-
Resource allocation strategy for vehicular communication networks based on multi-agent deep reinforcement learning Veh. Commun. (IF 5.8) Pub Date : 2025-02-06
Zhibin Liu, Yifei DengIn complex and high-mobility vehicular communication networks, rapidly changing channel conditions, signal interference, and stringent latency requirements of safety services pose significant challenges to existing wireless resource allocation schemes. We propose a novel resource allocation method named AMADRL. It is based on the multi-agent deep reinforcement learning (MADRL) algorithm and incorporates
-
Compact 5 G mmWave vivaldi antenna for vehicular communication Veh. Commun. (IF 5.8) Pub Date : 2025-02-03
Sahar Saleh, Tale Saeidi, Nick Timmons, Ayman A. Althuwayb, Faroq RazzazAs a key contribution, this article presents the first successful application of the newly developed Vivaldi Non-uniform Profile Antenna (VNSPA) theory to a Vivaldi Tapered Slot Antenna (VTSA) operating in the 26 GHz band (24.25–27.5 GHz). The proposed design achieves both compactness and simplicity while maintaining high performance. This antenna is a promising candidate for vehicular communication
-
A survey on physical layer security for 5G/6G communications over different fading channels: Approaches, challenges, and future directions Veh. Commun. (IF 5.8) Pub Date : 2025-01-31
Parmila Devi, Manoranjan Rai Bharti, Dikshant GautamThe surge in wireless network attacks has intensified the focus on physical layer security (PLS) within academia and industry. As PLS provides security solutions by leveraging the randomness of wireless channels without the need for encryption/decryption keys, fading channels play a major role in PLS solutions. This survey aims to understand the effect of fading on PLS for 5G/6G communications by utilizing
-
SC-VDTwinAuth: Smart-contract Assisted Handover Authentication Protocol for Vehicular Digital Twin Network Veh. Commun. (IF 5.8) Pub Date : 2025-01-30
Deepika Gautam, Garima Thakur, Sunil Prajapat, Pankaj KumarVehicular digital twin network is partitioned into multiple networks either due to the geographical differences or their accelerating expansion, which necessitates a secure and incessant transition of cross-regional vehicles. Therefore, in this dynamic topology, the handover process for cross-regional vehicles becomes imperative. The literature encompasses an abundance of blockchain-based handover
-
Resource allocation in unmanned aerial vehicle networks: A review Veh. Commun. (IF 5.8) Pub Date : 2025-01-29
Siva Sai, Sudhanshu Mishra, Vinay ChamolaCurrently, resource allocation in Unmanned Aerial Vehicles (UAVs) is a major topic of discussion among industrialists and researchers. Considering the different emerging applications of UAVs, if the resource allocation problem is not addressed effectively, the upcoming UAV applications will not serve their proposed purpose. Although there are numerous and diverse research works addressing the resource
-
Dense capsule stacked auto-encoder model based DDoS attack detection and hybrid optimal bandwidth allocation with routing in VANET environment Veh. Commun. (IF 5.8) Pub Date : 2025-01-21
Murali Krishna Tanati, Manimaran PonnusamyThe vehicle ad hoc network, or VANET, is a fantastic tool for smart transport since it improves efficiency, management, traffic safety, and comfort. Distributed Denial of Service (DDoS) attacks on VANET infrastructure have the potential to compromise traffic safety by causing collisions and fatalities. Therefore, while integrating VANETs into intelligent transport networks, the pertinent security issues
-
Detection of zero-day attacks via sample augmentation for the Internet of Vehicles Veh. Commun. (IF 5.8) Pub Date : 2025-01-21
Bingfeng Xu, Jincheng Zhao, Bo Wang, Gaofeng HeDetecting zero-day attacks is a critical challenge in the Internet of Vehicles (IoV). Due to the limited availability of labeled attack data, anomaly-based methods are predominantly employed. However, the variability in the driving environment and behavioral patterns of vehicles introduces significant fluctuations in normal behavior, which in turn leads to high false positive rates when using these
-
RORA: Reinforcement learning based optimal distributed resource allocation strategies in vehicular cognitive radio networks for 6G Veh. Commun. (IF 5.8) Pub Date : 2025-01-20
Mani Shekhar Gupta, Akanksha Srivastava, Krishan KumarThe next generation (5G/B5G) vehicular cognitive radio networks (VCRNs) flag the track to intelligence-based autonomous driving in the initiation of future wireless networking and make daily vehicular operation more convenient, greener, efficient, and safer. However, with the continuous evolution of vehicles, the vehicular network becomes large-scale, dynamic, and heterogeneous, making it tough to
-
A novel cylindrical filtering-based greedy perimeter stateless routing scheme in flying ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2025-01-20
Amir Masoud Rahmani, Amir Haider, Khursheed Aurangzeb, May Altulyan, Entesar Gemeay, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Parisa Khoshvaght, Mehdi HosseinzadehFlying ad hoc networks (FANETs) are a new example of ad hoc networks, which arrange unmanned aerial vehicles (UAVs) in an ad hoc form. The features of these networks, such as the movement of UAVs in a 3D space, high speed of UAVs, dynamic topology, limited resources, and low density, have created vital challenges for communication reliability, especially when designing routing methods in FANETs. In
-
Advancing connected vehicle security through real-time sensor anomaly detection and recovery Veh. Commun. (IF 5.8) Pub Date : 2025-01-18
Akshit Singh, Heena RathoreConnected Vehicles (CVs) are a crucial element in the evolution of smart transportation systems, utilizing communication and sensing technologies to interact with each other and with infrastructure. As these vehicles become more interconnected, the risk of their components being affected by anomalies or intentional malicious attacks grows. It is essential, therefore, to identify and filter out any
-
Privacy-enhanced multi-region data aggregation for Internet of Vehicles Veh. Commun. (IF 5.8) Pub Date : 2025-01-17
Haibin Dai, Yuanyuan Zhang, Li Lin, Jinbo Xiong, Youliang TianData aggregation is evolving into an extremely crucial role for facilitating decision-making in Internet of Vehicles (IoV). Multi-region data is a typical attribute of IoV, containing sensitive information and driving trajectories. However, the existing privacy-preserving schemes face problems such as regional statistics, messages integrity, and collusion attacks. In order to tackle this challenge
-
Considering both energy effectiveness and flight safety in UAV trajectory planning for intelligent logistics Veh. Commun. (IF 5.8) Pub Date : 2025-01-17
Zhiyang Liu, Liuhuan Li, Xiao Zhang, Wan Tang, Zhen Yang, Ximin YangIn low-altitude economic logistics scenarios, trajectory planning for unmanned aerial vehicles (UAVs) can be treated as a typical traveling salesman problem (TSP). High-rise buildings in urban areas not only severely impact the flight safety of UAVs, but also increase their energy consumption when avoiding obstacles, thereby affecting their delivery ranges. To address these issues, this paper proposes
-
Vehicles-digital twins matching scheme in vehicular edge computing networks: A hierarchical DRL approach Veh. Commun. (IF 5.8) Pub Date : 2025-01-16
Huanxin Lin, Chao Yang, Shaoan Wu, Xin Chen, Yinan Liu, Yi LiuDigital twin (DT) provides a powerful framework to enable various intelligence applications in vehicular edge computing networks. DT servers are used to model and optimize the resource allocation of the whole dynamic system, to provide low latency services for the vehicles. However, the dynamic topology and varying network status make it a challenge to construct the DT model timely, especially in the
-
UAV-assisted Internet of vehicles: A framework empowered by reinforcement learning and Blockchain Veh. Commun. (IF 5.8) Pub Date : 2025-01-16
Ahmed Alagha, Maha Kadadha, Rabeb Mizouni, Shakti Singh, Jamal Bentahar, Hadi OtrokThis paper addresses the challenges of selecting relay nodes and coordinating among them in UAV-assisted Internet-of-Vehicles (IoV). Recently, UAVs have gained popularity as relay nodes to complement vehicles in IoV networks due to their ability to extend coverage through unbounded movement and superior communication capabilities. The selection of UAV relay nodes in IoV employs mechanisms executed
-
Collaborative service caching for delay minimization in vehicular edge computing networks Veh. Commun. (IF 5.8) Pub Date : 2025-01-16
Man Zhou, Jie Tian, Dongyang Li, Tiantian Li, Ji BianVehicular edge computing (VEC) is beneficial to reduce task offloading delay and service acquisition delay by pushing cloud functions to the edge of the networks. Edge servers have the computation and storage capacity to execute vehicular tasks and cache the services required for tasks execution. Due to the limited caching resources of a single edge server, the vehicles will obtain services from cloud
-
Quantum-resilient blockchain-enabled secure communication framework for connected autonomous vehicles using post-quantum cryptography Veh. Commun. (IF 5.8) Pub Date : 2025-01-15
Anjum Mohd Aslam, Aditya Bhardwaj, Rajat ChaudharyConnected and Autonomous Vehicles (CAVs) are pivotal to the evolution of Intelligent Transportation Systems (ITS), offering enhanced connectivity and automation. However, the emergence of quantum computing poses significant security challenges to existing cryptographic protocols. This study addresses these challenges by proposing a hybrid security approach that combines Kyber Post-Quantum Cryptography
-
A task-driven scheme for forming clustering-structure-based heterogeneous FANETs Veh. Commun. (IF 5.8) Pub Date : 2025-01-15
Siji Chen, Bo Jiang, Hong Xu, Tao Pang, Mingke Gao, Ziyang LiuUnmanned aerial vehicles (UAVs) are an emerging technology with the potential to be used in industries and various sectors of human life to provide a wide range of applications and services, significantly enhancing its applicability in different fields. When a UAV swarm performs complex tasks, flying Ad-hoc networks (FANETs) based on cluster structures have become a key research topic in the field
-
Fairness aware secure energy efficiency maximization for UAV-assisted data collection in backscattering networks Veh. Commun. (IF 5.8) Pub Date : 2025-01-15
Jiawang Zeng, Deepak Mishra, Hassan Habibi Gharakheili, Aruna SeneviratneAutonomous vehicles for intelligent surveillance in rural areas increasingly demand low-cost and reliable data collection technologies to perform dense monitoring across extended areas. Backscattering communication has been employed for this purpose, primarily for low-cost and energy efficiency reasons. This paper considers a backscattering data collection system empowered by unmanned aerial vehicles
-
Exploring V2X in 5G networks: A comprehensive survey of location-based services in hybrid scenarios Veh. Commun. (IF 5.8) Pub Date : 2025-01-13
Bruno Mendes, Marco Araújo, Adriano Goes, Daniel Corujo, Arnaldo S.R. OliveiraVehicle-to-Everything (V2X) communications are constrained by both 3GPP technical specifications, as well as by country-specific spectrum regulations. The world's largest economies, such as the USA, EU and China have self-imposed regulations regarding the specific bandwidths and central spectrum frequencies where both safety and non-safety related V2X communication services are allowed to occur (always
-
An energy-efficient distributed computation offloading algorithm for ground-air cooperative networks Veh. Commun. (IF 5.8) Pub Date : 2025-01-13
Yanling Shao, Hairui Xu, Liming Liu, Wenyong Dong, Pingping Shan, Junying Guo, Wenxuan XuDue to the shortage of energy resources and computational capability, unmanned aerial vehicles (UAVs) tend to fail to execute tasks with time-delay sensitive and complex demands like artificial intelligence (AI) enabled applications. Most offloading method literature in ground-air cooperative systems simply uses edge servers or remote cloud servers to provide computation resources and storage space
-
RIS-aided jellyfish search optimization for multiuser wireless networks improvement Veh. Commun. (IF 5.8) Pub Date : 2024-12-10
Zahraa Tarek, Mona Gafar, Shahenda Sarhan, Abdullah M. Shaheen, Ahmed S. AlwakeelReconfigurable Intelligent Surfaces (RISs) provide a promising avenue for enhancing performance and implementation efficiency in multiuser wireless communication systems by enabling the manipulation of radio wave propagation. In this paper, an Augmented Jellyfish Search Optimization Algorithm (AJFSOA) is specifically designed to optimize the achievable rate in RIS-equipped systems. AJFSOA distinguishes
-
A review of smart vehicles in smart cities: Dangers, impacts, and the threat landscape Veh. Commun. (IF 5.8) Pub Date : 2024-12-07
Brooke KidmoseThe humble, mechanical automobile has gradually evolved into our modern connected and autonomous vehicles (CAVs)—also known as “smart vehicles.” Similarly, our cities are gradually developing into “smart cities,” where municipal services from transportation networks to utilities to recycling to law enforcement are integrated. The idea, with both smart vehicles and smart cities, is that more data leads
-
Federated learning on the go: Building stable clusters and optimizing resources on the road Veh. Commun. (IF 5.8) Pub Date : 2024-12-06
Sawsan AbdulRahman, Safa Otoum, Ouns BouachirWith the proliferation of Internet of Things, leveraging federated learning (FL) for collaborative model training has become paramount. It has turned into a powerful tool to analyze on-device data and produce real-time applications while safeguarding user privacy. However, in vehicular networks, the dynamic nature of vehicles, coupled with resource constraints, gives rise to new challenges for efficient
-
VeTraSPM: Novel vehicle trajectory data sequential pattern mining algorithm for link criticality analysis Veh. Commun. (IF 5.8) Pub Date : 2024-12-06
Nourhan Bachir, Chamseddine Zaki, Hassan Harb, Roland BillenThis paper presents VeTraSPM (Vehicle Trajectory Data Sequential Pattern Mining), a novel algorithm designed to address the limitations of existing sequential pattern mining methods when applied to vehicle trajectory data. Current algorithms fail to capture essential characteristics such as directional flow on one-way roads (e.g., “AB” is valid but not “BA”), connectivity constraints at junctions,
-
The stability for CACC system with time delays and reconstitution information of vehicles for compensating delays based on Bi-LSTM Veh. Commun. (IF 5.8) Pub Date : 2024-12-06
Chenmin Zhang, Yonggui Liu, Zeming LiThe vehicle platoon using the cooperative adaptive cruise control (CACC) transmits information between vehicles via communication networks to increase the control performance. However, time delays are inevitable during the network transmission of information, which influence the stability of the CACC vehicle system. This paper proposes a method for compensating information affected by time delays based
-
STC-GraphFormer: Graph spatial-temporal correlation transformer for in-vehicle network intrusion detection system Veh. Commun. (IF 5.8) Pub Date : 2024-12-05
Gaber A. Al-Absi, Yong Fang, Adnan A. QaseemThe integration of several developing technologies and their applications with Internet of Vehicles (IoVs) techniques has been improved. Utilizing these emerging technologies renders the in-vehicle network more susceptible to intrusions. Furthermore, the utilization of Electronic Control Units (ECUs) in current vehicles has experienced a significant increase, establishing the Controller Area Network
-
Offloading in V2X with road side units: Deep reinforcement learning Veh. Commun. (IF 5.8) Pub Date : 2024-12-05
Widhi Yahya, Ying-Dar Lin, Faysal Marzuk, Piotr Chołda, Yuan-Cheng LaiTraffic offloading is crucial for reducing computing latency in distributed edge systems such as vehicle-to-everything (V2X) networks, which use roadside units (RSUs) and access network mobile edge computing (AN-MEC) with ML agents. Traffic offloading is part of the control plane problem, which requires fast decision-making in complex V2X systems. This study presents a novel ratio-based offloading
-
-
Dimensioning space-air-ground integrated networks for in-flight 6G slice orchestration Veh. Commun. (IF 5.8) Pub Date : 2024-12-05
László Toka, Endre Angelus Papp, Tibor Cinkler, István Gódor, László HéviziIn this study, we present an in-depth analysis of communication services for commercial airline passengers, focusing on the challenges posed by increasing internet traffic demand. We explore the integration of satellite, airborne, and terrestrial networks, emphasizing the roles of Low Earth Orbit (LEO) satellites, High-Altitude Platform Station (HAPS), and Terrestrial Aviation Network (TAN)-based services
-
Redundant task offloading with dual-reliability in MEC-assisted vehicular networks Veh. Commun. (IF 5.8) Pub Date : 2024-12-04
Yaoxin Duan, Wendi Nie, Victor C.S. Lee, Kai LiuWith the rise and development of intelligent vehicles, the computation capability of vehicles has increased rapidly and considerably. Vehicle-to-Vehicle (V2V) offloading, in which computation-intensive tasks are offloaded to underutilized vehicles, has been proposed. However, V2V offloading faces the challenges of task transmission reliability and task computation reliability. In V2V offloading, tasks
-
A data sharing scheme based on blockchain for privacy protection certification of Internet of Vehicles Veh. Commun. (IF 5.8) Pub Date : 2024-12-02
Fengjun Shang, Xinxin DengWith the vigorous development of Internet of Vehicles (IoV) technology, modern cars equipped with advanced on-board systems are continuously generating massive amounts of data. Utilizing this data can improve driving safety and achieve better service quality in smart transportation systems. Therefore, ensuring the efficiency and security of data sharing is an important issue. Integrating IoV and blockchain
-
Joint edge caching and computation offloading for heterogeneous tasks in MEC-enabled vehicular networks Veh. Commun. (IF 5.8) Pub Date : 2024-11-28
Yangqianhang Li, Li Li, Zhaorong ZhouEdge caching is an effective paradigm that can significantly reduce the computation task offloading latency for mobile edge computing (MEC) in vehicular networks, while also alleviating the backhaul transmission pressure for retrieving content data from the cloud server. However, most existing works fail to address how to handle heterogeneous tasks generated by vehicle terminals (VTs), especially in
-
A survey of intelligent reflecting surfaces: Performance analysis, extensions, potential challenges, and open research issues Veh. Commun. (IF 5.8) Pub Date : 2024-11-20
Adil Khan, Syed Agha Hassnain Mohsan, Abdelrahman Elfikky, Ayman I. Boghdady, Shabeer Ahmad, Nisreen InnabThe rapid advancements in wireless communication have underscored the need for innovative solutions to enhance network performance, spectral efficiency, and energy savings. Intelligent Reflecting Surface (IRS) technology has emerged as a transformative approach that passively reconfigures wireless propagation environments, offering significant improvements without active power consumption. This survey
-
Cooperative approach for data-centric and node-centric misbehavior detection in VANET Veh. Commun. (IF 5.8) Pub Date : 2024-11-17
Rukhsar Sultana, Jyoti Grover, Meenakshi TripathiVehicular Ad Hoc Network (VANET) has risen as a paramount technology for efficiently providing traffic management, safety and infotainment services to road users. Vehicles are allowed to use pseudo identities during vehicular network access to preserve their privacy. This property makes VANET vulnerable to Sybil attack, performed by exploiting the set of pseudo identities to send messages. Detecting
-
Boosting vehicular connectivity through resource allocation algorithm based on Heterogeneous Agent Proximal Policy Optimization Veh. Commun. (IF 5.8) Pub Date : 2024-11-15
Junhui Zhao, Xincheng Xiong, Qingmiao Zhang, Shihai Ren, Jingyan Chen, Wei Xu, Dongming WangVehicle-to-Vehicle (V2V) communication can not only provide unrestricted inter-vehicle information transmission, but also improve spectrum utilization efficiency. However, it also brings uncontrollable co-channel interference, which can not guarantee the quality of service of V2V communication. In this paper, we propose an intelligent resource allocation scheme for V2V communication to improve vehicle
-
Optimization of electric vehicle charging and scheduling based on VANETs Veh. Commun. (IF 5.8) Pub Date : 2024-11-15
Tianyu Sun, Ben-Guo He, Junxin Chen, Haiyan Lu, Bo Fang, Yicong ZhouVehicular Ad-hoc Networks (VANETs) provide key support for the achievement of intelligent, safe, and efficient driverless transportation systems through real-time communication between vehicles and vehicles, and vehicles and road infrastructure. This paper investigates a joint optimization problem of electric vehicles (EVs) charging management and resource allocation based on VANETs. EV charging requires
-
Decentralized multi-hop data processing in UAV networks using MARL Veh. Commun. (IF 5.8) Pub Date : 2024-11-15
Indu Chandran, Kizheppatt VipinUnmanned Aerial Vehicles (UAVs) have become integral to numerous applications, prompting research towards enhancing their capabilities. For time-critical missions, minimizing latency is crucial; however, current studies often rely on sending data to ground station or cloud for processing due to their limited onboard capacities. To leverage the networking capabilities of UAVs, recent research focuses
-
Prediction-based data collection of UAV-assisted Maritime Internet of Things Veh. Commun. (IF 5.8) Pub Date : 2024-11-08
Xiaoluoteng Song, Xiuwen Fu, Mingyuan Ren, Pasquale Pace, Gianluca Aloi, Giancarlo FortinoIn maritime data collection scenarios, due to the constraints of wireless communication and environmental factors such as wave motion, sea surface ducting effects, and sea surface curvature, floating sensor nodes are unable to establish direct data transmission links with the base station. The advent of unmanned aerial vehicle (UAV)-assisted Maritime Internet of Things (MIoT) provides a feasible solution
-
Hybrid mutual authentication for vehicle-to-infrastructure communication without the coverage of roadside units Veh. Commun. (IF 5.8) Pub Date : 2024-11-07
Huizhi Tang, Abdul Rauf, Qin Lin, Guoqing Dou, Changshuai QinThe security issues in Vehicle Ad Hoc Networks (VANETs) are prevalent within Intelligent Transportation Systems (ITS). To ensure the security of vehicle-to-infrastructure (V2I) communication, extensive research on V2I authentication has been conducted in recent years. However, these protocols often overlook the limitations of communication range, leading to failures in V2I communication. Consequently
-
Hierarchical federated deep reinforcement learning based joint communication and computation for UAV situation awareness Veh. Commun. (IF 5.8) Pub Date : 2024-11-06
Haitao Li, Jiawei HuangThe computation-intensive situational awareness (SA) task of unmanned aerial vehicle (UAV) is greatly affected by its limited power and computing capability. To solve this challenge, we consider the joint communication and computation (JCC) design for UAV network in this paper. Firstly, a multi-objective optimization (MOO) model, which can optimize UAV computation offloading, transmit power, and local
-
Volunteer vehicle assisted dependent task offloading based on ant colony optimization algorithm in vehicular edge computing Veh. Commun. (IF 5.8) Pub Date : 2024-10-31
Chen Cheng, Linbo Zhai, Yujuan Jia, Xiumin Zhu, Yumei LiVehicle Edge Computing improves the Quality of Service of vehicular applications by offloading tasks to the VEC server. However, with the continuous development of computation-intensive vehicular applications, the limited resources of the VEC server will not be enough to support these applications. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) proposes a concept of using vehicles as
-
STAR-RIS-NOMA empowered vehicle-to-vehicle communications: Outage and ergodic capacity analysis Veh. Commun. (IF 5.8) Pub Date : 2024-10-28
Luxmi Kant Vishwakarma, Radhika Gour, Suneel Yadav, Adão SilvaThis paper delves into the performance evaluation of a non-orthogonal multiple access (NOMA) enabled vehicle-to-vehicle (V2V) communication system empowered by simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RIS). Herein, we consider that a moving access point (AP) transmits superimposed signals to nearby and distant NOMA vehicles simultaneously via reflection and
-
Deep Reinforcement Learning based running-track path design for fixed-wing UAV assisted mobile relaying network Veh. Commun. (IF 5.8) Pub Date : 2024-10-28
Tao Wang, Xiaodong Ji, Xuan Zhu, Cheng He, Jian-Feng GuThis paper studies a fixed-wing unmanned aerial vehicle (UAV) assisted mobile relaying network (FUAVMRN), where a fixed-wing UAV employs an out-band full-duplex relaying fashion to serve a ground source-destination pair. It is confirmed that for a FUAVMRN, straight path is not suitable for the case that a huge amount of data need to be delivered, while circular path may lead to low throughput if the
-
Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks Veh. Commun. (IF 5.8) Pub Date : 2024-10-24
Junfeng Tian, Yue Shen, Yiting WangAutonomous vehicles safeguard the security and efficiency of Internet of Vehicles systems in small industrial parks by authenticating and exchanging real-time information with transportation infrastructure. Deploying a multi-server framework reduces the risk of message blocking and privacy information leakage from centralized services. However, in traditional handover authentication protocols, there
-
EPAKA: An efficient and privacy-preserving authenticated key agreement scheme based on physical security for VANET Veh. Commun. (IF 5.8) Pub Date : 2024-10-24
Chunhua Jin, Penghui Zhou, Zhiwei Chen, Wenyu Qin, Guanhua Chen, Hao Zhang, Jian WengVehicular ad hoc network (VANET) has been a promising technology in smart transportation system, which can enable information exchange between vehicles and roadside units (RSUs). However, the privacy of vehicles and RSUs is a critical challenge in VANET, as they may expose sensitive information to malicious attackers or unauthorized parties. Many existing authenticated key agreement (AKA) schemes aim
-
In-vehicle communication cyber security: A comprehensive review of challenges and solutions Veh. Commun. (IF 5.8) Pub Date : 2024-09-30
Batuhan Gul, Fatih ErtamThe utilization of autonomous vehicles is experiencing a rapid proliferation in contemporary society. Concurrently, with the relentless evolution of technology, the inexorable integration of autonomous vehicles into urban environments, driven by the overarching paradigm of smart cities, becomes increasingly apparent. This escalating reliance on autonomous vehicles concurrently heightens the susceptibility
-
CANival: A multimodal approach to intrusion detection on the vehicle CAN bus Veh. Commun. (IF 5.8) Pub Date : 2024-09-12
Hyunjae Kang, Thanh Vo, Huy Kang Kim, Jin B. HongVehicles of today are composed of over 100 electronic embedded devices known as Electronic Control Units (ECU), each of which controls a different component of the vehicle and communicates via the Controller Area Network (CAN) bus. However, unlike other network protocols, the CAN bus communication protocol lacks security features, which is a growing concern as more vehicles become connected to the
-
Joint optimization for service-caching, computation-offloading, and UAVs flight trajectories over rechargeable UAV-aided MEC using hierarchical multi-agent deep reinforcement learning Veh. Commun. (IF 5.8) Pub Date : 2024-09-11
Zhian Chen, Fei Wang, Jiaojie WangDue to the high mobility, high chance of line-of-sight (LoS) transmission, and flexible deployment, unmanned aerial vehicles (UAVs) have been used as mobile edge computing (MEC) servers to provide ubiquitous computation services to mobile users (MUs). However, the limited energy storage, caching capacity, and computation resources of UAVs bring new challenges for UAV-aided MEC, e.g., how to recharge
-
Upper bound of outage probability in unmanned aerial vehicle-assisted cellular networks over fading channels Veh. Commun. (IF 5.8) Pub Date : 2024-09-05
Mehran Pourmohammad Abdollahi, Hosein Azarhava, Javad Musevi Niya, Mahdi NangirIn this paper, we consider a multi-tier cellular network in which a hovering Unmanned Aerial Vehicle (UAV) assists the network in the absence of the terrestrial Macrocell base station. The orthogonal sub channels are assumed for communication between the UAV and its attached users. The Femtocell users and Device-to-Device (D2D) pairs transmit their data to the corresponding receivers in the same sub-channels
-
LB-CLAS: Lattice-based conditional privacy-preserving certificateless aggregate signature scheme for VANET Veh. Commun. (IF 5.8) Pub Date : 2024-09-04
Sheng-wei Xu, Shu-han Yu, Yi-Jie Bai, Zi-Yan Yue, Yi-Long LiuThe rapid development of vehicular ad-hoc networks (VANETs) has brought great convenience to intelligent transportation, and the secure transmission of information in VANETs has become a serious problem. In addition, the protection of private information of vehicles is also a key issue. Aiming at the problem of how to guarantee the secure transmission of information in VANETs under the condition of
-
Security situation assessment in UAV swarm networks using TransReSE: A Transformer-ResNeXt-SE based approach Veh. Commun. (IF 5.8) Pub Date : 2024-09-04
Dongmei Zhao, Pengcheng Shen, Xunzhen Han, Shuiguang ZengWith the rapid development and extensive application of unmanned aerial vehicles (UAVs), the issue of UAV swarm network security has become prominent. To protect the security of UAV swarm networks, effective network security defense measures are crucial. One key aspect is the assessment and monitoring of the network's security situation. However, most existing research focuses on the security of individual
-
Enhancing vehicular NOMA communication security through reconfigurable intelligent surfaces Veh. Commun. (IF 5.8) Pub Date : 2024-09-04
Altynbek Serikov, Mohd Hamza Naim Shaikh, Galymzhan NauryzbayevPhysical layer security (PLS) aims to ensure the confidentiality and authenticity of transmitted data by capitalizing on the inherent randomness of wireless channels. Owing to the popularity of intelligent transportation systems (ITSs), PLS research has sparked renewed interest in the wireless research community. This paper investigates the performance of secure communication in the context of a vehicle-to-vehicle
-
An adaptive and multi-path greedy perimeter stateless routing protocol in flying ad hoc networks Veh. Commun. (IF 5.8) Pub Date : 2024-09-04
Amir Masoud Rahmani, Dildar Hussain, Reem Jafar Ismail, Faisal Alanazi, Salem Belhaj, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Aso Darwesh, Mehdi HosseinzadehIn recent years, flying ad hoc networks (FANET), formed from unmanned aerial vehicles (UAVs), have absorbed the attention of academic and industrial research communities due to their many applications in military and civilian fields. FANETs benefit from unique features, including highly moving UAVs and dynamic topological structure. Therefore, most existing routing protocols, such as the greedy perimeter
-
URLLC-aware and energy-efficient data offloading strategy in high-mobility vehicular mobile edge computing environments Veh. Commun. (IF 5.8) Pub Date : 2024-09-02
Hong Min, Jawad Tanveer, Amir Masoud Rahmani, Abdullah Alqahtani, Abed Alanazi, Shtwai Alsubai, Mehdi HosseinzadehThe integration of Internet of Things (IoT) technologies into the vehicular industry has initiated a new era of connected and autonomous vehicles, revolutionizing transportation systems. However, this transformation introduces significant challenges, especially in 5 G networks, such as achieving Ultra-Reliable Low-Latency Communications (URLLC) and maintaining energy efficiency within the high mobility
-
A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning Veh. Commun. (IF 5.8) Pub Date : 2024-08-30
Muzun Althunayyan, Amir Javed, Omer RanaAs connected and autonomous vehicles proliferate, the Controller Area Network (CAN) bus has become the predominant communication standard for in-vehicle networks due to its speed and efficiency. However, the CAN bus lacks basic security measures such as authentication and encryption, making it highly vulnerable to cyberattacks. To ensure in-vehicle security, intrusion detection systems (IDSs) must
-
A secure authentication framework for IoV based on blockchain and ensemble learning Veh. Commun. (IF 5.8) Pub Date : 2024-08-23
Wenxian Jiang, Xianglong Lv, Jun TaoA secure authentication framework based on blockchain and ensemble learning is proposed to address the problem that vehicle identity privacy data in Internet of Vehicles (IoV) is vulnerable to theft and tampering. First, a secure and efficient authentication method based on blockchain and Physical Unclonable Function (PUF) is implemented, which ensures the identity privacy of the vehicle when accessing
-
Physical layer security in SWIPT-based cooperative vehicular relaying networks Veh. Commun. (IF 5.8) Pub Date : 2024-08-19
Patrick Odong, Ahmed H. Abd El-Malek, Ahmed Allam, Adel B. Abdel-RahmanThe future of autonomous transportation systems depends on energy sustainability and secure information exchange from low-power vehicular sensors, hence the increased interest in vehicular sensor charging using simultaneous wireless information and power transfer (SWIPT). This study investigates the physical layer security of a SWIPT-based radio frequency energy harvesting cooperative vehicular relaying
-
Assessing the impact of communication delays for Autonomous Intersection Management systems Veh. Commun. (IF 5.8) Pub Date : 2024-08-02
Michael I.-C. Wang, Charles H.-P. Wen, H. Jonathan ChaoCommunication is essential for Cooperative Intelligent Transportation Systems (C-ITS) to achieve better road efficiency, especially for Autonomous Intersection Management (AIM) which coordinates vehicles to pass the intersection safely and efficiently. Communication delays cause severe safety crises (i.e., collisions) and vehicular-performance degradation regarding intersection capacities and vehicular
-
HCFAIUN: A novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks Veh. Commun. (IF 5.8) Pub Date : 2024-07-26
Jatin Sharma, Pawan Singh MehraIoT-based UAV networks comprise interconnected UAVs outfitted with sensors and microcontrollers to simplify data exchange in environments such as smart cities. In light of open-access communication landscapes, IoT-based UAV networks could pose security challenges, encompassing authentication vulnerabilities and the inadvertent disclosure of location and other confidential information to unauthorised
-
Efficiency of UAV-assisted cellular networks under jamming scenarios Veh. Commun. (IF 5.8) Pub Date : 2024-07-26
Mohammad Arif, Wooseong KimThe wireless signal that intentionally disrupts the communication is described as the jamming signal. Clustered jamming is the use of jamming signals of the devices that are clustered in groups, whereas non-clustered jamming refers to the use of the jamming signals of the spatially distributed devices that are un-clustered. The efficiency of the unmanned aerial vehicle (UAV)-assisted cellular networks