首页 > 最新文献

Vehicular Communications最新文献

英文 中文
Volunteer vehicle assisted dependent task offloading based on ant colony optimization algorithm in vehicular edge computing 车载边缘计算中基于蚁群优化算法的志愿车辆辅助依赖任务卸载
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-31 DOI: 10.1016/j.vehcom.2024.100849
Chen Cheng, Linbo Zhai, Yujuan Jia, Xiumin Zhu, Yumei Li
Vehicle Edge Computing improves the Quality of Service of vehicular applications by offloading tasks to the VEC server. However, with the continuous development of computation-intensive vehicular applications, the limited resources of the VEC server will not be enough to support these applications. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) proposes a concept of using vehicles as resources, which is considered to be a promising solution. In this paper, we study the multi-dependent task offloading problem in order to quickly and economically handle the overload task of the requesting vehicle in VCBV. Considering both task execution delay and execution cost, we formulate the problem of offloading the multi-dependent tasks of requesting vehicles to minimize total task completion time and execution cost. Since the offloading problem is NP-hard, an improved multi-objective Ant Colony Optimization algorithm is proposed. Firstly, we use a density-based clustering algorithm to form volunteer alliances that can contribute idle resources. Secondly, based on the volunteer alliances and RSUs, we use Analytic Hierarchy Process (AHP) to initialize pheromone concentration to make better decisions. Then, we design the update strategy of the pheromone concentration and heuristic information. Finally, we introduce Pareto optimal relationship to evaluate the results. A large number of simulation results verify that our algorithm has better performance than other alternatives.
车辆边缘计算(Vehicle Edge Computing)通过将任务卸载到 VEC 服务器来提高车辆应用的服务质量。然而,随着计算密集型车辆应用的不断发展,VEC 服务器的有限资源将不足以支持这些应用。基于志愿计算的车载 Ad-hoc 网络(VCBV)提出了将车辆作为资源的概念,被认为是一种很有前途的解决方案。本文研究了多依赖任务卸载问题,以便在 VCBV 中快速、经济地处理请求车辆的超载任务。考虑到任务执行延迟和执行成本,我们提出了请求车辆的多依赖任务卸载问题,以最小化总任务完成时间和执行成本。由于卸载问题是 NP 难问题,我们提出了一种改进的多目标蚁群优化算法。首先,我们使用基于密度的聚类算法来组建可以贡献闲置资源的志愿者联盟。其次,根据志愿者联盟和 RSU,我们使用层次分析法(AHP)初始化信息素浓度,以做出更好的决策。然后,我们设计信息素浓度和启发式信息的更新策略。最后,我们引入帕累托最优关系来评估结果。大量的模拟结果验证了我们的算法比其他算法具有更好的性能。
{"title":"Volunteer vehicle assisted dependent task offloading based on ant colony optimization algorithm in vehicular edge computing","authors":"Chen Cheng,&nbsp;Linbo Zhai,&nbsp;Yujuan Jia,&nbsp;Xiumin Zhu,&nbsp;Yumei Li","doi":"10.1016/j.vehcom.2024.100849","DOIUrl":"10.1016/j.vehcom.2024.100849","url":null,"abstract":"<div><div>Vehicle Edge Computing improves the Quality of Service of vehicular applications by offloading tasks to the VEC server. However, with the continuous development of computation-intensive vehicular applications, the limited resources of the VEC server will not be enough to support these applications. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) proposes a concept of using vehicles as resources, which is considered to be a promising solution. In this paper, we study the multi-dependent task offloading problem in order to quickly and economically handle the overload task of the requesting vehicle in VCBV. Considering both task execution delay and execution cost, we formulate the problem of offloading the multi-dependent tasks of requesting vehicles to minimize total task completion time and execution cost. Since the offloading problem is NP-hard, an improved multi-objective Ant Colony Optimization algorithm is proposed. Firstly, we use a density-based clustering algorithm to form volunteer alliances that can contribute idle resources. Secondly, based on the volunteer alliances and RSUs, we use Analytic Hierarchy Process (AHP) to initialize pheromone concentration to make better decisions. Then, we design the update strategy of the pheromone concentration and heuristic information. Finally, we introduce Pareto optimal relationship to evaluate the results. A large number of simulation results verify that our algorithm has better performance than other alternatives.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100849"},"PeriodicalIF":5.8,"publicationDate":"2024-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142577970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STAR-RIS-NOMA empowered vehicle-to-vehicle communications: Outage and ergodic capacity analysis STAR-RIS-NOMA 赋权车对车通信:中断和遍历容量分析
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-28 DOI: 10.1016/j.vehcom.2024.100852
Luxmi Kant Vishwakarma , Radhika Gour , Suneel Yadav , Adão Silva
This paper delves into the performance evaluation of a non-orthogonal multiple access (NOMA) enabled vehicle-to-vehicle (V2V) communication system empowered by simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RIS). Herein, we consider that a moving access point (AP) transmits superimposed signals to nearby and distant NOMA vehicles simultaneously via reflection and transmission through a STAR-RIS equipped vehicle with 2N reconfigurable elements, respectively. Specifically, by characterizing all V2V channels as double-Rayleigh fading distributed, we derive the outage probability (OP) and ergodic capacity (EC) expressions for each NOMA vehicle, by employing both perfect and imperfect successive interference cancellation (SIC) at nearby vehicle user. Furthermore, we present the asymptotic OP behavior at high signal-to-noise ratio (SNR) regime to gain deeper insights into the diversity order of NOMA vehicles. The findings reveal that the nearby vehicle under perfect SIC and far vehicle experience a diversity order of Nπ4256π2, which is the function of number of reconfigurable elements (N) in the STAR-RIS. Whereas, a zero diversity order is obtained for nearby user under imperfect SIC case. Moreover, we analytically discuss the high SNR slopes of EC for both user vehicles. Furthermore, Monte-Carlo simulations are conducted to validate our analytical results under various channel and system parameter configurations. We also provide a comparison between the proposed scheme and STAR-RIS based orthogonal multiple access and cooperative relaying systems.
本文深入探讨了通过同时传输和反射可重构智能表面(STAR-RIS)实现的非正交多址(NOMA)车对车(V2V)通信系统的性能评估。在此,我们考虑由一个移动接入点(AP)通过配备有 2N 个可重构元件的 STAR-RIS 的车辆,分别通过反射和传输向附近和远处的 NOMA 车辆同时传输叠加信号。具体地说,通过将所有 V2V 信道描述为双瑞利衰落分布,我们得出了每个 NOMA 车辆的中断概率(OP)和遍历容量(EC)表达式,并在附近车辆用户处采用了完美和不完美的连续干扰消除(SIC)。此外,我们还提出了高信噪比(SNR)情况下的渐进 OP 行为,以深入了解 NOMA 车辆的分集顺序。研究结果表明,在完美 SIC 条件下,近车和远车的分集阶为 Nπ4256-π2,这是 STAR-RIS 中可重构元素数量(N)的函数。而在不完善 SIC 的情况下,附近用户的分集阶数为零。此外,我们还分析讨论了两个用户车辆的高信噪比 EC 斜坡。此外,我们还进行了蒙特卡洛模拟,以验证我们在各种信道和系统参数配置下的分析结果。我们还对所提出的方案与基于 STAR-RIS 的正交多址和合作中继系统进行了比较。
{"title":"STAR-RIS-NOMA empowered vehicle-to-vehicle communications: Outage and ergodic capacity analysis","authors":"Luxmi Kant Vishwakarma ,&nbsp;Radhika Gour ,&nbsp;Suneel Yadav ,&nbsp;Adão Silva","doi":"10.1016/j.vehcom.2024.100852","DOIUrl":"10.1016/j.vehcom.2024.100852","url":null,"abstract":"<div><div>This paper delves into the performance evaluation of a non-orthogonal multiple access (NOMA) enabled vehicle-to-vehicle (V2V) communication system empowered by simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RIS). Herein, we consider that a moving access point (AP) transmits superimposed signals to nearby and distant NOMA vehicles simultaneously via reflection and transmission through a STAR-RIS equipped vehicle with 2<em>N</em> reconfigurable elements, respectively. Specifically, by characterizing all V2V channels as double-Rayleigh fading distributed, we derive the outage probability (OP) and ergodic capacity (EC) expressions for each NOMA vehicle, by employing both perfect and imperfect successive interference cancellation (SIC) at nearby vehicle user. Furthermore, we present the asymptotic OP behavior at high signal-to-noise ratio (SNR) regime to gain deeper insights into the diversity order of NOMA vehicles. The findings reveal that the nearby vehicle under perfect SIC and far vehicle experience a diversity order of <span><math><mfrac><mrow><mi>N</mi><msup><mrow><mi>π</mi></mrow><mrow><mn>4</mn></mrow></msup></mrow><mrow><mn>256</mn><mo>−</mo><msup><mrow><mi>π</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></mfrac></math></span>, which is the function of number of reconfigurable elements (<em>N</em>) in the STAR-RIS. Whereas, a zero diversity order is obtained for nearby user under imperfect SIC case. Moreover, we analytically discuss the high SNR slopes of EC for both user vehicles. Furthermore, Monte-Carlo simulations are conducted to validate our analytical results under various channel and system parameter configurations. We also provide a comparison between the proposed scheme and STAR-RIS based orthogonal multiple access and cooperative relaying systems.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100852"},"PeriodicalIF":5.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142560694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning based running-track path design for fixed-wing UAV assisted mobile relaying network 基于深度强化学习的固定翼无人机辅助移动中继网络运行轨迹路径设计
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-28 DOI: 10.1016/j.vehcom.2024.100851
Tao Wang , Xiaodong Ji , Xuan Zhu , Cheng He , Jian-Feng Gu
This paper studies a fixed-wing unmanned aerial vehicle (UAV) assisted mobile relaying network (FUAVMRN), where a fixed-wing UAV employs an out-band full-duplex relaying fashion to serve a ground source-destination pair. It is confirmed that for a FUAVMRN, straight path is not suitable for the case that a huge amount of data need to be delivered, while circular path may lead to low throughput if the distance of ground source-destination pair is large. Thus, a running-track path (RTP) design problem is investigated for the FUAVMRN with the goal of energy minimization. By dividing an RTP into two straight and two semicircular paths, the total energy consumption of the UAV and the total amount of data transferred from the ground source to the ground destination via the UAV relay are calculated. According to the framework of Deep Reinforcement Learning and taking the UAV's roll-angle limit into consideration, the RTP design problem is formulated as a Markov Decision Process problem, giving the state and action spaces in addition to the policy and reward functions. In order for the UAV relay to obtain the control policy, Deep Deterministic Policy Gradient (DDPG) is used to solve the path design problem, leading to a DDPG based algorithm for the RTP design. Computer simulations are performed and the results show that the DDPG based algorithm always converges when the number of training iterations is around 500, and compared with the circular and straight paths, the proposed RTP design can save at least 12.13 % of energy and 65.93 % of flight time when the ground source and the ground destination are located 2000 m apart and need to transfer 5000bit/Hz of data. Moreover, it is more practical and efficient in terms of energy saving compared with the Deep Q Network based design.
本文研究了一种固定翼无人飞行器辅助移动中继网络(FUAVMRN),其中固定翼无人飞行器采用带外全双工中继方式为一对地面信源-信宿提供服务。研究证实,对于 FUAVMRN 来说,直线路径不适合需要传输大量数据的情况,而如果地面源-目的对的距离较远,圆形路径可能会导致吞吐量较低。因此,以能量最小化为目标,研究了 FUAVMRN 的运行轨迹路径(RTP)设计问题。通过将 RTP 划分为两条直线路径和两条半圆路径,计算出无人机的总能耗以及通过无人机中继从地面源传输到地面目的地的总数据量。根据深度强化学习的框架,并考虑到无人机的滚动角度限制,将 RTP 设计问题表述为马尔可夫决策过程问题,除了给出策略和奖励函数外,还给出了状态和行动空间。为了让无人机中继获得控制策略,使用了深度确定性策略梯度(DDPG)来解决路径设计问题,从而产生了一种基于 DDPG 的 RTP 设计算法。计算机仿真结果表明,当训练迭代次数为 500 次左右时,基于 DDPG 的算法总是收敛的;与圆形路径和直线路径相比,当地面信源和地面目的地相距 2000 m 且需要传输 5000bit/Hz 的数据时,所提出的 RTP 设计至少能节省 12.13% 的能量和 65.93% 的飞行时间。此外,与基于 Deep Q 网络的设计相比,该设计在节能方面更加实用和高效。
{"title":"Deep Reinforcement Learning based running-track path design for fixed-wing UAV assisted mobile relaying network","authors":"Tao Wang ,&nbsp;Xiaodong Ji ,&nbsp;Xuan Zhu ,&nbsp;Cheng He ,&nbsp;Jian-Feng Gu","doi":"10.1016/j.vehcom.2024.100851","DOIUrl":"10.1016/j.vehcom.2024.100851","url":null,"abstract":"<div><div>This paper studies a fixed-wing unmanned aerial vehicle (UAV) assisted mobile relaying network (FUAVMRN), where a fixed-wing UAV employs an out-band full-duplex relaying fashion to serve a ground source-destination pair. It is confirmed that for a FUAVMRN, straight path is not suitable for the case that a huge amount of data need to be delivered, while circular path may lead to low throughput if the distance of ground source-destination pair is large. Thus, a running-track path (RTP) design problem is investigated for the FUAVMRN with the goal of energy minimization. By dividing an RTP into two straight and two semicircular paths, the total energy consumption of the UAV and the total amount of data transferred from the ground source to the ground destination via the UAV relay are calculated. According to the framework of Deep Reinforcement Learning and taking the UAV's roll-angle limit into consideration, the RTP design problem is formulated as a Markov Decision Process problem, giving the state and action spaces in addition to the policy and reward functions. In order for the UAV relay to obtain the control policy, Deep Deterministic Policy Gradient (DDPG) is used to solve the path design problem, leading to a DDPG based algorithm for the RTP design. Computer simulations are performed and the results show that the DDPG based algorithm always converges when the number of training iterations is around 500, and compared with the circular and straight paths, the proposed RTP design can save at least 12.13 % of energy and 65.93 % of flight time when the ground source and the ground destination are located 2000 m apart and need to transfer <span><math><mrow><mn>5000</mn><mrow><mtext>bit</mtext><mo>/</mo><mtext>Hz</mtext></mrow></mrow></math></span> of data. Moreover, it is more practical and efficient in terms of energy saving compared with the Deep Q Network based design.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100851"},"PeriodicalIF":5.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142560693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EPAKA: An efficient and privacy-preserving authenticated key agreement scheme based on physical security for VANET EPAKA:基于物理安全的高效且保护隐私的 VANET 验证密钥协议方案
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-24 DOI: 10.1016/j.vehcom.2024.100847
Chunhua Jin , Penghui Zhou , Zhiwei Chen , Wenyu Qin , Guanhua Chen , Hao Zhang , Jian Weng
Vehicular ad hoc network (VANET) has been a promising technology in smart transportation system, which can enable information exchange between vehicles and roadside units (RSUs). However, the privacy of vehicles and RSUs is a critical challenge in VANET, as they may expose sensitive information to malicious attackers or unauthorized parties. Many existing authenticated key agreement (AKA) schemes aim to protect the privacy of vehicles and RSUs, but they often neglect the physical security of the devices involved in the communication. Therefore, we propose an efficient and privacy-preserving AKA scheme in VANET, which embeds physical unclonable function (PUF) and fuzzy extraction (FE) technology. PUF is a physical device that generates random strings based on their intrinsic characteristics and external inputs, which can protect the secrets in the devices from being stolen by attackers. FE can compensate for the drawbacks of PUF affected by environmental factors. Our scheme preserves the identity privacy of legitimate RSUs and vehicles, as well as intercepts and traces the identity of malicious attackers. In addition, we eliminate the involvement of the third party (TP) in the AKA phase to better meet the high-speed driving of vehicles. Finally, we conduct formal and informal security analyses in random oracle model (ROM), which prove that our scheme can resist various attacks. We also show in the performance analysis that our scheme has the lowest computational cost, communication overhead, and total energy consumption.
车载特设网络(VANET)是智能交通系统中一项前景广阔的技术,它可以实现车辆与路边装置(RSU)之间的信息交换。然而,车辆和 RSU 的隐私保护是 VANET 面临的一个严峻挑战,因为它们可能会将敏感信息暴露给恶意攻击者或未经授权的各方。现有的许多认证密钥协议(AKA)方案都旨在保护车辆和 RSU 的隐私,但它们往往忽视了参与通信的设备的物理安全性。因此,我们在 VANET 中提出了一种高效且能保护隐私的 AKA 方案,其中嵌入了物理不可克隆函数(PUF)和模糊提取(FE)技术。PUF 是一种物理设备,可根据其内在特征和外部输入生成随机字符串,从而保护设备中的秘密不被攻击者窃取。FE 可以弥补 PUF 受环境因素影响的缺点。我们的方案既能保护合法 RSU 和车辆的身份隐私,又能拦截和追踪恶意攻击者的身份。此外,我们消除了第三方(TP)在 AKA 阶段的参与,以更好地满足车辆高速行驶的要求。最后,我们在随机甲骨文模型(ROM)中进行了正式和非正式的安全分析,证明我们的方案可以抵御各种攻击。我们还在性能分析中表明,我们的方案具有最低的计算成本、通信开销和总能耗。
{"title":"EPAKA: An efficient and privacy-preserving authenticated key agreement scheme based on physical security for VANET","authors":"Chunhua Jin ,&nbsp;Penghui Zhou ,&nbsp;Zhiwei Chen ,&nbsp;Wenyu Qin ,&nbsp;Guanhua Chen ,&nbsp;Hao Zhang ,&nbsp;Jian Weng","doi":"10.1016/j.vehcom.2024.100847","DOIUrl":"10.1016/j.vehcom.2024.100847","url":null,"abstract":"<div><div>Vehicular ad hoc network (VANET) has been a promising technology in smart transportation system, which can enable information exchange between vehicles and roadside units (RSUs). However, the privacy of vehicles and RSUs is a critical challenge in VANET, as they may expose sensitive information to malicious attackers or unauthorized parties. Many existing authenticated key agreement (AKA) schemes aim to protect the privacy of vehicles and RSUs, but they often neglect the physical security of the devices involved in the communication. Therefore, we propose an efficient and privacy-preserving AKA scheme in VANET, which embeds physical unclonable function (PUF) and fuzzy extraction (FE) technology. PUF is a physical device that generates random strings based on their intrinsic characteristics and external inputs, which can protect the secrets in the devices from being stolen by attackers. FE can compensate for the drawbacks of PUF affected by environmental factors. Our scheme preserves the identity privacy of legitimate RSUs and vehicles, as well as intercepts and traces the identity of malicious attackers. In addition, we eliminate the involvement of the third party (TP) in the AKA phase to better meet the high-speed driving of vehicles. Finally, we conduct formal and informal security analyses in random oracle model (ROM), which prove that our scheme can resist various attacks. We also show in the performance analysis that our scheme has the lowest computational cost, communication overhead, and total energy consumption.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100847"},"PeriodicalIF":5.8,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks 基于区块链的小型工业园区车联网快速移交认证协议
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-24 DOI: 10.1016/j.vehcom.2024.100848
Junfeng Tian , Yue Shen , Yiting Wang
Autonomous vehicles safeguard the security and efficiency of Internet of Vehicles systems in small industrial parks by authenticating and exchanging real-time information with transportation infrastructure. Deploying a multi-server framework reduces the risk of message blocking and privacy information leakage from centralized services. However, in traditional handover authentication protocols, there are still potential security risks such as high-overhead performance issues and single point of failure attacks. Therefore, it is considered challenging to realize efficient authentication while protecting the privacy of vehicles. In this paper, we propose a secure and efficient handover authentication protocol for autonomous vehicles in a small industrial park to address the challenges. The protocol is based on blockchain and Pedersen verifiable secret sharing scheme, which not only ensures lightweight real-time interactions between autonomous vehicles and edge servers in multi-server environments, but also strictly protects the security and privacy of both vehicles and edge servers. We prove the semantic security of the protocol under the Real-Or-Random model and perform a informal analysis of its security attributes to show that it can withstand a wide range of malicious attacks. Performance evaluation shows that the proposed protocol satisfies more security requirements and has better computational efficiency and communication cost than other related protocols.
自动驾驶汽车通过与交通基础设施进行身份验证和实时信息交换,保障了小型工业园区车联网系统的安全性和效率。部署多服务器框架可降低信息阻塞和集中式服务泄露隐私信息的风险。然而,在传统的交接认证协议中,仍存在潜在的安全风险,如高开销性能问题和单点故障攻击。因此,如何在保护车辆隐私的同时实现高效的身份验证被认为是一项挑战。本文针对上述挑战,提出了一种安全高效的小型工业园区自动驾驶车辆交接认证协议。该协议基于区块链和 Pedersen 可验证的秘密共享方案,不仅保证了多服务器环境下自动驾驶车辆与边缘服务器之间的轻量级实时交互,还严格保护了车辆和边缘服务器的安全和隐私。我们证明了该协议在真实或随机模型下的语义安全性,并对其安全属性进行了非正式分析,证明它可以抵御各种恶意攻击。性能评估表明,与其他相关协议相比,所提出的协议能满足更多的安全要求,并具有更好的计算效率和通信成本。
{"title":"Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks","authors":"Junfeng Tian ,&nbsp;Yue Shen ,&nbsp;Yiting Wang","doi":"10.1016/j.vehcom.2024.100848","DOIUrl":"10.1016/j.vehcom.2024.100848","url":null,"abstract":"<div><div>Autonomous vehicles safeguard the security and efficiency of Internet of Vehicles systems in small industrial parks by authenticating and exchanging real-time information with transportation infrastructure. Deploying a multi-server framework reduces the risk of message blocking and privacy information leakage from centralized services. However, in traditional handover authentication protocols, there are still potential security risks such as high-overhead performance issues and single point of failure attacks. Therefore, it is considered challenging to realize efficient authentication while protecting the privacy of vehicles. In this paper, we propose a secure and efficient handover authentication protocol for autonomous vehicles in a small industrial park to address the challenges. The protocol is based on blockchain and Pedersen verifiable secret sharing scheme, which not only ensures lightweight real-time interactions between autonomous vehicles and edge servers in multi-server environments, but also strictly protects the security and privacy of both vehicles and edge servers. We prove the semantic security of the protocol under the Real-Or-Random model and perform a informal analysis of its security attributes to show that it can withstand a wide range of malicious attacks. Performance evaluation shows that the proposed protocol satisfies more security requirements and has better computational efficiency and communication cost than other related protocols.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100848"},"PeriodicalIF":5.8,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142528445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-vehicle communication cyber security: A comprehensive review of challenges and solutions 车载通信网络安全:挑战与解决方案综合评述
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-09-30 DOI: 10.1016/j.vehcom.2024.100846
Batuhan Gul, Fatih Ertam
The utilization of autonomous vehicles is experiencing a rapid proliferation in contemporary society. Concurrently, with the relentless evolution of technology, the inexorable integration of autonomous vehicles into urban environments, driven by the overarching paradigm of smart cities, becomes increasingly apparent. This escalating reliance on autonomous vehicles concurrently heightens the susceptibility to malevolent actors orchestrating cyber-attacks against these vehicular systems. While previous years have seen a limited corpus of academic research pertaining to cyber-attack and defense methodologies for autonomous vehicles, the relentless progression of technology mandates a more contemporary and exhaustive inquiry. In addition, to the best of our knowledge, there is no article in the literature that provides detailed information and comparisons about in-vehicle sensors, in-vehicle networks, and in-vehicle network datasets by combining them in one article. Also, to our knowledge, very limited studies have been conducted on separately comparative analysis of in-vehicle networks, in-vehicle sensors or data sets in 2024, and therefore, the necessity of conducting a review study on these topics was recognized. To address this deficiency, we compile articles on attacks and defenses on sensors, in-vehicle networks and present detailed information about the latest datasets and provide comparative analysis. In this paper, we have analyzed 108 papers from the last 10 years on in-vehicle networks and sensors. 38 articles on in-vehicle sensors and 70 articles on in-vehicle networks were reviewed and analyzed. We categorize in-vehicle communication attacks into two main groups: sensor-initiated and network-initiated, with a chronological classification to highlight their evolution. We also compare the progress in securing in-vehicle communication and evaluate the most widely used datasets for attack and protection methods. Additionally, we discuss the advantages and disadvantages of these datasets and suggest future research directions. To the best of our knowledge, this work is the first to offer detailed information and comparative analysis of in-vehicle networks, sensors, and the latest datasets. While the study highlights the significant research conducted to protect in-vehicle networks and sensors from cyber attacks, technological advancements continue to introduce new attack vectors. Cars remain particularly susceptible to threats such as DoS, Fuzzy, Spoofing, and Replay attacks. Moreover, current defense mechanisms, including LSTM and CNN, have notable limitations. Future research is needed to address these challenges and enhance vehicle cybersecurity.
自动驾驶汽车在当代社会迅速普及。与此同时,随着技术的不断发展,在智慧城市总体模式的推动下,自动驾驶汽车与城市环境的融合也变得越来越明显。对自动驾驶车辆的依赖不断升级,同时也增加了恶意行为者对这些车辆系统发动网络攻击的可能性。尽管前些年有关自动驾驶汽车网络攻击和防御方法的学术研究数量有限,但技术的不断进步要求我们进行更现代、更详尽的研究。此外,据我们所知,目前还没有一篇文章通过将车载传感器、车载网络和车载网络数据集结合在一篇文章中来提供详细信息和进行比较。此外,据我们所知,对 2024 年车载网络、车载传感器或数据集进行单独比较分析的研究非常有限,因此,我们认识到有必要对这些主题进行综述研究。针对这一不足,我们汇编了有关传感器、车载网络攻击和防御的文章,提供了有关最新数据集的详细信息,并进行了比较分析。在本文中,我们分析了过去 10 年中有关车载网络和传感器的 108 篇论文。其中,38 篇关于车载传感器的文章和 70 篇关于车载网络的文章得到了回顾和分析。我们将车载通信攻击分为两大类:由传感器引发的攻击和由网络引发的攻击,并按时间顺序进行分类,以突出其演变过程。我们还比较了车载通信安全方面的进展,并评估了最广泛使用的攻击和保护方法数据集。此外,我们还讨论了这些数据集的优缺点,并提出了未来的研究方向。据我们所知,这项工作是首次提供有关车载网络、传感器和最新数据集的详细信息和比较分析。虽然这项研究强调了为保护车载网络和传感器免受网络攻击而开展的重要研究,但技术进步仍在不断引入新的攻击载体。汽车仍然特别容易受到 DoS、模糊、欺骗和重放攻击等威胁。此外,当前的防御机制(包括 LSTM 和 CNN)也存在明显的局限性。未来需要开展研究,以应对这些挑战并加强汽车网络安全。
{"title":"In-vehicle communication cyber security: A comprehensive review of challenges and solutions","authors":"Batuhan Gul,&nbsp;Fatih Ertam","doi":"10.1016/j.vehcom.2024.100846","DOIUrl":"10.1016/j.vehcom.2024.100846","url":null,"abstract":"<div><div>The utilization of autonomous vehicles is experiencing a rapid proliferation in contemporary society. Concurrently, with the relentless evolution of technology, the inexorable integration of autonomous vehicles into urban environments, driven by the overarching paradigm of smart cities, becomes increasingly apparent. This escalating reliance on autonomous vehicles concurrently heightens the susceptibility to malevolent actors orchestrating cyber-attacks against these vehicular systems. While previous years have seen a limited corpus of academic research pertaining to cyber-attack and defense methodologies for autonomous vehicles, the relentless progression of technology mandates a more contemporary and exhaustive inquiry. In addition, to the best of our knowledge, there is no article in the literature that provides detailed information and comparisons about in-vehicle sensors, in-vehicle networks, and in-vehicle network datasets by combining them in one article. Also, to our knowledge, very limited studies have been conducted on separately comparative analysis of in-vehicle networks, in-vehicle sensors or data sets in 2024, and therefore, the necessity of conducting a review study on these topics was recognized. To address this deficiency, we compile articles on attacks and defenses on sensors, in-vehicle networks and present detailed information about the latest datasets and provide comparative analysis. In this paper, we have analyzed 108 papers from the last 10 years on in-vehicle networks and sensors. 38 articles on in-vehicle sensors and 70 articles on in-vehicle networks were reviewed and analyzed. We categorize in-vehicle communication attacks into two main groups: sensor-initiated and network-initiated, with a chronological classification to highlight their evolution. We also compare the progress in securing in-vehicle communication and evaluate the most widely used datasets for attack and protection methods. Additionally, we discuss the advantages and disadvantages of these datasets and suggest future research directions. To the best of our knowledge, this work is the first to offer detailed information and comparative analysis of in-vehicle networks, sensors, and the latest datasets. While the study highlights the significant research conducted to protect in-vehicle networks and sensors from cyber attacks, technological advancements continue to introduce new attack vectors. Cars remain particularly susceptible to threats such as DoS, Fuzzy, Spoofing, and Replay attacks. Moreover, current defense mechanisms, including LSTM and CNN, have notable limitations. Future research is needed to address these challenges and enhance vehicle cybersecurity.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100846"},"PeriodicalIF":5.8,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142421182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CANival: A multimodal approach to intrusion detection on the vehicle CAN bus CANival:汽车 CAN 总线入侵检测的多模式方法
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-09-12 DOI: 10.1016/j.vehcom.2024.100845
Hyunjae Kang , Thanh Vo , Huy Kang Kim , Jin B. Hong

Vehicles of today are composed of over 100 electronic embedded devices known as Electronic Control Units (ECU), each of which controls a different component of the vehicle and communicates via the Controller Area Network (CAN) bus. However, unlike other network protocols, the CAN bus communication protocol lacks security features, which is a growing concern as more vehicles become connected to the Internet. To enable the detection of intrusions on the CAN bus, numerous intrusion detection systems (IDS) have been proposed. Although some are able to achieve high accuracy in detecting specific attacks, no IDS has been able to accurately detect all types of attacks against the CAN bus. To overcome the aforementioned issues, we propose a multimodal analysis framework named CANival, which consists of time interval-based and signal-based analyzers developed by designing a novel Time Interval Likelihood (TIL) model and optimizing an existing model CANet. Experimental results show that our multimodal IDS outperforms the base models and enhances the detection performance testing on two recent datasets, X-CANIDS Dataset and SynCAN, achieving average true positive rates of 0.960 and 0.912, and true negative rates of 0.997 and 0.996, respectively.

当今的汽车由 100 多个被称为电子控制单元 (ECU) 的电子嵌入式设备组成,每个设备控制汽车的不同组件,并通过控制器局域网 (CAN) 总线进行通信。然而,与其他网络协议不同的是,CAN 总线通信协议缺乏安全功能,而随着越来越多的车辆连接到互联网,安全问题日益受到关注。为了能够检测 CAN 总线上的入侵,人们提出了许多入侵检测系统(IDS)。虽然有些系统在检测特定攻击时能够达到很高的准确率,但还没有一种 IDS 能够准确检测出针对 CAN 总线的所有类型的攻击。为了克服上述问题,我们提出了一个名为 CANival 的多模态分析框架,它由基于时间间隔和基于信号的分析器组成,通过设计一个新颖的时间间隔似然(TIL)模型和优化现有的 CANet 模型而开发。实验结果表明,我们的多模态 IDS 优于基础模型,并在最近的两个数据集 X-CANIDS Dataset 和 SynCAN 的测试中提高了检测性能,平均真阳性率分别达到 0.960 和 0.912,真阴性率分别达到 0.997 和 0.996。
{"title":"CANival: A multimodal approach to intrusion detection on the vehicle CAN bus","authors":"Hyunjae Kang ,&nbsp;Thanh Vo ,&nbsp;Huy Kang Kim ,&nbsp;Jin B. Hong","doi":"10.1016/j.vehcom.2024.100845","DOIUrl":"10.1016/j.vehcom.2024.100845","url":null,"abstract":"<div><p>Vehicles of today are composed of over 100 electronic embedded devices known as Electronic Control Units (ECU), each of which controls a different component of the vehicle and communicates via the Controller Area Network (CAN) bus. However, unlike other network protocols, the CAN bus communication protocol lacks security features, which is a growing concern as more vehicles become connected to the Internet. To enable the detection of intrusions on the CAN bus, numerous intrusion detection systems (IDS) have been proposed. Although some are able to achieve high accuracy in detecting specific attacks, no IDS has been able to accurately detect all types of attacks against the CAN bus. To overcome the aforementioned issues, we propose a multimodal analysis framework named <span>CANival</span>, which consists of time interval-based and signal-based analyzers developed by designing a novel Time Interval Likelihood (TIL) model and optimizing an existing model CANet. Experimental results show that our multimodal IDS outperforms the base models and enhances the detection performance testing on two recent datasets, X-CANIDS Dataset and SynCAN, achieving average true positive rates of 0.960 and 0.912, and true negative rates of 0.997 and 0.996, respectively.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100845"},"PeriodicalIF":5.8,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624001207/pdfft?md5=5a3ea24f061884777e2d92beaac3bc58&pid=1-s2.0-S2214209624001207-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization for service-caching, computation-offloading, and UAVs flight trajectories over rechargeable UAV-aided MEC using hierarchical multi-agent deep reinforcement learning 利用分层多代理深度强化学习,在可充电无人机辅助 MEC 上联合优化服务缓存、计算卸载和无人机飞行轨迹
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-09-11 DOI: 10.1016/j.vehcom.2024.100844
Zhian Chen, Fei Wang, Jiaojie Wang

Due to the high mobility, high chance of line-of-sight (LoS) transmission, and flexible deployment, unmanned aerial vehicles (UAVs) have been used as mobile edge computing (MEC) servers to provide ubiquitous computation services to mobile users (MUs). However, the limited energy storage, caching capacity, and computation resources of UAVs bring new challenges for UAV-aided MEC, e.g., how to recharge UAVs and how to jointly optimize service-caching, computation-offloading, and UAVs flight trajectories. To overcome the above-mentioned difficulties, in this paper we study the joint optimization for service-caching, computation-offloading, and UAVs flight trajectories for UAV-aided MEC, where multiple rechargeable UAVs cooperatively provide MEC services to a number of MUs. First, we formulate an energy minimization problem to minimize all MUs' energy consumptions by taking into account the mobility of MUs and the energy replenishment of UAVs. Then, using the hierarchical multi-agent deep reinforcement learning (HMDRL), we develop a two-timescale based joint service-caching, computation-offloading, and UAVs flight trajectories scheme, called HMDRL-Based SCOFT. Using HMDRL-Based SCOFT, we derive UAVs' service-caching policies in each time frame, and then derive UAVs flight trajectories and MUs' computation-offloading in each time slot. Finally, we validate and evaluate the performances of our proposed HMDRL-Based SCOFT scheme through extensive simulations, which show that our developed scheme outperforms the other baseline schemes to converge faster and greatly reduce MUs' energy consumptions.

由于具有高机动性、高视距(LoS)传输几率和灵活部署等特点,无人机(UAV)已被用作移动边缘计算(MEC)服务器,为移动用户(MU)提供无处不在的计算服务。然而,无人机有限的储能、缓存能力和计算资源为无人机辅助移动计算(MEC)带来了新的挑战,例如,如何为无人机充电,如何共同优化服务缓存、计算卸载和无人机飞行轨迹。为了克服上述困难,本文研究了无人机辅助 MEC 的服务缓存、计算卸载和无人机飞行轨迹的联合优化问题。首先,我们提出了一个能量最小化问题,通过考虑 MU 的移动性和无人机的能量补充,最小化所有 MU 的能量消耗。然后,利用分层多代理深度强化学习(HMDRL),我们开发了一种基于双时间尺度的联合服务缓存、计算卸载和无人机飞行轨迹方案,称为基于 HMDRL 的 SCOFT。利用基于 HMDRL 的 SCOFT,我们得出了无人机在每个时间帧中的服务缓存策略,然后得出了无人机在每个时隙中的飞行轨迹和 MU 的计算卸载。最后,我们通过大量仿真验证和评估了我们提出的基于 HMDRL 的 SCOFT 方案的性能,结果表明我们开发的方案优于其他基线方案,收敛速度更快,大大降低了 MU 的能耗。
{"title":"Joint optimization for service-caching, computation-offloading, and UAVs flight trajectories over rechargeable UAV-aided MEC using hierarchical multi-agent deep reinforcement learning","authors":"Zhian Chen,&nbsp;Fei Wang,&nbsp;Jiaojie Wang","doi":"10.1016/j.vehcom.2024.100844","DOIUrl":"10.1016/j.vehcom.2024.100844","url":null,"abstract":"<div><p>Due to the high mobility, high chance of line-of-sight (LoS) transmission, and flexible deployment, unmanned aerial vehicles (UAVs) have been used as mobile edge computing (MEC) servers to provide ubiquitous computation services to mobile users (MUs). However, the limited energy storage, caching capacity, and computation resources of UAVs bring new challenges for UAV-aided MEC, e.g., how to recharge UAVs and how to jointly optimize service-caching, computation-offloading, and UAVs flight trajectories. To overcome the above-mentioned difficulties, in this paper we study the joint optimization for service-caching, computation-offloading, and UAVs flight trajectories for UAV-aided MEC, where multiple rechargeable UAVs cooperatively provide MEC services to a number of MUs. First, we formulate an energy minimization problem to minimize all MUs' energy consumptions by taking into account the mobility of MUs and the energy replenishment of UAVs. Then, using the <em>hierarchical multi-agent deep reinforcement learning</em> (<u>HMDRL</u>), we develop a two-timescale based joint <u>s</u>ervice-<u>c</u>aching, <u>c</u>omputation-<u>o</u>ffloading, and UAVs <u>f</u>light <u>t</u>rajectories scheme, called <em>HMDRL-Based SCOFT</em>. Using HMDRL-Based SCOFT, we derive UAVs' service-caching policies in each time frame, and then derive UAVs flight trajectories and MUs' computation-offloading in each time slot. Finally, we validate and evaluate the performances of our proposed HMDRL-Based SCOFT scheme through extensive simulations, which show that our developed scheme outperforms the other baseline schemes to converge faster and greatly reduce MUs' energy consumptions.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100844"},"PeriodicalIF":5.8,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Upper bound of outage probability in unmanned aerial vehicle-assisted cellular networks over fading channels 衰减信道上无人机辅助蜂窝网络的中断概率上限
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-09-05 DOI: 10.1016/j.vehcom.2024.100840
Mehran Pourmohammad Abdollahi, Hosein Azarhava, Javad Musevi Niya, Mahdi Nangir

In this paper, we consider a multi-tier cellular network in which a hovering Unmanned Aerial Vehicle (UAV) assists the network in the absence of the terrestrial Macrocell base station. The orthogonal sub channels are assumed for communication between the UAV and its attached users. The Femtocell users and Device-to-Device (D2D) pairs transmit their data to the corresponding receivers in the same sub-channels. Achieving the outage probability of the ground users, is a challenge for the operators considering the dominant small scale and large scale fading over the channels, Line-of-Sight and None-Line-of-Sight conditions together. The mentioned problem becomes worse in the presence of cross-tier interferences. We investigate the outage probability of the ground UAV users to evaluate the performance of the network. Due to intractability of the calculations to derive the exact outage probability, the closed-form expressions are derived for the upper bound of outage probability under Rayleigh and Nakagami-m fading. The effect of UAV altitude, density of D2Ds and corresponding transmission powers are discussed. The results verify the simulations and confirm that the proposed approach outperforms the existing upper bound methods.

在本文中,我们考虑了一种多层蜂窝网络,其中在没有地面宏蜂窝基站的情况下,由悬停的无人飞行器(UAV)协助网络工作。假设无人飞行器与其所附用户之间的通信采用正交子信道。Femtocell 用户和设备对设备 (D2D) 对通过相同的子信道向相应的接收器传输数据。考虑到信道上主要的小尺度和大尺度衰落、视距和非视距条件,实现地面用户的中断概率对运营商来说是一个挑战。在存在跨层干扰的情况下,上述问题会变得更加严重。我们研究了地面无人机用户的中断概率,以评估网络的性能。由于计算精确中断概率的困难性,我们推导出了瑞利衰落和中上衰落条件下中断概率上限的闭式表达式。讨论了无人机高度、D2Ds 密度和相应传输功率的影响。结果验证了模拟结果,并证实所提出的方法优于现有的上界方法。
{"title":"Upper bound of outage probability in unmanned aerial vehicle-assisted cellular networks over fading channels","authors":"Mehran Pourmohammad Abdollahi,&nbsp;Hosein Azarhava,&nbsp;Javad Musevi Niya,&nbsp;Mahdi Nangir","doi":"10.1016/j.vehcom.2024.100840","DOIUrl":"10.1016/j.vehcom.2024.100840","url":null,"abstract":"<div><p>In this paper, we consider a multi-tier cellular network in which a hovering Unmanned Aerial Vehicle (UAV) assists the network in the absence of the terrestrial Macrocell base station. The orthogonal sub channels are assumed for communication between the UAV and its attached users. The Femtocell users and Device-to-Device (D2D) pairs transmit their data to the corresponding receivers in the same sub-channels. Achieving the outage probability of the ground users, is a challenge for the operators considering the dominant small scale and large scale fading over the channels, Line-of-Sight and None-Line-of-Sight conditions together. The mentioned problem becomes worse in the presence of cross-tier interferences. We investigate the outage probability of the ground UAV users to evaluate the performance of the network. Due to intractability of the calculations to derive the exact outage probability, the closed-form expressions are derived for the upper bound of outage probability under Rayleigh and Nakagami-<em>m</em> fading. The effect of UAV altitude, density of D2Ds and corresponding transmission powers are discussed. The results verify the simulations and confirm that the proposed approach outperforms the existing upper bound methods.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100840"},"PeriodicalIF":5.8,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing vehicular NOMA communication security through reconfigurable intelligent surfaces 通过可重新配置的智能表面加强车辆 NOMA 通信安全
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-09-04 DOI: 10.1016/j.vehcom.2024.100841
Altynbek Serikov, Mohd Hamza Naim Shaikh, Galymzhan Nauryzbayev

Physical layer security (PLS) aims to ensure the confidentiality and authenticity of transmitted data by capitalizing on the inherent randomness of wireless channels. Owing to the popularity of intelligent transportation systems (ITSs), PLS research has sparked renewed interest in the wireless research community. This paper investigates the performance of secure communication in the context of a vehicle-to-vehicle (V2V) communication scenario by employing a reconfigurable intelligent surface (RIS). Further, we introduce the concept of non-orthogonal multiple access (NOMA) to reduce latency and improve communication efficiency in V2V networks. This study aims to comprehensively analyze secrecy performance, encompassing parameters like average secrecy capacity (ASC), secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNZSC). Our research aims to highlight the efficacy of RIS in providing secure and reliable communication within V2V NOMA networks. Ultimately, our study contributes to advancing secure communication protocols in intelligent transportation systems.

物理层安全(PLS)旨在利用无线信道固有的随机性,确保传输数据的保密性和真实性。由于智能交通系统(ITS)的普及,物理层安全研究再次引发了无线研究界的兴趣。本文通过采用可重构智能表面(RIS),研究了车对车(V2V)通信场景下的安全通信性能。此外,我们还引入了非正交多址接入(NOMA)的概念,以减少 V2V 网络中的延迟并提高通信效率。本研究旨在全面分析保密性能,包括平均保密容量(ASC)、保密中断概率(SOP)和非零保密容量概率(PNZSC)等参数。我们的研究旨在强调 RIS 在 V2V NOMA 网络中提供安全可靠通信的功效。最终,我们的研究将有助于推动智能交通系统中安全通信协议的发展。
{"title":"Enhancing vehicular NOMA communication security through reconfigurable intelligent surfaces","authors":"Altynbek Serikov,&nbsp;Mohd Hamza Naim Shaikh,&nbsp;Galymzhan Nauryzbayev","doi":"10.1016/j.vehcom.2024.100841","DOIUrl":"10.1016/j.vehcom.2024.100841","url":null,"abstract":"<div><p>Physical layer security (PLS) aims to ensure the confidentiality and authenticity of transmitted data by capitalizing on the inherent randomness of wireless channels. Owing to the popularity of intelligent transportation systems (ITSs), PLS research has sparked renewed interest in the wireless research community. This paper investigates the performance of secure communication in the context of a vehicle-to-vehicle (V2V) communication scenario by employing a reconfigurable intelligent surface (RIS). Further, we introduce the concept of non-orthogonal multiple access (NOMA) to reduce latency and improve communication efficiency in V2V networks. This study aims to comprehensively analyze secrecy performance, encompassing parameters like average secrecy capacity (ASC), secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNZSC). Our research aims to highlight the efficacy of RIS in providing secure and reliable communication within V2V NOMA networks. Ultimately, our study contributes to advancing secure communication protocols in intelligent transportation systems.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"50 ","pages":"Article 100841"},"PeriodicalIF":5.8,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624001165/pdfft?md5=f26c6e9ea8dc5acc8055c994ba1cd365&pid=1-s2.0-S2214209624001165-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1