首页 > 最新文献

Vehicular Communications最新文献

英文 中文
VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment VESecure:可验证的身份验证和高效的密钥交换,实现安全的智能传输系统部署
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-28 DOI: 10.1016/j.vehcom.2024.100822
Praneetha Surapaneni , Sriramulu Bojjagani , Muhammad Khurram Khan

The Intelligent Transportation Systems (ITS) is a leading-edge, developing idea that seeks to revolutionize how people and things move inside and outside cities. Internet of Vehicles (IoV) forms a networked environment that joins infrastructure, pedestrians, fog, cloud, and vehicles to develop ITS. The IoV has the potential to improve transportation systems significantly, but as it is networked and data-driven, it poses several security issues. Numerous solutions to these IoV issues have recently been put forth. However, significant computing overhead and security concerns afflict the majority of them. Moreover, malicious vehicles may be injected into the network to access or use unauthorized services. To improve the security of the IoV network, the Mayfly algorithm is used to optimize the private keys continuously. To address these difficulties, we propose a novel VESecure system that provides secure communication, mutual authentication, and key management between vehicles, roadside units (RSU), and cloud servers. The scheme undergoes extensive scrutiny for security and privacy using the Real-or-Random (ROR) oracle model, Tamarin, and Scyther tools, along with the informal security analysis. An Objective Modular Network Testbed in OMNet++ is used to simulate the scheme. We prove our scheme's efficiency by comparing it with other existing methods regarding communication and computation costs.

智能交通系统(ITS)是一种前沿的发展理念,旨在彻底改变人和物在城市内外的移动方式。车联网(IoV)形成了一个网络环境,将基础设施、行人、雾、云和车辆连接起来,发展智能交通系统。IoV 具有显著改善交通系统的潜力,但由于它是网络化和数据驱动的,因此会带来一些安全问题。针对这些 IoV 问题,最近提出了许多解决方案。然而,这些解决方案大多存在巨大的计算开销和安全问题。此外,恶意车辆可能被注入网络,访问或使用未经授权的服务。为了提高物联网网络的安全性,我们采用了蜉蝣算法来不断优化私钥。为了解决这些难题,我们提出了一种新颖的 VESecure 系统,可在车辆、路边装置(RSU)和云服务器之间提供安全通信、相互验证和密钥管理。我们使用真实或随机(ROR)甲骨文模型、Tamarin 和 Scyther 工具以及非正式安全分析,对该方案的安全性和隐私性进行了广泛审查。我们使用 OMNet++ 中的客观模块化网络测试平台来模拟该方案。通过与其他现有方法在通信和计算成本方面的比较,我们证明了我们方案的效率。
{"title":"VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment","authors":"Praneetha Surapaneni ,&nbsp;Sriramulu Bojjagani ,&nbsp;Muhammad Khurram Khan","doi":"10.1016/j.vehcom.2024.100822","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100822","url":null,"abstract":"<div><p>The Intelligent Transportation Systems (ITS) is a leading-edge, developing idea that seeks to revolutionize how people and things move inside and outside cities. Internet of Vehicles (IoV) forms a networked environment that joins infrastructure, pedestrians, fog, cloud, and vehicles to develop ITS. The IoV has the potential to improve transportation systems significantly, but as it is networked and data-driven, it poses several security issues. Numerous solutions to these IoV issues have recently been put forth. However, significant computing overhead and security concerns afflict the majority of them. Moreover, malicious vehicles may be injected into the network to access or use unauthorized services. To improve the security of the IoV network, the Mayfly algorithm is used to optimize the private keys continuously. To address these difficulties, we propose a novel VESecure system that provides secure communication, mutual authentication, and key management between vehicles, roadside units (RSU), and cloud servers. The scheme undergoes extensive scrutiny for security and privacy using the Real-or-Random (ROR) oracle model, Tamarin, and Scyther tools, along with the informal security analysis. An Objective Modular Network Testbed in OMNet++ is used to simulate the scheme. We prove our scheme's efficiency by comparing it with other existing methods regarding communication and computation costs.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100822"},"PeriodicalIF":5.8,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On a security scheme against collusive attacks in vehicular ad hoc networks 关于车载特设网络中对抗串通攻击的安全方案
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-26 DOI: 10.1016/j.vehcom.2024.100821
Na Fan , Chase Wu , Slimane Benabdallah , Jialong Li , Yuxin Gao , Qinglong Wang

Vehicular Ad Hoc Networks (VANETs) offer a promising solution to bring drivers comfortable driving experiences and also improve road safety in intelligent transportation systems, but also faces many security issues. Collusive attack is one of the most challenging threats in VANETs because it violates the fundamental assumption made by VANET-based applications that all received information be correct and trustworthy. Collusive attackers can not only generate and send false or forged messages, but also purposely manipulate the reputation value of normal or malicious vehicular nodes. To address these issues, we analyze the behaviors characteristics of collusive attacks and propose a generic, lightweight, and fully distributed detection scheme against collusive attacks in VANETs. This scheme integrates two methods to identify different collusive attacks for fraud reputation and fraud message, respectively, as well as an incentive method to restrain collusive nodes. Simulation-based experiments are conducted and the results illustrate the superiority of the proposed security scheme over state-of-the-art methods.

车载 Ad Hoc 网络(VANET)为驾驶员带来舒适的驾驶体验和提高智能交通系统的道路安全性提供了一种前景广阔的解决方案,但同时也面临着许多安全问题。串通攻击是 VANET 中最具挑战性的威胁之一,因为它违反了基于 VANET 的应用所做的基本假设,即所有接收到的信息都是正确可信的。串通攻击者不仅可以生成和发送虚假或伪造信息,还可以故意操纵正常或恶意车辆节点的信誉值。针对这些问题,我们分析了串通攻击的行为特征,并提出了一种通用、轻量级和全分布式的检测方案,以对抗 VANET 中的串通攻击。该方案集成了两种方法,分别用于识别欺诈声誉和欺诈信息的不同合谋攻击,以及一种抑制合谋节点的激励方法。我们进行了基于仿真的实验,结果表明所提出的安全方案优于最先进的方法。
{"title":"On a security scheme against collusive attacks in vehicular ad hoc networks","authors":"Na Fan ,&nbsp;Chase Wu ,&nbsp;Slimane Benabdallah ,&nbsp;Jialong Li ,&nbsp;Yuxin Gao ,&nbsp;Qinglong Wang","doi":"10.1016/j.vehcom.2024.100821","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100821","url":null,"abstract":"<div><p>Vehicular Ad Hoc Networks (VANETs) offer a promising solution to bring drivers comfortable driving experiences and also improve road safety in intelligent transportation systems, but also faces many security issues. Collusive attack is one of the most challenging threats in VANETs because it violates the fundamental assumption made by VANET-based applications that all received information be correct and trustworthy. Collusive attackers can not only generate and send false or forged messages, but also purposely manipulate the reputation value of normal or malicious vehicular nodes. To address these issues, we analyze the behaviors characteristics of collusive attacks and propose a generic, lightweight, and fully distributed detection scheme against collusive attacks in VANETs. This scheme integrates two methods to identify different collusive attacks for fraud reputation and fraud message, respectively, as well as an incentive method to restrain collusive nodes. Simulation-based experiments are conducted and the results illustrate the superiority of the proposed security scheme over state-of-the-art methods.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100821"},"PeriodicalIF":5.8,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Broadcast signcryption scheme with equality test in smart transportation system 智能交通系统中带有平等性测试的广播式签名加密方案
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-26 DOI: 10.1016/j.vehcom.2024.100820
Shufen Niu, Runyuan Dong, Wei Liu, Peng Ge, Qi Liu

With the generation of massive traffic information in the smart transportation system, the traffic control center efficiently utilizes broadcast communication to send multiple messages to multiple vehicles. Besides, diversified privacy disclosure and security attack issues also emerged spontaneously. To achieve secure communication between the traffic control center and vehicles in the smart transportation system, we design a broadcast signcryption scheme with equality test in the smart transportation system based on the certificateless cryptosystem and equality test. The scheme realizes message confidentiality and vehicle privacy by using the Lagrange interpolation theorem to encrypt messages and vehicle identities, while also achieving classify ciphertext by using the equality test and facilitate road traffic information management. Through numerical experiment analysis, the proposed work has higher operation efficiency and is more suitable for application in smart transportation systems.

随着智能交通系统中海量交通信息的产生,交通控制中心有效地利用广播通信向多辆汽车发送多条信息。此外,多样化的隐私泄露和安全攻击问题也随之出现。为了实现智能交通系统中交通控制中心与车辆之间的安全通信,我们设计了一种基于无证书密码系统和平等性测试的智能交通系统中的广播签名加密方案。该方案利用拉格朗日插值定理对信息和车辆身份进行加密,实现了信息的保密性和车辆的私密性,同时还利用等价检验实现了密文的分类,方便了道路交通信息管理。通过数值实验分析,该方案具有更高的运行效率,更适合在智能交通系统中应用。
{"title":"Broadcast signcryption scheme with equality test in smart transportation system","authors":"Shufen Niu,&nbsp;Runyuan Dong,&nbsp;Wei Liu,&nbsp;Peng Ge,&nbsp;Qi Liu","doi":"10.1016/j.vehcom.2024.100820","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100820","url":null,"abstract":"<div><p>With the generation of massive traffic information in the smart transportation system, the traffic control center efficiently utilizes broadcast communication to send multiple messages to multiple vehicles. Besides, diversified privacy disclosure and security attack issues also emerged spontaneously. To achieve secure communication between the traffic control center and vehicles in the smart transportation system, we design a broadcast signcryption scheme with equality test in the smart transportation system based on the certificateless cryptosystem and equality test. The scheme realizes message confidentiality and vehicle privacy by using the Lagrange interpolation theorem to encrypt messages and vehicle identities, while also achieving classify ciphertext by using the equality test and facilitate road traffic information management. Through numerical experiment analysis, the proposed work has higher operation efficiency and is more suitable for application in smart transportation systems.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100820"},"PeriodicalIF":5.8,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Markov-reward based estimation of the idle-time in vehicular networks to improve multimetric routing protocols 基于马尔可夫奖励的车辆网络空闲时间估计,以改进多参数路由协议
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-25 DOI: 10.1016/j.vehcom.2024.100823
Isabel V. Martin-Faus , Leticia Lemus Cárdenas , Ahmad Mohamad Mezher , Mónica Aguilar Igartua

Analyzing vehicular ad hoc networks (VANETs) poses a considerable challenge due to their constantly changing network topology and scarce network resources. Furthermore, defining suitable routing metrics for adaptive algorithms is a particularly hard task since these adaptive decisions should be taken according to the current conditions of the VANET. The literature contains different approaches aimed at optimizing the usage of wireless network resources. In a previous study, we introduced an analytical model based on a straightforward Markov reward chain (MRC) to capture transient measurements of the idle time of the link formed between two VANET nodes, which we denote as Tidle. This current study focuses on modeling and analyzing the influence of Tidle on adaptive decision mechanisms. Leveraging our MRC models, we have derived a concise equation to compute Tidle. This equation provides a quick evaluation of Tidle, facilitating quick adaptive routing decisions that align with the current VANET conditions. We have integrated our Tidle evaluation into multihop routing protocols. We specifically compare performance results of the 3MRP protocol with an enhanced version, I3MRP, which incorporates our Tidle metric. Simulation results demonstrate that integrating Tidle as a decision metric in the routing protocol enhances the performance of VANETs in terms of packet losses, packet delay, and throughput. The findings consistently indicate that I3MRP outperforms 3MRP by up to 50% in various scenarios across high, medium, and low vehicular densities.

由于网络拓扑不断变化,网络资源稀缺,因此分析车载 ad hoc 网络(VANET)是一项相当大的挑战。此外,为自适应算法定义合适的路由指标也是一项特别艰巨的任务,因为这些自适应决策应根据 VANET 的当前条件做出。文献中包含了各种旨在优化无线网络资源使用的方法。在之前的研究中,我们引入了一个基于直接马尔可夫奖赏链(MRC)的分析模型,以捕捉两个 VANET 节点之间链路空闲时间的瞬态测量值,我们将其命名为 Tidle。当前研究的重点是模拟和分析 Tidle 对自适应决策机制的影响。利用我们的 MRC 模型,我们得出了计算 Tidle 的简明方程。该等式可快速评估 Tidle,有助于根据当前 VANET 条件快速做出自适应路由决策。我们已将 Tidle 评估集成到多跳路由协议中。我们特别比较了 3MRP 协议与增强版 I3MRP 的性能结果,后者采用了我们的 Tidle 指标。仿真结果表明,在路由协议中集成 Tidle 作为决策指标,可提高 VANET 在数据包丢失、数据包延迟和吞吐量方面的性能。研究结果一致表明,在高、中、低车辆密度的各种情况下,I3MRP 的性能比 3MRP 高出多达 50%。
{"title":"Markov-reward based estimation of the idle-time in vehicular networks to improve multimetric routing protocols","authors":"Isabel V. Martin-Faus ,&nbsp;Leticia Lemus Cárdenas ,&nbsp;Ahmad Mohamad Mezher ,&nbsp;Mónica Aguilar Igartua","doi":"10.1016/j.vehcom.2024.100823","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100823","url":null,"abstract":"<div><p>Analyzing vehicular ad hoc networks (VANETs) poses a considerable challenge due to their constantly changing network topology and scarce network resources. Furthermore, defining suitable routing metrics for adaptive algorithms is a particularly hard task since these adaptive decisions should be taken according to the current conditions of the VANET. The literature contains different approaches aimed at optimizing the usage of wireless network resources. In a previous study, we introduced an analytical model based on a straightforward Markov reward chain (MRC) to capture transient measurements of the idle time of the link formed between two VANET nodes, which we denote as <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span>. This current study focuses on modeling and analyzing the influence of <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> on adaptive decision mechanisms. Leveraging our MRC models, we have derived a concise equation to compute <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span>. This equation provides a quick evaluation of <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span>, facilitating quick adaptive routing decisions that align with the current VANET conditions. We have integrated our <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> evaluation into multihop routing protocols. We specifically compare performance results of the 3MRP protocol with an enhanced version, I3MRP, which incorporates our <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> metric. Simulation results demonstrate that integrating <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> as a decision metric in the routing protocol enhances the performance of VANETs in terms of packet losses, packet delay, and throughput. The findings consistently indicate that I3MRP outperforms 3MRP by up to 50% in various scenarios across high, medium, and low vehicular densities.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100823"},"PeriodicalIF":5.8,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000986/pdfft?md5=316bc8cce7c744317806874319ecfaac&pid=1-s2.0-S2214209624000986-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141481657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
S-LDM: Server local dynamic map for 5G-based centralized enhanced collective perception S-LDM:基于 5G 的集中式增强集体感知的服务器本地动态地图
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-25 DOI: 10.1016/j.vehcom.2024.100819
C.M. Risma Carletti , F. Raviglione , C. Casetti , F. Stoffella , G.M. Yilma , F. Visintainer

The automotive field is undergoing significant technological advances, which includes making the next generation of autonomous vehicles smarter, greener and safer through vehicular networks, which are often referred to as Vehicle-to-Everything (V2X) communications. Together with V2X, centralized maneuver management services for autonomous vehicles are increasingly gaining importance, as, thanks to their complete view over the road, they can optimally manage even the most complex maneuvers targeting L4 driving and beyond. These services face the challenge of strictly requiring a high reliability and low latency, which are tackled with the deployment at orchestrated Multi-Access Edge Computing (MEC) platforms. In order to properly manage safety-critical maneuvers, these services need to receive a large amount of data from vehicles, even though the useful subset of data is often related to a specific context on the road (e.g., to specific road users or geographical areas). Decoding and post-processing a large amount of raw messages, which are then for the most part filtered, increases the load on safety-critical services, which should instead focus on meeting the deadlines for the actual control and management operations. On this basis, we present an innovative open-source, 5G & MEC enabled service, called Server Local Dynamic Map (S-LDM). The S-LDM is a service that collects information about vehicles and other non-connected road objects using standard-compliant messages. Its primary purpose is to create a centralized dynamic map of the road that can be shared efficiently with other services managing L4 automation, when needed. By doing so, the S-LDM enables these services to widely and precisely understand the current situation of sections of the road, offloading them from the need of quickly processing a large number of messages. After a detailed description of the service architecture, we validate it through extensive laboratory and pilot trials, involving the MEC platforms and production 5G networks of three major European network operations and two Stellantis vehicles equipped with V2X On-Board Units (OBUs). We show how it can efficiently handle high update rates and process each messages in less than few tenths of microseconds. We also provide a complete scalability analysis with details on deployment options, providing insights on where new instances should be created in practical 5G-based V2X scenarios.

汽车领域正在经历重大的技术进步,其中包括通过车载网络(通常称为 "车对万物"(V2X)通信)使下一代自动驾驶汽车更智能、更环保、更安全。除 V2X 外,自动驾驶汽车的集中操纵管理服务也越来越重要,因为凭借对道路的全面了解,自动驾驶汽车可以优化管理最复杂的 L4 驾驶甚至更复杂的操纵。这些服务面临着严格要求高可靠性和低延迟的挑战,通过部署协调的多接入边缘计算(MEC)平台来解决这一问题。为了正确管理对安全至关重要的操作,这些服务需要接收来自车辆的大量数据,尽管有用的数据子集通常与道路上的特定环境(如特定道路用户或地理区域)有关。对大量的原始信息进行解码和后处理,然后对大部分信息进行过滤,这增加了安全关键服务的负担,而这些服务应将重点放在满足实际控制和管理操作的最后期限要求上。在此基础上,我们提出了一种创新的开源 5G & MEC 服务,称为服务器本地动态地图(S-LDM)。S-LDM 是一种使用符合标准的信息收集车辆和其他非连接道路对象信息的服务。其主要目的是创建一个集中的道路动态地图,以便在需要时与管理 L4 自动化的其他服务有效共享。这样一来,S-LDM 就能让这些服务广泛而准确地了解路段的当前情况,使其无需快速处理大量信息。在对服务架构进行详细描述后,我们通过广泛的实验室和试点试验对其进行了验证,试验涉及欧洲三大网络运营公司的 MEC 平台和 5G 生产网络,以及两辆配备 V2X 车载单元 (OBU) 的 Stellantis 车辆。我们展示了它如何高效地处理高更新率,并在不到十分之几微秒的时间内处理每条信息。我们还提供了完整的可扩展性分析和详细的部署选项,为在基于 5G 的 V2X 实际应用场景中创建新实例提供了见解。
{"title":"S-LDM: Server local dynamic map for 5G-based centralized enhanced collective perception","authors":"C.M. Risma Carletti ,&nbsp;F. Raviglione ,&nbsp;C. Casetti ,&nbsp;F. Stoffella ,&nbsp;G.M. Yilma ,&nbsp;F. Visintainer","doi":"10.1016/j.vehcom.2024.100819","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100819","url":null,"abstract":"<div><p>The automotive field is undergoing significant technological advances, which includes making the next generation of autonomous vehicles smarter, greener and safer through vehicular networks, which are often referred to as Vehicle-to-Everything (V2X) communications. Together with V2X, centralized maneuver management services for autonomous vehicles are increasingly gaining importance, as, thanks to their complete view over the road, they can optimally manage even the most complex maneuvers targeting L4 driving and beyond. These services face the challenge of strictly requiring a high reliability and low latency, which are tackled with the deployment at orchestrated Multi-Access Edge Computing (MEC) platforms. In order to properly manage safety-critical maneuvers, these services need to receive a large amount of data from vehicles, even though the useful subset of data is often related to a specific context on the road (e.g., to specific road users or geographical areas). Decoding and post-processing a large amount of raw messages, which are then for the most part filtered, increases the load on safety-critical services, which should instead focus on meeting the deadlines for the actual control and management operations. On this basis, we present an innovative open-source, 5G &amp; MEC enabled service, called Server Local Dynamic Map (S-LDM). The S-LDM is a service that collects information about vehicles and other non-connected road objects using standard-compliant messages. Its primary purpose is to create a centralized dynamic map of the road that can be shared efficiently with other services managing L4 automation, when needed. By doing so, the S-LDM enables these services to widely and precisely understand the current situation of sections of the road, offloading them from the need of quickly processing a large number of messages. After a detailed description of the service architecture, we validate it through extensive laboratory and pilot trials, involving the MEC platforms and production 5G networks of three major European network operations and two Stellantis vehicles equipped with V2X On-Board Units (OBUs). We show how it can efficiently handle high update rates and process each messages in less than few tenths of microseconds. We also provide a complete scalability analysis with details on deployment options, providing insights on where new instances should be created in practical 5G-based V2X scenarios.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100819"},"PeriodicalIF":5.8,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000949/pdfft?md5=150e5c867ceac116888efba68e0e6ff3&pid=1-s2.0-S2214209624000949-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141481658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GASBO: User grouping–based gradient average subtraction–based optimisation for NOMA-based fog computing vehicular network GASBO:基于用户分组的梯度平均减法优化,用于基于 NOMA 的雾计算车载网络
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-22 DOI: 10.1016/j.vehcom.2024.100824
C Kumara Narayana Swamy, T Velmurugan

The Internet of Vehicles (IoV) for fog computing (FC) addresses issues such as traffic congestion, transportation efficiency, and privacy. Non-orthogonal multiple access (NOMA) is a popular technology that enhances spectral efficiency and increases the network's access capability. The synchronisation between NOMA and FC radio access networks extends the application of augmented or vehicular networking and other promising uses. However, with the rapid increase in user vehicles and mobile data, the existing IoV has not succeeded in meeting the real-world and dependable communication needs of modern intelligent transportation due to its limited flexibility. To overcome this, we propose a user grouping-based hybrid optimistic framework for resource allocation in NOMA-based FC vehicular networks (FCVR), named the gradient average subtraction-based optimisation (GASBO). Initially, the NOMA-based FCVR is simulated. User grouping is performed based on GASBO using the signal-to-interference-plus-noise ratio and user distance. Finally, resource allocation is achieved using the proposed GASBO, which combines gradient descent optimisation and average subtraction-based optimisation. The analytic measures obtained for energy efficiency, throughput, sub-channel utility, capacity, and penalty function are 5,366,844,362.870 bits/joule, 883.411 Mbps, 82.031, 2316.337, and 0.011, respectively.

用于雾计算(FC)的车联网(IoV)可解决交通拥堵、运输效率和隐私等问题。非正交多址接入(NOMA)是一种流行的技术,可提高频谱效率并增强网络的接入能力。NOMA 和 FC 无线接入网络之间的同步扩展了增强型网络或车载网络的应用,以及其他前景广阔的用途。然而,随着用户车辆和移动数据的快速增长,现有的 IoV 因其有限的灵活性而无法满足现代智能交通的实际和可靠通信需求。为了克服这一问题,我们提出了一种基于用户分组的混合优化框架,用于基于 NOMA 的 FC 车辆网络(FCVR)的资源分配,命名为基于梯度平均减法的优化(GASBO)。首先,模拟基于 NOMA 的 FCVR。在 GASBO 的基础上,利用信噪比和用户距离对用户进行分组。最后,使用建议的 GASBO 实现资源分配,该方法结合了梯度下降优化和基于平均减法的优化。分析得出的能效、吞吐量、子信道效用、容量和惩罚函数分别为 5,366,844,362.870 比特/焦耳、883.411 Mbps、82.031、2316.337 和 0.011。
{"title":"GASBO: User grouping–based gradient average subtraction–based optimisation for NOMA-based fog computing vehicular network","authors":"C Kumara Narayana Swamy,&nbsp;T Velmurugan","doi":"10.1016/j.vehcom.2024.100824","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100824","url":null,"abstract":"<div><p>The Internet of Vehicles (IoV) for fog computing (FC) addresses issues such as traffic congestion, transportation efficiency, and privacy. Non-orthogonal multiple access (NOMA) is a popular technology that enhances spectral efficiency and increases the network's access capability. The synchronisation between NOMA and FC radio access networks extends the application of augmented or vehicular networking and other promising uses. However, with the rapid increase in user vehicles and mobile data, the existing IoV has not succeeded in meeting the real-world and dependable communication needs of modern intelligent transportation due to its limited flexibility. To overcome this, we propose a user grouping-based hybrid optimistic framework for resource allocation in NOMA-based FC vehicular networks (FCVR), named the gradient average subtraction-based optimisation (GASBO). Initially, the NOMA-based FCVR is simulated. User grouping is performed based on GASBO using the signal-to-interference-plus-noise ratio and user distance. Finally, resource allocation is achieved using the proposed GASBO, which combines gradient descent optimisation and average subtraction-based optimisation. The analytic measures obtained for energy efficiency, throughput, sub-channel utility, capacity, and penalty function are 5,366,844,362.870 bits/joule, 883.411 Mbps, 82.031, 2316.337, and 0.011, respectively.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100824"},"PeriodicalIF":5.8,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud-edge-terminal architecture 基于可信云-边缘-终端架构的车联网身份验证和密钥协议
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-22 DOI: 10.1016/j.vehcom.2024.100825
Jun-feng Tian , Rui Ni

The continuous progression in cloud computing, edge computing, and associated technologies has notably hastened the progress of vehicle networking technology. This advancement is increasingly assuming a crucial role in enhancing driving safety, optimizing traffic management, and revolutionizing traffic control methodologies. The principal aim of Internet of Vehicles (IoV) technology is to establish a secure, convenient, and efficient novel driving paradigm, enabling intelligent transportation through wireless communication connecting roadside units and vehicles. Nevertheless, this wireless communication method is susceptible to potential attacks, including remote control, information monitoring, and identity simulation. Given this situation, effective authentication is required to address this security concern. Thus, this study proposes an identity authentication and key negotiation protocol grounded in a trusted cloud-edge-terminal architecture. This protocol facilitates mutual authentication, generates secure session keys for communication, guarantees the security of vehicle communication, and supports functionalities including privacy protection and password alteration for vehicle users. Time tree technology is employed for managing the edge nodes, facilitating the sharing of vehicle certification information among these nodes, and enhancing certification efficiency. Formal security analysis and informal security analysis are conducted to demonstrate the security of the proposed protocol, evaluating its security and practicality. Theoretical comparisons and experimental results demonstrate the outstanding computational and communication performance of the proposed protocol.

云计算、边缘计算和相关技术的不断进步显著加快了车联网技术的发展。这一进步在提高驾驶安全性、优化交通管理和革新交通控制方法方面发挥着越来越重要的作用。车联网(IoV)技术的主要目的是建立一种安全、便捷、高效的新型驾驶模式,通过连接路边设备和车辆的无线通信实现智能交通。然而,这种无线通信方式容易受到潜在的攻击,包括远程控制、信息监控和身份模拟。鉴于这种情况,需要有效的身份验证来解决这一安全问题。因此,本研究提出了一种基于可信云-边缘-终端架构的身份验证和密钥协商协议。该协议可促进相互认证,生成用于通信的安全会话密钥,保证车辆通信的安全性,并支持车辆用户的隐私保护和密码修改等功能。采用时间树技术管理边缘节点,促进这些节点之间共享车辆认证信息,提高认证效率。通过正式安全分析和非正式安全分析,证明了所提协议的安全性,评估了其安全性和实用性。理论比较和实验结果表明,所提协议具有出色的计算和通信性能。
{"title":"An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud-edge-terminal architecture","authors":"Jun-feng Tian ,&nbsp;Rui Ni","doi":"10.1016/j.vehcom.2024.100825","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100825","url":null,"abstract":"<div><p>The continuous progression in cloud computing, edge computing, and associated technologies has notably hastened the progress of vehicle networking technology. This advancement is increasingly assuming a crucial role in enhancing driving safety, optimizing traffic management, and revolutionizing traffic control methodologies. The principal aim of Internet of Vehicles (IoV) technology is to establish a secure, convenient, and efficient novel driving paradigm, enabling intelligent transportation through wireless communication connecting roadside units and vehicles. Nevertheless, this wireless communication method is susceptible to potential attacks, including remote control, information monitoring, and identity simulation. Given this situation, effective authentication is required to address this security concern. Thus, this study proposes an identity authentication and key negotiation protocol grounded in a trusted cloud-edge-terminal architecture. This protocol facilitates mutual authentication, generates secure session keys for communication, guarantees the security of vehicle communication, and supports functionalities including privacy protection and password alteration for vehicle users. Time tree technology is employed for managing the edge nodes, facilitating the sharing of vehicle certification information among these nodes, and enhancing certification efficiency. Formal security analysis and informal security analysis are conducted to demonstrate the security of the proposed protocol, evaluating its security and practicality. Theoretical comparisons and experimental results demonstrate the outstanding computational and communication performance of the proposed protocol.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100825"},"PeriodicalIF":5.8,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intelligent clustering scheme based on whale optimization algorithm in flying ad hoc networks 基于鲸鱼优化算法的飞行 ad hoc 网络智能聚类方案
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-07 DOI: 10.1016/j.vehcom.2024.100805
Mehdi Hosseinzadeh , Jawad Tanveer , Faisal Alanazi , Khursheed Aurangzeb , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Aso Darwesh , Sang-Woong Lee , Amir Masoud Rahmani

Due to the progress of unmanned aerial vehicles (UAVs), this new technology is widely applied in military and civilian areas. Multi-UAV networks are often known as flying ad hoc networks (FANETs). Due to these applications, FANET must ensure communication stability and have high scalability. These goals are achieved by presenting clustering techniques in FANETs. However, the characteristics of these networks, like high-mobility nodes, limited energy, and dynamic topology, have created great challenges in two important processes of clustering protocols, namely cluster construction and the selection of cluster heads. In this paper, an intelligent clustering scheme based on the whale optimization algorithm called ICW is suggested in flying ad hoc networks. Firstly, each UAV specifies its hello interval based on the lifespan of adjacent links to guarantee the adaptability of ICW to FANET. Then, a centralized clustering process is done using a whale optimization algorithm (WOA) to find the best cluster centers on the network. To determine the membership of each UAV in a cluster, ICW employs a new criterion, i.e. closeness ratio, so that each UAV joins a cluster with the best closeness ratio. In addition, the evaluation of each whale is carried out based on a fitness function, consisting of three components, namely the number of isolated clusters, the ratio of inter-cluster distance to intra-cluster distance, and cluster size. Then, a cluster head is selected for each cluster based on a score value. This score is dependent on the weighted sum of four metrics, namely remaining energy, the average link lifespan between each UAV and its neighbors, neighbor degree, and the average distance between each UAV and its neighbors. In the last step, two routing processes, namely intra-cluster routing and inter-cluster routing, are introduced in FANET. Then, the evaluation and implementation of ICW is performed through the NS2 simulator. After completing the simulation process, ICW is compared to MWCRSF, DCM, and GWO, and the evaluation results are presented in two scenarios, namely network evaluation in the clustering process and network evaluation in the routing process. Accordingly, in the first scenario, ICW has low clustering time and a high cluster lifetime. In the second scenario, ICW optimizes energy consumption, network longevity, packet delivery rate, routing overhead, and delay compared to other approaches. However, throughput in ICW is about 3.9% lower than that in MWCRSF.

由于无人驾驶飞行器(UAV)的进步,这项新技术被广泛应用于军事和民用领域。多无人机网络通常被称为飞行临时网络(FANET)。由于这些应用,FANET 必须确保通信的稳定性和高可扩展性。这些目标可以通过在 FANET 中采用聚类技术来实现。然而,这些网络的特点,如高移动性节点、有限的能量和动态拓扑,给聚类协议的两个重要过程,即聚类构建和聚类头的选择带来了巨大挑战。本文提出了一种基于鲸鱼优化算法(ICW)的飞行 ad hoc 网络智能聚类方案。首先,每个无人机根据相邻链路的寿命来指定自己的hello间隔,以保证ICW对FANET的适应性。然后,使用鲸鱼优化算法(WOA)进行集中聚类,以找到网络上的最佳聚类中心。为了确定每架无人机在一个簇中的成员资格,ICW 采用了一种新的标准,即亲近比,从而使每架无人机加入亲近比最佳的簇。此外,对每条鲸鱼的评估是基于一个合适度函数进行的,该函数由三个部分组成,即孤立簇的数量、簇间距离与簇内距离之比以及簇的大小。然后,根据得分值为每个簇选择簇头。这个分数取决于四个指标的加权和,即剩余能量、每个无人机与其邻居之间的平均链路寿命、邻居度以及每个无人机与其邻居之间的平均距离。最后,在 FANET 中引入了两个路由过程,即集群内路由和集群间路由。然后,通过 NS2 模拟器对 ICW 进行评估和实现。完成仿真过程后,将 ICW 与 MWCRSF、DCM 和 GWO 进行比较,并将评估结果分为两种情况,即聚类过程中的网络评估和路由过程中的网络评估。因此,在第一种情况下,ICW 的聚类时间短,聚类寿命长。在第二种情况下,与其他方法相比,ICW 优化了能量消耗、网络寿命、数据包交付率、路由开销和延迟。不过,ICW 的吞吐量比 MWCRSF 低约 3.9%。
{"title":"An intelligent clustering scheme based on whale optimization algorithm in flying ad hoc networks","authors":"Mehdi Hosseinzadeh ,&nbsp;Jawad Tanveer ,&nbsp;Faisal Alanazi ,&nbsp;Khursheed Aurangzeb ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Efat Yousefpoor ,&nbsp;Aso Darwesh ,&nbsp;Sang-Woong Lee ,&nbsp;Amir Masoud Rahmani","doi":"10.1016/j.vehcom.2024.100805","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100805","url":null,"abstract":"<div><p>Due to the progress of unmanned aerial vehicles (UAVs), this new technology is widely applied in military and civilian areas. Multi-UAV networks are often known as flying ad hoc networks (FANETs). Due to these applications, FANET must ensure communication stability and have high scalability. These goals are achieved by presenting clustering techniques in FANETs. However, the characteristics of these networks, like high-mobility nodes, limited energy, and dynamic topology, have created great challenges in two important processes of clustering protocols, namely cluster construction and the selection of cluster heads. In this paper, an intelligent clustering scheme based on the whale optimization algorithm called ICW is suggested in flying ad hoc networks. Firstly, each UAV specifies its hello interval based on the lifespan of adjacent links to guarantee the adaptability of ICW to FANET. Then, a centralized clustering process is done using a whale optimization algorithm (WOA) to find the best cluster centers on the network. To determine the membership of each UAV in a cluster, ICW employs a new criterion, i.e. closeness ratio, so that each UAV joins a cluster with the best closeness ratio. In addition, the evaluation of each whale is carried out based on a fitness function, consisting of three components, namely the number of isolated clusters, the ratio of inter-cluster distance to intra-cluster distance, and cluster size. Then, a cluster head is selected for each cluster based on a score value. This score is dependent on the weighted sum of four metrics, namely remaining energy, the average link lifespan between each UAV and its neighbors, neighbor degree, and the average distance between each UAV and its neighbors. In the last step, two routing processes, namely intra-cluster routing and inter-cluster routing, are introduced in FANET. Then, the evaluation and implementation of ICW is performed through the NS2 simulator. After completing the simulation process, ICW is compared to MWCRSF, DCM, and GWO, and the evaluation results are presented in two scenarios, namely network evaluation in the clustering process and network evaluation in the routing process. Accordingly, in the first scenario, ICW has low clustering time and a high cluster lifetime. In the second scenario, ICW optimizes energy consumption, network longevity, packet delivery rate, routing overhead, and delay compared to other approaches. However, throughput in ICW is about 3.9% lower than that in MWCRSF.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100805"},"PeriodicalIF":6.7,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141325587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength 基于接收信号强度的无损量化方法,用于在车载 ad hoc 网络中生成物理层密钥
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-04 DOI: 10.1016/j.vehcom.2024.100809
Ibraheem Abdelazeem , Weibin Zhang , Abdeldime Mohamedsalih , Mohamed Abdalwohab , Ahmedalmansour Abuobida

Vehicular Ad Hoc Networks (VANETs) provide various benefits and play a crucial role in improving efficiency and ensuring human safety across different applications. However, these advantages also give rise to security challenges and privacy concerns, necessitating a thorough examination of security attacks. Current key generation schemes, particularly those based on the Physical-Layer Model (PLM), face limitations such as low key generation rates and inadequate randomness. This paper introduces an innovative key generation method that utilizes adaptive physical-layer techniques and lossless quantization. The method involves an eight-level quantization process, which enables precise granularity and adaptive selection of quantization thresholds to tailor the computation of Received Signal Strength (RSS) measurements to individual needs. The adaptive approach ensures the retention of information within RSS measurements, resulting in reduced bit disagreement rates and enhanced randomness of the generated keys. Simulated evaluations demonstrate the effectiveness of the proposed method, showing superior performance in terms of bit generation, entropy, and secrecy rates, while also minimizing the occurrence of unnecessary measurements. This advancement holds significant promise for strengthening the security framework within VANETs.

车载 Ad Hoc 网络(VANET)具有多种优势,在提高效率和确保不同应用中的人类安全方面发挥着至关重要的作用。然而,这些优势也带来了安全挑战和隐私问题,因此有必要对安全攻击进行深入研究。当前的密钥生成方案,尤其是基于物理层模型(PLM)的方案,面临着密钥生成率低和随机性不足等限制。本文介绍了一种利用自适应物理层技术和无损量化的创新密钥生成方法。该方法涉及一个八级量化过程,可实现精确的粒度和量化阈值的自适应选择,从而根据个人需求定制接收信号强度(RSS)测量的计算。自适应方法可确保保留 RSS 测量值中的信息,从而降低比特分歧率,并增强所生成密钥的随机性。模拟评估证明了所提方法的有效性,在比特生成、熵和保密率方面表现出卓越的性能,同时还最大限度地减少了不必要的测量。这一进步为加强 VANET 的安全框架带来了重大希望。
{"title":"A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength","authors":"Ibraheem Abdelazeem ,&nbsp;Weibin Zhang ,&nbsp;Abdeldime Mohamedsalih ,&nbsp;Mohamed Abdalwohab ,&nbsp;Ahmedalmansour Abuobida","doi":"10.1016/j.vehcom.2024.100809","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100809","url":null,"abstract":"<div><p>Vehicular Ad Hoc Networks (VANETs) provide various benefits and play a crucial role in improving efficiency and ensuring human safety across different applications. However, these advantages also give rise to security challenges and privacy concerns, necessitating a thorough examination of security attacks. Current key generation schemes, particularly those based on the Physical-Layer Model (PLM), face limitations such as low key generation rates and inadequate randomness. This paper introduces an innovative key generation method that utilizes adaptive physical-layer techniques and lossless quantization. The method involves an eight-level quantization process, which enables precise granularity and adaptive selection of quantization thresholds to tailor the computation of Received Signal Strength (RSS) measurements to individual needs. The adaptive approach ensures the retention of information within RSS measurements, resulting in reduced bit disagreement rates and enhanced randomness of the generated keys. Simulated evaluations demonstrate the effectiveness of the proposed method, showing superior performance in terms of bit generation, entropy, and secrecy rates, while also minimizing the occurrence of unnecessary measurements. This advancement holds significant promise for strengthening the security framework within VANETs.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100809"},"PeriodicalIF":6.7,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141303831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fully distributed multi-agent processing strategy applied to vehicular networks 应用于车载网络的全分布式多代理处理策略
IF 6.7 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-06-04 DOI: 10.1016/j.vehcom.2024.100806
Vladimir R. de Lima, Marcello L.R. de Campos

This work explores distributed processing techniques, together with recent advances in multi-agent reinforcement learning (MARL) to implement a fully decentralized reward and decision-making scheme to efficiently allocate resources (spectrum and power). The method targets processes with strong dynamics and stringent requirements such as cellular vehicle-to-everything networks (C-V2X). In our approach, the C-V2X is seen as a strongly connected network of intelligent agents which adopt a distributed reward scheme in a cooperative and decentralized manner, taking into consideration their channel conditions and selected actions in order to achieve their goals cooperatively. The simulation results demonstrate the effectiveness of the developed algorithm, named Distributed Multi-Agent Reinforcement Learning (DMARL), achieving performances very close to that of a centralized reward design, with the advantage of not having the limitations and vulnerabilities inherent to a fully or partially centralized solution.

这项工作探索了分布式处理技术,并结合多代理强化学习(MARL)的最新进展,实施了一种完全分散的奖励和决策方案,以有效分配资源(频谱和功率)。该方法的目标流程具有很强的动态性和严格的要求,如蜂窝车对万物网络(C-V2X)。在我们的方法中,C-V2X 被视为一个由智能代理组成的强连接网络,这些代理以合作和分散的方式采用分布式奖励方案,同时考虑到它们的信道条件和选定的行动,以合作实现它们的目标。仿真结果表明,所开发的名为分布式多代理强化学习(DMARL)的算法非常有效,其性能非常接近集中式奖励设计,但优点是没有完全或部分集中式解决方案固有的局限性和脆弱性。
{"title":"Fully distributed multi-agent processing strategy applied to vehicular networks","authors":"Vladimir R. de Lima,&nbsp;Marcello L.R. de Campos","doi":"10.1016/j.vehcom.2024.100806","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100806","url":null,"abstract":"<div><p>This work explores distributed processing techniques, together with recent advances in multi-agent reinforcement learning (MARL) to implement a fully decentralized reward and decision-making scheme to efficiently allocate resources (spectrum and power). The method targets processes with strong dynamics and stringent requirements such as cellular vehicle-to-everything networks (C-V2X). In our approach, the C-V2X is seen as a strongly connected network of intelligent agents which adopt a distributed reward scheme in a cooperative and decentralized manner, taking into consideration their channel conditions and selected actions in order to achieve their goals cooperatively. The simulation results demonstrate the effectiveness of the developed algorithm, named Distributed Multi-Agent Reinforcement Learning (DMARL), achieving performances very close to that of a centralized reward design, with the advantage of not having the limitations and vulnerabilities inherent to a fully or partially centralized solution.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"49 ","pages":"Article 100806"},"PeriodicalIF":6.7,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141303833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1