Pub Date : 2024-03-15DOI: 10.1016/j.vehcom.2024.100764
Sushovan Khatua , Anwesha Mukherjee , Debashis De
This paper proposes a new architecture Social Vehicular Edge Computing (SoVEC) by integrating three domains: social network, vehicular ad-hoc network, and mobile edge computing. The users access various mobile applications and share various types of information on the social network during travel time. Using SoVEC three categories of social networks are generated based on the type of information shared among the users such as traffic information, professional information, and personal interests. To reach the destination in minimal time, this paper proposes an optimum route selection strategy based on TOPSIS method and genetic algorithm. The SoVEC is simulated using the network simulator Qualnet 7, and average delay, jitter, and throughput are determined. A case study of generating social network based on road traffic-related information is also demonstrated. Finally, the effectiveness of the proposed approach for selecting the optimum route is assessed, and the results present that the proposed method outperforms the existing algorithms.
{"title":"SoVEC: Social vehicular edge computing-based optimum route selection","authors":"Sushovan Khatua , Anwesha Mukherjee , Debashis De","doi":"10.1016/j.vehcom.2024.100764","DOIUrl":"10.1016/j.vehcom.2024.100764","url":null,"abstract":"<div><p>This paper proposes a new architecture <em><u>So</u>cial <u>V</u>ehicular <u>E</u>dge <u>C</u>omputing (SoVEC)</em> by integrating three domains: social network, vehicular ad-hoc network, and mobile edge computing. The users access various mobile applications and share various types of information on the social network during travel time. Using SoVEC three categories of social networks are generated based on the type of information shared among the users such as traffic information, professional information, and personal interests. To reach the destination in minimal time, this paper proposes an optimum route selection strategy based on TOPSIS method and genetic algorithm. The SoVEC is simulated using the network simulator Qualnet 7, and average delay, jitter, and throughput are determined. A case study of generating social network based on road traffic-related information is also demonstrated. Finally, the effectiveness of the proposed approach for selecting the optimum route is assessed, and the results present that the proposed method outperforms the existing algorithms.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100764"},"PeriodicalIF":6.7,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140173300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emergence of the Vehicular Ad-hoc Networks (VANETs) has greatly enhanced the efficiency and safety of transportation systems. However, due to the dynamicness and openness of vehicular networks, it is vulnerable for VANETs to confront various security threats. The dissemination of disinformation and the occurrence of attacks within these networks can result in severe damage and compromise the overall security of transportation systems. To mitigate such challenges, this paper presents an efficient certificateless aggregate signature scheme with dynamic revocation in VANETs. Taking use of the early-stopping factorial bitwise divisions (EFBD) algorithm, it achieves the invalid signatures tracking, and revokes the malicious vehicles dynamically. In addition, by combining the fingerprint counting bloom filter (FP-CBF), the trust assessment mechanism and the cloud server, it enables the vehicle to remedy its incorrect signatures. At last, through the comprehensive security and performance analysis, it demonstrates that this protocol enjoys improved communication security and computational efficiency.
{"title":"DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks","authors":"Rui Guo , Ruihan Dong , Xiong Li , Yinghui Zhang , Dong Zheng","doi":"10.1016/j.vehcom.2024.100763","DOIUrl":"10.1016/j.vehcom.2024.100763","url":null,"abstract":"<div><p>The emergence of the Vehicular Ad-hoc Networks (VANETs) has greatly enhanced the efficiency and safety of transportation systems. However, due to the dynamicness and openness of vehicular networks, it is vulnerable for VANETs to confront various security threats. The dissemination of disinformation and the occurrence of attacks within these networks can result in severe damage and compromise the overall security of transportation systems. To mitigate such challenges, this paper presents an efficient certificateless aggregate signature scheme with dynamic revocation in VANETs. Taking use of the early-stopping factorial bitwise divisions (EFBD) algorithm, it achieves the invalid signatures tracking, and revokes the malicious vehicles dynamically. In addition, by combining the fingerprint counting bloom filter (FP-CBF), the trust assessment mechanism and the cloud server, it enables the vehicle to remedy its incorrect signatures. At last, through the comprehensive security and performance analysis, it demonstrates that this protocol enjoys improved communication security and computational efficiency.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100763"},"PeriodicalIF":6.7,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140173238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1016/j.vehcom.2024.100744
Maximilian Bauder , Andreas Festag , Tibor Kubjatko , Hans-Georg Schweiger
Cooperative Intelligent Transportation Systems have achieved a mature technology stage and are in an early phase of mass deployment in Europe. Relying on Vehicle-to-X communication, these systems were primarily developed to improve traffic safety, efficiency, and driving comfort. However, they also offer great opportunities for other use cases. One of them is forensic accident analysis, where the received data provide details about the status of other traffic participants, give insights into the accident scenario, and therefore help in understanding accident causes. A high accuracy of the sent information is essential: For safety use cases, such as traffic jam warning, a poor accuracy of the data may result in wrong driver information, undermine the usability of the system and even create new safety risks. For accident analysis, a low accuracy may prevent the correct reconstruction of an accident. This paper presents an experimental study of the first generation of Cooperative Intelligent Transportation Systems in Europe. The results indicate a high accuracy for most of the data fields in the Vehicle-to-X messages, namely speed, acceleration, heading and yaw rate information, which meet the accuracy requirements for safety use cases and accident analysis. In contrast, the position data, which are also carried in the messages, have larger errors. Specifically, we observed that the lateral position still has an acceptable accuracy. The error of the longitudinal position is larger and may compromise safety use cases with high accuracy requirements. Even with limited accuracy, the data provide a high value for the accident analysis. Since we also found that the accuracy of the data increases for newer vehicle models, we presume that Vehicle-to-X data have the potential for exact accident reconstruction.
合作式智能交通系统的技术已经成熟,在欧洲处于大规模部署的早期阶段。这些系统依靠车对车通信技术,主要用于提高交通安全、效率和驾驶舒适度。不过,它们也为其他用例提供了巨大的机会。其中之一是法医事故分析,接收到的数据可提供有关其他交通参与者状态的详细信息,让人们深入了解事故场景,从而有助于了解事故原因。发送信息的高准确性至关重要:对于交通堵塞预警等安全用例而言,数据准确度低可能会导致错误的驾驶员信息,影响系统的可用性,甚至造成新的安全风险。对于事故分析而言,低精度可能会妨碍事故的正确重建。本文介绍了对欧洲第一代合作式智能交通系统的实验研究。研究结果表明,车辆对 X 信息中的大部分数据字段(即速度、加速度、航向和偏航率信息)都具有很高的精度,符合安全用例和事故分析的精度要求。相比之下,同样包含在信息中的位置数据误差较大。具体来说,我们观察到横向位置的准确度仍然可以接受。纵向位置的误差较大,可能会影响对精度要求较高的安全使用案例。即使精度有限,这些数据也能为事故分析提供较高的价值。我们还发现,对于较新的车辆型号,数据的准确性也会提高,因此我们推测 Vehicle-to-X 数据具有准确重建事故的潜力。
{"title":"Data accuracy in Vehicle-to-X cooperative awareness messages: An experimental study for the first commercial deployment of C-ITS in Europe","authors":"Maximilian Bauder , Andreas Festag , Tibor Kubjatko , Hans-Georg Schweiger","doi":"10.1016/j.vehcom.2024.100744","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100744","url":null,"abstract":"<div><p>Cooperative Intelligent Transportation Systems have achieved a mature technology stage and are in an early phase of mass deployment in Europe. Relying on Vehicle-to-X communication, these systems were primarily developed to improve traffic safety, efficiency, and driving comfort. However, they also offer great opportunities for other use cases. One of them is forensic accident analysis, where the received data provide details about the status of other traffic participants, give insights into the accident scenario, and therefore help in understanding accident causes. A high accuracy of the sent information is essential: For safety use cases, such as traffic jam warning, a poor accuracy of the data may result in wrong driver information, undermine the usability of the system and even create new safety risks. For accident analysis, a low accuracy may prevent the correct reconstruction of an accident. This paper presents an experimental study of the first generation of Cooperative Intelligent Transportation Systems in Europe. The results indicate a high accuracy for most of the data fields in the Vehicle-to-X messages, namely speed, acceleration, heading and yaw rate information, which meet the accuracy requirements for safety use cases and accident analysis. In contrast, the position data, which are also carried in the messages, have larger errors. Specifically, we observed that the lateral position still has an acceptable accuracy. The error of the longitudinal position is larger and may compromise safety use cases with high accuracy requirements. Even with limited accuracy, the data provide a high value for the accident analysis. Since we also found that the accuracy of the data increases for newer vehicle models, we presume that Vehicle-to-X data have the potential for exact accident reconstruction.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100744"},"PeriodicalIF":6.7,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000196/pdfft?md5=cf7428d15ec06780200a6433b03dc530&pid=1-s2.0-S2214209624000196-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140121900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-05DOI: 10.1016/j.vehcom.2024.100749
Xuan Zhu , Xiaodong Ji , Senyi Shi , Jian-Feng Gu
This paper studies a full-duplex (FD) amplify-and-forward relaying, where a fixed-wing unmanned aerial vehicle (UAV) is dispatched as a mobile relay to serve a source-destination communication pair so as to satisfy their service requirement. Here, the UAV relay flies in a circular path and hence it must continuously change its heading of flight which leads to a bank angle of the aircraft. In order to ensure flight safety, therefore, a bank angle limit is imposed on the UAV relay. By considering a practical FD relaying, namely, there exists both residual loop interference (RLI) and processing time-delay at the relay side, novel signal to interference plus noise ratio (SINR) received at the destination is analyzed, giving a closed-form expression in addition to a concise lower-bound. Armed with the SINR analysis, the size of data received by the destination during a period of flight time of the UAV is calculated, leading to a closed-form lower-bound of the size of data. Taking bank angle limit into consideration and using the calculated lower-bound of the size of data, an optimization problem with the purpose of energy conservation is solved, leading to a novel method for joint adjustment of the UAV's flight parameters. Computer simulation experiments are conducted, and the results demonstrated that the proposed optimization method performs better in terms of energy conservation compared to the benchmark techniques regardless of the value of RLI and/or the service requirement of the source-destination communication pair.
{"title":"On energy conservation for fixed-wing UAV assisted practical full-duplex relaying with service requirement and bank angle limit","authors":"Xuan Zhu , Xiaodong Ji , Senyi Shi , Jian-Feng Gu","doi":"10.1016/j.vehcom.2024.100749","DOIUrl":"10.1016/j.vehcom.2024.100749","url":null,"abstract":"<div><p>This paper studies a full-duplex (FD) amplify-and-forward relaying, where a fixed-wing unmanned aerial vehicle (UAV) is dispatched as a mobile relay to serve a source-destination communication pair so as to satisfy their service requirement. Here, the UAV relay flies in a circular path and hence it must continuously change its heading of flight which leads to a bank angle of the aircraft. In order to ensure flight safety, therefore, a bank angle limit is imposed on the UAV relay. By considering a practical FD relaying, namely, there exists both residual loop interference (RLI) and processing time-delay at the relay side, novel signal to interference plus noise ratio (SINR) received at the destination is analyzed, giving a closed-form expression in addition to a concise lower-bound. Armed with the SINR analysis, the size of data received by the destination during a period of flight time of the UAV is calculated, leading to a closed-form lower-bound of the size of data. Taking bank angle limit into consideration and using the calculated lower-bound of the size of data, an optimization problem with the purpose of energy conservation is solved, leading to a novel method for joint adjustment of the UAV's flight parameters. Computer simulation experiments are conducted, and the results demonstrated that the proposed optimization method performs better in terms of energy conservation compared to the benchmark techniques regardless of the value of RLI and/or the service requirement of the source-destination communication pair.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100749"},"PeriodicalIF":6.7,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140046061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.1016/j.vehcom.2024.100759
Engin Zeydan , Josep Mangues-Bafalluy , Suayb Arslan , Yekta Turk
Identity and access management frameworks address user access rights and data governance for organizations, vendors and users. In response to the problems associated with centralized authorities (e.g. single point of failure, limited scalability, lack of user control), new identity management models have emerged, such as Self-Sovereign Identity (SSI), which relies on verifiable data registers to validate Decentralized Identifier (DIDs) and can be achieved in many different ways, e.g. through Distributed Ledger Technology (DLT), distributed databases or other decentralized systems. The main goal of SSI is to enable users to take control of managing their data shared with different services. In this paper, we examine a possible application of the SSI concept to aerial base station (ABS)- integrated networks. The paper presents the effective use of DID implementation to provide a secure and decentralized way to create, associate and verify credentials and identities of ABSs, ensuring secure communication between Ground Base stations (GBSs) and other nodes in the network in a multi-operator scenario. In the numerical results, the average values of various metrics (namely, the average credential presentation time, the average credential offer time, the average DIDcomm connection creation time, the average DIDcomm signing time, and the average DIDcomm revoke credential time) related to credential operations in a DID management system are given for three different number of requests (50 K, 75 K, and 100 K). We have also provided the values of the different status codes that occurred in 100 K operations in the same DID management system. Towards the end of the paper, a comparison is made between SSI-based and Non-fungible token (NFT)-based blockchain solutions, also discussing the challenges and future directions of SSI solutions in the context of ABS-integrated networks.
身份和访问管理框架解决了组织、供应商和用户的用户访问权限和数据管理问题。为了应对与集中式机构相关的问题(如单点故障、可扩展性有限、缺乏用户控制),出现了新的身份管理模式,如自主身份(SSI),它依赖于可验证的数据登记册来验证分散式标识符(DID),可以通过多种不同方式实现,如通过分布式账本技术(DLT)、分布式数据库或其他分散式系统。SSI 的主要目标是让用户能够控制管理他们与不同服务共享的数据。在本文中,我们探讨了将 SSI 概念应用于空中基站集成网络的可能性。本文介绍了如何有效利用 DID 实现提供安全和分散的方式来创建、关联和验证 ABS 的凭证和身份,确保地面基站(GBS)和网络中其他节点之间在多运营商场景下的安全通信。在数值结果中,给出了三种不同请求数(50 K、75 K 和 100 K)下 DID 管理系统中与凭证操作相关的各种指标(即平均凭证出示时间、平均凭证提供时间、平均 DIDcomm 连接创建时间、平均 DIDcomm 签名时间和平均 DIDcomm 撤销凭证时间)的平均值。我们还提供了同一 DID 管理系统 100 K 次操作中出现的不同状态代码的值。在本文的最后,我们对基于 SSI 的区块链解决方案和基于不可篡改代币(NFT)的区块链解决方案进行了比较,还讨论了在 ABS 集成网络背景下 SSI 解决方案面临的挑战和未来发展方向。
{"title":"Blockchain-based self-sovereign identity solution for aerial base station integrated networks","authors":"Engin Zeydan , Josep Mangues-Bafalluy , Suayb Arslan , Yekta Turk","doi":"10.1016/j.vehcom.2024.100759","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100759","url":null,"abstract":"<div><p>Identity and access management frameworks address user access rights and data governance for organizations, vendors and users. In response to the problems associated with centralized authorities (e.g. single point of failure, limited scalability, lack of user control), new identity management models have emerged, such as Self-Sovereign Identity (SSI), which relies on verifiable data registers to validate Decentralized Identifier (DIDs) and can be achieved in many different ways, e.g. through Distributed Ledger Technology (DLT), distributed databases or other decentralized systems. The main goal of SSI is to enable users to take control of managing their data shared with different services. In this paper, we examine a possible application of the SSI concept to aerial base station (ABS)- integrated networks. The paper presents the effective use of DID implementation to provide a secure and decentralized way to create, associate and verify credentials and identities of ABSs, ensuring secure communication between Ground Base stations (GBSs) and other nodes in the network in a multi-operator scenario. In the numerical results, the average values of various metrics (namely, the average credential presentation time, the average credential offer time, the average DIDcomm connection creation time, the average DIDcomm signing time, and the average DIDcomm revoke credential time) related to credential operations in a DID management system are given for three different number of requests (50 K, 75 K, and 100 K). We have also provided the values of the different status codes that occurred in 100 K operations in the same DID management system. Towards the end of the paper, a comparison is made between SSI-based and Non-fungible token (NFT)-based blockchain solutions, also discussing the challenges and future directions of SSI solutions in the context of ABS-integrated networks.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100759"},"PeriodicalIF":6.7,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.1016/j.vehcom.2024.100748
Wenlu Wang , Bowen Wang , Yanjing Sun
Unmanned Aerial Vehicles (UAVs) can effectively and reliably complete aerial tasks in various fields. However, the high-speed mobility of UAVs and the 6G ultra-dense heterogeneous network architecture in future will lead to frequent handover of UAVs during aerial tasks in cellular networks, increasing the potential service interruption rate. Therefore, there is an urgent requirement to address the lack of service adaptability in the overall time-space dimension. To achieve the seamless handover in highly dynamic and stochastic scenarios, we firstly transform the handover problem into a stable matching model. We then extend the stable matching of single time slot to the overall time-space dimension, and transform the dynamically changing time-space information into the preference relations evolution. By flexibly adapting the evolution of the preference lists to current network topology, we propose a Dynamic Stable Matching based Adaptive Handover (DSMAH) algorithm to find stable matching efficiently in a dynamic environment. Simulation results show that the proposed algorithm can achieve a better trade-off between communication quality, handover frequency, and convergence speed and significantly improves the stability of the cellular-connected network as compared to benchmark schemes. The proposed scheme not only effectively addresses the challenges posed by frequent handovers and ping-pong effect, but also shows its notable advantages in dynamic environments.
{"title":"Stable matching with evolving preference for adaptive handover in cellular-connected UAV networks","authors":"Wenlu Wang , Bowen Wang , Yanjing Sun","doi":"10.1016/j.vehcom.2024.100748","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100748","url":null,"abstract":"<div><p>Unmanned Aerial Vehicles (UAVs) can effectively and reliably complete aerial tasks in various fields. However, the high-speed mobility of UAVs and the 6G ultra-dense heterogeneous network architecture in future will lead to frequent handover of UAVs during aerial tasks in cellular networks, increasing the potential service interruption rate. Therefore, there is an urgent requirement to address the lack of service adaptability in the overall time-space dimension. To achieve the seamless handover in highly dynamic and stochastic scenarios, we firstly transform the handover problem into a stable matching model. We then extend the stable matching of single time slot to the overall time-space dimension, and transform the dynamically changing time-space information into the preference relations evolution. By flexibly adapting the evolution of the preference lists to current network topology, we propose a Dynamic Stable Matching based Adaptive Handover (DSMAH) algorithm to find stable matching efficiently in a dynamic environment. Simulation results show that the proposed algorithm can achieve a better trade-off between communication quality, handover frequency, and convergence speed and significantly improves the stability of the cellular-connected network as compared to benchmark schemes. The proposed scheme not only effectively addresses the challenges posed by frequent handovers and ping-pong effect, but also shows its notable advantages in dynamic environments.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100748"},"PeriodicalIF":6.7,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-28DOI: 10.1016/j.vehcom.2024.100745
Ali Jalooli , Alireza Marefat
The new era of the Internet of Things is promoting the evolution of self-driving vehicles into connected and autonomous vehicles (CAVs). The deployment of CAVs in smart cities is highly dependent on the performance of their underlying networks known as vehicular networks. Designing an effective clustering approach is of great importance in such dynamic networks as it can significantly improve the reliability and scalability of the routing protocols. In this paper, we consider a heterogeneous vehicular network architecture that supports vehicle-to-vehicle and vehicle-to-infrastructure communications based on IEEE 802.11p and cellular networks (LTE/5G) with direct communications, namely cellular vehicle-to-everything (C-V2X) technologies. We introduce a novel clustering scheme for real-time routing based on the proposed network architecture. We formulate the problem of optimal clustering for connected and autonomous vehicles (OCCAV) and show that the problem is NP-hard. We then develop a clusters' stability maximization algorithm (CSM), which utilizes the stability degree of vehicles over a prediction horizon to efficiently solve the optimization problem in real-time. The algorithm is used within a rolling horizon framework for continuously solving the problem, making the resulting clusters adaptive to future traffic dynamics. We propose a hybrid routing protocol based on our clustering scheme, aiming to improve the packet delivery ratio and reduce the average delivery delay. For evaluation purposes, we use extensive realistic simulations based on mobility scenarios validated using real vehicular trajectories. The results demonstrate that our clustering scheme improves the alternative algorithms in terms of the average cluster head duration, cluster head change rate, cluster member duration, and overall stability by 61%, 62%, 44%, and 52%, respectively. CSM also outperforms clustering overhead by 54%. Compared to the other cluster-based routing, our scheme also achieves a higher packet delivery ratio by up to 30%, and a lower average delay by up to 52%. To provide an in-depth analysis of the optimality of our scheme and its alternatives, we also use the Gurobi optimizer to find an optimal solution to the OCCAV problem. The results suggest that our scheme can achieve near-optimal cluster stability.
{"title":"Cluster stability-driven optimization for enhanced routing in heterogeneous vehicular networks","authors":"Ali Jalooli , Alireza Marefat","doi":"10.1016/j.vehcom.2024.100745","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100745","url":null,"abstract":"<div><p>The new era of the Internet of Things is promoting the evolution of self-driving vehicles into connected and autonomous vehicles (CAVs). The deployment of CAVs in smart cities is highly dependent on the performance of their underlying networks known as vehicular networks. Designing an effective clustering approach is of great importance in such dynamic networks as it can significantly improve the reliability and scalability of the routing protocols. In this paper, we consider a heterogeneous vehicular network architecture that supports vehicle-to-vehicle and vehicle-to-infrastructure communications based on IEEE 802.11p and cellular networks (LTE/5G) with direct communications, namely cellular vehicle-to-everything (C-V2X) technologies. We introduce a novel clustering scheme for real-time routing based on the proposed network architecture. We formulate the problem of optimal clustering for connected and autonomous vehicles (OCCAV) and show that the problem is NP-hard. We then develop a clusters' stability maximization algorithm (CSM), which utilizes the stability degree of vehicles over a prediction horizon to efficiently solve the optimization problem in real-time. The algorithm is used within a rolling horizon framework for continuously solving the problem, making the resulting clusters adaptive to future traffic dynamics. We propose a hybrid routing protocol based on our clustering scheme, aiming to improve the packet delivery ratio and reduce the average delivery delay. For evaluation purposes, we use extensive realistic simulations based on mobility scenarios validated using real vehicular trajectories. The results demonstrate that our clustering scheme improves the alternative algorithms in terms of the average cluster head duration, cluster head change rate, cluster member duration, and overall stability by 61%, 62%, 44%, and 52%, respectively. CSM also outperforms clustering overhead by 54%. Compared to the other cluster-based routing, our scheme also achieves a higher packet delivery ratio by up to 30%, and a lower average delay by up to 52%. To provide an in-depth analysis of the optimality of our scheme and its alternatives, we also use the Gurobi optimizer to find an optimal solution to the OCCAV problem. The results suggest that our scheme can achieve near-optimal cluster stability.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100745"},"PeriodicalIF":6.7,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139998865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-27DOI: 10.1016/j.vehcom.2024.100746
José Antonio Sánchez, David Melendi, Roberto García, Xabiel G Pañeda, Víctor Corcoba, Dan García
Nowadays, the increase in the number of vehicles on the roads has brought about several problems such as an increase in traffic congestion and, consequently, in polluting emissions. These problems are especially severe in urban environments. It is crucial to perform a sustainable urban mobility plan to improve the traffic and therefore, reduce the negative impacts caused by traffic jams. To this end, this paper presents a smart mobility plan that employs a collaborative driving strategy. Each vehicle tries to infer traffic conditions using its own status and the information shared by other peers. Using a fuzzy logic approach, vehicles perform decisions in accordance with the traffic levels inferred in real time. The designed mobility plan has been tested through a simulation environment and considering two types of urban areas in a typical European city (a peripheral area and a more congested city centre). If we compare the performance of traffic with and without the system designed, with our approach average speeds increase by up to 11.20 % and CO2 emissions are reduced by up to 12.27 %. Thus, our results show that the mobility plan has helped to enhance the ability of cars to be able to solve problems caused by traffic congestion and traffic jams.
{"title":"Distributed and collaborative system to improve traffic conditions using fuzzy logic and V2X communications","authors":"José Antonio Sánchez, David Melendi, Roberto García, Xabiel G Pañeda, Víctor Corcoba, Dan García","doi":"10.1016/j.vehcom.2024.100746","DOIUrl":"10.1016/j.vehcom.2024.100746","url":null,"abstract":"<div><p>Nowadays, the increase in the number of vehicles on the roads has brought about several problems such as an increase in traffic congestion and, consequently, in polluting emissions. These problems are especially severe in urban environments. It is crucial to perform a sustainable urban mobility plan to improve the traffic and therefore, reduce the negative impacts caused by traffic jams. To this end, this paper presents a smart mobility plan that employs a collaborative driving strategy. Each vehicle tries to infer traffic conditions using its own status and the information shared by other peers. Using a fuzzy logic approach, vehicles perform decisions in accordance with the traffic levels inferred in real time. The designed mobility plan has been tested through a simulation environment and considering two types of urban areas in a typical European city (a peripheral area and a more congested city centre). If we compare the performance of traffic with and without the system designed, with our approach average speeds increase by up to 11.20 % and CO<sub>2</sub> emissions are reduced by up to 12.27 %. Thus, our results show that the mobility plan has helped to enhance the ability of cars to be able to solve problems caused by traffic congestion and traffic jams.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100746"},"PeriodicalIF":6.7,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000214/pdfft?md5=0ad507bad4f079727d5ff5da5b28e826&pid=1-s2.0-S2214209624000214-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139994420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-07DOI: 10.1016/j.vehcom.2024.100741
Memoona Sadaf , Zafar Iqbal , Zahid Anwar , Umara Noor , Mohammad Imran , Thippa Reddy Gadekallu
Every year, millions of people lose their lives due to road accidents, and countless others suffer from severe injuries. Moreover, these accidents cause economic losses worldwide. Primary reasons for these accidents include over speeding, doziness, distracted driving, drugs, and psychoactive substances. Many efforts are made to automate vehicles to save losses. Autonomous vehicles are expected to revolutionize transportation by reducing the likelihood of accidents resulting from human mistakes, increasing efficiency, and reducing congestion. Like any other computer-based system, autonomous vehicles can be susceptible to attacks that could compromise their safety, security, and privacy. Denial-of-Service (DoS) attack is a cyberattack that aims to disturb a network's typical or standard functioning. A successful DoS attack could cause the autonomous vehicle to malfunction or stop functioning altogether, leading to accidents or other safety risks. To mitigate the risk of DoS attacks, protective measures that have been proposed include encryption, firewalls, and intrusion detection systems. The previous approaches to detect and prevent Denial-of-Service (DoS) attacks in autonomous vehicles are associated with imprecise and inaccurate results and high computational costs. The main goal of this research is to present a novel approach that utilizes fuzzy logic to effectively detect and mitigate Denial of Service (DoS) attacks. The proposed approach has achieved 99.4% detection and prevention rate by attaining optimal levels of security with testing error upto 0.6%. Furthermore, comprehensive execution and validation of security measures have been conducted by adopting the attack surface and rules representation. The presented approach delivers more precise and accurate results while maintaining a lower computational cost than existing methodologies. In future the proposed scheme can be used for detection of other attacks in autonomous vehicles by incorporating relevant input variables and their respective ranges.
每年都有数百万人因交通事故丧生,还有无数人受到严重伤害。此外,这些事故还在全球范围内造成经济损失。造成这些事故的主要原因包括超速、打瞌睡、分心驾驶、毒品和精神活性物质。为了挽回损失,人们正在努力实现车辆自动化。自动驾驶汽车有望通过降低人为失误导致事故的可能性、提高效率和减少拥堵来彻底改变交通。与任何其他基于计算机的系统一样,自动驾驶汽车也可能受到攻击,从而危及其安全、安保和隐私。拒绝服务(DoS)攻击是一种网络攻击,旨在干扰网络的典型或标准功能。成功的 DoS 攻击会导致自动驾驶汽车出现故障或完全停止运行,从而引发事故或其他安全风险。为了降低 DoS 攻击的风险,已经提出的保护措施包括加密、防火墙和入侵检测系统。以往检测和预防自动驾驶汽车中的拒绝服务(DoS)攻击的方法都存在结果不精确、不准确和计算成本高等问题。本研究的主要目标是提出一种利用模糊逻辑有效检测和缓解拒绝服务(DoS)攻击的新方法。所提出的方法实现了 99.4% 的检测率和预防率,达到了最佳安全水平,检测误差小于 0.6%。此外,通过采用攻击面和规则表示法,对安全措施进行了全面的执行和验证。与现有方法相比,所提出的方法在保持较低计算成本的同时,还能提供更精确、更准确的结果。未来,通过纳入相关输入变量及其各自的范围,所提出的方案还可用于检测自动驾驶汽车中的其他攻击。
{"title":"A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic","authors":"Memoona Sadaf , Zafar Iqbal , Zahid Anwar , Umara Noor , Mohammad Imran , Thippa Reddy Gadekallu","doi":"10.1016/j.vehcom.2024.100741","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100741","url":null,"abstract":"<div><p>Every year, millions of people lose their lives due to road accidents, and countless others suffer from severe injuries. Moreover, these accidents cause economic losses worldwide. Primary reasons for these accidents include over speeding, doziness, distracted driving, drugs, and psychoactive substances. Many efforts are made to automate vehicles to save losses. Autonomous vehicles are expected to revolutionize transportation by reducing the likelihood of accidents resulting from human mistakes, increasing efficiency, and reducing congestion. Like any other computer-based system, autonomous vehicles can be susceptible to attacks that could compromise their safety, security, and privacy. Denial-of-Service (DoS) attack is a cyberattack that aims to disturb a network's typical or standard functioning. A successful DoS attack could cause the autonomous vehicle to malfunction or stop functioning altogether, leading to accidents or other safety risks. To mitigate the risk of DoS attacks, protective measures that have been proposed include encryption, firewalls, and intrusion detection systems. The previous approaches to detect and prevent Denial-of-Service (DoS) attacks in autonomous vehicles are associated with imprecise and inaccurate results and high computational costs. The main goal of this research is to present a novel approach that utilizes fuzzy logic to effectively detect and mitigate Denial of Service (DoS) attacks. The proposed approach has achieved 99.4% detection and prevention rate by attaining optimal levels of security with testing error upto 0.6%. Furthermore, comprehensive execution and validation of security measures have been conducted by adopting the attack surface and rules representation. The presented approach delivers more precise and accurate results while maintaining a lower computational cost than existing methodologies. In future the proposed scheme can be used for detection of other attacks in autonomous vehicles by incorporating relevant input variables and their respective ranges.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"46 ","pages":"Article 100741"},"PeriodicalIF":6.7,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139738681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-01DOI: 10.1016/j.vehcom.2023.100660
Maria Christina Blessy A , Brindha S
Vehicular Ad-hoc Network (VANET) is a type of wireless network that allows communication among vehicles and roadside units to develop advanced intelligent transportation systems. The success of VANETs depends on the stability of wireless communication, among vehicles, which is challenging to achieve due to high vehicle speed, rapidly changing topology, and unstable communication links. Moreover, the instability of the network caused by the mobile nature of vehicles in VANET reduces the performance of the network. Clustering in VANETs is a crucial technique that organizes the network and forms the basis of the routing protocol. Clustering algorithms are designed for VANETs to work efficiently and require several phases that must be integrated into the process before a clustering decision can be made. Therefore, this paper presents a novel Intelligent Fuzzy Bald Eagle (IFBE) optimization to enhance the performance of VANETs by optimizing the cluster head selection (CHS) process. The experimental results prove that the IFBE approach outperforms other existing mechanisms in terms of energy consumption, end-to-end delay, and packet delivery ratio. The proposed mechanism utilizes an intelligent fuzzy system to optimize the CHS process. The fuzzy system uses a set of rules and membership functions to evaluate the candidate nodes' suitability for being cluster heads. The Bald Eagle Search (BES) optimization meta-heuristic algorithm is used to find the optimal values for the fuzzy system's membership functions. The proposed mechanism was evaluated using the MATLAB simulator. Finally, the experimental result proved that the IFBE approach achieved minimum delay and energy consumption of 13.58 ms, and 15.5 J, and higher clustering efficiency and packet delivery rate of 94.15% and 97.65% respectively, which show that it performs better than other existing approaches.
{"title":"Maximizing VANET performance in cluster head selection using Intelligent Fuzzy Bald Eagle optimization","authors":"Maria Christina Blessy A , Brindha S","doi":"10.1016/j.vehcom.2023.100660","DOIUrl":"10.1016/j.vehcom.2023.100660","url":null,"abstract":"<div><p><span><span><span>Vehicular Ad-hoc Network (VANET) is a type of wireless network that allows communication among vehicles and roadside units to develop advanced </span>intelligent transportation systems<span>. The success of VANETs depends on the stability of wireless communication, among vehicles, which is challenging to achieve due to high vehicle speed, rapidly changing topology, and unstable communication links. Moreover, the instability of the network caused by the mobile nature of vehicles in VANET reduces the performance of the network. Clustering in VANETs is a crucial technique that organizes the network and forms the basis of the routing protocol. </span></span>Clustering algorithms<span><span> are designed for VANETs to work efficiently and require several phases that must be integrated into the process before a clustering decision can be made. Therefore, this paper presents a novel Intelligent Fuzzy Bald Eagle (IFBE) optimization to enhance the performance of VANETs by optimizing the cluster head selection (CHS) process. The experimental results prove that the IFBE approach outperforms other existing mechanisms in terms of energy consumption, end-to-end delay, and </span>packet delivery ratio. The proposed mechanism utilizes an intelligent fuzzy system to optimize the CHS process. The fuzzy system uses a set of rules and membership functions to evaluate the candidate nodes' suitability for being cluster heads. The Bald Eagle Search (BES) optimization meta-heuristic algorithm is used to find the optimal values for the fuzzy system's membership functions. The proposed mechanism was evaluated using the MATLAB simulator. Finally, the experimental result proved that the IFBE approach achieved minimum delay and energy consumption of 13.58 ms, and 15.5 J, and </span></span>higher clustering<span> efficiency and packet delivery rate of 94.15% and 97.65% respectively, which show that it performs better than other existing approaches.</span></p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"45 ","pages":"Article 100660"},"PeriodicalIF":6.7,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135389454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}