首页 > 最新文献

Vehicular Communications最新文献

英文 中文
3D map and mmWave radar-based self-localization for UAVs in GNSS-denied environments gnss拒绝环境下基于3D地图和毫米波雷达的无人机自定位
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-11-04 DOI: 10.1016/j.vehcom.2025.100986
Yongqiang Cui, Yiyang Zhang , Di Bai, Yi Diao, Yulei Wang
Reliable self-localization of unmanned aerial vehicles (UAVs) in dense urban environments remains a major challenge due to the frequent unavailability or degradation of Global Navigation Satellite Systems (GNSS) and other radio signals. This paper presents a robust and cost-effective method for UAV self-localization by using vision and millimeter-wave (mmWave) radar data in GNSS-denied environments. The approach generates an initial dense point cloud through depth estimation and semantic segmentation, which is then geometrically refined using sparse mmWave radar point cloud. A semantic-guided clustering method is applied to the mmWave radar point cloud to remove noise and extract key structural elements such as walls, which are later fused with vision-based depth information. For positioning, image matching algorithm provides coarse localization, followed by fine registration that leverages geometric features of windows to enhance precision. Experimental results demonstrate that the proposed method can achieve self-localization accuracy within 0.4 m, while maintaining low system complexity and deployment cost, offering a practical solution for UAV self-localization in GNSS-denied urban scenarios.
由于全球导航卫星系统(GNSS)和其他无线电信号的频繁不可用或退化,在密集的城市环境中,无人驾驶飞行器(uav)的可靠自定位仍然是一个主要挑战。本文提出了一种鲁棒且经济的无人机自定位方法,该方法利用视觉和毫米波雷达数据在gnss拒绝环境中进行自定位。该方法通过深度估计和语义分割生成初始密集点云,然后利用稀疏毫米波雷达点云进行几何细化。将语义引导聚类方法应用于毫米波雷达点云,去除噪声,提取关键结构元素(如墙),然后将其与基于视觉的深度信息融合。在定位方面,图像匹配算法提供粗定位,然后利用窗口的几何特征进行精细配准,提高精度。实验结果表明,该方法可实现0.4 m以内的自定位精度,同时保持较低的系统复杂度和部署成本,为城市gnss拒绝场景下的无人机自定位提供了一种实用的解决方案。
{"title":"3D map and mmWave radar-based self-localization for UAVs in GNSS-denied environments","authors":"Yongqiang Cui,&nbsp;Yiyang Zhang ,&nbsp;Di Bai,&nbsp;Yi Diao,&nbsp;Yulei Wang","doi":"10.1016/j.vehcom.2025.100986","DOIUrl":"10.1016/j.vehcom.2025.100986","url":null,"abstract":"<div><div>Reliable self-localization of unmanned aerial vehicles (UAVs) in dense urban environments remains a major challenge due to the frequent unavailability or degradation of Global Navigation Satellite Systems (GNSS) and other radio signals. This paper presents a robust and cost-effective method for UAV self-localization by using vision and millimeter-wave (mmWave) radar data in GNSS-denied environments. The approach generates an initial dense point cloud through depth estimation and semantic segmentation, which is then geometrically refined using sparse mmWave radar point cloud. A semantic-guided clustering method is applied to the mmWave radar point cloud to remove noise and extract key structural elements such as walls, which are later fused with vision-based depth information. For positioning, image matching algorithm provides coarse localization, followed by fine registration that leverages geometric features of windows to enhance precision. Experimental results demonstrate that the proposed method can achieve self-localization accuracy within 0.4 m, while maintaining low system complexity and deployment cost, offering a practical solution for UAV self-localization in GNSS-denied urban scenarios.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100986"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145442107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-layer based collaborative optimization (MCO) for multiple UAVs’ task allocation and scheduling 基于多层协同优化的多无人机任务分配与调度
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-11-09 DOI: 10.1016/j.vehcom.2025.100989
Huayu Liu , Hua Wu , Yang Liu , Hailong Dong , Hao Li
Multiple unmanned aerial vehicles (UAVs) play a critical role in disaster response and rescue missions. This paper proposes a multi-layer based collaborative optimization (MCO) method, which consists of three stages: path preplanning, task allocation, and task scheduling. These three stages correspond to three levels that are upper level, middle level and lower level. A dynamic constrained particle swarm optimization (DPSO) is proposed for path preplanning in the upper layer by designing a kind of dynamic subpopulation division strategy. After that a clustered consensus-based bundle algorithm (CCBA) is designed to allocate different tasks to available UAVs based on preplanned paths to solve the problems of discontinuous task allocation and redundant paths. Then a multi-neighborhood variable simulated annealing (MNV-SA) algorithm is proposed to further optimize the task execution sequence of each UAV. To validate the effectiveness of MCO method, a set of experiments is conducted in a simulated disaster scenario based on a real urban environment. The results demonstrate that the proposed MCO method significantly improves the task execution benefits and reduces UAV flight distances across all scenarios. Particularly, in complex scenarios, MCO method outperforms CBBA, ACO, and PI algorithms in terms of task execution benefits by 14.01 %, 6.01 %, and 24.06 %, respectively.
多架无人机在灾害响应和救援任务中发挥着至关重要的作用。提出了一种基于多层的协同优化方法,该方法包括路径预规划、任务分配和任务调度三个阶段。这三个阶段对应三个层次,即上层、中层和下层。通过设计一种动态子种群划分策略,提出了一种用于上层路径预规划的动态约束粒子群算法(DPSO)。然后设计了基于聚类共识的束算法(CCBA),根据预先规划的路径为可用无人机分配不同的任务,解决了任务分配不连续和路径冗余的问题。然后提出了一种多邻域变量模拟退火(MNV-SA)算法,进一步优化各无人机的任务执行顺序。为了验证MCO方法的有效性,在基于真实城市环境的模拟灾害场景中进行了一组实验。结果表明,该方法显著提高了任务执行效益,缩短了无人机在所有场景下的飞行距离。特别是在复杂场景下,MCO方法的任务执行效益比CBBA、ACO和PI算法分别高出14.01%、6.01%和24.06%。
{"title":"A multi-layer based collaborative optimization (MCO) for multiple UAVs’ task allocation and scheduling","authors":"Huayu Liu ,&nbsp;Hua Wu ,&nbsp;Yang Liu ,&nbsp;Hailong Dong ,&nbsp;Hao Li","doi":"10.1016/j.vehcom.2025.100989","DOIUrl":"10.1016/j.vehcom.2025.100989","url":null,"abstract":"<div><div>Multiple unmanned aerial vehicles (UAVs) play a critical role in disaster response and rescue missions. This paper proposes a multi-layer based collaborative optimization (MCO) method, which consists of three stages: path preplanning, task allocation, and task scheduling. These three stages correspond to three levels that are upper level, middle level and lower level. A dynamic constrained particle swarm optimization (DPSO) is proposed for path preplanning in the upper layer by designing a kind of dynamic subpopulation division strategy. After that a clustered consensus-based bundle algorithm (CCBA) is designed to allocate different tasks to available UAVs based on preplanned paths to solve the problems of discontinuous task allocation and redundant paths. Then a multi-neighborhood variable simulated annealing (MNV-SA) algorithm is proposed to further optimize the task execution sequence of each UAV. To validate the effectiveness of MCO method, a set of experiments is conducted in a simulated disaster scenario based on a real urban environment. The results demonstrate that the proposed MCO method significantly improves the task execution benefits and reduces UAV flight distances across all scenarios. Particularly, in complex scenarios, MCO method outperforms CBBA, ACO, and PI algorithms in terms of task execution benefits by 14.01 %, 6.01 %, and 24.06 %, respectively.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100989"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145473283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Negotiating strict latency limits for dynamic real-time services in vehicular time-sensitive networks 车载时间敏感网络中动态实时服务的严格延迟限制协商
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-11-17 DOI: 10.1016/j.vehcom.2025.100985
Timo Salomon , Lisa Maile , Philipp Meyer , Franz Korf , Thomas C. Schmidt
Future vehicles are expected to dynamically deploy in-vehicle applications within a Service-Oriented Architecture (SOA) while critical services continue to operate under hard real-time constraints. Time-Sensitive Networking (TSN) on the in-vehicle Ethernet layer is dedicated to ensure deterministic communication between critical services; its Credit-Based Shaper (CBS) supports dynamic resource reservations. However, the dynamic nature of service deployment challenges network resource configuration, since any new reservation may change the latency of already validated flows. Standard methods of worst-case latency analysis for CBS have been found incorrect, and current TSN stream reservation procedures lack mechanisms to signal application layer Quality-of-Service (QoS) requirements or verify deadlines.
In this paper, we propose and validate a QoS negotiation scheme that interacts with the TSN network controller to reserve resources while ensuring latency bounds. For the first time, this work comparatively evaluates reservation schemes using worst-case analysis and simulations of a realistic In-Vehicle Network (IVN) and demonstrates their impact on QoS guarantees, resource utilization, and setup times. We find that only one reservation scheme utilizing per-queue delay budgets and network calculus provides valid configurations and guarantees acceptable latency bounds throughout the IVN. The proposed service negotiation mechanism efficiently establishes 450 vehicular network reservations in just 11 ms.
未来的车辆预计将在面向服务的体系结构(SOA)中动态部署车载应用程序,而关键服务将继续在硬实时约束下运行。车载以太网层的时间敏感网络(TSN)致力于确保关键服务之间的确定性通信;它的基于信用的Shaper (CBS)支持动态资源保留。然而,服务部署的动态特性对网络资源配置提出了挑战,因为任何新的预约都可能改变已经验证的流的延迟。CBS的最坏情况延迟分析的标准方法被发现是不正确的,并且当前的TSN流保留过程缺乏表明应用层服务质量(QoS)要求或验证截止日期的机制。
{"title":"Negotiating strict latency limits for dynamic real-time services in vehicular time-sensitive networks","authors":"Timo Salomon ,&nbsp;Lisa Maile ,&nbsp;Philipp Meyer ,&nbsp;Franz Korf ,&nbsp;Thomas C. Schmidt","doi":"10.1016/j.vehcom.2025.100985","DOIUrl":"10.1016/j.vehcom.2025.100985","url":null,"abstract":"<div><div>Future vehicles are expected to dynamically deploy in-vehicle applications within a Service-Oriented Architecture (SOA) while critical services continue to operate under hard real-time constraints. Time-Sensitive Networking (TSN) on the in-vehicle Ethernet layer is dedicated to ensure deterministic communication between critical services; its Credit-Based Shaper (CBS) supports dynamic resource reservations. However, the dynamic nature of service deployment challenges network resource configuration, since any new reservation may change the latency of already validated flows. Standard methods of worst-case latency analysis for CBS have been found incorrect, and current TSN stream reservation procedures lack mechanisms to signal application layer Quality-of-Service (QoS) requirements or verify deadlines.</div><div>In this paper, we propose and validate a QoS negotiation scheme that interacts with the TSN network controller to reserve resources while ensuring latency bounds. For the first time, this work comparatively evaluates reservation schemes using worst-case analysis and simulations of a realistic In-Vehicle Network (IVN) and demonstrates their impact on QoS guarantees, resource utilization, and setup times. We find that only one reservation scheme utilizing per-queue delay budgets and network calculus provides valid configurations and guarantees acceptable latency bounds throughout the IVN. The proposed service negotiation mechanism efficiently establishes 450 vehicular network reservations in just 11 ms.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100985"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145535999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative control of heterogeneous vehicle platoons under communication time–varying delays and intermittent observations 通信时变延迟和间歇观测条件下异构车辆排的协同控制
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-12-07 DOI: 10.1016/j.vehcom.2025.100993
Yilin Wu , Qian Zhao , Yonggui Liu , Zeming Li , Zhiping Shen
This article discusses the cooperative control problem for heterogeneous vehicle platoons subject to non-ideal factors, specifically communication time-varying delays, system noises and intermittent observations. The main idea is to construct the internal reference models to generate common signals for all vehicles. First, in ideal situations under a directed acyclic topology (DAT), a distributed controller is proposed based on the properties of lower triangular matrices and solving an algebraic Riccati equation (ARE); Second, for non–ideal situations under uniformly quasi-strongly connected topology, optimal states are estimated using intermittent observations, and a distributed controller is designed to maintain the platoon’s mean square stability (MSS). Compared to the control methods in existing literatures, the proposed control approaches in this paper, relying on the system’s output information rather than state information, can effectively suppress the impacts of vehicle heterogeneity and the aforementioned non–ideal factors on platoon stability. Simulations are conducted to demonstrate a superior convergence speed compared to those in the literatures.
本文讨论了受非理想因素影响的异构车辆队列协同控制问题,特别是通信时变延迟、系统噪声和间歇观测。主要思想是构建内部参考模型来生成所有车辆的公共信号。首先,在有向无环拓扑(DAT)的理想情况下,提出了一种基于下三角矩阵性质和求解代数Riccati方程(ARE)的分布式控制器;其次,对于均匀准强连接拓扑下的非理想情况,利用间歇观测估计最优状态,并设计分布式控制器来保持排的均方稳定性(MSS)。与现有文献的控制方法相比,本文提出的控制方法依靠系统的输出信息而不是状态信息,可以有效地抑制车辆异质性和上述非理想因素对车队稳定性的影响。仿真结果表明,该方法具有较好的收敛速度。
{"title":"Cooperative control of heterogeneous vehicle platoons under communication time–varying delays and intermittent observations","authors":"Yilin Wu ,&nbsp;Qian Zhao ,&nbsp;Yonggui Liu ,&nbsp;Zeming Li ,&nbsp;Zhiping Shen","doi":"10.1016/j.vehcom.2025.100993","DOIUrl":"10.1016/j.vehcom.2025.100993","url":null,"abstract":"<div><div>This article discusses the cooperative control problem for heterogeneous vehicle platoons subject to non-ideal factors, specifically communication time-varying delays, system noises and intermittent observations. The main idea is to construct the internal reference models to generate common signals for all vehicles. First, in ideal situations under a directed acyclic topology (DAT), a distributed controller is proposed based on the properties of lower triangular matrices and solving an algebraic Riccati equation (ARE); Second, for non–ideal situations under uniformly quasi-strongly connected topology, optimal states are estimated using intermittent observations, and a distributed controller is designed to maintain the platoon’s mean square stability (MSS). Compared to the control methods in existing literatures, the proposed control approaches in this paper, relying on the system’s output information rather than state information, can effectively suppress the impacts of vehicle heterogeneity and the aforementioned non–ideal factors on platoon stability. Simulations are conducted to demonstrate a superior convergence speed compared to those in the literatures.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100993"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145689755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LGTWAFIOD: PUF and Fuzzy extractor based lightweight authentication framework for internet of drones 基于PUF和模糊提取器的无人机互联网轻量级认证框架
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-11-12 DOI: 10.1016/j.vehcom.2025.100990
Naveen Kumar, Ankit Chaudhary
The continuous development of Unmanned Aerial Vehicles (UAVs) or drone technology and its ability to perform effectively in various hazard states leads to its adoption in number of sectors including military and civilians industries. In Internet of Drones (IoD) system, a number of drones are deployed in swarm for the collection of important information from various regions and send it to Ground Control Station (GCS). As the sensitive and mission critical information is exchanged so both UAV and GCS must mutually authenticate each other and adversary or attacker cannot trace the exchanged messages. In view of that a lightweight authentication framework for IoD environment (LGTWAFIOD) is proposed for secure communication. In LGTWAFIOD, Physical Unclonable Function (PUF) and Fuzzy extractor is used for the authentication. The security of LGTWAFIOD is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA), BAN logic and ROR model. A simulation framework is set up for performing the experiments and validating the performance of LGTWAFIOD. The experimental results shows that the proposed scheme performs better in terms of communication cost, computational time and security requirements. Also, the network performance is evaluated by performing the simulation.
无人驾驶飞行器(uav)或无人机技术的不断发展及其在各种危险状态下有效执行的能力导致其在包括军事和民用工业在内的许多部门采用。在无人机互联网(Internet of Drones, IoD)系统中,部署多架无人机,从各个区域收集重要信息,并将其发送给地面控制站(GCS)。由于敏感和关键任务信息的交换,无人机和GCS必须相互验证,对手或攻击者无法追踪交换的信息。鉴于此,本文提出了一种面向IoD环境的轻量级认证框架(LGTWAFIOD)来保证通信的安全性。在LGTWAFIOD中,使用物理不可克隆函数(PUF)和模糊提取器进行认证。使用互联网安全协议和应用程序自动验证(AVISPA), BAN逻辑和ROR模型验证LGTWAFIOD的安全性。建立了仿真框架,进行了实验并验证了LGTWAFIOD的性能。实验结果表明,该方案在通信成本、计算时间和安全性要求方面具有较好的性能。同时,通过仿真对网络性能进行了评估。
{"title":"LGTWAFIOD: PUF and Fuzzy extractor based lightweight authentication framework for internet of drones","authors":"Naveen Kumar,&nbsp;Ankit Chaudhary","doi":"10.1016/j.vehcom.2025.100990","DOIUrl":"10.1016/j.vehcom.2025.100990","url":null,"abstract":"<div><div>The continuous development of Unmanned Aerial Vehicles (UAVs) or drone technology and its ability to perform effectively in various hazard states leads to its adoption in number of sectors including military and civilians industries. In Internet of Drones (IoD) system, a number of drones are deployed in swarm for the collection of important information from various regions and send it to Ground Control Station (GCS). As the sensitive and mission critical information is exchanged so both UAV and GCS must mutually authenticate each other and adversary or attacker cannot trace the exchanged messages. In view of that a lightweight authentication framework for IoD environment <em>(LGTWAFIOD)</em> is proposed for secure communication. In <em>LGTWAFIOD</em>, Physical Unclonable Function (PUF) and Fuzzy extractor is used for the authentication. The security of <em>LGTWAFIOD</em> is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA), BAN logic and ROR model. A simulation framework is set up for performing the experiments and validating the performance of <em>LGTWAFIOD</em>. The experimental results shows that the proposed scheme performs better in terms of communication cost, computational time and security requirements. Also, the network performance is evaluated by performing the simulation.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100990"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145515677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint vehicle clustering and dynamic power allocation optimization in sectorized 6G networks for V2X communication 面向V2X通信的分段6G网络联合车辆聚类与动态功率分配优化
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-10-24 DOI: 10.1016/j.vehcom.2025.100983
Amira A. Amer , Ihab E. Talkhan , Hattan F. Abutarboush , Tawfik Ismail
Vehicle-to-Everything (V2X) communication is essential for developing fully autonomous vehicles, but it raises significant challenges due to high data rate demands and energy consumption in dense networks. This paper proposes a novel joint optimization framework integrating vehicle clustering and power allocation in sectorized 6G networks with beamforming. The framework uses a k-medoids-based clustering algorithm and a dynamic power allocation scheme to reduce interference and minimize power consumption while meeting Service Level Agreement (SLA) requirements. Our results demonstrate that the proposed framework improves SLA compliance by up to 98.7% under highly dense and variable traffic conditions compared to non-clustered networks. Furthermore, dynamic power allocation reduces communication power consumption by 69%, and Remote Radio Head (RRH) on/off switching decreases overall system power by 3.7%. This approach significantly enhances network capacity and energy efficiency, making it a promising solution for sustainable V2X communications in future autonomous vehicle networks.
车辆到一切(V2X)通信对于开发全自动驾驶汽车至关重要,但由于密集网络中的高数据速率需求和能耗,它带来了重大挑战。本文提出了一种结合分段6G网络波束形成的车辆聚类和功率分配的新型联合优化框架。该框架采用基于k-medoids的聚类算法和动态功率分配方案,在满足SLA (Service Level Agreement)要求的同时减少干扰,降低功耗。我们的研究结果表明,与非集群网络相比,在高密度和可变流量条件下,所提出的框架将SLA合规性提高了98.7%。此外,动态功率分配可降低69%的通信功耗,远程无线头(RRH)开/关开关可降低3.7%的整体系统功耗。这种方法大大提高了网络容量和能源效率,使其成为未来自动驾驶汽车网络中可持续V2X通信的有前途的解决方案。
{"title":"Joint vehicle clustering and dynamic power allocation optimization in sectorized 6G networks for V2X communication","authors":"Amira A. Amer ,&nbsp;Ihab E. Talkhan ,&nbsp;Hattan F. Abutarboush ,&nbsp;Tawfik Ismail","doi":"10.1016/j.vehcom.2025.100983","DOIUrl":"10.1016/j.vehcom.2025.100983","url":null,"abstract":"<div><div>Vehicle-to-Everything (V2X) communication is essential for developing fully autonomous vehicles, but it raises significant challenges due to high data rate demands and energy consumption in dense networks. This paper proposes a novel joint optimization framework integrating vehicle clustering and power allocation in sectorized 6G networks with beamforming. The framework uses a k-medoids-based clustering algorithm and a dynamic power allocation scheme to reduce interference and minimize power consumption while meeting Service Level Agreement (SLA) requirements. Our results demonstrate that the proposed framework improves SLA compliance by up to <span><math><mrow><mn>98.7</mn><mspace></mspace><mo>%</mo></mrow></math></span> under highly dense and variable traffic conditions compared to non-clustered networks. Furthermore, dynamic power allocation reduces communication power consumption by <span><math><mrow><mn>69</mn><mspace></mspace><mo>%</mo></mrow></math></span>, and Remote Radio Head (RRH) on/off switching decreases overall system power by <span><math><mrow><mn>3.7</mn><mspace></mspace><mo>%</mo></mrow></math></span>. This approach significantly enhances network capacity and energy efficiency, making it a promising solution for sustainable V2X communications in future autonomous vehicle networks.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100983"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145383757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PMF-UAV:A lightweight and robust PUF-enabled multi-factor authentication and key agreement protocol for UAV-assisted secure communication PMF-UAV:用于无人机辅助安全通信的轻量级、鲁棒puf支持的多因素认证和密钥协议协议
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-11-17 DOI: 10.1016/j.vehcom.2025.100991
Xinxin Liu , Tieming Liu , Weiyu Dong , Wei Liu
In UAV-assisted rescue operations, Unmanned Aerial Vehicles (UAVs or Drones) are widely deployed for disaster zone data collection, road traffic monitoring, and signal relaying to facilitate emergency medical and firefighting responses. Traditional authentication methods that store cryptographic keys in Non-Volatile Memory (NVM), rendering UAVs vulnerable to impersonation or cloning attacks, particularly when deployed in unsupervised high-altitude environments. Conventional solutions require additional hardware protections or detection mechanisms, which may impose a significant computational burden on UAVs with limited processing capabilities. To address these challenges, the Physical Unclonable Function (PUF) has emerged as a promising solution. Unfortunately, existing PUF-based Authentication and Key Agreement (AKA) protocols suffer from potential modeling attack risks due to their explicit storage mechanisms for a mass of Challenge-Response Pairs (CRPs). To mitigate these concerns, we propose PMF-UAV, a secure communication framework for UAV-assisted systems. PMF-UAV integrates PUF-based hardware cryptography to prevent physical impersonation or cloning of user devices and UAVs, while incorporating passwords and biometric technologies to enhance user-side security. Furthermore, PMF-UAV introduces anti-modeling capabilities. Specifically, PUF responses from UAVs are masked using dynamic pseudonyms, whereas those from user devices are protected via a three-factor fusion mechanism. The protocol also employs a Chebyshev chaotic map during key negotiation to enhance session security. We validate PMF-UAV security using the Real-or-Random (ROR) model, AVISPA analysis, and informal security evaluations. In addition, benchmark experiments conducted on the desktop system and the Raspberry Pi 5B platform demonstrate that PMF-UAV exhibits superior performance and enhanced security advantages compared to other related approaches. An implementation performed on the NS3 network simulator with the IEEE 802.11p communication standard is utilized to validate the feasibility and effectiveness of the proposed scheme in UAV-assisted systems.
在无人机辅助救援行动中,无人机被广泛用于灾区数据收集、道路交通监控和信号中继,以促进紧急医疗和消防响应。传统的身份验证方法将加密密钥存储在非易失性存储器(NVM)中,这使得无人机容易受到模仿或克隆攻击,特别是部署在无人监督的高海拔环境中时。传统的解决方案需要额外的硬件保护或检测机制,这可能会给处理能力有限的无人机带来巨大的计算负担。为了应对这些挑战,物理不可克隆功能(PUF)作为一种很有前途的解决方案出现了。不幸的是,现有的基于puf的身份验证和密钥协议(AKA)协议由于其针对大量质询-响应对(crp)的显式存储机制而遭受潜在的建模攻击风险。为了减轻这些担忧,我们提出了PMF-UAV,这是一种用于无人机辅助系统的安全通信框架。PMF-UAV集成了基于puf的硬件加密技术,以防止用户设备和无人机的物理模拟或克隆,同时结合密码和生物识别技术来增强用户端的安全性。此外,PMF-UAV引入了反建模能力。具体来说,来自无人机的PUF响应使用动态假名进行屏蔽,而来自用户设备的PUF响应则通过三因素融合机制进行保护。该协议还在密钥协商过程中使用了切比雪夫混沌映射来提高会话安全性。我们使用Real-or-Random (ROR)模型、AVISPA分析和非正式安全评估来验证PMF-UAV的安全性。此外,在桌面系统和树莓派5B平台上进行的基准测试实验表明,与其他相关方法相比,PMF-UAV具有卓越的性能和增强的安全优势。采用IEEE 802.11p通信标准在NS3网络模拟器上进行了实现,验证了该方案在无人机辅助系统中的可行性和有效性。
{"title":"PMF-UAV:A lightweight and robust PUF-enabled multi-factor authentication and key agreement protocol for UAV-assisted secure communication","authors":"Xinxin Liu ,&nbsp;Tieming Liu ,&nbsp;Weiyu Dong ,&nbsp;Wei Liu","doi":"10.1016/j.vehcom.2025.100991","DOIUrl":"10.1016/j.vehcom.2025.100991","url":null,"abstract":"<div><div>In UAV-assisted rescue operations, Unmanned Aerial Vehicles (UAVs or Drones) are widely deployed for disaster zone data collection, road traffic monitoring, and signal relaying to facilitate emergency medical and firefighting responses. Traditional authentication methods that store cryptographic keys in Non-Volatile Memory (NVM), rendering UAVs vulnerable to impersonation or cloning attacks, particularly when deployed in unsupervised high-altitude environments. Conventional solutions require additional hardware protections or detection mechanisms, which may impose a significant computational burden on UAVs with limited processing capabilities. To address these challenges, the Physical Unclonable Function (PUF) has emerged as a promising solution. Unfortunately, existing PUF-based Authentication and Key Agreement (AKA) protocols suffer from potential modeling attack risks due to their explicit storage mechanisms for a mass of Challenge-Response Pairs (CRPs). To mitigate these concerns, we propose PMF-UAV, a secure communication framework for UAV-assisted systems. PMF-UAV integrates PUF-based hardware cryptography to prevent physical impersonation or cloning of user devices and UAVs, while incorporating passwords and biometric technologies to enhance user-side security. Furthermore, PMF-UAV introduces anti-modeling capabilities. Specifically, PUF responses from UAVs are masked using dynamic pseudonyms, whereas those from user devices are protected via a three-factor fusion mechanism. The protocol also employs a Chebyshev chaotic map during key negotiation to enhance session security. We validate PMF-UAV security using the Real-or-Random (ROR) model, AVISPA analysis, and informal security evaluations. In addition, benchmark experiments conducted on the desktop system and the Raspberry Pi 5B platform demonstrate that PMF-UAV exhibits superior performance and enhanced security advantages compared to other related approaches. An implementation performed on the NS3 network simulator with the IEEE 802.11p communication standard is utilized to validate the feasibility and effectiveness of the proposed scheme in UAV-assisted systems.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100991"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145535998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
V-PISL:Post-quantum identity-based signature scheme over lattice for VANETs 基于点阵的VANETs后量子身份签名方案
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-11-28 DOI: 10.1016/j.vehcom.2025.100992
Xiang Zou , Deng Pan , Guozhen Shi , Shuhan Yu , Jianguo Xie
As intelligent transportation advances, the backbone of smart mobility is Vehicular Ad Hoc Networks (VANETs), which nevertheless remain vulnerable to security threats stemming from high node mobility, dynamic topologies, and open wireless channels. Traditional security frameworks grapple with cumbersome key management in VANETs’ dynamic ecosystems, while quantum computing poses a fundamental threat to conventional cryptographic protocols. Existing post-quantum signature schemes often suffer from oversized keys and signatures, coupled with reliance on complex operations like trapdoor generation, limiting their applicability to resource-constrained vehicular devices.We propose V-PISL, a lattice-based post-quantum identity-based signature scheme tailored for VANETs. Built on the Dilithium framework and algebraic lattices, it eliminates trapdoor mechanisms, with security grounded in the Module Short Integer Solution (MSIS) and Module Learning With Errors (MLWE) problems. Experimental results demonstrate V-PISL’s efficiency across 112-bit, 169-bit, and 241-bit security levels. Its 1312-byte system public key delivers more than 91.1 % storage efficiency gains compared to the latest schemes (LB-IBS and PQ-ISS), with an overall storage efficiency improvement of 62.6 %, and the response speed reaches the millisecond level. Thus, V-PISL provides a practical postquantum security solution for resource-constrained vehicular environments.
随着智能交通的发展,智能移动的支柱是车辆自组织网络(vanet),然而,它仍然容易受到来自高节点移动性、动态拓扑和开放无线信道的安全威胁。传统的安全框架在VANETs的动态生态系统中努力解决繁琐的密钥管理问题,而量子计算对传统的加密协议构成了根本性的威胁。现有的后量子签名方案往往存在密钥和签名过大的问题,再加上对陷阱门生成等复杂操作的依赖,限制了它们在资源受限的车载设备上的适用性。我们提出了一种为VANETs量身定制的基于晶格的后量子身份签名方案V-PISL。它建立在Dilithium框架和代数格上,消除了活板门机制,其安全性基于模块短整数解决方案(MSIS)和模块错误学习(MLWE)问题。实验结果证明了V-PISL在112位、169位和241位安全级别上的有效性。其1312字节的系统公钥与最新方案(LB-IBS和PQ-ISS)相比,存储效率提高了91.1%以上,整体存储效率提高了62.6%,响应速度达到毫秒级。因此,V-PISL为资源受限的车辆环境提供了一种实用的后量子安全解决方案。
{"title":"V-PISL:Post-quantum identity-based signature scheme over lattice for VANETs","authors":"Xiang Zou ,&nbsp;Deng Pan ,&nbsp;Guozhen Shi ,&nbsp;Shuhan Yu ,&nbsp;Jianguo Xie","doi":"10.1016/j.vehcom.2025.100992","DOIUrl":"10.1016/j.vehcom.2025.100992","url":null,"abstract":"<div><div>As intelligent transportation advances, the backbone of smart mobility is Vehicular Ad Hoc Networks (VANETs), which nevertheless remain vulnerable to security threats stemming from high node mobility, dynamic topologies, and open wireless channels. Traditional security frameworks grapple with cumbersome key management in VANETs’ dynamic ecosystems, while quantum computing poses a fundamental threat to conventional cryptographic protocols. Existing post-quantum signature schemes often suffer from oversized keys and signatures, coupled with reliance on complex operations like trapdoor generation, limiting their applicability to resource-constrained vehicular devices.We propose V-PISL, a lattice-based post-quantum identity-based signature scheme tailored for VANETs. Built on the Dilithium framework and algebraic lattices, it eliminates trapdoor mechanisms, with security grounded in the Module Short Integer Solution (MSIS) and Module Learning With Errors (MLWE) problems. Experimental results demonstrate V-PISL’s efficiency across 112-bit, 169-bit, and 241-bit security levels. Its 1312-byte system public key delivers more than 91.1 % storage efficiency gains compared to the latest schemes (LB-IBS and PQ-ISS), with an overall storage efficiency improvement of 62.6 %, and the response speed reaches the millisecond level. Thus, V-PISL provides a practical postquantum security solution for resource-constrained vehicular environments.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100992"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145613791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization for dynamic multi-RIS-assisted SWIPT-Enabled V2I networks: A deep learning approach 动态多ris辅助swift支持的V2I网络优化:一种深度学习方法
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-11-07 DOI: 10.1016/j.vehcom.2025.100984
Manojkumar B. Kokare , Sumit Gautam , Swaminathan R
Reconfigurable intelligent surfaces (RISs) have emerged as a highly promising technology in sixth-generation (6G) vehicular systems, offering the ability to dynamically control the wireless propagation environment. In this paper, we examine simultaneous wireless information and power transfer (SWIPT) by employing multiple RISs within a vehicle-to-infrastructure (V2I) communication system. The wireless environment exhibits high complexity due to fading and shadowing effects. To model this accurately, we adopt the double generalized Gamma (dGG) distribution. This comprehensive modeling approach enables a more realistic and insightful performance evaluation of RIS-assisted SWIPT systems under practical mobility and fading conditions. To reflect real-world vehicular dynamics, we incorporate a statistical Random Waypoint (RWP) mobility model, while also accounting for imperfections in channel state information (CSI) that arise due to high mobility and channel estimation errors. The study also integrates a non-linear energy harvesting (NL-EH) scheme to enhance performance via the power-splitting (PS) protocol. A unified objective function is proposed to jointly optimize transmit power and PS factors, aiming to maximize both the harvested energy and information rate. To address the non-convex nature of the problem, an iterative algorithm is utilized, supported by closed-form solutions derived from the Karush-Kuhn-Tucker (KKT) conditions and joint optimization (JO) method. Monte-Carlo simulations are conducted to verify the accuracy of the analytical results. Additionally, a deep neural network (DNN) framework is introduced for optimized value prediction, demonstrating superior SWIPT performance compared to single RIS configurations, with reduced complexity and faster execution.
可重构智能表面(RISs)已经成为第六代(6G)车辆系统中非常有前途的技术,它提供了动态控制无线传播环境的能力。在本文中,我们通过在车辆到基础设施(V2I)通信系统中使用多个RISs来检查同时无线信息和电力传输(SWIPT)。由于衰落和阴影效应,无线环境具有很高的复杂性。为了准确地建模,我们采用双广义Gamma (dGG)分布。这种全面的建模方法使ris辅助的SWIPT系统在实际移动和衰落条件下的性能评估更加现实和深刻。为了反映真实世界的车辆动态,我们结合了一个统计随机路点(RWP)移动模型,同时也考虑了由于高移动性和通道估计误差而产生的通道状态信息(CSI)缺陷。该研究还集成了非线性能量收集(NL-EH)方案,通过功率分割(PS)协议提高性能。提出了统一的目标函数,对发射功率和PS因子进行联合优化,以收获能量和信息率同时最大化为目标。为了解决问题的非凸性,利用了一种迭代算法,并由Karush-Kuhn-Tucker (KKT)条件和联合优化(JO)方法导出了封闭解。通过蒙特卡罗仿真验证了分析结果的准确性。此外,引入深度神经网络(DNN)框架用于优化值预测,与单一RIS配置相比,SWIPT性能优越,复杂性降低,执行速度更快。
{"title":"Optimization for dynamic multi-RIS-assisted SWIPT-Enabled V2I networks: A deep learning approach","authors":"Manojkumar B. Kokare ,&nbsp;Sumit Gautam ,&nbsp;Swaminathan R","doi":"10.1016/j.vehcom.2025.100984","DOIUrl":"10.1016/j.vehcom.2025.100984","url":null,"abstract":"<div><div>Reconfigurable intelligent surfaces (RISs) have emerged as a highly promising technology in sixth-generation (6G) vehicular systems, offering the ability to dynamically control the wireless propagation environment. In this paper, we examine simultaneous wireless information and power transfer (SWIPT) by employing multiple RISs within a vehicle-to-infrastructure (V2I) communication system. The wireless environment exhibits high complexity due to fading and shadowing effects. To model this accurately, we adopt the double generalized Gamma (dGG) distribution. This comprehensive modeling approach enables a more realistic and insightful performance evaluation of RIS-assisted SWIPT systems under practical mobility and fading conditions. To reflect real-world vehicular dynamics, we incorporate a statistical Random Waypoint (RWP) mobility model, while also accounting for imperfections in channel state information (CSI) that arise due to high mobility and channel estimation errors. The study also integrates a non-linear energy harvesting (NL-EH) scheme to enhance performance via the power-splitting (PS) protocol. A unified objective function is proposed to jointly optimize transmit power and PS factors, aiming to maximize both the harvested energy and information rate. To address the non-convex nature of the problem, an iterative algorithm is utilized, supported by closed-form solutions derived from the Karush-Kuhn-Tucker (KKT) conditions and joint optimization (JO) method. Monte-Carlo simulations are conducted to verify the accuracy of the analytical results. Additionally, a deep neural network (DNN) framework is introduced for optimized value prediction, demonstrating superior SWIPT performance compared to single RIS configurations, with reduced complexity and faster execution.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100984"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145461739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orchestrating trajectory, active jamming, and antenna selection for energy-efficient secure aerial IRS communications 高能效安全空中IRS通信的协调轨迹、有源干扰和天线选择
IF 6.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-01 Epub Date: 2025-11-06 DOI: 10.1016/j.vehcom.2025.100987
Tong Wang
Unmanned aerial vehicle (UAV)-aided intelligent reflecting surfaces (IRSs) offer a transformative approach to enhancing wireless connectivity and coverage. This paper tackles the critical challenge of maximizing energy efficiency (EE) in such a system while guaranteeing physical layer security. We consider a network where a multi-antenna base station (BS), assisted by a UAV-mounted IRS, serves multiple ground users (GUs) in the presence of multiple eavesdroppers. To proactively secure transmissions, the BS simultaneously transmits artificial noise (AN) to degrade the eavesdroppers’ channels. We propose a holistic framework to maximize the overall system EE. Our approach orchestrates a comprehensive set of variables: the UAV’s 3D trajectory, the BS’s information and jamming beamforming, the dynamic selection of active transmit antennas at the BS, and the passive phase shifts of the IRS. This joint optimization is formulated under constraints for the GUs’ minimum secure Quality of Service (QoS), the BS’s total transmit power budget, and the UAV’s kinematic limits. The resulting problem is a highly complex, non-convex fractional program with coupled continuous and binary variables. To find a tractable solution, we design a multi-stage iterative algorithm that employs the Dinkelbach method and a Block Coordinate Descent (BCD) framework. Within each BCD iteration, the non-convex subproblems are solved using advanced techniques, including Semidefinite Relaxation (SDR), Successive Convex Approximation (SCA), and the Big-M method. Simulation results demonstrate that our orchestrated scheme significantly outperforms various benchmarks, providing crucial insights into the synergistic benefits of jointly designing active jamming and dynamic antenna selection for secure and energy-efficient aerial networks.
无人机(UAV)辅助智能反射面(IRSs)为增强无线连接和覆盖提供了一种变革性的方法。本文在保证物理层安全的同时,解决了在这样一个系统中最大化能源效率(EE)的关键挑战。我们考虑一个网络,其中一个多天线基站(BS),由无人机安装的IRS辅助,在多个窃听者存在的情况下为多个地面用户(GUs)服务。为了主动保护传输,BS同时发送人工噪声(AN)来降低窃听者的信道。我们提出了一个整体框架来最大化整个系统的EE。我们的方法协调了一套全面的变量:无人机的3D轨迹,BS的信息和干扰波束形成,BS有源发射天线的动态选择,以及IRS的无源相移。该联合优化是在GUs的最小安全服务质量(QoS)、BS的总发射功率预算和无人机的运动学极限约束下制定的。所得到的问题是一个高度复杂的、具有耦合的连续变量和二元变量的非凸分数型程序。为了找到一个易于处理的解决方案,我们设计了一个采用Dinkelbach方法和块坐标下降(BCD)框架的多阶段迭代算法。在每次BCD迭代中,使用先进的技术解决非凸子问题,包括半定松弛(SDR),连续凸逼近(SCA)和大m方法。仿真结果表明,我们的编排方案显著优于各种基准,为安全和节能空中网络共同设计有源干扰和动态天线选择的协同效益提供了重要见解。
{"title":"Orchestrating trajectory, active jamming, and antenna selection for energy-efficient secure aerial IRS communications","authors":"Tong Wang","doi":"10.1016/j.vehcom.2025.100987","DOIUrl":"10.1016/j.vehcom.2025.100987","url":null,"abstract":"<div><div>Unmanned aerial vehicle (UAV)-aided intelligent reflecting surfaces (IRSs) offer a transformative approach to enhancing wireless connectivity and coverage. This paper tackles the critical challenge of maximizing energy efficiency (EE) in such a system while guaranteeing physical layer security. We consider a network where a multi-antenna base station (BS), assisted by a UAV-mounted IRS, serves multiple ground users (GUs) in the presence of multiple eavesdroppers. To proactively secure transmissions, the BS simultaneously transmits artificial noise (AN) to degrade the eavesdroppers’ channels. We propose a holistic framework to maximize the overall system EE. Our approach orchestrates a comprehensive set of variables: the UAV’s 3D trajectory, the BS’s information and jamming beamforming, the dynamic selection of active transmit antennas at the BS, and the passive phase shifts of the IRS. This joint optimization is formulated under constraints for the GUs’ minimum secure Quality of Service (QoS), the BS’s total transmit power budget, and the UAV’s kinematic limits. The resulting problem is a highly complex, non-convex fractional program with coupled continuous and binary variables. To find a tractable solution, we design a multi-stage iterative algorithm that employs the Dinkelbach method and a Block Coordinate Descent (BCD) framework. Within each BCD iteration, the non-convex subproblems are solved using advanced techniques, including Semidefinite Relaxation (SDR), Successive Convex Approximation (SCA), and the Big-M method. Simulation results demonstrate that our orchestrated scheme significantly outperforms various benchmarks, providing crucial insights into the synergistic benefits of jointly designing active jamming and dynamic antenna selection for secure and energy-efficient aerial networks.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"57 ","pages":"Article 100987"},"PeriodicalIF":6.5,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145461740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1