Pub Date : 2026-01-10DOI: 10.1016/j.vehcom.2026.100999
Sang-Quang Nguyen , Duy Tran Trung , Lam-Thanh Tu , Anh Le-Thi , Mui Van Nguyen
This paper proposes a novel secure downlink framework that integrates Partial Non-Orthogonal Multiple Access (PNOMA) with short-packet communications (SPC) under keyhole fading channels, tailored for ultra-reliable low-latency (URLLC) services. Unlike prior studies that addressed NOMA, SPC, or keyhole effects in isolation, our work is the first to jointly consider all three aspects in a unified design. Closed-form expressions for the average secure block error rate (SBLER) and block error rate (BLER) are derived under both partial and full transmission information (PTI/FTI) assumptions at the eavesdropper, together with asymptotic analysis capturing the impact of blocklength, power allocation, and keyhole severity. Numerical simulations confirm that the proposed PNOMA-SPC system consistently outperforms conventional NOMA scheme in terms of latency, reliability, and secrecy, even under strong eavesdropping conditions. These contributions provide new theoretical and practical insights into the secure design of multiple access schemes for next-generation 6G URLLC scenarios.
{"title":"Securing short-packet transmissions via partial NOMA: Performance analysis under keyhole fading","authors":"Sang-Quang Nguyen , Duy Tran Trung , Lam-Thanh Tu , Anh Le-Thi , Mui Van Nguyen","doi":"10.1016/j.vehcom.2026.100999","DOIUrl":"10.1016/j.vehcom.2026.100999","url":null,"abstract":"<div><div>This paper proposes a novel secure downlink framework that integrates Partial Non-Orthogonal Multiple Access (PNOMA) with short-packet communications (SPC) under keyhole fading channels, tailored for ultra-reliable low-latency (URLLC) services. Unlike prior studies that addressed NOMA, SPC, or keyhole effects in isolation, our work is the first to jointly consider all three aspects in a unified design. Closed-form expressions for the average secure block error rate (SBLER) and block error rate (BLER) are derived under both partial and full transmission information (PTI/FTI) assumptions at the eavesdropper, together with asymptotic analysis capturing the impact of blocklength, power allocation, and keyhole severity. Numerical simulations confirm that the proposed PNOMA-SPC system consistently outperforms conventional NOMA scheme in terms of latency, reliability, and secrecy, even under strong eavesdropping conditions. These contributions provide new theoretical and practical insights into the secure design of multiple access schemes for next-generation 6G URLLC scenarios.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100999"},"PeriodicalIF":6.5,"publicationDate":"2026-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145957191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-06DOI: 10.1016/j.vehcom.2026.101000
Yabin Zhu , Xu Zhao , Xin Zhang
Vehicle-to-Everything (V2X) technology is rapidly developing. However, vehicular devices operate with limited computational power and energy. These constraints pose significant challenges for secure and energy-efficient task offloading. To address these challenges, this paper proposes a novel framework that integrates a Graph Neural Network (GNN) with the Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm for secure task offloading and resource allocation. The framework employs a GNN (GraphSAGE) to capture the dynamic network topology and global interference, overcoming the limitations of partial observability. This spatial feature representation supports coordinated decision-making by multiple agents within the MADDPG architecture. To handle the high-dimensional and coupled action space, a combinatorial action selection strategy is proposed and QMIX value function decomposition is adopted. This “optimize-then-combine” mechanism enables efficient joint optimization of continuous resources and discrete decisions. Furthermore, a hybrid RSA-AES encryption scheme combined with frequency hopping is implemented to ensure end-to-end data security and anti-jamming capabilities. Extensive comparative experiments demonstrated that the proposed framework significantly outperformed baseline methods, including DQN and standard MADDPG, in terms of task completion rate, average latency, and energy consumption, especially in high-load scenarios. Ablation studies further validated the critical contributions of the GNN, combinatorial action design, and security mechanisms. This work provides an efficient, secure, and scalable solution for resource optimization in complex V2X environments.
{"title":"A secure GNN-MADDPG framework with combinatorial action optimization for task offloading in vehicular networks","authors":"Yabin Zhu , Xu Zhao , Xin Zhang","doi":"10.1016/j.vehcom.2026.101000","DOIUrl":"10.1016/j.vehcom.2026.101000","url":null,"abstract":"<div><div>Vehicle-to-Everything (V2X) technology is rapidly developing. However, vehicular devices operate with limited computational power and energy. These constraints pose significant challenges for secure and energy-efficient task offloading. To address these challenges, this paper proposes a novel framework that integrates a Graph Neural Network (GNN) with the Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm for secure task offloading and resource allocation. The framework employs a GNN (GraphSAGE) to capture the dynamic network topology and global interference, overcoming the limitations of partial observability. This spatial feature representation supports coordinated decision-making by multiple agents within the MADDPG architecture. To handle the high-dimensional and coupled action space, a combinatorial action selection strategy is proposed and QMIX value function decomposition is adopted. This “optimize-then-combine” mechanism enables efficient joint optimization of continuous resources and discrete decisions. Furthermore, a hybrid RSA-AES encryption scheme combined with frequency hopping is implemented to ensure end-to-end data security and anti-jamming capabilities. Extensive comparative experiments demonstrated that the proposed framework significantly outperformed baseline methods, including DQN and standard MADDPG, in terms of task completion rate, average latency, and energy consumption, especially in high-load scenarios. Ablation studies further validated the critical contributions of the GNN, combinatorial action design, and security mechanisms. This work provides an efficient, secure, and scalable solution for resource optimization in complex V2X environments.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 101000"},"PeriodicalIF":6.5,"publicationDate":"2026-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145902773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Machine learning-based intrusion detection systems (ML-IDS) for in-vehicle networks require diverse, high-quality datasets that are scarce because of privacy and data collection challenges. Collecting data in the real world often faces challenges, such as a lack of detailed attack scenarios and significant resource requirements. This survey examines synthetic data generation (SDG) as a solution and systematically reviews SDG methods, ML-IDS models, and their intersection in automotive security, which has not been addressed in prior surveys. We introduce a quantitative evaluation framework and apply it to synthetic and real datasets, such as SynCAN (Synthetic Controller Area Network), CAN-MIRGU (CAN Multi-Information Record Generating Unit) and Real ORNL (Oak Ridge National Laboratory) Automotive Dynamometer (ROAD) dataset. The results reveal critical limitations, since current synthetic approaches show reduced identifier coverage and unrealistic temporal patterns. Additionally, spatial network topology analysis reveals that synthetic datasets lack the hierarchical hub-and-spoke communication structures and functional subsystem coupling characteristic of real vehicular networks. Through a comprehensive analysis of more than 50 papers published in the time period from 2018 to 2025, we identified five research gaps,including temporal fidelity preservation, real-time constraints, cross-vehicle generalisation, attack diversity limitations, and quality validation requirements. Although SDG promises to address data scarcity and enable complex attack scenario simulations, current methods inadequately model authentic vehicular communications. We provide guidelines for developing temporally aware generation models and validation frameworks for practical deployment.
{"title":"Challenges and opportunities of synthetic data generation for machine learning-based intrusion detection systems in in-vehicle networks","authors":"Junhui Li , Nikolaos Ersotelos , Michail-Antisthenis Tsompanas , Gregory Epiphaniou","doi":"10.1016/j.vehcom.2025.100998","DOIUrl":"10.1016/j.vehcom.2025.100998","url":null,"abstract":"<div><div>Machine learning-based intrusion detection systems (ML-IDS) for in-vehicle networks require diverse, high-quality datasets that are scarce because of privacy and data collection challenges. Collecting data in the real world often faces challenges, such as a lack of detailed attack scenarios and significant resource requirements. This survey examines synthetic data generation (SDG) as a solution and systematically reviews SDG methods, ML-IDS models, and their intersection in automotive security, which has not been addressed in prior surveys. We introduce a quantitative evaluation framework and apply it to synthetic and real datasets, such as SynCAN (Synthetic Controller Area Network), CAN-MIRGU (CAN Multi-Information Record Generating Unit) and Real ORNL (Oak Ridge National Laboratory) Automotive Dynamometer (ROAD) dataset. The results reveal critical limitations, since current synthetic approaches show reduced identifier coverage and unrealistic temporal patterns. Additionally, spatial network topology analysis reveals that synthetic datasets lack the hierarchical hub-and-spoke communication structures and functional subsystem coupling characteristic of real vehicular networks. Through a comprehensive analysis of more than 50 papers published in the time period from 2018 to 2025, we identified five research gaps,including temporal fidelity preservation, real-time constraints, cross-vehicle generalisation, attack diversity limitations, and quality validation requirements. Although SDG promises to address data scarcity and enable complex attack scenario simulations, current methods inadequately model authentic vehicular communications. We provide guidelines for developing temporally aware generation models and validation frameworks for practical deployment.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100998"},"PeriodicalIF":6.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145894649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Road safety, congestion, pollution, and data security are critical challenges in the development of smart transportation systems. Vehicular Ad-hoc Networks (VANETs) form the backbone of such systems by enabling real-time communication, accident management, and traffic monitoring. However, the vast data generated in VANETs is increasingly vulnerable in the post-quantum era, where traditional cryptographic methods like RSA, ECC, and DSA fail to withstand quantum attacks. To address this, we propose the integration of the NIST-qualified Falcon algorithm, a lattice-based post-quantum cryptographic scheme, to ensure confidentiality, integrity, and resilience of vehicular communication. The proposed scheme is implemented and evaluated in a Vehicular Network Cloud (VNC) environment on different computational platforms, including Apple Silicon M1 Max and AMD Ryzen systems. Experimental results demonstrate that Falcon achieves practical signing and verification delays (22 ms and 17 ms on M1), while maintaining robust key generation performance even at higher bit lengths. Comparative analysis with RSA and ECC shows Falcon’s superiority in quantum resistance and a balanced trade-off between computational cost and communication efficiency. Although Falcon incurs relatively higher encryption and decryption delays, its security guarantees and scalability make it a strong candidate for deployment in VANETs. This research confirms that Falcon provides a feasible, quantum-resistant solution for securing smart transportation ecosystems while meeting the stringent real-time requirements of vehicular communications.
{"title":"Enhancing quantum-resistant data privacy in vehicular cloud networks using NIST-qualified FALCON algorithm","authors":"Mritunjay Shall Peelam , Brijesh Kumar Chaurasia , Man Mohan Shukla , Vinay Chamola","doi":"10.1016/j.vehcom.2025.100995","DOIUrl":"10.1016/j.vehcom.2025.100995","url":null,"abstract":"<div><div>Road safety, congestion, pollution, and data security are critical challenges in the development of smart transportation systems. Vehicular Ad-hoc Networks (VANETs) form the backbone of such systems by enabling real-time communication, accident management, and traffic monitoring. However, the vast data generated in VANETs is increasingly vulnerable in the post-quantum era, where traditional cryptographic methods like RSA, ECC, and DSA fail to withstand quantum attacks. To address this, we propose the integration of the NIST-qualified Falcon algorithm, a lattice-based post-quantum cryptographic scheme, to ensure confidentiality, integrity, and resilience of vehicular communication. The proposed scheme is implemented and evaluated in a Vehicular Network Cloud (VNC) environment on different computational platforms, including Apple Silicon M1 Max and AMD Ryzen systems. Experimental results demonstrate that Falcon achieves practical signing and verification delays (22 ms and 17 ms on M1), while maintaining robust key generation performance even at higher bit lengths. Comparative analysis with RSA and ECC shows Falcon’s superiority in quantum resistance and a balanced trade-off between computational cost and communication efficiency. Although Falcon incurs relatively higher encryption and decryption delays, its security guarantees and scalability make it a strong candidate for deployment in VANETs. This research confirms that Falcon provides a feasible, quantum-resistant solution for securing smart transportation ecosystems while meeting the stringent real-time requirements of vehicular communications.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100995"},"PeriodicalIF":6.5,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145894647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-24DOI: 10.1016/j.vehcom.2025.100997
Shucheng Ying , Xiumei Li , Qi Xie
Connected Autonomous Vehicles (CAVs) can significantly enhance perception accuracy, optimize driving routes, and improve traffic efficiency and safety through collaborative road environment sensing. However, sharing image data among vehicles raises serious privacy concerns. Although various privacy-preserving computation techniques, such as homomorphic encryption, garbled circuits, and additive secret sharing, have been proposed to address this issue, most existing methods lack secure communication protocols between vehicles and edge servers (Vehicle-to-Edge Server, V2ES) as well as between edge servers. As a result, they remain vulnerable to collusion attacks, device capture attacks, and side-channel attacks, as well as incur high computational overhead. To address these challenges, an efficient and privacy-preserving computation scheme designed specifically for the faster region-convolutional neural network (R-CNN) object detection of CAVs is proposed, which has several advantages: (1) The first safe and practical object detection system model for CAVs is established; (2) The first secure and lightweight road side unit(RSU)-assisted V2ES authentication protocol and secure communication mechanism between edge servers are proposed to effectively resist collusion attacks and side channel attacks in the object detection scheme for CAVs; and (3) The multiplication and division protocols of Bi et al.’s scheme are optimized, significantly improving both computational and communication efficiency. The proposed RSU-assisted V2ES authentication protocol is provably secure under the Canetti-Krawczyk (CK) model and the extended security model. The experimental results further confirm that the proposed scheme significantly improves computational performance while ensuring data privacy, with multiplication efficiency improved by about 3.13 times and its communication overhead reduced by 50%, and division efficiency improved by 2.26 times and its communication overhead reduced by 60%.
{"title":"Secure and efficient V2ES authentication protocol and faster-RCNN based object detection scheme for connected autonomous vehicles","authors":"Shucheng Ying , Xiumei Li , Qi Xie","doi":"10.1016/j.vehcom.2025.100997","DOIUrl":"10.1016/j.vehcom.2025.100997","url":null,"abstract":"<div><div>Connected Autonomous Vehicles (CAVs) can significantly enhance perception accuracy, optimize driving routes, and improve traffic efficiency and safety through collaborative road environment sensing. However, sharing image data among vehicles raises serious privacy concerns. Although various privacy-preserving computation techniques, such as homomorphic encryption, garbled circuits, and additive secret sharing, have been proposed to address this issue, most existing methods lack secure communication protocols between vehicles and edge servers (Vehicle-to-Edge Server, V2ES) as well as between edge servers. As a result, they remain vulnerable to collusion attacks, device capture attacks, and side-channel attacks, as well as incur high computational overhead. To address these challenges, an efficient and privacy-preserving computation scheme designed specifically for the faster region-convolutional neural network (R-CNN) object detection of CAVs is proposed, which has several advantages: (1) The first safe and practical object detection system model for CAVs is established; (2) The first secure and lightweight road side unit(RSU)-assisted V2ES authentication protocol and secure communication mechanism between edge servers are proposed to effectively resist collusion attacks and side channel attacks in the object detection scheme for CAVs; and (3) The multiplication and division protocols of Bi et al.’s scheme are optimized, significantly improving both computational and communication efficiency. The proposed RSU-assisted V2ES authentication protocol is provably secure under the Canetti-Krawczyk (CK) model and the extended security model. The experimental results further confirm that the proposed scheme significantly improves computational performance while ensuring data privacy, with multiplication efficiency improved by about 3.13 times and its communication overhead reduced by 50%, and division efficiency improved by 2.26 times and its communication overhead reduced by 60%.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100997"},"PeriodicalIF":6.5,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145823369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-22DOI: 10.1016/j.vehcom.2025.100996
Vikas Hassija , Tamonash Majumder , Debangshu Roy , Raja Piyush , Vinay Chamola
Large Language Models (LLMs) are transforming Intelligent Transportation Systems (ITS) by shifting operations from static, rule based systems toward adaptive, data-driven decision-making. This paper presents a comprehensive methodological and application-focused survey of LLMs in ITS, grounded in transformer-based architectures like GPT-4, BERT, and LlaMa. We analyze the technical challenge of integrating diverse multimodal data including sensor logs, visual inputs, and textual reports via cross-modal fusion strategies. The survey examines key applications such as traffic signal optimization, predictive maintenance, V2X communication, public transport scheduling, and route personalization. Furthermore, we detail core methodologies (e.g., fine- tuning, Chain-of-Thought prompting, federated learning, RLHF) used to enhance LLM performance under real-time conditions and assess explainability frameworks (SHAP, LIME) to foster trust. We also identify critical challenges, including model hallucination, privacy risks, resource demands, and latency constraints. By synthesizing insights from over 200 primary research contributions, this work offers a foundational reference for designing scalable, intelligent, and ethically aligned ITS architectures.
{"title":"The role of large language models (LLMs) in enhancing intelligent transportation systems: A survey","authors":"Vikas Hassija , Tamonash Majumder , Debangshu Roy , Raja Piyush , Vinay Chamola","doi":"10.1016/j.vehcom.2025.100996","DOIUrl":"10.1016/j.vehcom.2025.100996","url":null,"abstract":"<div><div>Large Language Models (LLMs) are transforming Intelligent Transportation Systems (ITS) by shifting operations from static, rule based systems toward adaptive, data-driven decision-making. This paper presents a comprehensive methodological and application-focused survey of LLMs in ITS, grounded in transformer-based architectures like GPT-4, BERT, and LlaMa. We analyze the technical challenge of integrating diverse multimodal data including sensor logs, visual inputs, and textual reports via cross-modal fusion strategies. The survey examines key applications such as traffic signal optimization, predictive maintenance, V2X communication, public transport scheduling, and route personalization. Furthermore, we detail core methodologies (e.g., fine- tuning, Chain-of-Thought prompting, federated learning, RLHF) used to enhance LLM performance under real-time conditions and assess explainability frameworks (SHAP, LIME) to foster trust. We also identify critical challenges, including model hallucination, privacy risks, resource demands, and latency constraints. By synthesizing insights from over 200 primary research contributions, this work offers a foundational reference for designing scalable, intelligent, and ethically aligned ITS architectures.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100996"},"PeriodicalIF":6.5,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145813956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-20DOI: 10.1016/j.vehcom.2025.100994
Abdullahi Yahya Imam , Fagen Li , Hamisu Ibrahim Usman , Muhammad Hanif Tunio
Recent developments in the internet of things (IoT) and vehicular ad hoc network (VANET) significantly improve traffic management and safety. At the same time, several security challenges come alongside these improvements. Numerous research works have proposed different solutions to these security challenges using various cryptographic techniques. To maximize efficiency, recent works have developed several certificateless aggregate signcryption (CLASC) schemes without using the expensive bilinear pairing operations. However, recent studies have revealed various security flaws in many schemes, making them vulnerable to key replacement attacks that can lead to impersonation. Considering these security issues and the significance of high performance, we develop a novel pairing-free CLASC scheme for anonymous authentication in VANETs. To further improve the performance especially for real time communication, we devised a method of shifting the time consuming computations to offline operations. The confidentiality and unforgeability security of this scheme have been proved formally in random oracle model (ROM). Further analysis has demonstrated that the proposed scheme achieves other security requirements essential for anonymous authentication in VANET. Analysis of performances has shown that our scheme has shortest average transmission delay, specifically due to its very low computational overhead.
{"title":"Lightweight anonymous aggregate authentication in VANET based on offline/online certificateless signcryption using one-time key","authors":"Abdullahi Yahya Imam , Fagen Li , Hamisu Ibrahim Usman , Muhammad Hanif Tunio","doi":"10.1016/j.vehcom.2025.100994","DOIUrl":"10.1016/j.vehcom.2025.100994","url":null,"abstract":"<div><div>Recent developments in the internet of things (IoT) and vehicular ad hoc network (VANET) significantly improve traffic management and safety. At the same time, several security challenges come alongside these improvements. Numerous research works have proposed different solutions to these security challenges using various cryptographic techniques. To maximize efficiency, recent works have developed several certificateless aggregate signcryption (CLASC) schemes without using the expensive bilinear pairing operations. However, recent studies have revealed various security flaws in many schemes, making them vulnerable to key replacement attacks that can lead to impersonation. Considering these security issues and the significance of high performance, we develop a novel pairing-free CLASC scheme for anonymous authentication in VANETs. To further improve the performance especially for real time communication, we devised a method of shifting the time consuming computations to offline operations. The confidentiality and unforgeability security of this scheme have been proved formally in random oracle model (ROM). Further analysis has demonstrated that the proposed scheme achieves other security requirements essential for anonymous authentication in VANET. Analysis of performances has shown that our scheme has shortest average transmission delay, specifically due to its very low computational overhead.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"58 ","pages":"Article 100994"},"PeriodicalIF":6.5,"publicationDate":"2025-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145796044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-07DOI: 10.1016/j.vehcom.2025.100993
Yilin Wu , Qian Zhao , Yonggui Liu , Zeming Li , Zhiping Shen
This article discusses the cooperative control problem for heterogeneous vehicle platoons subject to non-ideal factors, specifically communication time-varying delays, system noises and intermittent observations. The main idea is to construct the internal reference models to generate common signals for all vehicles. First, in ideal situations under a directed acyclic topology (DAT), a distributed controller is proposed based on the properties of lower triangular matrices and solving an algebraic Riccati equation (ARE); Second, for non–ideal situations under uniformly quasi-strongly connected topology, optimal states are estimated using intermittent observations, and a distributed controller is designed to maintain the platoon’s mean square stability (MSS). Compared to the control methods in existing literatures, the proposed control approaches in this paper, relying on the system’s output information rather than state information, can effectively suppress the impacts of vehicle heterogeneity and the aforementioned non–ideal factors on platoon stability. Simulations are conducted to demonstrate a superior convergence speed compared to those in the literatures.
{"title":"Cooperative control of heterogeneous vehicle platoons under communication time–varying delays and intermittent observations","authors":"Yilin Wu , Qian Zhao , Yonggui Liu , Zeming Li , Zhiping Shen","doi":"10.1016/j.vehcom.2025.100993","DOIUrl":"10.1016/j.vehcom.2025.100993","url":null,"abstract":"<div><div>This article discusses the cooperative control problem for heterogeneous vehicle platoons subject to non-ideal factors, specifically communication time-varying delays, system noises and intermittent observations. The main idea is to construct the internal reference models to generate common signals for all vehicles. First, in ideal situations under a directed acyclic topology (DAT), a distributed controller is proposed based on the properties of lower triangular matrices and solving an algebraic Riccati equation (ARE); Second, for non–ideal situations under uniformly quasi-strongly connected topology, optimal states are estimated using intermittent observations, and a distributed controller is designed to maintain the platoon’s mean square stability (MSS). Compared to the control methods in existing literatures, the proposed control approaches in this paper, relying on the system’s output information rather than state information, can effectively suppress the impacts of vehicle heterogeneity and the aforementioned non–ideal factors on platoon stability. Simulations are conducted to demonstrate a superior convergence speed compared to those in the literatures.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100993"},"PeriodicalIF":6.5,"publicationDate":"2025-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145689755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-28DOI: 10.1016/j.vehcom.2025.100992
Xiang Zou , Deng Pan , Guozhen Shi , Shuhan Yu , Jianguo Xie
As intelligent transportation advances, the backbone of smart mobility is Vehicular Ad Hoc Networks (VANETs), which nevertheless remain vulnerable to security threats stemming from high node mobility, dynamic topologies, and open wireless channels. Traditional security frameworks grapple with cumbersome key management in VANETs’ dynamic ecosystems, while quantum computing poses a fundamental threat to conventional cryptographic protocols. Existing post-quantum signature schemes often suffer from oversized keys and signatures, coupled with reliance on complex operations like trapdoor generation, limiting their applicability to resource-constrained vehicular devices.We propose V-PISL, a lattice-based post-quantum identity-based signature scheme tailored for VANETs. Built on the Dilithium framework and algebraic lattices, it eliminates trapdoor mechanisms, with security grounded in the Module Short Integer Solution (MSIS) and Module Learning With Errors (MLWE) problems. Experimental results demonstrate V-PISL’s efficiency across 112-bit, 169-bit, and 241-bit security levels. Its 1312-byte system public key delivers more than 91.1 % storage efficiency gains compared to the latest schemes (LB-IBS and PQ-ISS), with an overall storage efficiency improvement of 62.6 %, and the response speed reaches the millisecond level. Thus, V-PISL provides a practical postquantum security solution for resource-constrained vehicular environments.
{"title":"V-PISL:Post-quantum identity-based signature scheme over lattice for VANETs","authors":"Xiang Zou , Deng Pan , Guozhen Shi , Shuhan Yu , Jianguo Xie","doi":"10.1016/j.vehcom.2025.100992","DOIUrl":"10.1016/j.vehcom.2025.100992","url":null,"abstract":"<div><div>As intelligent transportation advances, the backbone of smart mobility is Vehicular Ad Hoc Networks (VANETs), which nevertheless remain vulnerable to security threats stemming from high node mobility, dynamic topologies, and open wireless channels. Traditional security frameworks grapple with cumbersome key management in VANETs’ dynamic ecosystems, while quantum computing poses a fundamental threat to conventional cryptographic protocols. Existing post-quantum signature schemes often suffer from oversized keys and signatures, coupled with reliance on complex operations like trapdoor generation, limiting their applicability to resource-constrained vehicular devices.We propose V-PISL, a lattice-based post-quantum identity-based signature scheme tailored for VANETs. Built on the Dilithium framework and algebraic lattices, it eliminates trapdoor mechanisms, with security grounded in the Module Short Integer Solution (MSIS) and Module Learning With Errors (MLWE) problems. Experimental results demonstrate V-PISL’s efficiency across 112-bit, 169-bit, and 241-bit security levels. Its 1312-byte system public key delivers more than 91.1 % storage efficiency gains compared to the latest schemes (LB-IBS and PQ-ISS), with an overall storage efficiency improvement of 62.6 %, and the response speed reaches the millisecond level. Thus, V-PISL provides a practical postquantum security solution for resource-constrained vehicular environments.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100992"},"PeriodicalIF":6.5,"publicationDate":"2025-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145613791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-17DOI: 10.1016/j.vehcom.2025.100985
Timo Salomon , Lisa Maile , Philipp Meyer , Franz Korf , Thomas C. Schmidt
Future vehicles are expected to dynamically deploy in-vehicle applications within a Service-Oriented Architecture (SOA) while critical services continue to operate under hard real-time constraints. Time-Sensitive Networking (TSN) on the in-vehicle Ethernet layer is dedicated to ensure deterministic communication between critical services; its Credit-Based Shaper (CBS) supports dynamic resource reservations. However, the dynamic nature of service deployment challenges network resource configuration, since any new reservation may change the latency of already validated flows. Standard methods of worst-case latency analysis for CBS have been found incorrect, and current TSN stream reservation procedures lack mechanisms to signal application layer Quality-of-Service (QoS) requirements or verify deadlines.
In this paper, we propose and validate a QoS negotiation scheme that interacts with the TSN network controller to reserve resources while ensuring latency bounds. For the first time, this work comparatively evaluates reservation schemes using worst-case analysis and simulations of a realistic In-Vehicle Network (IVN) and demonstrates their impact on QoS guarantees, resource utilization, and setup times. We find that only one reservation scheme utilizing per-queue delay budgets and network calculus provides valid configurations and guarantees acceptable latency bounds throughout the IVN. The proposed service negotiation mechanism efficiently establishes 450 vehicular network reservations in just 11 ms.
{"title":"Negotiating strict latency limits for dynamic real-time services in vehicular time-sensitive networks","authors":"Timo Salomon , Lisa Maile , Philipp Meyer , Franz Korf , Thomas C. Schmidt","doi":"10.1016/j.vehcom.2025.100985","DOIUrl":"10.1016/j.vehcom.2025.100985","url":null,"abstract":"<div><div>Future vehicles are expected to dynamically deploy in-vehicle applications within a Service-Oriented Architecture (SOA) while critical services continue to operate under hard real-time constraints. Time-Sensitive Networking (TSN) on the in-vehicle Ethernet layer is dedicated to ensure deterministic communication between critical services; its Credit-Based Shaper (CBS) supports dynamic resource reservations. However, the dynamic nature of service deployment challenges network resource configuration, since any new reservation may change the latency of already validated flows. Standard methods of worst-case latency analysis for CBS have been found incorrect, and current TSN stream reservation procedures lack mechanisms to signal application layer Quality-of-Service (QoS) requirements or verify deadlines.</div><div>In this paper, we propose and validate a QoS negotiation scheme that interacts with the TSN network controller to reserve resources while ensuring latency bounds. For the first time, this work comparatively evaluates reservation schemes using worst-case analysis and simulations of a realistic In-Vehicle Network (IVN) and demonstrates their impact on QoS guarantees, resource utilization, and setup times. We find that only one reservation scheme utilizing per-queue delay budgets and network calculus provides valid configurations and guarantees acceptable latency bounds throughout the IVN. The proposed service negotiation mechanism efficiently establishes 450 vehicular network reservations in just 11 ms.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100985"},"PeriodicalIF":6.5,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145535999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}