首页 > 最新文献

Vehicular Communications最新文献

英文 中文
Decentralized multi-hop data processing in UAV networks using MARL 利用 MARL 在无人机网络中进行分散式多跳数据处理
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-11-15 DOI: 10.1016/j.vehcom.2024.100858
Indu Chandran, Kizheppatt Vipin
Unmanned Aerial Vehicles (UAVs) have become integral to numerous applications, prompting research towards enhancing their capabilities. For time-critical missions, minimizing latency is crucial; however, current studies often rely on sending data to ground station or cloud for processing due to their limited onboard capacities. To leverage the networking capabilities of UAVs, recent research focuses on enabling data processing and offloading within the UAV network for coordinated decision-making. This paper explores a multi-hop data offloading scheme designed to optimize the task processing and resource management of UAVs. The proposed distributed strategy uses multi-agent reinforcement learning, where UAVs, each with varying computational capacities and energy levels, process and offload tasks while managing energy consumption and latency. The agents, represented as actor-critic models, learn and adapt their actions based on current state and environment feedback. The study considers a consensus-based method to update learning weights, promoting cooperative behavior among the agents with minimum interaction. Through multiple training episodes, the agents improve their performance, with the overall system achieving faster convergence with high rewards, demonstrating the viability of decentralized data processing and offloading in UAV networks.
无人驾驶飞行器(UAV)已成为众多应用中不可或缺的一部分,促使人们研究如何增强其能力。对于时间紧迫的任务来说,最大限度地减少延迟至关重要;然而,由于无人机的机载能力有限,目前的研究通常依赖于将数据发送到地面站或云端进行处理。为了充分利用无人机的网络能力,最近的研究重点是在无人机网络内实现数据处理和卸载,以便协调决策。本文探讨了一种多跳数据卸载方案,旨在优化无人机的任务处理和资源管理。所提出的分布式策略采用多代理强化学习,每个无人机都具有不同的计算能力和能量水平,在处理和卸载任务的同时管理能量消耗和延迟。代理以行为批判模型为代表,根据当前状态和环境反馈来学习和调整自己的行动。研究考虑了一种基于共识的方法来更新学习权重,以最小的互动促进代理之间的合作行为。通过多次训练,代理提高了性能,整个系统实现了快速收敛和高回报,证明了无人机网络中分散式数据处理和卸载的可行性。
{"title":"Decentralized multi-hop data processing in UAV networks using MARL","authors":"Indu Chandran,&nbsp;Kizheppatt Vipin","doi":"10.1016/j.vehcom.2024.100858","DOIUrl":"10.1016/j.vehcom.2024.100858","url":null,"abstract":"<div><div>Unmanned Aerial Vehicles (UAVs) have become integral to numerous applications, prompting research towards enhancing their capabilities. For time-critical missions, minimizing latency is crucial; however, current studies often rely on sending data to ground station or cloud for processing due to their limited onboard capacities. To leverage the networking capabilities of UAVs, recent research focuses on enabling data processing and offloading within the UAV network for coordinated decision-making. This paper explores a multi-hop data offloading scheme designed to optimize the task processing and resource management of UAVs. The proposed distributed strategy uses multi-agent reinforcement learning, where UAVs, each with varying computational capacities and energy levels, process and offload tasks while managing energy consumption and latency. The agents, represented as actor-critic models, learn and adapt their actions based on current state and environment feedback. The study considers a consensus-based method to update learning weights, promoting cooperative behavior among the agents with minimum interaction. Through multiple training episodes, the agents improve their performance, with the overall system achieving faster convergence with high rewards, demonstrating the viability of decentralized data processing and offloading in UAV networks.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100858"},"PeriodicalIF":5.8,"publicationDate":"2024-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction-based data collection of UAV-assisted Maritime Internet of Things 基于预测的无人机辅助海上物联网数据收集
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-11-08 DOI: 10.1016/j.vehcom.2024.100854
Xiaoluoteng Song , Xiuwen Fu , Mingyuan Ren , Pasquale Pace , Gianluca Aloi , Giancarlo Fortino
In maritime data collection scenarios, due to the constraints of wireless communication and environmental factors such as wave motion, sea surface ducting effects, and sea surface curvature, floating sensor nodes are unable to establish direct data transmission links with the base station. The advent of unmanned aerial vehicle (UAV)-assisted Maritime Internet of Things (MIoT) provides a feasible solution to this challenge. However, in existing maritime environments, floating sensor nodes drift due to ocean currents, posing significant challenges for long-distance data transmission while maintaining a low age of information (AoI). Consequently, we introduce a prediction-based UAV-assisted data collection mechanism for MIoT. In this scheme, we first select convergence nodes responsible for gathering data from floating sensor nodes and forwarding it to passing UAVs. We then propose a dynamic clustering algorithm to allocate task areas to UAVs, with each area assigned to a single UAV for data collection from floating sensor nodes. To ensure stable data offloading by UAVs, we develop a UAV relay pairing algorithm to establish reliable air-to-air relay paths and provide two data offloading modes: distal UAV and proximate UAV. Owing to the drift of floating sensor nodes influenced by ocean currents, we employ a deep echo state network to predict the positions of floating sensor nodes and utilize a multi-agent deep deterministic policy gradient to solve the UAVs trajectory planning problem. Under this mechanism, the UAVs can adaptively adjust its flight path while exploring floating sensor nodes in dynamically changing ocean sensor node scenarios. Extensive experiments demonstrate that the proposed scheme can adapt to dynamic ocean environments, achieving low-AoI data collection from floating sensor nodes.
在海上数据采集场景中,由于无线通信和环境因素(如波浪运动、海面管道效应和海面曲率)的限制,浮动传感器节点无法与基站建立直接的数据传输链接。无人飞行器(UAV)辅助的海上物联网(MIoT)的出现为这一挑战提供了可行的解决方案。然而,在现有的海洋环境中,浮动传感器节点会因洋流而漂移,这给长距离数据传输同时保持低信息年龄(AoI)带来了巨大挑战。因此,我们为 MIoT 引入了一种基于预测的无人机辅助数据收集机制。在该方案中,我们首先选择汇聚节点,负责从浮动传感器节点收集数据,并将其转发给路过的无人机。然后,我们提出一种动态聚类算法,为无人机分配任务区域,每个区域分配给一架无人机,负责从浮动传感器节点收集数据。为确保无人机稳定地卸载数据,我们开发了一种无人机中继配对算法,以建立可靠的空对空中继路径,并提供两种数据卸载模式:远距离无人机和近距离无人机。由于浮动传感器节点受洋流影响而漂移,我们采用深度回波状态网络来预测浮动传感器节点的位置,并利用多代理深度确定性策略梯度来解决无人机轨迹规划问题。在这种机制下,无人机可以在动态变化的海洋传感器节点场景中,在探索浮动传感器节点的同时自适应地调整飞行路径。大量实验证明,所提出的方案能够适应动态海洋环境,实现从浮动传感器节点采集低影响范围数据。
{"title":"Prediction-based data collection of UAV-assisted Maritime Internet of Things","authors":"Xiaoluoteng Song ,&nbsp;Xiuwen Fu ,&nbsp;Mingyuan Ren ,&nbsp;Pasquale Pace ,&nbsp;Gianluca Aloi ,&nbsp;Giancarlo Fortino","doi":"10.1016/j.vehcom.2024.100854","DOIUrl":"10.1016/j.vehcom.2024.100854","url":null,"abstract":"<div><div>In maritime data collection scenarios, due to the constraints of wireless communication and environmental factors such as wave motion, sea surface ducting effects, and sea surface curvature, floating sensor nodes are unable to establish direct data transmission links with the base station. The advent of unmanned aerial vehicle (UAV)-assisted Maritime Internet of Things (MIoT) provides a feasible solution to this challenge. However, in existing maritime environments, floating sensor nodes drift due to ocean currents, posing significant challenges for long-distance data transmission while maintaining a low age of information (AoI). Consequently, we introduce a prediction-based UAV-assisted data collection mechanism for MIoT. In this scheme, we first select convergence nodes responsible for gathering data from floating sensor nodes and forwarding it to passing UAVs. We then propose a dynamic clustering algorithm to allocate task areas to UAVs, with each area assigned to a single UAV for data collection from floating sensor nodes. To ensure stable data offloading by UAVs, we develop a UAV relay pairing algorithm to establish reliable air-to-air relay paths and provide two data offloading modes: distal UAV and proximate UAV. Owing to the drift of floating sensor nodes influenced by ocean currents, we employ a deep echo state network to predict the positions of floating sensor nodes and utilize a multi-agent deep deterministic policy gradient to solve the UAVs trajectory planning problem. Under this mechanism, the UAVs can adaptively adjust its flight path while exploring floating sensor nodes in dynamically changing ocean sensor node scenarios. Extensive experiments demonstrate that the proposed scheme can adapt to dynamic ocean environments, achieving low-AoI data collection from floating sensor nodes.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100854"},"PeriodicalIF":5.8,"publicationDate":"2024-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid mutual authentication for vehicle-to-infrastructure communication without the coverage of roadside units 在没有路边装置覆盖的情况下,实现车辆与基础设施通信的混合相互认证
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-11-07 DOI: 10.1016/j.vehcom.2024.100850
Huizhi Tang, Abdul Rauf, Qin Lin, Guoqing Dou, Changshuai Qin
The security issues in Vehicle Ad Hoc Networks (VANETs) are prevalent within Intelligent Transportation Systems (ITS). To ensure the security of vehicle-to-infrastructure (V2I) communication, extensive research on V2I authentication has been conducted in recent years. However, these protocols often overlook the limitations of communication range, leading to failures in V2I communication. Consequently, addressing the challenge of secure V2I communication in areas not covered by distributed roadside units (RSUs) remains a significant task. To address these issues, the current study proposes an Anonymous Certificate-less Hybrid Mutual Authentication Protocol (ACHMAP) based on Vehicle-to-Vehicle-to-Infrastructure (V2V2I) communication. In the proposed protocol, a secure multi-hop link is established through vehicle-to-vehicle (V2V) mutual one-time token authentication. Subsequently, the out-of-coverage vehicle and relevant RSUs complete V2I mutual authentication using signcryption messages transmitted by vehicle nodes. In the security analysis, it is demonstrated that the entire V2V2I stage can resist various security attacks, such as replay attacks, impersonation attacks, and threats to user anonymity, while preserving confidentiality and integrity. We simulated the proposed protocol using Network Simulator 3 (NS-3) to confirm that the authentication mechanism has lower overhead and minimal authentication delay in V2V2I communication.
在智能交通系统(ITS)中,车辆无线网络(VANET)的安全问题非常普遍。为了确保车辆到基础设施(V2I)通信的安全性,近年来对 V2I 身份验证进行了大量研究。然而,这些协议往往忽略了通信范围的限制,导致 V2I 通信失败。因此,在分布式路边装置(RSU)未覆盖的区域解决 V2I 安全通信的挑战仍然是一项重要任务。为解决这些问题,本研究提出了一种基于车对车对基础设施(V2V2I)通信的匿名无证书混合相互验证协议(ACHMAP)。在提议的协议中,通过车对车(V2V)一次性相互令牌认证建立了安全的多跳链路。随后,覆盖范围外的车辆和相关 RSU 使用车辆节点传输的签名加密信息完成 V2I 相互认证。安全分析表明,整个 V2V2I 阶段可以抵御各种安全攻击,如重放攻击、冒充攻击和对用户匿名性的威胁,同时保持机密性和完整性。我们使用网络模拟器 3(NS-3)对所提出的协议进行了仿真,证实该认证机制在 V2V2I 通信中具有较低的开销和最小的认证延迟。
{"title":"Hybrid mutual authentication for vehicle-to-infrastructure communication without the coverage of roadside units","authors":"Huizhi Tang,&nbsp;Abdul Rauf,&nbsp;Qin Lin,&nbsp;Guoqing Dou,&nbsp;Changshuai Qin","doi":"10.1016/j.vehcom.2024.100850","DOIUrl":"10.1016/j.vehcom.2024.100850","url":null,"abstract":"<div><div>The security issues in Vehicle Ad Hoc Networks (VANETs) are prevalent within Intelligent Transportation Systems (ITS). To ensure the security of vehicle-to-infrastructure (V2I) communication, extensive research on V2I authentication has been conducted in recent years. However, these protocols often overlook the limitations of communication range, leading to failures in V2I communication. Consequently, addressing the challenge of secure V2I communication in areas not covered by distributed roadside units (RSUs) remains a significant task. To address these issues, the current study proposes an Anonymous Certificate-less Hybrid Mutual Authentication Protocol (ACHMAP) based on Vehicle-to-Vehicle-to-Infrastructure (V2V2I) communication. In the proposed protocol, a secure multi-hop link is established through vehicle-to-vehicle (V2V) mutual one-time token authentication. Subsequently, the out-of-coverage vehicle and relevant RSUs complete V2I mutual authentication using signcryption messages transmitted by vehicle nodes. In the security analysis, it is demonstrated that the entire V2V2I stage can resist various security attacks, such as replay attacks, impersonation attacks, and threats to user anonymity, while preserving confidentiality and integrity. We simulated the proposed protocol using Network Simulator 3 (NS-3) to confirm that the authentication mechanism has lower overhead and minimal authentication delay in V2V2I communication.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100850"},"PeriodicalIF":5.8,"publicationDate":"2024-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical federated deep reinforcement learning based joint communication and computation for UAV situation awareness 基于分层联合深度强化学习的无人机态势感知联合通信与计算
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-11-06 DOI: 10.1016/j.vehcom.2024.100853
Haitao Li, Jiawei Huang
The computation-intensive situational awareness (SA) task of unmanned aerial vehicle (UAV) is greatly affected by its limited power and computing capability. To solve this challenge, we consider the joint communication and computation (JCC) design for UAV network in this paper. Firstly, a multi-objective optimization (MOO) model, which can optimize UAV computation offloading, transmit power, and local computation resources simultaneously, is built to minimize energy consumption and task execution delay. Then, we develop Thompson sampling based double-DQN (TDDQN) learning algorithm which allows the agent to explore more deeply and effectively, and propose a joint optimization algorithm that combines TDDQN and sequential least squares quadratic programming (SLSQP) to handle the MOO problem. Finally, to enhance the training speed and quality, we incorporate federated learning (FL) into the presented joint optimization algorithm and propose hierarchical federated TDDQN with SLSQP (HF TDDQN-S) to implement the JCC design. Simulation results show that the introduced HF TDDQN-S can efficiently learn the best JCC strategy and minimize the average cost contrasted with the DDQN with SLSQP (DDQN-S) and TDDQN with SLSPQ (TDDQN-S) approach, and achieve the low average delay SA with power efficient.
无人飞行器(UAV)的计算密集型态势感知(SA)任务受到其有限功率和计算能力的极大影响。为解决这一难题,本文考虑了无人机网络的联合通信与计算(JCC)设计。首先,我们建立了一个多目标优化(MOO)模型,该模型可同时优化无人飞行器的计算卸载、发射功率和本地计算资源,使能耗和任务执行延迟最小化。然后,我们开发了基于汤普森采样的双DQN(TDDQN)学习算法,使代理能够更深入、更有效地探索,并提出了一种结合TDDQN和顺序最小二乘二次编程(SLSQP)的联合优化算法来处理MOO问题。最后,为了提高训练速度和质量,我们在联合优化算法中加入了联合学习(FL),并提出了分层联合 TDDQN 与 SLSQP(HF TDDQN-S)来实现 JCC 设计。仿真结果表明,与采用 SLSQP 的 DDQN(DDQN-S)和采用 SLSPQ 的 TDDQN(TDDQN-S)方法相比,引入的 HF TDDQN-S 可以高效地学习最佳 JCC 策略,并使平均成本最小化,同时实现了低平均延迟和高能效的 SA。
{"title":"Hierarchical federated deep reinforcement learning based joint communication and computation for UAV situation awareness","authors":"Haitao Li,&nbsp;Jiawei Huang","doi":"10.1016/j.vehcom.2024.100853","DOIUrl":"10.1016/j.vehcom.2024.100853","url":null,"abstract":"<div><div>The computation-intensive situational awareness (SA) task of unmanned aerial vehicle (UAV) is greatly affected by its limited power and computing capability. To solve this challenge, we consider the joint communication and computation (JCC) design for UAV network in this paper. Firstly, a multi-objective optimization (MOO) model, which can optimize UAV computation offloading, transmit power, and local computation resources simultaneously, is built to minimize energy consumption and task execution delay. Then, we develop Thompson sampling based double-DQN (TDDQN) learning algorithm which allows the agent to explore more deeply and effectively, and propose a joint optimization algorithm that combines TDDQN and sequential least squares quadratic programming (SLSQP) to handle the MOO problem. Finally, to enhance the training speed and quality, we incorporate federated learning (FL) into the presented joint optimization algorithm and propose hierarchical federated TDDQN with SLSQP (HF TDDQN-S) to implement the JCC design. Simulation results show that the introduced HF TDDQN-S can efficiently learn the best JCC strategy and minimize the average cost contrasted with the DDQN with SLSQP (DDQN-S) and TDDQN with SLSPQ (TDDQN-S) approach, and achieve the low average delay SA with power efficient.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100853"},"PeriodicalIF":5.8,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142652889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Volunteer vehicle assisted dependent task offloading based on ant colony optimization algorithm in vehicular edge computing 车载边缘计算中基于蚁群优化算法的志愿车辆辅助依赖任务卸载
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-31 DOI: 10.1016/j.vehcom.2024.100849
Chen Cheng, Linbo Zhai, Yujuan Jia, Xiumin Zhu, Yumei Li
Vehicle Edge Computing improves the Quality of Service of vehicular applications by offloading tasks to the VEC server. However, with the continuous development of computation-intensive vehicular applications, the limited resources of the VEC server will not be enough to support these applications. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) proposes a concept of using vehicles as resources, which is considered to be a promising solution. In this paper, we study the multi-dependent task offloading problem in order to quickly and economically handle the overload task of the requesting vehicle in VCBV. Considering both task execution delay and execution cost, we formulate the problem of offloading the multi-dependent tasks of requesting vehicles to minimize total task completion time and execution cost. Since the offloading problem is NP-hard, an improved multi-objective Ant Colony Optimization algorithm is proposed. Firstly, we use a density-based clustering algorithm to form volunteer alliances that can contribute idle resources. Secondly, based on the volunteer alliances and RSUs, we use Analytic Hierarchy Process (AHP) to initialize pheromone concentration to make better decisions. Then, we design the update strategy of the pheromone concentration and heuristic information. Finally, we introduce Pareto optimal relationship to evaluate the results. A large number of simulation results verify that our algorithm has better performance than other alternatives.
车辆边缘计算(Vehicle Edge Computing)通过将任务卸载到 VEC 服务器来提高车辆应用的服务质量。然而,随着计算密集型车辆应用的不断发展,VEC 服务器的有限资源将不足以支持这些应用。基于志愿计算的车载 Ad-hoc 网络(VCBV)提出了将车辆作为资源的概念,被认为是一种很有前途的解决方案。本文研究了多依赖任务卸载问题,以便在 VCBV 中快速、经济地处理请求车辆的超载任务。考虑到任务执行延迟和执行成本,我们提出了请求车辆的多依赖任务卸载问题,以最小化总任务完成时间和执行成本。由于卸载问题是 NP 难问题,我们提出了一种改进的多目标蚁群优化算法。首先,我们使用基于密度的聚类算法来组建可以贡献闲置资源的志愿者联盟。其次,根据志愿者联盟和 RSU,我们使用层次分析法(AHP)初始化信息素浓度,以做出更好的决策。然后,我们设计信息素浓度和启发式信息的更新策略。最后,我们引入帕累托最优关系来评估结果。大量的模拟结果验证了我们的算法比其他算法具有更好的性能。
{"title":"Volunteer vehicle assisted dependent task offloading based on ant colony optimization algorithm in vehicular edge computing","authors":"Chen Cheng,&nbsp;Linbo Zhai,&nbsp;Yujuan Jia,&nbsp;Xiumin Zhu,&nbsp;Yumei Li","doi":"10.1016/j.vehcom.2024.100849","DOIUrl":"10.1016/j.vehcom.2024.100849","url":null,"abstract":"<div><div>Vehicle Edge Computing improves the Quality of Service of vehicular applications by offloading tasks to the VEC server. However, with the continuous development of computation-intensive vehicular applications, the limited resources of the VEC server will not be enough to support these applications. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) proposes a concept of using vehicles as resources, which is considered to be a promising solution. In this paper, we study the multi-dependent task offloading problem in order to quickly and economically handle the overload task of the requesting vehicle in VCBV. Considering both task execution delay and execution cost, we formulate the problem of offloading the multi-dependent tasks of requesting vehicles to minimize total task completion time and execution cost. Since the offloading problem is NP-hard, an improved multi-objective Ant Colony Optimization algorithm is proposed. Firstly, we use a density-based clustering algorithm to form volunteer alliances that can contribute idle resources. Secondly, based on the volunteer alliances and RSUs, we use Analytic Hierarchy Process (AHP) to initialize pheromone concentration to make better decisions. Then, we design the update strategy of the pheromone concentration and heuristic information. Finally, we introduce Pareto optimal relationship to evaluate the results. A large number of simulation results verify that our algorithm has better performance than other alternatives.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100849"},"PeriodicalIF":5.8,"publicationDate":"2024-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142577970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STAR-RIS-NOMA empowered vehicle-to-vehicle communications: Outage and ergodic capacity analysis STAR-RIS-NOMA 赋权车对车通信:中断和遍历容量分析
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-28 DOI: 10.1016/j.vehcom.2024.100852
Luxmi Kant Vishwakarma , Radhika Gour , Suneel Yadav , Adão Silva
This paper delves into the performance evaluation of a non-orthogonal multiple access (NOMA) enabled vehicle-to-vehicle (V2V) communication system empowered by simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RIS). Herein, we consider that a moving access point (AP) transmits superimposed signals to nearby and distant NOMA vehicles simultaneously via reflection and transmission through a STAR-RIS equipped vehicle with 2N reconfigurable elements, respectively. Specifically, by characterizing all V2V channels as double-Rayleigh fading distributed, we derive the outage probability (OP) and ergodic capacity (EC) expressions for each NOMA vehicle, by employing both perfect and imperfect successive interference cancellation (SIC) at nearby vehicle user. Furthermore, we present the asymptotic OP behavior at high signal-to-noise ratio (SNR) regime to gain deeper insights into the diversity order of NOMA vehicles. The findings reveal that the nearby vehicle under perfect SIC and far vehicle experience a diversity order of Nπ4256π2, which is the function of number of reconfigurable elements (N) in the STAR-RIS. Whereas, a zero diversity order is obtained for nearby user under imperfect SIC case. Moreover, we analytically discuss the high SNR slopes of EC for both user vehicles. Furthermore, Monte-Carlo simulations are conducted to validate our analytical results under various channel and system parameter configurations. We also provide a comparison between the proposed scheme and STAR-RIS based orthogonal multiple access and cooperative relaying systems.
本文深入探讨了通过同时传输和反射可重构智能表面(STAR-RIS)实现的非正交多址(NOMA)车对车(V2V)通信系统的性能评估。在此,我们考虑由一个移动接入点(AP)通过配备有 2N 个可重构元件的 STAR-RIS 的车辆,分别通过反射和传输向附近和远处的 NOMA 车辆同时传输叠加信号。具体地说,通过将所有 V2V 信道描述为双瑞利衰落分布,我们得出了每个 NOMA 车辆的中断概率(OP)和遍历容量(EC)表达式,并在附近车辆用户处采用了完美和不完美的连续干扰消除(SIC)。此外,我们还提出了高信噪比(SNR)情况下的渐进 OP 行为,以深入了解 NOMA 车辆的分集顺序。研究结果表明,在完美 SIC 条件下,近车和远车的分集阶为 Nπ4256-π2,这是 STAR-RIS 中可重构元素数量(N)的函数。而在不完善 SIC 的情况下,附近用户的分集阶数为零。此外,我们还分析讨论了两个用户车辆的高信噪比 EC 斜坡。此外,我们还进行了蒙特卡洛模拟,以验证我们在各种信道和系统参数配置下的分析结果。我们还对所提出的方案与基于 STAR-RIS 的正交多址和合作中继系统进行了比较。
{"title":"STAR-RIS-NOMA empowered vehicle-to-vehicle communications: Outage and ergodic capacity analysis","authors":"Luxmi Kant Vishwakarma ,&nbsp;Radhika Gour ,&nbsp;Suneel Yadav ,&nbsp;Adão Silva","doi":"10.1016/j.vehcom.2024.100852","DOIUrl":"10.1016/j.vehcom.2024.100852","url":null,"abstract":"<div><div>This paper delves into the performance evaluation of a non-orthogonal multiple access (NOMA) enabled vehicle-to-vehicle (V2V) communication system empowered by simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RIS). Herein, we consider that a moving access point (AP) transmits superimposed signals to nearby and distant NOMA vehicles simultaneously via reflection and transmission through a STAR-RIS equipped vehicle with 2<em>N</em> reconfigurable elements, respectively. Specifically, by characterizing all V2V channels as double-Rayleigh fading distributed, we derive the outage probability (OP) and ergodic capacity (EC) expressions for each NOMA vehicle, by employing both perfect and imperfect successive interference cancellation (SIC) at nearby vehicle user. Furthermore, we present the asymptotic OP behavior at high signal-to-noise ratio (SNR) regime to gain deeper insights into the diversity order of NOMA vehicles. The findings reveal that the nearby vehicle under perfect SIC and far vehicle experience a diversity order of <span><math><mfrac><mrow><mi>N</mi><msup><mrow><mi>π</mi></mrow><mrow><mn>4</mn></mrow></msup></mrow><mrow><mn>256</mn><mo>−</mo><msup><mrow><mi>π</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></mfrac></math></span>, which is the function of number of reconfigurable elements (<em>N</em>) in the STAR-RIS. Whereas, a zero diversity order is obtained for nearby user under imperfect SIC case. Moreover, we analytically discuss the high SNR slopes of EC for both user vehicles. Furthermore, Monte-Carlo simulations are conducted to validate our analytical results under various channel and system parameter configurations. We also provide a comparison between the proposed scheme and STAR-RIS based orthogonal multiple access and cooperative relaying systems.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100852"},"PeriodicalIF":5.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142560694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning based running-track path design for fixed-wing UAV assisted mobile relaying network 基于深度强化学习的固定翼无人机辅助移动中继网络运行轨迹路径设计
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-28 DOI: 10.1016/j.vehcom.2024.100851
Tao Wang , Xiaodong Ji , Xuan Zhu , Cheng He , Jian-Feng Gu
This paper studies a fixed-wing unmanned aerial vehicle (UAV) assisted mobile relaying network (FUAVMRN), where a fixed-wing UAV employs an out-band full-duplex relaying fashion to serve a ground source-destination pair. It is confirmed that for a FUAVMRN, straight path is not suitable for the case that a huge amount of data need to be delivered, while circular path may lead to low throughput if the distance of ground source-destination pair is large. Thus, a running-track path (RTP) design problem is investigated for the FUAVMRN with the goal of energy minimization. By dividing an RTP into two straight and two semicircular paths, the total energy consumption of the UAV and the total amount of data transferred from the ground source to the ground destination via the UAV relay are calculated. According to the framework of Deep Reinforcement Learning and taking the UAV's roll-angle limit into consideration, the RTP design problem is formulated as a Markov Decision Process problem, giving the state and action spaces in addition to the policy and reward functions. In order for the UAV relay to obtain the control policy, Deep Deterministic Policy Gradient (DDPG) is used to solve the path design problem, leading to a DDPG based algorithm for the RTP design. Computer simulations are performed and the results show that the DDPG based algorithm always converges when the number of training iterations is around 500, and compared with the circular and straight paths, the proposed RTP design can save at least 12.13 % of energy and 65.93 % of flight time when the ground source and the ground destination are located 2000 m apart and need to transfer 5000bit/Hz of data. Moreover, it is more practical and efficient in terms of energy saving compared with the Deep Q Network based design.
本文研究了一种固定翼无人飞行器辅助移动中继网络(FUAVMRN),其中固定翼无人飞行器采用带外全双工中继方式为一对地面信源-信宿提供服务。研究证实,对于 FUAVMRN 来说,直线路径不适合需要传输大量数据的情况,而如果地面源-目的对的距离较远,圆形路径可能会导致吞吐量较低。因此,以能量最小化为目标,研究了 FUAVMRN 的运行轨迹路径(RTP)设计问题。通过将 RTP 划分为两条直线路径和两条半圆路径,计算出无人机的总能耗以及通过无人机中继从地面源传输到地面目的地的总数据量。根据深度强化学习的框架,并考虑到无人机的滚动角度限制,将 RTP 设计问题表述为马尔可夫决策过程问题,除了给出策略和奖励函数外,还给出了状态和行动空间。为了让无人机中继获得控制策略,使用了深度确定性策略梯度(DDPG)来解决路径设计问题,从而产生了一种基于 DDPG 的 RTP 设计算法。计算机仿真结果表明,当训练迭代次数为 500 次左右时,基于 DDPG 的算法总是收敛的;与圆形路径和直线路径相比,当地面信源和地面目的地相距 2000 m 且需要传输 5000bit/Hz 的数据时,所提出的 RTP 设计至少能节省 12.13% 的能量和 65.93% 的飞行时间。此外,与基于 Deep Q 网络的设计相比,该设计在节能方面更加实用和高效。
{"title":"Deep Reinforcement Learning based running-track path design for fixed-wing UAV assisted mobile relaying network","authors":"Tao Wang ,&nbsp;Xiaodong Ji ,&nbsp;Xuan Zhu ,&nbsp;Cheng He ,&nbsp;Jian-Feng Gu","doi":"10.1016/j.vehcom.2024.100851","DOIUrl":"10.1016/j.vehcom.2024.100851","url":null,"abstract":"<div><div>This paper studies a fixed-wing unmanned aerial vehicle (UAV) assisted mobile relaying network (FUAVMRN), where a fixed-wing UAV employs an out-band full-duplex relaying fashion to serve a ground source-destination pair. It is confirmed that for a FUAVMRN, straight path is not suitable for the case that a huge amount of data need to be delivered, while circular path may lead to low throughput if the distance of ground source-destination pair is large. Thus, a running-track path (RTP) design problem is investigated for the FUAVMRN with the goal of energy minimization. By dividing an RTP into two straight and two semicircular paths, the total energy consumption of the UAV and the total amount of data transferred from the ground source to the ground destination via the UAV relay are calculated. According to the framework of Deep Reinforcement Learning and taking the UAV's roll-angle limit into consideration, the RTP design problem is formulated as a Markov Decision Process problem, giving the state and action spaces in addition to the policy and reward functions. In order for the UAV relay to obtain the control policy, Deep Deterministic Policy Gradient (DDPG) is used to solve the path design problem, leading to a DDPG based algorithm for the RTP design. Computer simulations are performed and the results show that the DDPG based algorithm always converges when the number of training iterations is around 500, and compared with the circular and straight paths, the proposed RTP design can save at least 12.13 % of energy and 65.93 % of flight time when the ground source and the ground destination are located 2000 m apart and need to transfer <span><math><mrow><mn>5000</mn><mrow><mtext>bit</mtext><mo>/</mo><mtext>Hz</mtext></mrow></mrow></math></span> of data. Moreover, it is more practical and efficient in terms of energy saving compared with the Deep Q Network based design.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100851"},"PeriodicalIF":5.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142560693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EPAKA: An efficient and privacy-preserving authenticated key agreement scheme based on physical security for VANET EPAKA:基于物理安全的高效且保护隐私的 VANET 验证密钥协议方案
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-24 DOI: 10.1016/j.vehcom.2024.100847
Chunhua Jin , Penghui Zhou , Zhiwei Chen , Wenyu Qin , Guanhua Chen , Hao Zhang , Jian Weng
Vehicular ad hoc network (VANET) has been a promising technology in smart transportation system, which can enable information exchange between vehicles and roadside units (RSUs). However, the privacy of vehicles and RSUs is a critical challenge in VANET, as they may expose sensitive information to malicious attackers or unauthorized parties. Many existing authenticated key agreement (AKA) schemes aim to protect the privacy of vehicles and RSUs, but they often neglect the physical security of the devices involved in the communication. Therefore, we propose an efficient and privacy-preserving AKA scheme in VANET, which embeds physical unclonable function (PUF) and fuzzy extraction (FE) technology. PUF is a physical device that generates random strings based on their intrinsic characteristics and external inputs, which can protect the secrets in the devices from being stolen by attackers. FE can compensate for the drawbacks of PUF affected by environmental factors. Our scheme preserves the identity privacy of legitimate RSUs and vehicles, as well as intercepts and traces the identity of malicious attackers. In addition, we eliminate the involvement of the third party (TP) in the AKA phase to better meet the high-speed driving of vehicles. Finally, we conduct formal and informal security analyses in random oracle model (ROM), which prove that our scheme can resist various attacks. We also show in the performance analysis that our scheme has the lowest computational cost, communication overhead, and total energy consumption.
车载特设网络(VANET)是智能交通系统中一项前景广阔的技术,它可以实现车辆与路边装置(RSU)之间的信息交换。然而,车辆和 RSU 的隐私保护是 VANET 面临的一个严峻挑战,因为它们可能会将敏感信息暴露给恶意攻击者或未经授权的各方。现有的许多认证密钥协议(AKA)方案都旨在保护车辆和 RSU 的隐私,但它们往往忽视了参与通信的设备的物理安全性。因此,我们在 VANET 中提出了一种高效且能保护隐私的 AKA 方案,其中嵌入了物理不可克隆函数(PUF)和模糊提取(FE)技术。PUF 是一种物理设备,可根据其内在特征和外部输入生成随机字符串,从而保护设备中的秘密不被攻击者窃取。FE 可以弥补 PUF 受环境因素影响的缺点。我们的方案既能保护合法 RSU 和车辆的身份隐私,又能拦截和追踪恶意攻击者的身份。此外,我们消除了第三方(TP)在 AKA 阶段的参与,以更好地满足车辆高速行驶的要求。最后,我们在随机甲骨文模型(ROM)中进行了正式和非正式的安全分析,证明我们的方案可以抵御各种攻击。我们还在性能分析中表明,我们的方案具有最低的计算成本、通信开销和总能耗。
{"title":"EPAKA: An efficient and privacy-preserving authenticated key agreement scheme based on physical security for VANET","authors":"Chunhua Jin ,&nbsp;Penghui Zhou ,&nbsp;Zhiwei Chen ,&nbsp;Wenyu Qin ,&nbsp;Guanhua Chen ,&nbsp;Hao Zhang ,&nbsp;Jian Weng","doi":"10.1016/j.vehcom.2024.100847","DOIUrl":"10.1016/j.vehcom.2024.100847","url":null,"abstract":"<div><div>Vehicular ad hoc network (VANET) has been a promising technology in smart transportation system, which can enable information exchange between vehicles and roadside units (RSUs). However, the privacy of vehicles and RSUs is a critical challenge in VANET, as they may expose sensitive information to malicious attackers or unauthorized parties. Many existing authenticated key agreement (AKA) schemes aim to protect the privacy of vehicles and RSUs, but they often neglect the physical security of the devices involved in the communication. Therefore, we propose an efficient and privacy-preserving AKA scheme in VANET, which embeds physical unclonable function (PUF) and fuzzy extraction (FE) technology. PUF is a physical device that generates random strings based on their intrinsic characteristics and external inputs, which can protect the secrets in the devices from being stolen by attackers. FE can compensate for the drawbacks of PUF affected by environmental factors. Our scheme preserves the identity privacy of legitimate RSUs and vehicles, as well as intercepts and traces the identity of malicious attackers. In addition, we eliminate the involvement of the third party (TP) in the AKA phase to better meet the high-speed driving of vehicles. Finally, we conduct formal and informal security analyses in random oracle model (ROM), which prove that our scheme can resist various attacks. We also show in the performance analysis that our scheme has the lowest computational cost, communication overhead, and total energy consumption.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100847"},"PeriodicalIF":5.8,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks 基于区块链的小型工业园区车联网快速移交认证协议
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-24 DOI: 10.1016/j.vehcom.2024.100848
Junfeng Tian , Yue Shen , Yiting Wang
Autonomous vehicles safeguard the security and efficiency of Internet of Vehicles systems in small industrial parks by authenticating and exchanging real-time information with transportation infrastructure. Deploying a multi-server framework reduces the risk of message blocking and privacy information leakage from centralized services. However, in traditional handover authentication protocols, there are still potential security risks such as high-overhead performance issues and single point of failure attacks. Therefore, it is considered challenging to realize efficient authentication while protecting the privacy of vehicles. In this paper, we propose a secure and efficient handover authentication protocol for autonomous vehicles in a small industrial park to address the challenges. The protocol is based on blockchain and Pedersen verifiable secret sharing scheme, which not only ensures lightweight real-time interactions between autonomous vehicles and edge servers in multi-server environments, but also strictly protects the security and privacy of both vehicles and edge servers. We prove the semantic security of the protocol under the Real-Or-Random model and perform a informal analysis of its security attributes to show that it can withstand a wide range of malicious attacks. Performance evaluation shows that the proposed protocol satisfies more security requirements and has better computational efficiency and communication cost than other related protocols.
自动驾驶汽车通过与交通基础设施进行身份验证和实时信息交换,保障了小型工业园区车联网系统的安全性和效率。部署多服务器框架可降低信息阻塞和集中式服务泄露隐私信息的风险。然而,在传统的交接认证协议中,仍存在潜在的安全风险,如高开销性能问题和单点故障攻击。因此,如何在保护车辆隐私的同时实现高效的身份验证被认为是一项挑战。本文针对上述挑战,提出了一种安全高效的小型工业园区自动驾驶车辆交接认证协议。该协议基于区块链和 Pedersen 可验证的秘密共享方案,不仅保证了多服务器环境下自动驾驶车辆与边缘服务器之间的轻量级实时交互,还严格保护了车辆和边缘服务器的安全和隐私。我们证明了该协议在真实或随机模型下的语义安全性,并对其安全属性进行了非正式分析,证明它可以抵御各种恶意攻击。性能评估表明,与其他相关协议相比,所提出的协议能满足更多的安全要求,并具有更好的计算效率和通信成本。
{"title":"Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks","authors":"Junfeng Tian ,&nbsp;Yue Shen ,&nbsp;Yiting Wang","doi":"10.1016/j.vehcom.2024.100848","DOIUrl":"10.1016/j.vehcom.2024.100848","url":null,"abstract":"<div><div>Autonomous vehicles safeguard the security and efficiency of Internet of Vehicles systems in small industrial parks by authenticating and exchanging real-time information with transportation infrastructure. Deploying a multi-server framework reduces the risk of message blocking and privacy information leakage from centralized services. However, in traditional handover authentication protocols, there are still potential security risks such as high-overhead performance issues and single point of failure attacks. Therefore, it is considered challenging to realize efficient authentication while protecting the privacy of vehicles. In this paper, we propose a secure and efficient handover authentication protocol for autonomous vehicles in a small industrial park to address the challenges. The protocol is based on blockchain and Pedersen verifiable secret sharing scheme, which not only ensures lightweight real-time interactions between autonomous vehicles and edge servers in multi-server environments, but also strictly protects the security and privacy of both vehicles and edge servers. We prove the semantic security of the protocol under the Real-Or-Random model and perform a informal analysis of its security attributes to show that it can withstand a wide range of malicious attacks. Performance evaluation shows that the proposed protocol satisfies more security requirements and has better computational efficiency and communication cost than other related protocols.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100848"},"PeriodicalIF":5.8,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142528445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-vehicle communication cyber security: A comprehensive review of challenges and solutions 车载通信网络安全:挑战与解决方案综合评述
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-09-30 DOI: 10.1016/j.vehcom.2024.100846
Batuhan Gul, Fatih Ertam
The utilization of autonomous vehicles is experiencing a rapid proliferation in contemporary society. Concurrently, with the relentless evolution of technology, the inexorable integration of autonomous vehicles into urban environments, driven by the overarching paradigm of smart cities, becomes increasingly apparent. This escalating reliance on autonomous vehicles concurrently heightens the susceptibility to malevolent actors orchestrating cyber-attacks against these vehicular systems. While previous years have seen a limited corpus of academic research pertaining to cyber-attack and defense methodologies for autonomous vehicles, the relentless progression of technology mandates a more contemporary and exhaustive inquiry. In addition, to the best of our knowledge, there is no article in the literature that provides detailed information and comparisons about in-vehicle sensors, in-vehicle networks, and in-vehicle network datasets by combining them in one article. Also, to our knowledge, very limited studies have been conducted on separately comparative analysis of in-vehicle networks, in-vehicle sensors or data sets in 2024, and therefore, the necessity of conducting a review study on these topics was recognized. To address this deficiency, we compile articles on attacks and defenses on sensors, in-vehicle networks and present detailed information about the latest datasets and provide comparative analysis. In this paper, we have analyzed 108 papers from the last 10 years on in-vehicle networks and sensors. 38 articles on in-vehicle sensors and 70 articles on in-vehicle networks were reviewed and analyzed. We categorize in-vehicle communication attacks into two main groups: sensor-initiated and network-initiated, with a chronological classification to highlight their evolution. We also compare the progress in securing in-vehicle communication and evaluate the most widely used datasets for attack and protection methods. Additionally, we discuss the advantages and disadvantages of these datasets and suggest future research directions. To the best of our knowledge, this work is the first to offer detailed information and comparative analysis of in-vehicle networks, sensors, and the latest datasets. While the study highlights the significant research conducted to protect in-vehicle networks and sensors from cyber attacks, technological advancements continue to introduce new attack vectors. Cars remain particularly susceptible to threats such as DoS, Fuzzy, Spoofing, and Replay attacks. Moreover, current defense mechanisms, including LSTM and CNN, have notable limitations. Future research is needed to address these challenges and enhance vehicle cybersecurity.
自动驾驶汽车在当代社会迅速普及。与此同时,随着技术的不断发展,在智慧城市总体模式的推动下,自动驾驶汽车与城市环境的融合也变得越来越明显。对自动驾驶车辆的依赖不断升级,同时也增加了恶意行为者对这些车辆系统发动网络攻击的可能性。尽管前些年有关自动驾驶汽车网络攻击和防御方法的学术研究数量有限,但技术的不断进步要求我们进行更现代、更详尽的研究。此外,据我们所知,目前还没有一篇文章通过将车载传感器、车载网络和车载网络数据集结合在一篇文章中来提供详细信息和进行比较。此外,据我们所知,对 2024 年车载网络、车载传感器或数据集进行单独比较分析的研究非常有限,因此,我们认识到有必要对这些主题进行综述研究。针对这一不足,我们汇编了有关传感器、车载网络攻击和防御的文章,提供了有关最新数据集的详细信息,并进行了比较分析。在本文中,我们分析了过去 10 年中有关车载网络和传感器的 108 篇论文。其中,38 篇关于车载传感器的文章和 70 篇关于车载网络的文章得到了回顾和分析。我们将车载通信攻击分为两大类:由传感器引发的攻击和由网络引发的攻击,并按时间顺序进行分类,以突出其演变过程。我们还比较了车载通信安全方面的进展,并评估了最广泛使用的攻击和保护方法数据集。此外,我们还讨论了这些数据集的优缺点,并提出了未来的研究方向。据我们所知,这项工作是首次提供有关车载网络、传感器和最新数据集的详细信息和比较分析。虽然这项研究强调了为保护车载网络和传感器免受网络攻击而开展的重要研究,但技术进步仍在不断引入新的攻击载体。汽车仍然特别容易受到 DoS、模糊、欺骗和重放攻击等威胁。此外,当前的防御机制(包括 LSTM 和 CNN)也存在明显的局限性。未来需要开展研究,以应对这些挑战并加强汽车网络安全。
{"title":"In-vehicle communication cyber security: A comprehensive review of challenges and solutions","authors":"Batuhan Gul,&nbsp;Fatih Ertam","doi":"10.1016/j.vehcom.2024.100846","DOIUrl":"10.1016/j.vehcom.2024.100846","url":null,"abstract":"<div><div>The utilization of autonomous vehicles is experiencing a rapid proliferation in contemporary society. Concurrently, with the relentless evolution of technology, the inexorable integration of autonomous vehicles into urban environments, driven by the overarching paradigm of smart cities, becomes increasingly apparent. This escalating reliance on autonomous vehicles concurrently heightens the susceptibility to malevolent actors orchestrating cyber-attacks against these vehicular systems. While previous years have seen a limited corpus of academic research pertaining to cyber-attack and defense methodologies for autonomous vehicles, the relentless progression of technology mandates a more contemporary and exhaustive inquiry. In addition, to the best of our knowledge, there is no article in the literature that provides detailed information and comparisons about in-vehicle sensors, in-vehicle networks, and in-vehicle network datasets by combining them in one article. Also, to our knowledge, very limited studies have been conducted on separately comparative analysis of in-vehicle networks, in-vehicle sensors or data sets in 2024, and therefore, the necessity of conducting a review study on these topics was recognized. To address this deficiency, we compile articles on attacks and defenses on sensors, in-vehicle networks and present detailed information about the latest datasets and provide comparative analysis. In this paper, we have analyzed 108 papers from the last 10 years on in-vehicle networks and sensors. 38 articles on in-vehicle sensors and 70 articles on in-vehicle networks were reviewed and analyzed. We categorize in-vehicle communication attacks into two main groups: sensor-initiated and network-initiated, with a chronological classification to highlight their evolution. We also compare the progress in securing in-vehicle communication and evaluate the most widely used datasets for attack and protection methods. Additionally, we discuss the advantages and disadvantages of these datasets and suggest future research directions. To the best of our knowledge, this work is the first to offer detailed information and comparative analysis of in-vehicle networks, sensors, and the latest datasets. While the study highlights the significant research conducted to protect in-vehicle networks and sensors from cyber attacks, technological advancements continue to introduce new attack vectors. Cars remain particularly susceptible to threats such as DoS, Fuzzy, Spoofing, and Replay attacks. Moreover, current defense mechanisms, including LSTM and CNN, have notable limitations. Future research is needed to address these challenges and enhance vehicle cybersecurity.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100846"},"PeriodicalIF":5.8,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142421182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1