首页 > 最新文献

Vehicular Communications最新文献

英文 中文
Blockchain-based self-sovereign identity solution for aerial base station integrated networks 基于区块链的空中基站集成网络自主权身份解决方案
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-01 DOI: 10.1016/j.vehcom.2024.100759
Engin Zeydan , Josep Mangues-Bafalluy , Suayb Arslan , Yekta Turk

Identity and access management frameworks address user access rights and data governance for organizations, vendors and users. In response to the problems associated with centralized authorities (e.g. single point of failure, limited scalability, lack of user control), new identity management models have emerged, such as Self-Sovereign Identity (SSI), which relies on verifiable data registers to validate Decentralized Identifier (DIDs) and can be achieved in many different ways, e.g. through Distributed Ledger Technology (DLT), distributed databases or other decentralized systems. The main goal of SSI is to enable users to take control of managing their data shared with different services. In this paper, we examine a possible application of the SSI concept to aerial base station (ABS)- integrated networks. The paper presents the effective use of DID implementation to provide a secure and decentralized way to create, associate and verify credentials and identities of ABSs, ensuring secure communication between Ground Base stations (GBSs) and other nodes in the network in a multi-operator scenario. In the numerical results, the average values of various metrics (namely, the average credential presentation time, the average credential offer time, the average DIDcomm connection creation time, the average DIDcomm signing time, and the average DIDcomm revoke credential time) related to credential operations in a DID management system are given for three different number of requests (50 K, 75 K, and 100 K). We have also provided the values of the different status codes that occurred in 100 K operations in the same DID management system. Towards the end of the paper, a comparison is made between SSI-based and Non-fungible token (NFT)-based blockchain solutions, also discussing the challenges and future directions of SSI solutions in the context of ABS-integrated networks.

身份和访问管理框架解决了组织、供应商和用户的用户访问权限和数据管理问题。为了应对与集中式机构相关的问题(如单点故障、可扩展性有限、缺乏用户控制),出现了新的身份管理模式,如自主身份(SSI),它依赖于可验证的数据登记册来验证分散式标识符(DID),可以通过多种不同方式实现,如通过分布式账本技术(DLT)、分布式数据库或其他分散式系统。SSI 的主要目标是让用户能够控制管理他们与不同服务共享的数据。在本文中,我们探讨了将 SSI 概念应用于空中基站集成网络的可能性。本文介绍了如何有效利用 DID 实现提供安全和分散的方式来创建、关联和验证 ABS 的凭证和身份,确保地面基站(GBS)和网络中其他节点之间在多运营商场景下的安全通信。在数值结果中,给出了三种不同请求数(50 K、75 K 和 100 K)下 DID 管理系统中与凭证操作相关的各种指标(即平均凭证出示时间、平均凭证提供时间、平均 DIDcomm 连接创建时间、平均 DIDcomm 签名时间和平均 DIDcomm 撤销凭证时间)的平均值。我们还提供了同一 DID 管理系统 100 K 次操作中出现的不同状态代码的值。在本文的最后,我们对基于 SSI 的区块链解决方案和基于不可篡改代币(NFT)的区块链解决方案进行了比较,还讨论了在 ABS 集成网络背景下 SSI 解决方案面临的挑战和未来发展方向。
{"title":"Blockchain-based self-sovereign identity solution for aerial base station integrated networks","authors":"Engin Zeydan ,&nbsp;Josep Mangues-Bafalluy ,&nbsp;Suayb Arslan ,&nbsp;Yekta Turk","doi":"10.1016/j.vehcom.2024.100759","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100759","url":null,"abstract":"<div><p>Identity and access management frameworks address user access rights and data governance for organizations, vendors and users. In response to the problems associated with centralized authorities (e.g. single point of failure, limited scalability, lack of user control), new identity management models have emerged, such as Self-Sovereign Identity (SSI), which relies on verifiable data registers to validate Decentralized Identifier (DIDs) and can be achieved in many different ways, e.g. through Distributed Ledger Technology (DLT), distributed databases or other decentralized systems. The main goal of SSI is to enable users to take control of managing their data shared with different services. In this paper, we examine a possible application of the SSI concept to aerial base station (ABS)- integrated networks. The paper presents the effective use of DID implementation to provide a secure and decentralized way to create, associate and verify credentials and identities of ABSs, ensuring secure communication between Ground Base stations (GBSs) and other nodes in the network in a multi-operator scenario. In the numerical results, the average values of various metrics (namely, the average credential presentation time, the average credential offer time, the average DIDcomm connection creation time, the average DIDcomm signing time, and the average DIDcomm revoke credential time) related to credential operations in a DID management system are given for three different number of requests (50 K, 75 K, and 100 K). We have also provided the values of the different status codes that occurred in 100 K operations in the same DID management system. Towards the end of the paper, a comparison is made between SSI-based and Non-fungible token (NFT)-based blockchain solutions, also discussing the challenges and future directions of SSI solutions in the context of ABS-integrated networks.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stable matching with evolving preference for adaptive handover in cellular-connected UAV networks 蜂窝连接无人机网络中的稳定匹配与演进偏好自适应切换
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-29 DOI: 10.1016/j.vehcom.2024.100748
Wenlu Wang , Bowen Wang , Yanjing Sun

Unmanned Aerial Vehicles (UAVs) can effectively and reliably complete aerial tasks in various fields. However, the high-speed mobility of UAVs and the 6G ultra-dense heterogeneous network architecture in future will lead to frequent handover of UAVs during aerial tasks in cellular networks, increasing the potential service interruption rate. Therefore, there is an urgent requirement to address the lack of service adaptability in the overall time-space dimension. To achieve the seamless handover in highly dynamic and stochastic scenarios, we firstly transform the handover problem into a stable matching model. We then extend the stable matching of single time slot to the overall time-space dimension, and transform the dynamically changing time-space information into the preference relations evolution. By flexibly adapting the evolution of the preference lists to current network topology, we propose a Dynamic Stable Matching based Adaptive Handover (DSMAH) algorithm to find stable matching efficiently in a dynamic environment. Simulation results show that the proposed algorithm can achieve a better trade-off between communication quality, handover frequency, and convergence speed and significantly improves the stability of the cellular-connected network as compared to benchmark schemes. The proposed scheme not only effectively addresses the challenges posed by frequent handovers and ping-pong effect, but also shows its notable advantages in dynamic environments.

无人机(UAV)可以有效、可靠地完成各领域的空中任务。然而,无人机的高速机动性和未来 6G 超密集异构网络架构将导致无人机在执行航拍任务时频繁切换蜂窝网络,增加潜在的业务中断率。因此,解决整体时空维度上服务适应性不足的问题迫在眉睫。为了实现高动态和随机场景下的无缝切换,我们首先将切换问题转化为稳定匹配模型。然后,我们将单个时隙的稳定匹配扩展到整体时空维度,并将动态变化的时空信息转化为偏好关系演化。通过根据当前网络拓扑灵活调整偏好列表的演变,我们提出了一种基于动态稳定匹配的自适应移交(DSMAH)算法,以在动态环境中高效地找到稳定匹配。仿真结果表明,与基准方案相比,所提出的算法能在通信质量、切换频率和收敛速度之间实现更好的权衡,并显著提高蜂窝连接网络的稳定性。所提出的方案不仅有效地解决了频繁切换和乒乓效应带来的挑战,而且在动态环境中也显示出了显著的优势。
{"title":"Stable matching with evolving preference for adaptive handover in cellular-connected UAV networks","authors":"Wenlu Wang ,&nbsp;Bowen Wang ,&nbsp;Yanjing Sun","doi":"10.1016/j.vehcom.2024.100748","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100748","url":null,"abstract":"<div><p>Unmanned Aerial Vehicles (UAVs) can effectively and reliably complete aerial tasks in various fields. However, the high-speed mobility of UAVs and the 6G ultra-dense heterogeneous network architecture in future will lead to frequent handover of UAVs during aerial tasks in cellular networks, increasing the potential service interruption rate. Therefore, there is an urgent requirement to address the lack of service adaptability in the overall time-space dimension. To achieve the seamless handover in highly dynamic and stochastic scenarios, we firstly transform the handover problem into a stable matching model. We then extend the stable matching of single time slot to the overall time-space dimension, and transform the dynamically changing time-space information into the preference relations evolution. By flexibly adapting the evolution of the preference lists to current network topology, we propose a Dynamic Stable Matching based Adaptive Handover (DSMAH) algorithm to find stable matching efficiently in a dynamic environment. Simulation results show that the proposed algorithm can achieve a better trade-off between communication quality, handover frequency, and convergence speed and significantly improves the stability of the cellular-connected network as compared to benchmark schemes. The proposed scheme not only effectively addresses the challenges posed by frequent handovers and ping-pong effect, but also shows its notable advantages in dynamic environments.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster stability-driven optimization for enhanced routing in heterogeneous vehicular networks 集群稳定性驱动优化,增强异构车载网络中的路由选择
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-28 DOI: 10.1016/j.vehcom.2024.100745
Ali Jalooli , Alireza Marefat

The new era of the Internet of Things is promoting the evolution of self-driving vehicles into connected and autonomous vehicles (CAVs). The deployment of CAVs in smart cities is highly dependent on the performance of their underlying networks known as vehicular networks. Designing an effective clustering approach is of great importance in such dynamic networks as it can significantly improve the reliability and scalability of the routing protocols. In this paper, we consider a heterogeneous vehicular network architecture that supports vehicle-to-vehicle and vehicle-to-infrastructure communications based on IEEE 802.11p and cellular networks (LTE/5G) with direct communications, namely cellular vehicle-to-everything (C-V2X) technologies. We introduce a novel clustering scheme for real-time routing based on the proposed network architecture. We formulate the problem of optimal clustering for connected and autonomous vehicles (OCCAV) and show that the problem is NP-hard. We then develop a clusters' stability maximization algorithm (CSM), which utilizes the stability degree of vehicles over a prediction horizon to efficiently solve the optimization problem in real-time. The algorithm is used within a rolling horizon framework for continuously solving the problem, making the resulting clusters adaptive to future traffic dynamics. We propose a hybrid routing protocol based on our clustering scheme, aiming to improve the packet delivery ratio and reduce the average delivery delay. For evaluation purposes, we use extensive realistic simulations based on mobility scenarios validated using real vehicular trajectories. The results demonstrate that our clustering scheme improves the alternative algorithms in terms of the average cluster head duration, cluster head change rate, cluster member duration, and overall stability by 61%, 62%, 44%, and 52%, respectively. CSM also outperforms clustering overhead by 54%. Compared to the other cluster-based routing, our scheme also achieves a higher packet delivery ratio by up to 30%, and a lower average delay by up to 52%. To provide an in-depth analysis of the optimality of our scheme and its alternatives, we also use the Gurobi optimizer to find an optimal solution to the OCCAV problem. The results suggest that our scheme can achieve near-optimal cluster stability.

新的物联网时代正在推动自动驾驶汽车向互联和自动驾驶汽车(CAV)演进。智能城市中 CAV 的部署高度依赖于其底层网络(即车载网络)的性能。在这种动态网络中,设计一种有效的聚类方法非常重要,因为它可以显著提高路由协议的可靠性和可扩展性。在本文中,我们考虑了一种异构车载网络架构,该架构支持基于 IEEE 802.11p 和蜂窝网络(LTE/5G)的车对车和车对基础设施通信,以及直接通信,即蜂窝车对万物(C-V2X)技术。我们基于所提出的网络架构,为实时路由选择引入了一种新颖的聚类方案。我们提出了联网和自动驾驶车辆(OCCAV)的最优聚类问题,并证明该问题具有 NP 难度。然后,我们开发了一种集群稳定性最大化算法(CSM),该算法利用车辆在预测范围内的稳定性程度来有效地实时解决优化问题。该算法在滚动视界框架内连续求解问题,使生成的集群适应未来的交通动态。我们提出了一种基于聚类方案的混合路由协议,旨在提高数据包传送率并减少平均传送延迟。为了进行评估,我们使用了大量基于移动场景的真实模拟,并使用真实车辆轨迹进行了验证。结果表明,我们的聚类方案在平均簇头持续时间、簇头更换率、簇成员持续时间和整体稳定性方面分别比其他算法提高了 61%、62%、44% 和 52%。CSM 的集群开销也比其他算法高出 54%。与其他基于集群的路由方案相比,我们的方案还实现了更高的数据包传送率,最高达 30%,平均延迟降低了 52%。为了深入分析我们的方案及其替代方案的最优性,我们还使用 Gurobi 优化器找到了 OCCAV 问题的最优解。结果表明,我们的方案可以实现接近最优的集群稳定性。
{"title":"Cluster stability-driven optimization for enhanced routing in heterogeneous vehicular networks","authors":"Ali Jalooli ,&nbsp;Alireza Marefat","doi":"10.1016/j.vehcom.2024.100745","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100745","url":null,"abstract":"<div><p>The new era of the Internet of Things is promoting the evolution of self-driving vehicles into connected and autonomous vehicles (CAVs). The deployment of CAVs in smart cities is highly dependent on the performance of their underlying networks known as vehicular networks. Designing an effective clustering approach is of great importance in such dynamic networks as it can significantly improve the reliability and scalability of the routing protocols. In this paper, we consider a heterogeneous vehicular network architecture that supports vehicle-to-vehicle and vehicle-to-infrastructure communications based on IEEE 802.11p and cellular networks (LTE/5G) with direct communications, namely cellular vehicle-to-everything (C-V2X) technologies. We introduce a novel clustering scheme for real-time routing based on the proposed network architecture. We formulate the problem of optimal clustering for connected and autonomous vehicles (OCCAV) and show that the problem is NP-hard. We then develop a clusters' stability maximization algorithm (CSM), which utilizes the stability degree of vehicles over a prediction horizon to efficiently solve the optimization problem in real-time. The algorithm is used within a rolling horizon framework for continuously solving the problem, making the resulting clusters adaptive to future traffic dynamics. We propose a hybrid routing protocol based on our clustering scheme, aiming to improve the packet delivery ratio and reduce the average delivery delay. For evaluation purposes, we use extensive realistic simulations based on mobility scenarios validated using real vehicular trajectories. The results demonstrate that our clustering scheme improves the alternative algorithms in terms of the average cluster head duration, cluster head change rate, cluster member duration, and overall stability by 61%, 62%, 44%, and 52%, respectively. CSM also outperforms clustering overhead by 54%. Compared to the other cluster-based routing, our scheme also achieves a higher packet delivery ratio by up to 30%, and a lower average delay by up to 52%. To provide an in-depth analysis of the optimality of our scheme and its alternatives, we also use the Gurobi optimizer to find an optimal solution to the OCCAV problem. The results suggest that our scheme can achieve near-optimal cluster stability.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139998865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed and collaborative system to improve traffic conditions using fuzzy logic and V2X communications 利用模糊逻辑和 V2X 通信改善交通状况的分布式协作系统
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-27 DOI: 10.1016/j.vehcom.2024.100746
José Antonio Sánchez, David Melendi, Roberto García, Xabiel G Pañeda, Víctor Corcoba, Dan García

Nowadays, the increase in the number of vehicles on the roads has brought about several problems such as an increase in traffic congestion and, consequently, in polluting emissions. These problems are especially severe in urban environments. It is crucial to perform a sustainable urban mobility plan to improve the traffic and therefore, reduce the negative impacts caused by traffic jams. To this end, this paper presents a smart mobility plan that employs a collaborative driving strategy. Each vehicle tries to infer traffic conditions using its own status and the information shared by other peers. Using a fuzzy logic approach, vehicles perform decisions in accordance with the traffic levels inferred in real time. The designed mobility plan has been tested through a simulation environment and considering two types of urban areas in a typical European city (a peripheral area and a more congested city centre). If we compare the performance of traffic with and without the system designed, with our approach average speeds increase by up to 11.20 % and CO2 emissions are reduced by up to 12.27 %. Thus, our results show that the mobility plan has helped to enhance the ability of cars to be able to solve problems caused by traffic congestion and traffic jams.

如今,道路上车辆数量的增加带来了一些问题,如交通拥堵加剧,污染排放也随之增加。这些问题在城市环境中尤为严重。因此,必须实施可持续的城市交通计划,改善交通状况,从而减少交通拥堵造成的负面影响。为此,本文提出了一种采用协同驾驶策略的智能交通计划。每辆车都试图利用自身状态和其他同行共享的信息来推断交通状况。利用模糊逻辑方法,车辆根据实时推断的交通水平做出决策。我们通过模拟环境对所设计的交通计划进行了测试,并考虑到了一个典型欧洲城市的两种城区类型(外围地区和较为拥堵的市中心)。如果我们比较使用和不使用所设计系统的交通性能,我们的方法可使平均车速提高 11.20%,二氧化碳排放量减少 12.27%。因此,我们的结果表明,交通规划有助于提高汽车解决交通拥堵问题的能力。
{"title":"Distributed and collaborative system to improve traffic conditions using fuzzy logic and V2X communications","authors":"José Antonio Sánchez,&nbsp;David Melendi,&nbsp;Roberto García,&nbsp;Xabiel G Pañeda,&nbsp;Víctor Corcoba,&nbsp;Dan García","doi":"10.1016/j.vehcom.2024.100746","DOIUrl":"10.1016/j.vehcom.2024.100746","url":null,"abstract":"<div><p>Nowadays, the increase in the number of vehicles on the roads has brought about several problems such as an increase in traffic congestion and, consequently, in polluting emissions. These problems are especially severe in urban environments. It is crucial to perform a sustainable urban mobility plan to improve the traffic and therefore, reduce the negative impacts caused by traffic jams. To this end, this paper presents a smart mobility plan that employs a collaborative driving strategy. Each vehicle tries to infer traffic conditions using its own status and the information shared by other peers. Using a fuzzy logic approach, vehicles perform decisions in accordance with the traffic levels inferred in real time. The designed mobility plan has been tested through a simulation environment and considering two types of urban areas in a typical European city (a peripheral area and a more congested city centre). If we compare the performance of traffic with and without the system designed, with our approach average speeds increase by up to 11.20 % and CO<sub>2</sub> emissions are reduced by up to 12.27 %. Thus, our results show that the mobility plan has helped to enhance the ability of cars to be able to solve problems caused by traffic congestion and traffic jams.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000214/pdfft?md5=0ad507bad4f079727d5ff5da5b28e826&pid=1-s2.0-S2214209624000214-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139994420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic 利用模糊逻辑检测和预防自动驾驶汽车拒绝服务攻击的新型框架
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-07 DOI: 10.1016/j.vehcom.2024.100741
Memoona Sadaf , Zafar Iqbal , Zahid Anwar , Umara Noor , Mohammad Imran , Thippa Reddy Gadekallu

Every year, millions of people lose their lives due to road accidents, and countless others suffer from severe injuries. Moreover, these accidents cause economic losses worldwide. Primary reasons for these accidents include over speeding, doziness, distracted driving, drugs, and psychoactive substances. Many efforts are made to automate vehicles to save losses. Autonomous vehicles are expected to revolutionize transportation by reducing the likelihood of accidents resulting from human mistakes, increasing efficiency, and reducing congestion. Like any other computer-based system, autonomous vehicles can be susceptible to attacks that could compromise their safety, security, and privacy. Denial-of-Service (DoS) attack is a cyberattack that aims to disturb a network's typical or standard functioning. A successful DoS attack could cause the autonomous vehicle to malfunction or stop functioning altogether, leading to accidents or other safety risks. To mitigate the risk of DoS attacks, protective measures that have been proposed include encryption, firewalls, and intrusion detection systems. The previous approaches to detect and prevent Denial-of-Service (DoS) attacks in autonomous vehicles are associated with imprecise and inaccurate results and high computational costs. The main goal of this research is to present a novel approach that utilizes fuzzy logic to effectively detect and mitigate Denial of Service (DoS) attacks. The proposed approach has achieved 99.4% detection and prevention rate by attaining optimal levels of security with testing error upto 0.6%. Furthermore, comprehensive execution and validation of security measures have been conducted by adopting the attack surface and rules representation. The presented approach delivers more precise and accurate results while maintaining a lower computational cost than existing methodologies. In future the proposed scheme can be used for detection of other attacks in autonomous vehicles by incorporating relevant input variables and their respective ranges.

每年都有数百万人因交通事故丧生,还有无数人受到严重伤害。此外,这些事故还在全球范围内造成经济损失。造成这些事故的主要原因包括超速、打瞌睡、分心驾驶、毒品和精神活性物质。为了挽回损失,人们正在努力实现车辆自动化。自动驾驶汽车有望通过降低人为失误导致事故的可能性、提高效率和减少拥堵来彻底改变交通。与任何其他基于计算机的系统一样,自动驾驶汽车也可能受到攻击,从而危及其安全、安保和隐私。拒绝服务(DoS)攻击是一种网络攻击,旨在干扰网络的典型或标准功能。成功的 DoS 攻击会导致自动驾驶汽车出现故障或完全停止运行,从而引发事故或其他安全风险。为了降低 DoS 攻击的风险,已经提出的保护措施包括加密、防火墙和入侵检测系统。以往检测和预防自动驾驶汽车中的拒绝服务(DoS)攻击的方法都存在结果不精确、不准确和计算成本高等问题。本研究的主要目标是提出一种利用模糊逻辑有效检测和缓解拒绝服务(DoS)攻击的新方法。所提出的方法实现了 99.4% 的检测率和预防率,达到了最佳安全水平,检测误差小于 0.6%。此外,通过采用攻击面和规则表示法,对安全措施进行了全面的执行和验证。与现有方法相比,所提出的方法在保持较低计算成本的同时,还能提供更精确、更准确的结果。未来,通过纳入相关输入变量及其各自的范围,所提出的方案还可用于检测自动驾驶汽车中的其他攻击。
{"title":"A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic","authors":"Memoona Sadaf ,&nbsp;Zafar Iqbal ,&nbsp;Zahid Anwar ,&nbsp;Umara Noor ,&nbsp;Mohammad Imran ,&nbsp;Thippa Reddy Gadekallu","doi":"10.1016/j.vehcom.2024.100741","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100741","url":null,"abstract":"<div><p>Every year, millions of people lose their lives due to road accidents, and countless others suffer from severe injuries. Moreover, these accidents cause economic losses worldwide. Primary reasons for these accidents include over speeding, doziness, distracted driving, drugs, and psychoactive substances. Many efforts are made to automate vehicles to save losses. Autonomous vehicles are expected to revolutionize transportation by reducing the likelihood of accidents resulting from human mistakes, increasing efficiency, and reducing congestion. Like any other computer-based system, autonomous vehicles can be susceptible to attacks that could compromise their safety, security, and privacy. Denial-of-Service (DoS) attack is a cyberattack that aims to disturb a network's typical or standard functioning. A successful DoS attack could cause the autonomous vehicle to malfunction or stop functioning altogether, leading to accidents or other safety risks. To mitigate the risk of DoS attacks, protective measures that have been proposed include encryption, firewalls, and intrusion detection systems. The previous approaches to detect and prevent Denial-of-Service (DoS) attacks in autonomous vehicles are associated with imprecise and inaccurate results and high computational costs. The main goal of this research is to present a novel approach that utilizes fuzzy logic to effectively detect and mitigate Denial of Service (DoS) attacks. The proposed approach has achieved 99.4% detection and prevention rate by attaining optimal levels of security with testing error upto 0.6%. Furthermore, comprehensive execution and validation of security measures have been conducted by adopting the attack surface and rules representation. The presented approach delivers more precise and accurate results while maintaining a lower computational cost than existing methodologies. In future the proposed scheme can be used for detection of other attacks in autonomous vehicles by incorporating relevant input variables and their respective ranges.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139738681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing VANET performance in cluster head selection using Intelligent Fuzzy Bald Eagle optimization 利用智能模糊秃鹰优化技术最大化 VANET 的簇头选择性能
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-01 DOI: 10.1016/j.vehcom.2023.100660
Maria Christina Blessy A , Brindha S

Vehicular Ad-hoc Network (VANET) is a type of wireless network that allows communication among vehicles and roadside units to develop advanced intelligent transportation systems. The success of VANETs depends on the stability of wireless communication, among vehicles, which is challenging to achieve due to high vehicle speed, rapidly changing topology, and unstable communication links. Moreover, the instability of the network caused by the mobile nature of vehicles in VANET reduces the performance of the network. Clustering in VANETs is a crucial technique that organizes the network and forms the basis of the routing protocol. Clustering algorithms are designed for VANETs to work efficiently and require several phases that must be integrated into the process before a clustering decision can be made. Therefore, this paper presents a novel Intelligent Fuzzy Bald Eagle (IFBE) optimization to enhance the performance of VANETs by optimizing the cluster head selection (CHS) process. The experimental results prove that the IFBE approach outperforms other existing mechanisms in terms of energy consumption, end-to-end delay, and packet delivery ratio. The proposed mechanism utilizes an intelligent fuzzy system to optimize the CHS process. The fuzzy system uses a set of rules and membership functions to evaluate the candidate nodes' suitability for being cluster heads. The Bald Eagle Search (BES) optimization meta-heuristic algorithm is used to find the optimal values for the fuzzy system's membership functions. The proposed mechanism was evaluated using the MATLAB simulator. Finally, the experimental result proved that the IFBE approach achieved minimum delay and energy consumption of 13.58 ms, and 15.5 J, and higher clustering efficiency and packet delivery rate of 94.15% and 97.65% respectively, which show that it performs better than other existing approaches.

车载无线网络(Vehicular Ad-hoc Network,VANET)是一种无线网络,它允许车辆和路边装置之间进行通信,以开发先进的智能交通系统。VANET 的成功取决于车辆间无线通信的稳定性,但由于车辆速度快、拓扑结构变化快、通信链路不稳定,要实现这一点非常困难。此外,VANET 中车辆的移动性导致的网络不稳定性也降低了网络的性能。VANET 中的聚类是组织网络的关键技术,也是路由协议的基础。聚类算法是专为 VANET 高效运行而设计的,在做出聚类决策之前,必须将几个阶段整合到整个过程中。因此,本文提出了一种新颖的智能模糊白头鹰(IFBE)优化方法,通过优化簇头选择(CHS)过程来提高 VANET 的性能。实验结果证明,IFBE 方法在能耗、端到端延迟和数据包交付率方面优于其他现有机制。所提出的机制利用智能模糊系统优化集群选择过程。模糊系统使用一组规则和成员函数来评估候选节点是否适合担任簇头。秃鹰搜索(BES)优化元启发式算法用于找到模糊系统成员函数的最佳值。使用 MATLAB 仿真器对所提出的机制进行了评估。最后,实验结果表明,IFBE 方法实现了 13.58 ms 和 15.5 J 的最低延迟和能耗,以及 94.15% 和 97.65% 的较高聚类效率和数据包交付率,这表明它的性能优于其他现有方法。
{"title":"Maximizing VANET performance in cluster head selection using Intelligent Fuzzy Bald Eagle optimization","authors":"Maria Christina Blessy A ,&nbsp;Brindha S","doi":"10.1016/j.vehcom.2023.100660","DOIUrl":"10.1016/j.vehcom.2023.100660","url":null,"abstract":"<div><p><span><span><span>Vehicular Ad-hoc Network (VANET) is a type of wireless network that allows communication among vehicles and roadside units to develop advanced </span>intelligent transportation systems<span>. The success of VANETs depends on the stability of wireless communication, among vehicles, which is challenging to achieve due to high vehicle speed, rapidly changing topology, and unstable communication links. Moreover, the instability of the network caused by the mobile nature of vehicles in VANET reduces the performance of the network. Clustering in VANETs is a crucial technique that organizes the network and forms the basis of the routing protocol. </span></span>Clustering algorithms<span><span> are designed for VANETs to work efficiently and require several phases that must be integrated into the process before a clustering decision can be made. Therefore, this paper presents a novel Intelligent Fuzzy Bald Eagle (IFBE) optimization to enhance the performance of VANETs by optimizing the cluster head selection (CHS) process. The experimental results prove that the IFBE approach outperforms other existing mechanisms in terms of energy consumption, end-to-end delay, and </span>packet delivery ratio. The proposed mechanism utilizes an intelligent fuzzy system to optimize the CHS process. The fuzzy system uses a set of rules and membership functions to evaluate the candidate nodes' suitability for being cluster heads. The Bald Eagle Search (BES) optimization meta-heuristic algorithm is used to find the optimal values for the fuzzy system's membership functions. The proposed mechanism was evaluated using the MATLAB simulator. Finally, the experimental result proved that the IFBE approach achieved minimum delay and energy consumption of 13.58 ms, and 15.5 J, and </span></span>higher clustering<span> efficiency and packet delivery rate of 94.15% and 97.65% respectively, which show that it performs better than other existing approaches.</span></p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135389454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs 可减轻 VANET 中 TA 依赖性的高效隐私保护认证方案
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-01 DOI: 10.1016/j.vehcom.2024.100727
Huadong Su , Shi Dong , Ning Wang , Ting Zhang

With the constant development of wireless communication technologies, the Vehicular Ad-hoc Networks (VANETs) will become an inevitable paradigm for intelligent transportation systems. Privacy-preserving and authentication security has been a core concern in VANETs, and pseudonym-based and group signature-based privacy-preserving authentication schemes have been widely proposed. However, most research schemes rely excessively on the Trusted Authority, and vehicle request and authentication information is almost transparent in front of TAs, while they cannot guarantee the security of vehicle request information after it is intercepted. To address these issues, this paper proposes a lightweight privacy-preserving authentication scheme that mitigates TA dependency, aiming to achieve mutual privacy protection and authentication between vehicles and TAs in VANETs by improving the oblivious transfer algorithm. The security analysis proves that this scheme has good privacy protection and attack resistance, and in addition, the performance simulation and evaluation show that this scheme spends lower computation and communication overheads while ensuring lower authentication delay and packet loss rate, which is a better overall performance compared with other schemes.

随着无线通信技术的不断发展,车载 Ad-hoc 网络(VANET)将成为智能交通系统的必然模式。隐私保护和身份验证安全一直是 VANET 的核心问题,基于假名和群签名的隐私保护身份验证方案已被广泛提出。然而,大多数研究方案过度依赖于可信机构,车辆请求和认证信息在TA面前几乎是透明的,而在车辆请求信息被拦截后却无法保证其安全性。针对这些问题,本文提出了一种减轻TA依赖性的轻量级隐私保护认证方案,旨在通过改进遗忘传输算法,实现VANET中车辆与TA之间的相互隐私保护和认证。安全分析证明,该方案具有良好的隐私保护和抗攻击能力,此外,性能仿真和评估表明,该方案的计算和通信开销较低,同时保证了较低的认证延迟和丢包率,整体性能优于其他方案。
{"title":"An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs","authors":"Huadong Su ,&nbsp;Shi Dong ,&nbsp;Ning Wang ,&nbsp;Ting Zhang","doi":"10.1016/j.vehcom.2024.100727","DOIUrl":"10.1016/j.vehcom.2024.100727","url":null,"abstract":"<div><p>With the constant development of wireless communication<span><span><span><span> technologies, the Vehicular Ad-hoc Networks (VANETs) will become an inevitable paradigm for intelligent transportation systems. Privacy-preserving and </span>authentication security has been a core concern in VANETs, and pseudonym-based and group signature-based privacy-preserving </span>authentication schemes<span><span> have been widely proposed. However, most research schemes rely excessively on the Trusted Authority, and vehicle request and authentication information is almost transparent in front of TAs, while they cannot guarantee the security of vehicle request information after it is intercepted. To address these issues, this paper proposes a lightweight privacy-preserving authentication scheme that mitigates TA dependency, aiming to achieve mutual privacy protection and authentication between vehicles and TAs in VANETs by improving the oblivious transfer algorithm. The security analysis proves that this scheme has good privacy protection and attack resistance, and in addition, the performance simulation and evaluation show that this scheme spends lower computation and </span>communication overheads while ensuring lower authentication delay and </span></span>packet loss rate, which is a better overall performance compared with other schemes.</span></p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139505169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable UAV-aided 3D sustainable surveillance in classified air-spaces 可重新配置的无人机辅助三维可持续监控分类空域
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-01 DOI: 10.1016/j.vehcom.2024.100728
Minsoo Kim , Jalel Ben-Othman , Hyunbum Kim

The recent advancement of smart UAVs (Unmanned Aerial Vehicles) allows its applicability to wide-range fields covering time-critical reports, emergent item delivery, virtual emotion services and so on. In particular, the surveillance can be supported by a fleet of smart UAVs in cooperation with various system components including sensors, mobile robots, autonomous vehicles and so on. Additionally, it is crucial to consider the reconfigurable capabilities of smart UAVs leveraging for rapid movement in disregarded airspace. In this paper, we introduce a reconfigurable UAV-enabled 3D sustainable surveillance in classified air-spaces to provide energy-efficient monitoring and security surveillance enforcement. We formally define a problem to maximize the reconfigurable UAV-aided sustainable surveillance efficiency with optimal height in 3D classified air-spaces avoiding excessive resource consumption and waste. To solve this issue, two different schemes of Lined-Up and Zig-Zag are proposed. Furthermore, we analyze their performances based on the gained numerical results through expanded simulations with detailed discussions.

智能无人机(UAVs)的最新进展使其能够广泛应用于时间紧迫的报告、紧急物品运送、虚拟情感服务等领域。特别是,智能无人机可以与传感器、移动机器人、自动驾驶汽车等各种系统组件合作,为监控提供支持。此外,至关重要的是要考虑智能无人机的可重构能力,以便在不受关注的空域中快速移动。在本文中,我们介绍了一种可重构的无人机三维可持续监控分类空域,以提供高能效的监控和安全监控执行。我们正式定义了一个问题,即在三维分类空域中以最佳高度最大化可重构无人机辅助的可持续监控效率,避免过度的资源消耗和浪费。为了解决这个问题,我们提出了两种不同的方案:"一字排开 "和 "之 "字形。此外,我们还通过扩展模拟和详细讨论,根据获得的数值结果分析了它们的性能。
{"title":"Reconfigurable UAV-aided 3D sustainable surveillance in classified air-spaces","authors":"Minsoo Kim ,&nbsp;Jalel Ben-Othman ,&nbsp;Hyunbum Kim","doi":"10.1016/j.vehcom.2024.100728","DOIUrl":"10.1016/j.vehcom.2024.100728","url":null,"abstract":"<div><p>The recent advancement of smart UAVs (Unmanned Aerial Vehicles) allows its applicability to wide-range fields covering time-critical reports, emergent item delivery, virtual emotion services and so on. In particular, the surveillance can be supported by a fleet of smart UAVs in cooperation with various system components including sensors, mobile robots, autonomous vehicles and so on. Additionally, it is crucial to consider the reconfigurable capabilities of smart UAVs leveraging for rapid movement in disregarded airspace. In this paper, we introduce a reconfigurable UAV-enabled 3D sustainable surveillance in classified air-spaces to provide energy-efficient monitoring and security surveillance enforcement. We formally define a problem to maximize the reconfigurable UAV-aided sustainable surveillance efficiency with optimal height in 3D classified air-spaces avoiding excessive resource consumption and waste. To solve this issue, two different schemes of <em>Lined-Up</em> and <em>Zig-Zag</em> are proposed. Furthermore, we analyze their performances based on the gained numerical results through expanded simulations with detailed discussions.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139510928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning for autonomous vehicle's trajectory prediction: A comprehensive survey, challenges, and future research directions 用于自动驾驶汽车轨迹预测的机器学习:全面调查、挑战和未来研究方向
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-29 DOI: 10.1016/j.vehcom.2024.100733
Vibha Bharilya, Neetesh Kumar

The significant contribution of human errors, accounting for approximately 94% (with a margin of ±2.2%), to road crashes leading to casualties, vehicle damages, and safety concerns necessitates the exploration of alternative approaches. Autonomous Vehicles (AVs) have emerged as a promising solution by replacing human drivers with advanced computer-aided decision-making systems. However, for AVs to effectively navigate the road, they must possess the capability to predict the future behaviour of nearby traffic participants, similar to the predictive driving abilities of human drivers. Building upon existing literature is crucial to advance the field and develop a comprehensive understanding of trajectory prediction methods in the context of automated driving. To address this need, we have undertaken a comprehensive review that focuses on trajectory prediction methods for AVs, with a particular emphasis on machine learning techniques including deep learning and reinforcement learning-based approaches. We have extensively examined over two hundred studies related to trajectory prediction in the context of AVs. The paper begins with an introduction to the general problem of predicting vehicle trajectories and provides an overview of the key concepts and terminology used throughout. After providing a brief overview of conventional methods, this review conducts a comprehensive evaluation of several deep learning-based techniques. Each method is summarized briefly, accompanied by a detailed analysis of its strengths and weaknesses. The discussion further extends to reinforcement learning-based methods. This article also examines the various datasets and evaluation metrics that are commonly used in trajectory prediction tasks. Encouraging an unbiased and objective discussion, we compare two major learning processes, considering specific functional features. By identifying challenges in the existing literature and outlining potential research directions, this review significantly contributes to the advancement of knowledge in the domain of AV trajectory prediction. Its primary objective is to streamline current research efforts and offer a futuristic perspective, ultimately benefiting future developments in the field.

在导致人员伤亡、车辆损坏和安全问题的道路交通事故中,人为失误占了约 94%(误差为 ±2.2%),因此有必要探索替代方法。自动驾驶汽车(AV)以先进的计算机辅助决策系统取代人类驾驶员,成为一种前景广阔的解决方案。然而,要使自动驾驶汽车有效地在道路上行驶,它们必须具备预测附近交通参与者未来行为的能力,类似于人类驾驶员的预测驾驶能力。以现有文献为基础,对于推动该领域的发展和全面了解自动驾驶背景下的轨迹预测方法至关重要。为了满足这一需求,我们对自动驾驶汽车的轨迹预测方法进行了全面综述,重点关注机器学习技术,包括基于深度学习和强化学习的方法。我们广泛研究了两百多项与自动驾驶汽车轨迹预测相关的研究。本文首先介绍了车辆轨迹预测的一般问题,并概述了全文使用的关键概念和术语。在简要介绍了传统方法之后,本综述对几种基于深度学习的技术进行了全面评估。每种方法都进行了简要概述,并对其优缺点进行了详细分析。讨论进一步扩展到基于强化学习的方法。本文还研究了轨迹预测任务中常用的各种数据集和评估指标。为了鼓励公正客观的讨论,我们比较了两种主要的学习过程,并考虑了具体的功能特征。通过识别现有文献中的挑战并概述潜在的研究方向,本综述极大地促进了视听轨迹预测领域的知识进步。其主要目的是简化当前的研究工作,并提供一个未来视角,最终有利于该领域的未来发展。
{"title":"Machine learning for autonomous vehicle's trajectory prediction: A comprehensive survey, challenges, and future research directions","authors":"Vibha Bharilya,&nbsp;Neetesh Kumar","doi":"10.1016/j.vehcom.2024.100733","DOIUrl":"10.1016/j.vehcom.2024.100733","url":null,"abstract":"<div><p>The significant contribution of human errors, accounting for approximately 94% (with a margin of <span><math><mo>±</mo><mn>2.2</mn><mtext>%</mtext></math></span>), to road crashes leading to casualties, vehicle damages, and safety concerns necessitates the exploration of alternative approaches. Autonomous Vehicles (AVs) have emerged as a promising solution by replacing human drivers with advanced computer-aided decision-making systems. However, for AVs to effectively navigate the road, they must possess the capability to predict the future behaviour of nearby traffic participants, similar to the predictive driving abilities of human drivers. Building upon existing literature is crucial to advance the field and develop a comprehensive understanding of trajectory prediction methods in the context of automated driving. To address this need, we have undertaken a comprehensive review that focuses on trajectory prediction methods for AVs, with a particular emphasis on machine learning techniques including deep learning and reinforcement learning-based approaches. We have extensively examined over two hundred studies related to trajectory prediction in the context of AVs. The paper begins with an introduction to the general problem of predicting vehicle trajectories and provides an overview of the key concepts and terminology used throughout. After providing a brief overview of conventional methods, this review conducts a comprehensive evaluation of several deep learning-based techniques. Each method is summarized briefly, accompanied by a detailed analysis of its strengths and weaknesses. The discussion further extends to reinforcement learning-based methods. This article also examines the various datasets and evaluation metrics that are commonly used in trajectory prediction tasks. Encouraging an unbiased and objective discussion, we compare two major learning processes, considering specific functional features. By identifying challenges in the existing literature and outlining potential research directions, this review significantly contributes to the advancement of knowledge in the domain of AV trajectory prediction. Its primary objective is to streamline current research efforts and offer a futuristic perspective, ultimately benefiting future developments in the field.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139660802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of a generalized multi-tag, multi-antenna ambient backscatter with mobile nodes: A physical layer security perspective 带有移动节点的通用多标签、多天线环境反向散射分析:物理层安全视角
IF 6.7 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-01-26 DOI: 10.1016/j.vehcom.2024.100731
Tushar S. Muratkar , Ankit Bhurane , Ashwin Kothari

Ambient backscatter communication (AmBC) has recently attracted a lot of attention as a solution for next-generation internet of things (IoT) applications due to its capability to interact with peer devices with extremely little power usage (in μW). Security being a major concern in IoT applications, we look at the AmBC system from a physical layer security standpoint. In this paper, we focus on a realistic scenario in which numerous tags, a multi-antenna reader, and a multi-antenna eavesdropper are present, and the nodes are in motion concerning each other. The influence of speed, estimation error, number of antennas at nodes, and number of tags on the AmBC system's secrecy performance in terms of secrecy outage probability and intercept probability is investigated. Finally, the theoretical findings are supported with Monte-Carlo simulations.

环境反向散射通信(AmBC)作为下一代物联网(IoT)应用的一种解决方案,最近引起了广泛关注,因为它能以极低的功耗(单位:μW)与对等设备进行交互。安全是物联网应用中的一个主要问题,因此我们从物理层安全的角度来研究 AmBC 系统。在本文中,我们将重点放在一个现实场景中,即存在众多标签、一个多天线读取器和一个多天线窃听器,并且节点之间相互运动。本文研究了速度、估计误差、节点天线数量和标签数量对 AmBC 系统保密性能的影响,包括保密中断概率和拦截概率。最后,用蒙特卡洛模拟支持了理论研究结果。
{"title":"Analysis of a generalized multi-tag, multi-antenna ambient backscatter with mobile nodes: A physical layer security perspective","authors":"Tushar S. Muratkar ,&nbsp;Ankit Bhurane ,&nbsp;Ashwin Kothari","doi":"10.1016/j.vehcom.2024.100731","DOIUrl":"10.1016/j.vehcom.2024.100731","url":null,"abstract":"<div><p><span>Ambient backscatter<span> communication (AmBC) has recently attracted a lot of attention as a solution for next-generation internet of things (IoT) applications due to its capability to interact with peer devices with extremely little power usage (in </span></span><em>μ</em><span><span>W). Security being a major concern in IoT applications, we look at the AmBC system from a physical layer security standpoint. In this paper, we focus on a realistic scenario in which numerous tags, a multi-antenna reader, and a multi-antenna eavesdropper are present, and the nodes are in motion concerning each other. The influence of speed, estimation error, number of antennas at nodes, and number of tags on the AmBC system's secrecy performance in terms of secrecy </span>outage probability and intercept probability is investigated. Finally, the theoretical findings are supported with Monte-Carlo simulations.</span></p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139565717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1