首页 > 最新文献

Vehicular Communications最新文献

英文 中文
Enhancing security in vanets: Adaptive Bald Eagle Search Optimization based multi-agent deep Q neural network for Sybil attack detection 增强vanet的安全性:基于自适应秃鹰搜索优化的多智能体深度Q神经网络用于Sybil攻击检测
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-24 DOI: 10.1016/j.vehcom.2025.100928
M. Ajin, R.S. Shaji
Currently, the use of Vehicular Ad-Hoc Networks (VANETs) has gained significant attention in toll management systems and traffic control. VANETs facilitate effective communication by connecting Roadside Units (RSUs) and vehicles. VANETs can ease decision-making for drivers, meanwhile, they carry some problems with security since they often modify topology. In VANET, the Sybil attack is a specific attack, that might generate traffic congestion and affect transportation safety services. Different Mechanisms have been implemented to discover various attacks in VANET, yet VANET meets diverse attacks. Therefore, this research article developed an effective Sybil attack detection model namely Adaptive Bald Eagle Search Optimization (ABESO) based Multi-agent-Deep Q Neural network (MA-DQN). The principal objective of the ABESO based DQN is to enhance the security level of VANET by identifying the Sybil Attacks. In this, clustering and effective cluster head selection are performed to discover the Sybil attacks. In the suggested ABESO based DQN algorithm, robust clustering is carried out, in which vehicle nodes of VANET are clustered through the utilization of the BIRCH clustering technique. Our proposed ABESO based DQN algorithm augments the overall network efficiency by effective cluster head selection. Taylor-based Waterwheel Plant (TWP) is exploited in the cluster head selection and diminishes the overhead in the network. In the proposed model, the MDQN-based approach selects the features and ABESO based DQN delivers an optimal output, i.e., it discovers normal and Sybil attacks. Experimental results are carried out on the basis of the sybil attack detection dataset that holds multiple data regarding attacks. The detection results affirm that the efficiency of the proposed ABESO based DQN approach is superior and outperformed previous methods.
目前,车辆自组织网络(VANETs)的使用在收费管理系统和交通控制中得到了极大的关注。vanet通过连接路边单位(rsu)和车辆来促进有效的通信。VANETs可以简化驾驶员的决策,但由于其经常修改拓扑结构,因此存在一些安全问题。在VANET中,Sybil攻击是一种特定的攻击,可能会导致交通拥堵,影响交通安全服务。在VANET中实现了不同的机制来发现各种攻击,但VANET也会遇到各种攻击。为此,本文开发了一种有效的Sybil攻击检测模型,即基于自适应秃鹰搜索优化(ABESO)的多智能体-深度Q神经网络(MA-DQN)。基于ABESO的DQN的主要目标是通过识别Sybil攻击来提高VANET的安全级别。在此过程中,通过聚类和有效的簇头选择来发现Sybil攻击。提出的基于ABESO的DQN算法进行鲁棒聚类,利用BIRCH聚类技术对VANET的车辆节点进行聚类。我们提出的基于ABESO的DQN算法通过有效的簇头选择提高了整体网络效率。利用基于泰勒的水轮装置(TWP)进行簇头选择,降低了网络开销。在提出的模型中,基于mdqn的方法选择特征,基于ABESO的DQN提供最优输出,即发现正常攻击和Sybil攻击。实验结果是基于包含多个攻击数据的符号攻击检测数据集进行的。检测结果证实了基于ABESO的DQN方法的效率优于先前的方法。
{"title":"Enhancing security in vanets: Adaptive Bald Eagle Search Optimization based multi-agent deep Q neural network for Sybil attack detection","authors":"M. Ajin,&nbsp;R.S. Shaji","doi":"10.1016/j.vehcom.2025.100928","DOIUrl":"10.1016/j.vehcom.2025.100928","url":null,"abstract":"<div><div>Currently, the use of Vehicular Ad-Hoc Networks (VANETs) has gained significant attention in toll management systems and traffic control. VANETs facilitate effective communication by connecting Roadside Units (RSUs) and vehicles. VANETs can ease decision-making for drivers, meanwhile, they carry some problems with security since they often modify topology. In VANET, the Sybil attack is a specific attack, that might generate traffic congestion and affect transportation safety services. Different Mechanisms have been implemented to discover various attacks in VANET, yet VANET meets diverse attacks. Therefore, this research article developed an effective Sybil attack detection model namely Adaptive Bald Eagle Search Optimization (ABESO) based Multi-agent-Deep Q Neural network (MA-DQN). The principal objective of the ABESO based DQN is to enhance the security level of VANET by identifying the Sybil Attacks. In this, clustering and effective cluster head selection are performed to discover the Sybil attacks. In the suggested ABESO based DQN algorithm, robust clustering is carried out, in which vehicle nodes of VANET are clustered through the utilization of the BIRCH clustering technique. Our proposed ABESO based DQN algorithm augments the overall network efficiency by effective cluster head selection. Taylor-based Waterwheel Plant (TWP) is exploited in the cluster head selection and diminishes the overhead in the network. In the proposed model, the MDQN-based approach selects the features and ABESO based DQN delivers an optimal output, i.e., it discovers normal and Sybil attacks. Experimental results are carried out on the basis of the sybil attack detection dataset that holds multiple data regarding attacks. The detection results affirm that the efficiency of the proposed ABESO based DQN approach is superior and outperformed previous methods.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100928"},"PeriodicalIF":5.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143935907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging reputation for enhanced decision accuracy in vehicle-to-vehicle communications under limited infrastructure 在有限的基础设施下,利用车辆对车辆通信中提高决策准确性的声誉
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-24 DOI: 10.1016/j.vehcom.2025.100927
Dimah Almani , Tim Muller , Steven Furnell
Vehicle-to-Vehicle (V2V) networking enhances transportation safety and efficiency by enabling vehicles to share alerts. However, malicious vehicles may inject false messages, leading to disputes. While certificates help ensure security, Certificate Revocation List (CRLs) may be outdated in low-connectivity areas, making it hard to verify conflicting reports. Reputation systems, using a pre-signature scheme, can aid decision-making even in infrastructure-limited environments.
In this paper, we provide the mechanisms to use reputation in areas with low/no connectivity, whilst allowing for pseudonymous certificates to verify message authenticity without breaking privacy. The approach is integrated into the existing Security Credential Management System (SCMS), a framework for managing digital certificates for secure V2V communication.
Our simulations evaluate the security performance of our proposed mechanism, with offline available reputation, against plain SCMS certificate management that rely solely on CRL to block malicious vehicles. The results are achieved by integrating vehicular simulation tools like SUMO, OMNeT++, and Veins, to evaluate the V2V communications in each system under two conditions (Accident and No accident) ensuring a comprehensive system evaluation.
The proposed scheme improves accuracy in decision-making with conflicting information by 36% in accidents and 44.4% in No-Accident situations in a rural environment.
车对车(V2V)网络通过使车辆共享警报来提高运输安全性和效率。然而,恶意车辆可能会注入虚假信息,导致纠纷。虽然证书有助于确保安全性,但证书撤销列表(crl)在低连接区域可能已经过时,因此难以验证冲突的报告。使用预签名方案的信誉系统即使在基础设施有限的环境中也可以帮助决策。在本文中,我们提供了在低连接/无连接区域使用信誉的机制,同时允许假名证书在不破坏隐私的情况下验证消息真实性。该方法集成到现有的安全凭证管理系统(SCMS)中,SCMS是一个管理数字证书的框架,用于安全的V2V通信。我们的模拟评估了我们提出的机制的安全性能,与仅依赖CRL来阻止恶意车辆的普通SCMS证书管理相比,具有离线可用声誉。结果通过集成SUMO、omnet++和vein等车载仿真工具,在两种情况下(事故和无事故)评估每个系统的V2V通信,以确保全面的系统评估。在农村环境中,该方案将信息冲突情况下的决策准确率提高了36%,在无事故情况下提高了44.4%。
{"title":"Leveraging reputation for enhanced decision accuracy in vehicle-to-vehicle communications under limited infrastructure","authors":"Dimah Almani ,&nbsp;Tim Muller ,&nbsp;Steven Furnell","doi":"10.1016/j.vehcom.2025.100927","DOIUrl":"10.1016/j.vehcom.2025.100927","url":null,"abstract":"<div><div>Vehicle-to-Vehicle (V2V) networking enhances transportation safety and efficiency by enabling vehicles to share alerts. However, malicious vehicles may inject false messages, leading to disputes. While certificates help ensure security, Certificate Revocation List (CRLs) may be outdated in low-connectivity areas, making it hard to verify conflicting reports. Reputation systems, using a pre-signature scheme, can aid decision-making even in infrastructure-limited environments.</div><div>In this paper, we provide the mechanisms to use reputation in areas with low/no connectivity, whilst allowing for pseudonymous certificates to verify message authenticity without breaking privacy. The approach is integrated into the existing Security Credential Management System (SCMS), a framework for managing digital certificates for secure V2V communication.</div><div>Our simulations evaluate the security performance of our proposed mechanism, with offline available reputation, against plain SCMS certificate management that rely solely on CRL to block malicious vehicles. The results are achieved by integrating vehicular simulation tools like SUMO, OMNeT++, and Veins, to evaluate the V2V communications in each system under two conditions (Accident and No accident) ensuring a comprehensive system evaluation.</div><div>The proposed scheme improves accuracy in decision-making with conflicting information by 36% in accidents and 44.4% in No-Accident situations in a rural environment.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100927"},"PeriodicalIF":5.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143870049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P3AKA: A PUF based privacy preserving authentication and key agreement framework for secure communication in vehicle to grid network P3AKA:一个基于PUF的车辆与电网安全通信的隐私保护认证和密钥协议框架
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-24 DOI: 10.1016/j.vehcom.2025.100925
Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel
A traditional power grid integrates a Smart Grid (SG) technology to reduce greenhouse gases and increase the efficiency of energy transition. The Vehicle to Grid (V2G) is raised and combined with the SG network to fulfill these objectives of the SG technology. The two-way power flow in the V2G technology allows an Electrical Vehicle (EV) to charge its battery and discharge surplus energy back to the power grid through the Charging Stations (CSs). During the energy transfer, an EV shares identity, location, and charging preferences with the CS through an insecure channel. It raises significant security and privacy vulnerabilities for the V2G network. In addition, the EV and CS are situated in an exposed location that may increase the risk of physical attack. Hence, there is a need to preserve the security and privacy of the EV and CS in the V2G network. Moreover, a lightweight security solution is necessary for the resource constrained CS and EV in the V2G network. Several authentication and key agreement protocols were suggested in the literature to overcome the security challenges in the V2G network. However, the existing approaches fail to maintain the session key secrecy and preserve from the physical attack. Thus, we propose a Physically Unclonable Function (PUF) based Privacy Preserving Authentication and Key Agreement (P3AKA) framework for the V2G network using lightweight cryptographic operations. PUF protects the CS and EV from the physical attack and other lightweight cryptographic functions safeguard the network from other security attacks. Security analysis of the proposed P3AKA framework represents that it protects the V2G network from potential security threats such as impersonation, replay, Man-in-The-Middle (MiTM), physical, and machine learning attacks. Further, it ensures user anonymity and non-traceability of the EV user. The formal security verification uses the ROR model and Scyther tool to verify the proposed P3AKA framework. It illustrates that the P3AKA framework successfully provides bidirectional authentication and session key secrecy in the V2G network. In addition, the performance analysis illustrates that the proposed P3AKA framework improves security with competitive overheads compared to existing relevant schemes.
传统电网集成了智能电网(SG)技术,以减少温室气体排放,提高能源转换效率。车辆到电网(V2G)被提出并与SG网络相结合,以实现SG技术的这些目标。V2G技术中的双向功率流允许电动汽车(EV)为电池充电,并通过充电站(CSs)将多余的能量释放回电网。在能量传输过程中,电动汽车通过不安全的通道与CS共享身份、位置和充电偏好。它为V2G网络带来了重大的安全和隐私漏洞。此外,EV和CS位于暴露的位置,可能会增加物理攻击的风险。因此,有必要在V2G网络中保护EV和CS的安全和隐私。此外,对于V2G网络中资源受限的CS和EV,需要轻量级的安全解决方案。为了克服V2G网络中的安全挑战,文献中提出了几种身份验证和密钥协商协议。但是,现有的方法不能保证会话密钥的保密性和防止物理攻击。因此,我们提出了一个基于物理不可克隆函数(PUF)的V2G网络隐私保护认证和密钥协议(P3AKA)框架,使用轻量级加密操作。PUF保护CS和EV免受物理攻击,其他轻量级加密功能保护网络免受其他安全攻击。对提议的P3AKA框架的安全分析表明,它可以保护V2G网络免受潜在的安全威胁,如冒充、重播、中间人(MiTM)、物理攻击和机器学习攻击。此外,它还保证了用户的匿名性和EV用户的不可追溯性。正式的安全性验证使用ROR模型和Scyther工具来验证提议的P3AKA框架。说明P3AKA框架在V2G网络中成功地提供了双向认证和会话密钥保密。此外,性能分析表明,与现有的相关方案相比,所提出的P3AKA框架在具有竞争性开销的情况下提高了安全性。
{"title":"P3AKA: A PUF based privacy preserving authentication and key agreement framework for secure communication in vehicle to grid network","authors":"Prarthana J. Mehta,&nbsp;Balu L. Parne,&nbsp;Sankita J. Patel","doi":"10.1016/j.vehcom.2025.100925","DOIUrl":"10.1016/j.vehcom.2025.100925","url":null,"abstract":"<div><div>A traditional power grid integrates a Smart Grid (SG) technology to reduce greenhouse gases and increase the efficiency of energy transition. The Vehicle to Grid (V2G) is raised and combined with the SG network to fulfill these objectives of the SG technology. The two-way power flow in the V2G technology allows an Electrical Vehicle (EV) to charge its battery and discharge surplus energy back to the power grid through the Charging Stations (CSs). During the energy transfer, an EV shares identity, location, and charging preferences with the CS through an insecure channel. It raises significant security and privacy vulnerabilities for the V2G network. In addition, the EV and CS are situated in an exposed location that may increase the risk of physical attack. Hence, there is a need to preserve the security and privacy of the EV and CS in the V2G network. Moreover, a lightweight security solution is necessary for the resource constrained CS and EV in the V2G network. Several authentication and key agreement protocols were suggested in the literature to overcome the security challenges in the V2G network. However, the existing approaches fail to maintain the session key secrecy and preserve from the physical attack. Thus, we propose a Physically Unclonable Function (PUF) based Privacy Preserving Authentication and Key Agreement (P3AKA) framework for the V2G network using lightweight cryptographic operations. PUF protects the CS and EV from the physical attack and other lightweight cryptographic functions safeguard the network from other security attacks. Security analysis of the proposed P3AKA framework represents that it protects the V2G network from potential security threats such as impersonation, replay, Man-in-The-Middle (MiTM), physical, and machine learning attacks. Further, it ensures user anonymity and non-traceability of the EV user. The formal security verification uses the ROR model and Scyther tool to verify the proposed P3AKA framework. It illustrates that the P3AKA framework successfully provides bidirectional authentication and session key secrecy in the V2G network. In addition, the performance analysis illustrates that the proposed P3AKA framework improves security with competitive overheads compared to existing relevant schemes.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100925"},"PeriodicalIF":5.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143883170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based receiver structure with superimposed channel estimation for autonomous underwater vehicles 基于深度学习的自主水下航行器信道叠加估计接收机结构
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-24 DOI: 10.1016/j.vehcom.2025.100926
Zeyad A.H. Qasem , Xingbin Tu , Fengzhong Qu , Chunyi Song , Hamada Esmaiel
Although autonomous underwater vehicles can achieve complex tasks in harsh and inaccessible marine environments, they face several challenges related to the harsh channel effects and limited available bandwidth, making reliable channel estimation crucial task for achieving robust communication. Therefore, to track channel effects, a significant portion of bandwidth is usually reserved for overhead, which dramatically reduces the already limited bandwidth efficiency. In this paper, we present a real signal orthogonal frequency division multiplexing (OFDM) method based on deep learning to accurately track channel effects without losing bandwidth efficiency. The proposed scheme adopts the discrete Hartley transform to produce a real signal modulation, and a unitary neural network (UNN) at the sending end to add extra packages. At the receiving end, we use a deep neural network (DNN) in conjunction with channel estimation and equalization to accurately detect the transmitted information data. Therefore, we jointly train both UNN and DNN to prevent interference between the data and pilot, as well as to address factors that impact data detection performance effectively. We also deploy the carrier frequency offset estimation technique without sacrificing any subcarriers. Consequently, we track channel effects without the need for dedicated pilot subcarriers and/or data detection degradation. The proposed method has a better bit error rate, spectral efficiency, and computational complexity than current benchmarks, as shown by both the simulation and the real experiments done in the sea over a distance of 300 m
尽管自主水下航行器可以在恶劣和难以进入的海洋环境中完成复杂的任务,但它们面临着与恶劣的信道效应和有限的可用带宽相关的一些挑战,因此可靠的信道估计是实现鲁棒通信的关键任务。因此,为了跟踪信道效果,通常会为开销保留很大一部分带宽,这极大地降低了本已有限的带宽效率。在本文中,我们提出了一种基于深度学习的实信号正交频分复用(OFDM)方法,在不损失带宽效率的情况下准确跟踪信道效应。该方案采用离散哈特利变换产生真实信号调制,并在发送端采用统一神经网络(UNN)增加额外的数据包。在接收端,我们使用深度神经网络(DNN)结合信道估计和均衡来准确检测传输的信息数据。因此,我们联合训练UNN和DNN,以防止数据和飞行员之间的干扰,并有效地解决影响数据检测性能的因素。我们还在不牺牲任何子载波的情况下部署了载波频偏估计技术。因此,我们在不需要专用导频子载波和/或数据检测退化的情况下跟踪信道效应。实验结果表明,该方法具有较好的误码率、频谱效率和计算复杂度
{"title":"Deep learning-based receiver structure with superimposed channel estimation for autonomous underwater vehicles","authors":"Zeyad A.H. Qasem ,&nbsp;Xingbin Tu ,&nbsp;Fengzhong Qu ,&nbsp;Chunyi Song ,&nbsp;Hamada Esmaiel","doi":"10.1016/j.vehcom.2025.100926","DOIUrl":"10.1016/j.vehcom.2025.100926","url":null,"abstract":"<div><div>Although autonomous underwater vehicles can achieve complex tasks in harsh and inaccessible marine environments, they face several challenges related to the harsh channel effects and limited available bandwidth, making reliable channel estimation crucial task for achieving robust communication. Therefore, to track channel effects, a significant portion of bandwidth is usually reserved for overhead, which dramatically reduces the already limited bandwidth efficiency. In this paper, we present a real signal orthogonal frequency division multiplexing (OFDM) method based on deep learning to accurately track channel effects without losing bandwidth efficiency. The proposed scheme adopts the discrete Hartley transform to produce a real signal modulation, and a unitary neural network (UNN) at the sending end to add extra packages. At the receiving end, we use a deep neural network (DNN) in conjunction with channel estimation and equalization to accurately detect the transmitted information data. Therefore, we jointly train both UNN and DNN to prevent interference between the data and pilot, as well as to address factors that impact data detection performance effectively. We also deploy the carrier frequency offset estimation technique without sacrificing any subcarriers. Consequently, we track channel effects without the need for dedicated pilot subcarriers and/or data detection degradation. The proposed method has a better bit error rate, spectral efficiency, and computational complexity than current benchmarks, as shown by both the simulation and the real experiments done in the sea over a distance of 300 m</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100926"},"PeriodicalIF":5.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143894803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-supported communication: Current and prospective solutions 无人机支持的通信:当前和未来的解决方案
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-18 DOI: 10.1016/j.vehcom.2025.100923
Moayad Aloqaily , Ouns Bouachir , Ismaeel Al Ridhawi
The advancement in wireless communication has significantly resulted in unprecedented new applications and services. This, coupled with Next-Generation Networking (NGN) and the recent advances in cellular communication and networking, predominantly the Fifth-Generation (5G) network, has resulted in the rise of new technological solutions. Unmanned Aerial Vehicles (UAVs) is one such solution that has evolved from its traditional usage in military and civilian applications, towards new and innovative solutions that provide support to wireless communication and networking. With advances in their processing and communication capabilities, UAVs are now supporting both core and edge networks to deliver services to end-users in a reliable and fast manner. The synergy and collective collaboration between UAVs and continuously evolving and progressing technologies such as Artificial Intelligence (AI) and blockchain are reshaping the landscape of wireless communication and networking, enabling more robust, secure and adaptable systems that transcend traditional limitations. In this article, we explore various collaborative solutions that leverage UAV communication and networks that not only bolster communication between mobile nodes and the core network but also reinforce the edge computing infrastructure. This reinforcement enables scalable data storage and intelligent processing to elevate end-user services and applications. Additionally, we address the obstacles, concerns, and future pathways concerning UAV-supported NGNs.
无线通信的进步显著地导致了前所未有的新应用和服务。再加上下一代网络(NGN)和蜂窝通信和网络的最新进展,主要是第五代(5G)网络,导致了新技术解决方案的兴起。无人机(uav)就是这样一种解决方案,它已经从传统的军事和民用应用发展到新的创新解决方案,为无线通信和网络提供支持。随着其处理和通信能力的进步,无人机现在支持核心和边缘网络,以可靠和快速的方式向最终用户提供服务。无人机与人工智能(AI)和区块链等不断发展和进步的技术之间的协同和集体协作正在重塑无线通信和网络的格局,使超越传统限制的更强大、更安全、适应性更强的系统成为可能。在本文中,我们探讨了利用无人机通信和网络的各种协作解决方案,这些解决方案不仅可以加强移动节点与核心网络之间的通信,还可以加强边缘计算基础设施。这种增强支持可扩展的数据存储和智能处理,以提升最终用户服务和应用程序。此外,我们还讨论了无人机支持的ngn的障碍、问题和未来途径。
{"title":"UAV-supported communication: Current and prospective solutions","authors":"Moayad Aloqaily ,&nbsp;Ouns Bouachir ,&nbsp;Ismaeel Al Ridhawi","doi":"10.1016/j.vehcom.2025.100923","DOIUrl":"10.1016/j.vehcom.2025.100923","url":null,"abstract":"<div><div>The advancement in wireless communication has significantly resulted in unprecedented new applications and services. This, coupled with Next-Generation Networking (NGN) and the recent advances in cellular communication and networking, predominantly the Fifth-Generation (5G) network, has resulted in the rise of new technological solutions. Unmanned Aerial Vehicles (UAVs) is one such solution that has evolved from its traditional usage in military and civilian applications, towards new and innovative solutions that provide support to wireless communication and networking. With advances in their processing and communication capabilities, UAVs are now supporting both core and edge networks to deliver services to end-users in a reliable and fast manner. The synergy and collective collaboration between UAVs and continuously evolving and progressing technologies such as Artificial Intelligence (AI) and blockchain are reshaping the landscape of wireless communication and networking, enabling more robust, secure and adaptable systems that transcend traditional limitations. In this article, we explore various collaborative solutions that leverage UAV communication and networks that not only bolster communication between mobile nodes and the core network but also reinforce the edge computing infrastructure. This reinforcement enables scalable data storage and intelligent processing to elevate end-user services and applications. Additionally, we address the obstacles, concerns, and future pathways concerning UAV-supported NGNs.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100923"},"PeriodicalIF":5.8,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143941713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal coordinated platoon lane change in highways with mixed traffic 混合交通高速公路最优协调排变道
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-18 DOI: 10.1016/j.vehcom.2025.100924
Fernando V. Monteiro , Ketan Savla , Petros Ioannou
In the field of connected autonomous vehicles, platoons - where vehicles closely follow one another - have shown promising results in enhancing safety, traffic flow, and fuel efficiency. This study addresses the unique challenges of platoon lane changes, where multiple platoon vehicles have lane change intention and must remain together after the maneuver is completed. We focus on highway environments because many studies have highlighted the advantages of platooning in these settings. We leverage an offline controller synthesis approach to deal with the combinatorial problem of choosing a strategy. Building on concepts from symbolic optimal control, we represent the problem using a weighted directed acyclic graph where nodes are quantized state vectors, edge weights are costs to transition between nodes, and the shortest path solutions represent the optimal platoon lane change strategies. We use a Cached Branch-and-Bound Depth-First Search algorithm to solve the offline control problem due to its anytime capability and low memory requirements. This approach provides real-time decision making and guarantees maneuver success while minimizing completion time or control effort. Previous works either required control of all vehicles on the road, making them inadequate for mixed-traffic scenarios, or fixed the order in which platoon vehicles change lanes, disregarding the current state of surrounding vehicles and maneuver costs. Our framework can describe all previously proposed methods, relies only on cooperation between platoon vehicles, allows for optimization, and produces solutions whose costs decrease as the allowed computational time increases. We employ the VISSIM traffic simulator to compare our approach to the state of the art. The experiments show that we obtain an increase of 13% in the maneuver completion rate along with a decrease of around 15% to 20% in the maneuver completion time and distance traveled to complete the lane change at the cost of an average increase of 2% to 17% in the longitudinal control effort. This trade-off is a direct consequence of having the platoon occupy suitable lane-changing spaces as soon as possible, and this myopic behavior is necessary when there is no information about the future movements of human-driven vehicles. Moreover, the experiments indicate that our approach yields a sharp decrease in cost in relatively short computational times. These results emphasize the potential for deployment of the proposed method in mixed-traffic highway scenarios.
在互联自动驾驶汽车领域,车辆紧密跟随的车队在提高安全性、交通流量和燃油效率方面取得了可喜的成果。该研究解决了排变道的独特挑战,其中多个排车辆具有变道意图,并且在机动完成后必须保持在一起。我们之所以关注高速公路环境,是因为许多研究都强调了在这些环境中队列行驶的优势。我们利用离线控制器综合方法来处理选择策略的组合问题。基于符号最优控制的概念,我们使用加权有向无环图来表示问题,其中节点是量化的状态向量,边缘权重是节点之间转换的代价,最短路径解表示最优排变道策略。我们使用缓存分支绑定深度优先搜索算法来解决离线控制问题,因为它具有随时随地的能力和低内存需求。这种方法提供了实时决策,保证了操作的成功,同时最大限度地减少了完井时间或控制工作量。以前的工作要么需要控制道路上的所有车辆,这使得它们不适合混合交通场景,要么固定队列车辆变道的顺序,而不考虑周围车辆的当前状态和机动成本。我们的框架可以描述所有以前提出的方法,只依赖于车队之间的合作,允许优化,并产生成本随着允许的计算时间的增加而降低的解决方案。我们使用VISSIM流量模拟器将我们的方法与最先进的方法进行比较。实验表明,机动完成率提高了13%,机动完成时间和完成变道所需距离减少了约15%至20%,而纵向控制努力平均增加了2%至17%。这种权衡是让车队尽快占据合适的变道空间的直接结果,当没有关于人类驾驶车辆未来运动的信息时,这种短视行为是必要的。此外,实验表明,我们的方法在相对较短的计算时间内产生了成本的急剧下降。这些结果强调了在混合交通高速公路场景中部署所提出方法的潜力。
{"title":"Optimal coordinated platoon lane change in highways with mixed traffic","authors":"Fernando V. Monteiro ,&nbsp;Ketan Savla ,&nbsp;Petros Ioannou","doi":"10.1016/j.vehcom.2025.100924","DOIUrl":"10.1016/j.vehcom.2025.100924","url":null,"abstract":"<div><div>In the field of connected autonomous vehicles, platoons - where vehicles closely follow one another - have shown promising results in enhancing safety, traffic flow, and fuel efficiency. This study addresses the unique challenges of platoon lane changes, where multiple platoon vehicles have lane change intention and must remain together after the maneuver is completed. We focus on highway environments because many studies have highlighted the advantages of platooning in these settings. We leverage an offline controller synthesis approach to deal with the combinatorial problem of choosing a strategy. Building on concepts from symbolic optimal control, we represent the problem using a weighted directed acyclic graph where nodes are quantized state vectors, edge weights are costs to transition between nodes, and the shortest path solutions represent the optimal platoon lane change strategies. We use a Cached Branch-and-Bound Depth-First Search algorithm to solve the offline control problem due to its anytime capability and low memory requirements. This approach provides real-time decision making and guarantees maneuver success while minimizing completion time or control effort. Previous works either required control of all vehicles on the road, making them inadequate for mixed-traffic scenarios, or fixed the order in which platoon vehicles change lanes, disregarding the current state of surrounding vehicles and maneuver costs. Our framework can describe all previously proposed methods, relies only on cooperation between platoon vehicles, allows for optimization, and produces solutions whose costs decrease as the allowed computational time increases. We employ the VISSIM traffic simulator to compare our approach to the state of the art. The experiments show that we obtain an increase of 13% in the maneuver completion rate along with a decrease of around 15% to 20% in the maneuver completion time and distance traveled to complete the lane change at the cost of an average increase of 2% to 17% in the longitudinal control effort. This trade-off is a direct consequence of having the platoon occupy suitable lane-changing spaces as soon as possible, and this myopic behavior is necessary when there is no information about the future movements of human-driven vehicles. Moreover, the experiments indicate that our approach yields a sharp decrease in cost in relatively short computational times. These results emphasize the potential for deployment of the proposed method in mixed-traffic highway scenarios.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100924"},"PeriodicalIF":5.8,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143870048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive bendable virtual tunnel routing protocol for flying ad-hoc networks 一种用于飞行自组织网络的自适应弯曲虚拟隧道路由协议
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-18 DOI: 10.1016/j.vehcom.2025.100922
Huizhi Tang , Demin Li , Yihong Zhang , Xuemin Chen , Abdul Rauf
Flying ad-hoc networks (FANETs) play a crucial role in disaster response, surveillance, and remote sensing. However, their highly dynamic topology and frequent link disruptions pose significant challenges to efficient routing. Existing protocols suffer from excessive control overhead, unstable links, and inefficient energy utilization, that limits their practical deployment. To address these issues, we propose an adaptive bendable virtual tunnel routing protocol (ABVTR), which constructs a three-dimensional (3D) adaptive bendable virtual relay tunnel (3D-ABVRT) using Bézier curves. This tunnel restricts the propagation of route request messages, reducing redundant transmissions, and enhancing routing stability, particularly in sparsely connected UAV networks. ABVTR employs a piecewise function to align UAV movement with the tunnel's centerline, effectively minimizing deviations and reducing delays. Furthermore, it dynamically determines the next-hop node by considering movement direction, relative speed, and residual energy. The latter two factors are assessed using a S-function and an exponential function, respectively, to enhance link reliability and optimize energy distribution. This work advances the state-of-the-art by introducing a more adaptive, energy-efficient, and scalable routing solution for FANETs. The simulation results show that ABVTR significantly outperforms existing protocols (EARVRT, iPipe, HMGOC, CF-GPSR, FM-DT-GDR) in end-to-end delay, packet delivery ratio (PDR), and routing overhead. These enhancements position ABVTR as a highly promising solution for mission-critical FANETs application, enabling more resilient, scalable, and efficient aerial networks.
飞行自组织网络(fanet)在灾害响应、监视和遥感方面发挥着至关重要的作用。然而,它们的高动态拓扑结构和频繁的链路中断对高效路由提出了重大挑战。现有协议存在控制开销过大、链路不稳定、能量利用率低等问题,限制了其实际部署。为了解决这些问题,我们提出了一种自适应可弯曲虚拟隧道路由协议(ABVTR),该协议利用bsamizier曲线构建了一个三维(3D)自适应可弯曲虚拟中继隧道(3D- abvrt)。该隧道限制了路由请求消息的传播,减少了冗余传输,增强了路由的稳定性,特别是在稀疏连接的无人机网络中。ABVTR采用分段功能将无人机运动与隧道中心线对齐,有效地减少偏差并减少延迟。通过考虑运动方向、相对速度和剩余能量,动态确定下一跳节点。后两个因素分别使用s函数和指数函数进行评估,以提高链路可靠性和优化能量分配。这项工作通过为fanet引入更具适应性、节能和可扩展的路由解决方案,推进了最先进的技术。仿真结果表明,ABVTR协议在端到端时延、包分发率(PDR)和路由开销等方面明显优于现有协议EARVRT、iPipe、HMGOC、CF-GPSR、FM-DT-GDR。这些增强使ABVTR成为关键任务fanet应用的一个非常有前途的解决方案,实现更有弹性、可扩展和高效的空中网络。
{"title":"An adaptive bendable virtual tunnel routing protocol for flying ad-hoc networks","authors":"Huizhi Tang ,&nbsp;Demin Li ,&nbsp;Yihong Zhang ,&nbsp;Xuemin Chen ,&nbsp;Abdul Rauf","doi":"10.1016/j.vehcom.2025.100922","DOIUrl":"10.1016/j.vehcom.2025.100922","url":null,"abstract":"<div><div>Flying ad-hoc networks (FANETs) play a crucial role in disaster response, surveillance, and remote sensing. However, their highly dynamic topology and frequent link disruptions pose significant challenges to efficient routing. Existing protocols suffer from excessive control overhead, unstable links, and inefficient energy utilization, that limits their practical deployment. To address these issues, we propose an adaptive bendable virtual tunnel routing protocol (ABVTR), which constructs a three-dimensional (3D) adaptive bendable virtual relay tunnel (3D-ABVRT) using Bézier curves. This tunnel restricts the propagation of route request messages, reducing redundant transmissions, and enhancing routing stability, particularly in sparsely connected UAV networks. ABVTR employs a piecewise function to align UAV movement with the tunnel's centerline, effectively minimizing deviations and reducing delays. Furthermore, it dynamically determines the next-hop node by considering movement direction, relative speed, and residual energy. The latter two factors are assessed using a S-function and an exponential function, respectively, to enhance link reliability and optimize energy distribution. This work advances the state-of-the-art by introducing a more adaptive, energy-efficient, and scalable routing solution for FANETs. The simulation results show that ABVTR significantly outperforms existing protocols (EARVRT, iPipe, HMGOC, CF-GPSR, FM-DT-GDR) in end-to-end delay, packet delivery ratio (PDR), and routing overhead. These enhancements position ABVTR as a highly promising solution for mission-critical FANETs application, enabling more resilient, scalable, and efficient aerial networks.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100922"},"PeriodicalIF":5.8,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143859967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security and trust using efficient privacy-preserving authentication in vehicular edge computing networks 在车载边缘计算网络中使用高效的隐私保护认证增强安全性和信任度
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-17 DOI: 10.1016/j.vehcom.2025.100921
Anwar Ghani , Saeed Ullah Jan , Shehzad Ashraf Chaudhry , Rashid Ahmad , Ashok Kumar Das , Do Hyeun Kim
The Internet of Vehicles (IoV) requires advanced safety, security, and services in Intelligent Transportation Systems (ITS). Frequent broadcast message intervals and Dedicated Short-Range Communication (DSRC) make validating messages in such short timeframes extremely challenging. Additionally, current authentication protocols cannot meet the demands of the environment due to high communication and computational overheads. Furthermore, lightweight authentication proposals have been put forth to solve the problem; however, such attempts cannot provide a sophisticated solution that can handle advanced security needs and suffer from accuracy issues. This article presents a two-factor authentication protocol using lightweight cryptographic operations such as one-way hashing and exclusive OR (XOR) with acceptable efficiency and security. The identities are generated using Physically Unclonable Functions (PUFs), passwords, and randomized nonces to ensure two-factor authentication. The proposal is rigorously verified through formal security analysis, confirming that the protocol is untraceable, anonymous, protects key secrecy, and is resistant to well-known attacks in the IoV domain. The performance analysis confirms its robustness and reliability, with 43.31% low energy consumption in terms of computation, communication, and support for more security requirements, making it a feasible solution for the IoV domain.
车联网(IoV)对智能交通系统(ITS)的安全性、安全性和服务提出了更高的要求。频繁的广播消息间隔和专用短程通信(DSRC)使得在如此短的时间内验证消息极具挑战性。此外,现有的认证协议由于通信和计算开销大,无法满足环境的要求。此外,还提出了轻量级认证方案来解决这个问题;然而,这样的尝试不能提供一个复杂的解决方案来处理高级安全需求,并受到准确性问题的影响。本文介绍了一种双因素身份验证协议,该协议使用轻量级加密操作,如单向散列和异或(XOR),具有可接受的效率和安全性。这些身份是使用物理不可克隆函数(puf)、密码和随机值生成的,以确保双因素身份验证。该提案通过正式的安全分析进行严格验证,确认该协议具有不可追踪性,匿名性,保护密钥保密性,并且可以抵抗IoV领域的众所周知的攻击。性能分析证实了该方案的鲁棒性和可靠性,在计算、通信和支持更多安全需求方面能耗低43.31%,是一种可行的车联网解决方案。
{"title":"Enhancing security and trust using efficient privacy-preserving authentication in vehicular edge computing networks","authors":"Anwar Ghani ,&nbsp;Saeed Ullah Jan ,&nbsp;Shehzad Ashraf Chaudhry ,&nbsp;Rashid Ahmad ,&nbsp;Ashok Kumar Das ,&nbsp;Do Hyeun Kim","doi":"10.1016/j.vehcom.2025.100921","DOIUrl":"10.1016/j.vehcom.2025.100921","url":null,"abstract":"<div><div>The Internet of Vehicles (IoV) requires advanced safety, security, and services in Intelligent Transportation Systems (ITS). Frequent broadcast message intervals and Dedicated Short-Range Communication (DSRC) make validating messages in such short timeframes extremely challenging. Additionally, current authentication protocols cannot meet the demands of the environment due to high communication and computational overheads. Furthermore, lightweight authentication proposals have been put forth to solve the problem; however, such attempts cannot provide a sophisticated solution that can handle advanced security needs and suffer from accuracy issues. This article presents a two-factor authentication protocol using lightweight cryptographic operations such as one-way hashing and exclusive OR (XOR) with acceptable efficiency and security. The identities are generated using Physically Unclonable Functions (PUFs), passwords, and randomized nonces to ensure two-factor authentication. The proposal is rigorously verified through formal security analysis, confirming that the protocol is untraceable, anonymous, protects key secrecy, and is resistant to well-known attacks in the IoV domain. The performance analysis confirms its robustness and reliability, with 43.31% low energy consumption in terms of computation, communication, and support for more security requirements, making it a feasible solution for the IoV domain.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100921"},"PeriodicalIF":5.8,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143855879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing the energy efficiency using M-PSO in multi-hop UAV-IRS network for improved post-disaster emergency communication services 在多跳无人机-红外系统网络中使用 M-PSO 实现能效最大化,以改进灾后应急通信服务
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-11 DOI: 10.1016/j.vehcom.2025.100920
Humairah Hamid, G.R. Begh
Natural disasters often damage the ground infrastructure, leading to communication failures that hamper emergency response efforts. Solutions dependent on ground-based infrastructure suffer from severe limitations in these scenarios owing to fixed positions, limited energy sources, and limited coverage. Existing methodologies, often relying on terrestrial relay points or fixed infrastructure, face challenges in adjusting to rapidly changing conditions in disaster areas, leading to ineffective energy consumption and limited communication range. To address this challenge, this work proposes a novel approach that employs Unmanned Aerial Vehicles (UAVs) alongside Intelligent Reflecting Surface (IRS) to deal with the connectivity challenges and provide energy-efficient communication services for Ground Users (GUs). The proposed framework includes a multi-hop communication model in which UAV-IRS units function as mobile relays, establishing strong connections between the affected area nodes and a temporary base station. We propose a Modified Particle Swarm Optimization (M-PSO) technique that optimally adjusts UAV placement and transmit power while the IRS phase shifts are independently optimized using Gradient Descent (GD) to enhance energy efficiency. Simulation results indicate that our setup significantly enhances communication capabilities in a disaster-stricken region, outperforming conventional methods for enhancing coverage and energy efficiency, thereby providing a resilient alternative for emergency communication in disaster-affected regions.
自然灾害往往破坏地面基础设施,导致通信故障,妨碍应急工作。在这些情况下,依赖地面基础设施的解决方案由于位置固定、能源有限和覆盖范围有限而受到严重限制。现有方法往往依赖于地面中继点或固定基础设施,在适应灾区迅速变化的条件方面面临挑战,导致能源消耗无效和通信范围有限。为了应对这一挑战,本工作提出了一种采用无人机(uav)和智能反射表面(IRS)来应对连接挑战并为地面用户(GUs)提供节能通信服务的新方法。提出的框架包括一个多跳通信模型,其中无人机- irs单元作为移动中继,在受影响区域节点和临时基站之间建立强连接。我们提出了一种改进的粒子群优化(M-PSO)技术,该技术可以优化调整无人机的位置和发射功率,同时使用梯度下降(GD)独立优化IRS相移以提高能效。仿真结果表明,我们的设置显著提高了受灾地区的通信能力,在提高覆盖范围和能源效率方面优于传统方法,从而为受灾地区的应急通信提供了一种有弹性的替代方案。
{"title":"Maximizing the energy efficiency using M-PSO in multi-hop UAV-IRS network for improved post-disaster emergency communication services","authors":"Humairah Hamid,&nbsp;G.R. Begh","doi":"10.1016/j.vehcom.2025.100920","DOIUrl":"10.1016/j.vehcom.2025.100920","url":null,"abstract":"<div><div>Natural disasters often damage the ground infrastructure, leading to communication failures that hamper emergency response efforts. Solutions dependent on ground-based infrastructure suffer from severe limitations in these scenarios owing to fixed positions, limited energy sources, and limited coverage. Existing methodologies, often relying on terrestrial relay points or fixed infrastructure, face challenges in adjusting to rapidly changing conditions in disaster areas, leading to ineffective energy consumption and limited communication range. To address this challenge, this work proposes a novel approach that employs Unmanned Aerial Vehicles (UAVs) alongside Intelligent Reflecting Surface (IRS) to deal with the connectivity challenges and provide energy-efficient communication services for Ground Users (GUs). The proposed framework includes a multi-hop communication model in which UAV-IRS units function as mobile relays, establishing strong connections between the affected area nodes and a temporary base station. We propose a Modified Particle Swarm Optimization (M-PSO) technique that optimally adjusts UAV placement and transmit power while the IRS phase shifts are independently optimized using Gradient Descent (GD) to enhance energy efficiency. Simulation results indicate that our setup significantly enhances communication capabilities in a disaster-stricken region, outperforming conventional methods for enhancing coverage and energy efficiency, thereby providing a resilient alternative for emergency communication in disaster-affected regions.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"53 ","pages":"Article 100920"},"PeriodicalIF":5.8,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143828420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint carrier frequency offset, doubly selective channel estimation and data detection for RIS assisted MIMO OFDMA uplink system RIS辅助MIMO OFDMA上行系统的联合载波频偏、双选择信道估计和数据检测
IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-04-11 DOI: 10.1016/j.vehcom.2025.100916
A.G. Murali Krishna , P.S. Sanoopkumar , S.M. Sameer
With the presence of an array of passive elements embedded in a reconfigurable intelligent surface (RIS), estimation of time-varying channels between a fast-moving user and the fixed base station (BS) is more challenging than conventional static channels. In this paper, we propose a joint technique for the estimation of carrier frequency offset (CFO) and doubly selective channel (DSC), and data detection in the RIS-assisted multiple input multiple output (MIMO) orthogonal frequency division multiple access (OFDMA) uplink system. The time variations of the channel within the OFDMA symbol are represented using the basis expansion model (BEM), significantly reducing the number of estimated parameters. An autoregressive (AR) model is used to characterize the variations in BEM coefficients and CFOs over successive OFDMA symbols. A novel technique of combining the Schmidt extended Kalman filtering (SEKF) and Gaussian particle filtering (GPF) integrated with an iterative detector and decoder (IDD) receiver structure (IDD-SKGPF) is proposed to estimate the BEM coefficients, CFOs and to detect the symbols in two stages. Performance of the proposed method is evaluated using normalized mean square error (NMSE) and compared with the derived Bayesian Cramer-Rao bound (BCRB) and modified BCRB. Furthermore, the reflection coefficient is optimized in the time domain by maximizing the achievable rate to demonstrate that the exploitation of RIS may result in significant bit error rate (BER) performance improvement of 6dB in SNR over non optimized RIS scenario even under high mobility scenarios.
由于在可重构智能表面(RIS)中嵌入了一组无源元件,快速移动用户与固定基站(BS)之间时变信道的估计比传统的静态信道更具挑战性。在本文中,我们提出了一种用于ris辅助多输入多输出(MIMO)正交频分多址(OFDMA)上行系统中载波频偏(CFO)和双选择信道(DSC)估计以及数据检测的联合技术。使用基展开模型(BEM)表示OFDMA符号内信道的时间变化,大大减少了估计参数的数量。使用自回归(AR)模型来表征连续OFDMA符号上BEM系数和cfo的变化。提出了一种结合施密特扩展卡尔曼滤波(SEKF)和高斯粒子滤波(GPF)和迭代检波解码器(IDD)接收机结构(IDD- skgpf)的新技术,用于估计边界元系数、CFOs和分两阶段检测符号。采用归一化均方误差(NMSE)评价了该方法的性能,并与推导的贝叶斯Cramer-Rao界(BCRB)和改进的BCRB进行了比较。此外,通过最大化可实现的速率,在时域上优化反射系数,以证明即使在高移动场景下,RIS的利用也可能导致在信噪比下比未优化的RIS方案显著提高6dB的误码率(BER)性能。
{"title":"Joint carrier frequency offset, doubly selective channel estimation and data detection for RIS assisted MIMO OFDMA uplink system","authors":"A.G. Murali Krishna ,&nbsp;P.S. Sanoopkumar ,&nbsp;S.M. Sameer","doi":"10.1016/j.vehcom.2025.100916","DOIUrl":"10.1016/j.vehcom.2025.100916","url":null,"abstract":"<div><div>With the presence of an array of passive elements embedded in a reconfigurable intelligent surface (RIS), estimation of time-varying channels between a fast-moving user and the fixed base station (BS) is more challenging than conventional static channels. In this paper, we propose a joint technique for the estimation of carrier frequency offset (CFO) and doubly selective channel (DSC), and data detection in the RIS-assisted multiple input multiple output (MIMO) orthogonal frequency division multiple access (OFDMA) uplink system. The time variations of the channel within the OFDMA symbol are represented using the basis expansion model (BEM), significantly reducing the number of estimated parameters. An autoregressive (AR) model is used to characterize the variations in BEM coefficients and CFOs over successive OFDMA symbols. A novel technique of combining the Schmidt extended Kalman filtering (SEKF) and Gaussian particle filtering (GPF) integrated with an iterative detector and decoder (IDD) receiver structure (IDD-SKGPF) is proposed to estimate the BEM coefficients, CFOs and to detect the symbols in two stages. Performance of the proposed method is evaluated using normalized mean square error (NMSE) and compared with the derived Bayesian Cramer-Rao bound (BCRB) and modified BCRB. Furthermore, the reflection coefficient is optimized in the time domain by maximizing the achievable rate to demonstrate that the exploitation of RIS may result in significant bit error rate (BER) performance improvement of <span><math><mn>6</mn><mi>d</mi><mi>B</mi></math></span> in SNR over non optimized RIS scenario even under high mobility scenarios.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"53 ","pages":"Article 100916"},"PeriodicalIF":5.8,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143828418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vehicular Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1