首页 > 最新文献

Vehicular Communications最新文献

英文 中文
Perceptual data importance and freshness aware transmission in millimeter wave vehicular networks 毫米波车载网络中感知数据重要性和新鲜度感知传输
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-05-16 DOI: 10.1016/j.vehcom.2025.100939
Chenyuan He , Zhouyu Zhang , Yingfeng Cai , Hai Wang , Long Chen , Fenghua Huang
The extensive sharing of perceptual data between vehicles and between vehicles and roads has significantly enhanced the performance of intelligent transportation system (ITS). The current vehicular networks using sub-6 GHz struggle to meet the demands for high-rate, low-latency, and highly reliable communication. To address this issue, this paper proposes a perceptual data sharing strategy based on millimeter-wave (mmWave) communication technology. This strategy takes into account the characteristics of vehicular perceptual data, i.e., the importance and freshness of the data, and constructs a mixed-integer nonlinear sum-of-ratios optimization problem. To meet the stringent real-time decision-making requirements of vehicular networks, we leverage the transmission slot characteristics of the Time Division Multiple Access (TDMA) Medium Access Control (MAC) architecture to transform the nonlinear original problem into a series of approximate integer linear programming (ILP) problems. Then we employ maximum weight matching in graph theory to further reduce computational complexity, enabling the problem to be solved in polynomial time. Additionally, we have designed a brute-force algorithm to ensure the global optimum is achieved, thereby validating the performance of our proposed algorithm. Comparative simulation studies with the brute-force algorithm, the ILP solver, the edge coloring algorithm, our previously developed parameterization-based iterative algorithm (PIA), and the First-Come-First-Serve (FCFS) scheduling scheme verify the effectiveness of our proposed algorithm.
车辆之间以及车辆与道路之间的感知数据广泛共享,极大地提高了智能交通系统的性能。目前使用sub- 6ghz的车载网络难以满足高速率、低延迟和高可靠的通信需求。为了解决这一问题,本文提出了一种基于毫米波通信技术的感知数据共享策略。该策略考虑了车辆感知数据的重要性和新鲜度等特点,构建了一个混合整数非线性比例和优化问题。为了满足车载网络严格的实时决策要求,我们利用时分多址(TDMA)介质访问控制(MAC)架构的传输时隙特性,将非线性原始问题转化为一系列近似整数线性规划(ILP)问题。然后利用图论中的最大权值匹配进一步降低计算复杂度,使问题在多项式时间内得到解决。此外,我们还设计了一个蛮力算法来确保实现全局最优,从而验证了我们提出的算法的性能。通过与暴力破解算法、ILP求解器、边缘着色算法、我们之前开发的基于参数化的迭代算法(PIA)和先到先服务(FCFS)调度方案的对比仿真研究,验证了我们提出的算法的有效性。
{"title":"Perceptual data importance and freshness aware transmission in millimeter wave vehicular networks","authors":"Chenyuan He ,&nbsp;Zhouyu Zhang ,&nbsp;Yingfeng Cai ,&nbsp;Hai Wang ,&nbsp;Long Chen ,&nbsp;Fenghua Huang","doi":"10.1016/j.vehcom.2025.100939","DOIUrl":"10.1016/j.vehcom.2025.100939","url":null,"abstract":"<div><div>The extensive sharing of perceptual data between vehicles and between vehicles and roads has significantly enhanced the performance of intelligent transportation system (ITS). The current vehicular networks using sub-6 GHz struggle to meet the demands for high-rate, low-latency, and highly reliable communication. To address this issue, this paper proposes a perceptual data sharing strategy based on millimeter-wave (mmWave) communication technology. This strategy takes into account the characteristics of vehicular perceptual data, i.e., the importance and freshness of the data, and constructs a mixed-integer nonlinear sum-of-ratios optimization problem. To meet the stringent real-time decision-making requirements of vehicular networks, we leverage the transmission slot characteristics of the Time Division Multiple Access (TDMA) Medium Access Control (MAC) architecture to transform the nonlinear original problem into a series of approximate integer linear programming (ILP) problems. Then we employ maximum weight matching in graph theory to further reduce computational complexity, enabling the problem to be solved in polynomial time. Additionally, we have designed a brute-force algorithm to ensure the global optimum is achieved, thereby validating the performance of our proposed algorithm. Comparative simulation studies with the brute-force algorithm, the ILP solver, the edge coloring algorithm, our previously developed parameterization-based iterative algorithm (PIA), and the First-Come-First-Serve (FCFS) scheduling scheme verify the effectiveness of our proposed algorithm.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100939"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geometric Optimisation of Unmanned Aerial Vehicle Trajectories in Uncertain Environments 不确定环境下无人机轨迹几何优化
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-05-12 DOI: 10.1016/j.vehcom.2025.100938
J Akshya , M Sundarrajan , S. Amutha , Rajesh Kumar Dhanaraj , Adil O. Khadidos , Alaa O. Khadidos , Shitharth Selvarajan
The problem of efficient trajectory optimisation for Unmanned Aerial Vehicles (UAVS) in dynamic and constrained environments is one where energy efficiency, spatial coverage, and path smoothness need to be balanced. The existing methods, namely RRT*, A*, and Dijkstra, are popular but generally heuristic and do not provide globally optimal solutions. They face significant limitations while dealing with complex geometries, dynamic obstacles, and multi-objective requirements. These challenges call for a mathematically sound framework that seamlessly integrates convex analysis and computational geometry to provide an optimal trajectory planning framework. This research work introduces a convex optimisation framework for UAV trajectory planning which unifies multiple objectives, like minimising energy consumption, maximising spatial coverage, and ensuring the smoothness of the path, into a single convex objective function. More importantly, it indicates that obstacle dynamics and uncertain environmental conditions are handled better by it, so it is relatively easier for safe and efficient navigation. Proven to converge faster and with higher precision than RRT*, A*, and Dijkstra, the approach proposed here enjoys intrinsic convex properties, which ensure global optimality. Qualitative measurements show the efficiency of the proposed framework. The result is energy efficiency of 90%, with 92% coverage, 98% constraint satisfaction, and 95% path smoothness, which is 15-25% better on all metrics than traditional approaches can offer. By bridging between theory in convex optimisation and practice for solving multi-objective problems in a dynamic setting, this study provides a more robust solution for UAV trajectory planning.
在动态和受限环境下,无人机(UAVS)的有效轨迹优化问题是一个需要平衡能源效率、空间覆盖和路径平滑的问题。现有的方法,即RRT*, A*和Dijkstra,是流行的,但通常是启发式的,不能提供全局最优解。在处理复杂的几何形状、动态障碍物和多目标要求时,它们面临着显著的局限性。这些挑战需要一个数学上合理的框架,无缝集成凸分析和计算几何,以提供最佳的轨迹规划框架。本研究提出了一种用于无人机轨迹规划的凸优化框架,该框架将能量消耗最小化、空间覆盖最大化、路径平滑度最大化等多个目标统一为单个凸目标函数。更重要的是,它能更好地处理障碍物动态和不确定的环境条件,相对容易实现安全高效的导航。与RRT*, A*和Dijkstra相比,本文提出的方法收敛速度更快,精度更高,具有内在的凸性,确保了全局最优性。定性测量表明了该框架的有效性。结果是90%的能源效率,92%的覆盖率,98%的约束满意度和95%的路径平滑度,在所有指标上都比传统方法好15-25%。通过将求解动态环境下多目标问题的凸优化理论与实践相结合,本研究为无人机的轨迹规划提供了更为鲁棒的解决方案。
{"title":"Geometric Optimisation of Unmanned Aerial Vehicle Trajectories in Uncertain Environments","authors":"J Akshya ,&nbsp;M Sundarrajan ,&nbsp;S. Amutha ,&nbsp;Rajesh Kumar Dhanaraj ,&nbsp;Adil O. Khadidos ,&nbsp;Alaa O. Khadidos ,&nbsp;Shitharth Selvarajan","doi":"10.1016/j.vehcom.2025.100938","DOIUrl":"10.1016/j.vehcom.2025.100938","url":null,"abstract":"<div><div>The problem of efficient trajectory optimisation for Unmanned Aerial Vehicles (UAVS) in dynamic and constrained environments is one where energy efficiency, spatial coverage, and path smoothness need to be balanced. The existing methods, namely RRT*, A*, and Dijkstra, are popular but generally heuristic and do not provide globally optimal solutions. They face significant limitations while dealing with complex geometries, dynamic obstacles, and multi-objective requirements. These challenges call for a mathematically sound framework that seamlessly integrates convex analysis and computational geometry to provide an optimal trajectory planning framework. This research work introduces a convex optimisation framework for UAV trajectory planning which unifies multiple objectives, like minimising energy consumption, maximising spatial coverage, and ensuring the smoothness of the path, into a single convex objective function. More importantly, it indicates that obstacle dynamics and uncertain environmental conditions are handled better by it, so it is relatively easier for safe and efficient navigation. Proven to converge faster and with higher precision than RRT*, A*, and Dijkstra, the approach proposed here enjoys intrinsic convex properties, which ensure global optimality. Qualitative measurements show the efficiency of the proposed framework. The result is energy efficiency of 90%, with 92% coverage, 98% constraint satisfaction, and 95% path smoothness, which is 15-25% better on all metrics than traditional approaches can offer. By bridging between theory in convex optimisation and practice for solving multi-objective problems in a dynamic setting, this study provides a more robust solution for UAV trajectory planning.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100938"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144068776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rigid communication topologies: Impact on stability, safety, energy consumption, passenger comfort, and robustness of vehicular platoons 刚性通信拓扑:对车辆队列稳定性、安全性、能耗、乘客舒适度和鲁棒性的影响
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-05-12 DOI: 10.1016/j.vehcom.2025.100936
Amir Zakerimanesh , Tony Zhijun Qiu , Mahdi Tavakoli
This paper investigates the impact of rigid communication topologies (RCTs) on the performance of vehicular platoons, aiming to identify beneficial features in RCTs that enhance vehicles behavior. Four performance metrics are introduced, focusing on safety, energy consumption, passenger comfort, and robustness of vehicular platoons. The safety metric is based on momentary distances between neighboring vehicles, their relative velocities, and relative accelerations. Thus, to have access to these relative values, the coupled dynamics between pairs of neighboring vehicles are formulated, considering initial conditions (position, velocity, acceleration), the velocity/acceleration trajectory of the leader vehicle, deployed RCT, and the parity/disparity between vehicles. By decoupling the dynamics using a mapping matrix structured on deployed RCT, the features of the vehicles, and control gains, precise formulations for distance errors, relative velocities, and relative accelerations between all neighboring vehicles, over the travel time, are obtained. Comparing performance metric results across RCTs highlights that downstream information transmission—from vehicles ahead, particularly the leader vehicle, to vehicles behind—significantly enhances platoon stability, safety, energy consumption, and passenger comfort metrics. Conversely, receiving state information from vehicles behind degrades metrics, compromising safety, increasing energy consumption, and reducing passenger comfort. These findings underscore that forward-looking, leader-centric communications between vehicles markedly enhance platoon efficiency and safety.
本文研究了刚性通信拓扑(rct)对车辆队列性能的影响,旨在识别rct中增强车辆行为的有益特征。介绍了四个性能指标,重点是安全性、能耗、乘客舒适度和车辆队列的鲁棒性。安全度量是基于相邻车辆之间的瞬时距离、它们的相对速度和相对加速度。因此,为了获得这些相对值,考虑初始条件(位置、速度、加速度)、领先车辆的速度/加速度轨迹、部署RCT以及车辆之间的宇称/视差,制定了相邻车辆对之间的耦合动力学。通过使用基于部署RCT的映射矩阵解耦动力学、车辆特征和控制增益,获得了所有相邻车辆在行驶时间内的距离误差、相对速度和相对加速度的精确公式。对比rct的性能指标结果可以发现,下游信息传输——从前车,特别是领先车辆,到后车——显著提高了车队的稳定性、安全性、能耗和乘客舒适度指标。相反,从后面的车辆接收状态信息会降低指标,影响安全性,增加能源消耗,降低乘客舒适度。这些发现强调,车辆之间前瞻性的、以领导者为中心的通信显著提高了排的效率和安全性。
{"title":"Rigid communication topologies: Impact on stability, safety, energy consumption, passenger comfort, and robustness of vehicular platoons","authors":"Amir Zakerimanesh ,&nbsp;Tony Zhijun Qiu ,&nbsp;Mahdi Tavakoli","doi":"10.1016/j.vehcom.2025.100936","DOIUrl":"10.1016/j.vehcom.2025.100936","url":null,"abstract":"<div><div>This paper investigates the impact of rigid communication topologies (RCTs) on the performance of vehicular platoons, aiming to identify beneficial features in RCTs that enhance vehicles behavior. Four performance metrics are introduced, focusing on safety, energy consumption, passenger comfort, and robustness of vehicular platoons. The safety metric is based on momentary distances between neighboring vehicles, their relative velocities, and relative accelerations. Thus, to have access to these relative values, the coupled dynamics between pairs of neighboring vehicles are formulated, considering initial conditions (position, velocity, acceleration), the velocity/acceleration trajectory of the leader vehicle, deployed RCT, and the parity/disparity between vehicles. By decoupling the dynamics using a mapping matrix structured on deployed RCT, the features of the vehicles, and control gains, precise formulations for distance errors, relative velocities, and relative accelerations between all neighboring vehicles, over the travel time, are obtained. Comparing performance metric results across RCTs highlights that downstream information transmission—from vehicles ahead, particularly the leader vehicle, to vehicles behind—significantly enhances platoon stability, safety, energy consumption, and passenger comfort metrics. Conversely, receiving state information from vehicles behind degrades metrics, compromising safety, increasing energy consumption, and reducing passenger comfort. These findings underscore that forward-looking, leader-centric communications between vehicles markedly enhance platoon efficiency and safety.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100936"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144068777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beamforming design and trajectory optimization for integrated sensing and communication supported by multiple UAVs based on DRL 基于DRL的多无人机集成传感与通信波束形成设计与轨迹优化
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-05-05 DOI: 10.1016/j.vehcom.2025.100932
Zekun Lu, Linbo Zhai, Wenjie Zhou, Kai Xue, Xingxia Gao
With the rapid development of Unmanned aerial vehicle (UAV) technology and the high flexibility and maneuverability of UAV itself, UAV will play a very important role in the development of integrated sensing and communication (ISAC) in the future. In this paper, the communication and sensing system supported by multiple UAVs is studied. And we propose a new ISAC balance mode (BISAC). In this mode, the sensing time is set reasonably according to the number of potential targets (PTs) and sensing requirements while the UAV is communicating with ground equipment (GEs), so as to reduce the interaction between communication and sensing and improve the utilization of resources. We also introduce the Age of Information (AoI) to measure the freshness of GEs' data information in order to reduce the delay. Therefore, our goal is to minimize the Average AoI of GEs by jointly optimizing UAV trajectory, user association, target sensing selection and communication and sensing beamforming while maintaining communication quality and sensing requirements. In order to obtain long-term AoI performance and effectively solve non-convex problems with continuous and discrete variables, we propose a deep reinforcement learning (DRL) algorithm based on a combination of deep deterministic policy gradient (DDPG) and Dueling Double Deep Q networks (D3QN). Continuous and discrete variables in the system are processed by invoking a DDPG and D3QN. Specifically, we have improved DDPG's actor-critic structure by incorporating D3QN, which utilizes the actor portion of DDPG to search for optimal communication and sensing beams. At the same time, the critic part of DDPG is combined with D3QN to select the optimal flight direction of UAV. Simulation results show that the proposed DDPG-D3QN algorithm has better stability, faster convergence rate, and higher reward than existing DRL-based methods.
随着无人机(UAV)技术的快速发展和无人机本身的高灵活性和机动性,无人机将在未来集成传感与通信(ISAC)的发展中发挥非常重要的作用。本文研究了多架无人机支持的通信与传感系统。提出了一种新的ISAC平衡模式(BISAC)。该模式在无人机与地面设备通信时,根据潜在目标数量和传感需求合理设置传感时间,减少通信与传感之间的交互,提高资源利用率。为了减少延迟,我们还引入了信息时代(Age of Information, AoI)来度量ge数据信息的新鲜度。因此,我们的目标是在保持通信质量和传感要求的前提下,通过联合优化无人机轨迹、用户关联、目标传感选择以及通信和传感波束形成,使GEs的平均AoI最小化。为了获得长期的AoI性能并有效解决连续变量和离散变量的非凸问题,我们提出了一种基于深度确定性策略梯度(DDPG)和Dueling Double deep Q网络(D3QN)相结合的深度强化学习(DRL)算法。通过调用DDPG和D3QN来处理系统中的连续变量和离散变量。具体来说,我们通过加入D3QN改进了DDPG的actor-critic结构,D3QN利用DDPG的actor部分来搜索最佳的通信和传感波束。同时,将DDPG的关键部分与D3QN相结合,选择无人机的最优飞行方向。仿真结果表明,与现有基于drl的算法相比,本文提出的DDPG-D3QN算法具有更好的稳定性、更快的收敛速度和更高的奖励。
{"title":"Beamforming design and trajectory optimization for integrated sensing and communication supported by multiple UAVs based on DRL","authors":"Zekun Lu,&nbsp;Linbo Zhai,&nbsp;Wenjie Zhou,&nbsp;Kai Xue,&nbsp;Xingxia Gao","doi":"10.1016/j.vehcom.2025.100932","DOIUrl":"10.1016/j.vehcom.2025.100932","url":null,"abstract":"<div><div>With the rapid development of Unmanned aerial vehicle (UAV) technology and the high flexibility and maneuverability of UAV itself, UAV will play a very important role in the development of integrated sensing and communication (ISAC) in the future. In this paper, the communication and sensing system supported by multiple UAVs is studied. And we propose a new ISAC balance mode (BISAC). In this mode, the sensing time is set reasonably according to the number of potential targets (PTs) and sensing requirements while the UAV is communicating with ground equipment (GEs), so as to reduce the interaction between communication and sensing and improve the utilization of resources. We also introduce the Age of Information (AoI) to measure the freshness of GEs' data information in order to reduce the delay. Therefore, our goal is to minimize the Average AoI of GEs by jointly optimizing UAV trajectory, user association, target sensing selection and communication and sensing beamforming while maintaining communication quality and sensing requirements. In order to obtain long-term AoI performance and effectively solve non-convex problems with continuous and discrete variables, we propose a deep reinforcement learning (DRL) algorithm based on a combination of deep deterministic policy gradient (DDPG) and Dueling Double Deep Q networks (D3QN). Continuous and discrete variables in the system are processed by invoking a DDPG and D3QN. Specifically, we have improved DDPG's actor-critic structure by incorporating D3QN, which utilizes the actor portion of DDPG to search for optimal communication and sensing beams. At the same time, the critic part of DDPG is combined with D3QN to select the optimal flight direction of UAV. Simulation results show that the proposed DDPG-D3QN algorithm has better stability, faster convergence rate, and higher reward than existing DRL-based methods.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100932"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143911620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P3AKA: A PUF based privacy preserving authentication and key agreement framework for secure communication in vehicle to grid network P3AKA:一个基于PUF的车辆与电网安全通信的隐私保护认证和密钥协议框架
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-04-24 DOI: 10.1016/j.vehcom.2025.100925
Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel
A traditional power grid integrates a Smart Grid (SG) technology to reduce greenhouse gases and increase the efficiency of energy transition. The Vehicle to Grid (V2G) is raised and combined with the SG network to fulfill these objectives of the SG technology. The two-way power flow in the V2G technology allows an Electrical Vehicle (EV) to charge its battery and discharge surplus energy back to the power grid through the Charging Stations (CSs). During the energy transfer, an EV shares identity, location, and charging preferences with the CS through an insecure channel. It raises significant security and privacy vulnerabilities for the V2G network. In addition, the EV and CS are situated in an exposed location that may increase the risk of physical attack. Hence, there is a need to preserve the security and privacy of the EV and CS in the V2G network. Moreover, a lightweight security solution is necessary for the resource constrained CS and EV in the V2G network. Several authentication and key agreement protocols were suggested in the literature to overcome the security challenges in the V2G network. However, the existing approaches fail to maintain the session key secrecy and preserve from the physical attack. Thus, we propose a Physically Unclonable Function (PUF) based Privacy Preserving Authentication and Key Agreement (P3AKA) framework for the V2G network using lightweight cryptographic operations. PUF protects the CS and EV from the physical attack and other lightweight cryptographic functions safeguard the network from other security attacks. Security analysis of the proposed P3AKA framework represents that it protects the V2G network from potential security threats such as impersonation, replay, Man-in-The-Middle (MiTM), physical, and machine learning attacks. Further, it ensures user anonymity and non-traceability of the EV user. The formal security verification uses the ROR model and Scyther tool to verify the proposed P3AKA framework. It illustrates that the P3AKA framework successfully provides bidirectional authentication and session key secrecy in the V2G network. In addition, the performance analysis illustrates that the proposed P3AKA framework improves security with competitive overheads compared to existing relevant schemes.
传统电网集成了智能电网(SG)技术,以减少温室气体排放,提高能源转换效率。车辆到电网(V2G)被提出并与SG网络相结合,以实现SG技术的这些目标。V2G技术中的双向功率流允许电动汽车(EV)为电池充电,并通过充电站(CSs)将多余的能量释放回电网。在能量传输过程中,电动汽车通过不安全的通道与CS共享身份、位置和充电偏好。它为V2G网络带来了重大的安全和隐私漏洞。此外,EV和CS位于暴露的位置,可能会增加物理攻击的风险。因此,有必要在V2G网络中保护EV和CS的安全和隐私。此外,对于V2G网络中资源受限的CS和EV,需要轻量级的安全解决方案。为了克服V2G网络中的安全挑战,文献中提出了几种身份验证和密钥协商协议。但是,现有的方法不能保证会话密钥的保密性和防止物理攻击。因此,我们提出了一个基于物理不可克隆函数(PUF)的V2G网络隐私保护认证和密钥协议(P3AKA)框架,使用轻量级加密操作。PUF保护CS和EV免受物理攻击,其他轻量级加密功能保护网络免受其他安全攻击。对提议的P3AKA框架的安全分析表明,它可以保护V2G网络免受潜在的安全威胁,如冒充、重播、中间人(MiTM)、物理攻击和机器学习攻击。此外,它还保证了用户的匿名性和EV用户的不可追溯性。正式的安全性验证使用ROR模型和Scyther工具来验证提议的P3AKA框架。说明P3AKA框架在V2G网络中成功地提供了双向认证和会话密钥保密。此外,性能分析表明,与现有的相关方案相比,所提出的P3AKA框架在具有竞争性开销的情况下提高了安全性。
{"title":"P3AKA: A PUF based privacy preserving authentication and key agreement framework for secure communication in vehicle to grid network","authors":"Prarthana J. Mehta,&nbsp;Balu L. Parne,&nbsp;Sankita J. Patel","doi":"10.1016/j.vehcom.2025.100925","DOIUrl":"10.1016/j.vehcom.2025.100925","url":null,"abstract":"<div><div>A traditional power grid integrates a Smart Grid (SG) technology to reduce greenhouse gases and increase the efficiency of energy transition. The Vehicle to Grid (V2G) is raised and combined with the SG network to fulfill these objectives of the SG technology. The two-way power flow in the V2G technology allows an Electrical Vehicle (EV) to charge its battery and discharge surplus energy back to the power grid through the Charging Stations (CSs). During the energy transfer, an EV shares identity, location, and charging preferences with the CS through an insecure channel. It raises significant security and privacy vulnerabilities for the V2G network. In addition, the EV and CS are situated in an exposed location that may increase the risk of physical attack. Hence, there is a need to preserve the security and privacy of the EV and CS in the V2G network. Moreover, a lightweight security solution is necessary for the resource constrained CS and EV in the V2G network. Several authentication and key agreement protocols were suggested in the literature to overcome the security challenges in the V2G network. However, the existing approaches fail to maintain the session key secrecy and preserve from the physical attack. Thus, we propose a Physically Unclonable Function (PUF) based Privacy Preserving Authentication and Key Agreement (P3AKA) framework for the V2G network using lightweight cryptographic operations. PUF protects the CS and EV from the physical attack and other lightweight cryptographic functions safeguard the network from other security attacks. Security analysis of the proposed P3AKA framework represents that it protects the V2G network from potential security threats such as impersonation, replay, Man-in-The-Middle (MiTM), physical, and machine learning attacks. Further, it ensures user anonymity and non-traceability of the EV user. The formal security verification uses the ROR model and Scyther tool to verify the proposed P3AKA framework. It illustrates that the P3AKA framework successfully provides bidirectional authentication and session key secrecy in the V2G network. In addition, the performance analysis illustrates that the proposed P3AKA framework improves security with competitive overheads compared to existing relevant schemes.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100925"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143883170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging reputation for enhanced decision accuracy in vehicle-to-vehicle communications under limited infrastructure 在有限的基础设施下,利用车辆对车辆通信中提高决策准确性的声誉
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-04-24 DOI: 10.1016/j.vehcom.2025.100927
Dimah Almani , Tim Muller , Steven Furnell
Vehicle-to-Vehicle (V2V) networking enhances transportation safety and efficiency by enabling vehicles to share alerts. However, malicious vehicles may inject false messages, leading to disputes. While certificates help ensure security, Certificate Revocation List (CRLs) may be outdated in low-connectivity areas, making it hard to verify conflicting reports. Reputation systems, using a pre-signature scheme, can aid decision-making even in infrastructure-limited environments.
In this paper, we provide the mechanisms to use reputation in areas with low/no connectivity, whilst allowing for pseudonymous certificates to verify message authenticity without breaking privacy. The approach is integrated into the existing Security Credential Management System (SCMS), a framework for managing digital certificates for secure V2V communication.
Our simulations evaluate the security performance of our proposed mechanism, with offline available reputation, against plain SCMS certificate management that rely solely on CRL to block malicious vehicles. The results are achieved by integrating vehicular simulation tools like SUMO, OMNeT++, and Veins, to evaluate the V2V communications in each system under two conditions (Accident and No accident) ensuring a comprehensive system evaluation.
The proposed scheme improves accuracy in decision-making with conflicting information by 36% in accidents and 44.4% in No-Accident situations in a rural environment.
车对车(V2V)网络通过使车辆共享警报来提高运输安全性和效率。然而,恶意车辆可能会注入虚假信息,导致纠纷。虽然证书有助于确保安全性,但证书撤销列表(crl)在低连接区域可能已经过时,因此难以验证冲突的报告。使用预签名方案的信誉系统即使在基础设施有限的环境中也可以帮助决策。在本文中,我们提供了在低连接/无连接区域使用信誉的机制,同时允许假名证书在不破坏隐私的情况下验证消息真实性。该方法集成到现有的安全凭证管理系统(SCMS)中,SCMS是一个管理数字证书的框架,用于安全的V2V通信。我们的模拟评估了我们提出的机制的安全性能,与仅依赖CRL来阻止恶意车辆的普通SCMS证书管理相比,具有离线可用声誉。结果通过集成SUMO、omnet++和vein等车载仿真工具,在两种情况下(事故和无事故)评估每个系统的V2V通信,以确保全面的系统评估。在农村环境中,该方案将信息冲突情况下的决策准确率提高了36%,在无事故情况下提高了44.4%。
{"title":"Leveraging reputation for enhanced decision accuracy in vehicle-to-vehicle communications under limited infrastructure","authors":"Dimah Almani ,&nbsp;Tim Muller ,&nbsp;Steven Furnell","doi":"10.1016/j.vehcom.2025.100927","DOIUrl":"10.1016/j.vehcom.2025.100927","url":null,"abstract":"<div><div>Vehicle-to-Vehicle (V2V) networking enhances transportation safety and efficiency by enabling vehicles to share alerts. However, malicious vehicles may inject false messages, leading to disputes. While certificates help ensure security, Certificate Revocation List (CRLs) may be outdated in low-connectivity areas, making it hard to verify conflicting reports. Reputation systems, using a pre-signature scheme, can aid decision-making even in infrastructure-limited environments.</div><div>In this paper, we provide the mechanisms to use reputation in areas with low/no connectivity, whilst allowing for pseudonymous certificates to verify message authenticity without breaking privacy. The approach is integrated into the existing Security Credential Management System (SCMS), a framework for managing digital certificates for secure V2V communication.</div><div>Our simulations evaluate the security performance of our proposed mechanism, with offline available reputation, against plain SCMS certificate management that rely solely on CRL to block malicious vehicles. The results are achieved by integrating vehicular simulation tools like SUMO, OMNeT++, and Veins, to evaluate the V2V communications in each system under two conditions (Accident and No accident) ensuring a comprehensive system evaluation.</div><div>The proposed scheme improves accuracy in decision-making with conflicting information by 36% in accidents and 44.4% in No-Accident situations in a rural environment.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100927"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143870049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive UAV-assisted secure and reliable communications based on robust joint trajectory and power control optimization 基于鲁棒关节轨迹和功率控制优化的认知无人机辅助安全可靠通信
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-05-26 DOI: 10.1016/j.vehcom.2025.100941
Can Wang, Junhong Zhang, Helin Yang
The cognitive unmanned aerial vehicle (UAV) communication system has emerged as a pivotal technology in addressing the scarcity of spectral resources for UAV communications, but the jamming and eavesdropping attacks are severe due to the high-quality air-to-ground communication links. Consequently, this paper introduces a UAV-enabled cooperative jammer to disrupt the eavesdropping activities of active eavesdroppers by emitting artificial noise. Our objective is to jointly optimize the three-dimensional UAV trajectory and transmit power to maximize the secrecy communication rate under quality of service (QoS) requirement. To tackle the non-convex problem, the block coordinate descent (BCD) and successive convex approximation (SCA) methods are utilized to transform it into an approximate convex problem, and then we design an alternative optimization iterative algorithm to achieve suboptimal but efficient solution. Moreover, we extend the developed algorithm into an imperfect channel state information (CSI) scenario to maximize the worst-case secrecy rate by jointly optimizing the robust UAV's trajectory and transmit power, where the location uncertainties of ground primary, secondary, and eavesdropping devices are considered. Simulation results demonstrate that the proposed joint optimization algorithm significantly enhances system secrecy performance under different real-world settings compared to existing state-of-the-art algorithms.
认知型无人机通信系统已成为解决无人机通信频谱资源短缺的关键技术,但由于高质量的空对地通信链路,干扰和窃听攻击严重。因此,本文引入了一种无人机协同干扰机,通过发射人工噪声来干扰主动窃听者的窃听活动。我们的目标是在满足服务质量(QoS)要求的情况下,共同优化三维无人机的弹道和发射功率,使保密通信速率最大化。针对非凸问题,利用分块坐标下降法(BCD)和逐次凸逼近法(SCA)将其转化为近似凸问题,然后设计了一种替代优化迭代算法,以获得次优但有效的解。此外,我们将所开发的算法扩展到不完全信道状态信息(CSI)场景中,通过联合优化鲁棒无人机的轨迹和发射功率来最大化最坏情况下的保密率,其中考虑了地面主、次和窃听设备的位置不确定性。仿真结果表明,与现有的先进算法相比,所提出的联合优化算法显著提高了系统在不同现实环境下的保密性能。
{"title":"Cognitive UAV-assisted secure and reliable communications based on robust joint trajectory and power control optimization","authors":"Can Wang,&nbsp;Junhong Zhang,&nbsp;Helin Yang","doi":"10.1016/j.vehcom.2025.100941","DOIUrl":"10.1016/j.vehcom.2025.100941","url":null,"abstract":"<div><div>The cognitive unmanned aerial vehicle (UAV) communication system has emerged as a pivotal technology in addressing the scarcity of spectral resources for UAV communications, but the jamming and eavesdropping attacks are severe due to the high-quality air-to-ground communication links. Consequently, this paper introduces a UAV-enabled cooperative jammer to disrupt the eavesdropping activities of active eavesdroppers by emitting artificial noise. Our objective is to jointly optimize the three-dimensional UAV trajectory and transmit power to maximize the secrecy communication rate under quality of service (QoS) requirement. To tackle the non-convex problem, the block coordinate descent (BCD) and successive convex approximation (SCA) methods are utilized to transform it into an approximate convex problem, and then we design an alternative optimization iterative algorithm to achieve suboptimal but efficient solution. Moreover, we extend the developed algorithm into an imperfect channel state information (CSI) scenario to maximize the worst-case secrecy rate by jointly optimizing the robust UAV's trajectory and transmit power, where the location uncertainties of ground primary, secondary, and eavesdropping devices are considered. Simulation results demonstrate that the proposed joint optimization algorithm significantly enhances system secrecy performance under different real-world settings compared to existing state-of-the-art algorithms.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100941"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144170397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-supported communication: Current and prospective solutions 无人机支持的通信:当前和未来的解决方案
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-04-18 DOI: 10.1016/j.vehcom.2025.100923
Moayad Aloqaily , Ouns Bouachir , Ismaeel Al Ridhawi
The advancement in wireless communication has significantly resulted in unprecedented new applications and services. This, coupled with Next-Generation Networking (NGN) and the recent advances in cellular communication and networking, predominantly the Fifth-Generation (5G) network, has resulted in the rise of new technological solutions. Unmanned Aerial Vehicles (UAVs) is one such solution that has evolved from its traditional usage in military and civilian applications, towards new and innovative solutions that provide support to wireless communication and networking. With advances in their processing and communication capabilities, UAVs are now supporting both core and edge networks to deliver services to end-users in a reliable and fast manner. The synergy and collective collaboration between UAVs and continuously evolving and progressing technologies such as Artificial Intelligence (AI) and blockchain are reshaping the landscape of wireless communication and networking, enabling more robust, secure and adaptable systems that transcend traditional limitations. In this article, we explore various collaborative solutions that leverage UAV communication and networks that not only bolster communication between mobile nodes and the core network but also reinforce the edge computing infrastructure. This reinforcement enables scalable data storage and intelligent processing to elevate end-user services and applications. Additionally, we address the obstacles, concerns, and future pathways concerning UAV-supported NGNs.
无线通信的进步显著地导致了前所未有的新应用和服务。再加上下一代网络(NGN)和蜂窝通信和网络的最新进展,主要是第五代(5G)网络,导致了新技术解决方案的兴起。无人机(uav)就是这样一种解决方案,它已经从传统的军事和民用应用发展到新的创新解决方案,为无线通信和网络提供支持。随着其处理和通信能力的进步,无人机现在支持核心和边缘网络,以可靠和快速的方式向最终用户提供服务。无人机与人工智能(AI)和区块链等不断发展和进步的技术之间的协同和集体协作正在重塑无线通信和网络的格局,使超越传统限制的更强大、更安全、适应性更强的系统成为可能。在本文中,我们探讨了利用无人机通信和网络的各种协作解决方案,这些解决方案不仅可以加强移动节点与核心网络之间的通信,还可以加强边缘计算基础设施。这种增强支持可扩展的数据存储和智能处理,以提升最终用户服务和应用程序。此外,我们还讨论了无人机支持的ngn的障碍、问题和未来途径。
{"title":"UAV-supported communication: Current and prospective solutions","authors":"Moayad Aloqaily ,&nbsp;Ouns Bouachir ,&nbsp;Ismaeel Al Ridhawi","doi":"10.1016/j.vehcom.2025.100923","DOIUrl":"10.1016/j.vehcom.2025.100923","url":null,"abstract":"<div><div>The advancement in wireless communication has significantly resulted in unprecedented new applications and services. This, coupled with Next-Generation Networking (NGN) and the recent advances in cellular communication and networking, predominantly the Fifth-Generation (5G) network, has resulted in the rise of new technological solutions. Unmanned Aerial Vehicles (UAVs) is one such solution that has evolved from its traditional usage in military and civilian applications, towards new and innovative solutions that provide support to wireless communication and networking. With advances in their processing and communication capabilities, UAVs are now supporting both core and edge networks to deliver services to end-users in a reliable and fast manner. The synergy and collective collaboration between UAVs and continuously evolving and progressing technologies such as Artificial Intelligence (AI) and blockchain are reshaping the landscape of wireless communication and networking, enabling more robust, secure and adaptable systems that transcend traditional limitations. In this article, we explore various collaborative solutions that leverage UAV communication and networks that not only bolster communication between mobile nodes and the core network but also reinforce the edge computing infrastructure. This reinforcement enables scalable data storage and intelligent processing to elevate end-user services and applications. Additionally, we address the obstacles, concerns, and future pathways concerning UAV-supported NGNs.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100923"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143941713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DAME-IoV: Dynamic Adaptive Multi-Edge authentication protocol with post-quantum security for Internet of Vehicles 基于后量子安全的车联网动态自适应多边缘认证协议
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-05-07 DOI: 10.1016/j.vehcom.2025.100933
Iftikhar Rasheed , Hala Mostafa
The Internet of Vehicles (IoV) faces increasing security challenges with the advent of quantum computing, which threatens traditional cryptographic protocols while demanding efficient authentication mechanisms for large-scale vehicle networks. This paper presents DAME-IoV, a Dynamic Adaptive Multi-Edge authentication protocol that provides post-quantum security while leveraging edge computing capabilities for enhanced performance. Our framework introduces three key innovations: (1) a lightweight post-quantum authentication scheme optimized for vehicular networks, featuring lattice-based cryptography with dynamic parameter adjustment; (2) an adaptive security mechanism that dynamically adjusts protection levels based on real-time threat assessment and resource availability; and (3) an efficient edge-assisted processing architecture that enables scalable authentication through intelligent caching and batch verification. We provide formal security proofs demonstrating the protocol's resistance to quantum attacks while maintaining conditional privacy preservation. Extensive experimental evaluation on a prototype implementation shows that DAME-IoV achieves 45% lower computational overhead, 35% reduced memory footprint, and 40% better scaling efficiency compared to existing solutions. Performance analysis under various network conditions demonstrates that our framework maintains authentication latency below 50 ms while supporting over 1000 concurrent vehicle requests. The proposed solution successfully addresses the critical challenges of post-quantum security, scalability, and efficiency in IoV environments, providing a practical foundation for securing next-generation vehicular networks.
随着量子计算的出现,车联网(IoV)面临着越来越大的安全挑战,这对传统的加密协议构成了威胁,同时也需要大规模车辆网络的高效认证机制。本文介绍了DAME-IoV,这是一种动态自适应多边缘认证协议,在利用边缘计算能力增强性能的同时提供后量子安全。我们的框架引入了三个关键创新:(1)针对车载网络优化的轻量级后量子认证方案,具有基于格的动态参数调整加密;(2)基于实时威胁评估和资源可用性动态调整防护等级的自适应安全机制;(3)高效的边缘辅助处理架构,通过智能缓存和批量验证实现可扩展的身份验证。我们提供了正式的安全证明,证明了该协议对量子攻击的抵抗力,同时保持了有条件的隐私保护。对原型实现的广泛实验评估表明,与现有解决方案相比,DAME-IoV的计算开销降低了45%,内存占用减少了35%,扩展效率提高了40%。在各种网络条件下的性能分析表明,我们的框架在支持超过1000个并发车辆请求的同时,将身份验证延迟保持在50毫秒以下。该解决方案成功解决了车联网环境中后量子安全、可扩展性和效率方面的关键挑战,为确保下一代汽车网络的安全提供了实践基础。
{"title":"DAME-IoV: Dynamic Adaptive Multi-Edge authentication protocol with post-quantum security for Internet of Vehicles","authors":"Iftikhar Rasheed ,&nbsp;Hala Mostafa","doi":"10.1016/j.vehcom.2025.100933","DOIUrl":"10.1016/j.vehcom.2025.100933","url":null,"abstract":"<div><div>The Internet of Vehicles (IoV) faces increasing security challenges with the advent of quantum computing, which threatens traditional cryptographic protocols while demanding efficient authentication mechanisms for large-scale vehicle networks. This paper presents DAME-IoV, a Dynamic Adaptive Multi-Edge authentication protocol that provides post-quantum security while leveraging edge computing capabilities for enhanced performance. Our framework introduces three key innovations: (1) a lightweight post-quantum authentication scheme optimized for vehicular networks, featuring lattice-based cryptography with dynamic parameter adjustment; (2) an adaptive security mechanism that dynamically adjusts protection levels based on real-time threat assessment and resource availability; and (3) an efficient edge-assisted processing architecture that enables scalable authentication through intelligent caching and batch verification. We provide formal security proofs demonstrating the protocol's resistance to quantum attacks while maintaining conditional privacy preservation. Extensive experimental evaluation on a prototype implementation shows that DAME-IoV achieves 45% lower computational overhead, 35% reduced memory footprint, and 40% better scaling efficiency compared to existing solutions. Performance analysis under various network conditions demonstrates that our framework maintains authentication latency below 50 ms while supporting over 1000 concurrent vehicle requests. The proposed solution successfully addresses the critical challenges of post-quantum security, scalability, and efficiency in IoV environments, providing a practical foundation for securing next-generation vehicular networks.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100933"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143924921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal coordinated platoon lane change in highways with mixed traffic 混合交通高速公路最优协调排变道
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 Epub Date: 2025-04-18 DOI: 10.1016/j.vehcom.2025.100924
Fernando V. Monteiro , Ketan Savla , Petros Ioannou
In the field of connected autonomous vehicles, platoons - where vehicles closely follow one another - have shown promising results in enhancing safety, traffic flow, and fuel efficiency. This study addresses the unique challenges of platoon lane changes, where multiple platoon vehicles have lane change intention and must remain together after the maneuver is completed. We focus on highway environments because many studies have highlighted the advantages of platooning in these settings. We leverage an offline controller synthesis approach to deal with the combinatorial problem of choosing a strategy. Building on concepts from symbolic optimal control, we represent the problem using a weighted directed acyclic graph where nodes are quantized state vectors, edge weights are costs to transition between nodes, and the shortest path solutions represent the optimal platoon lane change strategies. We use a Cached Branch-and-Bound Depth-First Search algorithm to solve the offline control problem due to its anytime capability and low memory requirements. This approach provides real-time decision making and guarantees maneuver success while minimizing completion time or control effort. Previous works either required control of all vehicles on the road, making them inadequate for mixed-traffic scenarios, or fixed the order in which platoon vehicles change lanes, disregarding the current state of surrounding vehicles and maneuver costs. Our framework can describe all previously proposed methods, relies only on cooperation between platoon vehicles, allows for optimization, and produces solutions whose costs decrease as the allowed computational time increases. We employ the VISSIM traffic simulator to compare our approach to the state of the art. The experiments show that we obtain an increase of 13% in the maneuver completion rate along with a decrease of around 15% to 20% in the maneuver completion time and distance traveled to complete the lane change at the cost of an average increase of 2% to 17% in the longitudinal control effort. This trade-off is a direct consequence of having the platoon occupy suitable lane-changing spaces as soon as possible, and this myopic behavior is necessary when there is no information about the future movements of human-driven vehicles. Moreover, the experiments indicate that our approach yields a sharp decrease in cost in relatively short computational times. These results emphasize the potential for deployment of the proposed method in mixed-traffic highway scenarios.
在互联自动驾驶汽车领域,车辆紧密跟随的车队在提高安全性、交通流量和燃油效率方面取得了可喜的成果。该研究解决了排变道的独特挑战,其中多个排车辆具有变道意图,并且在机动完成后必须保持在一起。我们之所以关注高速公路环境,是因为许多研究都强调了在这些环境中队列行驶的优势。我们利用离线控制器综合方法来处理选择策略的组合问题。基于符号最优控制的概念,我们使用加权有向无环图来表示问题,其中节点是量化的状态向量,边缘权重是节点之间转换的代价,最短路径解表示最优排变道策略。我们使用缓存分支绑定深度优先搜索算法来解决离线控制问题,因为它具有随时随地的能力和低内存需求。这种方法提供了实时决策,保证了操作的成功,同时最大限度地减少了完井时间或控制工作量。以前的工作要么需要控制道路上的所有车辆,这使得它们不适合混合交通场景,要么固定队列车辆变道的顺序,而不考虑周围车辆的当前状态和机动成本。我们的框架可以描述所有以前提出的方法,只依赖于车队之间的合作,允许优化,并产生成本随着允许的计算时间的增加而降低的解决方案。我们使用VISSIM流量模拟器将我们的方法与最先进的方法进行比较。实验表明,机动完成率提高了13%,机动完成时间和完成变道所需距离减少了约15%至20%,而纵向控制努力平均增加了2%至17%。这种权衡是让车队尽快占据合适的变道空间的直接结果,当没有关于人类驾驶车辆未来运动的信息时,这种短视行为是必要的。此外,实验表明,我们的方法在相对较短的计算时间内产生了成本的急剧下降。这些结果强调了在混合交通高速公路场景中部署所提出方法的潜力。
{"title":"Optimal coordinated platoon lane change in highways with mixed traffic","authors":"Fernando V. Monteiro ,&nbsp;Ketan Savla ,&nbsp;Petros Ioannou","doi":"10.1016/j.vehcom.2025.100924","DOIUrl":"10.1016/j.vehcom.2025.100924","url":null,"abstract":"<div><div>In the field of connected autonomous vehicles, platoons - where vehicles closely follow one another - have shown promising results in enhancing safety, traffic flow, and fuel efficiency. This study addresses the unique challenges of platoon lane changes, where multiple platoon vehicles have lane change intention and must remain together after the maneuver is completed. We focus on highway environments because many studies have highlighted the advantages of platooning in these settings. We leverage an offline controller synthesis approach to deal with the combinatorial problem of choosing a strategy. Building on concepts from symbolic optimal control, we represent the problem using a weighted directed acyclic graph where nodes are quantized state vectors, edge weights are costs to transition between nodes, and the shortest path solutions represent the optimal platoon lane change strategies. We use a Cached Branch-and-Bound Depth-First Search algorithm to solve the offline control problem due to its anytime capability and low memory requirements. This approach provides real-time decision making and guarantees maneuver success while minimizing completion time or control effort. Previous works either required control of all vehicles on the road, making them inadequate for mixed-traffic scenarios, or fixed the order in which platoon vehicles change lanes, disregarding the current state of surrounding vehicles and maneuver costs. Our framework can describe all previously proposed methods, relies only on cooperation between platoon vehicles, allows for optimization, and produces solutions whose costs decrease as the allowed computational time increases. We employ the VISSIM traffic simulator to compare our approach to the state of the art. The experiments show that we obtain an increase of 13% in the maneuver completion rate along with a decrease of around 15% to 20% in the maneuver completion time and distance traveled to complete the lane change at the cost of an average increase of 2% to 17% in the longitudinal control effort. This trade-off is a direct consequence of having the platoon occupy suitable lane-changing spaces as soon as possible, and this myopic behavior is necessary when there is no information about the future movements of human-driven vehicles. Moreover, the experiments indicate that our approach yields a sharp decrease in cost in relatively short computational times. These results emphasize the potential for deployment of the proposed method in mixed-traffic highway scenarios.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100924"},"PeriodicalIF":5.8,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143870048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1