-
RIS-aided jellyfish search optimization for multiuser wireless networks improvement Veh. Commun. (IF 5.8) Pub Date : 2024-12-10 Zahraa Tarek, Mona Gafar, Shahenda Sarhan, Abdullah M. Shaheen, Ahmed S. Alwakeel
Reconfigurable Intelligent Surfaces (RISs) provide a promising avenue for enhancing performance and implementation efficiency in multiuser wireless communication systems by enabling the manipulation of radio wave propagation. In this paper, an Augmented Jellyfish Search Optimization Algorithm (AJFSOA) is specifically designed to optimize the achievable rate in RIS-equipped systems. AJFSOA distinguishes
-
A review of smart vehicles in smart cities: Dangers, impacts, and the threat landscape Veh. Commun. (IF 5.8) Pub Date : 2024-12-07 Brooke Kidmose
The humble, mechanical automobile has gradually evolved into our modern connected and autonomous vehicles (CAVs)—also known as “smart vehicles.” Similarly, our cities are gradually developing into “smart cities,” where municipal services from transportation networks to utilities to recycling to law enforcement are integrated. The idea, with both smart vehicles and smart cities, is that more data leads
-
Federated learning on the go: Building stable clusters and optimizing resources on the road Veh. Commun. (IF 5.8) Pub Date : 2024-12-06 Sawsan AbdulRahman, Safa Otoum, Ouns Bouachir
With the proliferation of Internet of Things, leveraging federated learning (FL) for collaborative model training has become paramount. It has turned into a powerful tool to analyze on-device data and produce real-time applications while safeguarding user privacy. However, in vehicular networks, the dynamic nature of vehicles, coupled with resource constraints, gives rise to new challenges for efficient
-
VeTraSPM: Novel vehicle trajectory data sequential pattern mining algorithm for link criticality analysis Veh. Commun. (IF 5.8) Pub Date : 2024-12-06 Nourhan Bachir, Chamseddine Zaki, Hassan Harb, Roland Billen
This paper presents VeTraSPM (Vehicle Trajectory Data Sequential Pattern Mining), a novel algorithm designed to address the limitations of existing sequential pattern mining methods when applied to vehicle trajectory data. Current algorithms fail to capture essential characteristics such as directional flow on one-way roads (e.g., “AB” is valid but not “BA”), connectivity constraints at junctions,
-
The stability for CACC system with time delays and reconstitution information of vehicles for compensating delays based on Bi-LSTM Veh. Commun. (IF 5.8) Pub Date : 2024-12-06 Chenmin Zhang, Yonggui Liu, Zeming Li
The vehicle platoon using the cooperative adaptive cruise control (CACC) transmits information between vehicles via communication networks to increase the control performance. However, time delays are inevitable during the network transmission of information, which influence the stability of the CACC vehicle system. This paper proposes a method for compensating information affected by time delays based
-
STC-GraphFormer: Graph spatial-temporal correlation transformer for in-vehicle network intrusion detection system Veh. Commun. (IF 5.8) Pub Date : 2024-12-05 Gaber A. Al-Absi, Yong Fang, Adnan A. Qaseem
The integration of several developing technologies and their applications with Internet of Vehicles (IoVs) techniques has been improved. Utilizing these emerging technologies renders the in-vehicle network more susceptible to intrusions. Furthermore, the utilization of Electronic Control Units (ECUs) in current vehicles has experienced a significant increase, establishing the Controller Area Network
-
Offloading in V2X with road side units: Deep reinforcement learning Veh. Commun. (IF 5.8) Pub Date : 2024-12-05 Widhi Yahya, Ying-Dar Lin, Faysal Marzuk, Piotr Chołda, Yuan-Cheng Lai
Traffic offloading is crucial for reducing computing latency in distributed edge systems such as vehicle-to-everything (V2X) networks, which use roadside units (RSUs) and access network mobile edge computing (AN-MEC) with ML agents. Traffic offloading is part of the control plane problem, which requires fast decision-making in complex V2X systems. This study presents a novel ratio-based offloading
-
-
Dimensioning space-air-ground integrated networks for in-flight 6G slice orchestration Veh. Commun. (IF 5.8) Pub Date : 2024-12-05 László Toka, Endre Angelus Papp, Tibor Cinkler, István Gódor, László Hévizi
In this study, we present an in-depth analysis of communication services for commercial airline passengers, focusing on the challenges posed by increasing internet traffic demand. We explore the integration of satellite, airborne, and terrestrial networks, emphasizing the roles of Low Earth Orbit (LEO) satellites, High-Altitude Platform Station (HAPS), and Terrestrial Aviation Network (TAN)-based services
-
Redundant task offloading with dual-reliability in MEC-assisted vehicular networks Veh. Commun. (IF 5.8) Pub Date : 2024-12-04 Yaoxin Duan, Wendi Nie, Victor C.S. Lee, Kai Liu
With the rise and development of intelligent vehicles, the computation capability of vehicles has increased rapidly and considerably. Vehicle-to-Vehicle (V2V) offloading, in which computation-intensive tasks are offloaded to underutilized vehicles, has been proposed. However, V2V offloading faces the challenges of task transmission reliability and task computation reliability. In V2V offloading, tasks
-
A data sharing scheme based on blockchain for privacy protection certification of Internet of Vehicles Veh. Commun. (IF 5.8) Pub Date : 2024-12-02 Fengjun Shang, Xinxin Deng
With the vigorous development of Internet of Vehicles (IoV) technology, modern cars equipped with advanced on-board systems are continuously generating massive amounts of data. Utilizing this data can improve driving safety and achieve better service quality in smart transportation systems. Therefore, ensuring the efficiency and security of data sharing is an important issue. Integrating IoV and blockchain
-
Joint edge caching and computation offloading for heterogeneous tasks in MEC-enabled vehicular networks Veh. Commun. (IF 5.8) Pub Date : 2024-11-28 Yangqianhang Li, Li Li, Zhaorong Zhou
Edge caching is an effective paradigm that can significantly reduce the computation task offloading latency for mobile edge computing (MEC) in vehicular networks, while also alleviating the backhaul transmission pressure for retrieving content data from the cloud server. However, most existing works fail to address how to handle heterogeneous tasks generated by vehicle terminals (VTs), especially in
-
A survey of intelligent reflecting surfaces: Performance analysis, extensions, potential challenges, and open research issues Veh. Commun. (IF 5.8) Pub Date : 2024-11-20 Adil Khan, Syed Agha Hassnain Mohsan, Abdelrahman Elfikky, Ayman I. Boghdady, Shabeer Ahmad, Nisreen Innab
The rapid advancements in wireless communication have underscored the need for innovative solutions to enhance network performance, spectral efficiency, and energy savings. Intelligent Reflecting Surface (IRS) technology has emerged as a transformative approach that passively reconfigures wireless propagation environments, offering significant improvements without active power consumption. This survey
-
Cooperative approach for data-centric and node-centric misbehavior detection in VANET Veh. Commun. (IF 5.8) Pub Date : 2024-11-17 Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi
Vehicular Ad Hoc Network (VANET) has risen as a paramount technology for efficiently providing traffic management, safety and infotainment services to road users. Vehicles are allowed to use pseudo identities during vehicular network access to preserve their privacy. This property makes VANET vulnerable to Sybil attack, performed by exploiting the set of pseudo identities to send messages. Detecting
-
Boosting vehicular connectivity through resource allocation algorithm based on Heterogeneous Agent Proximal Policy Optimization Veh. Commun. (IF 5.8) Pub Date : 2024-11-15 Junhui Zhao, Xincheng Xiong, Qingmiao Zhang, Shihai Ren, Jingyan Chen, Wei Xu, Dongming Wang
Vehicle-to-Vehicle (V2V) communication can not only provide unrestricted inter-vehicle information transmission, but also improve spectrum utilization efficiency. However, it also brings uncontrollable co-channel interference, which can not guarantee the quality of service of V2V communication. In this paper, we propose an intelligent resource allocation scheme for V2V communication to improve vehicle
-
Optimization of electric vehicle charging and scheduling based on VANETs Veh. Commun. (IF 5.8) Pub Date : 2024-11-15 Tianyu Sun, Ben-Guo He, Junxin Chen, Haiyan Lu, Bo Fang, Yicong Zhou
Vehicular Ad-hoc Networks (VANETs) provide key support for the achievement of intelligent, safe, and efficient driverless transportation systems through real-time communication between vehicles and vehicles, and vehicles and road infrastructure. This paper investigates a joint optimization problem of electric vehicles (EVs) charging management and resource allocation based on VANETs. EV charging requires
-
Decentralized multi-hop data processing in UAV networks using MARL Veh. Commun. (IF 5.8) Pub Date : 2024-11-15 Indu Chandran, Kizheppatt Vipin
Unmanned Aerial Vehicles (UAVs) have become integral to numerous applications, prompting research towards enhancing their capabilities. For time-critical missions, minimizing latency is crucial; however, current studies often rely on sending data to ground station or cloud for processing due to their limited onboard capacities. To leverage the networking capabilities of UAVs, recent research focuses
-
Prediction-based data collection of UAV-assisted Maritime Internet of Things Veh. Commun. (IF 5.8) Pub Date : 2024-11-08 Xiaoluoteng Song, Xiuwen Fu, Mingyuan Ren, Pasquale Pace, Gianluca Aloi, Giancarlo Fortino
In maritime data collection scenarios, due to the constraints of wireless communication and environmental factors such as wave motion, sea surface ducting effects, and sea surface curvature, floating sensor nodes are unable to establish direct data transmission links with the base station. The advent of unmanned aerial vehicle (UAV)-assisted Maritime Internet of Things (MIoT) provides a feasible solution
-
Hybrid mutual authentication for vehicle-to-infrastructure communication without the coverage of roadside units Veh. Commun. (IF 5.8) Pub Date : 2024-11-07 Huizhi Tang, Abdul Rauf, Qin Lin, Guoqing Dou, Changshuai Qin
The security issues in Vehicle Ad Hoc Networks (VANETs) are prevalent within Intelligent Transportation Systems (ITS). To ensure the security of vehicle-to-infrastructure (V2I) communication, extensive research on V2I authentication has been conducted in recent years. However, these protocols often overlook the limitations of communication range, leading to failures in V2I communication. Consequently
-
Hierarchical federated deep reinforcement learning based joint communication and computation for UAV situation awareness Veh. Commun. (IF 5.8) Pub Date : 2024-11-06 Haitao Li, Jiawei Huang
The computation-intensive situational awareness (SA) task of unmanned aerial vehicle (UAV) is greatly affected by its limited power and computing capability. To solve this challenge, we consider the joint communication and computation (JCC) design for UAV network in this paper. Firstly, a multi-objective optimization (MOO) model, which can optimize UAV computation offloading, transmit power, and local
-
Volunteer vehicle assisted dependent task offloading based on ant colony optimization algorithm in vehicular edge computing Veh. Commun. (IF 5.8) Pub Date : 2024-10-31 Chen Cheng, Linbo Zhai, Yujuan Jia, Xiumin Zhu, Yumei Li
Vehicle Edge Computing improves the Quality of Service of vehicular applications by offloading tasks to the VEC server. However, with the continuous development of computation-intensive vehicular applications, the limited resources of the VEC server will not be enough to support these applications. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) proposes a concept of using vehicles as
-
STAR-RIS-NOMA empowered vehicle-to-vehicle communications: Outage and ergodic capacity analysis Veh. Commun. (IF 5.8) Pub Date : 2024-10-28 Luxmi Kant Vishwakarma, Radhika Gour, Suneel Yadav, Adão Silva
This paper delves into the performance evaluation of a non-orthogonal multiple access (NOMA) enabled vehicle-to-vehicle (V2V) communication system empowered by simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RIS). Herein, we consider that a moving access point (AP) transmits superimposed signals to nearby and distant NOMA vehicles simultaneously via reflection and
-
Deep Reinforcement Learning based running-track path design for fixed-wing UAV assisted mobile relaying network Veh. Commun. (IF 5.8) Pub Date : 2024-10-28 Tao Wang, Xiaodong Ji, Xuan Zhu, Cheng He, Jian-Feng Gu
This paper studies a fixed-wing unmanned aerial vehicle (UAV) assisted mobile relaying network (FUAVMRN), where a fixed-wing UAV employs an out-band full-duplex relaying fashion to serve a ground source-destination pair. It is confirmed that for a FUAVMRN, straight path is not suitable for the case that a huge amount of data need to be delivered, while circular path may lead to low throughput if the
-
Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks Veh. Commun. (IF 5.8) Pub Date : 2024-10-24 Junfeng Tian, Yue Shen, Yiting Wang
Autonomous vehicles safeguard the security and efficiency of Internet of Vehicles systems in small industrial parks by authenticating and exchanging real-time information with transportation infrastructure. Deploying a multi-server framework reduces the risk of message blocking and privacy information leakage from centralized services. However, in traditional handover authentication protocols, there
-
EPAKA: An efficient and privacy-preserving authenticated key agreement scheme based on physical security for VANET Veh. Commun. (IF 5.8) Pub Date : 2024-10-24 Chunhua Jin, Penghui Zhou, Zhiwei Chen, Wenyu Qin, Guanhua Chen, Hao Zhang, Jian Weng
Vehicular ad hoc network (VANET) has been a promising technology in smart transportation system, which can enable information exchange between vehicles and roadside units (RSUs). However, the privacy of vehicles and RSUs is a critical challenge in VANET, as they may expose sensitive information to malicious attackers or unauthorized parties. Many existing authenticated key agreement (AKA) schemes aim
-
In-vehicle communication cyber security: A comprehensive review of challenges and solutions Veh. Commun. (IF 5.8) Pub Date : 2024-09-30 Batuhan Gul, Fatih Ertam
The utilization of autonomous vehicles is experiencing a rapid proliferation in contemporary society. Concurrently, with the relentless evolution of technology, the inexorable integration of autonomous vehicles into urban environments, driven by the overarching paradigm of smart cities, becomes increasingly apparent. This escalating reliance on autonomous vehicles concurrently heightens the susceptibility
-
CANival: A multimodal approach to intrusion detection on the vehicle CAN bus Veh. Commun. (IF 5.8) Pub Date : 2024-09-12 Hyunjae Kang, Thanh Vo, Huy Kang Kim, Jin B. Hong
Vehicles of today are composed of over 100 electronic embedded devices known as Electronic Control Units (ECU), each of which controls a different component of the vehicle and communicates via the Controller Area Network (CAN) bus. However, unlike other network protocols, the CAN bus communication protocol lacks security features, which is a growing concern as more vehicles become connected to the
-
Joint optimization for service-caching, computation-offloading, and UAVs flight trajectories over rechargeable UAV-aided MEC using hierarchical multi-agent deep reinforcement learning Veh. Commun. (IF 5.8) Pub Date : 2024-09-11 Zhian Chen, Fei Wang, Jiaojie Wang
Due to the high mobility, high chance of line-of-sight (LoS) transmission, and flexible deployment, unmanned aerial vehicles (UAVs) have been used as mobile edge computing (MEC) servers to provide ubiquitous computation services to mobile users (MUs). However, the limited energy storage, caching capacity, and computation resources of UAVs bring new challenges for UAV-aided MEC, e.g., how to recharge
-
Upper bound of outage probability in unmanned aerial vehicle-assisted cellular networks over fading channels Veh. Commun. (IF 5.8) Pub Date : 2024-09-05 Mehran Pourmohammad Abdollahi, Hosein Azarhava, Javad Musevi Niya, Mahdi Nangir
In this paper, we consider a multi-tier cellular network in which a hovering Unmanned Aerial Vehicle (UAV) assists the network in the absence of the terrestrial Macrocell base station. The orthogonal sub channels are assumed for communication between the UAV and its attached users. The Femtocell users and Device-to-Device (D2D) pairs transmit their data to the corresponding receivers in the same sub-channels
-
LB-CLAS: Lattice-based conditional privacy-preserving certificateless aggregate signature scheme for VANET Veh. Commun. (IF 5.8) Pub Date : 2024-09-04 Sheng-wei Xu, Shu-han Yu, Yi-Jie Bai, Zi-Yan Yue, Yi-Long Liu
The rapid development of vehicular ad-hoc networks (VANETs) has brought great convenience to intelligent transportation, and the secure transmission of information in VANETs has become a serious problem. In addition, the protection of private information of vehicles is also a key issue. Aiming at the problem of how to guarantee the secure transmission of information in VANETs under the condition of
-
Security situation assessment in UAV swarm networks using TransReSE: A Transformer-ResNeXt-SE based approach Veh. Commun. (IF 5.8) Pub Date : 2024-09-04 Dongmei Zhao, Pengcheng Shen, Xunzhen Han, Shuiguang Zeng
With the rapid development and extensive application of unmanned aerial vehicles (UAVs), the issue of UAV swarm network security has become prominent. To protect the security of UAV swarm networks, effective network security defense measures are crucial. One key aspect is the assessment and monitoring of the network's security situation. However, most existing research focuses on the security of individual
-
Enhancing vehicular NOMA communication security through reconfigurable intelligent surfaces Veh. Commun. (IF 5.8) Pub Date : 2024-09-04 Altynbek Serikov, Mohd Hamza Naim Shaikh, Galymzhan Nauryzbayev
Physical layer security (PLS) aims to ensure the confidentiality and authenticity of transmitted data by capitalizing on the inherent randomness of wireless channels. Owing to the popularity of intelligent transportation systems (ITSs), PLS research has sparked renewed interest in the wireless research community. This paper investigates the performance of secure communication in the context of a vehicle-to-vehicle
-
An adaptive and multi-path greedy perimeter stateless routing protocol in flying ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-09-04 Amir Masoud Rahmani, Dildar Hussain, Reem Jafar Ismail, Faisal Alanazi, Salem Belhaj, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Aso Darwesh, Mehdi Hosseinzadeh
In recent years, flying ad hoc networks (FANET), formed from unmanned aerial vehicles (UAVs), have absorbed the attention of academic and industrial research communities due to their many applications in military and civilian fields. FANETs benefit from unique features, including highly moving UAVs and dynamic topological structure. Therefore, most existing routing protocols, such as the greedy perimeter
-
URLLC-aware and energy-efficient data offloading strategy in high-mobility vehicular mobile edge computing environments Veh. Commun. (IF 5.8) Pub Date : 2024-09-02 Hong Min, Jawad Tanveer, Amir Masoud Rahmani, Abdullah Alqahtani, Abed Alanazi, Shtwai Alsubai, Mehdi Hosseinzadeh
The integration of Internet of Things (IoT) technologies into the vehicular industry has initiated a new era of connected and autonomous vehicles, revolutionizing transportation systems. However, this transformation introduces significant challenges, especially in 5 G networks, such as achieving Ultra-Reliable Low-Latency Communications (URLLC) and maintaining energy efficiency within the high mobility
-
A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning Veh. Commun. (IF 5.8) Pub Date : 2024-08-30 Muzun Althunayyan, Amir Javed, Omer Rana
As connected and autonomous vehicles proliferate, the Controller Area Network (CAN) bus has become the predominant communication standard for in-vehicle networks due to its speed and efficiency. However, the CAN bus lacks basic security measures such as authentication and encryption, making it highly vulnerable to cyberattacks. To ensure in-vehicle security, intrusion detection systems (IDSs) must
-
A secure authentication framework for IoV based on blockchain and ensemble learning Veh. Commun. (IF 5.8) Pub Date : 2024-08-23 Wenxian Jiang, Xianglong Lv, Jun Tao
A secure authentication framework based on blockchain and ensemble learning is proposed to address the problem that vehicle identity privacy data in Internet of Vehicles (IoV) is vulnerable to theft and tampering. First, a secure and efficient authentication method based on blockchain and Physical Unclonable Function (PUF) is implemented, which ensures the identity privacy of the vehicle when accessing
-
Physical layer security in SWIPT-based cooperative vehicular relaying networks Veh. Commun. (IF 5.8) Pub Date : 2024-08-19 Patrick Odong, Ahmed H. Abd El-Malek, Ahmed Allam, Adel B. Abdel-Rahman
The future of autonomous transportation systems depends on energy sustainability and secure information exchange from low-power vehicular sensors, hence the increased interest in vehicular sensor charging using simultaneous wireless information and power transfer (SWIPT). This study investigates the physical layer security of a SWIPT-based radio frequency energy harvesting cooperative vehicular relaying
-
Assessing the impact of communication delays for Autonomous Intersection Management systems Veh. Commun. (IF 5.8) Pub Date : 2024-08-02 Michael I.-C. Wang, Charles H.-P. Wen, H. Jonathan Chao
Communication is essential for Cooperative Intelligent Transportation Systems (C-ITS) to achieve better road efficiency, especially for Autonomous Intersection Management (AIM) which coordinates vehicles to pass the intersection safely and efficiently. Communication delays cause severe safety crises (i.e., collisions) and vehicular-performance degradation regarding intersection capacities and vehicular
-
HCFAIUN: A novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Jatin Sharma, Pawan Singh Mehra
IoT-based UAV networks comprise interconnected UAVs outfitted with sensors and microcontrollers to simplify data exchange in environments such as smart cities. In light of open-access communication landscapes, IoT-based UAV networks could pose security challenges, encompassing authentication vulnerabilities and the inadvertent disclosure of location and other confidential information to unauthorised
-
Efficiency of UAV-assisted cellular networks under jamming scenarios Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Mohammad Arif, Wooseong Kim
The wireless signal that intentionally disrupts the communication is described as the jamming signal. Clustered jamming is the use of jamming signals of the devices that are clustered in groups, whereas non-clustered jamming refers to the use of the jamming signals of the spatially distributed devices that are un-clustered. The efficiency of the unmanned aerial vehicle (UAV)-assisted cellular networks
-
Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Ziyu Zhou, Na Wang, Jianwei Liu, Wen Zhou, Junsong Fu, Lunzhi Deng
With the prevalence of intelligent driving, the vehicular data corresponding to driving safety and traffic management efficiency is widely applied by the Internet of Vehicles (IoV) applications. Vehicular data is shared frequently in IoV, leading to privacy leakage of the message sender, yet most privacy-preserving measures bring difficulties for receivers to detect malicious messages. To trade-off
-
Evaluating energy harvesting UAV-NOMA network with random user pairing in the finite blocklength regime Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Shardul Thapliyal, Rajoo Pandey, Chhagan Charan
This study proposes an integrated system that combines energy harvesting (EH) enabled unmanned aerial vehicles (UAVs) with non-orthogonal multiple access (NOMA) to enhance communication system performance within a cellular network. Addressing the limitations of existing analyses that often assume an infinite blocklength scenario, we explore EH-enabled UAV-NOMA systems within a cellular framework under
-
IDS-DEC: A novel intrusion detection for CAN bus traffic based on deep embedded clustering Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Jiahao Shi, Zhijun Xie, Li Dong, Xianliang Jiang, Xing Jin
As the automotive industry advances towards greater automation, the proliferation of electronic control units (ECUs) has led to a substantial increase in the connectivity of in-vehicle networks with the external environment. However, the widely used Controller Area Network (CAN), which serves as the standard for in-vehicle networks, lacks robust security features, such as authentication or encrypted
-
ASAP: IEEE 802.11ax-based seamless access point handover for moving vehicles Veh. Commun. (IF 5.8) Pub Date : 2024-07-18 Pin Lv, Huanhua He, Jia Xu
The increasing number of connected and automated vehicles has led to a sharp increase in the demand for network access of moving vehicles. Although 5G networks support terminals with high mobility, the traffic load is too heavy to bear if all the vehicles have a large amount of data for transmission. Therefore, IEEE 802.11-based wireless network is a complementary offload solution to provide high-speed
-
Multi-path serial tasks offloading strategy and dynamic scheduling optimization in vehicular edge computing networks Veh. Commun. (IF 5.8) Pub Date : 2024-07-09 Xiangyan Liu, Jianhong Zheng, Yang Li, Meng Zhang, Rui Wang, Yun He
Vehicular edge computing networks (VECNs) can provide a promising solution to support efficient task execution of vehicles. Consider the channel and access time variations caused by the high mobility of vehicles in a vehicular environment when designing task offloading strategies in VECNs. In this paper, we perform multi-path offloading for a task vehicle with serial tasks based on both dynamic communication
-
A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-07-03 Mehdi Hosseinzadeh, Saqib Ali, Husham Jawad Ahmad, Faisal Alanazi, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Omed Hassan Ahmed, Amir Masoud Rahmani, Sang-Woong Lee
Nowadays, unmanned aerial vehicles (UAVs) organized in a flying ad hoc network (FANET) can successfully carry out complex missions. Due to the limitations of these networks, including the lack of infrastructure, wireless communication channels, dynamic topology, and unreliable communication between UAVs, cyberattacks, especially wormholes, weaken the performance of routing schemes. Therefore, maintaining
-
VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment Veh. Commun. (IF 5.8) Pub Date : 2024-06-28 Praneetha Surapaneni, Sriramulu Bojjagani, Muhammad Khurram Khan
The Intelligent Transportation Systems (ITS) is a leading-edge, developing idea that seeks to revolutionize how people and things move inside and outside cities. Internet of Vehicles (IoV) forms a networked environment that joins infrastructure, pedestrians, fog, cloud, and vehicles to develop ITS. The IoV has the potential to improve transportation systems significantly, but as it is networked and
-
On a security scheme against collusive attacks in vehicular ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-06-26 Na Fan, Chase Wu, Slimane Benabdallah, Jialong Li, Yuxin Gao, Qinglong Wang
Vehicular Ad Hoc Networks (VANETs) offer a promising solution to bring drivers comfortable driving experiences and also improve road safety in intelligent transportation systems, but also faces many security issues. Collusive attack is one of the most challenging threats in VANETs because it violates the fundamental assumption made by VANET-based applications that all received information be correct
-
Broadcast signcryption scheme with equality test in smart transportation system Veh. Commun. (IF 5.8) Pub Date : 2024-06-26 Shufen Niu, Runyuan Dong, Wei Liu, Peng Ge, Qi Liu
With the generation of massive traffic information in the smart transportation system, the traffic control center efficiently utilizes broadcast communication to send multiple messages to multiple vehicles. Besides, diversified privacy disclosure and security attack issues also emerged spontaneously. To achieve secure communication between the traffic control center and vehicles in the smart transportation
-
Markov-reward based estimation of the idle-time in vehicular networks to improve multimetric routing protocols Veh. Commun. (IF 5.8) Pub Date : 2024-06-25 Isabel V. Martin-Faus, Leticia Lemus Cárdenas, Ahmad Mohamad Mezher, Mónica Aguilar Igartua
Analyzing vehicular ad hoc networks (VANETs) poses a considerable challenge due to their constantly changing network topology and scarce network resources. Furthermore, defining suitable routing metrics for adaptive algorithms is a particularly hard task since these adaptive decisions should be taken according to the current conditions of the VANET. The literature contains different approaches aimed
-
S-LDM: Server local dynamic map for 5G-based centralized enhanced collective perception Veh. Commun. (IF 5.8) Pub Date : 2024-06-25 C.M. Risma Carletti, F. Raviglione, C. Casetti, F. Stoffella, G.M. Yilma, F. Visintainer
The automotive field is undergoing significant technological advances, which includes making the next generation of autonomous vehicles smarter, greener and safer through vehicular networks, which are often referred to as Vehicle-to-Everything (V2X) communications. Together with V2X, centralized maneuver management services for autonomous vehicles are increasingly gaining importance, as, thanks to
-
An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud-edge-terminal architecture Veh. Commun. (IF 5.8) Pub Date : 2024-06-22 Jun-feng Tian, Rui Ni
The continuous progression in cloud computing, edge computing, and associated technologies has notably hastened the progress of vehicle networking technology. This advancement is increasingly assuming a crucial role in enhancing driving safety, optimizing traffic management, and revolutionizing traffic control methodologies. The principal aim of Internet of Vehicles (IoV) technology is to establish
-
GASBO: User grouping–based gradient average subtraction–based optimisation for NOMA-based fog computing vehicular network Veh. Commun. (IF 5.8) Pub Date : 2024-06-22 C Kumara Narayana Swamy, T Velmurugan
The Internet of Vehicles (IoV) for fog computing (FC) addresses issues such as traffic congestion, transportation efficiency, and privacy. Non-orthogonal multiple access (NOMA) is a popular technology that enhances spectral efficiency and increases the network's access capability. The synchronisation between NOMA and FC radio access networks extends the application of augmented or vehicular networking
-
An intelligent clustering scheme based on whale optimization algorithm in flying ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-06-07 Mehdi Hosseinzadeh, Jawad Tanveer, Faisal Alanazi, Khursheed Aurangzeb, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Aso Darwesh, Sang-Woong Lee, Amir Masoud Rahmani
Due to the progress of unmanned aerial vehicles (UAVs), this new technology is widely applied in military and civilian areas. Multi-UAV networks are often known as flying ad hoc networks (FANETs). Due to these applications, FANET must ensure communication stability and have high scalability. These goals are achieved by presenting clustering techniques in FANETs. However, the characteristics of these
-
An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Negalign Wake Hundera, Muhammad Umar Aftab, Dagmawit Mesfin, Fatene Dioubi, Huiying Xu, Xinzhong Zhu
In the Internet of Vehicles (IoV) domain, the collection of traffic data is executed by intelligent devices and stored within a cloud-assisted IoV system. However, ensuring confidentiality and authorized access to data are the main problems of data storage. To address these problems, this paper proposes an efficient heterogeneous online/offline certificateless signcryption with a proxy re-encryption
-
A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Ibraheem Abdelazeem, Weibin Zhang, Abdeldime Mohamedsalih, Mohamed Abdalwohab, Ahmedalmansour Abuobida
Vehicular Ad Hoc Networks (VANETs) provide various benefits and play a crucial role in improving efficiency and ensuring human safety across different applications. However, these advantages also give rise to security challenges and privacy concerns, necessitating a thorough examination of security attacks. Current key generation schemes, particularly those based on the Physical-Layer Model (PLM),
-
Cost-aware task offloading in vehicular edge computing: A Stackelberg game approach Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Shujuan Wang, Dongxue He, Mulin Yang, Lin Duo
With the popularity of vehicular communication systems and mobile edge vehicle networking, intelligent transportation applications arise in Internet of Vehicles (IoVs), which are latency-sensitive, computation-intensive, and requiring sufficient computing and communication resources. To satisfy the requirements of these applications, computation offloading emerges as a new paradigm to utilize idle
-
Fully distributed multi-agent processing strategy applied to vehicular networks Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Vladimir R. de Lima, Marcello L.R. de Campos
This work explores distributed processing techniques, together with recent advances in multi-agent reinforcement learning (MARL) to implement a fully decentralized reward and decision-making scheme to efficiently allocate resources (spectrum and power). The method targets processes with strong dynamics and stringent requirements such as cellular vehicle-to-everything networks (C-V2X). In our approach
-
Vehicular network anomaly detection based on 2-step deep learning framework Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Nur Cahyono Kushardianto, Soheyb Ribouh, Yassin El Hillali, Charles Tatkeu
Intelligent Transportation System (ITS) is one of the newest technologies in the transportation sector that will give hope for better driving safety. Not only in terms of driving safety, but ITS will give also hope for driving comfort. Smart vehicles perchance better versatile to the street circumstances through trade data among vehicles. In case, they can maintain a strategic distance from activity
-
Discharging driven energy sharing protocol for V2V communication in vehicular energy networks Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Qinghua Tang, Demin Li, Yihong Zhang, Xuemin Chen
With the growing concern over range anxiety among electric vehicle (EV) owners due to limited battery capacity and sparse charging infrastructure, EV-to-EV (V2V) energy sharing emerges as a crucial solution to extend driving range. Leveraging the vehicular energy network (VEN) enabled by dynamic wireless power transfer (DWPT) technology, energy sharing among EVs in motion becomes feasible. However