transformed the healthcare landscape by continuously collecting patient data in real time and providing a remote monitoring and diagnostic system. However, IoMT introduces significant challenges in data security, privacy, and system reliability due to centralized data storage models, which can create a single point of failure and raise concerns about privacy and security. To address these challenges, this research proposes a blockchain-based framework to enhance data security and privacy by decentralizing data storage and managing device authentication using smart contracts. Given the sensitive nature of medical data and the potential repercussions of security breaches, each medical device has a unique digital identity represented by a blockchain-based smart contract, supporting the multi-device mapping required for managing multiple diseases in healthcare diagnosis and treatment. This approach enhances healthcare security and efficiency. A proof-of-work mechanism ensures secure transaction validation and experimental results demonstrate that the proposed framework significantly improves data integrity and security while optimizing system performance, as measured by gas consumption and latency. The assessment demonstrates the feasibility of employing blockchain technology to enhance the security and privacy of the IoMT healthcare system, providing a robust solution to existing security challenges and protecting patient data.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Anomaly Detection in Vehicular Ad-Hoc Networks Using Deep Reinforcement Learning 基于区块链的基于深度强化学习的车载Ad-Hoc网络异常检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-15 DOI: 10.1002/ett.70282
A. Phani Sheetal, Mohammed I. Khalaf, Abdelhamid Zaidi, Ashit Kumar Dutta, Mohammad Shabbir Alam, Kottala Sri Yogi, Nirupma Pathak, Abror Abdullayev, V. B. Murali Krishna

Utilizing blockchain in vehicular ad-hoc networks (VANETs) can proficiently resolve concerns pertaining to data security and privacy. The limited throughput of blockchain obstructs its extensive implementation in VANETs. Current studies on enhancing blockchain throughput frequently encounter the issue of action space proliferation, leading to inadequate scalability. This research presents a strategy for optimizing blockchain performance on VANETs using deep reinforcement learning (DRL). The suggested method enhances blockchain throughput by selecting block producers and consensus methods, and by modifying block size and intervals, while maintaining decentralization, low latency, and security in VANET-based blockchain systems. Furthermore, to augment network security, an anomaly detection mechanism is incorporated, utilizing machine learning techniques to identify and mitigate potential attacks aimed at VANETs. The proposed system enhances throughput and fortifies resilience against malicious operations by identifying anomalous patterns in network behavior. The method uses the BDQ framework to meticulously partition the action space, tackling the action space explosion issue that occurs with conventional DRL techniques in blockchain throughput optimization. Simulation results indicate that the suggested solution significantly improves the throughput and security of the VANET-based blockchain system.

在车载自组织网络(vanet)中使用区块链可以有效地解决与数据安全和隐私相关的问题。b区块链的有限吞吐量阻碍了其在vanet中的广泛实施。目前关于提高区块链吞吐量的研究经常遇到动作空间扩散的问题,导致可扩展性不足。本研究提出了一种利用深度强化学习(DRL)优化vanet上区块链性能的策略。建议的方法通过选择区块生产者和共识方法,以及修改区块大小和间隔来提高区块链吞吐量,同时在基于vanet的区块链系统中保持去中心化、低延迟和安全性。此外,为了增强网络安全性,采用了异常检测机制,利用机器学习技术识别和减轻针对VANETs的潜在攻击。该系统通过识别网络行为中的异常模式,提高了吞吐量并增强了抵御恶意操作的弹性。该方法使用BDQ框架对动作空间进行精细划分,解决了传统DRL技术在区块链吞吐量优化中出现的动作空间爆炸问题。仿真结果表明,该方案显著提高了基于vanet的区块链系统的吞吐量和安全性。
{"title":"Blockchain-Based Anomaly Detection in Vehicular Ad-Hoc Networks Using Deep Reinforcement Learning","authors":"A. Phani Sheetal,&nbsp;Mohammed I. Khalaf,&nbsp;Abdelhamid Zaidi,&nbsp;Ashit Kumar Dutta,&nbsp;Mohammad Shabbir Alam,&nbsp;Kottala Sri Yogi,&nbsp;Nirupma Pathak,&nbsp;Abror Abdullayev,&nbsp;V. B. Murali Krishna","doi":"10.1002/ett.70282","DOIUrl":"https://doi.org/10.1002/ett.70282","url":null,"abstract":"<div>\u0000 \u0000 <p>Utilizing blockchain in vehicular ad-hoc networks (VANETs) can proficiently resolve concerns pertaining to data security and privacy. The limited throughput of blockchain obstructs its extensive implementation in VANETs. Current studies on enhancing blockchain throughput frequently encounter the issue of action space proliferation, leading to inadequate scalability. This research presents a strategy for optimizing blockchain performance on VANETs using deep reinforcement learning (DRL). The suggested method enhances blockchain throughput by selecting block producers and consensus methods, and by modifying block size and intervals, while maintaining decentralization, low latency, and security in VANET-based blockchain systems. Furthermore, to augment network security, an anomaly detection mechanism is incorporated, utilizing machine learning techniques to identify and mitigate potential attacks aimed at VANETs. The proposed system enhances throughput and fortifies resilience against malicious operations by identifying anomalous patterns in network behavior. The method uses the BDQ framework to meticulously partition the action space, tackling the action space explosion issue that occurs with conventional DRL techniques in blockchain throughput optimization. Simulation results indicate that the suggested solution significantly improves the throughput and security of the VANET-based blockchain system.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beetle-Optimized Hybrid Ensemble for Multi-Attack Classification in VANETs 基于甲虫优化的VANETs多攻击分类混合集成
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-15 DOI: 10.1002/ett.70281
G. SaravanaKumar, Ponugoti Kalpana, G. Vishnu Murthy, Thippa Reddy Gadekallu, Amina Salhi, Mohammad Tabrez Quasim

Smart connected, and autonomous vehicles represent a revolutionary advancement in transportation by incorporating cutting-edge technologies like Internet of Things (IoT), Artificial Intelligence (AI), and 5G/6G wireless communication. These technologies enhance efficiency, reliability, and sustainability in modern vehicular networks. However, the rapid expansion of intelligent vehicles has also led to rising cyber risks, introducing new forms of attacks that threaten security, privacy, and safety. Even minor anomalies in vehicular units may cause severe consequences, including fatalities. To resolve these issues, this study proposes an effective Intrusion Detection System (IDS) using Siamese Gated Memory Networks. The model learns traffic behaviors and generates proximity scores, which are processed through dense feedforward layers for classifying multiple vehicular threats. To further optimize detection, a Modified Beetle Optimization (MBO) technique is integrated into the feedforward layers. The approach is trained and examined on benchmark datasets, comprising NSL-KDD 2019, UNSW-NB-15, and VeReMi, using key metrics like precision, specificity, accuracy, F1 score, and recall. Recommended experimental analysis demonstrates superior performance examined with conventional techniques, achieving 0.993 accuracy, 0.991 precision, 0.99 recall, and 0.992 F1 score. The findings validate the robustness of hybrid Siamese networks with ensemble meta-heuristic optimization in securing Intelligent Transportation Systems.

智能互联和自动驾驶汽车结合了物联网(IoT)、人工智能(AI)、5G/6G无线通信等尖端技术,代表了交通领域的革命性进步。这些技术提高了现代车辆网络的效率、可靠性和可持续性。然而,智能汽车的快速扩张也导致了网络风险的上升,引入了威胁安全、隐私和安全的新形式的攻击。即使是车辆单元的轻微异常也可能造成严重后果,包括死亡。为了解决这些问题,本研究提出了一种使用连体门控记忆网路的入侵侦测系统(IDS)。该模型学习交通行为并生成接近度评分,通过密集前馈层对接近度评分进行处理,对多个车辆威胁进行分类。为了进一步优化检测,将改进的甲虫优化(MBO)技术集成到前馈层中。该方法在包括NSL-KDD 2019、UNSW-NB-15和VeReMi在内的基准数据集上进行了训练和测试,使用了精度、特异性、准确性、F1分数和召回率等关键指标。推荐的实验分析结果表明,采用常规方法检验,准确率为0.993,精密度为0.991,召回率为0.99,F1得分为0.992。研究结果验证了集成元启发式优化的混合Siamese网络在保护智能交通系统中的鲁棒性。
{"title":"Beetle-Optimized Hybrid Ensemble for Multi-Attack Classification in VANETs","authors":"G. SaravanaKumar,&nbsp;Ponugoti Kalpana,&nbsp;G. Vishnu Murthy,&nbsp;Thippa Reddy Gadekallu,&nbsp;Amina Salhi,&nbsp;Mohammad Tabrez Quasim","doi":"10.1002/ett.70281","DOIUrl":"https://doi.org/10.1002/ett.70281","url":null,"abstract":"<div>\u0000 \u0000 <p>Smart connected, and autonomous vehicles represent a revolutionary advancement in transportation by incorporating cutting-edge technologies like Internet of Things (IoT), Artificial Intelligence (AI), and 5G/6G wireless communication. These technologies enhance efficiency, reliability, and sustainability in modern vehicular networks. However, the rapid expansion of intelligent vehicles has also led to rising cyber risks, introducing new forms of attacks that threaten security, privacy, and safety. Even minor anomalies in vehicular units may cause severe consequences, including fatalities. To resolve these issues, this study proposes an effective Intrusion Detection System (IDS) using Siamese Gated Memory Networks. The model learns traffic behaviors and generates proximity scores, which are processed through dense feedforward layers for classifying multiple vehicular threats. To further optimize detection, a Modified Beetle Optimization (MBO) technique is integrated into the feedforward layers. The approach is trained and examined on benchmark datasets, comprising NSL-KDD 2019, UNSW-NB-15, and VeReMi, using key metrics like precision, specificity, accuracy, F1 score, and recall. Recommended experimental analysis demonstrates superior performance examined with conventional techniques, achieving 0.993 accuracy, 0.991 precision, 0.99 recall, and 0.992 F1 score. The findings validate the robustness of hybrid Siamese networks with ensemble meta-heuristic optimization in securing Intelligent Transportation Systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable Machine Learning Framework for Real-Time Multi-Attack Threat Detection in Edge-Enabled VANET Environments 边缘VANET环境中实时多攻击威胁检测的可解释机器学习框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-15 DOI: 10.1002/ett.70283
Randa Allafi, Amnah Alshahrani, Munya A. Arasi, Hussain Alshahrani, Mohammed A. AlAqil, Rana Alabdan, Ibrahim Zalah, Rowida Mohammed Alharbi

Due to the shortage of explainable, resource-efficient solutions and the lack of unified multi-attack detection abilities, existing vehicular ad hoc networks (VANET) security frameworks fail to meet the critical requirements of real-time vehicular environments. Most traditional models rely heavily on centralized processing, making them unsuitable for dynamic, latency-sensitive distributed VANET architectures. These limitations create a serious threat to the safety and reliability of vehicular communication systems. To address these challenges, this study proposes an explainable machine learning framework for real-time multi-attack threat detection (EXMAT) in edge-enabled VANET environments. The framework is designed specifically for edge-enabled VANET platforms. EXMAT combines the novel XGBoost classifier with custom-engineered behavioral features and post hoc explainability to provide accurate decisions directly at the vehicular edge. The novelty of the model lies in its combined feature space, which fuses behavioral dynamics, communication patterns, and lightweight Boolean anomaly flags. The simulation of the model is performed under the VeReMi dataset. To strengthen the dataset for precise analysis of the threat, we synthetically extended it with complex attack patterns. Experimental results show that the proposed model achieves an overall classification accuracy of 95.78% with an almost perfect F1-score for standard behavior samples of 99.98% and 94.36% for replay attacks. These results highlight EXMAT's ability to be applied in real-time vehicular networks, enhancing traffic safety and security against unknown cyberattacks.

由于缺乏可解释的、资源高效的解决方案以及缺乏统一的多攻击检测能力,现有的车载自组网(VANET)安全框架无法满足实时车载环境的关键要求。大多数传统模型严重依赖于集中式处理,这使得它们不适合动态的、对延迟敏感的分布式VANET体系结构。这些限制对车载通信系统的安全性和可靠性造成了严重威胁。为了应对这些挑战,本研究提出了一个可解释的机器学习框架,用于边缘VANET环境中的实时多攻击威胁检测(EXMAT)。该框架是专门为启用边缘的VANET平台设计的。EXMAT将新颖的XGBoost分类器与定制设计的行为特征和事后解释性相结合,直接在车辆边缘提供准确的决策。该模型的新颖之处在于它的组合特征空间,它融合了行为动态、通信模式和轻量级布尔异常标志。在VeReMi数据集下对模型进行了仿真。为了加强数据集的准确性,我们对其进行了复杂攻击模式的综合扩展。实验结果表明,该模型的总体分类准确率为95.78%,对标准行为样本的分类准确率为99.98%,对重放攻击的分类准确率为94.36%。这些结果突出了EXMAT在实时车辆网络中的应用能力,增强了交通安全和抵御未知网络攻击的能力。
{"title":"Explainable Machine Learning Framework for Real-Time Multi-Attack Threat Detection in Edge-Enabled VANET Environments","authors":"Randa Allafi,&nbsp;Amnah Alshahrani,&nbsp;Munya A. Arasi,&nbsp;Hussain Alshahrani,&nbsp;Mohammed A. AlAqil,&nbsp;Rana Alabdan,&nbsp;Ibrahim Zalah,&nbsp;Rowida Mohammed Alharbi","doi":"10.1002/ett.70283","DOIUrl":"https://doi.org/10.1002/ett.70283","url":null,"abstract":"<div>\u0000 \u0000 <p>Due to the shortage of explainable, resource-efficient solutions and the lack of unified multi-attack detection abilities, existing vehicular ad hoc networks (VANET) security frameworks fail to meet the critical requirements of real-time vehicular environments. Most traditional models rely heavily on centralized processing, making them unsuitable for dynamic, latency-sensitive distributed VANET architectures. These limitations create a serious threat to the safety and reliability of vehicular communication systems. To address these challenges, this study proposes an explainable machine learning framework for real-time multi-attack threat detection (EXMAT) in edge-enabled VANET environments. The framework is designed specifically for edge-enabled VANET platforms. EXMAT combines the novel XGBoost classifier with custom-engineered behavioral features and post hoc explainability to provide accurate decisions directly at the vehicular edge. The novelty of the model lies in its combined feature space, which fuses behavioral dynamics, communication patterns, and lightweight Boolean anomaly flags. The simulation of the model is performed under the VeReMi dataset. To strengthen the dataset for precise analysis of the threat, we synthetically extended it with complex attack patterns. Experimental results show that the proposed model achieves an overall classification accuracy of 95.78% with an almost perfect F1-score for standard behavior samples of 99.98% and 94.36% for replay attacks. These results highlight EXMAT's ability to be applied in real-time vehicular networks, enhancing traffic safety and security against unknown cyberattacks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1