首页 > 最新文献

Vehicular Communications最新文献

英文 中文
Challenges and opportunities of synthetic data generation for machine learning-based intrusion detection systems in in-vehicle networks 基于机器学习的车载网络入侵检测系统合成数据生成的挑战与机遇
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 DOI: 10.1016/j.vehcom.2025.100998
Junhui Li , Nikolaos Ersotelos , Michail-Antisthenis Tsompanas , Gregory Epiphaniou
Machine learning-based intrusion detection systems (ML-IDS) for in-vehicle networks require diverse, high-quality datasets that are scarce because of privacy and data collection challenges. Collecting data in the real world often faces challenges, such as a lack of detailed attack scenarios and significant resource requirements. This survey examines synthetic data generation (SDG) as a solution and systematically reviews SDG methods, ML-IDS models, and their intersection in automotive security, which has not been addressed in prior surveys. We introduce a quantitative evaluation framework and apply it to synthetic and real datasets, such as SynCAN (Synthetic Controller Area Network), CAN-MIRGU (CAN Multi-Information Record Generating Unit) and Real ORNL (Oak Ridge National Laboratory) Automotive Dynamometer (ROAD) dataset. The results reveal critical limitations, since current synthetic approaches show reduced identifier coverage and unrealistic temporal patterns. Additionally, spatial network topology analysis reveals that synthetic datasets lack the hierarchical hub-and-spoke communication structures and functional subsystem coupling characteristic of real vehicular networks. Through a comprehensive analysis of more than 50 papers published in the time period from 2018 to 2025, we identified five research gaps,including temporal fidelity preservation, real-time constraints, cross-vehicle generalisation, attack diversity limitations, and quality validation requirements. Although SDG promises to address data scarcity and enable complex attack scenario simulations, current methods inadequately model authentic vehicular communications. We provide guidelines for developing temporally aware generation models and validation frameworks for practical deployment.
用于车载网络的基于机器学习的入侵检测系统(ML-IDS)需要多样化、高质量的数据集,而这些数据集由于隐私和数据收集方面的挑战而稀缺。在现实世界中收集数据经常面临挑战,例如缺乏详细的攻击场景和大量的资源需求。本调查将合成数据生成(SDG)作为一种解决方案进行了研究,并系统地回顾了SDG方法、ML-IDS模型及其在汽车安全中的交叉,这在以前的调查中没有得到解决。我们引入了一个定量评估框架,并将其应用于合成数据集和实际数据集,如SynCAN(合成控制器局域网)、CAN- mirgu (CAN多信息记录生成单元)和real ORNL(橡树岭国家实验室)汽车测量仪(ROAD)数据集。结果揭示了关键的局限性,因为当前的综合方法显示出标识符覆盖率降低和不切实际的时间模式。此外,空间网络拓扑分析表明,合成数据集缺乏真实车辆网络的层次化轮辐通信结构和功能子系统耦合特征。通过对2018年至2025年期间发表的50多篇论文的综合分析,我们确定了五个研究空白,包括时间保真度保存、实时约束、跨车辆概括、攻击多样性限制和质量验证要求。尽管可持续发展目标承诺解决数据短缺问题,并实现复杂的攻击场景模拟,但目前的方法无法充分模拟真实的车辆通信。我们为实际部署提供了开发临时感知生成模型和验证框架的指导方针。
{"title":"Challenges and opportunities of synthetic data generation for machine learning-based intrusion detection systems in in-vehicle networks","authors":"Junhui Li ,&nbsp;Nikolaos Ersotelos ,&nbsp;Michail-Antisthenis Tsompanas ,&nbsp;Gregory Epiphaniou","doi":"10.1016/j.vehcom.2025.100998","DOIUrl":"10.1016/j.vehcom.2025.100998","url":null,"abstract":"<div><div>Machine learning-based intrusion detection systems (ML-IDS) for in-vehicle networks require diverse, high-quality datasets that are scarce because of privacy and data collection challenges. Collecting data in the real world often faces challenges, such as a lack of detailed attack scenarios and significant resource requirements. This survey examines synthetic data generation (SDG) as a solution and systematically reviews SDG methods, ML-IDS models, and their intersection in automotive security, which has not been addressed in prior surveys. We introduce a quantitative evaluation framework and apply it to synthetic and real datasets, such as SynCAN (Synthetic Controller Area Network), CAN-MIRGU (CAN Multi-Information Record Generating Unit) and Real ORNL (Oak Ridge National Laboratory) Automotive Dynamometer (ROAD) dataset. The results reveal critical limitations, since current synthetic approaches show reduced identifier coverage and unrealistic temporal patterns. Additionally, spatial network topology analysis reveals that synthetic datasets lack the hierarchical hub-and-spoke communication structures and functional subsystem coupling characteristic of real vehicular networks. Through a comprehensive analysis of more than 50 papers published in the time period from 2018 to 2025, we identified five research gaps,including temporal fidelity preservation, real-time constraints, cross-vehicle generalisation, attack diversity limitations, and quality validation requirements. Although SDG promises to address data scarcity and enable complex attack scenario simulations, current methods inadequately model authentic vehicular communications. We provide guidelines for developing temporally aware generation models and validation frameworks for practical deployment.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100998"},"PeriodicalIF":6.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145894649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing quantum-resistant data privacy in vehicular cloud networks using NIST-qualified FALCON algorithm 利用nist合格的FALCON算法增强车载云网络中抗量子数据隐私
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-30 DOI: 10.1016/j.vehcom.2025.100995
Mritunjay Shall Peelam , Brijesh Kumar Chaurasia , Man Mohan Shukla , Vinay Chamola
Road safety, congestion, pollution, and data security are critical challenges in the development of smart transportation systems. Vehicular Ad-hoc Networks (VANETs) form the backbone of such systems by enabling real-time communication, accident management, and traffic monitoring. However, the vast data generated in VANETs is increasingly vulnerable in the post-quantum era, where traditional cryptographic methods like RSA, ECC, and DSA fail to withstand quantum attacks. To address this, we propose the integration of the NIST-qualified Falcon algorithm, a lattice-based post-quantum cryptographic scheme, to ensure confidentiality, integrity, and resilience of vehicular communication. The proposed scheme is implemented and evaluated in a Vehicular Network Cloud (VNC) environment on different computational platforms, including Apple Silicon M1 Max and AMD Ryzen systems. Experimental results demonstrate that Falcon achieves practical signing and verification delays (22 ms and 17 ms on M1), while maintaining robust key generation performance even at higher bit lengths. Comparative analysis with RSA and ECC shows Falcon’s superiority in quantum resistance and a balanced trade-off between computational cost and communication efficiency. Although Falcon incurs relatively higher encryption and decryption delays, its security guarantees and scalability make it a strong candidate for deployment in VANETs. This research confirms that Falcon provides a feasible, quantum-resistant solution for securing smart transportation ecosystems while meeting the stringent real-time requirements of vehicular communications.
道路安全、拥堵、污染和数据安全是智能交通系统发展的关键挑战。车辆自组织网络(VANETs)通过实现实时通信、事故管理和交通监控,构成了此类系统的骨干。然而,VANETs中产生的大量数据在后量子时代变得越来越脆弱,传统的加密方法如RSA、ECC、DSA等无法抵御量子攻击。为了解决这个问题,我们提出了集成nist合格的Falcon算法,这是一种基于晶格的后量子加密方案,以确保车辆通信的保密性、完整性和弹性。该方案在不同计算平台(包括Apple Silicon M1 Max和AMD Ryzen系统)上的车辆网络云(VNC)环境中进行了实施和评估。实验结果表明,Falcon实现了实际的签名和验证延迟(在M1上分别为22 ms和17 ms),同时即使在较高的位长度下也能保持稳健的密钥生成性能。与RSA和ECC的比较分析表明,Falcon在量子抗性方面具有优势,并且在计算成本和通信效率之间进行了平衡权衡。尽管Falcon会导致相对较高的加密和解密延迟,但其安全性保证和可扩展性使其成为部署在vanet中的有力候选者。这项研究证实,Falcon为保护智能交通生态系统提供了一种可行的、抗量子的解决方案,同时满足了车辆通信的严格实时要求。
{"title":"Enhancing quantum-resistant data privacy in vehicular cloud networks using NIST-qualified FALCON algorithm","authors":"Mritunjay Shall Peelam ,&nbsp;Brijesh Kumar Chaurasia ,&nbsp;Man Mohan Shukla ,&nbsp;Vinay Chamola","doi":"10.1016/j.vehcom.2025.100995","DOIUrl":"10.1016/j.vehcom.2025.100995","url":null,"abstract":"<div><div>Road safety, congestion, pollution, and data security are critical challenges in the development of smart transportation systems. Vehicular Ad-hoc Networks (VANETs) form the backbone of such systems by enabling real-time communication, accident management, and traffic monitoring. However, the vast data generated in VANETs is increasingly vulnerable in the post-quantum era, where traditional cryptographic methods like RSA, ECC, and DSA fail to withstand quantum attacks. To address this, we propose the integration of the NIST-qualified Falcon algorithm, a lattice-based post-quantum cryptographic scheme, to ensure confidentiality, integrity, and resilience of vehicular communication. The proposed scheme is implemented and evaluated in a Vehicular Network Cloud (VNC) environment on different computational platforms, including Apple Silicon M1 Max and AMD Ryzen systems. Experimental results demonstrate that Falcon achieves practical signing and verification delays (22 ms and 17 ms on M1), while maintaining robust key generation performance even at higher bit lengths. Comparative analysis with RSA and ECC shows Falcon’s superiority in quantum resistance and a balanced trade-off between computational cost and communication efficiency. Although Falcon incurs relatively higher encryption and decryption delays, its security guarantees and scalability make it a strong candidate for deployment in VANETs. This research confirms that Falcon provides a feasible, quantum-resistant solution for securing smart transportation ecosystems while meeting the stringent real-time requirements of vehicular communications.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100995"},"PeriodicalIF":6.5,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145894647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient V2ES authentication protocol and faster-RCNN based object detection scheme for connected autonomous vehicles 安全高效的V2ES认证协议和基于更快rcnn的网联自动驾驶汽车目标检测方案
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-24 DOI: 10.1016/j.vehcom.2025.100997
Shucheng Ying , Xiumei Li , Qi Xie
Connected Autonomous Vehicles (CAVs) can significantly enhance perception accuracy, optimize driving routes, and improve traffic efficiency and safety through collaborative road environment sensing. However, sharing image data among vehicles raises serious privacy concerns. Although various privacy-preserving computation techniques, such as homomorphic encryption, garbled circuits, and additive secret sharing, have been proposed to address this issue, most existing methods lack secure communication protocols between vehicles and edge servers (Vehicle-to-Edge Server, V2ES) as well as between edge servers. As a result, they remain vulnerable to collusion attacks, device capture attacks, and side-channel attacks, as well as incur high computational overhead. To address these challenges, an efficient and privacy-preserving computation scheme designed specifically for the faster region-convolutional neural network (R-CNN) object detection of CAVs is proposed, which has several advantages: (1) The first safe and practical object detection system model for CAVs is established; (2) The first secure and lightweight road side unit(RSU)-assisted V2ES authentication protocol and secure communication mechanism between edge servers are proposed to effectively resist collusion attacks and side channel attacks in the object detection scheme for CAVs; and (3) The multiplication and division protocols of Bi et al.’s scheme are optimized, significantly improving both computational and communication efficiency. The proposed RSU-assisted V2ES authentication protocol is provably secure under the Canetti-Krawczyk (CK) model and the extended security model. The experimental results further confirm that the proposed scheme significantly improves computational performance while ensuring data privacy, with multiplication efficiency improved by about 3.13 times and its communication overhead reduced by 50%, and division efficiency improved by 2.26 times and its communication overhead reduced by 60%.
互联自动驾驶汽车(cav)可以通过协同道路环境感知,显著提高感知精度,优化行驶路线,提高交通效率和安全性。然而,在车辆之间共享图像数据引发了严重的隐私问题。尽管已经提出了各种保护隐私的计算技术,如同态加密、乱码电路和加性秘密共享,以解决这个问题,但大多数现有方法缺乏车辆和边缘服务器之间(车对边缘服务器,V2ES)以及边缘服务器之间的安全通信协议。因此,它们仍然容易受到合谋攻击、设备捕获攻击和侧信道攻击,并且会产生很高的计算开销。针对这些挑战,本文提出了一种针对快速区域卷积神经网络(R-CNN)自动驾驶汽车目标检测的高效且保护隐私的计算方案,该方案具有以下优点:(1)建立了第一个安全实用的自动驾驶汽车目标检测系统模型;(2)首次提出安全轻量级的RSU辅助V2ES认证协议和边缘服务器间安全通信机制,有效抵御自动驾驶汽车目标检测方案中的串通攻击和侧信道攻击;(3)对Bi等人方案的乘法和除法协议进行了优化,显著提高了计算效率和通信效率。在Canetti-Krawczyk (CK)模型和扩展安全模型下证明了rsu辅助V2ES认证协议的安全性。实验结果进一步证实,该方案在保证数据保密性的同时,显著提高了计算性能,乘法效率提高约3.13倍,通信开销降低50%;除法效率提高约2.26倍,通信开销降低60%。
{"title":"Secure and efficient V2ES authentication protocol and faster-RCNN based object detection scheme for connected autonomous vehicles","authors":"Shucheng Ying ,&nbsp;Xiumei Li ,&nbsp;Qi Xie","doi":"10.1016/j.vehcom.2025.100997","DOIUrl":"10.1016/j.vehcom.2025.100997","url":null,"abstract":"<div><div>Connected Autonomous Vehicles (CAVs) can significantly enhance perception accuracy, optimize driving routes, and improve traffic efficiency and safety through collaborative road environment sensing. However, sharing image data among vehicles raises serious privacy concerns. Although various privacy-preserving computation techniques, such as homomorphic encryption, garbled circuits, and additive secret sharing, have been proposed to address this issue, most existing methods lack secure communication protocols between vehicles and edge servers (Vehicle-to-Edge Server, V2ES) as well as between edge servers. As a result, they remain vulnerable to collusion attacks, device capture attacks, and side-channel attacks, as well as incur high computational overhead. To address these challenges, an efficient and privacy-preserving computation scheme designed specifically for the faster region-convolutional neural network (R-CNN) object detection of CAVs is proposed, which has several advantages: (1) The first safe and practical object detection system model for CAVs is established; (2) The first secure and lightweight road side unit(RSU)-assisted V2ES authentication protocol and secure communication mechanism between edge servers are proposed to effectively resist collusion attacks and side channel attacks in the object detection scheme for CAVs; and (3) The multiplication and division protocols of Bi et al.’s scheme are optimized, significantly improving both computational and communication efficiency. The proposed RSU-assisted V2ES authentication protocol is provably secure under the Canetti-Krawczyk (CK) model and the extended security model. The experimental results further confirm that the proposed scheme significantly improves computational performance while ensuring data privacy, with multiplication efficiency improved by about 3.13 times and its communication overhead reduced by 50%, and division efficiency improved by 2.26 times and its communication overhead reduced by 60%.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100997"},"PeriodicalIF":6.5,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of large language models (LLMs) in enhancing intelligent transportation systems: A survey 大语言模型(LLMs)在增强智能交通系统中的作用:一项调查
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-22 DOI: 10.1016/j.vehcom.2025.100996
Vikas Hassija , Tamonash Majumder , Debangshu Roy , Raja Piyush , Vinay Chamola
Large Language Models (LLMs) are transforming Intelligent Transportation Systems (ITS) by shifting operations from static, rule based systems toward adaptive, data-driven decision-making. This paper presents a comprehensive methodological and application-focused survey of LLMs in ITS, grounded in transformer-based architectures like GPT-4, BERT, and LlaMa. We analyze the technical challenge of integrating diverse multimodal data including sensor logs, visual inputs, and textual reports via cross-modal fusion strategies. The survey examines key applications such as traffic signal optimization, predictive maintenance, V2X communication, public transport scheduling, and route personalization. Furthermore, we detail core methodologies (e.g., fine- tuning, Chain-of-Thought prompting, federated learning, RLHF) used to enhance LLM performance under real-time conditions and assess explainability frameworks (SHAP, LIME) to foster trust. We also identify critical challenges, including model hallucination, privacy risks, resource demands, and latency constraints. By synthesizing insights from over 200 primary research contributions, this work offers a foundational reference for designing scalable, intelligent, and ethically aligned ITS architectures.
大型语言模型(llm)正在改变智能交通系统(ITS),将操作从静态的、基于规则的系统转变为自适应的、数据驱动的决策。本文以GPT-4、BERT和LlaMa等基于变压器的架构为基础,介绍了ITS中llm的综合方法和应用调查。我们分析了通过跨模态融合策略整合多种多模态数据的技术挑战,包括传感器日志、视觉输入和文本报告。该调查考察了交通信号优化、预测性维护、V2X通信、公共交通调度和路线个性化等关键应用。此外,我们详细介绍了核心方法(例如,微调,思维链提示,联邦学习,RLHF)用于提高LLM在实时条件下的性能,并评估可解释性框架(SHAP, LIME)以促进信任。我们还确定了关键的挑战,包括模型幻觉、隐私风险、资源需求和延迟限制。通过综合来自200多个主要研究贡献的见解,这项工作为设计可扩展,智能和道德一致的ITS架构提供了基础参考。
{"title":"The role of large language models (LLMs) in enhancing intelligent transportation systems: A survey","authors":"Vikas Hassija ,&nbsp;Tamonash Majumder ,&nbsp;Debangshu Roy ,&nbsp;Raja Piyush ,&nbsp;Vinay Chamola","doi":"10.1016/j.vehcom.2025.100996","DOIUrl":"10.1016/j.vehcom.2025.100996","url":null,"abstract":"<div><div>Large Language Models (LLMs) are transforming Intelligent Transportation Systems (ITS) by shifting operations from static, rule based systems toward adaptive, data-driven decision-making. This paper presents a comprehensive methodological and application-focused survey of LLMs in ITS, grounded in transformer-based architectures like GPT-4, BERT, and LlaMa. We analyze the technical challenge of integrating diverse multimodal data including sensor logs, visual inputs, and textual reports via cross-modal fusion strategies. The survey examines key applications such as traffic signal optimization, predictive maintenance, V2X communication, public transport scheduling, and route personalization. Furthermore, we detail core methodologies (e.g., fine- tuning, Chain-of-Thought prompting, federated learning, RLHF) used to enhance LLM performance under real-time conditions and assess explainability frameworks (SHAP, LIME) to foster trust. We also identify critical challenges, including model hallucination, privacy risks, resource demands, and latency constraints. By synthesizing insights from over 200 primary research contributions, this work offers a foundational reference for designing scalable, intelligent, and ethically aligned ITS architectures.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100996"},"PeriodicalIF":6.5,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145813956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight anonymous aggregate authentication in VANET based on offline/online certificateless signcryption using one-time key 基于一次性密钥离线/在线无证书签名的VANET轻量级匿名聚合认证
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-20 DOI: 10.1016/j.vehcom.2025.100994
Abdullahi Yahya Imam , Fagen Li , Hamisu Ibrahim Usman , Muhammad Hanif Tunio
Recent developments in the internet of things (IoT) and vehicular ad hoc network (VANET) significantly improve traffic management and safety. At the same time, several security challenges come alongside these improvements. Numerous research works have proposed different solutions to these security challenges using various cryptographic techniques. To maximize efficiency, recent works have developed several certificateless aggregate signcryption (CLASC) schemes without using the expensive bilinear pairing operations. However, recent studies have revealed various security flaws in many schemes, making them vulnerable to key replacement attacks that can lead to impersonation. Considering these security issues and the significance of high performance, we develop a novel pairing-free CLASC scheme for anonymous authentication in VANETs. To further improve the performance especially for real time communication, we devised a method of shifting the time consuming computations to offline operations. The confidentiality and unforgeability security of this scheme have been proved formally in random oracle model (ROM). Further analysis has demonstrated that the proposed scheme achieves other security requirements essential for anonymous authentication in VANET. Analysis of performances has shown that our scheme has shortest average transmission delay, specifically due to its very low computational overhead.
物联网(IoT)和车载自组织网络(VANET)的最新发展显著改善了交通管理和安全。与此同时,随着这些改进,也出现了一些安全挑战。针对这些安全挑战,许多研究工作已经提出了使用各种加密技术的不同解决方案。为了最大限度地提高效率,最近的研究开发了几种不使用昂贵的双线性配对操作的无证书聚合签名加密(class)方案。然而,最近的研究揭示了许多方案中的各种安全漏洞,使它们容易受到可能导致冒充的密钥替换攻击。考虑到这些安全问题和高性能的重要性,我们开发了一种新的无配对的class匿名认证方案。为了进一步提高性能,特别是在实时通信方面,我们设计了一种将耗时的计算转移到离线操作的方法。该方案的保密性和不可伪造性在随机oracle模型(ROM)中得到了正式证明。进一步的分析表明,该方案满足了VANET中匿名认证的其他安全要求。性能分析表明,我们的方案具有最短的平均传输延迟,特别是由于它的计算开销非常低。
{"title":"Lightweight anonymous aggregate authentication in VANET based on offline/online certificateless signcryption using one-time key","authors":"Abdullahi Yahya Imam ,&nbsp;Fagen Li ,&nbsp;Hamisu Ibrahim Usman ,&nbsp;Muhammad Hanif Tunio","doi":"10.1016/j.vehcom.2025.100994","DOIUrl":"10.1016/j.vehcom.2025.100994","url":null,"abstract":"<div><div>Recent developments in the internet of things (IoT) and vehicular ad hoc network (VANET) significantly improve traffic management and safety. At the same time, several security challenges come alongside these improvements. Numerous research works have proposed different solutions to these security challenges using various cryptographic techniques. To maximize efficiency, recent works have developed several certificateless aggregate signcryption (CLASC) schemes without using the expensive bilinear pairing operations. However, recent studies have revealed various security flaws in many schemes, making them vulnerable to key replacement attacks that can lead to impersonation. Considering these security issues and the significance of high performance, we develop a novel pairing-free CLASC scheme for anonymous authentication in VANETs. To further improve the performance especially for real time communication, we devised a method of shifting the time consuming computations to offline operations. The confidentiality and unforgeability security of this scheme have been proved formally in random oracle model (ROM). Further analysis has demonstrated that the proposed scheme achieves other security requirements essential for anonymous authentication in VANET. Analysis of performances has shown that our scheme has shortest average transmission delay, specifically due to its very low computational overhead.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100994"},"PeriodicalIF":6.5,"publicationDate":"2025-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145796044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative control of heterogeneous vehicle platoons under communication time–varying delays and intermittent observations 通信时变延迟和间歇观测条件下异构车辆排的协同控制
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-12-07 DOI: 10.1016/j.vehcom.2025.100993
Yilin Wu , Qian Zhao , Yonggui Liu , Zeming Li , Zhiping Shen
This article discusses the cooperative control problem for heterogeneous vehicle platoons subject to non-ideal factors, specifically communication time-varying delays, system noises and intermittent observations. The main idea is to construct the internal reference models to generate common signals for all vehicles. First, in ideal situations under a directed acyclic topology (DAT), a distributed controller is proposed based on the properties of lower triangular matrices and solving an algebraic Riccati equation (ARE); Second, for non–ideal situations under uniformly quasi-strongly connected topology, optimal states are estimated using intermittent observations, and a distributed controller is designed to maintain the platoon’s mean square stability (MSS). Compared to the control methods in existing literatures, the proposed control approaches in this paper, relying on the system’s output information rather than state information, can effectively suppress the impacts of vehicle heterogeneity and the aforementioned non–ideal factors on platoon stability. Simulations are conducted to demonstrate a superior convergence speed compared to those in the literatures.
本文讨论了受非理想因素影响的异构车辆队列协同控制问题,特别是通信时变延迟、系统噪声和间歇观测。主要思想是构建内部参考模型来生成所有车辆的公共信号。首先,在有向无环拓扑(DAT)的理想情况下,提出了一种基于下三角矩阵性质和求解代数Riccati方程(ARE)的分布式控制器;其次,对于均匀准强连接拓扑下的非理想情况,利用间歇观测估计最优状态,并设计分布式控制器来保持排的均方稳定性(MSS)。与现有文献的控制方法相比,本文提出的控制方法依靠系统的输出信息而不是状态信息,可以有效地抑制车辆异质性和上述非理想因素对车队稳定性的影响。仿真结果表明,该方法具有较好的收敛速度。
{"title":"Cooperative control of heterogeneous vehicle platoons under communication time–varying delays and intermittent observations","authors":"Yilin Wu ,&nbsp;Qian Zhao ,&nbsp;Yonggui Liu ,&nbsp;Zeming Li ,&nbsp;Zhiping Shen","doi":"10.1016/j.vehcom.2025.100993","DOIUrl":"10.1016/j.vehcom.2025.100993","url":null,"abstract":"<div><div>This article discusses the cooperative control problem for heterogeneous vehicle platoons subject to non-ideal factors, specifically communication time-varying delays, system noises and intermittent observations. The main idea is to construct the internal reference models to generate common signals for all vehicles. First, in ideal situations under a directed acyclic topology (DAT), a distributed controller is proposed based on the properties of lower triangular matrices and solving an algebraic Riccati equation (ARE); Second, for non–ideal situations under uniformly quasi-strongly connected topology, optimal states are estimated using intermittent observations, and a distributed controller is designed to maintain the platoon’s mean square stability (MSS). Compared to the control methods in existing literatures, the proposed control approaches in this paper, relying on the system’s output information rather than state information, can effectively suppress the impacts of vehicle heterogeneity and the aforementioned non–ideal factors on platoon stability. Simulations are conducted to demonstrate a superior convergence speed compared to those in the literatures.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100993"},"PeriodicalIF":6.5,"publicationDate":"2025-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145689755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
V-PISL:Post-quantum identity-based signature scheme over lattice for VANETs 基于点阵的VANETs后量子身份签名方案
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-11-28 DOI: 10.1016/j.vehcom.2025.100992
Xiang Zou , Deng Pan , Guozhen Shi , Shuhan Yu , Jianguo Xie
As intelligent transportation advances, the backbone of smart mobility is Vehicular Ad Hoc Networks (VANETs), which nevertheless remain vulnerable to security threats stemming from high node mobility, dynamic topologies, and open wireless channels. Traditional security frameworks grapple with cumbersome key management in VANETs’ dynamic ecosystems, while quantum computing poses a fundamental threat to conventional cryptographic protocols. Existing post-quantum signature schemes often suffer from oversized keys and signatures, coupled with reliance on complex operations like trapdoor generation, limiting their applicability to resource-constrained vehicular devices.We propose V-PISL, a lattice-based post-quantum identity-based signature scheme tailored for VANETs. Built on the Dilithium framework and algebraic lattices, it eliminates trapdoor mechanisms, with security grounded in the Module Short Integer Solution (MSIS) and Module Learning With Errors (MLWE) problems. Experimental results demonstrate V-PISL’s efficiency across 112-bit, 169-bit, and 241-bit security levels. Its 1312-byte system public key delivers more than 91.1 % storage efficiency gains compared to the latest schemes (LB-IBS and PQ-ISS), with an overall storage efficiency improvement of 62.6 %, and the response speed reaches the millisecond level. Thus, V-PISL provides a practical postquantum security solution for resource-constrained vehicular environments.
随着智能交通的发展,智能移动的支柱是车辆自组织网络(vanet),然而,它仍然容易受到来自高节点移动性、动态拓扑和开放无线信道的安全威胁。传统的安全框架在VANETs的动态生态系统中努力解决繁琐的密钥管理问题,而量子计算对传统的加密协议构成了根本性的威胁。现有的后量子签名方案往往存在密钥和签名过大的问题,再加上对陷阱门生成等复杂操作的依赖,限制了它们在资源受限的车载设备上的适用性。我们提出了一种为VANETs量身定制的基于晶格的后量子身份签名方案V-PISL。它建立在Dilithium框架和代数格上,消除了活板门机制,其安全性基于模块短整数解决方案(MSIS)和模块错误学习(MLWE)问题。实验结果证明了V-PISL在112位、169位和241位安全级别上的有效性。其1312字节的系统公钥与最新方案(LB-IBS和PQ-ISS)相比,存储效率提高了91.1%以上,整体存储效率提高了62.6%,响应速度达到毫秒级。因此,V-PISL为资源受限的车辆环境提供了一种实用的后量子安全解决方案。
{"title":"V-PISL:Post-quantum identity-based signature scheme over lattice for VANETs","authors":"Xiang Zou ,&nbsp;Deng Pan ,&nbsp;Guozhen Shi ,&nbsp;Shuhan Yu ,&nbsp;Jianguo Xie","doi":"10.1016/j.vehcom.2025.100992","DOIUrl":"10.1016/j.vehcom.2025.100992","url":null,"abstract":"<div><div>As intelligent transportation advances, the backbone of smart mobility is Vehicular Ad Hoc Networks (VANETs), which nevertheless remain vulnerable to security threats stemming from high node mobility, dynamic topologies, and open wireless channels. Traditional security frameworks grapple with cumbersome key management in VANETs’ dynamic ecosystems, while quantum computing poses a fundamental threat to conventional cryptographic protocols. Existing post-quantum signature schemes often suffer from oversized keys and signatures, coupled with reliance on complex operations like trapdoor generation, limiting their applicability to resource-constrained vehicular devices.We propose V-PISL, a lattice-based post-quantum identity-based signature scheme tailored for VANETs. Built on the Dilithium framework and algebraic lattices, it eliminates trapdoor mechanisms, with security grounded in the Module Short Integer Solution (MSIS) and Module Learning With Errors (MLWE) problems. Experimental results demonstrate V-PISL’s efficiency across 112-bit, 169-bit, and 241-bit security levels. Its 1312-byte system public key delivers more than 91.1 % storage efficiency gains compared to the latest schemes (LB-IBS and PQ-ISS), with an overall storage efficiency improvement of 62.6 %, and the response speed reaches the millisecond level. Thus, V-PISL provides a practical postquantum security solution for resource-constrained vehicular environments.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100992"},"PeriodicalIF":6.5,"publicationDate":"2025-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145613791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Negotiating strict latency limits for dynamic real-time services in vehicular time-sensitive networks 车载时间敏感网络中动态实时服务的严格延迟限制协商
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-11-17 DOI: 10.1016/j.vehcom.2025.100985
Timo Salomon , Lisa Maile , Philipp Meyer , Franz Korf , Thomas C. Schmidt
Future vehicles are expected to dynamically deploy in-vehicle applications within a Service-Oriented Architecture (SOA) while critical services continue to operate under hard real-time constraints. Time-Sensitive Networking (TSN) on the in-vehicle Ethernet layer is dedicated to ensure deterministic communication between critical services; its Credit-Based Shaper (CBS) supports dynamic resource reservations. However, the dynamic nature of service deployment challenges network resource configuration, since any new reservation may change the latency of already validated flows. Standard methods of worst-case latency analysis for CBS have been found incorrect, and current TSN stream reservation procedures lack mechanisms to signal application layer Quality-of-Service (QoS) requirements or verify deadlines.
In this paper, we propose and validate a QoS negotiation scheme that interacts with the TSN network controller to reserve resources while ensuring latency bounds. For the first time, this work comparatively evaluates reservation schemes using worst-case analysis and simulations of a realistic In-Vehicle Network (IVN) and demonstrates their impact on QoS guarantees, resource utilization, and setup times. We find that only one reservation scheme utilizing per-queue delay budgets and network calculus provides valid configurations and guarantees acceptable latency bounds throughout the IVN. The proposed service negotiation mechanism efficiently establishes 450 vehicular network reservations in just 11 ms.
未来的车辆预计将在面向服务的体系结构(SOA)中动态部署车载应用程序,而关键服务将继续在硬实时约束下运行。车载以太网层的时间敏感网络(TSN)致力于确保关键服务之间的确定性通信;它的基于信用的Shaper (CBS)支持动态资源保留。然而,服务部署的动态特性对网络资源配置提出了挑战,因为任何新的预约都可能改变已经验证的流的延迟。CBS的最坏情况延迟分析的标准方法被发现是不正确的,并且当前的TSN流保留过程缺乏表明应用层服务质量(QoS)要求或验证截止日期的机制。
{"title":"Negotiating strict latency limits for dynamic real-time services in vehicular time-sensitive networks","authors":"Timo Salomon ,&nbsp;Lisa Maile ,&nbsp;Philipp Meyer ,&nbsp;Franz Korf ,&nbsp;Thomas C. Schmidt","doi":"10.1016/j.vehcom.2025.100985","DOIUrl":"10.1016/j.vehcom.2025.100985","url":null,"abstract":"<div><div>Future vehicles are expected to dynamically deploy in-vehicle applications within a Service-Oriented Architecture (SOA) while critical services continue to operate under hard real-time constraints. Time-Sensitive Networking (TSN) on the in-vehicle Ethernet layer is dedicated to ensure deterministic communication between critical services; its Credit-Based Shaper (CBS) supports dynamic resource reservations. However, the dynamic nature of service deployment challenges network resource configuration, since any new reservation may change the latency of already validated flows. Standard methods of worst-case latency analysis for CBS have been found incorrect, and current TSN stream reservation procedures lack mechanisms to signal application layer Quality-of-Service (QoS) requirements or verify deadlines.</div><div>In this paper, we propose and validate a QoS negotiation scheme that interacts with the TSN network controller to reserve resources while ensuring latency bounds. For the first time, this work comparatively evaluates reservation schemes using worst-case analysis and simulations of a realistic In-Vehicle Network (IVN) and demonstrates their impact on QoS guarantees, resource utilization, and setup times. We find that only one reservation scheme utilizing per-queue delay budgets and network calculus provides valid configurations and guarantees acceptable latency bounds throughout the IVN. The proposed service negotiation mechanism efficiently establishes 450 vehicular network reservations in just 11 ms.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100985"},"PeriodicalIF":6.5,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145535999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PMF-UAV:A lightweight and robust PUF-enabled multi-factor authentication and key agreement protocol for UAV-assisted secure communication PMF-UAV:用于无人机辅助安全通信的轻量级、鲁棒puf支持的多因素认证和密钥协议协议
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-11-17 DOI: 10.1016/j.vehcom.2025.100991
Xinxin Liu , Tieming Liu , Weiyu Dong , Wei Liu
In UAV-assisted rescue operations, Unmanned Aerial Vehicles (UAVs or Drones) are widely deployed for disaster zone data collection, road traffic monitoring, and signal relaying to facilitate emergency medical and firefighting responses. Traditional authentication methods that store cryptographic keys in Non-Volatile Memory (NVM), rendering UAVs vulnerable to impersonation or cloning attacks, particularly when deployed in unsupervised high-altitude environments. Conventional solutions require additional hardware protections or detection mechanisms, which may impose a significant computational burden on UAVs with limited processing capabilities. To address these challenges, the Physical Unclonable Function (PUF) has emerged as a promising solution. Unfortunately, existing PUF-based Authentication and Key Agreement (AKA) protocols suffer from potential modeling attack risks due to their explicit storage mechanisms for a mass of Challenge-Response Pairs (CRPs). To mitigate these concerns, we propose PMF-UAV, a secure communication framework for UAV-assisted systems. PMF-UAV integrates PUF-based hardware cryptography to prevent physical impersonation or cloning of user devices and UAVs, while incorporating passwords and biometric technologies to enhance user-side security. Furthermore, PMF-UAV introduces anti-modeling capabilities. Specifically, PUF responses from UAVs are masked using dynamic pseudonyms, whereas those from user devices are protected via a three-factor fusion mechanism. The protocol also employs a Chebyshev chaotic map during key negotiation to enhance session security. We validate PMF-UAV security using the Real-or-Random (ROR) model, AVISPA analysis, and informal security evaluations. In addition, benchmark experiments conducted on the desktop system and the Raspberry Pi 5B platform demonstrate that PMF-UAV exhibits superior performance and enhanced security advantages compared to other related approaches. An implementation performed on the NS3 network simulator with the IEEE 802.11p communication standard is utilized to validate the feasibility and effectiveness of the proposed scheme in UAV-assisted systems.
在无人机辅助救援行动中,无人机被广泛用于灾区数据收集、道路交通监控和信号中继,以促进紧急医疗和消防响应。传统的身份验证方法将加密密钥存储在非易失性存储器(NVM)中,这使得无人机容易受到模仿或克隆攻击,特别是部署在无人监督的高海拔环境中时。传统的解决方案需要额外的硬件保护或检测机制,这可能会给处理能力有限的无人机带来巨大的计算负担。为了应对这些挑战,物理不可克隆功能(PUF)作为一种很有前途的解决方案出现了。不幸的是,现有的基于puf的身份验证和密钥协议(AKA)协议由于其针对大量质询-响应对(crp)的显式存储机制而遭受潜在的建模攻击风险。为了减轻这些担忧,我们提出了PMF-UAV,这是一种用于无人机辅助系统的安全通信框架。PMF-UAV集成了基于puf的硬件加密技术,以防止用户设备和无人机的物理模拟或克隆,同时结合密码和生物识别技术来增强用户端的安全性。此外,PMF-UAV引入了反建模能力。具体来说,来自无人机的PUF响应使用动态假名进行屏蔽,而来自用户设备的PUF响应则通过三因素融合机制进行保护。该协议还在密钥协商过程中使用了切比雪夫混沌映射来提高会话安全性。我们使用Real-or-Random (ROR)模型、AVISPA分析和非正式安全评估来验证PMF-UAV的安全性。此外,在桌面系统和树莓派5B平台上进行的基准测试实验表明,与其他相关方法相比,PMF-UAV具有卓越的性能和增强的安全优势。采用IEEE 802.11p通信标准在NS3网络模拟器上进行了实现,验证了该方案在无人机辅助系统中的可行性和有效性。
{"title":"PMF-UAV:A lightweight and robust PUF-enabled multi-factor authentication and key agreement protocol for UAV-assisted secure communication","authors":"Xinxin Liu ,&nbsp;Tieming Liu ,&nbsp;Weiyu Dong ,&nbsp;Wei Liu","doi":"10.1016/j.vehcom.2025.100991","DOIUrl":"10.1016/j.vehcom.2025.100991","url":null,"abstract":"<div><div>In UAV-assisted rescue operations, Unmanned Aerial Vehicles (UAVs or Drones) are widely deployed for disaster zone data collection, road traffic monitoring, and signal relaying to facilitate emergency medical and firefighting responses. Traditional authentication methods that store cryptographic keys in Non-Volatile Memory (NVM), rendering UAVs vulnerable to impersonation or cloning attacks, particularly when deployed in unsupervised high-altitude environments. Conventional solutions require additional hardware protections or detection mechanisms, which may impose a significant computational burden on UAVs with limited processing capabilities. To address these challenges, the Physical Unclonable Function (PUF) has emerged as a promising solution. Unfortunately, existing PUF-based Authentication and Key Agreement (AKA) protocols suffer from potential modeling attack risks due to their explicit storage mechanisms for a mass of Challenge-Response Pairs (CRPs). To mitigate these concerns, we propose PMF-UAV, a secure communication framework for UAV-assisted systems. PMF-UAV integrates PUF-based hardware cryptography to prevent physical impersonation or cloning of user devices and UAVs, while incorporating passwords and biometric technologies to enhance user-side security. Furthermore, PMF-UAV introduces anti-modeling capabilities. Specifically, PUF responses from UAVs are masked using dynamic pseudonyms, whereas those from user devices are protected via a three-factor fusion mechanism. The protocol also employs a Chebyshev chaotic map during key negotiation to enhance session security. We validate PMF-UAV security using the Real-or-Random (ROR) model, AVISPA analysis, and informal security evaluations. In addition, benchmark experiments conducted on the desktop system and the Raspberry Pi 5B platform demonstrate that PMF-UAV exhibits superior performance and enhanced security advantages compared to other related approaches. An implementation performed on the NS3 network simulator with the IEEE 802.11p communication standard is utilized to validate the feasibility and effectiveness of the proposed scheme in UAV-assisted systems.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100991"},"PeriodicalIF":6.5,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145535998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LGTWAFIOD: PUF and Fuzzy extractor based lightweight authentication framework for internet of drones 基于PUF和模糊提取器的无人机互联网轻量级认证框架
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-11-12 DOI: 10.1016/j.vehcom.2025.100990
Naveen Kumar, Ankit Chaudhary
The continuous development of Unmanned Aerial Vehicles (UAVs) or drone technology and its ability to perform effectively in various hazard states leads to its adoption in number of sectors including military and civilians industries. In Internet of Drones (IoD) system, a number of drones are deployed in swarm for the collection of important information from various regions and send it to Ground Control Station (GCS). As the sensitive and mission critical information is exchanged so both UAV and GCS must mutually authenticate each other and adversary or attacker cannot trace the exchanged messages. In view of that a lightweight authentication framework for IoD environment (LGTWAFIOD) is proposed for secure communication. In LGTWAFIOD, Physical Unclonable Function (PUF) and Fuzzy extractor is used for the authentication. The security of LGTWAFIOD is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA), BAN logic and ROR model. A simulation framework is set up for performing the experiments and validating the performance of LGTWAFIOD. The experimental results shows that the proposed scheme performs better in terms of communication cost, computational time and security requirements. Also, the network performance is evaluated by performing the simulation.
无人驾驶飞行器(uav)或无人机技术的不断发展及其在各种危险状态下有效执行的能力导致其在包括军事和民用工业在内的许多部门采用。在无人机互联网(Internet of Drones, IoD)系统中,部署多架无人机,从各个区域收集重要信息,并将其发送给地面控制站(GCS)。由于敏感和关键任务信息的交换,无人机和GCS必须相互验证,对手或攻击者无法追踪交换的信息。鉴于此,本文提出了一种面向IoD环境的轻量级认证框架(LGTWAFIOD)来保证通信的安全性。在LGTWAFIOD中,使用物理不可克隆函数(PUF)和模糊提取器进行认证。使用互联网安全协议和应用程序自动验证(AVISPA), BAN逻辑和ROR模型验证LGTWAFIOD的安全性。建立了仿真框架,进行了实验并验证了LGTWAFIOD的性能。实验结果表明,该方案在通信成本、计算时间和安全性要求方面具有较好的性能。同时,通过仿真对网络性能进行了评估。
{"title":"LGTWAFIOD: PUF and Fuzzy extractor based lightweight authentication framework for internet of drones","authors":"Naveen Kumar,&nbsp;Ankit Chaudhary","doi":"10.1016/j.vehcom.2025.100990","DOIUrl":"10.1016/j.vehcom.2025.100990","url":null,"abstract":"<div><div>The continuous development of Unmanned Aerial Vehicles (UAVs) or drone technology and its ability to perform effectively in various hazard states leads to its adoption in number of sectors including military and civilians industries. In Internet of Drones (IoD) system, a number of drones are deployed in swarm for the collection of important information from various regions and send it to Ground Control Station (GCS). As the sensitive and mission critical information is exchanged so both UAV and GCS must mutually authenticate each other and adversary or attacker cannot trace the exchanged messages. In view of that a lightweight authentication framework for IoD environment <em>(LGTWAFIOD)</em> is proposed for secure communication. In <em>LGTWAFIOD</em>, Physical Unclonable Function (PUF) and Fuzzy extractor is used for the authentication. The security of <em>LGTWAFIOD</em> is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA), BAN logic and ROR model. A simulation framework is set up for performing the experiments and validating the performance of <em>LGTWAFIOD</em>. The experimental results shows that the proposed scheme performs better in terms of communication cost, computational time and security requirements. Also, the network performance is evaluated by performing the simulation.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100990"},"PeriodicalIF":6.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145515677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1