首页 > 最新文献

Vehicular Communications最新文献

英文 中文
Detection and mitigation of vehicle platooning disruption attacks 检测和缓解车辆排队干扰攻击
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-04-02 DOI: 10.1016/j.vehcom.2024.100765
Salah Zemmoudj, Nabila Bermad, Louiza Bouallouche-Medjkoune

In response to the escalating challenges posed by traffic bottlenecks, accidents, and intersection delays, the deployment of platooning mechanisms emerges as an imperative remedy. This investigation revolves around a pivotal scenario wherein a closely-knit platoon of cooperative vehicles approaches an intersection. Orchestrated by a lead vehicle, this convoy navigates the traffic light to expedite the journey of its followers towards their respective destinations. However, given that the size of the platoon can be increased, it will become difficult for the leader to manage it smoothly. Therefore, dividing the platoon into small groups led by co-leaders who deal directly with the leader is considered an ideal solution to speed up and facilitate the process of maintaining platoon stability. In this paper, we propose a Cooperative Adaptive Platooning Control Algorithm (CAPCA) for the hybrid communication topology in platooning. In fact, CAPCA aims to achieve stability in the platoon by distributing tasks in a parallel manner to mini-platoons. Moreover, inherent complexities arise as select members within the platoon strive to undermine its stability. Within this context, the research addresses the intricacies of Vehicle Platooning Disruption (VPD) attacks, a menacing phenomenon characterized by deliberate efforts to destabilize or seize control of a platoon. These attacks manifest through tactics such as false data injection (FDI) and replaying of control messages. In response, a robust and multifaceted countermeasure is conceptualized. The Vehicle Platooning Disruption Attacks Detection Protocol (VPD-ADP) takes center stage as a foundational component. By identifying instability within the platoon's dynamics model, VPD-ADP lays the essential groundwork for mitigating the repercussions of FDI and replay attacks. Employing advanced stochastic time series analysis, the impact of VPD attacks is scrutinized via anomalies in the Cartesian coordinates of vehicles deviations from the trajectory anticipated by the platoon. Moreover, the study introduces the Reputation-based Reliable Mitigation Protocol (RRMP), a pioneering approach that leverages collaborative data gleaned from neighboring vehicles. RRMP is devised to assess the veracity of received messages and gauge their reliability in real-time. Through extensive simulations and experiments, the proposed approach's effectiveness in fortifying the resilience of vehicle platooning systems against an array of disruption attacks is convincingly demonstrated.

为应对交通瓶颈、交通事故和交叉路口延误带来的日益严峻的挑战,部署排车机制成为当务之急。这项研究围绕一个关键场景展开,在这个场景中,一个紧密合作的车队驶近一个交叉路口。在领头车辆的协调下,车队通过交通信号灯,加快后续车辆驶向各自目的地的速度。然而,由于车队的规模可以扩大,领队很难顺利地进行管理。因此,把排分成由共同领导者领导的小组,由他们直接与领导者打交道被认为是一个理想的解决方案,可以加快和促进维持排的稳定性。在本文中,我们提出了一种适用于混合通信拓扑的合作自适应排队控制算法(CAPCA)。事实上,CAPCA 的目的是通过将任务以并行的方式分配给迷你排来实现排的稳定性。此外,由于排内部分成员会破坏排的稳定性,因此会产生固有的复杂性。在此背景下,本研究探讨了车辆排序破坏(VPD)攻击的复杂性,这是一种来势汹汹的现象,其特点是蓄意破坏排的稳定或夺取排的控制权。这些攻击通过虚假数据注入(FDI)和控制信息重放等战术表现出来。为此,我们构想了一种强有力的多层面应对措施。车辆排序中断攻击检测协议(VPD-ADP)作为基础组件占据中心位置。VPD-ADP 通过识别排的动态模型中的不稳定性,为减轻 FDI 和重放攻击的影响奠定了重要基础。利用先进的随机时间序列分析,通过车辆笛卡尔坐标偏离排的预期轨迹的异常情况来仔细研究 VPD 攻击的影响。此外,研究还引入了基于信誉的可靠缓解协议(RRMP),这是一种利用从邻近车辆收集的协作数据的开创性方法。RRMP 用于实时评估接收信息的真实性和可靠性。通过大量的模拟和实验,令人信服地证明了所提出的方法在加强车辆排队系统抵御一系列破坏性攻击方面的有效性。
{"title":"Detection and mitigation of vehicle platooning disruption attacks","authors":"Salah Zemmoudj,&nbsp;Nabila Bermad,&nbsp;Louiza Bouallouche-Medjkoune","doi":"10.1016/j.vehcom.2024.100765","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100765","url":null,"abstract":"<div><p>In response to the escalating challenges posed by traffic bottlenecks, accidents, and intersection delays, the deployment of platooning mechanisms emerges as an imperative remedy. This investigation revolves around a pivotal scenario wherein a closely-knit platoon of cooperative vehicles approaches an intersection. Orchestrated by a lead vehicle, this convoy navigates the traffic light to expedite the journey of its followers towards their respective destinations. However, given that the size of the platoon can be increased, it will become difficult for the leader to manage it smoothly. Therefore, dividing the platoon into small groups led by co-leaders who deal directly with the leader is considered an ideal solution to speed up and facilitate the process of maintaining platoon stability. In this paper, we propose a Cooperative Adaptive Platooning Control Algorithm (CAPCA) for the hybrid communication topology in platooning. In fact, CAPCA aims to achieve stability in the platoon by distributing tasks in a parallel manner to mini-platoons. Moreover, inherent complexities arise as select members within the platoon strive to undermine its stability. Within this context, the research addresses the intricacies of Vehicle Platooning Disruption (VPD) attacks, a menacing phenomenon characterized by deliberate efforts to destabilize or seize control of a platoon. These attacks manifest through tactics such as false data injection (FDI) and replaying of control messages. In response, a robust and multifaceted countermeasure is conceptualized. The Vehicle Platooning Disruption Attacks Detection Protocol (VPD-ADP) takes center stage as a foundational component. By identifying instability within the platoon's dynamics model, VPD-ADP lays the essential groundwork for mitigating the repercussions of FDI and replay attacks. Employing advanced stochastic time series analysis, the impact of VPD attacks is scrutinized via anomalies in the Cartesian coordinates of vehicles deviations from the trajectory anticipated by the platoon. Moreover, the study introduces the Reputation-based Reliable Mitigation Protocol (RRMP), a pioneering approach that leverages collaborative data gleaned from neighboring vehicles. RRMP is devised to assess the veracity of received messages and gauge their reliability in real-time. Through extensive simulations and experiments, the proposed approach's effectiveness in fortifying the resilience of vehicle platooning systems against an array of disruption attacks is convincingly demonstrated.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140539981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TCV-D: An Approach for Path Selection in Vehicular Task Offloading TCV-D:车载任务卸载中的路径选择方法
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-29 DOI: 10.1016/j.vehcom.2024.100770
Niharika Keshari, Dinesh Singh

The vehicular task offloading technology enhances the transportation system by offloading tasks of task-requesting vehicles (TRV) to either vehicular fog nodes (VFN) or road-side units (RSU) using single-hop or multi-hop communication. Due to the limited availability of VFN/RSU within a single-hop of TRV, a multi-hop path is employed for offloading tasks from TRV to VFN/RSU. However, the multi-hop path selection approaches have several issues, such as frequent re-connections due to varying vehicle speed, lower successful offloading when task deadline is missed, increased outage time when no VFN/RSU is within communication range of TRV, and inefficient vehicle selection to offload task leading to longer path lifetime. To address these issues, we have proposed a novel approach called Time-Computation-Variance based deadline sensitive path selection (TCV-D), which considers contextual information from k-hop neighbors. The approach offers four offloading modes: Direct mode, RSU mode, VFN mode, and Search mode, depending on the availability of RSUs/VFNs in single and multi-hop scenarios. To ensure tasks are delivered within deadlines, the proposed approach executes tasks by task forwarding vehicle or neighbor of task forwarding vehicle instead of designated VFN/RSU if delivering the task directly to the destination would exceed the deadline constraint. Extensive result analysis demonstrates substantial improvements compared to the existing k-hop-limited offloading time-based path selection (k-hop-limited-OTS) approach, including a 60% reduction in re-connections, a 35% decrease in path life time, a 30% decrease in outage time, and an 84% increase in successful offloading ratio, approximately.

车辆任务卸载技术通过使用单跳或多跳通信将任务请求车辆(TRV)的任务卸载到车载雾节点(VFN)或路侧单元(RSU),从而增强了运输系统。由于 TRV 单跳范围内的 VFN/RSU 数量有限,因此采用多跳路径将任务从 TRV 卸载到 VFN/RSU。然而,多跳路径选择方法存在一些问题,例如由于车辆速度变化而导致频繁重新连接、错过任务截止日期时卸载成功率较低、当 TRV 的通信范围内没有 VFN/RSU 时中断时间增加,以及卸载任务的车辆选择效率低下导致路径寿命延长。为解决这些问题,我们提出了一种名为基于时间计算方差的截止时间敏感路径选择(TCV-D)的新方法,该方法考虑了 k 跳邻居的上下文信息。该方法提供四种卸载模式:直接模式、RSU 模式、VFN 模式和搜索模式,取决于单跳和多跳场景中 RSU/VFN 的可用性。为确保在最后期限内交付任务,如果直接向目的地交付任务会超出最后期限限制,建议的方法会由任务转发车或任务转发车的邻居代替指定的 VFN/RSU 执行任务。广泛的结果分析表明,与现有的基于 k 跳限制卸载时间的路径选择(k-hop-limited-OTS)方法相比,该方法有了很大改进,包括减少了 60% 的重新连接,减少了 35% 的路径寿命时间,减少了 30% 的中断时间,以及提高了 84% 的成功卸载率。
{"title":"TCV-D: An Approach for Path Selection in Vehicular Task Offloading","authors":"Niharika Keshari,&nbsp;Dinesh Singh","doi":"10.1016/j.vehcom.2024.100770","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100770","url":null,"abstract":"<div><p>The vehicular task offloading technology enhances the transportation system by offloading tasks of task-requesting vehicles (TRV) to either vehicular fog nodes (VFN) or road-side units (RSU) using single-hop or multi-hop communication. Due to the limited availability of VFN/RSU within a single-hop of TRV, a multi-hop path is employed for offloading tasks from TRV to VFN/RSU. However, the multi-hop path selection approaches have several issues, such as frequent re-connections due to varying vehicle speed, lower successful offloading when task deadline is missed, increased outage time when no VFN/RSU is within communication range of TRV, and inefficient vehicle selection to offload task leading to longer path lifetime. To address these issues, we have proposed a novel approach called Time-Computation-Variance based deadline sensitive path selection (TCV-D), which considers contextual information from k-hop neighbors. The approach offers four offloading modes: Direct mode, RSU mode, VFN mode, and Search mode, depending on the availability of RSUs/VFNs in single and multi-hop scenarios. To ensure tasks are delivered within deadlines, the proposed approach executes tasks by task forwarding vehicle or neighbor of task forwarding vehicle instead of designated VFN/RSU if delivering the task directly to the destination would exceed the deadline constraint. Extensive result analysis demonstrates substantial improvements compared to the existing k-hop-limited offloading time-based path selection (k-hop-limited-OTS) approach, including a 60% reduction in re-connections, a 35% decrease in path life time, a 30% decrease in outage time, and an 84% increase in successful offloading ratio, approximately.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140348186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-jamming radar waveform design for repeater jammer using reinforcement learning 利用强化学习为中继干扰器设计抗干扰雷达波形
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-28 DOI: 10.1016/j.vehcom.2024.100768
Muhammmad Majid Aziz, Aamir Habib, Abdur Rahman M. Maud, Adnan Zafar, Syed Ali Irtaza

The ever-evolving technology has given rise to a dynamic and intricate Radar environment, profoundly impacting warfare. Repeater jammers pose a significant threat to Radar systems by re-transmitting intercepted Radar signals with added noise or false information, thereby adding false targets in Radar detection process. Traditional Radar waveform designs often struggle to counter such jammers due to their adaptive and sophisticated nature. To address this challenge, this paper proposes utilizing a set of waveform during a coherent processing interval (CPI) which help cancel out any waveform received out of order. This requires a set of waveform which are orthogonal to each other in delay and Doppler. To design such a set of waveform, this paper proposes leveraging reinforcement learning (RL). The process involves offline training on simulated Radar environments, learning from the consequences of actions, and gradually improving its decision-making capabilities to generate effective anti-jamming waveform. This study presents experimental results demonstrating the effectiveness of the proposed approach in enhancing Radar system performance by mitigating the impact of Repeater jammers. Simulation results show that the proposed set of waveform have improved auto-correlation peak sidelobes as compared to Barker code and random sequences, while reducing cross-correlation sidelobes as compared to Gold codes and Golay codes.

不断发展的技术催生了一个动态而复杂的雷达环境,对战争产生了深远的影响。中继器干扰器对雷达系统构成了重大威胁,它通过增加噪声或虚假信息重新传输截获的雷达信号,从而在雷达探测过程中增加虚假目标。由于此类干扰器具有自适应和复杂的特性,传统的雷达波形设计往往难以应对。为应对这一挑战,本文建议在相干处理间隔(CPI)内使用一组波形,以帮助抵消任何不按顺序接收的波形。这需要一组在延迟和多普勒方面相互正交的波形。为了设计这样一组波形,本文建议利用强化学习(RL)。这一过程包括在模拟雷达环境中进行离线训练,从行动的后果中学习,逐步提高决策能力,从而生成有效的抗干扰波形。本研究提供的实验结果表明,所提议的方法能有效减轻中继器干扰器的影响,从而提高雷达系统的性能。仿真结果表明,与巴克编码和随机序列相比,建议的波形集改善了自相关峰值侧扰,而与黄金编码和戈莱编码相比,则减少了交叉相关侧扰。
{"title":"Anti-jamming radar waveform design for repeater jammer using reinforcement learning","authors":"Muhammmad Majid Aziz,&nbsp;Aamir Habib,&nbsp;Abdur Rahman M. Maud,&nbsp;Adnan Zafar,&nbsp;Syed Ali Irtaza","doi":"10.1016/j.vehcom.2024.100768","DOIUrl":"10.1016/j.vehcom.2024.100768","url":null,"abstract":"<div><p>The ever-evolving technology has given rise to a dynamic and intricate Radar environment, profoundly impacting warfare. Repeater jammers pose a significant threat to Radar systems by re-transmitting intercepted Radar signals with added noise or false information, thereby adding false targets in Radar detection process. Traditional Radar waveform designs often struggle to counter such jammers due to their adaptive and sophisticated nature. To address this challenge, this paper proposes utilizing a set of waveform during a coherent processing interval (CPI) which help cancel out any waveform received out of order. This requires a set of waveform which are orthogonal to each other in delay and Doppler. To design such a set of waveform, this paper proposes leveraging reinforcement learning (RL). The process involves offline training on simulated Radar environments, learning from the consequences of actions, and gradually improving its decision-making capabilities to generate effective anti-jamming waveform. This study presents experimental results demonstrating the effectiveness of the proposed approach in enhancing Radar system performance by mitigating the impact of Repeater jammers. Simulation results show that the proposed set of waveform have improved auto-correlation peak sidelobes as compared to Barker code and random sequences, while reducing cross-correlation sidelobes as compared to Gold codes and Golay codes.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140400986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CRAS-FL: Clustered resource-aware scheme for federated learning in vehicular networks CRAS-FL:用于车载网络联合学习的集群资源感知方案
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-26 DOI: 10.1016/j.vehcom.2024.100769
Sawsan AbdulRahman , Ouns Bouachir , Safa Otoum , Azzam Mourad

As a promising distributed learning paradigm, Federated Learning (FL) is expected to meet the ever-increasing needs of Machine Learning (ML) based applications in Intelligent Transportation Systems (ITS). It is a powerful tool that processes the large amount of on-board data while preserving its privacy by locally learning the models. However, training and transmitting the model parameters in vehicular networks consume significant resources and time, which is not suitable for applications with strict real-time requirements. Moreover, the quality of the data, the mobility of the participating vehicles, as well as their heterogeneous capabilities, can impact the performance of FL process, bringing to the forefront the optimization of the data selection and the clients resources. In this paper, we propose CRAS-FL, a Clustered Resource-Aware Scheme for FL in Vehicular Networks. The proposed approach bypasses (1) communication bottlenecks by forming groups of vehicles, where the Cluster Head (CH) is responsible of handling the communication and (2) computation bottlenecks by introducing an offloading strategy, where the availability of the extra resources on some vehicles is leveraged. Particularly, CRAS-FL implements a CH election Algorithm, where the bandwidth, stability, computational resources, and vehicles topology are considered in order to ensure reliable communication and cluster stability. Moreover, the offloading strategy studies the quality of the models and the resources of the clients, and accordingly allows computational offloading among the group peers. The conducted experiments show how the proposed scheme outperforms the current approaches in the literature by (1) reducing the communication overhead, (2) targeting more training data, and (3) reducing the clusters response time.

作为一种前景广阔的分布式学习范例,联邦学习(FL)有望满足智能交通系统(ITS)中基于机器学习(ML)的应用日益增长的需求。它是一种功能强大的工具,可处理大量车载数据,同时通过本地学习模型来保护数据隐私。然而,在车载网络中训练和传输模型参数需要消耗大量资源和时间,不适合有严格实时性要求的应用。此外,数据的质量、参与车辆的移动性以及它们的异构能力都会影响 FL 过程的性能,因此数据选择和客户端资源的优化问题就显得尤为突出。本文提出了用于车载网络 FL 的集群资源感知方案 CRAS-FL。所提出的方法通过组建车辆群(由簇首(CH)负责处理通信)绕过了(1)通信瓶颈;(2)通过引入卸载策略绕过了计算瓶颈。特别是,CRAS-FL 实现了一种 CH 选举算法,其中考虑了带宽、稳定性、计算资源和车辆拓扑,以确保可靠的通信和集群稳定性。此外,卸载策略研究了模型的质量和客户端的资源,并相应地允许在群对等体之间进行计算卸载。实验结果表明,所提出的方案在以下方面优于目前文献中的方法:(1)减少通信开销;(2)瞄准更多训练数据;(3)减少集群响应时间。
{"title":"CRAS-FL: Clustered resource-aware scheme for federated learning in vehicular networks","authors":"Sawsan AbdulRahman ,&nbsp;Ouns Bouachir ,&nbsp;Safa Otoum ,&nbsp;Azzam Mourad","doi":"10.1016/j.vehcom.2024.100769","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100769","url":null,"abstract":"<div><p>As a promising distributed learning paradigm, Federated Learning (FL) is expected to meet the ever-increasing needs of Machine Learning (ML) based applications in Intelligent Transportation Systems (ITS). It is a powerful tool that processes the large amount of on-board data while preserving its privacy by locally learning the models. However, training and transmitting the model parameters in vehicular networks consume significant resources and time, which is not suitable for applications with strict real-time requirements. Moreover, the quality of the data, the mobility of the participating vehicles, as well as their heterogeneous capabilities, can impact the performance of FL process, bringing to the forefront the optimization of the data selection and the clients resources. In this paper, we propose CRAS-FL, a Clustered Resource-Aware Scheme for FL in Vehicular Networks. The proposed approach bypasses (1) communication bottlenecks by forming groups of vehicles, where the Cluster Head (CH) is responsible of handling the communication and (2) computation bottlenecks by introducing an offloading strategy, where the availability of the extra resources on some vehicles is leveraged. Particularly, CRAS-FL implements a CH election Algorithm, where the bandwidth, stability, computational resources, and vehicles topology are considered in order to ensure reliable communication and cluster stability. Moreover, the offloading strategy studies the quality of the models and the resources of the clients, and accordingly allows computational offloading among the group peers. The conducted experiments show how the proposed scheme outperforms the current approaches in the literature by (1) reducing the communication overhead, (2) targeting more training data, and (3) reducing the clusters response time.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140349971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs S2DN:在基于多控制器的软件定义 VANET 中设计具有会话密钥建立功能的稳健认证协议
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-21 DOI: 10.1016/j.vehcom.2024.100767
Isha Pali , Mohammad Abdussami , Ruhul Amin , Taher Al-Shehari , Muna Al-Razgan , Taha Alfakih

Advancements in technology and the adoption of innovative developments have significantly simplified our lives. One notable innovation in the networking domain is Software Defined Networking (SDN), which revolutionizes the network layer by enabling centralized network administration and re-programmability. SDN technology finds application in diverse fields such as Vehicular Ad-hoc Networks (VANETs), Wireless Sensor Networks (WSNs), Internet of Things (IoT) communications, and cloud-fog computing. The integration of SDN technology into VANET systems has notably improved network performance but has also raised security concerns. To tackle this issue, this paper focuses on devising an authentication mechanism to facilitate secure communication across various VANET levels by establishing a shared session key. Moreover, the research proposes a method to mitigate the challenge of single points of failure, a typically difficult issue to address. To ensure the security of all confidential information during protocol execution, simulations are conducted using the Scyther tool. Additionally, an informal security analysis is performed, demonstrating the robustness of the proposed protocol. The proposed protocol also performs outstanding in terms of performance results

技术的进步和创新发展的采用大大简化了我们的生活。软件定义网络(SDN)是网络领域的一项显著创新,它通过实现集中式网络管理和可重新编程,彻底改变了网络层。SDN 技术可应用于多个领域,如车载 Ad-hoc 网络 (VANET)、无线传感器网络 (WSN)、物联网 (IoT) 通信和云雾计算。将 SDN 技术集成到 VANET 系统中显著提高了网络性能,但也引发了安全问题。为解决这一问题,本文重点设计了一种身份验证机制,通过建立共享会话密钥,促进不同 VANET 级别之间的安全通信。此外,这项研究还提出了一种方法来减轻单点故障的挑战,这是一个通常难以解决的问题。为确保协议执行过程中所有机密信息的安全,我们使用 Scyther 工具进行了模拟。此外,还进行了非正式的安全分析,证明了拟议协议的稳健性。建议的协议在性能结果方面也表现出色
{"title":"S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs","authors":"Isha Pali ,&nbsp;Mohammad Abdussami ,&nbsp;Ruhul Amin ,&nbsp;Taher Al-Shehari ,&nbsp;Muna Al-Razgan ,&nbsp;Taha Alfakih","doi":"10.1016/j.vehcom.2024.100767","DOIUrl":"10.1016/j.vehcom.2024.100767","url":null,"abstract":"<div><p>Advancements in technology and the adoption of innovative developments have significantly simplified our lives. One notable innovation in the networking domain is Software Defined Networking (SDN), which revolutionizes the network layer by enabling centralized network administration and re-programmability. SDN technology finds application in diverse fields such as Vehicular Ad-hoc Networks (VANETs), Wireless Sensor Networks (WSNs), Internet of Things (IoT) communications, and cloud-fog computing. The integration of SDN technology into VANET systems has notably improved network performance but has also raised security concerns. To tackle this issue, this paper focuses on devising an authentication mechanism to facilitate secure communication across various VANET levels by establishing a shared session key. Moreover, the research proposes a method to mitigate the challenge of single points of failure, a typically difficult issue to address. To ensure the security of all confidential information during protocol execution, simulations are conducted using the Scyther tool. Additionally, an informal security analysis is performed, demonstrating the robustness of the proposed protocol. The proposed protocol also performs outstanding in terms of performance results</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140343650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated learning-based trajectory prediction for dynamic resource allocation in moving small cell networks 基于联合学习的移动小蜂窝网络动态资源分配轨迹预测
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-21 DOI: 10.1016/j.vehcom.2024.100766
Saniya Zafar , Sobia Jangsher , Adnan Zafar

With the evolution of fifth generation (5G) of mobile communication, vehicular edge computing (VEC) and moving small cell (MSC) network are gaining attention because of their capability to provide improved quality-of-service (QoS) to vehicular users. The ultimate goal of VEC-enabled MSC network is to diminish the vehicular penetration effect and path loss resulting in improved network performance for vehicular users. In this paper, we explore distributed resource block (RB) allocation for fronthaul links of MSCs with probabilistic mobility in VEC-enabled MSC network. The proposed work exploits the computational power of road side units (RSUs) deployed with VEC servers present along the road sides to allocate the resources to MSCs in a distributed manner by exchanging limited information, with the objective of maximizing the data rate achieved by MSC network. Moreover, we propose federated learning (FL)-based position prediction of MSCs to predict the trajectory of MSCs in advance for efficient prediction of resource allocation in MSC network. Simulations results are presented to compare the position prediction dependent distributed and centralized time interval dependent interference graph-based resource allocation to MSCs in terms of RB utilization and average achievable data rate of MSC network. For comparison, we further investigated centralized as well as distributed threshold time dependent interference graph-based allocation of resources to MSC network.

随着第五代(5G)移动通信的发展,车载边缘计算(VEC)和移动小基站(MSC)网络因其能够为车辆用户提供更好的服务质量(QoS)而备受关注。支持 VEC 的 MSC 网络的最终目标是减少车辆穿透效应和路径损耗,从而提高车辆用户的网络性能。本文探讨了在支持 VEC 的 MSC 网络中,为具有概率移动性的 MSC 的前端链路分配分布式资源块 (RB)。所提议的工作利用了部署在道路两侧的路侧单元(RSU)与 VEC 服务器的计算能力,通过交换有限信息,以分布式方式为 MSC 分配资源,目的是最大限度地提高 MSC 网络的数据传输速率。此外,我们还提出了基于联合学习(FL)的移动卫星位置预测,以提前预测移动卫星的轨迹,从而有效预测移动卫星网络的资源分配。仿真结果表明,基于位置预测的分布式资源分配与基于时间间隔干扰图的集中式资源分配在 RB 利用率和 MSC 网络平均可实现数据速率方面进行了比较。为了进行比较,我们进一步研究了基于集中式和分布式阈值时间相关干扰图的 MSC 网络资源分配。
{"title":"Federated learning-based trajectory prediction for dynamic resource allocation in moving small cell networks","authors":"Saniya Zafar ,&nbsp;Sobia Jangsher ,&nbsp;Adnan Zafar","doi":"10.1016/j.vehcom.2024.100766","DOIUrl":"10.1016/j.vehcom.2024.100766","url":null,"abstract":"<div><p>With the evolution of fifth generation (5G) of mobile communication, vehicular edge computing (VEC) and moving small cell (MSC) network are gaining attention because of their capability to provide improved quality-of-service (QoS) to vehicular users. The ultimate goal of VEC-enabled MSC network is to diminish the vehicular penetration effect and path loss resulting in improved network performance for vehicular users. In this paper, we explore distributed resource block (RB) allocation for fronthaul links of MSCs with probabilistic mobility in VEC-enabled MSC network. The proposed work exploits the computational power of road side units (RSUs) deployed with VEC servers present along the road sides to allocate the resources to MSCs in a distributed manner by exchanging limited information, with the objective of maximizing the data rate achieved by MSC network. Moreover, we propose federated learning (FL)-based position prediction of MSCs to predict the trajectory of MSCs in advance for efficient prediction of resource allocation in MSC network. Simulations results are presented to compare the position prediction dependent distributed and centralized time interval dependent interference graph-based resource allocation to MSCs in terms of RB utilization and average achievable data rate of MSC network. For comparison, we further investigated centralized as well as distributed threshold time dependent interference graph-based allocation of resources to MSC network.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140281540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSSPS: A dynamic secure service provision scheme in fog-based VANETs DSSPS:基于雾的 VANET 中的动态安全服务提供方案
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-19 DOI: 10.1016/j.vehcom.2024.100762
Yan Xu, Ailian Shi, Jie Cui, Hong Zhong

In fog-based VANETs, fog nodes are close to the network edge that analyze data uploaded by vehicles, and then provide value-added services. It is suitable to adopt data sharing schemes to provide value-added services. However, applying existing data sharing schemes directly for service provision in fog-based VANETs has limitations in terms of security and efficiency. Therefore, we propose a dynamic secure service provision scheme in fog-based VANETs called DSSPS. Firstly, we construct an efficient subscription permission authentication mechanism that allows vehicles to request service from different fog nodes after a single subscription at TA. Secondly, a subgroup selecting algorithm is proposed, which effectively reduces the decryption overhead of vehicles. Formal security proof demonstrates DSSPS is secure. At the same time, DSSPS achieves better performance in terms of computation and communication costs.

在基于雾的 VANET 中,雾节点靠近网络边缘,分析车辆上传的数据,然后提供增值服务。采用数据共享方案提供增值服务是合适的。然而,在基于雾的 VANET 中直接应用现有的数据共享方案来提供服务,在安全性和效率方面都有局限性。因此,我们提出了一种基于雾的 VANET 中的动态安全服务提供方案,称为 DSSPS。首先,我们构建了一种高效的订阅许可认证机制,允许车辆在 TA 处进行一次订阅后向不同的雾节点请求服务。其次,我们提出了一种分组选择算法,有效降低了车辆的解密开销。正式的安全性证明表明 DSSPS 是安全的。同时,DSSPS 在计算成本和通信成本方面取得了更好的性能。
{"title":"DSSPS: A dynamic secure service provision scheme in fog-based VANETs","authors":"Yan Xu,&nbsp;Ailian Shi,&nbsp;Jie Cui,&nbsp;Hong Zhong","doi":"10.1016/j.vehcom.2024.100762","DOIUrl":"10.1016/j.vehcom.2024.100762","url":null,"abstract":"<div><p>In fog-based VANETs, fog nodes are close to the network edge that analyze data uploaded by vehicles, and then provide value-added services. It is suitable to adopt data sharing schemes to provide value-added services. However, applying existing data sharing schemes directly for service provision in fog-based VANETs has limitations in terms of security and efficiency. Therefore, we propose a dynamic secure service provision scheme in fog-based VANETs called DSSPS. Firstly, we construct an efficient subscription permission authentication mechanism that allows vehicles to request service from different fog nodes after a single subscription at TA. Secondly, a subgroup selecting algorithm is proposed, which effectively reduces the decryption overhead of vehicles. Formal security proof demonstrates DSSPS is secure. At the same time, DSSPS achieves better performance in terms of computation and communication costs.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140173391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTL-PIE: A multi-task learning based drone pilot identification and operation evaluation scheme MTL-PIE:基于多任务学习的无人机驾驶员识别与操作评估方案
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-18 DOI: 10.1016/j.vehcom.2024.100760
Liyao Han, Xiangping Zhong, Yanning Zhang

As one of the most promising industries, consumer-grade Unmanned Aerial Vehicles (UAVs), also known as drones, have changed our lives. Although significant progress in drones has been made, adversary impersonation attacks still pose severe risks to flying drones. In addition, authorized pilot miss-operations also has become a critical factor leading to drone flight accidents. To validate the pilot's legal status and remind the authorized pilot about their miss-operations, we propose a multi-task learning-based drone pilot identification and operation evaluation scheme named MTL-PIE. Specifically, we first present qualitative and quantitative guidelines to evaluate pilot operation proficiency. Then, we design a pilot identification module and an operation evaluation module to resist pilot impersonation attacks and assess pilot operation proficiency, respectively. Finally, we propose a soft-parameter sharing mechanism to transfer knowledge between two modules and a dynamic weight-adjusting algorithm to prevent domain-dominant problems. Numerical results show that MTL-PIE can verify pilot legal status with an accuracy of 95.36% (outperforming our previous work with a margin of 2%-3%) and act as assessors to evaluate pilot operation proficiency with an accuracy of 94.47%. Note that MTL-PIE needs only 35 ms to verify pilot legal status and assess pilot operation proficiency; it has great potential to reduce drone flight accidents.

作为最有前途的产业之一,消费级无人驾驶飞行器(UAV)(又称无人机)已经改变了我们的生活。虽然无人机已经取得了重大进展,但对手的假冒攻击仍给无人机飞行带来严重风险。此外,经授权的飞行员操作失误也成为导致无人机飞行事故的关键因素。为了验证飞行员的合法身份并提醒授权飞行员注意其错误操作,我们提出了一种基于多任务学习的无人机飞行员识别和操作评估方案,命名为 MTL-PIE。具体来说,我们首先提出了评估飞行员操作熟练程度的定性和定量准则。然后,我们设计了一个飞行员识别模块和一个操作评估模块,分别用于抵御飞行员假冒攻击和评估飞行员的操作熟练程度。最后,我们提出了在两个模块之间传递知识的软参数共享机制和防止领域主导问题的动态权重调整算法。数值结果表明,MTL-PIE 能以 95.36% 的准确率验证飞行员的合法身份(以 2%-3% 的优势超过我们之前的工作),并能以 94.47% 的准确率评估飞行员的操作熟练程度。需要注意的是,MTL-PIE 验证飞行员合法身份和评估飞行员操作熟练程度仅需 35 毫秒;它在减少无人机飞行事故方面具有巨大潜力。
{"title":"MTL-PIE: A multi-task learning based drone pilot identification and operation evaluation scheme","authors":"Liyao Han,&nbsp;Xiangping Zhong,&nbsp;Yanning Zhang","doi":"10.1016/j.vehcom.2024.100760","DOIUrl":"10.1016/j.vehcom.2024.100760","url":null,"abstract":"<div><p>As one of the most promising industries, consumer-grade Unmanned Aerial Vehicles (UAVs), also known as drones, have changed our lives. Although significant progress in drones has been made, adversary impersonation attacks still pose severe risks to flying drones. In addition, authorized pilot miss-operations also has become a critical factor leading to drone flight accidents. To validate the pilot's legal status and remind the authorized pilot about their miss-operations, we propose a multi-task learning-based drone pilot identification and operation evaluation scheme named MTL-PIE. Specifically, we first present qualitative and quantitative guidelines to evaluate pilot operation proficiency. Then, we design a pilot identification module and an operation evaluation module to resist pilot impersonation attacks and assess pilot operation proficiency, respectively. Finally, we propose a soft-parameter sharing mechanism to transfer knowledge between two modules and a dynamic weight-adjusting algorithm to prevent domain-dominant problems. Numerical results show that MTL-PIE can verify pilot legal status with an accuracy of 95.36% (outperforming our previous work with a margin of 2%-3%) and act as assessors to evaluate pilot operation proficiency with an accuracy of 94.47%. Note that MTL-PIE needs only 35 ms to verify pilot legal status and assess pilot operation proficiency; it has great potential to reduce drone flight accidents.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140173359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight three-party key agreement for V2G networks with physical unclonable function 用于具有物理不可克隆功能的 V2G 网络的轻量级三方密钥协议
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-16 DOI: 10.1016/j.vehcom.2024.100747
Dingyi Shui , Yong Xie , Libing Wu , Yining Liu , Xing Su

Electric vehicles (EV) are gradually replacing traditional fuel-based vehicles to reduce carbon emissions and protect the human living environment. EVs can be easily integrated into the smart grid infrastructure, and achieve the rapid demand response of power exchange in the vehicle-to-grid (V2G) ecosystem, and achieve optimal energy allocation. However, it is a challenge to simultaneously solve the security, privacy and efficiency of communication in V2G. To meet this challenge, we propose a three-party key agreement protocol based on Physical Unclonable Function (PUF). The proposed protocol just uses a small amount of XOR operations, PUF functions, and hash functions with low computation cost. It is a truly lightweight and efficient three-party key agreement protocol. It realizes the privacy protection of one-time random pseudonym under the condition that the server only needs to store two pseudonyms. And it also provides a supplementary sub-protocol for pseudonym error conditions to achieve high robustness of the authentication system. Strict security formal proof shows the proposed protocol meets various security requirements. Compared with similar protocol, the proposed protocol reduces the total communication cost by 73% and the computing cost by 79%.

电动汽车(EV)正逐步取代传统燃油汽车,以减少碳排放,保护人类生存环境。电动汽车可以方便地集成到智能电网基础设施中,在车联网(V2G)生态系统中实现电力交换的快速需求响应,实现能源的优化配置。然而,如何同时解决 V2G 中通信的安全、隐私和效率问题是一个挑战。为了应对这一挑战,我们提出了一种基于物理不可克隆函数(PUF)的三方密钥协议。该协议只使用了少量的 XOR 运算、PUF 函数和哈希函数,计算成本很低。这是一个真正轻量级、高效的三方密钥协议。它在服务器只需存储两个假名的条件下,实现了一次性随机假名的隐私保护。同时,它还为假名错误条件提供了一个补充子协议,以实现认证系统的高鲁棒性。严格的安全性形式化证明表明,所提出的协议满足各种安全性要求。与同类协议相比,所提出的协议降低了 73% 的总通信成本和 79% 的计算成本。
{"title":"Lightweight three-party key agreement for V2G networks with physical unclonable function","authors":"Dingyi Shui ,&nbsp;Yong Xie ,&nbsp;Libing Wu ,&nbsp;Yining Liu ,&nbsp;Xing Su","doi":"10.1016/j.vehcom.2024.100747","DOIUrl":"10.1016/j.vehcom.2024.100747","url":null,"abstract":"<div><p>Electric vehicles (EV) are gradually replacing traditional fuel-based vehicles to reduce carbon emissions and protect the human living environment. EVs can be easily integrated into the smart grid infrastructure, and achieve the rapid demand response of power exchange in the vehicle-to-grid (V2G) ecosystem, and achieve optimal energy allocation. However, it is a challenge to simultaneously solve the security, privacy and efficiency of communication in V2G. To meet this challenge, we propose a three-party key agreement protocol based on Physical Unclonable Function (PUF). The proposed protocol just uses a small amount of XOR operations, PUF functions, and hash functions with low computation cost. It is a truly lightweight and efficient three-party key agreement protocol. It realizes the privacy protection of one-time random pseudonym under the condition that the server only needs to store two pseudonyms. And it also provides a supplementary sub-protocol for pseudonym error conditions to achieve high robustness of the authentication system. Strict security formal proof shows the proposed protocol meets various security requirements. Compared with similar protocol, the proposed protocol reduces the total communication cost by 73% and the computing cost by 79%.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140173234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crowdsourced vehicles and UAVs for last-mile delivery application using blockchain-hosted matching mechanism 利用区块链托管匹配机制为最后一英里配送应用提供众包车辆和无人机
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-15 DOI: 10.1016/j.vehcom.2024.100761
Maha Kadadha , Rabeb Mizouni , Shakti Singh , Hadi Otrok , Azzam Mourad

The crowdsourcing paradigm has been used for last-mile delivery applications to offer cost-efficient delivery through crowdsourced vehicles. The increasing demand from users for fast delivery led to the adoption of Unmanned Aerial Vehicles (UAVs) due to their speed and cost, for instance, in peak hours. However, existing frameworks do not offer a comprehensive solution that utilizes vehicles and UAVs for transparent, timely, and cost-efficient delivery. This paper proposes a novel supply chain management framework on a consortium blockchain with last-mile delivery through crowdsourced vehicles and UAVs. The blockchain-based framework aims to provide last-mile delivery for time-critical tasks in a transparent and cost-efficient manner. A blockchain-hosted Gale-Shapley Matching mechanism is designed for allocating delivery tasks to UAVs and vehicles that will perform them timely and cost-efficiently. The allocation mechanism is incorporated in the proposed management framework consisting of smart contracts that autonomously respond to members' interactions. In addition, the framework stores the supply chain process data transparently and immutably. The performed experiments explore the feasibility of the proposed solution showing the increase in task allocation percentage (at least 6%) and reward (at least 50%) while reducing the delivery time (at least 23%) compared to the considered benchmarks.

众包模式已被用于最后一英里配送应用,通过众包车辆提供具有成本效益的配送服务。由于用户对快速送货的需求日益增长,无人驾驶飞行器(UAV)因其速度快、成本低而被采用,例如在高峰时段。然而,现有的框架并没有提供一个全面的解决方案,利用车辆和无人机实现透明、及时和具有成本效益的交付。本文提出了一种基于联合体区块链的新型供应链管理框架,通过众包车辆和无人机实现最后一英里配送。基于区块链的框架旨在以透明、经济高效的方式为时间紧迫的任务提供最后一英里配送。设计了一种区块链托管的 Gale-Shapley 匹配机制,用于将交付任务分配给无人机和车辆,使其能够及时、经济高效地执行任务。该分配机制被纳入了拟议的管理框架,该框架由智能合约组成,可自主响应成员的互动。此外,该框架还以透明和不变的方式存储供应链流程数据。所进行的实验探索了拟议解决方案的可行性,结果表明,与所考虑的基准相比,任务分配百分比(至少 6%)和奖励(至少 50%)均有所提高,同时交付时间也缩短了(至少 23%)。
{"title":"Crowdsourced vehicles and UAVs for last-mile delivery application using blockchain-hosted matching mechanism","authors":"Maha Kadadha ,&nbsp;Rabeb Mizouni ,&nbsp;Shakti Singh ,&nbsp;Hadi Otrok ,&nbsp;Azzam Mourad","doi":"10.1016/j.vehcom.2024.100761","DOIUrl":"10.1016/j.vehcom.2024.100761","url":null,"abstract":"<div><p>The crowdsourcing paradigm has been used for last-mile delivery applications to offer cost-efficient delivery through crowdsourced vehicles. The increasing demand from users for fast delivery led to the adoption of Unmanned Aerial Vehicles (UAVs) due to their speed and cost, for instance, in peak hours. However, existing frameworks do not offer a comprehensive solution that utilizes vehicles and UAVs for transparent, timely, and cost-efficient delivery. This paper proposes a novel supply chain management framework on a consortium blockchain with last-mile delivery through crowdsourced vehicles and UAVs. The blockchain-based framework aims to provide last-mile delivery for time-critical tasks in a transparent and cost-efficient manner. A blockchain-hosted Gale-Shapley Matching mechanism is designed for allocating delivery tasks to UAVs and vehicles that will perform them timely and cost-efficiently. The allocation mechanism is incorporated in the proposed management framework consisting of smart contracts that autonomously respond to members' interactions. In addition, the framework stores the supply chain process data transparently and immutably. The performed experiments explore the feasibility of the proposed solution showing the increase in task allocation percentage (at least 6%) and reward (at least 50%) while reducing the delivery time (at least 23%) compared to the considered benchmarks.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140173337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1