IEEE Open Journal of Vehicular Technology最新文献

筛选
英文 中文
Experimental Open-Source-Based Evaluation Platform for Highly Spectral-Efficient 5G With Simplified UTW-OFDM 基于开源的5G简化utwo - ofdm高频谱效率实验评估平台
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-12 DOI: 10.1109/OJVT.2025.3569518
Kazuki Takeda;Keiichi Mizutani;Hiroshi Harada
{"title":"Experimental Open-Source-Based Evaluation Platform for Highly Spectral-Efficient 5G With Simplified UTW-OFDM","authors":"Kazuki Takeda;Keiichi Mizutani;Hiroshi Harada","doi":"10.1109/OJVT.2025.3569518","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3569518","url":null,"abstract":"Fifth-generation mobile communication (5G) systems are increasingly being deployed in both commercial and private wireless networks to meet the growing demand for high-speed, reliable connectivity. While 5G systems adopt orthogonal frequency-division multiplexing (OFDM) for its high data rates and spectral efficiency, OFDM is known to generate large out-of-band emissions (OOBE), which must be suppressed to maximize spectrum usage. In this study, to tackle this issue, we propose and develop an experimental 5G full-stack evaluation platform that implements a waveform-shaping function for OFDM signals. The platform utilizes software-defined radio and open-source 5G software compliant with third-generation Partnership Project standards. We implement a simplified universal time-domain windowed OFDM as an application of the waveform shaping. This is a waveform shaping technique that can strongly suppress OOBE by applying a long time-domain window to the conventional cyclic prefix OFDM symbol. The transmission performance of the proposed platform was evaluated using a complete 5G system, which includes a 5G base station, user equipment, and a 5G core network. The effectiveness of the proposed platform is verified through link-level computer simulations. The results demonstrate that the block error rate characteristics exhibited a signal-to-noise power ratio difference of less than 1 dB between the platform and simulations and achieved an OOBE suppression of up to 24 dB at a bandwidth of 40 MHz. Furthermore, connectivity with a commercial 5G device demonstrated the feasibility of achieving OOBE suppression of 22 dB at a bandwidth of 100 MHz with a tolerable decrease of 18% in user throughput.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"1426-1437"},"PeriodicalIF":5.3,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11002599","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
URLLC Over Slow Fading Channels: K-Repetition Versus Multi-Connectivity 慢衰落信道上的URLLC: k -重复与多连接
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-12 DOI: 10.1109/OJVT.2025.3569187
Qingjiao Song;Fu-Chun Zheng;Jingjing Luo
{"title":"URLLC Over Slow Fading Channels: K-Repetition Versus Multi-Connectivity","authors":"Qingjiao Song;Fu-Chun Zheng;Jingjing Luo","doi":"10.1109/OJVT.2025.3569187","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3569187","url":null,"abstract":"In this work, we analyze the performance of the uplink ultra-reliable and low-latency communications (URLLC) for the low-mobility users (UEs) in a factory environment. The <inline-formula><tex-math>$K$</tex-math></inline-formula>-repetition scheme is a promising approach for improving URLLC reliability, but most studies so far have been carried out assuming fast fading. A UE with low mobility typically experiences a time-correlated slow fading channel. We therefore consider the effects of time correlation in analyzing the performance of a <inline-formula><tex-math>$K$</tex-math></inline-formula>-repetition scheme. On the other hand, multi-connectivity (MC) schemes can overcome such effects and improve reliability through space diversity. We then apply differential modulation to both schemes to support URLLC services, and compare their performance. The simulation results show that such slow fading channels severely decreases the time diversity of a <inline-formula><tex-math>$K$</tex-math></inline-formula>-repetition scheme, and the MC scheme outperforms the <inline-formula><tex-math>$K$</tex-math></inline-formula>-repetition scheme in terms of reliability and transmission latency.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"1280-1286"},"PeriodicalIF":5.3,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10999067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144178923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transforming Highway Safety With Autonomous Drones and AI: A Framework for Incident Detection and Emergency Response 用自主无人机和人工智能改变公路安全:事故检测和应急响应框架
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-11 DOI: 10.1109/OJVT.2025.3549387
Muhammad Farhan;Hassan Eesaar;Afaq Ahmed;Kil To Chong;Hilal Tayara
{"title":"Transforming Highway Safety With Autonomous Drones and AI: A Framework for Incident Detection and Emergency Response","authors":"Muhammad Farhan;Hassan Eesaar;Afaq Ahmed;Kil To Chong;Hilal Tayara","doi":"10.1109/OJVT.2025.3549387","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3549387","url":null,"abstract":"Highway accidents pose serious challenges and safety risks, often resulting in severe injuries and fatalities due to delayed detection and response. Traditional accident management methods heavily rely on manual reporting, which can be sometime inefficient and error-prone resulting in valuable life loss. This paper proposes a novel framework that integrates autonomous aerial systems (drones) with advanced deep learning models to enhance real-time accident detection and response capabilities. The system not only dispatch the drones but also provide live accident footage, accident identification and aids in coordinating emergency response. In this study we implemented our system in Gazebo simulation environment, where an autonomous drone navigates to specified location based on the navigation commands generated by Large Language Model (LLM) by processing the emergency call/transcript. Additionally, we created a dedicated accident dataset to train YOLOv11 m model for precise accident detection. At accident location the drone provides live video feeds and our YOLO model detects the incident, these high-resolution captured images after detection are analyzed by Moondream2, a Vision language model (VLM), for generating detailed textual descriptions of the scene, which are further refined by GPT 4-Turbo, large language model (LLM) for producing concise incident reports and actionable suggestions. This end-to-end system combines autonomous navigation, incident detection and incident response, thus showcasing its potential by providing scalable and efficient solutions for incident response management. The initial implementation demonstrates promising results and accuracy, validated through Gazebo simulation. Future work will focus on implementing this framework to the hardware implementation for real-world deployment in highway incident system.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"829-845"},"PeriodicalIF":5.3,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10918802","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143777883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Threat Susceptibility Assessment for Heavy-Duty Vehicles Based on ISO/SAE 21434 基于 ISO/SAE 21434 的重型车辆网络威胁易感性评估
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-11 DOI: 10.1109/OJVT.2025.3550307
Narges Rahimi;Beth-Anne Schuelke-Leech;Mitra Mirhassani
{"title":"Cyber Threat Susceptibility Assessment for Heavy-Duty Vehicles Based on ISO/SAE 21434","authors":"Narges Rahimi;Beth-Anne Schuelke-Leech;Mitra Mirhassani","doi":"10.1109/OJVT.2025.3550307","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3550307","url":null,"abstract":"TARA, which stands for Threat Analysis and Risk Assessment, serves as the foundational stage of cybersecurity implementation, particularly in the context of vehicular systems. While various considerations and risk assessment frameworks have been discussed in recent years, there is a notable lack of TARA models specifically designed for heavy-duty (HD) vehicles. The security considerations and vulnerabilities in HD vehicles differ significantly from those in light-duty (LD) vehicles, leading to different security impacts and varying attack feasibility. This makes existing models inadequate for accurately assessing risks in the context of HD vehicles. This study introduces a novel risk assessment model tailored for HD vehicles, addressing gaps in existing TARA frameworks such as EVITA, HEAVENS, and ISO/SAE 21434. The key contribution of this work lies in the customization of impact and feasibility metrics within the ISO/SAE framework to better account for the unique security challenges posed by HD vehicles. Unlike prior models, this approach adapts the impact criteria to reflect the diverse range of security concerns specific to HD vehicles, which have been inadequately addressed in existing frameworks. Additionally, through a comprehensive analysis of threat vectors and vehicle interfaces, the model refines feasibility criteria, ensuring a more accurate and context-aware assessment of security risks. By adopting these enhancements, the proposed model offers more precise risk assessments that align with HD vehicle considerations, helping to prioritize threats and make optimal decisions regarding risk treatment.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"969-990"},"PeriodicalIF":5.3,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10921673","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143830529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Graph Neural Backdoors in Vehicular Networks: Fundamentals, Methodologies, Applications, and Future Perspectives 探索车辆网络中的图神经后门:基础、方法、应用和未来展望
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-11 DOI: 10.1109/OJVT.2025.3550411
Xiao Yang;Gaolei Li;Kai Zhou;Jianhua Li;Xingqin Lin;Yuchen Liu
{"title":"Exploring Graph Neural Backdoors in Vehicular Networks: Fundamentals, Methodologies, Applications, and Future Perspectives","authors":"Xiao Yang;Gaolei Li;Kai Zhou;Jianhua Li;Xingqin Lin;Yuchen Liu","doi":"10.1109/OJVT.2025.3550411","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3550411","url":null,"abstract":"Advances in Graph Neural Networks (GNNs) have substantially enhanced Vehicular Networks (VNs) across primary domains, encompassing traffic forecasting and management, route optimization and algorithmic planning, and cooperative driving. Despite the boosts of the GNN for VNs, recent research has empirically demonstrated its potential vulnerability to backdoor attacks, wherein adversaries integrate triggers into inputs to manipulate GNNs to generate adversary-premeditated malicious outputs (<italic>e.g.</i>, misclassification of vehicle actions or traffic signals). This susceptibility is attributable to adversarial manipulation attacks targeting the training process of GNN-based VN systems. Although there is a rapid increase in research on GNN backdoors, systematic surveys within this domain remain lacking. To bridge this gap, we present the first survey dedicated to GNN backdoors. We start with outlining the fundamental definition of GNNs, followed by the detailed summarization and categorization of current GNN backdoors and countermeasures based on their technical features and application scenarios. Subsequently, an analysis of the applicability paradigms of GNN backdoors is conducted, and prospective research trends are presented. Unlike prior surveys on vision-centric backdoors, we uniquely investigate GNN-oriented backdoor attacks in VNs, which aims to explore attack surfaces across spatiotemporal vehicular graphs and provide insights to security research.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"1051-1071"},"PeriodicalIF":5.3,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10921674","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFT-Spread OFDM-Based MIMO Joint Communication and Sensing System 基于DFT-Spread ofdm的MIMO联合通信与传感系统
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-10 DOI: 10.1109/OJVT.2025.3549918
Max Schurwanz;Jan Mietzner;Peter Adam Hoeher
{"title":"DFT-Spread OFDM-Based MIMO Joint Communication and Sensing System","authors":"Max Schurwanz;Jan Mietzner;Peter Adam Hoeher","doi":"10.1109/OJVT.2025.3549918","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3549918","url":null,"abstract":"This paper introduces a joint communication and sensing (JCAS) system design that employs a discrete Fourier transform (DFT)-spread orthogonal frequency-division multiplexing (OFDM) waveform integrated with a multiple-input multiple-output (MIMO) antenna array. This system has been designed with the specific requirements of future remotely piloted or autonomous aircraft systems in urban air mobility (UAM) settings in mind. The objective is to provide high-bandwidth data transmission in conjunction with precise radar sensing, thereby enhancing situational awareness and facilitating efficient spectrum usage. The paper makes a number of significant contributions to the field, including the development of a flexible MIMO DFT-spread OFDM system model and the introduction of a phase compensation term for comprehensive direction-of-arrival estimation. Additionally, the effects of non-linear power amplifiers on system efficacy are analyzed through detailed simulations, providing a rigorous evaluation of the proposed design's practicality and resilience. The numerical analysis establishes a framework for the design of a JCAS system for UAM, taking into account the influence of realistic electronic components and the respective performance requirements for communication and sensing.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"868-880"},"PeriodicalIF":5.3,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10919057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143792856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Max–Min Secrecy Rate and Secrecy Energy Efficiency Optimization for RIS-Aided VLC Systems: RSMA Versus NOMA ris辅助VLC系统的最大最小保密率和保密能效优化:RSMA与NOMA
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-08 DOI: 10.1109/OJVT.2025.3568436
Omar Maraqa;Sylvester Aboagye;Majid H. Khoshafa;Telex M. N. Ngatched
{"title":"Max–Min Secrecy Rate and Secrecy Energy Efficiency Optimization for RIS-Aided VLC Systems: RSMA Versus NOMA","authors":"Omar Maraqa;Sylvester Aboagye;Majid H. Khoshafa;Telex M. N. Ngatched","doi":"10.1109/OJVT.2025.3568436","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3568436","url":null,"abstract":"Integrating visible light communication (VLC) with the reconfigurable intelligent surface (RIS) significantly enhances physical layer security by enabling precise directional signal control and dynamic adaptation to the communication environment. These capabilities strengthen the confidentiality and security of VLC systems. This paper presents a comprehensive study on the joint optimization of VLC access point (AP) power allocation, RIS association, and RIS elements orientation angles for secure VLC systems, while considering rate-splitting multiple access (RSMA) and power-domain non-orthogonal multiple access (NOMA) schemes. Specifically, two frameworks are proposed to maximize both the minimum secrecy rate (SR) and the minimum secrecy energy efficiency (SEE) by jointly optimizing power allocation, RIS association, and RIS elements orientation angles for both power-domain NOMA and RSMA-based VLC systems. The proposed frameworks consider random device orientation and guarantee the minimum user-rate requirement. The proposed optimization frameworks belong to the class of mixed integer nonlinear programming, which has no known feasible solution methodology to guarantee the optimal solution. Moreover, the increased degree of freedom and flexibility from the joint consideration of power control, RIS association and element orientation results in a large set of decision variables and constraints, which further complicates the optimization problem. To that end, we utilize a genetic algorithm-based solution method, which through its exploration and exploitation capabilities can obtain a good quality solution. Additionally, comprehensive simulations show that the RSMA scheme outperforms the power-domain NOMA scheme across both the SR and SEE metrics over various network parameters. Furthermore, useful insights on the impact of minimum user rate requirement, number of RIS elements, and maximum VLC AP transmit power on the minimum SR and SEE performances are provided.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"1303-1316"},"PeriodicalIF":5.3,"publicationDate":"2025-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10994327","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144196911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISAC Receiver Design: Joint DoA and Data Estimation in the Presence of Incomplete Signal Observations ISAC接收机设计:不完全信号观测下的联合DoA和数据估计
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-07 DOI: 10.1109/OJVT.2025.3544148
Iman Valiulahi;Christos Masouros;Mahmoud Alaaeldin;Emad Alsusa
{"title":"ISAC Receiver Design: Joint DoA and Data Estimation in the Presence of Incomplete Signal Observations","authors":"Iman Valiulahi;Christos Masouros;Mahmoud Alaaeldin;Emad Alsusa","doi":"10.1109/OJVT.2025.3544148","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3544148","url":null,"abstract":"Integrated sensing and communication (ISAC) receiver design involves the challenge of jointly estimating the communication signal together with the direction of arrivals (DOAs) of the transmitters. This letter proposes an off-the-grid estimator for the ISAC receiver that jointly estimates the DOAs of <inline-formula><tex-math>$K$</tex-math></inline-formula> transmitters together with the communication data. We focus on the challenging case of incomplete observation, i.e., where only a subset of the received signals in space and time are available. We propose a convex optimization based on the dual of atomic norm minimization (ANM). Though the problem is non-deterministic polynomial time (NP)-hard, we leverage the Schur complement technique to develop semidefinite relaxations (SDRs) to implement it. Moreover, we study a fast algorithm based on the alternating direction method of multipliers (ADMM) technique. Finally, our numerical results explore the feasibility of the joint estimation with incomplete observations, while outperforming classical DOA estimators.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"846-852"},"PeriodicalIF":5.3,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10918629","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143817870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Mobile Network Slicing Through Vehicular Traffic Analysis 基于车辆交通分析的动态移动网络切片
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-05 DOI: 10.1109/OJVT.2025.3567116
Álvaro Gabilondo;Zaloa Fernández;Ángel Martín;Mikel Zorrilla;Pablo Angueira;Jon montalbán
{"title":"Dynamic Mobile Network Slicing Through Vehicular Traffic Analysis","authors":"Álvaro Gabilondo;Zaloa Fernández;Ángel Martín;Mikel Zorrilla;Pablo Angueira;Jon montalbán","doi":"10.1109/OJVT.2025.3567116","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3567116","url":null,"abstract":"Network slicing has emerged as a transformative enabler in 5G networks, offering tailored communication services for diverse traffic types on shared network infrastructure. In the context of autonomous driving and smart mobility, the ability to dynamically prioritize and manage sensor data—ranging from high-bandwidth video streams to low-latency text and binary position and coordination messages—plays a pivotal role in ensuring safe and efficient operation. This paper proposes a dynamic mobile network slicing framework designed to analyse vehicular traffic and adapt slicing policies to optimize resource allocation for autonomous driving applications. By leveraging distributed and disaggregated 5G network architectures, the proposed solution ensures seamless propagation of slicing policies across radio access networks (RAN) and core systems building end-to-end network slices. Experimental evaluations in scenarios such as Automated Guided Vehicle (AGV)-assisted operations in industrial environments demonstrate significant performance improvements, including a reduction in packet loss from 65% to 0% under congested network conditions. The results highlight the potential of dynamic slicing to enhance communication reliability and performance in autonomous driving ecosystems, supporting the seamless exchange of diverse sensor data types.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"1464-1480"},"PeriodicalIF":5.3,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10988659","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144314752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted UAP:一种无人机辅助中继通信系统认证协议
IF 5.3
IEEE Open Journal of Vehicular Technology Pub Date : 2025-03-05 DOI: 10.1109/OJVT.2025.3567079
Chunpeng Liu;Tao Huang;Maode Ma
{"title":"UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted","authors":"Chunpeng Liu;Tao Huang;Maode Ma","doi":"10.1109/OJVT.2025.3567079","DOIUrl":"https://doi.org/10.1109/OJVT.2025.3567079","url":null,"abstract":"In recent years, advancements in Unmanned Aerial Vehicle (UAV) technology have led to the emergence of the Internet of Drones (IoD), further enhanced by the capabilities of 5th generation mobile network (5G). UAVs are widely used in various applications, such as disaster assessment, material delivery, and environmental monitoring, due to their flexibility. However, operating in insecure open environments presents significant risks, making it crucial to complete tasks without exposing sensitive information to attackers or unauthorized users. Additionally, the communication range between UAVs and ground stations is often limited, and if a UAV flies beyond this range, the likelihood of mission failure increases substantially. To address these challenges, we propose a UAV-assisted Authentication Protocol (UAP) based on Physical Unclonable Functions (PUFs), leveraging 5G to enable secure relay communication between UAVs and ground stations. We provide formal proof of the protocol's logical correctness and perform cryptanalysis, demonstrating that it effectively resists various security threats, including masquerade and replay attacks. Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. We have performed simulations on a Raspberry Pi. The experiments show that UAP has a computational overhead of 0.0826 ms and a communication overhead of 0.0408 ms. The application scenarios and security features of UAP are also considered, making it a solution for UAV applications.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"1539-1550"},"PeriodicalIF":5.3,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10988496","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144367043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信