-
Physical layer security in SWIPT-based cooperative vehicular relaying networks Veh. Commun. (IF 5.8) Pub Date : 2024-08-19 Patrick Odong, Ahmed H. Abd El-Malek, Ahmed Allam, Adel B. Abdel-Rahman
The future of autonomous transportation systems depends on energy sustainability and secure information exchange from low-power vehicular sensors, hence the increased interest in vehicular sensor charging using simultaneous wireless information and power transfer (SWIPT). This study investigates the physical layer security of a SWIPT-based radio frequency energy harvesting cooperative vehicular relaying
-
Assessing the impact of communication delays for Autonomous Intersection Management systems Veh. Commun. (IF 5.8) Pub Date : 2024-08-02 Michael I.-C. Wang, Charles H.-P. Wen, H. Jonathan Chao
Communication is essential for Cooperative Intelligent Transportation Systems (C-ITS) to achieve better road efficiency, especially for Autonomous Intersection Management (AIM) which coordinates vehicles to pass the intersection safely and efficiently. Communication delays cause severe safety crises (i.e., collisions) and vehicular-performance degradation regarding intersection capacities and vehicular
-
HCFAIUN: A novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Jatin Sharma, Pawan Singh Mehra
IoT-based UAV networks comprise interconnected UAVs outfitted with sensors and microcontrollers to simplify data exchange in environments such as smart cities. In light of open-access communication landscapes, IoT-based UAV networks could pose security challenges, encompassing authentication vulnerabilities and the inadvertent disclosure of location and other confidential information to unauthorised
-
Efficiency of UAV-assisted cellular networks under jamming scenarios Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Mohammad Arif, Wooseong Kim
The wireless signal that intentionally disrupts the communication is described as the jamming signal. Clustered jamming is the use of jamming signals of the devices that are clustered in groups, whereas non-clustered jamming refers to the use of the jamming signals of the spatially distributed devices that are un-clustered. The efficiency of the unmanned aerial vehicle (UAV)-assisted cellular networks
-
Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Ziyu Zhou, Na Wang, Jianwei Liu, Wen Zhou, Junsong Fu, Lunzhi Deng
With the prevalence of intelligent driving, the vehicular data corresponding to driving safety and traffic management efficiency is widely applied by the Internet of Vehicles (IoV) applications. Vehicular data is shared frequently in IoV, leading to privacy leakage of the message sender, yet most privacy-preserving measures bring difficulties for receivers to detect malicious messages. To trade-off
-
Evaluating energy harvesting UAV-NOMA network with random user pairing in the finite blocklength regime Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Shardul Thapliyal, Rajoo Pandey, Chhagan Charan
This study proposes an integrated system that combines energy harvesting (EH) enabled unmanned aerial vehicles (UAVs) with non-orthogonal multiple access (NOMA) to enhance communication system performance within a cellular network. Addressing the limitations of existing analyses that often assume an infinite blocklength scenario, we explore EH-enabled UAV-NOMA systems within a cellular framework under
-
IDS-DEC: A novel intrusion detection for CAN bus traffic based on deep embedded clustering Veh. Commun. (IF 5.8) Pub Date : 2024-07-26 Jiahao Shi, Zhijun Xie, Li Dong, Xianliang Jiang, Xing Jin
As the automotive industry advances towards greater automation, the proliferation of electronic control units (ECUs) has led to a substantial increase in the connectivity of in-vehicle networks with the external environment. However, the widely used Controller Area Network (CAN), which serves as the standard for in-vehicle networks, lacks robust security features, such as authentication or encrypted
-
ASAP: IEEE 802.11ax-based seamless access point handover for moving vehicles Veh. Commun. (IF 5.8) Pub Date : 2024-07-18 Pin Lv, Huanhua He, Jia Xu
The increasing number of connected and automated vehicles has led to a sharp increase in the demand for network access of moving vehicles. Although 5G networks support terminals with high mobility, the traffic load is too heavy to bear if all the vehicles have a large amount of data for transmission. Therefore, IEEE 802.11-based wireless network is a complementary offload solution to provide high-speed
-
Multi-path serial tasks offloading strategy and dynamic scheduling optimization in vehicular edge computing networks Veh. Commun. (IF 5.8) Pub Date : 2024-07-09 Xiangyan Liu, Jianhong Zheng, Yang Li, Meng Zhang, Rui Wang, Yun He
Vehicular edge computing networks (VECNs) can provide a promising solution to support efficient task execution of vehicles. Consider the channel and access time variations caused by the high mobility of vehicles in a vehicular environment when designing task offloading strategies in VECNs. In this paper, we perform multi-path offloading for a task vehicle with serial tasks based on both dynamic communication
-
A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-07-03 Mehdi Hosseinzadeh, Saqib Ali, Husham Jawad Ahmad, Faisal Alanazi, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Omed Hassan Ahmed, Amir Masoud Rahmani, Sang-Woong Lee
Nowadays, unmanned aerial vehicles (UAVs) organized in a flying ad hoc network (FANET) can successfully carry out complex missions. Due to the limitations of these networks, including the lack of infrastructure, wireless communication channels, dynamic topology, and unreliable communication between UAVs, cyberattacks, especially wormholes, weaken the performance of routing schemes. Therefore, maintaining
-
VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment Veh. Commun. (IF 5.8) Pub Date : 2024-06-28 Praneetha Surapaneni, Sriramulu Bojjagani, Muhammad Khurram Khan
The Intelligent Transportation Systems (ITS) is a leading-edge, developing idea that seeks to revolutionize how people and things move inside and outside cities. Internet of Vehicles (IoV) forms a networked environment that joins infrastructure, pedestrians, fog, cloud, and vehicles to develop ITS. The IoV has the potential to improve transportation systems significantly, but as it is networked and
-
On a security scheme against collusive attacks in vehicular ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-06-26 Na Fan, Chase Wu, Slimane Benabdallah, Jialong Li, Yuxin Gao, Qinglong Wang
Vehicular Ad Hoc Networks (VANETs) offer a promising solution to bring drivers comfortable driving experiences and also improve road safety in intelligent transportation systems, but also faces many security issues. Collusive attack is one of the most challenging threats in VANETs because it violates the fundamental assumption made by VANET-based applications that all received information be correct
-
Broadcast signcryption scheme with equality test in smart transportation system Veh. Commun. (IF 5.8) Pub Date : 2024-06-26 Shufen Niu, Runyuan Dong, Wei Liu, Peng Ge, Qi Liu
With the generation of massive traffic information in the smart transportation system, the traffic control center efficiently utilizes broadcast communication to send multiple messages to multiple vehicles. Besides, diversified privacy disclosure and security attack issues also emerged spontaneously. To achieve secure communication between the traffic control center and vehicles in the smart transportation
-
Markov-reward based estimation of the idle-time in vehicular networks to improve multimetric routing protocols Veh. Commun. (IF 5.8) Pub Date : 2024-06-25 Isabel V. Martin-Faus, Leticia Lemus Cárdenas, Ahmad Mohamad Mezher, Mónica Aguilar Igartua
Analyzing vehicular ad hoc networks (VANETs) poses a considerable challenge due to their constantly changing network topology and scarce network resources. Furthermore, defining suitable routing metrics for adaptive algorithms is a particularly hard task since these adaptive decisions should be taken according to the current conditions of the VANET. The literature contains different approaches aimed
-
S-LDM: Server local dynamic map for 5G-based centralized enhanced collective perception Veh. Commun. (IF 5.8) Pub Date : 2024-06-25 C.M. Risma Carletti, F. Raviglione, C. Casetti, F. Stoffella, G.M. Yilma, F. Visintainer
The automotive field is undergoing significant technological advances, which includes making the next generation of autonomous vehicles smarter, greener and safer through vehicular networks, which are often referred to as Vehicle-to-Everything (V2X) communications. Together with V2X, centralized maneuver management services for autonomous vehicles are increasingly gaining importance, as, thanks to
-
An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud-edge-terminal architecture Veh. Commun. (IF 5.8) Pub Date : 2024-06-22 Jun-feng Tian, Rui Ni
The continuous progression in cloud computing, edge computing, and associated technologies has notably hastened the progress of vehicle networking technology. This advancement is increasingly assuming a crucial role in enhancing driving safety, optimizing traffic management, and revolutionizing traffic control methodologies. The principal aim of Internet of Vehicles (IoV) technology is to establish
-
GASBO: User grouping–based gradient average subtraction–based optimisation for NOMA-based fog computing vehicular network Veh. Commun. (IF 5.8) Pub Date : 2024-06-22 C Kumara Narayana Swamy, T Velmurugan
The Internet of Vehicles (IoV) for fog computing (FC) addresses issues such as traffic congestion, transportation efficiency, and privacy. Non-orthogonal multiple access (NOMA) is a popular technology that enhances spectral efficiency and increases the network's access capability. The synchronisation between NOMA and FC radio access networks extends the application of augmented or vehicular networking
-
An intelligent clustering scheme based on whale optimization algorithm in flying ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-06-07 Mehdi Hosseinzadeh, Jawad Tanveer, Faisal Alanazi, Khursheed Aurangzeb, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Aso Darwesh, Sang-Woong Lee, Amir Masoud Rahmani
Due to the progress of unmanned aerial vehicles (UAVs), this new technology is widely applied in military and civilian areas. Multi-UAV networks are often known as flying ad hoc networks (FANETs). Due to these applications, FANET must ensure communication stability and have high scalability. These goals are achieved by presenting clustering techniques in FANETs. However, the characteristics of these
-
An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Negalign Wake Hundera, Muhammad Umar Aftab, Dagmawit Mesfin, Fatene Dioubi, Huiying Xu, Xinzhong Zhu
In the Internet of Vehicles (IoV) domain, the collection of traffic data is executed by intelligent devices and stored within a cloud-assisted IoV system. However, ensuring confidentiality and authorized access to data are the main problems of data storage. To address these problems, this paper proposes an efficient heterogeneous online/offline certificateless signcryption with a proxy re-encryption
-
A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Ibraheem Abdelazeem, Weibin Zhang, Abdeldime Mohamedsalih, Mohamed Abdalwohab, Ahmedalmansour Abuobida
Vehicular Ad Hoc Networks (VANETs) provide various benefits and play a crucial role in improving efficiency and ensuring human safety across different applications. However, these advantages also give rise to security challenges and privacy concerns, necessitating a thorough examination of security attacks. Current key generation schemes, particularly those based on the Physical-Layer Model (PLM),
-
Cost-aware task offloading in vehicular edge computing: A Stackelberg game approach Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Shujuan Wang, Dongxue He, Mulin Yang, Lin Duo
With the popularity of vehicular communication systems and mobile edge vehicle networking, intelligent transportation applications arise in Internet of Vehicles (IoVs), which are latency-sensitive, computation-intensive, and requiring sufficient computing and communication resources. To satisfy the requirements of these applications, computation offloading emerges as a new paradigm to utilize idle
-
Fully distributed multi-agent processing strategy applied to vehicular networks Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Vladimir R. de Lima, Marcello L.R. de Campos
This work explores distributed processing techniques, together with recent advances in multi-agent reinforcement learning (MARL) to implement a fully decentralized reward and decision-making scheme to efficiently allocate resources (spectrum and power). The method targets processes with strong dynamics and stringent requirements such as cellular vehicle-to-everything networks (C-V2X). In our approach
-
Vehicular network anomaly detection based on 2-step deep learning framework Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Nur Cahyono Kushardianto, Soheyb Ribouh, Yassin El Hillali, Charles Tatkeu
Intelligent Transportation System (ITS) is one of the newest technologies in the transportation sector that will give hope for better driving safety. Not only in terms of driving safety, but ITS will give also hope for driving comfort. Smart vehicles perchance better versatile to the street circumstances through trade data among vehicles. In case, they can maintain a strategic distance from activity
-
Discharging driven energy sharing protocol for V2V communication in vehicular energy networks Veh. Commun. (IF 5.8) Pub Date : 2024-06-04 Qinghua Tang, Demin Li, Yihong Zhang, Xuemin Chen
With the growing concern over range anxiety among electric vehicle (EV) owners due to limited battery capacity and sparse charging infrastructure, EV-to-EV (V2V) energy sharing emerges as a crucial solution to extend driving range. Leveraging the vehicular energy network (VEN) enabled by dynamic wireless power transfer (DWPT) technology, energy sharing among EVs in motion becomes feasible. However
-
State-of-the-Art Authentication and Verification Schemes in VANETs: A Survey Veh. Commun. (IF 5.8) Pub Date : 2024-05-31 Sheraz Mazhar, Abdur Rakib, Lei Pan, Frank Jiang, Adnan Anwar, Robin Doss, Jeremy Bryans
Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile Ad-Hoc Networks (MANETs), are wireless networks formed around moving vehicles, enabling communication between vehicles, roadside infrastructure, and servers. With the rise of autonomous and connected vehicles, security concerns surrounding VANETs have grown. VANETs still face challenges related to privacy with full-scale deployment due to a lack
-
FedGen: Federated learning-based green edge computing for optimal route selection using genetic algorithm in Internet of Vehicular Things Veh. Commun. (IF 5.8) Pub Date : 2024-05-31 Sushovan Khatua, Anwesha Mukherjee, Debashis De
Time-efficient route planning is a significant research area of Internet of Vehicular Things. Optimal route selection is important to reach the destination in minimal time. Further, energy efficiency is vital for route planning in a sustainable environment. To address these issues, this paper proposes a federated learning and genetic algorithm-based green edge computing framework for optimal route
-
Subchannel assignment for social-assisted UAV cellular networks using dynamic hypergraph coloring Veh. Commun. (IF 5.8) Pub Date : 2024-05-29 Kanhu Charan Gouda, Sangya Shrivastava, Rahul Thakur
Device-to-Device (D2D) communication when used in conjugation with Unmanned Aerial Vehicle (UAV) Femtocell and unlicensed spectrum can effectively tackle the ever-increasing mobile data demands. However, D2D communication raises security and privacy concerns among users due to the absence of a centralized entity such as a base station. Therefore, exploring social connections among users becomes imperative
-
Anonymous lattice-based authentication protocol for vehicular communications Veh. Commun. (IF 5.8) Pub Date : 2024-05-29 Ali Shahidinejad, Jemal Abawajy, Shamsul Huda
Quantum-proof authentication is essential for vehicular communications as the threat of quantum computing attacks on traditional encryption methods grows. Several lattice-based authentication protocols have recently been developed to help with this issue, but they come with hefty storage and communication overheads. Most of them also fail to provide strong anonymity for vehicles and edge nodes and
-
Hybrid cryptography-based scheme with conditional privacy-preserving authentication and memory-based DOS resilience in V2X Veh. Commun. (IF 5.8) Pub Date : 2024-05-27 Abdelkrim Imghoure, Fouzia Omary, Ahmed El-Yahyaoui
To secure Vehicle-to-everything (V2X) communications, many Conditional Privacy-Preserving Authentication schemes (CPPA) use symmetric and asymmetric encryption during the authentication process. However, several existing schemes have some security limitations regarding VANET requirements. In many symmetric cryptography-based schemes, the participants are required to share the same keys which could
-
Measurement-based V2V propagation modeling in highway, suburban, and urban environments Veh. Commun. (IF 5.8) Pub Date : 2024-05-10 Zeynep Hasırcı Tuğcu, Kenan Kuzulugil, İsmail Hakkı Çavdar
Vehicle-to-vehicle (V2V) communication is one of the promising communication applications designed to optimize traffic conditions and has played a crucial role in the improvement of intelligent transportation technologies. Since there is still some uncertainty regarding generalized models that provide a more accurate representation of propagation environments, the existing literature emphasizes the
-
SFL-TUM: Energy efficient SFRL method for large scale AI model's task offloading in UAV-assisted MEC networks Veh. Commun. (IF 5.8) Pub Date : 2024-05-10 Prakhar Consul, Ishan Budhiraja, Deepak Garg, Sahil Garg, Georges Kaddoum, Mohammad Mehedi Hassan
The convergence of mobile edge computing (MEC) network with unmanned aerial vehicles (UAVs) presents an auspicious opportunity to revolutionize wireless communication and facilitate high-speed internet access in remote regions for mobile devices (MDs) as well as large scale artificial intelligence (AI) models. However, the substantial amount of data produced by the UAVs-assisted MEC network necessitates
-
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments Veh. Commun. (IF 5.8) Pub Date : 2024-05-10 Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Joel J.P.C. Rodrigues
Vehicular networks are vulnerable to Distributed Denial of Service (DDoS), an extension of a Denial of Service (DoS) attack. The existing solutions for DDoS detection in vehicular networks use various Machine Learning (ML) algorithms. However, these algorithms are applicable only in a single layer in a vehicular network environment and are incapable of detecting DDoS dynamics for different layers of
-
Reinforcement learning vs rule-based dynamic movement strategies in UAV assisted networks Veh. Commun. (IF 5.8) Pub Date : 2024-05-08 Adel Mounir Said, Michel Marot, Chérifa Boucetta, Hossam Afifi, Hassine Moungla, Gatien Roujanski
Since resource allocation of cellular networks is not dynamic, some cells may experience unplanned high traffic demands due to unexpected events. Unmanned aerial vehicles (UAV) can be used to provide the additional bandwidth required for data offloading.
-
A security-enhanced authentication scheme for quantum-key-distribution (QKD) enabled Internet of vehicles in multi-cloud environment Veh. Commun. (IF 5.8) Pub Date : 2024-05-08 Ze Yang, Qin Shi, Teng Cheng, Xunji Wang, Rutong Zhang, Lin Yu
The Internet of vehicles (IoV) is an essential part of modern intelligent transportation systems (ITS). In the ITS, intelligent connected vehicle can access a variety of latency-sensitive cloud services through the vulnerable wireless communication channel, which could lead to security and privacy issues. To prevent access by malicious nodes, a large number of authentication schemes have been proposed
-
Fast and efficient context-aware embedding generation using fuzzy hashing for in-vehicle network intrusion detection Veh. Commun. (IF 5.8) Pub Date : 2024-05-07 Moon Jeong Choi, Ik Rae Jeong, Hyun Min Song
-
Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET Veh. Commun. (IF 5.8) Pub Date : 2024-05-07 Pankaj Kumar, Hari Om
-
Shared group session key-based conditional privacy-preserving authentication protocol for VANETs Veh. Commun. (IF 5.8) Pub Date : 2024-04-30 Run Zhang, Wenan Zhou
-
How secure are our roads? An in-depth review of authentication in vehicular communications Veh. Commun. (IF 5.8) Pub Date : 2024-04-26 Mahmoud A. Shawky, Syed Tariq Shah, Mohammed Abdrabou, Muhammad Usman, Qammer H. Abbasi, David Flynn, Muhammad Ali Imran, Shuja Ansari, Ahmad Taha
-
IoV-6G+: A secure blockchain-based data collection and sharing framework for Internet of vehicles in 6G-assisted environment Veh. Commun. (IF 5.8) Pub Date : 2024-04-25 Vipin Kumar, Rifaqat Ali, Pawan Kumar Sharma
The growing need for wide and ubiquitous accessibility to advanced Intelligent Transportation Systems (ITS) has led to the evolution of conventional Vehicle to Everything (V2X) paradigms into the Internet of Vehicles (IoVs). Next-generation IoVs establish seamless connections among humans, vehicles, Internet of Things (IoT) devices, and service platforms to enhance transit efficiency, road safety,
-
A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones Veh. Commun. (IF 5.8) Pub Date : 2024-04-25 Aiswarya S. Nair, Sabu M. Thampi, Jafeel V.
With the increasing prevalence of drones, guaranteeing their authentication and secure communication has become paramount in drone networks to mitigate unauthorized access and malicious attacks. Cross-domain authentication is crucial in the context of the Internet of Drones (IoD) for safely verifying and establishing trust between diverse drones and their respective control stations, which may belong
-
Evolutionary game based interest forwarding in information centric vehicular networks Veh. Commun. (IF 5.8) Pub Date : 2024-04-25 Surya Samantha Beri, Nitul Dutta
In Information Centric Network (ICN) a client generates an interest packet when it is in need of a content. The interest packet carries the content name and propagates through the network till it reaches an appropriate cached content store or the producer of the content. Retrieval of the searched content is faster if the interest packet is forwarded in right direction towards a probable content location
-
UAV swarm communication reliability based on a comprehensive SINR model Veh. Commun. (IF 5.8) Pub Date : 2024-04-21 Reuben Yaw Hui Lim, Joanne Mun-Yee Lim, Boon Leong Lan, Patrick Wan Chuan Ho, Nee Shen Ho, Thomas Wei Min Ooi
-
DCFH: A dynamic clustering approach based on fire hawk optimizer in flying ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-04-21 Mehdi Hosseinzadeh, Saqib Ali, Husham Jawad Ahmad, Faisal Alanazi, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Aso Darwesh, Amir Masoud Rahmani, Sang-Woong Lee
In flying ad hoc networks (FANETs), unmanned aerial vehicles (UAVs) communicate with each other without any fixed infrastructure. Because of frequent topological changes, instability of wireless communication, three-dimensional movement of UAVs, and limited resources, especially energy, FANETs deal with many challenges, especially the instability of UAV swarms. One solution to address these problems
-
Moving target defense approach for secure relay selection in vehicular networks Veh. Commun. (IF 5.8) Pub Date : 2024-04-16 Esraa M. Ghourab, Shimaa Naser, Sami Muhaidat, Lina Bariah, Mahmoud Al-Qutayri, Ernesto Damiani, Paschalis C. Sofotasios
-
Simulation and analysis of 5G waveforms to reduce BER for vehicular communications Veh. Commun. (IF 5.8) Pub Date : 2024-04-16 Fowzia Sultana Sowdagar, Krishna Naik Karamtot
In today's rapidly evolving world, wireless communication has become a pervasive force, profoundly impacting various facets of our daily lives. Wireless Vehicular Networks stand out as a captivating realm of research, with a key focus on fostering information exchange among autonomous vehicles. As researchers witness surging demand in this domain, there is a growing emphasis on devising advanced techniques
-
A quantum-secure certificateless aggregate signature protocol for vehicular ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-04-15 Yongfei Huang, Guangxia Xu, Xiaoling Song, Yong Liu, Qiuyan Wang
Vehicular ad hoc networks (VANETs) have revolutionized communication between vehicles and infrastructure, notably enhancing traffic management and passenger safety. However, VANETs are vulnerable to security threats, especially regarding data authenticity. Aggregate signature is a powerful technique that reduces computational and communication burdens by aggregating multiple signatures from different
-
Service-oriented data consistency research for in-vehicle Ethernet Veh. Commun. (IF 5.8) Pub Date : 2024-04-12 Bingkui Li, Lei Zhuang, Guoqing Wang, Yanglong Sun
As the number of in-vehicle electronic devices and system complexity increases, it drives the evolution of the in-vehicle electrical/electronic architecture (E/E). The most promising future architecture is the zone architecture divided by physical location. Zones are connected via high-speed Ethernet, and time-sensitive networking enhances Ethernet in terms of real-time and determinism. In service-oriented
-
A blockchain-based data storage architecture for Internet of Vehicles: Delay-aware consensus and data query algorithms Veh. Commun. (IF 5.8) Pub Date : 2024-04-08 Zhiqiang Ren, Shumei Liu, Yisheng An, Yonghui Li, Naiqi Wu
The recent development of the Internet of Vehicles (IoV) relies heavily on the secure store and analysis of reliable driving data. Blockchain technology has been widely used in the IoV field due to its security advantages, where consensus and query algorithms are two key modules determining its performance. However, existing solutions do not perform well enough in terms of delay performance, thus limiting
-
Fair and efficient resource allocation via vehicle-edge cooperation in 5G-V2X networks Veh. Commun. (IF 5.8) Pub Date : 2024-04-04 Muhammed Nur Avcil, Mujdat Soyturk, Burak Kantarci
To cope with safety risks and operational efficiency problems, it is of paramount importance to ensure high data rates and meet the latency requirements in Connected and Autonomous Vehicles. The problem in such environments is two-fold: 1. Heavy load on the network due to increasing demands; 2) Resource imbalance, due to variations in the vehicular traffic density in certain regions. The consequences
-
Privacy-protecting predictive cache method based on blockchain and machine learning in Internet of vehicles Veh. Commun. (IF 5.8) Pub Date : 2024-04-04 Zihao Shen, Yuanjie Wang, Hui Wang, Peiqian Liu, Kun Liu, Mengke Liu
To solve the privacy leakage problem faced by Internet of Vehicles (IoV) users when enjoying location-based services (LBS), a privacy-protecting predictive cache method based on blockchain and machine learning (BML-PPPCM) is proposed. First, a Bi-directional Long-Short Term Memory (Bi-LSTM) model is used to predict query requests over a future period based on historical request information. The predicted
-
Detection and mitigation of vehicle platooning disruption attacks Veh. Commun. (IF 5.8) Pub Date : 2024-04-02 Salah Zemmoudj, Nabila Bermad, Louiza Bouallouche-Medjkoune
In response to the escalating challenges posed by traffic bottlenecks, accidents, and intersection delays, the deployment of platooning mechanisms emerges as an imperative remedy. This investigation revolves around a pivotal scenario wherein a closely-knit platoon of cooperative vehicles approaches an intersection. Orchestrated by a lead vehicle, this convoy navigates the traffic light to expedite
-
TCV-D: An Approach for Path Selection in Vehicular Task Offloading Veh. Commun. (IF 5.8) Pub Date : 2024-03-29 Niharika Keshari, Dinesh Singh
The vehicular task offloading technology enhances the transportation system by offloading tasks of task-requesting vehicles (TRV) to either vehicular fog nodes (VFN) or road-side units (RSU) using single-hop or multi-hop communication. Due to the limited availability of VFN/RSU within a single-hop of TRV, a multi-hop path is employed for offloading tasks from TRV to VFN/RSU. However, the multi-hop
-
Anti-jamming radar waveform design for repeater jammer using reinforcement learning Veh. Commun. (IF 5.8) Pub Date : 2024-03-28 Muhammmad Majid Aziz, Aamir Habib, Abdur Rahman M. Maud, Adnan Zafar, Syed Ali Irtaza
The ever-evolving technology has given rise to a dynamic and intricate Radar environment, profoundly impacting warfare. Repeater jammers pose a significant threat to Radar systems by re-transmitting intercepted Radar signals with added noise or false information, thereby adding false targets in Radar detection process. Traditional Radar waveform designs often struggle to counter such jammers due to
-
CRAS-FL: Clustered resource-aware scheme for federated learning in vehicular networks Veh. Commun. (IF 5.8) Pub Date : 2024-03-26 Sawsan AbdulRahman, Ouns Bouachir, Safa Otoum, Azzam Mourad
As a promising distributed learning paradigm, Federated Learning (FL) is expected to meet the ever-increasing needs of Machine Learning (ML) based applications in Intelligent Transportation Systems (ITS). It is a powerful tool that processes the large amount of on-board data while preserving its privacy by locally learning the models. However, training and transmitting the model parameters in vehicular
-
Federated learning-based trajectory prediction for dynamic resource allocation in moving small cell networks Veh. Commun. (IF 5.8) Pub Date : 2024-03-21 Saniya Zafar, Sobia Jangsher, Adnan Zafar
With the evolution of fifth generation (5G) of mobile communication, vehicular edge computing (VEC) and moving small cell (MSC) network are gaining attention because of their capability to provide improved quality-of-service (QoS) to vehicular users. The ultimate goal of VEC-enabled MSC network is to diminish the vehicular penetration effect and path loss resulting in improved network performance for
-
S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs Veh. Commun. (IF 5.8) Pub Date : 2024-03-21 Isha Pali, Mohammad Abdussami, Ruhul Amin, Taher Al-Shehari, Muna Al-Razgan, Taha Alfakih
Advancements in technology and the adoption of innovative developments have significantly simplified our lives. One notable innovation in the networking domain is Software Defined Networking (SDN), which revolutionizes the network layer by enabling centralized network administration and re-programmability. SDN technology finds application in diverse fields such as Vehicular Ad-hoc Networks (VANETs)
-
DSSPS: A dynamic secure service provision scheme in fog-based VANETs Veh. Commun. (IF 5.8) Pub Date : 2024-03-19 Yan Xu, Ailian Shi, Jie Cui, Hong Zhong
In fog-based VANETs, fog nodes are close to the network edge that analyze data uploaded by vehicles, and then provide value-added services. It is suitable to adopt data sharing schemes to provide value-added services. However, applying existing data sharing schemes directly for service provision in fog-based VANETs has limitations in terms of security and efficiency. Therefore, we propose a dynamic
-
MTL-PIE: A multi-task learning based drone pilot identification and operation evaluation scheme Veh. Commun. (IF 5.8) Pub Date : 2024-03-18 Liyao Han, Xiangping Zhong, Yanning Zhang
As one of the most promising industries, consumer-grade Unmanned Aerial Vehicles (UAVs), also known as drones, have changed our lives. Although significant progress in drones has been made, adversary impersonation attacks still pose severe risks to flying drones. In addition, authorized pilot miss-operations also has become a critical factor leading to drone flight accidents. To validate the pilot's
-
Lightweight three-party key agreement for V2G networks with physical unclonable function Veh. Commun. (IF 5.8) Pub Date : 2024-03-16 Dingyi Shui, Yong Xie, Libing Wu, Yining Liu, Xing Su
Electric vehicles (EV) are gradually replacing traditional fuel-based vehicles to reduce carbon emissions and protect the human living environment. EVs can be easily integrated into the smart grid infrastructure, and achieve the rapid demand response of power exchange in the vehicle-to-grid (V2G) ecosystem, and achieve optimal energy allocation. However, it is a challenge to simultaneously solve the
-
SoVEC: Social vehicular edge computing-based optimum route selection Veh. Commun. (IF 5.8) Pub Date : 2024-03-15 Sushovan Khatua, Anwesha Mukherjee, Debashis De
This paper proposes a new architecture by integrating three domains: social network, vehicular ad-hoc network, and mobile edge computing. The users access various mobile applications and share various types of information on the social network during travel time. Using SoVEC three categories of social networks are generated based on the type of information shared among the users such as traffic information