首页 > 最新文献

Vehicular Communications最新文献

英文 中文
Physical layer security in SWIPT-based cooperative vehicular relaying networks 基于 SWIPT 的合作式车载中继网络的物理层安全性
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-19 DOI: 10.1016/j.vehcom.2024.100835

The future of autonomous transportation systems depends on energy sustainability and secure information exchange from low-power vehicular sensors, hence the increased interest in vehicular sensor charging using simultaneous wireless information and power transfer (SWIPT). This study investigates the physical layer security of a SWIPT-based radio frequency energy harvesting cooperative vehicular relaying network subjected to cascade Nakagami-m and double Nakagami-m (DN) fading channels. In the considered system model, a stationary source communicates with a mobile destination through a power-splitting-based decode-and-forward relay in the presence of a mobile passive eavesdropper. Based on the Gamma-distributed first term of the Laguerre series, new statistical probability density function (PDF) and cumulative distribution function (CDF) expressions for the DN are derived to accurately model the complex cascaded fading scenario. The secrecy performance metrics analyzed are the secrecy outage probability (SOP), the probability of non-zero secrecy capacity (PNZSC), and the intercept probability (IP). In addition, the asymptotic SOP (ASOP) is investigated in the high signal-to-noise ratio (SNR) to enhance the comprehension of the secrecy performance. Based on the derived ASOP, the secrecy diversity order (SDO) of the proposed system is determined and examined. Particularly, we present analytical closed-form expressions for the secrecy performance metrics and provide a detailed understanding of the impact of the system parameters under the cascade fading scenario. Then, a power splitting (PS) optimization problem is formulated to minimize the SOP. The results demonstrate a reduction in the SOP with the proposed PS scheme compared to the equal PS scheme. The obtained analytical findings are validated using Monte Carlo simulations.

自动交通系统的未来取决于能源的可持续性和低功耗车辆传感器的安全信息交换,因此人们对使用同步无线信息和功率传输(SWIPT)的车辆传感器充电越来越感兴趣。本研究探讨了基于 SWIPT 的射频能量收集合作车辆中继网络在级联中上-m 和双中上-m(DN)衰落信道下的物理层安全性。在所考虑的系统模型中,固定信源通过基于功率分配的解码前向中继与移动目的地通信,同时存在一个移动被动窃听者。基于 Laguerre 序列的伽马分布第一项,推导出了 DN 的新统计概率密度函数 (PDF) 和累积分布函数 (CDF) 表达式,以准确模拟复杂的级联衰落场景。分析的保密性能指标包括保密中断概率 (SOP)、非零保密容量概率 (PNZSC) 和截获概率 (IP)。此外,还研究了高信噪比(SNR)下的渐进 SOP(ASOP),以加深对保密性能的理解。根据推导出的 ASOP,确定并检验了所提系统的保密分集阶(SDO)。特别是,我们提出了保密性能指标的解析闭式表达式,并详细说明了级联衰落情况下系统参数的影响。然后,我们提出了一个功率分配(PS)优化问题,以最小化 SOP。结果表明,与等功率 PS 方案相比,所提出的 PS 方案降低了 SOP。蒙特卡罗模拟验证了所获得的分析结果。
{"title":"Physical layer security in SWIPT-based cooperative vehicular relaying networks","authors":"","doi":"10.1016/j.vehcom.2024.100835","DOIUrl":"10.1016/j.vehcom.2024.100835","url":null,"abstract":"<div><p>The future of autonomous transportation systems depends on energy sustainability and secure information exchange from low-power vehicular sensors, hence the increased interest in vehicular sensor charging using simultaneous wireless information and power transfer (SWIPT). This study investigates the physical layer security of a SWIPT-based radio frequency energy harvesting cooperative vehicular relaying network subjected to cascade Nakagami-<em>m</em> and double Nakagami-<em>m</em> (DN) fading channels. In the considered system model, a stationary source communicates with a mobile destination through a power-splitting-based decode-and-forward relay in the presence of a mobile passive eavesdropper. Based on the Gamma-distributed first term of the Laguerre series, new statistical probability density function (PDF) and cumulative distribution function (CDF) expressions for the DN are derived to accurately model the complex cascaded fading scenario. The secrecy performance metrics analyzed are the secrecy outage probability (SOP), the probability of non-zero secrecy capacity (PNZSC), and the intercept probability (IP). In addition, the asymptotic SOP (ASOP) is investigated in the high signal-to-noise ratio (SNR) to enhance the comprehension of the secrecy performance. Based on the derived ASOP, the secrecy diversity order (SDO) of the proposed system is determined and examined. Particularly, we present analytical closed-form expressions for the secrecy performance metrics and provide a detailed understanding of the impact of the system parameters under the cascade fading scenario. Then, a power splitting (PS) optimization problem is formulated to minimize the SOP. The results demonstrate a reduction in the SOP with the proposed PS scheme compared to the equal PS scheme. The obtained analytical findings are validated using Monte Carlo simulations.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the impact of communication delays for Autonomous Intersection Management systems 评估自主交叉口管理系统通信延迟的影响
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-02 DOI: 10.1016/j.vehcom.2024.100829

Communication is essential for Cooperative Intelligent Transportation Systems (C-ITS) to achieve better road efficiency, especially for Autonomous Intersection Management (AIM) which coordinates vehicles to pass the intersection safely and efficiently. Communication delays cause severe safety crises (i.e., collisions) and vehicular-performance degradation regarding intersection capacities and vehicular delays. Targeting the delays, network researchers have been working on low-latency communication technologies, and C-ITS researchers have proposed delay-tolerant AIM systems to avoid collisions in intersections. The impacts of communication delays are observed and discussed in the literature; however, models and assessments of the delay requirements for AIM are needed to provide insights for future network and C-ITS research. Here, we model the impact of communication delays on vehicular performance at an autonomous intersection and validate the models with the simulation results from over two million experiments, two types of multi-lane intersections (a typical 4-legged intersection and a roundabout), and four AIM systems. The simulations are conducted with SUMO simulator and AIM systems, where communication delays are inserted into the message exchanges during the simulation. The models are represented in linear, quintic, and cubic polynomials, showing that communication delay between 0 to 100 milliseconds is linearly related to vehicular performance in terms of intersection capacity and vehicular delay. According to the models, we show that by reducing communication delay from 100 to 10 milliseconds, the capacity degradation can be reduced from 7-10% to 0.7-1.0%. Moreover, communication delays must be less than 247 milliseconds to allow AIM systems to outperform traditional traffic lights.

通信对于协同智能交通系统(C-ITS)实现更高的道路效率至关重要,尤其是对于协调车辆安全高效通过交叉路口的自主交叉路口管理(AIM)而言。通信延迟会导致严重的安全危机(即碰撞),并在交叉路口通行能力和车辆延迟方面造成车辆性能下降。针对延迟问题,网络研究人员一直在研究低延迟通信技术,而 C-ITS 研究人员则提出了容错 AIM 系统,以避免交叉路口发生碰撞。文献中对通信延迟的影响进行了观察和讨论;但是,需要对 AIM 的延迟要求进行建模和评估,以便为未来的网络和 C-ITS 研究提供见解。在此,我们建立了通信延迟对自主交叉路口车辆性能影响的模型,并通过两百多万次实验、两种类型的多车道交叉路口(典型的四脚交叉路口和环形交叉路口)以及四个 AIM 系统的仿真结果对模型进行了验证。模拟是通过 SUMO 模拟器和 AIM 系统进行的,在模拟过程中会在信息交换中插入通信延迟。模型以线性、五次多项式和三次多项式表示,表明 0 至 100 毫秒之间的通信延迟与交叉口容量和车辆延迟方面的车辆性能呈线性关系。根据这些模型,我们可以看出,将通信延迟从 100 毫秒减少到 10 毫秒,通行能力下降率可从 7%-10%减少到 0.7%-1.0%。此外,通信延迟必须小于 247 毫秒,AIM 系统才能优于传统交通信号灯。
{"title":"Assessing the impact of communication delays for Autonomous Intersection Management systems","authors":"","doi":"10.1016/j.vehcom.2024.100829","DOIUrl":"10.1016/j.vehcom.2024.100829","url":null,"abstract":"<div><p>Communication is essential for Cooperative Intelligent Transportation Systems (C-ITS) to achieve better road efficiency, especially for Autonomous Intersection Management (AIM) which coordinates vehicles to pass the intersection safely and efficiently. Communication delays cause severe safety crises (i.e., collisions) and vehicular-performance degradation regarding intersection capacities and vehicular delays. Targeting the delays, network researchers have been working on low-latency communication technologies, and C-ITS researchers have proposed delay-tolerant AIM systems to avoid collisions in intersections. The impacts of communication delays are observed and discussed in the literature; however, models and assessments of the delay requirements for AIM are needed to provide insights for future network and C-ITS research. Here, we model the impact of communication delays on vehicular performance at an autonomous intersection and validate the models with the simulation results from over two million experiments, two types of multi-lane intersections (a typical 4-legged intersection and a roundabout), and four AIM systems. The simulations are conducted with SUMO simulator and AIM systems, where communication delays are inserted into the message exchanges during the simulation. The models are represented in linear, quintic, and cubic polynomials, showing that communication delay between 0 to 100 milliseconds is linearly related to vehicular performance in terms of intersection capacity and vehicular delay. According to the models, we show that by reducing communication delay from 100 to 10 milliseconds, the capacity degradation can be reduced from 7-10% to 0.7-1.0%. Moreover, communication delays must be less than 247 milliseconds to allow AIM systems to outperform traditional traffic lights.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141909457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HCFAIUN: A novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks HCFAIUN: 基于超椭圆曲线和模糊提取器的新型认证技术,用于基于物联网的无人机网络中的安全数据传输
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-07-26 DOI: 10.1016/j.vehcom.2024.100834

IoT-based UAV networks comprise interconnected UAVs outfitted with sensors and microcontrollers to simplify data exchange in environments such as smart cities. In light of open-access communication landscapes, IoT-based UAV networks could pose security challenges, encompassing authentication vulnerabilities and the inadvertent disclosure of location and other confidential information to unauthorised parties. Henceforth, we have proposed a lightweight and secure authentication protocol: Hyperelliptic Curve and Fuzzy Extractor based Authentication in IoT-based UAV networks (HCFAIUN) leveraging Hyperelliptic Curve Cryptography(HCC), Fuzzy Extractor (FE), XOR operations and hash functions. HCC's maximum key size is 80 bits, differing from the 160-bit requirement of the elliptic curve, making it apt for UAVs with limited resources. The proposed scheme utilises biometrics traits of users to avoid exposing data from stealing smart devices using FE. This protocol facilitates the mutual authentication of users and UAVs, allowing them to exchange a session key for secure communication. The Hyperelliptic Curve (HC) scalar multiplication protects the user's private key from attackers, even in public channels. The obfuscation identity of the user and UAVs generated through the hash function and timestamp makes the external user and UAV anonymous. The efficacy of this proposed framework is examined using the Scyther verification tool and Random oracle model-based formal analysis, and informal analysis is also discussed, which validates its robustness against well-known potential physical and logical attacks. The performance analysis shows that the HCFAIUN scheme has lower computation, communication, and storage costs, i.e., 3.832 ms and 1456 bits and 1128 bits, respectively, compared to existing schemes.

基于物联网的无人机网络由配备传感器和微控制器的互联无人机组成,可简化智能城市等环境中的数据交换。鉴于开放访问的通信环境,基于物联网的无人机网络可能会带来安全挑战,包括身份验证漏洞以及无意中向未经授权方泄露位置和其他机密信息。因此,我们提出了一种轻量级安全认证协议:基于超椭圆曲线和模糊提取器的物联网无人机网络身份验证(HCFAIUN)利用了超椭圆曲线加密法(HCC)、模糊提取器(FE)、XOR 运算和哈希函数。HCC 的最大密钥大小为 80 位,不同于椭圆曲线的 160 位要求,因此适用于资源有限的无人机。所提出的方案利用了用户的生物识别特征,避免了使用 FE 窃取智能设备的数据。该协议促进了用户和无人飞行器的相互验证,使他们能够交换会话密钥,实现安全通信。超椭圆曲线(HC)标量乘法可保护用户的私钥免受攻击,即使在公开渠道中也是如此。通过哈希函数和时间戳生成的用户和无人机的混淆身份使外部用户和无人机匿名。使用 Scyther 验证工具和基于随机甲骨文模型的形式分析检验了所提框架的有效性,还讨论了非正式分析,验证了其对众所周知的潜在物理和逻辑攻击的鲁棒性。性能分析表明,与现有方案相比,HCFAIUN 方案的计算、通信和存储成本更低,分别为 3.832 毫秒、1456 比特和 1128 比特。
{"title":"HCFAIUN: A novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks","authors":"","doi":"10.1016/j.vehcom.2024.100834","DOIUrl":"10.1016/j.vehcom.2024.100834","url":null,"abstract":"<div><p>IoT-based UAV networks comprise interconnected UAVs outfitted with sensors and microcontrollers to simplify data exchange in environments such as smart cities. In light of open-access communication landscapes, IoT-based UAV networks could pose security challenges, encompassing authentication vulnerabilities and the inadvertent disclosure of location and other confidential information to unauthorised parties. Henceforth, we have proposed a lightweight and secure authentication protocol: Hyperelliptic Curve and Fuzzy Extractor based Authentication in IoT-based UAV networks (HCFAIUN) leveraging Hyperelliptic Curve Cryptography(HCC), Fuzzy Extractor (FE), XOR operations and hash functions. HCC's maximum key size is 80 bits, differing from the 160-bit requirement of the elliptic curve, making it apt for UAVs with limited resources. The proposed scheme utilises biometrics traits of users to avoid exposing data from stealing smart devices using FE. This protocol facilitates the mutual authentication of users and UAVs, allowing them to exchange a session key for secure communication. The Hyperelliptic Curve (HC) scalar multiplication protects the user's private key from attackers, even in public channels. The obfuscation identity of the user and UAVs generated through the hash function and timestamp makes the external user and UAV anonymous. The efficacy of this proposed framework is examined using the Scyther verification tool and Random oracle model-based formal analysis, and informal analysis is also discussed, which validates its robustness against well-known potential physical and logical attacks. The performance analysis shows that the HCFAIUN scheme has lower computation, communication, and storage costs, i.e., 3.832 ms and 1456 bits and 1128 bits, respectively, compared to existing schemes.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141846723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating energy harvesting UAV-NOMA network with random user pairing in the finite blocklength regime 评估有限块长范围内随机用户配对的能量收集无人机-NOMA 网络
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-07-26 DOI: 10.1016/j.vehcom.2024.100831

This study proposes an integrated system that combines energy harvesting (EH) enabled unmanned aerial vehicles (UAVs) with non-orthogonal multiple access (NOMA) to enhance communication system performance within a cellular network. Addressing the limitations of existing analyses that often assume an infinite blocklength scenario, we explore EH-enabled UAV-NOMA systems within a cellular framework under a finite blocklength (FBL) scenario. The study investigates the complex interactions and advantages resulting from the integration of EH, NOMA, and UAV technologies, aiming to assess whether EH can sustain communication within this framework. The network model considers base stations (BSs), UAVs, and terrestrial devices distributed with independent Poisson point processes (PPPs) over a large area. In this network, BSs employ NOMA to serve cell center devices directly, while cell edge devices, which are nor in direct contact with BS, are served via simultaneous wireless information and power transfer (SWIPT) enabled UAVs. The study derives metrics including joint harvesting and decoding probability for a randomly selected UAV, coverage probability (CP) for cell devices, and end-to-end block error rate (BLER) probabilities for typical device pairs. The findings demonstrate that the proposed scheme effectively supplies all the necessary transmit power for communication purposes through EH, achieving reasonable reliability. Additionally, the study highlights the importance of considering a combination of blocklengths from different phases to achieve optimal performance, rather than solely relying on an increment in blocklength. Finally, the effects of parameter variations on network performance are examined.

本研究提出了一种集成系统,将支持能量收集(EH)的无人机(UAV)与非正交多址(NOMA)相结合,以提高蜂窝网络内的通信系统性能。针对现有分析通常假设无限块长场景的局限性,我们探讨了有限块长(FBL)场景下蜂窝框架内的 EH 无人机-NOMA 系统。本研究探讨了 EH、NOMA 和无人机技术整合后产生的复杂交互作用和优势,旨在评估 EH 能否在此框架内维持通信。该网络模型考虑了基站(BS)、无人机和地面设备,它们以独立的泊松点过程(PPP)分布在大片区域。在该网络中,基站采用 NOMA 直接为小区中心设备提供服务,而小区边缘设备(与基站没有直接联系)则通过支持同步无线信息和功率传输 (SWIPT) 的无人机提供服务。研究得出的指标包括随机选择的无人机的联合采集和解码概率、小区设备的覆盖概率(CP)以及典型设备对的端到端块错误率(BLER)概率。研究结果表明,所提出的方案通过 EH 有效地提供了通信所需的全部发射功率,实现了合理的可靠性。此外,该研究还强调了考虑不同阶段的分块长度组合以实现最佳性能的重要性,而不是仅仅依赖于分块长度的增加。最后,研究还探讨了参数变化对网络性能的影响。
{"title":"Evaluating energy harvesting UAV-NOMA network with random user pairing in the finite blocklength regime","authors":"","doi":"10.1016/j.vehcom.2024.100831","DOIUrl":"10.1016/j.vehcom.2024.100831","url":null,"abstract":"<div><p>This study proposes an integrated system that combines energy harvesting (EH) enabled unmanned aerial vehicles (UAVs) with non-orthogonal multiple access (NOMA) to enhance communication system performance within a cellular network. Addressing the limitations of existing analyses that often assume an infinite blocklength scenario, we explore EH-enabled UAV-NOMA systems within a cellular framework under a finite blocklength (FBL) scenario. The study investigates the complex interactions and advantages resulting from the integration of EH, NOMA, and UAV technologies, aiming to assess whether EH can sustain communication within this framework. The network model considers base stations (BSs), UAVs, and terrestrial devices distributed with independent Poisson point processes (PPPs) over a large area. In this network, BSs employ NOMA to serve cell center devices directly, while cell edge devices, which are nor in direct contact with BS, are served via simultaneous wireless information and power transfer (SWIPT) enabled UAVs. The study derives metrics including joint harvesting and decoding probability for a randomly selected UAV, coverage probability (CP) for cell devices, and end-to-end block error rate (BLER) probabilities for typical device pairs. The findings demonstrate that the proposed scheme effectively supplies all the necessary transmit power for communication purposes through EH, achieving reasonable reliability. Additionally, the study highlights the importance of considering a combination of blocklengths from different phases to achieve optimal performance, rather than solely relying on an increment in blocklength. Finally, the effects of parameter variations on network performance are examined.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141853674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain 基于分层分区区块链的条件隐私保护和高效分布式物联网数据共享方案
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-07-26 DOI: 10.1016/j.vehcom.2024.100832

With the prevalence of intelligent driving, the vehicular data corresponding to driving safety and traffic management efficiency is widely applied by the Internet of Vehicles (IoV) applications. Vehicular data is shared frequently in IoV, leading to privacy leakage of the message sender, yet most privacy-preserving measures bring difficulties for receivers to detect malicious messages. To trade-off between privacy and security, conditional privacy-preserving authentication (CPPA) solutions have been proposed. However, CPPA protocols deployed in IoV rely on hardware devices or center servers to manage key generation and updates. This paper proposed a blockchain-based CPPA mechanism for IoV data-sharing to mitigate these challenges. A hierarchical key generation mechanism is presented to protect drivers' privacy and authenticate messages which is suitable for resource-limited IoV nodes. Management nodes can issue temporary pseudo-identity (PID) from their keys for vehicles to interact in their area and trace the malicious behaviors, but know nothing about vehicles' activities outside their administration. A hierarchical and zonal blockchain is presented to realize distributed fine-grained IoV management and enhance efficiency concerning traditional blockchain. Specifically, we propose a cross-domain data-sharing mechanism, which can facilitate efficient communication and a mutual cross-domain chain verification to guarantee the security of each domain blockchain in our IoV system. The security analysis and performance evaluation demonstrate the security as well as computational and storage efficiency of our scheme.

随着智能驾驶的普及,与驾驶安全和交通管理效率相对应的车辆数据被广泛应用于车联网(IoV)应用中。车联网中车辆数据共享频繁,导致信息发送方隐私泄露,而大多数隐私保护措施又给接收方检测恶意信息带来困难。为了在隐私和安全之间做出权衡,人们提出了有条件的隐私保护认证(CPPA)解决方案。然而,物联网中部署的 CPPA 协议依赖于硬件设备或中心服务器来管理密钥的生成和更新。本文为物联网数据共享提出了一种基于区块链的 CPPA 机制,以缓解这些挑战。本文提出了一种分层密钥生成机制,以保护驾驶员的隐私并验证信息,该机制适用于资源有限的物联网节点。管理节点可以根据自己的密钥为在其区域内交互的车辆颁发临时伪身份(PID),并跟踪恶意行为,但对其管理范围外的车辆活动一无所知。与传统区块链相比,我们提出了一种分层、分区的区块链,以实现分布式细粒度物联网管理并提高效率。具体来说,我们提出了一种跨域数据共享机制,可以促进高效通信,并通过跨域相互链验证来保证物联网系统中各域区块链的安全性。安全分析和性能评估证明了我们方案的安全性以及计算和存储效率。
{"title":"Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain","authors":"","doi":"10.1016/j.vehcom.2024.100832","DOIUrl":"10.1016/j.vehcom.2024.100832","url":null,"abstract":"<div><p>With the prevalence of intelligent driving, the vehicular data corresponding to driving safety and traffic management efficiency is widely applied by the Internet of Vehicles (IoV) applications. Vehicular data is shared frequently in IoV, leading to privacy leakage of the message sender, yet most privacy-preserving measures bring difficulties for receivers to detect malicious messages. To trade-off between privacy and security, conditional privacy-preserving authentication (CPPA) solutions have been proposed. However, CPPA protocols deployed in IoV rely on hardware devices or center servers to manage key generation and updates. This paper proposed a blockchain-based CPPA mechanism for IoV data-sharing to mitigate these challenges. A hierarchical key generation mechanism is presented to protect drivers' privacy and authenticate messages which is suitable for resource-limited IoV nodes. Management nodes can issue temporary pseudo-identity (PID) from their keys for vehicles to interact in their area and trace the malicious behaviors, but know nothing about vehicles' activities outside their administration. A hierarchical and zonal blockchain is presented to realize distributed fine-grained IoV management and enhance efficiency concerning traditional blockchain. Specifically, we propose a cross-domain data-sharing mechanism, which can facilitate efficient communication and a mutual cross-domain chain verification to guarantee the security of each domain blockchain in our IoV system. The security analysis and performance evaluation demonstrate the security as well as computational and storage efficiency of our scheme.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141841759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiency of UAV-assisted cellular networks under jamming scenarios 干扰情况下无人机辅助蜂窝网络的效率
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-07-26 DOI: 10.1016/j.vehcom.2024.100833

The wireless signal that intentionally disrupts the communication is described as the jamming signal. Clustered jamming is the use of jamming signals of the devices that are clustered in groups, whereas non-clustered jamming refers to the use of the jamming signals of the spatially distributed devices that are un-clustered. The efficiency of the unmanned aerial vehicle (UAV)-assisted cellular networks compromises in the presence of clustered as well as non-clustered jammers. Furthermore, the UAV's antenna 3D beam-width vibrates due to strong atmospheric wind, atmospheric pressure, or mechanical noise influencing UAV-assisted networks' efficiency. Thus, the efficiency characterization of UAV-assisted networks considering jamming and beam-width variations is essential. This paper concentrates on the efficiency of the user equipment's connection with the line-of-sight (LOS) UAV, non-LOS UAV, and cellular base station in terms of association, coverage, and spectrum in the presence of clustered as well as non-clustered jammers and beam-width variations. For a network consisting of jammers and beam-width variations, the analytical expressions are derived to assess the user's association and coverage efficiency. The results show that the network's efficiency decreases drastically with the increasing beam-width variations. Moreover, the non-clustered jamming reduces the efficiency of the networks much more when compared with the clustered jamming. Therefore, to enhance the efficiency of the system; network designers need to consider implementing advanced anti-jamming techniques for a system employing non-clustered jamming and UAV antenna beam-width variations.

有意干扰通信的无线信号被称为干扰信号。集群干扰是指使用集群设备的干扰信号,而非集群干扰是指使用非集群的空间分布设备的干扰信号。在存在集群干扰器和非集群干扰器的情况下,无人飞行器(UAV)辅助蜂窝网络的效率会受到影响。此外,无人飞行器的天线三维波束宽度会因强风、大气压力或机械噪声而振动,从而影响无人飞行器辅助网络的效率。因此,考虑到干扰和波束宽度的变化,对无人机辅助网络的效率特性进行分析至关重要。本文主要研究在存在集群和非集群干扰器以及波束宽度变化的情况下,用户设备与视距(LOS)无人机、非视距无人机和蜂窝基站在关联、覆盖和频谱方面的连接效率。对于由干扰器和波束宽度变化组成的网络,可以通过分析表达式来评估用户的关联和覆盖效率。结果表明,随着波束宽度变化的增加,网络效率急剧下降。此外,与聚类干扰相比,非聚类干扰对网络效率的降低幅度更大。因此,为了提高系统效率,网络设计人员需要考虑在采用非集群干扰和无人机天线波束宽度变化的系统中采用先进的抗干扰技术。
{"title":"Efficiency of UAV-assisted cellular networks under jamming scenarios","authors":"","doi":"10.1016/j.vehcom.2024.100833","DOIUrl":"10.1016/j.vehcom.2024.100833","url":null,"abstract":"<div><p>The wireless signal that intentionally disrupts the communication is described as the jamming signal. Clustered jamming is the use of jamming signals of the devices that are clustered in groups, whereas non-clustered jamming refers to the use of the jamming signals of the spatially distributed devices that are un-clustered. The efficiency of the unmanned aerial vehicle (UAV)-assisted cellular networks compromises in the presence of clustered as well as non-clustered jammers. Furthermore, the UAV's antenna 3D beam-width vibrates due to strong atmospheric wind, atmospheric pressure, or mechanical noise influencing UAV-assisted networks' efficiency. Thus, the efficiency characterization of UAV-assisted networks considering jamming and beam-width variations is essential. This paper concentrates on the efficiency of the user equipment's connection with the line-of-sight (LOS) UAV, non-LOS UAV, and cellular base station in terms of association, coverage, and spectrum in the presence of clustered as well as non-clustered jammers and beam-width variations. For a network consisting of jammers and beam-width variations, the analytical expressions are derived to assess the user's association and coverage efficiency. The results show that the network's efficiency decreases drastically with the increasing beam-width variations. Moreover, the non-clustered jamming reduces the efficiency of the networks much more when compared with the clustered jamming. Therefore, to enhance the efficiency of the system; network designers need to consider implementing advanced anti-jamming techniques for a system employing non-clustered jamming and UAV antenna beam-width variations.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141842452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IDS-DEC: A novel intrusion detection for CAN bus traffic based on deep embedded clustering IDS-DEC:基于深度嵌入式聚类的新型 CAN 总线流量入侵检测器
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-07-26 DOI: 10.1016/j.vehcom.2024.100830

As the automotive industry advances towards greater automation, the proliferation of electronic control units (ECUs) has led to a substantial increase in the connectivity of in-vehicle networks with the external environment. However, the widely used Controller Area Network (CAN), which serves as the standard for in-vehicle networks, lacks robust security features, such as authentication or encrypted information transmission. This poses a significant challenge to the security of these networks. Despite the availability of powerful intrusion detection methods based on machine learning and deep learning, there are notable limitations in terms of stability and accuracy in the absence of a supervised learning process with labeled data. To address this issue, this paper introduces a novel in-vehicle intrusion detection system, termed IDS-DEC. This system combines a spatiotemporal self-coder employing LSTM and CNN (LCAE) with an entropy-based deep embedding clustering. Specifically, our approach involves encoding in-vehicle network traffic into windowed messages using a stream builder, designed to adapt to high-frequency traffic. These messages are then fed into the LCAE to extract a low-dimensional nonlinear spatiotemporal mapping from the initially high-dimensional data. The resulting low-dimensional mapping is subjected to a dual constraint in conjunction with our entropy-based pure deep embedding clustering module. This creates a bidirectional learning objective, addressing the optimization problem and facilitating an end-to-end training pattern for our model to adapt to diverse attack environments. The effectiveness of IDS-DEC is validated using both the benchmark Car Hacking dataset and the Car Hacking-Attack & Defense Challenge dataset. Experimental results demonstrate the model's high detection accuracy across various attacks, stabilizing at approximately 99% accuracy with a 0.5% false alarm rate. The F1 score also stabilizes at around 99%. In comparison with unsupervised methods based on deep stream clustering, LSTM-based self-encoder, and classification-based methods, IDS-DEC exhibits significant improvements across all performance metrics.

随着汽车行业向更高自动化水平迈进,电子控制单元(ECU)的激增导致车载网络与外部环境的连接大幅增加。然而,作为车载网络标准而广泛使用的控制器局域网(CAN)却缺乏强大的安全功能,如身份验证或加密信息传输。这给这些网络的安全性带来了巨大挑战。尽管基于机器学习和深度学习的入侵检测方法功能强大,但在缺乏标注数据监督学习过程的情况下,其稳定性和准确性存在明显的局限性。为解决这一问题,本文介绍了一种新型车载入侵检测系统,称为 IDS-DEC。该系统将采用 LSTM 和 CNN(LCAE)的时空自编码器与基于熵的深度嵌入聚类相结合。具体来说,我们的方法是使用流生成器将车载网络流量编码为窗口信息,以适应高频流量。然后将这些信息输入 LCAE,从最初的高维数据中提取低维非线性时空映射。由此产生的低维映射与我们基于熵的纯深度嵌入聚类模块一起受到双重约束。这就创造了一个双向学习目标,解决了优化问题,并为我们的模型提供了端到端的训练模式,以适应不同的攻击环境。IDS-DEC 的有效性通过基准 "汽车黑客攻击 "数据集和 "汽车黑客攻击& 防御挑战 "数据集进行了验证。实验结果表明,该模型对各种攻击的检测准确率很高,准确率稳定在 99% 左右,误报率为 0.5%。F1 分数也稳定在 99% 左右。与基于深度流聚类的无监督方法、基于 LSTM 的自编码器和基于分类的方法相比,IDS-DEC 在所有性能指标上都有显著提高。
{"title":"IDS-DEC: A novel intrusion detection for CAN bus traffic based on deep embedded clustering","authors":"","doi":"10.1016/j.vehcom.2024.100830","DOIUrl":"10.1016/j.vehcom.2024.100830","url":null,"abstract":"<div><p>As the automotive industry advances towards greater automation, the proliferation of electronic control units (ECUs) has led to a substantial increase in the connectivity of in-vehicle networks with the external environment. However, the widely used Controller Area Network (CAN), which serves as the standard for in-vehicle networks, lacks robust security features, such as authentication or encrypted information transmission. This poses a significant challenge to the security of these networks. Despite the availability of powerful intrusion detection methods based on machine learning and deep learning, there are notable limitations in terms of stability and accuracy in the absence of a supervised learning process with labeled data. To address this issue, this paper introduces a novel in-vehicle intrusion detection system, termed IDS-DEC. This system combines a spatiotemporal self-coder employing LSTM and CNN (LCAE) with an entropy-based deep embedding clustering. Specifically, our approach involves encoding in-vehicle network traffic into windowed messages using a stream builder, designed to adapt to high-frequency traffic. These messages are then fed into the LCAE to extract a low-dimensional nonlinear spatiotemporal mapping from the initially high-dimensional data. The resulting low-dimensional mapping is subjected to a dual constraint in conjunction with our entropy-based pure deep embedding clustering module. This creates a bidirectional learning objective, addressing the optimization problem and facilitating an end-to-end training pattern for our model to adapt to diverse attack environments. The effectiveness of IDS-DEC is validated using both the benchmark Car Hacking dataset and the Car Hacking-Attack &amp; Defense Challenge dataset. Experimental results demonstrate the model's high detection accuracy across various attacks, stabilizing at approximately 99% accuracy with a 0.5% false alarm rate. The F1 score also stabilizes at around 99%. In comparison with unsupervised methods based on deep stream clustering, LSTM-based self-encoder, and classification-based methods, IDS-DEC exhibits significant improvements across all performance metrics.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASAP: IEEE 802.11ax-based seamless access point handover for moving vehicles ASAP:基于 IEEE 802.11ax 的移动车辆无缝接入点切换
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-07-18 DOI: 10.1016/j.vehcom.2024.100828

The increasing number of connected and automated vehicles has led to a sharp increase in the demand for network access of moving vehicles. Although 5G networks support terminals with high mobility, the traffic load is too heavy to bear if all the vehicles have a large amount of data for transmission. Therefore, IEEE 802.11-based wireless network is a complementary offload solution to provide high-speed network access for vehicles with low cost, easy deployment and high scalability. However, frequent network handover of moving vehicles between multiple roadside access points (APs) results in network performance degradation, which is one of the challenges in vehicular communications. In this paper, we propose a framework (referred to as ASAP) based on the up-to-date IEEE 802.11ax standard to provide moving vehicles with seamless handover between multiple APs. By leveraging the high efficiency (HE) sounding protocol of IEEE 802.11ax, each AP is capable to monitor the current location of moving vehicles in real time. In addition, a mechanism is also proposed for AP uplink/downlink transmissions through collaboration between the APs and the backbone network to achieve seamless handover for moving vehicles. Since ASAP is based on IEEE 802.11ax, the compatible security scheme such as IEEE 802.11i can be applied to ASAP for security enhancement. The proposed solution does not require any modification on the user terminals, making it possible to be implemented in practice. Extensive simulations show that ASAP significantly reduces the network handover delay to microsecond level, and improves network throughput up to 59% compared with the state-of-the-art methods.

联网车辆和自动驾驶车辆的数量不断增加,导致移动车辆的网络接入需求急剧增加。虽然 5G 网络支持具有高移动性的终端,但如果所有车辆都有大量数据需要传输,其流量负载将不堪重负。因此,基于 IEEE 802.11 的无线网络是一种互补的卸载解决方案,能以低成本、易部署和高扩展性为车辆提供高速网络接入。然而,移动车辆在多个路边接入点(AP)之间频繁的网络切换会导致网络性能下降,这是车载通信面临的挑战之一。在本文中,我们基于最新的 IEEE 802.11ax 标准提出了一个框架(简称 ASAP),为行驶中的车辆提供多个接入点之间的无缝切换。通过利用 IEEE 802.11ax 的高效(HE)探测协议,每个接入点都能实时监控移动车辆的当前位置。此外,还提出了一种通过接入点与骨干网络协作进行接入点上行/下行链路传输的机制,以实现移动车辆的无缝切换。由于 ASAP 基于 IEEE 802.11ax,因此可将兼容的安全方案(如 IEEE 802.11i)应用于 ASAP,以增强安全性。提出的解决方案不需要对用户终端进行任何修改,因此可以在实践中实施。大量仿真表明,与最先进的方法相比,ASAP 能将网络切换延迟显著降低到微秒级,并将网络吞吐量提高达 59%。
{"title":"ASAP: IEEE 802.11ax-based seamless access point handover for moving vehicles","authors":"","doi":"10.1016/j.vehcom.2024.100828","DOIUrl":"10.1016/j.vehcom.2024.100828","url":null,"abstract":"<div><p>The increasing number of connected and automated vehicles has led to a sharp increase in the demand for network access of moving vehicles. Although 5G networks support terminals with high mobility, the traffic load is too heavy to bear if all the vehicles have a large amount of data for transmission. Therefore, IEEE 802.11-based wireless network is a complementary offload solution to provide high-speed network access for vehicles with low cost, easy deployment and high scalability. However, frequent network handover of moving vehicles between multiple roadside access points (APs) results in network performance degradation, which is one of the challenges in vehicular communications. In this paper, we propose a framework (referred to as ASAP) based on the up-to-date IEEE 802.11ax standard to provide moving vehicles with seamless handover between multiple APs. By leveraging the high efficiency (HE) sounding protocol of IEEE 802.11ax, each AP is capable to monitor the current location of moving vehicles in real time. In addition, a mechanism is also proposed for AP uplink/downlink transmissions through collaboration between the APs and the backbone network to achieve seamless handover for moving vehicles. Since ASAP is based on IEEE 802.11ax, the compatible security scheme such as IEEE 802.11i can be applied to ASAP for security enhancement. The proposed solution does not require any modification on the user terminals, making it possible to be implemented in practice. Extensive simulations show that ASAP significantly reduces the network handover delay to microsecond level, and improves network throughput up to 59% compared with the state-of-the-art methods.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141845895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-path serial tasks offloading strategy and dynamic scheduling optimization in vehicular edge computing networks 车载边缘计算网络中的多路径串行任务卸载策略和动态调度优化
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-07-09 DOI: 10.1016/j.vehcom.2024.100827

Vehicular edge computing networks (VECNs) can provide a promising solution to support efficient task execution of vehicles. Consider the channel and access time variations caused by the high mobility of vehicles in a vehicular environment when designing task offloading strategies in VECNs. In this paper, we perform multi-path offloading for a task vehicle with serial tasks based on both dynamic communication distances of vehicle-to-infrastructure (V2I) links, that of vehicle-to-vehicle (V2V) links, and slowly varying large-scale fading information of wireless channels. Considering the task vehicle's low delay requirements, our goal is to minimize the maximum task completion time of the task vehicle. A multi-path dynamic offloading scheme (MPDOS), composed of three parts, is proposed to achieve maximum delay minimization. The maximum processing capability of links between a task vehicle and roadside units (RSUs) is first taken as the objective to find the required communication links, which can decrease the total processing time by increasing transmission rate and execution capacity. Then, a task allocation scheme based on a multi-knapsack algorithm matches tasks and RSUs. Finally, a balancing scheme is leveraged to provide load-balancing computing performance across all computation devices. Numerical results show that our proposed scheme outperforms 30.7% of the RA algorithm, and the task completion rate can reach 99.55%.

车载边缘计算网络(VECN)为支持车辆高效执行任务提供了一种前景广阔的解决方案。在设计 VECN 中的任务卸载策略时,要考虑车辆在车载环境中的高流动性所导致的信道和接入时间变化。本文基于车辆到基础设施(V2I)链路和车辆到车辆(V2V)链路的动态通信距离以及缓慢变化的无线信道大规模衰落信息,为具有串行任务的任务车辆执行多路径卸载。考虑到任务车辆的低延迟要求,我们的目标是最大限度地减少任务车辆完成任务的时间。为了实现最大延迟最小化,我们提出了一种由三部分组成的多路径动态卸载方案(MPDOS)。首先,以任务车辆和路边单元(RSU)之间链路的最大处理能力为目标,找到所需的通信链路,通过提高传输速率和执行能力来减少总处理时间。然后,基于多背包算法的任务分配方案对任务和 RSU 进行匹配。最后,利用平衡方案为所有计算设备提供负载平衡计算性能。数值结果表明,我们提出的方案比 RA 算法高出 30.7%,任务完成率可达 99.55%。
{"title":"Multi-path serial tasks offloading strategy and dynamic scheduling optimization in vehicular edge computing networks","authors":"","doi":"10.1016/j.vehcom.2024.100827","DOIUrl":"10.1016/j.vehcom.2024.100827","url":null,"abstract":"<div><p>Vehicular edge computing networks (VECNs) can provide a promising solution to support efficient task execution of vehicles. Consider the channel and access time variations caused by the high mobility of vehicles in a vehicular environment when designing task offloading strategies in VECNs. In this paper, we perform multi-path offloading for a task vehicle with serial tasks based on both dynamic communication distances of vehicle-to-infrastructure (V2I) links, that of vehicle-to-vehicle (V2V) links, and slowly varying large-scale fading information of wireless channels. Considering the task vehicle's low delay requirements, our goal is to minimize the maximum task completion time of the task vehicle. A multi-path dynamic offloading scheme (MPDOS), composed of three parts, is proposed to achieve maximum delay minimization. The maximum processing capability of links between a task vehicle and roadside units (RSUs) is first taken as the objective to find the required communication links, which can decrease the total processing time by increasing transmission rate and execution capacity. Then, a task allocation scheme based on a multi-knapsack algorithm matches tasks and RSUs. Finally, a balancing scheme is leveraged to provide load-balancing computing performance across all computation devices. Numerical results show that our proposed scheme outperforms 30.7% of the RA algorithm, and the task completion rate can reach 99.55%.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141622941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks 基于 Q-learning 的新型安全路由方案,以及针对飞行 ad hoc 网络中虫洞攻击的稳健防御系统
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-07-03 DOI: 10.1016/j.vehcom.2024.100826
Mehdi Hosseinzadeh , Saqib Ali , Husham Jawad Ahmad , Faisal Alanazi , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Omed Hassan Ahmed , Amir Masoud Rahmani , Sang-Woong Lee

Nowadays, unmanned aerial vehicles (UAVs) organized in a flying ad hoc network (FANET) can successfully carry out complex missions. Due to the limitations of these networks, including the lack of infrastructure, wireless communication channels, dynamic topology, and unreliable communication between UAVs, cyberattacks, especially wormholes, weaken the performance of routing schemes. Therefore, maintaining communication security and guaranteeing the quality of service (QoS) are very challenging. In this paper, a novel Q-learning-based secure routing scheme (QSR) is presented for FANETs. QSR seeks to provide a robust defensive system against wormhole attacks, especially wormhole through encapsulation and wormhole through packet relay. QSR includes a secure neighbor discovery process and a Q-learning-based secure routing process. Firstly, each UAV gets information about its neighboring UAVs securely. To secure communication in this process, a local monitoring system is designed to counteract the wormhole attack through packet relay. This system checks data packets exchanged between neighboring UAVs and defines three rules according to the behavior of wormholes. In the second process, UAVs perform a distributed Q-learning-based routing process to counteract the wormhole attack through encapsulation. To reward the safest paths, a reward function is introduced based on five factors, the average one-hop delay, hop count, data loss ratio, packet transmission frequency (PTF), and packet reception frequency (PRF). Finally, the NS2 simulator is applied for implementing QSR and executing different scenarios. The evaluation results show that QSR works better than TOPCM, MNRiRIP, and MNDA in terms of accuracy, malicious node detection rate, data delivery ratio, and data loss ratio. However, it has more delay than TOPCM.

如今,在飞行临时网络(FANET)中组织起来的无人驾驶飞行器(UAV)可以成功执行复杂的任务。由于这些网络的局限性,包括缺乏基础设施、无线通信信道、动态拓扑以及无人飞行器之间的通信不可靠,网络攻击,特别是虫洞,削弱了路由方案的性能。因此,维护通信安全和保证服务质量(QoS)非常具有挑战性。本文针对 FANET 提出了一种基于 Q-learning 的新型安全路由方案(QSR)。QSR 试图提供一种稳健的防御系统来抵御虫洞攻击,尤其是通过封装的虫洞和通过数据包中继的虫洞。QSR 包括安全邻居发现过程和基于 Q 学习的安全路由过程。首先,每个无人机安全地获取其相邻无人机的信息。为了确保这一过程中的通信安全,设计了一个本地监控系统,通过数据包中继来抵御虫洞攻击。该系统会检查相邻无人机之间交换的数据包,并根据虫洞行为定义三条规则。在第二个过程中,无人机执行基于 Q-learning 的分布式路由过程,通过封装抵御虫洞攻击。为了奖励最安全的路径,引入了基于平均单跳延迟、跳数、数据丢失率、数据包发送频率(PTF)和数据包接收频率(PRF)这五个因素的奖励函数。最后,应用 NS2 模拟器实现 QSR 并执行不同的场景。评估结果表明,QSR 在准确率、恶意节点检测率、数据传送率和数据丢失率方面都优于 TOPCM、MNRiRIP 和 MNDA。但是,它比 TOPCM 有更多的延迟。
{"title":"A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks","authors":"Mehdi Hosseinzadeh ,&nbsp;Saqib Ali ,&nbsp;Husham Jawad Ahmad ,&nbsp;Faisal Alanazi ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Efat Yousefpoor ,&nbsp;Omed Hassan Ahmed ,&nbsp;Amir Masoud Rahmani ,&nbsp;Sang-Woong Lee","doi":"10.1016/j.vehcom.2024.100826","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100826","url":null,"abstract":"<div><p>Nowadays, unmanned aerial vehicles (UAVs) organized in a flying ad hoc network (FANET) can successfully carry out complex missions. Due to the limitations of these networks, including the lack of infrastructure, wireless communication channels, dynamic topology, and unreliable communication between UAVs, cyberattacks, especially wormholes, weaken the performance of routing schemes. Therefore, maintaining communication security and guaranteeing the quality of service (QoS) are very challenging. In this paper, a novel Q-learning-based secure routing scheme (QSR) is presented for FANETs. QSR seeks to provide a robust defensive system against wormhole attacks, especially wormhole through encapsulation and wormhole through packet relay. QSR includes a secure neighbor discovery process and a Q-learning-based secure routing process. Firstly, each UAV gets information about its neighboring UAVs securely. To secure communication in this process, a local monitoring system is designed to counteract the wormhole attack through packet relay. This system checks data packets exchanged between neighboring UAVs and defines three rules according to the behavior of wormholes. In the second process, UAVs perform a distributed Q-learning-based routing process to counteract the wormhole attack through encapsulation. To reward the safest paths, a reward function is introduced based on five factors, the average one-hop delay, hop count, data loss ratio, packet transmission frequency (PTF), and packet reception frequency (PRF). Finally, the NS2 simulator is applied for implementing QSR and executing different scenarios. The evaluation results show that QSR works better than TOPCM, MNRiRIP, and MNDA in terms of accuracy, malicious node detection rate, data delivery ratio, and data loss ratio. However, it has more delay than TOPCM.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1