首页 > 最新文献

Vehicular Communications最新文献

英文 中文
An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs 可减轻 VANET 中 TA 依赖性的高效隐私保护认证方案
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-02-01 DOI: 10.1016/j.vehcom.2024.100727
Huadong Su , Shi Dong , Ning Wang , Ting Zhang

With the constant development of wireless communication technologies, the Vehicular Ad-hoc Networks (VANETs) will become an inevitable paradigm for intelligent transportation systems. Privacy-preserving and authentication security has been a core concern in VANETs, and pseudonym-based and group signature-based privacy-preserving authentication schemes have been widely proposed. However, most research schemes rely excessively on the Trusted Authority, and vehicle request and authentication information is almost transparent in front of TAs, while they cannot guarantee the security of vehicle request information after it is intercepted. To address these issues, this paper proposes a lightweight privacy-preserving authentication scheme that mitigates TA dependency, aiming to achieve mutual privacy protection and authentication between vehicles and TAs in VANETs by improving the oblivious transfer algorithm. The security analysis proves that this scheme has good privacy protection and attack resistance, and in addition, the performance simulation and evaluation show that this scheme spends lower computation and communication overheads while ensuring lower authentication delay and packet loss rate, which is a better overall performance compared with other schemes.

随着无线通信技术的不断发展,车载 Ad-hoc 网络(VANET)将成为智能交通系统的必然模式。隐私保护和身份验证安全一直是 VANET 的核心问题,基于假名和群签名的隐私保护身份验证方案已被广泛提出。然而,大多数研究方案过度依赖于可信机构,车辆请求和认证信息在TA面前几乎是透明的,而在车辆请求信息被拦截后却无法保证其安全性。针对这些问题,本文提出了一种减轻TA依赖性的轻量级隐私保护认证方案,旨在通过改进遗忘传输算法,实现VANET中车辆与TA之间的相互隐私保护和认证。安全分析证明,该方案具有良好的隐私保护和抗攻击能力,此外,性能仿真和评估表明,该方案的计算和通信开销较低,同时保证了较低的认证延迟和丢包率,整体性能优于其他方案。
{"title":"An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs","authors":"Huadong Su ,&nbsp;Shi Dong ,&nbsp;Ning Wang ,&nbsp;Ting Zhang","doi":"10.1016/j.vehcom.2024.100727","DOIUrl":"10.1016/j.vehcom.2024.100727","url":null,"abstract":"<div><p>With the constant development of wireless communication<span><span><span><span> technologies, the Vehicular Ad-hoc Networks (VANETs) will become an inevitable paradigm for intelligent transportation systems. Privacy-preserving and </span>authentication security has been a core concern in VANETs, and pseudonym-based and group signature-based privacy-preserving </span>authentication schemes<span><span> have been widely proposed. However, most research schemes rely excessively on the Trusted Authority, and vehicle request and authentication information is almost transparent in front of TAs, while they cannot guarantee the security of vehicle request information after it is intercepted. To address these issues, this paper proposes a lightweight privacy-preserving authentication scheme that mitigates TA dependency, aiming to achieve mutual privacy protection and authentication between vehicles and TAs in VANETs by improving the oblivious transfer algorithm. The security analysis proves that this scheme has good privacy protection and attack resistance, and in addition, the performance simulation and evaluation show that this scheme spends lower computation and </span>communication overheads while ensuring lower authentication delay and </span></span>packet loss rate, which is a better overall performance compared with other schemes.</span></p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"45 ","pages":"Article 100727"},"PeriodicalIF":6.7,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139505169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable UAV-aided 3D sustainable surveillance in classified air-spaces 可重新配置的无人机辅助三维可持续监控分类空域
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-02-01 DOI: 10.1016/j.vehcom.2024.100728
Minsoo Kim , Jalel Ben-Othman , Hyunbum Kim

The recent advancement of smart UAVs (Unmanned Aerial Vehicles) allows its applicability to wide-range fields covering time-critical reports, emergent item delivery, virtual emotion services and so on. In particular, the surveillance can be supported by a fleet of smart UAVs in cooperation with various system components including sensors, mobile robots, autonomous vehicles and so on. Additionally, it is crucial to consider the reconfigurable capabilities of smart UAVs leveraging for rapid movement in disregarded airspace. In this paper, we introduce a reconfigurable UAV-enabled 3D sustainable surveillance in classified air-spaces to provide energy-efficient monitoring and security surveillance enforcement. We formally define a problem to maximize the reconfigurable UAV-aided sustainable surveillance efficiency with optimal height in 3D classified air-spaces avoiding excessive resource consumption and waste. To solve this issue, two different schemes of Lined-Up and Zig-Zag are proposed. Furthermore, we analyze their performances based on the gained numerical results through expanded simulations with detailed discussions.

智能无人机(UAVs)的最新进展使其能够广泛应用于时间紧迫的报告、紧急物品运送、虚拟情感服务等领域。特别是,智能无人机可以与传感器、移动机器人、自动驾驶汽车等各种系统组件合作,为监控提供支持。此外,至关重要的是要考虑智能无人机的可重构能力,以便在不受关注的空域中快速移动。在本文中,我们介绍了一种可重构的无人机三维可持续监控分类空域,以提供高能效的监控和安全监控执行。我们正式定义了一个问题,即在三维分类空域中以最佳高度最大化可重构无人机辅助的可持续监控效率,避免过度的资源消耗和浪费。为了解决这个问题,我们提出了两种不同的方案:"一字排开 "和 "之 "字形。此外,我们还通过扩展模拟和详细讨论,根据获得的数值结果分析了它们的性能。
{"title":"Reconfigurable UAV-aided 3D sustainable surveillance in classified air-spaces","authors":"Minsoo Kim ,&nbsp;Jalel Ben-Othman ,&nbsp;Hyunbum Kim","doi":"10.1016/j.vehcom.2024.100728","DOIUrl":"10.1016/j.vehcom.2024.100728","url":null,"abstract":"<div><p>The recent advancement of smart UAVs (Unmanned Aerial Vehicles) allows its applicability to wide-range fields covering time-critical reports, emergent item delivery, virtual emotion services and so on. In particular, the surveillance can be supported by a fleet of smart UAVs in cooperation with various system components including sensors, mobile robots, autonomous vehicles and so on. Additionally, it is crucial to consider the reconfigurable capabilities of smart UAVs leveraging for rapid movement in disregarded airspace. In this paper, we introduce a reconfigurable UAV-enabled 3D sustainable surveillance in classified air-spaces to provide energy-efficient monitoring and security surveillance enforcement. We formally define a problem to maximize the reconfigurable UAV-aided sustainable surveillance efficiency with optimal height in 3D classified air-spaces avoiding excessive resource consumption and waste. To solve this issue, two different schemes of <em>Lined-Up</em> and <em>Zig-Zag</em> are proposed. Furthermore, we analyze their performances based on the gained numerical results through expanded simulations with detailed discussions.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"45 ","pages":"Article 100728"},"PeriodicalIF":6.7,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139510928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning for autonomous vehicle's trajectory prediction: A comprehensive survey, challenges, and future research directions 用于自动驾驶汽车轨迹预测的机器学习:全面调查、挑战和未来研究方向
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-01-29 DOI: 10.1016/j.vehcom.2024.100733
Vibha Bharilya, Neetesh Kumar

The significant contribution of human errors, accounting for approximately 94% (with a margin of ±2.2%), to road crashes leading to casualties, vehicle damages, and safety concerns necessitates the exploration of alternative approaches. Autonomous Vehicles (AVs) have emerged as a promising solution by replacing human drivers with advanced computer-aided decision-making systems. However, for AVs to effectively navigate the road, they must possess the capability to predict the future behaviour of nearby traffic participants, similar to the predictive driving abilities of human drivers. Building upon existing literature is crucial to advance the field and develop a comprehensive understanding of trajectory prediction methods in the context of automated driving. To address this need, we have undertaken a comprehensive review that focuses on trajectory prediction methods for AVs, with a particular emphasis on machine learning techniques including deep learning and reinforcement learning-based approaches. We have extensively examined over two hundred studies related to trajectory prediction in the context of AVs. The paper begins with an introduction to the general problem of predicting vehicle trajectories and provides an overview of the key concepts and terminology used throughout. After providing a brief overview of conventional methods, this review conducts a comprehensive evaluation of several deep learning-based techniques. Each method is summarized briefly, accompanied by a detailed analysis of its strengths and weaknesses. The discussion further extends to reinforcement learning-based methods. This article also examines the various datasets and evaluation metrics that are commonly used in trajectory prediction tasks. Encouraging an unbiased and objective discussion, we compare two major learning processes, considering specific functional features. By identifying challenges in the existing literature and outlining potential research directions, this review significantly contributes to the advancement of knowledge in the domain of AV trajectory prediction. Its primary objective is to streamline current research efforts and offer a futuristic perspective, ultimately benefiting future developments in the field.

在导致人员伤亡、车辆损坏和安全问题的道路交通事故中,人为失误占了约 94%(误差为 ±2.2%),因此有必要探索替代方法。自动驾驶汽车(AV)以先进的计算机辅助决策系统取代人类驾驶员,成为一种前景广阔的解决方案。然而,要使自动驾驶汽车有效地在道路上行驶,它们必须具备预测附近交通参与者未来行为的能力,类似于人类驾驶员的预测驾驶能力。以现有文献为基础,对于推动该领域的发展和全面了解自动驾驶背景下的轨迹预测方法至关重要。为了满足这一需求,我们对自动驾驶汽车的轨迹预测方法进行了全面综述,重点关注机器学习技术,包括基于深度学习和强化学习的方法。我们广泛研究了两百多项与自动驾驶汽车轨迹预测相关的研究。本文首先介绍了车辆轨迹预测的一般问题,并概述了全文使用的关键概念和术语。在简要介绍了传统方法之后,本综述对几种基于深度学习的技术进行了全面评估。每种方法都进行了简要概述,并对其优缺点进行了详细分析。讨论进一步扩展到基于强化学习的方法。本文还研究了轨迹预测任务中常用的各种数据集和评估指标。为了鼓励公正客观的讨论,我们比较了两种主要的学习过程,并考虑了具体的功能特征。通过识别现有文献中的挑战并概述潜在的研究方向,本综述极大地促进了视听轨迹预测领域的知识进步。其主要目的是简化当前的研究工作,并提供一个未来视角,最终有利于该领域的未来发展。
{"title":"Machine learning for autonomous vehicle's trajectory prediction: A comprehensive survey, challenges, and future research directions","authors":"Vibha Bharilya,&nbsp;Neetesh Kumar","doi":"10.1016/j.vehcom.2024.100733","DOIUrl":"10.1016/j.vehcom.2024.100733","url":null,"abstract":"<div><p>The significant contribution of human errors, accounting for approximately 94% (with a margin of <span><math><mo>±</mo><mn>2.2</mn><mtext>%</mtext></math></span>), to road crashes leading to casualties, vehicle damages, and safety concerns necessitates the exploration of alternative approaches. Autonomous Vehicles (AVs) have emerged as a promising solution by replacing human drivers with advanced computer-aided decision-making systems. However, for AVs to effectively navigate the road, they must possess the capability to predict the future behaviour of nearby traffic participants, similar to the predictive driving abilities of human drivers. Building upon existing literature is crucial to advance the field and develop a comprehensive understanding of trajectory prediction methods in the context of automated driving. To address this need, we have undertaken a comprehensive review that focuses on trajectory prediction methods for AVs, with a particular emphasis on machine learning techniques including deep learning and reinforcement learning-based approaches. We have extensively examined over two hundred studies related to trajectory prediction in the context of AVs. The paper begins with an introduction to the general problem of predicting vehicle trajectories and provides an overview of the key concepts and terminology used throughout. After providing a brief overview of conventional methods, this review conducts a comprehensive evaluation of several deep learning-based techniques. Each method is summarized briefly, accompanied by a detailed analysis of its strengths and weaknesses. The discussion further extends to reinforcement learning-based methods. This article also examines the various datasets and evaluation metrics that are commonly used in trajectory prediction tasks. Encouraging an unbiased and objective discussion, we compare two major learning processes, considering specific functional features. By identifying challenges in the existing literature and outlining potential research directions, this review significantly contributes to the advancement of knowledge in the domain of AV trajectory prediction. Its primary objective is to streamline current research efforts and offer a futuristic perspective, ultimately benefiting future developments in the field.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"46 ","pages":"Article 100733"},"PeriodicalIF":6.7,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139660802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of a generalized multi-tag, multi-antenna ambient backscatter with mobile nodes: A physical layer security perspective 带有移动节点的通用多标签、多天线环境反向散射分析:物理层安全视角
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-01-26 DOI: 10.1016/j.vehcom.2024.100731
Tushar S. Muratkar , Ankit Bhurane , Ashwin Kothari

Ambient backscatter communication (AmBC) has recently attracted a lot of attention as a solution for next-generation internet of things (IoT) applications due to its capability to interact with peer devices with extremely little power usage (in μW). Security being a major concern in IoT applications, we look at the AmBC system from a physical layer security standpoint. In this paper, we focus on a realistic scenario in which numerous tags, a multi-antenna reader, and a multi-antenna eavesdropper are present, and the nodes are in motion concerning each other. The influence of speed, estimation error, number of antennas at nodes, and number of tags on the AmBC system's secrecy performance in terms of secrecy outage probability and intercept probability is investigated. Finally, the theoretical findings are supported with Monte-Carlo simulations.

环境反向散射通信(AmBC)作为下一代物联网(IoT)应用的一种解决方案,最近引起了广泛关注,因为它能以极低的功耗(单位:μW)与对等设备进行交互。安全是物联网应用中的一个主要问题,因此我们从物理层安全的角度来研究 AmBC 系统。在本文中,我们将重点放在一个现实场景中,即存在众多标签、一个多天线读取器和一个多天线窃听器,并且节点之间相互运动。本文研究了速度、估计误差、节点天线数量和标签数量对 AmBC 系统保密性能的影响,包括保密中断概率和拦截概率。最后,用蒙特卡洛模拟支持了理论研究结果。
{"title":"Analysis of a generalized multi-tag, multi-antenna ambient backscatter with mobile nodes: A physical layer security perspective","authors":"Tushar S. Muratkar ,&nbsp;Ankit Bhurane ,&nbsp;Ashwin Kothari","doi":"10.1016/j.vehcom.2024.100731","DOIUrl":"10.1016/j.vehcom.2024.100731","url":null,"abstract":"<div><p><span>Ambient backscatter<span> communication (AmBC) has recently attracted a lot of attention as a solution for next-generation internet of things (IoT) applications due to its capability to interact with peer devices with extremely little power usage (in </span></span><em>μ</em><span><span>W). Security being a major concern in IoT applications, we look at the AmBC system from a physical layer security standpoint. In this paper, we focus on a realistic scenario in which numerous tags, a multi-antenna reader, and a multi-antenna eavesdropper are present, and the nodes are in motion concerning each other. The influence of speed, estimation error, number of antennas at nodes, and number of tags on the AmBC system's secrecy performance in terms of secrecy </span>outage probability and intercept probability is investigated. Finally, the theoretical findings are supported with Monte-Carlo simulations.</span></p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"46 ","pages":"Article 100731"},"PeriodicalIF":6.7,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139565717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accident reduction through a privacy-preserving method on top of a novel ontology for autonomous vehicles with the support of modular arithmetic 在模块化算术支持下,通过在自动驾驶汽车的新型本体之上采用保护隐私的方法减少事故
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-01-26 DOI: 10.1016/j.vehcom.2024.100732
Mehdi Gheisari , Aminreza Karamoozian , Jiechao Gao , Hemn Barzan Abdalla , Shuja Ansari , Riaz Ullah Khan , Zhaoxi Fang

Cloud of Things (CoT) emerges as a pivotal paradigm, connecting Internet of Things (IoT) devices to the Cloud Computing space, facilitating the efficient management of smart cities. In navigating the intricate landscape of smart city environments, this paper confronts two paramount challenges— heterogeneity and privacy preservation. Heterogeneity, rooted in the diverse origins of CoT devices from various vendors, intro- duces compatibility gaps and data format variations, impeding seamless communication among devices. Simultaneously, privacy preservation concerns itself with averting the inadvertent disclo- sure of sensitive data generated by CoT devices. Existing solutions often exhibit limitations in effectively addressing both challenges concurrently. To bridge this gap, our proposed solution employs a novel ontology-based approach, commencing with the introduc- tion of a groundbreaking ”Ontology” using the Protege software. This foundational tool serves a dual purpose—standardizing and unifying general and privacy-related information among diverse CoT devices. The ontology addresses the heterogeneity challenge by fostering a shared understanding and vocabulary, promoting interoperability for smoother communication among disparate devices. Complementing the ontology, a privacy-preservation method, implemented with ”MININET-WIFI” and grounded in Modular Arithmetic, dynamically adjusts the privacy-preserving rules of each CoT device. This adaptive mechanism signifi- cantly enhances security, mitigating the risk of unintentional data disclosure—a critical aspect evaluated extensively within the context of a widely used CoT application, specifically, the Autonomous Vehicle (AV) environment. The computational cost is meticulously evaluated, showcasing that our solution introduces a modest overhead, notably below 1.8 s, compared to alternative models. Furthermore, the penetration rate analysis reveals the solution's resilience against honest but curious Remote Service Units (RSUs). Communication overhead is quantified for various privacy-preserving methods, providing a comprehensive view of the solution's performance. Through rigorous simula- tions, encompassing assessments of communication overhead, computational costs, and penetration rates, our solution exhibits not only affordability for a diverse array of CoT devices in smart cities but also heightened resilience against malicious activities and adversaries, surpassing current studies. This paper, therefore, not only presents a novel ontology-based solution but also delves into the nuanced intricacies of heterogeneity and privacy preservation within CoT-based smart cities. The proposed approach, characterized by its dual focus on standardization and dynamic privacy adaptation, signifies a significant stride towards fostering secure, interoperable, and privacy-aware CoT ecosystems amid the dynamic landscape of smart cities.

物联网云(CoT)作为一种关键范式,将物联网(IoT)设备与云计算空间连接起来,促进了智慧城市的高效管理。在驾驭错综复杂的智慧城市环境时,本文面临着两大挑战--异构性和隐私保护。异构性源于不同供应商的 CoT 设备来源各异,造成了兼容性差距和数据格式差异,阻碍了设备之间的无缝通信。与此同时,隐私保护则涉及如何避免无意中泄露由协同通信设备生成的敏感数据。现有的解决方案在同时有效解决这两个难题方面往往表现出局限性。为了弥补这一不足,我们提出的解决方案采用了一种基于本体的新方法,首先使用 Protege 软件引入了一种开创性的 "本体"。这一基础工具具有双重用途--标准化和统一不同 CoT 设备之间的一般信息和隐私相关信息。本体论通过促进共享理解和词汇来解决异质性挑战,从而促进互操作性,使不同设备之间的通信更加顺畅。作为对本体的补充,利用 "MININET-WIFI "和模块化算术实现的隐私保护方法可动态调整每个 CoT 设备的隐私保护规则。这种自适应机制显著增强了安全性,降低了无意数据泄露的风险--这是在广泛使用的协同通信应用(特别是自动驾驶汽车(AV)环境)中广泛评估的一个关键方面。我们对计算成本进行了细致的评估,结果表明,与其他模型相比,我们的解决方案引入的开销不大,尤其低于 1.8 秒。此外,渗透率分析显示了该解决方案对诚实但好奇的远程服务单元(RSU)的适应能力。对各种隐私保护方法的通信开销进行了量化,从而全面了解了解决方案的性能。通过严格的模拟,包括对通信开销、计算成本和渗透率的评估,我们的解决方案不仅显示了智能城市中各种 CoT 设备的可负担性,而且还显示了对恶意活动和对手的更强复原力,超越了当前的研究。因此,本文不仅提出了一种基于本体的新型解决方案,还深入探讨了基于 CoT 的智慧城市中异构性和隐私保护的微妙复杂性。所提出的方法具有标准化和动态隐私适应的双重特点,标志着在智慧城市的动态景观中,在促进安全、可互操作和隐私感知的 CoT 生态系统方面取得了重大进展。
{"title":"Accident reduction through a privacy-preserving method on top of a novel ontology for autonomous vehicles with the support of modular arithmetic","authors":"Mehdi Gheisari ,&nbsp;Aminreza Karamoozian ,&nbsp;Jiechao Gao ,&nbsp;Hemn Barzan Abdalla ,&nbsp;Shuja Ansari ,&nbsp;Riaz Ullah Khan ,&nbsp;Zhaoxi Fang","doi":"10.1016/j.vehcom.2024.100732","DOIUrl":"10.1016/j.vehcom.2024.100732","url":null,"abstract":"<div><p>Cloud of Things (CoT) emerges as a pivotal paradigm, connecting Internet of Things (IoT) devices to the Cloud Computing space, facilitating the efficient management of smart cities. In navigating the intricate landscape of smart city environments, this paper confronts two paramount challenges— heterogeneity and privacy preservation. Heterogeneity, rooted in the diverse origins of CoT devices from various vendors, intro- duces compatibility gaps and data format variations, impeding seamless communication among devices. Simultaneously, privacy preservation concerns itself with averting the inadvertent disclo- sure of sensitive data generated by CoT devices. Existing solutions often exhibit limitations in effectively addressing both challenges concurrently. To bridge this gap, our proposed solution employs a novel ontology-based approach, commencing with the introduc- tion of a groundbreaking ”Ontology” using the Protege software. This foundational tool serves a dual purpose—standardizing and unifying general and privacy-related information among diverse CoT devices. The ontology addresses the heterogeneity challenge by fostering a shared understanding and vocabulary, promoting interoperability for smoother communication among disparate devices. Complementing the ontology, a privacy-preservation method, implemented with ”MININET-WIFI” and grounded in Modular Arithmetic, dynamically adjusts the privacy-preserving rules of each CoT device. This adaptive mechanism signifi- cantly enhances security, mitigating the risk of unintentional data disclosure—a critical aspect evaluated extensively within the context of a widely used CoT application, specifically, the Autonomous Vehicle (AV) environment. The computational cost is meticulously evaluated, showcasing that our solution introduces a modest overhead, notably below 1.8 s, compared to alternative models. Furthermore, the penetration rate analysis reveals the solution's resilience against honest but curious Remote Service Units (RSUs). Communication overhead is quantified for various privacy-preserving methods, providing a comprehensive view of the solution's performance. Through rigorous simula- tions, encompassing assessments of communication overhead, computational costs, and penetration rates, our solution exhibits not only affordability for a diverse array of CoT devices in smart cities but also heightened resilience against malicious activities and adversaries, surpassing current studies. This paper, therefore, not only presents a novel ontology-based solution but also delves into the nuanced intricacies of heterogeneity and privacy preservation within CoT-based smart cities. The proposed approach, characterized by its dual focus on standardization and dynamic privacy adaptation, signifies a significant stride towards fostering secure, interoperable, and privacy-aware CoT ecosystems amid the dynamic landscape of smart cities.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"46 ","pages":"Article 100732"},"PeriodicalIF":6.7,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139568325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-minimizing 3D circular trajectory optimization of rotary-wing UAV under probabilistic path-loss in constrained hotspot environments 受限热点环境下概率路径损耗条件下旋转翼无人机的能量最小化 3D 循环轨迹优化
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-01-24 DOI: 10.1016/j.vehcom.2024.100730
Enzo Baccarelli, Michele Scarpiniti, Alireza Momenzadeh

In this paper, we consider a Software Defined Networking (SDN)/Network Function Virtualized (NFV) networked computing system, which is composed of a serving Rotary Wing (RW) Unmanned Aerial Vehicle (UAV), a Ground Controller Station (GCS) and a number of resource-limited (possibly, heterogeneous) Ground Users (GUs) that randomly move in environments affected by fading-induced probabilistic path-loss. The focus of this paper is on the joint and adaptive optimization of the 3D trajectory parameters (i.e., altitude, radius, and speed) of the RW-UAV that circulates over the served hotspot area for providing communication and/or computing support to the GUs. The objective is the minimization of the RW-UAV propulsion energy under constraints on the maximum allowed average path-loss, maximum tolerated outage probability, and finite beam-width of the UAV antenna. Due to the acceleration-dependent terms present in the considered RW-UAV energy propulsion model, the formulated problem is non-convex, and up to now, its solution still appears not to be addressed in the literature. Hence, to tackle this challenging problem: 1) we develop a (seemingly new) convexification approach to turn the problem into a Geometric Programming (GP) one; 2) after characterizing the related feasibility conditions, we develop an adaptive solving approach that relies on primal-dual gradient-based iterations; and, then, 3) we perform a joint co-design of the main blocks of the SDN/NFV-based communication/computing architectures equipping the serving RW-UAV and controlling GCS, in order to provide support for the orchestration of the computing/communication microservices possibly required by the served GUs. The conducted numerical tests confirm that the performance gains of the proposed optimization framework against the ones of a number of baselines may reach 22%, while the corresponding performance gaps against the ultimate performance of a brute force search-based benchmark remain typically limited up to 3%-4%.

在本文中,我们考虑了一个软件定义网络(SDN)/网络功能虚拟化(NFV)网络计算系统,该系统由一个服务旋转翼(RW)无人飞行器(UAV)、一个地面控制站(GCS)和若干资源有限(可能是异构)的地面用户(GU)组成,这些地面用户在受渐变引起的概率路径损耗影响的环境中随机移动。本文的重点是联合自适应优化在服务热点区域上空循环的 RW-UAV 的三维轨迹参数(即高度、半径和速度),以便为地面用户提供通信和/或计算支持。其目标是在最大允许平均路径损耗、最大可容忍中断概率和无人机天线有限波束宽度的约束条件下,使 RW-UAV 推进能量最小化。由于所考虑的 RW-UAV 能量推进模型中存在与加速度相关的项,因此所提出的问题是非凸的,迄今为止,文献中似乎仍未解决该问题。因此,为了解决这个具有挑战性的问题1) 我们开发了一种(看似全新的)凸化方法,将问题转化为几何程序设计(GP)问题;2) 在确定相关可行性条件后,我们开发了一种自适应求解方法,该方法依赖于基于原始双梯度的迭代;然后,3)我们对装备服务 RW-UAV 和控制 GCS 的基于 SDN/NFV 的通信/计算架构的主要模块进行了联合共同设计,以便为服务 GU 可能需要的计算/通信微服务的协调提供支持。所进行的数值测试证实,与一些基线相比,所提出的优化框架的性能提升可达 22%,而与基于蛮力搜索基准的最终性能相比,相应的性能差距通常仍限制在 3%-4% 之间。
{"title":"Energy-minimizing 3D circular trajectory optimization of rotary-wing UAV under probabilistic path-loss in constrained hotspot environments","authors":"Enzo Baccarelli,&nbsp;Michele Scarpiniti,&nbsp;Alireza Momenzadeh","doi":"10.1016/j.vehcom.2024.100730","DOIUrl":"10.1016/j.vehcom.2024.100730","url":null,"abstract":"<div><p>In this paper, we consider a Software Defined Networking (SDN)/Network Function Virtualized (NFV) networked computing system, which is composed of a serving Rotary Wing (RW) Unmanned Aerial Vehicle (UAV), a Ground Controller Station (GCS) and a number of resource-limited (possibly, heterogeneous) Ground Users (GUs) that randomly move in environments affected by fading-induced probabilistic path-loss. The focus of this paper is on the joint and adaptive optimization of the 3D trajectory parameters (i.e., altitude, radius, and speed) of the RW-UAV that circulates over the served hotspot area for providing communication and/or computing support to the GUs. The objective is the minimization of the RW-UAV propulsion energy under constraints on the maximum allowed average path-loss, maximum tolerated outage probability, and finite beam-width of the UAV antenna. Due to the acceleration-dependent terms present in the considered RW-UAV energy propulsion model, the formulated problem is non-convex, and up to now, its solution still appears not to be addressed in the literature. Hence, to tackle this challenging problem: 1) we develop a (seemingly new) convexification approach to turn the problem into a Geometric Programming (GP) one; 2) after characterizing the related feasibility conditions, we develop an adaptive solving approach that relies on primal-dual gradient-based iterations; and, then, 3) we perform a joint co-design of the main blocks of the SDN/NFV-based communication/computing architectures equipping the serving RW-UAV and controlling GCS, in order to provide support for the orchestration of the computing/communication microservices possibly required by the served GUs. The conducted numerical tests confirm that the performance gains of the proposed optimization framework against the ones of a number of baselines may reach 22%, while the corresponding performance gaps against the ultimate performance of a brute force search-based benchmark remain typically limited up to 3%-4%.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"46 ","pages":"Article 100730"},"PeriodicalIF":6.7,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000056/pdfft?md5=2b7b42488c6d6627ec0c3842a231a8ba&pid=1-s2.0-S2214209624000056-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139544308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unmanned aerial vehicle intrusion detection: Deep-meta-heuristic system 无人驾驶飞行器入侵检测:深度-元亨利系统
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-01-23 DOI: 10.1016/j.vehcom.2024.100726
Shangting Miao , Quan Pan , Dongxiao Zheng , Dr. Ghulam Mohi-ud-din

The UAV (Unmanned Aerial Vehicles) is an automatic aircraft, widely used several applications like emergency management, wildlife conservation, forestry, aerial photography, etc. The communication among the UAV is susceptible to security threats with several diverse attacks. The data sharing among the UAV and other vehicles is vulnerable to jamming and suspicious activities that disturbs the communication. To tackle the issue, IDS (Intrusion Detection System) is the significant system that monitors and identifies the suspicious activities in the communication network. To attain this, several conventional researchers attempted to accomplish better intrusion detection. However, classical models are limited by accuracy, noise and computation. To overcome the limitation, proposed method employs particular set of procedures for the intrusion detection in UAV with Intrusion UAV dataset. The dataset comprise of features like drone speed, height, width, velocity etc. Initially, in the respective approach, GG (Greedy based Genetic) algorithm for feature selection, which maintains the exact balance between the greediness and diversified population. Greedy approach enhances Genetic algorithm in combinatorial optimisation problems. Further, the study proposes Modified Deep CNN-BiLSTM (Deep Convolutional Neural Network and Bi-Long Short Term Memory) with attention mechanism for classification of intrusion in UAV. The deep CNN is utilized for the ability of handling larger datasets and accuracy. Conversely, it is limited by computation and speed. To tackle the problem, Bi-LSTM is used for the capability of enhancing the computation and speed. Moreover, attention mechanism is used for handle the complexity and to permit the presented system to focus on the significant and relevant data. Correspondingly, proposed approach performance is calculated using performance metrics such as accuracy, specificity, sensitivity, R2 (R-Squared), execution time, RMSE and precision. Furthermore, comparative analysis of the proposed method and classical model exposes the efficacy of the respective system.

无人机(UAV)是一种自动飞行器,广泛应用于应急管理、野生动物保护、林业、航空摄影等多个领域。无人飞行器之间的通信容易受到多种攻击的安全威胁。无人机和其他飞行器之间的数据共享容易受到干扰和可疑活动的影响。为解决这一问题,IDS(入侵检测系统)是监控和识别通信网络中可疑活动的重要系统。为了实现这一目标,一些传统研究人员试图实现更好的入侵检测。然而,经典模型在准确性、噪声和计算方面都存在局限性。为了克服这些限制,所提出的方法采用了一套特殊的程序,利用入侵无人机数据集对无人机进行入侵检测。该数据集包括无人机速度、高度、宽度、速度等特征。最初,在各自的方法中,GG(基于贪婪的遗传)算法用于特征选择,它在贪婪性和多样化种群之间保持了精确的平衡。贪婪方法增强了遗传算法在组合优化问题中的作用。此外,该研究还提出了具有注意力机制的改进型深度 CNN-BiLSTM(深度卷积神经网络和双长短期记忆),用于无人机入侵分类。使用深度 CNN 是因为它能处理更大的数据集,而且准确性高。相反,它的计算能力和速度却受到限制。为了解决这个问题,使用了 Bi-LSTM 来提高计算能力和速度。此外,还使用了注意力机制来处理复杂性,并允许所提出的系统专注于重要的相关数据。相应地,使用准确度、特异性、灵敏度、R2(R 平方)、执行时间、RMSE 和精确度等性能指标来计算所提出方法的性能。此外,对所提方法和经典模型的对比分析也揭示了各自系统的功效。
{"title":"Unmanned aerial vehicle intrusion detection: Deep-meta-heuristic system","authors":"Shangting Miao ,&nbsp;Quan Pan ,&nbsp;Dongxiao Zheng ,&nbsp;Dr. Ghulam Mohi-ud-din","doi":"10.1016/j.vehcom.2024.100726","DOIUrl":"10.1016/j.vehcom.2024.100726","url":null,"abstract":"<div><p><span><span>The UAV (Unmanned Aerial Vehicles) is an automatic aircraft, widely used several applications like emergency management, wildlife conservation, forestry, aerial photography<span><span>, etc. The communication among the UAV is susceptible to security threats with several diverse attacks. The data sharing among the UAV and other vehicles is vulnerable to jamming and suspicious activities that disturbs the communication. To tackle the issue, IDS (Intrusion Detection System) is the significant system that monitors and identifies the suspicious activities in the communication network. To attain this, several conventional researchers attempted to accomplish better intrusion detection<span>. However, classical models are limited by accuracy, noise and computation. To overcome the limitation, proposed method employs particular set of procedures for the intrusion detection in UAV with Intrusion UAV dataset. The dataset comprise of features like drone speed, height, width, velocity etc. Initially, in the respective approach, GG (Greedy based Genetic) algorithm for feature selection, which maintains the exact balance between the greediness and diversified population. Greedy approach enhances </span></span>Genetic algorithm<span><span> in combinatorial optimisation problems. Further, the study proposes Modified Deep CNN-BiLSTM (Deep Convolutional </span>Neural Network and Bi-Long Short Term Memory) with </span></span></span>attention mechanism for classification of intrusion in UAV. The deep CNN is utilized for the ability of handling larger datasets and accuracy. Conversely, it is limited by computation and speed. To tackle the problem, Bi-LSTM is used for the capability of enhancing the computation and speed. Moreover, attention mechanism is used for handle the complexity and to permit the presented system to focus on the significant and relevant data. Correspondingly, proposed approach performance is calculated using performance metrics such as accuracy, specificity, sensitivity, </span><span><math><msup><mrow><mi>R</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span> (R-Squared), execution time, RMSE and precision. Furthermore, comparative analysis of the proposed method and classical model exposes the efficacy of the respective system.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"46 ","pages":"Article 100726"},"PeriodicalIF":6.7,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139523018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid MGO-JAYA based clustered routing for FANETs 一种基于 MGO-JAYA 的混合集群路由,适用于 FANET
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-01-19 DOI: 10.1016/j.vehcom.2024.100729
Ahmed M. Khedr , Pravija Raj P.V.

In recent years, Flying Ad-hoc Networks (FANETs) have gained significant attention among researchers due to the widespread applications and increasing popularity of Unmanned Aerial Vehicles (UAVs). As technology advances and more research is undertaken, FANETs are expected to become a vital aspect of modern times, allowing for more effective and creative applications in different domains. However, FANETs also face several challenges, including high mobility, dynamic topology, energy constraints, and communication reliability. Addressing these challenges is essential to unlock the full potential of FANETs and to ensure reliable and timely delivery of data. In this paper, we propose HMGOC, a novel clustered routing model for FANETs, utilizing a hybrid approach that combines the Mountain Gazelle Optimizer (MGO) and Jaya Algorithms. The dynamic flying behavior of UAVs demands an adaptive and efficient clustering strategy to maintain network stability and ensure robust and reliable communication among UAVs. In this context, MGO, one of the most recent swarm-based optimization methods, is enhanced and employed for FANET clustering process. Also, we design a routing mechanism based on conditional Bayes' theorem which adapts to changing network conditions, reduces packet losses, and ensures timely data delivery. HMGOC offers several advantages over other competitive techniques, including improved load balancing, minimized energy consumption and latency, and enhanced network throughput and lifespan. The simulation results demonstrate that the HMGOC technique beats the existing methods in terms of enhanced cluster stability and lifetime, increased packet deliverability, energy efficiency, reduced latency, and minimized overhead.

近年来,由于无人驾驶飞行器(UAV)的广泛应用和日益普及,飞行 ad-hoc 网络(FANET)在研究人员中获得了极大的关注。随着技术的进步和更多研究的开展,FANET 预计将成为现代社会的一个重要方面,从而在不同领域实现更有效和更具创造性的应用。然而,FANET 也面临着一些挑战,包括高流动性、动态拓扑、能源限制和通信可靠性。要充分发挥 FANET 的潜力,确保可靠、及时地传输数据,就必须应对这些挑战。在本文中,我们提出了一种用于 FANET 的新型集群路由模型 HMGOC,该模型采用了一种结合 Mountain Gazelle Optimizer (MGO) 和 Jaya 算法的混合方法。无人机的动态飞行行为需要一种适应性强且高效的聚类策略来维持网络的稳定性,并确保无人机之间通信的稳健性和可靠性。在此背景下,MGO 作为最新的基于蜂群的优化方法之一,被增强并用于 FANET 的聚类过程。此外,我们还设计了一种基于条件贝叶斯定理的路由机制,它能适应不断变化的网络条件,减少数据包丢失,并确保数据的及时传送。与其他竞争技术相比,HMGOC 具有多项优势,包括改进的负载平衡、最小化的能耗和延迟,以及更高的网络吞吐量和寿命。仿真结果表明,HMGOC 技术在增强集群稳定性和寿命、提高数据包交付能力、提高能效、降低延迟和减少开销方面优于现有方法。
{"title":"A hybrid MGO-JAYA based clustered routing for FANETs","authors":"Ahmed M. Khedr ,&nbsp;Pravija Raj P.V.","doi":"10.1016/j.vehcom.2024.100729","DOIUrl":"10.1016/j.vehcom.2024.100729","url":null,"abstract":"<div><p>In recent years, Flying Ad-hoc Networks (FANETs) have gained significant attention among researchers due to the widespread applications and increasing popularity of Unmanned Aerial Vehicles<span><span><span> (UAVs). As technology advances and more research is undertaken, FANETs are expected to become a vital aspect of modern times, allowing for more effective and creative applications in different domains. However, FANETs also face several challenges, including high mobility, dynamic topology<span>, energy constraints, and communication reliability. Addressing these challenges is essential to unlock the full potential of FANETs and to ensure reliable and timely delivery of data. In this paper, we propose HMGOC, a novel clustered routing model for FANETs, utilizing a hybrid approach that combines the Mountain Gazelle Optimizer (MGO) and Jaya Algorithms. The dynamic flying behavior of UAVs demands an adaptive and efficient clustering strategy to maintain network stability and ensure robust and reliable communication among UAVs. In this context, MGO, one of the most recent swarm-based optimization methods, is enhanced and employed for FANET clustering process. Also, we design a routing mechanism based on conditional Bayes' theorem which adapts to changing network conditions, reduces </span></span>packet losses, and ensures timely data delivery. HMGOC offers several advantages over other competitive techniques, including improved load balancing, minimized energy consumption and latency, and enhanced network throughput and lifespan. The simulation results demonstrate that the HMGOC technique beats the existing methods in terms of enhanced </span>cluster stability<span> and lifetime, increased packet deliverability, energy efficiency, reduced latency, and minimized overhead.</span></span></p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"45 ","pages":"Article 100729"},"PeriodicalIF":6.7,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139505188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining blockchain and crowd-sensing for location privacy protection in Internet of vehicles 将区块链与人群感应相结合,在车联网中保护位置隐私
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-01-03 DOI: 10.1016/j.vehcom.2023.100724
Zihao Shen , Fei Ren , Hui Wang , Peiqian Liu , Kun Liu , Jun Zhang

With the rapid development of Internet of Vehicles (IoV), crowd-sensing based on IoV is widely used in various fields. Traditional crowd-sensing uses a third-party service platform for information interaction, which has problems of worker location privacy leakage and imbalanced participation task fairness. To solve these problems, this paper proposes a combination of blockchain and crowd-sensing for location privacy protection (BCS-LPP) method in IoV. First, blockchain is introduced into BCS-LPP to prevent the leakage of user information by third-party service platforms. Second, providing workers with personalized location privacy level options, combined with Geohash encoding and order-preserving encryption to safeguard the confidentiality of workers' location privacy information. Finally, the fairness of worker participation in tasks and the quality of sensing data are guaranteed by verifying the sensing locations submitted by workers. Using real datasets, BCS-LPP is compared with existing schemes through experimental simulation. BCS-LPP can better ensure the quality of sensing data, protect workers' location privacy information, and enhance the fairness of user participation in tasks.

随着车联网(IoV)的快速发展,基于车联网的人群感知被广泛应用于各个领域。传统的人群感应利用第三方服务平台进行信息交互,存在工作者位置隐私泄露、参与任务公平性失衡等问题。为解决这些问题,本文提出了一种区块链与众测相结合的物联网位置隐私保护(BCS-LPP)方法。首先,在 BCS-LPP 中引入区块链,防止用户信息被第三方服务平台泄露。其次,为劳动者提供个性化的位置隐私等级选项,结合 Geohash 编码和保序加密技术,保障劳动者位置隐私信息的保密性。最后,通过验证工人提交的感知位置,保证工人参与任务的公平性和感知数据的质量。利用真实数据集,通过实验模拟将 BCS-LPP 与现有方案进行了比较。BCS-LPP能更好地确保传感数据的质量,保护工人的位置隐私信息,并提高用户参与任务的公平性。
{"title":"Combining blockchain and crowd-sensing for location privacy protection in Internet of vehicles","authors":"Zihao Shen ,&nbsp;Fei Ren ,&nbsp;Hui Wang ,&nbsp;Peiqian Liu ,&nbsp;Kun Liu ,&nbsp;Jun Zhang","doi":"10.1016/j.vehcom.2023.100724","DOIUrl":"10.1016/j.vehcom.2023.100724","url":null,"abstract":"<div><p>With the rapid development of Internet of Vehicles (IoV), crowd-sensing based on IoV is widely used in various fields. Traditional crowd-sensing uses a third-party service platform for information interaction, which has problems of worker location privacy leakage<span> and imbalanced participation task fairness. To solve these problems, this paper proposes a combination of blockchain and crowd-sensing for location privacy protection (BCS-LPP) method in IoV. First, blockchain is introduced into BCS-LPP to prevent the leakage of user information by third-party service platforms. Second, providing workers with personalized location privacy level options, combined with Geohash encoding and order-preserving encryption to safeguard the confidentiality of workers' location privacy information. Finally, the fairness of worker participation in tasks and the quality of sensing data are guaranteed by verifying the sensing locations submitted by workers. Using real datasets, BCS-LPP is compared with existing schemes through experimental simulation. BCS-LPP can better ensure the quality of sensing data, protect workers' location privacy information, and enhance the fairness of user participation in tasks.</span></p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"45 ","pages":"Article 100724"},"PeriodicalIF":6.7,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139082036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of AUV-carried RISs-aided multihop UWOC convergent with RF MRC systems over WGG oceanic turbulence 在 WGG 海洋湍流中,AUV 搭载的 RIS 辅助多跳 UWOC 与 RF MRC 系统融合的性能分析
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-01-03 DOI: 10.1016/j.vehcom.2023.100722
Binna Zhou, Ping Wang, Tian Cao, Ganggang Li, Shuang Li, Pengfei Yang

To establish reliable connection between Internet of Underwater Things (IoUT) devices and terrestrial data centers, this work first proposes a reconfigurable intelligent surface (RIS) aided multihop underwater wireless optical communication (UWOC) convergent with radio frequency (RF) uplink system. Specifically, the RIS carried by an autonomous underwater vehicle (AUV) is introduced into UWOC link to relax the line-of-sight (LOS) requirement and the maximal-ratio combining (MRC) receiver is adopted at the terrestrial data center to mitigate the RF link fading. It is assumed that the underwater thermocline channel is subject to the newly proposed Weibull-generalized gamma (WGG) turbulence distribution and the RF link composite fading follows Fisher-Snedecor F distribution. Additionally, the optical link misalignment is characterized by the zero-boresight pointing errors model. With the decode-and-forward (DF) relaying scheme, the analytical closed-form expressions of the outage probability (OP) and average bit error rate (ABER) of this system are mathematically achieved, and then the impacts of air bubbles, thermohaline gradient, the number of RIS elements, pointing errors, system structure, and the number of receive antennas are further investigated. Meanwhile, the analytical results are verified by Monte Carlo (MC) simulations. Results reveal that this hybrid system performance would degrade with the increased air bubble levels and thermohaline gradients. Notably, RIS can effectively alleviate the impact of underwater turbulence and this effect would be more pronounced as the number of RIS elements increases. This work will benefit the design and research of hybrid UWOC-RF system.

为了在水下物联网(IoUT)设备与地面数据中心之间建立可靠的连接,本研究首先提出了一种可重构智能表面(RIS)辅助多跳水下无线光通信(UWOC)与射频(RF)上行链路融合系统。具体来说,在 UWOC 链路中引入自主水下航行器(AUV)携带的 RIS,以放宽视线(LOS)要求,并在地面数据中心采用最大比率组合(MRC)接收器来减轻射频链路衰减。假设水下温跃层信道服从新提出的魏布勒-广义伽马(WGG)湍流分布,射频链路复合衰落服从 Fisher-Snedecor F 分布。此外,光链路错位采用零视距指向误差模型。利用解码-前向(DF)中继方案,用数学方法得到了该系统的中断概率(OP)和平均误码率(ABER)的解析闭式表达式,然后进一步研究了气泡、热卤梯度、RIS 元素数量、指向误差、系统结构和接收天线数量的影响。同时,蒙特卡罗(MC)模拟验证了分析结果。结果表明,这种混合系统的性能会随着气泡水平和温盐梯度的增加而降低。值得注意的是,RIS 可以有效缓解水下湍流的影响,而且随着 RIS 元件数量的增加,这种效果会更加明显。这项工作将有助于 UWOC-RF 混合系统的设计和研究。
{"title":"Performance analysis of AUV-carried RISs-aided multihop UWOC convergent with RF MRC systems over WGG oceanic turbulence","authors":"Binna Zhou,&nbsp;Ping Wang,&nbsp;Tian Cao,&nbsp;Ganggang Li,&nbsp;Shuang Li,&nbsp;Pengfei Yang","doi":"10.1016/j.vehcom.2023.100722","DOIUrl":"10.1016/j.vehcom.2023.100722","url":null,"abstract":"<div><p><span>To establish reliable connection between Internet of Underwater Things (IoUT) devices and terrestrial data centers<span>, this work first proposes a reconfigurable intelligent surface (RIS) aided multihop underwater wireless optical communication (UWOC) convergent with radio frequency (RF) uplink system. Specifically, the RIS carried by an autonomous </span></span>underwater vehicle<span><span> (AUV) is introduced into UWOC link to relax the line-of-sight (LOS) requirement and the maximal-ratio combining (MRC) receiver is adopted at the terrestrial data center to mitigate the RF link fading. It is assumed that the underwater thermocline channel is subject to the newly proposed Weibull-generalized gamma (WGG) turbulence distribution and the RF link composite fading follows Fisher-Snedecor F distribution. Additionally, the optical link<span> misalignment is characterized by the zero-boresight pointing errors model. With the decode-and-forward (DF) relaying scheme, the analytical closed-form expressions of the outage probability (OP) and average bit error rate (ABER) of this system are mathematically achieved, and then the impacts of air bubbles, thermohaline gradient, the number of RIS elements, pointing errors, system structure, and the number of </span></span>receive antennas are further investigated. Meanwhile, the analytical results are verified by Monte Carlo (MC) simulations. Results reveal that this hybrid system performance would degrade with the increased air bubble levels and thermohaline gradients. Notably, RIS can effectively alleviate the impact of underwater turbulence and this effect would be more pronounced as the number of RIS elements increases. This work will benefit the design and research of hybrid UWOC-RF system.</span></p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"45 ","pages":"Article 100722"},"PeriodicalIF":6.7,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139101297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1