首页 > 最新文献

Vehicular Communications最新文献

英文 中文
A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones 基于后量子安全 PUF 的无人机互联网跨域身份验证机制
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-25 DOI: 10.1016/j.vehcom.2024.100780
Aiswarya S. Nair , Sabu M. Thampi , Jafeel V.

With the increasing prevalence of drones, guaranteeing their authentication and secure communication has become paramount in drone networks to mitigate unauthorized access and malicious attacks. Cross-domain authentication is crucial in the context of the Internet of Drones (IoD) for safely verifying and establishing trust between diverse drones and their respective control stations, which may belong to different regions or organizations. Effectively accessing resources or services in another domain while maintaining security and efficiency poses a significant challenge. Conventional authentication mechanisms relying on challenging problems like discrete logarithm and integer factorization might not be sufficient to guarantee the security and effectiveness of drone-based systems in the post-quantum era. To address this, we propose a distributed post-quantum cryptography and Physical Unclonable Function (PUF) based cross-domain authentication protocol for IoD. Key contributions of this work include the elimination of secret key storage on drones, mutual authentication, emphasis on hardware security, incorporation of post-quantum security measures, efficient cross-domain authentication and resilience against cyber attacks such as eavesdropping, impersonation, replay attack, untraceability, and PUF-modeling attack. The performance of the proposed protocol is assessed utilizing metrics like processing time, communication cost and storage utilization. In operations associated to the blockchain ledger, variables such as latency, throughput, CPU utilization, and memory utilization are also examined. The protocol shows a reduced computation time and zero sensitive data storage in drone memory, despite a slightly higher communication cost that is manageable with 5G-enabled drones. Comparative analysis against existing solutions in the domain highlights the superior security of the proposed protocol, positioning it as a promising solution for the evolving quantum landscape.

随着无人机的日益普及,保证无人机的身份验证和安全通信已成为无人机网络减少未经授权访问和恶意攻击的关键。在无人机互联网(IoD)的背景下,跨域身份验证对于安全验证和建立不同无人机及其各自控制站(可能属于不同地区或组织)之间的信任至关重要。有效访问另一域的资源或服务,同时保持安全性和效率是一项重大挑战。传统的认证机制依赖于离散对数和整数因式分解等挑战性问题,在后量子时代可能不足以保证基于无人机的系统的安全性和有效性。为此,我们提出了一种基于分布式后量子密码学和物理不可克隆函数(PUF)的 IoD 跨域身份验证协议。这项工作的主要贡献包括消除无人机上的秘钥存储、相互验证、强调硬件安全、纳入后量子安全措施、高效跨域验证以及抵御网络攻击(如窃听、冒充、重放攻击、不可追踪和 PUF 建模攻击)。利用处理时间、通信成本和存储利用率等指标对所提协议的性能进行了评估。在与区块链账本相关的操作中,还考察了延迟、吞吐量、CPU 利用率和内存利用率等变量。该协议缩短了计算时间,无人机内存中的敏感数据存储量为零,尽管通信成本略高,但支持 5G 的无人机可以应对。与该领域现有解决方案的对比分析凸显了所提协议的卓越安全性,使其成为不断发展的量子领域的一个有前途的解决方案。
{"title":"A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones","authors":"Aiswarya S. Nair ,&nbsp;Sabu M. Thampi ,&nbsp;Jafeel V.","doi":"10.1016/j.vehcom.2024.100780","DOIUrl":"10.1016/j.vehcom.2024.100780","url":null,"abstract":"<div><p>With the increasing prevalence of drones, guaranteeing their authentication and secure communication has become paramount in drone networks to mitigate unauthorized access and malicious attacks. Cross-domain authentication is crucial in the context of the Internet of Drones (IoD) for safely verifying and establishing trust between diverse drones and their respective control stations, which may belong to different regions or organizations. Effectively accessing resources or services in another domain while maintaining security and efficiency poses a significant challenge. Conventional authentication mechanisms relying on challenging problems like discrete logarithm and integer factorization might not be sufficient to guarantee the security and effectiveness of drone-based systems in the post-quantum era. To address this, we propose a distributed post-quantum cryptography and Physical Unclonable Function (PUF) based cross-domain authentication protocol for IoD. Key contributions of this work include the elimination of secret key storage on drones, mutual authentication, emphasis on hardware security, incorporation of post-quantum security measures, efficient cross-domain authentication and resilience against cyber attacks such as eavesdropping, impersonation, replay attack, untraceability, and PUF-modeling attack. The performance of the proposed protocol is assessed utilizing metrics like processing time, communication cost and storage utilization. In operations associated to the blockchain ledger, variables such as latency, throughput, CPU utilization, and memory utilization are also examined. The protocol shows a reduced computation time and zero sensitive data storage in drone memory, despite a slightly higher communication cost that is manageable with 5G-enabled drones. Comparative analysis against existing solutions in the domain highlights the superior security of the proposed protocol, positioning it as a promising solution for the evolving quantum landscape.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140764702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV swarm communication reliability based on a comprehensive SINR model 基于综合 SINR 模型的无人机蜂群通信可靠性
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-21 DOI: 10.1016/j.vehcom.2024.100781
Reuben Yaw Hui Lim , Joanne Mun-Yee Lim , Boon Leong Lan , Patrick Wan Chuan Ho , Nee Shen Ho , Thomas Wei Min Ooi

Communication reliability is one of the most important factors in ensuring the safe operation of unmanned aerial vehicles (UAVs). The reliability of wireless communication for a UAV swarm is typically characterized by the signal-to-interference-and-noise ratio (SINR). However, previous work on UAV swarm communication reliability did not use a comprehensive SINR model. In this paper, we derived two novel closed-form approximations – lognormal and generalized beta prime (GBP) - of UAV swarm communication reliability based on a comprehensive SINR model. The model includes shadowing, multipath fading, the dependence of fading on external factors, which are the probability of line-of-sight (LoS) and the physical environment, as well as all possible interference within the system, which may be from the UAVs and the ground control station (GCS). For typical swarm heights between 60 – 300 m and up to 32 UAVs, comparisons of the approximate and simulated reliabilities for UAV swarms with a radius up to a critical value (which increases with the number and transmit power of the UAVs) show that only the lognormal approximation is accurate for all uplink and downlink communications, up to a critical horizontal distance from the GCS (which increases with height). Benchmarking of the lognormal approximation shows that neglecting either shadowing or multipath fading leads to high approximation errors. An example of how the lognormal approximation can be used to evaluate and maintain the communication reliability of a UAV swarm during deployment is given. Furthermore, it can be used to derive other SINR-dependent performance metrics, such as ergodic capacity and symbol error rate, which are useful in UAV network design and monitoring.

通信可靠性是确保无人飞行器(UAV)安全运行的最重要因素之一。无人机群无线通信的可靠性通常由信噪比(SINR)来表征。然而,以往关于无人机群通信可靠性的研究并未使用全面的 SINR 模型。本文基于综合 SINR 模型,推导出无人机蜂群通信可靠性的两种新型闭式近似值--对数正态和广义贝塔素数(GBP)。该模型包括阴影、多径衰减、衰减与外部因素(即视距(LoS)概率和物理环境)的关系,以及系统内所有可能的干扰(可能来自无人机和地面控制站(GCS))。对于半径达到临界值(随无人机数量和发射功率的增加而增加)的无人机群,对数正态近似和模拟可靠性的比较表明,在与地面控制站的临界水平距离(随高度的增加而增加)以内,对数正态近似对所有上行和下行通信都是准确的。对数正态近似的基准测试表明,忽略阴影或多路径衰落都会导致很高的近似误差。本文举例说明了对数正态近似如何用于评估和维持无人机群在部署过程中的通信可靠性。此外,它还可用于推导其他依赖于 SINR 的性能指标,如遍历容量和符号错误率,这些指标在无人机网络设计和监控中非常有用。
{"title":"UAV swarm communication reliability based on a comprehensive SINR model","authors":"Reuben Yaw Hui Lim ,&nbsp;Joanne Mun-Yee Lim ,&nbsp;Boon Leong Lan ,&nbsp;Patrick Wan Chuan Ho ,&nbsp;Nee Shen Ho ,&nbsp;Thomas Wei Min Ooi","doi":"10.1016/j.vehcom.2024.100781","DOIUrl":"10.1016/j.vehcom.2024.100781","url":null,"abstract":"<div><p>Communication reliability is one of the most important factors in ensuring the safe operation of unmanned aerial vehicles (UAVs). The reliability of wireless communication for a UAV swarm is typically characterized by the signal-to-interference-and-noise ratio (SINR). However, previous work on UAV swarm communication reliability did not use a comprehensive SINR model. In this paper, we derived two novel closed-form approximations – lognormal and generalized beta prime (GBP) - of UAV swarm communication reliability based on a comprehensive SINR model. The model includes shadowing, multipath fading, the dependence of fading on external factors, which are the probability of line-of-sight (LoS) and the physical environment, as well as all possible interference within the system, which may be from the UAVs and the ground control station (GCS). For typical swarm heights between 60 – 300 m and up to 32 UAVs, comparisons of the approximate and simulated reliabilities for UAV swarms with a radius up to a critical value (which increases with the number and transmit power of the UAVs) show that only the lognormal approximation is accurate for all uplink and downlink communications, up to a critical horizontal distance from the GCS (which increases with height). Benchmarking of the lognormal approximation shows that neglecting either shadowing or multipath fading leads to high approximation errors. An example of how the lognormal approximation can be used to evaluate and maintain the communication reliability of a UAV swarm during deployment is given. Furthermore, it can be used to derive other SINR-dependent performance metrics, such as ergodic capacity and symbol error rate, which are useful in UAV network design and monitoring.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140787209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DCFH: A dynamic clustering approach based on fire hawk optimizer in flying ad hoc networks DCFH:基于飞行 ad hoc 网络中火鹰优化器的动态聚类方法
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-21 DOI: 10.1016/j.vehcom.2024.100778
Mehdi Hosseinzadeh , Saqib Ali , Husham Jawad Ahmad , Faisal Alanazi , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Aso Darwesh , Amir Masoud Rahmani , Sang-Woong Lee

In flying ad hoc networks (FANETs), unmanned aerial vehicles (UAVs) communicate with each other without any fixed infrastructure. Because of frequent topological changes, instability of wireless communication, three-dimensional movement of UAVs, and limited resources, especially energy, FANETs deal with many challenges, especially the instability of UAV swarms. One solution to address these problems is clustering because it maintains network performance and increases scalability. In this paper, a dynamic clustering scheme based on fire hawk optimizer (DCFH) is proposed for FANETs. In DCFH, each cluster head calculates the period of hello messages in its cluster based on its velocity. Then, a fire hawk optimizer (FHO)-based dynamic clustering operation is carried out to determine the role of each UAV (cluster head (CH) or cluster member (CM)) in the network. To calculate the fitness value of each fire hawk, a fitness function is suggested based on four elements, namely the balance of energy consumption, the number of isolated clusters, the distribution of CHs, and the neighbor degree. To improve cluster stability, each CH manages the movement of its CMs and adjusts it based on its movement in the network. In the last phase, DCFH defines a greedy routing process to determine the next-hop node based on a score, which consists of distance between CHs, energy, and buffer capacity. Finally, DCFH is simulated using the network simulator version 2 (NS2), and its performance is compared with three methods, including the mobility-based weighted cluster routing scheme (MWCRSF), the dynamic clustering mechanism (DCM), and the Grey wolf optimization (GWO)-based clustering protocol. The simulation results show that DCFH well manages the number of clusters in the network. It improves the cluster construction time (about 55.51%), cluster lifetime (approximately 11.13%), energy consumption (about 15.16%), network lifetime (about 2.6%), throughput (approximately 3.9%), packet delivery rate (about 0.61%), and delay (approximately 14.29%). However, its overhead is approximately 8.72% more than MWCRSF.

在飞行 ad hoc 网络(FANET)中,无人驾驶飞行器(UAV)在没有任何固定基础设施的情况下相互通信。由于拓扑变化频繁、无线通信不稳定、无人飞行器的三维移动以及资源(尤其是能源)有限,FANET 面临着许多挑战,尤其是无人飞行器群的不稳定性。解决这些问题的方法之一是集群,因为它能保持网络性能并提高可扩展性。本文为 FANETs 提出了一种基于 IR awk 优化器(DCFH)的动态分簇方案。在 DCFH 中,每个簇头根据自己的速度计算簇中 hello 消息的周期。然后,进行基于火鹰优化器(FHO)的动态聚类操作,以确定每个无人机(簇头(CH)或簇成员(CM))在网络中的角色。为了计算每个火鹰的适配值,建议使用基于四个要素的适配函数,即能量消耗平衡、孤立簇数量、CH 分布和邻居度。为了提高簇的稳定性,每个 CH 都会管理其 CM 的移动,并根据其在网络中的移动情况进行调整。在最后阶段,DCFH 定义了一个贪婪路由过程,根据得分(由 CH 之间的距离、能量和缓冲区容量组成)确定下一跳节点。最后,使用网络模拟器第二版(NS2)对 DCFH 进行了仿真,并将其性能与基于移动性的加权簇路由方案(MWCRSF)、动态聚类机制(DCM)和基于灰狼优化(GWO)的聚类协议等三种方法进行了比较。仿真结果表明,DCFH 能很好地管理网络中的簇数。它改善了簇构建时间(约 55.51%)、簇寿命(约 11.13%)、能耗(约 15.16%)、网络寿命(约 2.6%)、吞吐量(约 3.9%)、数据包交付率(约 0.61%)和延迟(约 14.29%)。不过,它的开销比 MWCRSF 高出约 8.72%。
{"title":"DCFH: A dynamic clustering approach based on fire hawk optimizer in flying ad hoc networks","authors":"Mehdi Hosseinzadeh ,&nbsp;Saqib Ali ,&nbsp;Husham Jawad Ahmad ,&nbsp;Faisal Alanazi ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Efat Yousefpoor ,&nbsp;Aso Darwesh ,&nbsp;Amir Masoud Rahmani ,&nbsp;Sang-Woong Lee","doi":"10.1016/j.vehcom.2024.100778","DOIUrl":"10.1016/j.vehcom.2024.100778","url":null,"abstract":"<div><p>In flying ad hoc networks (FANETs), unmanned aerial vehicles (UAVs) communicate with each other without any fixed infrastructure. Because of frequent topological changes, instability of wireless communication, three-dimensional movement of UAVs, and limited resources, especially energy, FANETs deal with many challenges, especially the instability of UAV swarms. One solution to address these problems is clustering because it maintains network performance and increases scalability. In this paper, a <strong><u>d</u></strong>ynamic <strong><u>c</u></strong>lustering scheme based on <strong><u>f</u></strong>ire <strong><u>h</u></strong>awk optimizer (DCFH) is proposed for FANETs. In DCFH, each cluster head calculates the period of hello messages in its cluster based on its velocity. Then, a fire hawk optimizer (FHO)-based dynamic clustering operation is carried out to determine the role of each UAV (cluster head (CH) or cluster member (CM)) in the network. To calculate the fitness value of each fire hawk, a fitness function is suggested based on four elements, namely the balance of energy consumption, the number of isolated clusters, the distribution of CHs, and the neighbor degree. To improve cluster stability, each CH manages the movement of its CMs and adjusts it based on its movement in the network. In the last phase, DCFH defines a greedy routing process to determine the next-hop node based on a score, which consists of distance between CHs, energy, and buffer capacity. Finally, DCFH is simulated using the network simulator version 2 (NS2), and its performance is compared with three methods, including the mobility-based weighted cluster routing scheme (MWCRSF), the dynamic clustering mechanism (DCM), and the Grey wolf optimization (GWO)-based clustering protocol. The simulation results show that DCFH well manages the number of clusters in the network. It improves the cluster construction time (about 55.51%), cluster lifetime (approximately 11.13%), energy consumption (about 15.16%), network lifetime (about 2.6%), throughput (approximately 3.9%), packet delivery rate (about 0.61%), and delay (approximately 14.29%). However, its overhead is approximately 8.72% more than MWCRSF.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140640638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation and analysis of 5G waveforms to reduce BER for vehicular communications 模拟和分析 5G 波形以降低车辆通信的误码率
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-16 DOI: 10.1016/j.vehcom.2024.100777
Fowzia Sultana Sowdagar , Krishna Naik Karamtot

In today's rapidly evolving world, wireless communication has become a pervasive force, profoundly impacting various facets of our daily lives. Wireless Vehicular Networks stand out as a captivating realm of research, with a key focus on fostering information exchange among autonomous vehicles. As researchers witness surging demand in this domain, there is a growing emphasis on devising advanced techniques to augment network performance, particularly within the context of Fifth-generation (5G) applications, such as vehicular communication. The concept of Vehicle-to-vehicle (V2V) communications is poised to play a pivotal role in the future, presenting formidable challenges for the air interface by accommodating asynchronous multiple access and high mobility. Within this dynamic landscape, security and privacy issues loom large for 5G-enabled vehicle networks, many of which remain largely unexplored. The conventional waveforms, including Orthogonal Frequency Division Multiplexing (OFDM), may fall short of meeting these evolving standards. In this paper, authors delve into a comparative exploration of two waveform families, namely Filter Bank Multicarrier (FBMC) and Universal Filtered Multi-Carrier (UFMC), concerning their design and performance trade-offs. authors also examine their compatibility with various digital modulation schemes like 4-Quadrature Amplitude Modulation (QAM), 16-QAM, Offset Quadrature Phase Shift Keying (OQPSK), and Shaped offset OQPSK (SOQPSK). Through MATLAB simulations, our research vividly demonstrates the superior performance of UFMC when juxtaposed with OFDM and FBMC, especially concerning Bit Error Rate (BER) in both Rayleigh and Nakagami fading channels. In particular, authors consider a Nakagami shape parameter of 10, which yields a remarkable minimum BER for UFMC.

在当今飞速发展的世界中,无线通信已成为一种无处不在的力量,深刻影响着我们日常生活的方方面面。无线车载网络(Wireless Vehicular Networks)是一个引人入胜的研究领域,其重点是促进自动驾驶车辆之间的信息交流。随着研究人员对这一领域需求的激增,人们越来越重视设计先进技术来提高网络性能,特别是在第五代(5G)应用(如车载通信)的背景下。车对车(V2V)通信的概念将在未来发挥举足轻重的作用,通过异步多路接入和高流动性为空中接口带来巨大挑战。在这一动态环境中,安全和隐私问题是 5G 车载网络面临的主要问题,其中许多问题在很大程度上仍未得到解决。包括正交频分复用(OFDM)在内的传统波形可能无法满足这些不断发展的标准。在本文中,作者深入探讨了滤波器组多载波(FBMC)和通用滤波多载波(UFMC)这两个波形系列在设计和性能权衡方面的比较。作者还研究了它们与各种数字调制方案的兼容性,如 4-正交幅度调制(QAM)、16-QAM、偏移正交相移键控(OQPSK)和异形偏移 OQPSK(SOQPSK)。通过 MATLAB 仿真,我们的研究生动地展示了 UFMC 与 OFDM 和 FBMC 相比的优越性能,尤其是在瑞利和中神衰落信道中的误码率(BER)方面。作者特别考虑了 10 的中神形状参数,这使得 UFMC 的误码率降到了最低。
{"title":"Simulation and analysis of 5G waveforms to reduce BER for vehicular communications","authors":"Fowzia Sultana Sowdagar ,&nbsp;Krishna Naik Karamtot","doi":"10.1016/j.vehcom.2024.100777","DOIUrl":"10.1016/j.vehcom.2024.100777","url":null,"abstract":"<div><p>In today's rapidly evolving world, wireless communication has become a pervasive force, profoundly impacting various facets of our daily lives. Wireless Vehicular Networks stand out as a captivating realm of research, with a key focus on fostering information exchange among autonomous vehicles. As researchers witness surging demand in this domain, there is a growing emphasis on devising advanced techniques to augment network performance, particularly within the context of Fifth-generation (5G) applications, such as vehicular communication. The concept of Vehicle-to-vehicle (V2V) communications is poised to play a pivotal role in the future, presenting formidable challenges for the air interface by accommodating asynchronous multiple access and high mobility. Within this dynamic landscape, security and privacy issues loom large for 5G-enabled vehicle networks, many of which remain largely unexplored. The conventional waveforms, including Orthogonal Frequency Division Multiplexing (OFDM), may fall short of meeting these evolving standards. In this paper, authors delve into a comparative exploration of two waveform families, namely Filter Bank Multicarrier (FBMC) and Universal Filtered Multi-Carrier (UFMC), concerning their design and performance trade-offs. authors also examine their compatibility with various digital modulation schemes like 4-Quadrature Amplitude Modulation (QAM), 16-QAM, Offset Quadrature Phase Shift Keying (OQPSK), and Shaped offset OQPSK (SOQPSK). Through MATLAB simulations, our research vividly demonstrates the superior performance of UFMC when juxtaposed with OFDM and FBMC, especially concerning Bit Error Rate (BER) in both Rayleigh and Nakagami fading channels. In particular, authors consider a Nakagami shape parameter of 10, which yields a remarkable minimum BER for UFMC.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140640602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving target defense approach for secure relay selection in vehicular networks 用于在车载网络中安全选择中继器的移动目标防御方法
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-16 DOI: 10.1016/j.vehcom.2024.100774
Esraa M. Ghourab , Shimaa Naser , Sami Muhaidat , Lina Bariah , Mahmoud Al-Qutayri , Ernesto Damiani , Paschalis C. Sofotasios

Ensuring the security and reliability of cooperative vehicle-to-vehicle (V2V) communications is an extremely challenging task due to the dynamic nature of vehicular networks as well as the delay-sensitive wireless medium. In this context, the moving target defense (MTD) paradigm has been proposed to overcome the challenges of conventional solutions based on static network services and configurations. Specifically, the MTD approach involves the dynamic altering of network configurations to improve resilience to cyberattacks. Nevertheless, the current MTD solution for cooperative networks poses several limitations, such as that they require high synchronization modules that are resource-intensive and difficult to implement; and they rely heavily on attack-defense models, which may not always be accurate or comprehensive to use. To overcome these challenges, the proposed approach introduces an adaptive defense strategy within the MTD framework. This strategy proposes an intelligent spatiotemporal diversification-based MTD scheme to defend against eavesdropping attacks in cooperative V2V networks. It involves altering the system configuration spatially through relay selection and adjusting the percentage of injected fake data over time. This approach aims to balance reducing intercept probability while ensuring high throughput. Our methodology involves modeling the configuration of vehicular relays and data injection patterns as a Markov decision process, followed by applying deep reinforcement learning to determine the optimal configuration. We then iteratively evaluate the intercept probability and the percentage of transmitted real data for each configuration until convergence is achieved. To optimize the security-real data percentage (S-RDP), we developed a two-agent framework, namely MTD-DQN-RSS & MTD-DQN-RSS-RDP. The first agent, MTD-DQN-RSS, tries to minimize the intercept probability by injecting additional fake data, which in turn reduces the overall RDP, while the second agent, MTD-DQN-RSS-RDP, attempts to inject a sufficient amount of fake data to achieve a target S-RDP. Finally, extensive simulation results are conducted to demonstrate the effectiveness of our proposed solution, which improved system security compared to the conventional relay selection approach.

由于车载网络的动态特性以及对延迟敏感的无线介质,确保车对车(V2V)合作通信的安全性和可靠性是一项极具挑战性的任务。在这种情况下,有人提出了移动目标防御(MTD)范例,以克服基于静态网络服务和配置的传统解决方案所面临的挑战。具体来说,MTD 方法涉及动态改变网络配置,以提高抵御网络攻击的能力。然而,目前针对合作网络的 MTD 解决方案存在一些局限性,例如,它们需要高同步模块,而同步模块是资源密集型的,难以实现;它们严重依赖攻击防御模型,而这些模型不一定总是准确或全面可用。为了克服这些挑战,所提出的方法在 MTD 框架内引入了自适应防御策略。该策略提出了一种基于时空多样化的智能 MTD 方案,用于防御合作 V2V 网络中的窃听攻击。它包括通过中继选择在空间上改变系统配置,并随着时间的推移调整注入虚假数据的百分比。这种方法旨在平衡降低拦截概率与确保高吞吐量之间的关系。我们的方法包括将车辆中继配置和数据注入模式建模为马尔可夫决策过程,然后应用深度强化学习来确定最佳配置。然后,我们对每种配置的拦截概率和传输的真实数据百分比进行迭代评估,直到达到收敛为止。为了优化安全-真实数据百分比(S-RDP),我们开发了一个双代理框架,即 MTD-DQN-RSS & MTD-DQN-RSS-RDP。第一个代理(MTD-DQN-RSS)试图通过注入额外的虚假数据来最小化拦截概率,这反过来又会降低总体 RDP,而第二个代理(MTD-DQN-RSS-RDP)则试图注入足够数量的虚假数据来实现目标 S-RDP。最后,通过大量的仿真结果证明了我们提出的解决方案的有效性,与传统的中继选择方法相比,该方案提高了系统的安全性。
{"title":"Moving target defense approach for secure relay selection in vehicular networks","authors":"Esraa M. Ghourab ,&nbsp;Shimaa Naser ,&nbsp;Sami Muhaidat ,&nbsp;Lina Bariah ,&nbsp;Mahmoud Al-Qutayri ,&nbsp;Ernesto Damiani ,&nbsp;Paschalis C. Sofotasios","doi":"10.1016/j.vehcom.2024.100774","DOIUrl":"10.1016/j.vehcom.2024.100774","url":null,"abstract":"<div><p>Ensuring the security and reliability of cooperative vehicle-to-vehicle (V2V) communications is an extremely challenging task due to the dynamic nature of vehicular networks as well as the delay-sensitive wireless medium. In this context, the moving target defense (MTD) paradigm has been proposed to overcome the challenges of conventional solutions based on static network services and configurations. Specifically, the MTD approach involves the dynamic altering of network configurations to improve resilience to cyberattacks. Nevertheless, the current MTD solution for cooperative networks poses several limitations, such as that they require high synchronization modules that are resource-intensive and difficult to implement; and they rely heavily on attack-defense models, which may not always be accurate or comprehensive to use. To overcome these challenges, the proposed approach introduces an adaptive defense strategy within the MTD framework. This strategy proposes an intelligent spatiotemporal diversification-based MTD scheme to defend against eavesdropping attacks in cooperative V2V networks. It involves altering the system configuration spatially through relay selection and adjusting the percentage of injected fake data over time. This approach aims to balance reducing intercept probability while ensuring high throughput. Our methodology involves modeling the configuration of vehicular relays and data injection patterns as a Markov decision process, followed by applying deep reinforcement learning to determine the optimal configuration. We then iteratively evaluate the intercept probability and the percentage of transmitted real data for each configuration until convergence is achieved. To optimize the security-real data percentage (S-RDP), we developed a two-agent framework, namely MTD-DQN-RSS &amp; MTD-DQN-RSS-RDP. The first agent, MTD-DQN-RSS, tries to minimize the intercept probability by injecting additional fake data, which in turn reduces the overall RDP, while the second agent, MTD-DQN-RSS-RDP, attempts to inject a sufficient amount of fake data to achieve a target S-RDP. Finally, extensive simulation results are conducted to demonstrate the effectiveness of our proposed solution, which improved system security compared to the conventional relay selection approach.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140775053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantum-secure certificateless aggregate signature protocol for vehicular ad hoc networks 用于车载特设网络的量子安全无证书聚合签名协议
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-15 DOI: 10.1016/j.vehcom.2024.100775
Yongfei Huang , Guangxia Xu , Xiaoling Song , Yong Liu , Qiuyan Wang

Vehicular ad hoc networks (VANETs) have revolutionized communication between vehicles and infrastructure, notably enhancing traffic management and passenger safety. However, VANETs are vulnerable to security threats, especially regarding data authenticity. Aggregate signature is a powerful technique that reduces computational and communication burdens by aggregating multiple signatures from different signers into a single signature. Traditional aggregate signature schemes, based on large prime number decomposition and the discrete logarithm problem, cannot effectively resist quantum attacks. This paper introduces a novel quantum secure certificateless aggregate signature (QSCLAS) scheme designed to enhance data security and privacy in VANETs. Our proposed scheme employs the number theory research unit (NTRU) algorithm. As a lattice-based cryptographic algorithm, NTRU is renowned for its security against quantum computer attacks, making it an essential component of our quantum-secure solution. By eliminating the need for expensive bilinear pairing operations, our proposed scheme achieves high efficiency and practicality in resource-limited VANETs environments. The security analysis demonstrates our scheme's resilience against both Type-I and Type-II adversaries in the random oracle model under the small integer solution (SIS) problem on the NTRU lattice. Furthermore, compared with existing approaches, the results illustrate that our proposed scheme offers significant advantages in signature generation and verification cost, as well as lower transmission overhead than other lattice-based schemes, thereby making it highly suitable for VANETs environments.

车载特设网络(VANET)彻底改变了车辆与基础设施之间的通信,显著提高了交通管理和乘客安全。然而,VANET 容易受到安全威胁,尤其是在数据真实性方面。聚合签名是一种功能强大的技术,它能将来自不同签名者的多个签名聚合成一个签名,从而减轻计算和通信负担。传统的聚合签名方案基于大素数分解和离散对数问题,无法有效抵御量子攻击。本文介绍了一种新型量子安全无证书聚合签名(QSCLAS)方案,旨在增强 VANET 中的数据安全性和隐私性。我们提出的方案采用了数论研究单元(NTRU)算法。作为一种基于网格的加密算法,NTRU 以其抵御量子计算机攻击的安全性而闻名,因此成为我们的量子安全解决方案的重要组成部分。通过消除对昂贵的双线性配对操作的需求,我们提出的方案在资源有限的 VANET 环境中实现了高效率和实用性。安全分析表明,在随机甲骨文模型中,我们的方案在 NTRU 晶格上的小整数解(SIS)问题下具有抵御第一类和第二类对手的能力。此外,与现有方法相比,结果表明我们提出的方案在签名生成和验证成本方面具有显著优势,传输开销也低于其他基于网格的方案,因此非常适合 VANETs 环境。
{"title":"A quantum-secure certificateless aggregate signature protocol for vehicular ad hoc networks","authors":"Yongfei Huang ,&nbsp;Guangxia Xu ,&nbsp;Xiaoling Song ,&nbsp;Yong Liu ,&nbsp;Qiuyan Wang","doi":"10.1016/j.vehcom.2024.100775","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100775","url":null,"abstract":"<div><p>Vehicular ad hoc networks (VANETs) have revolutionized communication between vehicles and infrastructure, notably enhancing traffic management and passenger safety. However, VANETs are vulnerable to security threats, especially regarding data authenticity. Aggregate signature is a powerful technique that reduces computational and communication burdens by aggregating multiple signatures from different signers into a single signature. Traditional aggregate signature schemes, based on large prime number decomposition and the discrete logarithm problem, cannot effectively resist quantum attacks. This paper introduces a novel quantum secure certificateless aggregate signature (QSCLAS) scheme designed to enhance data security and privacy in VANETs. Our proposed scheme employs the number theory research unit (NTRU) algorithm. As a lattice-based cryptographic algorithm, NTRU is renowned for its security against quantum computer attacks, making it an essential component of our quantum-secure solution. By eliminating the need for expensive bilinear pairing operations, our proposed scheme achieves high efficiency and practicality in resource-limited VANETs environments. The security analysis demonstrates our scheme's resilience against both Type-I and Type-II adversaries in the random oracle model under the small integer solution (SIS) problem on the NTRU lattice. Furthermore, compared with existing approaches, the results illustrate that our proposed scheme offers significant advantages in signature generation and verification cost, as well as lower transmission overhead than other lattice-based schemes, thereby making it highly suitable for VANETs environments.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140555172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service-oriented data consistency research for in-vehicle Ethernet 车载以太网面向服务的数据一致性研究
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-12 DOI: 10.1016/j.vehcom.2024.100776
Bingkui Li , Lei Zhuang , Guoqing Wang , Yanglong Sun

As the number of in-vehicle electronic devices and system complexity increases, it drives the evolution of the in-vehicle electrical/electronic architecture (E/E). The most promising future architecture is the zone architecture divided by physical location. Zones are connected via high-speed Ethernet, and time-sensitive networking enhances Ethernet in terms of real-time and determinism. In service-oriented communication methods, there are issues with quality assurance and data inconsistency. This paper addresses these issues by combining traffic scheduling strategies in time-sensitive networking, proposing an algorithm for quality assurance and data consistency. Simulation results demonstrate that, under the premise of satisfying the quality of service, the data stream of the same service can reach multiple subscribers simultaneously. This further demonstrates the feasibility and effectiveness of the proposed method.

随着车载电子设备数量和系统复杂性的增加,推动了车载电气/电子架构(E/E)的发展。未来最有前途的架构是按物理位置划分的区域架构。区域通过高速以太网连接,而时间敏感型网络在实时性和确定性方面增强了以太网。在面向服务的通信方法中,存在质量保证和数据不一致的问题。本文针对这些问题,结合时敏网络中的流量调度策略,提出了一种保证质量和数据一致性的算法。仿真结果表明,在满足服务质量的前提下,同一服务的数据流可以同时到达多个用户。这进一步证明了所提方法的可行性和有效性。
{"title":"Service-oriented data consistency research for in-vehicle Ethernet","authors":"Bingkui Li ,&nbsp;Lei Zhuang ,&nbsp;Guoqing Wang ,&nbsp;Yanglong Sun","doi":"10.1016/j.vehcom.2024.100776","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100776","url":null,"abstract":"<div><p>As the number of in-vehicle electronic devices and system complexity increases, it drives the evolution of the in-vehicle electrical/electronic architecture (E/E). The most promising future architecture is the zone architecture divided by physical location. Zones are connected via high-speed Ethernet, and time-sensitive networking enhances Ethernet in terms of real-time and determinism. In service-oriented communication methods, there are issues with quality assurance and data inconsistency. This paper addresses these issues by combining traffic scheduling strategies in time-sensitive networking, proposing an algorithm for quality assurance and data consistency. Simulation results demonstrate that, under the premise of satisfying the quality of service, the data stream of the same service can reach multiple subscribers simultaneously. This further demonstrates the feasibility and effectiveness of the proposed method.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140619928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based data storage architecture for Internet of Vehicles: Delay-aware consensus and data query algorithms 基于区块链的车联网数据存储架构:延迟感知共识和数据查询算法
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-08 DOI: 10.1016/j.vehcom.2024.100772
Zhiqiang Ren , Shumei Liu , Yisheng An , Yonghui Li , Naiqi Wu

The recent development of the Internet of Vehicles (IoV) relies heavily on the secure store and analysis of reliable driving data. Blockchain technology has been widely used in the IoV field due to its security advantages, where consensus and query algorithms are two key modules determining its performance. However, existing solutions do not perform well enough in terms of delay performance, thus limiting their ability to support IoV environments with ultra-low-latency requirements. To address this challenge, we design a blockchain-based data storage architecture, focusing on the design of delay-aware consensus and data query algorithms. Specifically, to reduce the consensus delay, we propose a reputation-assisted and grouping-simplified Practical Byzantine Fault Tolerant (RGS-PBFT) algorithm. First, we develop a novel node credit value evaluation model by combining the behavior and configuration reputation to select the primary node with both high security and high computing capacity. Second, after determining the primary node, we reduce the communication complexity of traditional PBFT from O(Z2) to O(Z43) by establishing a grouping-simplified consensus structure. These contributions effectively reduce the consensus delay. To reduce the query delay and index construction time, we propose an index query algorithm based on the data tracking chain (DTC-Index query). By introducing the LevelDB database, it establishes a transaction index chain coupled to vehicle ID in the blockchain. This approach avoids the time-consuming block traversal during data querying. Experimental results demonstrate that the proposed algorithms outperform existing solutions, achieving significant improvements in both consensus delay and query time reduction. Notably, our solutions offer exceptional delay performance, making them well-suited for IoV environments.

近年来,车联网(IoV)的发展在很大程度上依赖于可靠驾驶数据的安全存储和分析。区块链技术因其安全优势而被广泛应用于 IoV 领域,其中共识和查询算法是决定其性能的两个关键模块。然而,现有的解决方案在延迟性能方面表现不够出色,从而限制了其支持具有超低延迟要求的物联网环境的能力。为了应对这一挑战,我们设计了一种基于区块链的数据存储架构,重点是设计延迟感知共识和数据查询算法。具体来说,为了降低共识延迟,我们提出了一种信誉辅助和分组简化的实用拜占庭容错算法(RGS-PBFT)。首先,我们结合行为和配置声誉,开发了一种新颖的节点信用值评估模型,以选择具有高安全性和高计算能力的主节点。其次,在确定主节点后,我们通过建立分组简化共识结构,将传统 PBFT 的通信复杂度从 O(Z2) 降低到 O(Z43)。这些贡献有效地降低了共识延迟。为了减少查询延迟和索引构建时间,我们提出了一种基于数据跟踪链的索引查询算法(DTC-Index 查询)。通过引入 LevelDB 数据库,在区块链中建立与车辆 ID 相耦合的交易索引链。这种方法避免了数据查询过程中耗时的区块遍历。实验结果表明,所提出的算法优于现有解决方案,在减少共识延迟和查询时间方面都有显著改善。值得注意的是,我们的解决方案具有卓越的延迟性能,非常适合物联网环境。
{"title":"A blockchain-based data storage architecture for Internet of Vehicles: Delay-aware consensus and data query algorithms","authors":"Zhiqiang Ren ,&nbsp;Shumei Liu ,&nbsp;Yisheng An ,&nbsp;Yonghui Li ,&nbsp;Naiqi Wu","doi":"10.1016/j.vehcom.2024.100772","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100772","url":null,"abstract":"<div><p>The recent development of the Internet of Vehicles (IoV) relies heavily on the secure store and analysis of reliable driving data. Blockchain technology has been widely used in the IoV field due to its security advantages, where consensus and query algorithms are two key modules determining its performance. However, existing solutions do not perform well enough in terms of delay performance, thus limiting their ability to support IoV environments with ultra-low-latency requirements. To address this challenge, we design a blockchain-based data storage architecture, focusing on the design of delay-aware consensus and data query algorithms. Specifically, to reduce the consensus delay, we propose a reputation-assisted and grouping-simplified Practical Byzantine Fault Tolerant (RGS-PBFT) algorithm. First, we develop a novel node credit value evaluation model by combining the behavior and configuration reputation to select the primary node with both high security and high computing capacity. Second, after determining the primary node, we reduce the communication complexity of traditional PBFT from <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>Z</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> to <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>Z</mi></mrow><mrow><mfrac><mrow><mn>4</mn></mrow><mrow><mn>3</mn></mrow></mfrac></mrow></msup><mo>)</mo></math></span> by establishing a grouping-simplified consensus structure. These contributions effectively reduce the consensus delay. To reduce the query delay and index construction time, we propose an index query algorithm based on the data tracking chain (DTC-Index query). By introducing the LevelDB database, it establishes a transaction index chain coupled to vehicle ID in the blockchain. This approach avoids the time-consuming block traversal during data querying. Experimental results demonstrate that the proposed algorithms outperform existing solutions, achieving significant improvements in both consensus delay and query time reduction. Notably, our solutions offer exceptional delay performance, making them well-suited for IoV environments.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140558733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-protecting predictive cache method based on blockchain and machine learning in Internet of vehicles 车联网中基于区块链和机器学习的隐私保护预测缓存方法
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-04 DOI: 10.1016/j.vehcom.2024.100771
Zihao Shen , Yuanjie Wang , Hui Wang , Peiqian Liu , Kun Liu , Mengke Liu

To solve the privacy leakage problem faced by Internet of Vehicles (IoV) users when enjoying location-based services (LBS), a privacy-protecting predictive cache method based on blockchain and machine learning (BML-PPPCM) is proposed. First, a Bi-directional Long-Short Term Memory (Bi-LSTM) model is used to predict query requests over a future period based on historical request information. The predicted results are recommended to neighbors and broadcast to requestors. Then, deep Q-learning (DQN) is utilized to determine the optimal cache decision. Finally, a trust mechanism is introduced to calculate trust values, and blockchain is used to store transaction data and trust data, preventing malicious tampering by attackers. The simulation results show that BML-PPPCM has a higher cache hit ratio than other similar schemes and performs well in privacy protection and suppression of malicious and incentive denial of service providers.

为了解决车联网(IoV)用户在享受基于位置的服务(LBS)时面临的隐私泄露问题,本文提出了一种基于区块链和机器学习的隐私保护预测缓存方法(BML-PPPCM)。首先,使用双向长短期记忆(Bi-LSTM)模型根据历史请求信息预测未来一段时间内的查询请求。预测结果会推荐给邻居,并广播给请求者。然后,利用深度 Q 学习(DQN)来确定最佳缓存决策。最后,引入信任机制计算信任值,并使用区块链存储交易数据和信任数据,防止攻击者恶意篡改。仿真结果表明,与其他类似方案相比,BML-PPPCM 具有更高的缓存命中率,在隐私保护和抑制恶意及激励性拒绝服务提供方方面表现出色。
{"title":"Privacy-protecting predictive cache method based on blockchain and machine learning in Internet of vehicles","authors":"Zihao Shen ,&nbsp;Yuanjie Wang ,&nbsp;Hui Wang ,&nbsp;Peiqian Liu ,&nbsp;Kun Liu ,&nbsp;Mengke Liu","doi":"10.1016/j.vehcom.2024.100771","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100771","url":null,"abstract":"<div><p>To solve the privacy leakage problem faced by Internet of Vehicles (IoV) users when enjoying location-based services (LBS), a privacy-protecting predictive cache method based on blockchain and machine learning (BML-PPPCM) is proposed. First, a Bi-directional Long-Short Term Memory (Bi-LSTM) model is used to predict query requests over a future period based on historical request information. The predicted results are recommended to neighbors and broadcast to requestors. Then, deep Q-learning (DQN) is utilized to determine the optimal cache decision. Finally, a trust mechanism is introduced to calculate trust values, and blockchain is used to store transaction data and trust data, preventing malicious tampering by attackers. The simulation results show that BML-PPPCM has a higher cache hit ratio than other similar schemes and performs well in privacy protection and suppression of malicious and incentive denial of service providers.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fair and efficient resource allocation via vehicle-edge cooperation in 5G-V2X networks 通过 5G-V2X 网络中的车辆边缘合作实现公平高效的资源分配
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-04 DOI: 10.1016/j.vehcom.2024.100773
Muhammed Nur Avcil , Mujdat Soyturk , Burak Kantarci

To cope with safety risks and operational efficiency problems, it is of paramount importance to ensure high data rates and meet the latency requirements in Connected and Autonomous Vehicles. The problem in such environments is two-fold: 1. Heavy load on the network due to increasing demands; 2) Resource imbalance, due to variations in the vehicular traffic density in certain regions. The consequences of these two phenomena may lead to service disruptions, as well as the fairness of resource allocation across vehicles. In this work, we propose a resource allocation method that distributes high workload among edge nodes and allocates network resources efficiently and fairly. Performance of the proposed method is evaluated under realistic scenarios, and compared to the state-of-the-art approaches in the literature. Behavior and performance of all methods in overload conditions in certain regions were analyzed. Simulation results exhibit a 38% improvement in the successful demand rate and a 48% improvement in capacity usage compared to state-of-the-art approaches.

为应对安全风险和运营效率问题,确保高数据传输速率并满足互联和自动驾驶车辆的延迟要求至关重要。这种环境下的问题有两个方面:1)由于需求不断增加,网络负荷沉重;2)由于某些地区车辆交通密度的变化,导致资源不平衡。这两种现象的后果可能会导致服务中断,以及车辆间资源分配的公平性。在这项工作中,我们提出了一种资源分配方法,可在边缘节点之间分配高工作量,并高效、公平地分配网络资源。我们对所提方法在现实场景下的性能进行了评估,并与文献中最先进的方法进行了比较。分析了所有方法在某些区域过载条件下的行为和性能。仿真结果表明,与最先进的方法相比,成功需求率提高了 38%,容量使用率提高了 48%。
{"title":"Fair and efficient resource allocation via vehicle-edge cooperation in 5G-V2X networks","authors":"Muhammed Nur Avcil ,&nbsp;Mujdat Soyturk ,&nbsp;Burak Kantarci","doi":"10.1016/j.vehcom.2024.100773","DOIUrl":"10.1016/j.vehcom.2024.100773","url":null,"abstract":"<div><p>To cope with safety risks and operational efficiency problems, it is of paramount importance to ensure high data rates and meet the latency requirements in Connected and Autonomous Vehicles. The problem in such environments is two-fold: 1. Heavy load on the network due to increasing demands; 2) Resource imbalance, due to variations in the vehicular traffic density in certain regions. The consequences of these two phenomena may lead to service disruptions, as well as the fairness of resource allocation across vehicles. In this work, we propose a resource allocation method that distributes high workload among edge nodes and allocates network resources efficiently and fairly. Performance of the proposed method is evaluated under realistic scenarios, and compared to the state-of-the-art approaches in the literature. Behavior and performance of all methods in overload conditions in certain regions were analyzed. Simulation results exhibit a 38% improvement in the successful demand rate and a 48% improvement in capacity usage compared to state-of-the-art approaches.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140778015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1