Vehicular Communications最新文献

筛选
英文 中文
Volunteer vehicle assisted dependent task offloading based on ant colony optimization algorithm in vehicular edge computing 车载边缘计算中基于蚁群优化算法的志愿车辆辅助依赖任务卸载
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-10-31 DOI: 10.1016/j.vehcom.2024.100849
{"title":"Volunteer vehicle assisted dependent task offloading based on ant colony optimization algorithm in vehicular edge computing","authors":"","doi":"10.1016/j.vehcom.2024.100849","DOIUrl":"10.1016/j.vehcom.2024.100849","url":null,"abstract":"<div><div>Vehicle Edge Computing improves the Quality of Service of vehicular applications by offloading tasks to the VEC server. However, with the continuous development of computation-intensive vehicular applications, the limited resources of the VEC server will not be enough to support these applications. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) proposes a concept of using vehicles as resources, which is considered to be a promising solution. In this paper, we study the multi-dependent task offloading problem in order to quickly and economically handle the overload task of the requesting vehicle in VCBV. Considering both task execution delay and execution cost, we formulate the problem of offloading the multi-dependent tasks of requesting vehicles to minimize total task completion time and execution cost. Since the offloading problem is NP-hard, an improved multi-objective Ant Colony Optimization algorithm is proposed. Firstly, we use a density-based clustering algorithm to form volunteer alliances that can contribute idle resources. Secondly, based on the volunteer alliances and RSUs, we use Analytic Hierarchy Process (AHP) to initialize pheromone concentration to make better decisions. Then, we design the update strategy of the pheromone concentration and heuristic information. Finally, we introduce Pareto optimal relationship to evaluate the results. A large number of simulation results verify that our algorithm has better performance than other alternatives.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142577970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STAR-RIS-NOMA empowered vehicle-to-vehicle communications: Outage and ergodic capacity analysis STAR-RIS-NOMA 赋权车对车通信:中断和遍历容量分析
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-10-28 DOI: 10.1016/j.vehcom.2024.100852
{"title":"STAR-RIS-NOMA empowered vehicle-to-vehicle communications: Outage and ergodic capacity analysis","authors":"","doi":"10.1016/j.vehcom.2024.100852","DOIUrl":"10.1016/j.vehcom.2024.100852","url":null,"abstract":"<div><div>This paper delves into the performance evaluation of a non-orthogonal multiple access (NOMA) enabled vehicle-to-vehicle (V2V) communication system empowered by simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RIS). Herein, we consider that a moving access point (AP) transmits superimposed signals to nearby and distant NOMA vehicles simultaneously via reflection and transmission through a STAR-RIS equipped vehicle with 2<em>N</em> reconfigurable elements, respectively. Specifically, by characterizing all V2V channels as double-Rayleigh fading distributed, we derive the outage probability (OP) and ergodic capacity (EC) expressions for each NOMA vehicle, by employing both perfect and imperfect successive interference cancellation (SIC) at nearby vehicle user. Furthermore, we present the asymptotic OP behavior at high signal-to-noise ratio (SNR) regime to gain deeper insights into the diversity order of NOMA vehicles. The findings reveal that the nearby vehicle under perfect SIC and far vehicle experience a diversity order of <span><math><mfrac><mrow><mi>N</mi><msup><mrow><mi>π</mi></mrow><mrow><mn>4</mn></mrow></msup></mrow><mrow><mn>256</mn><mo>−</mo><msup><mrow><mi>π</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></mfrac></math></span>, which is the function of number of reconfigurable elements (<em>N</em>) in the STAR-RIS. Whereas, a zero diversity order is obtained for nearby user under imperfect SIC case. Moreover, we analytically discuss the high SNR slopes of EC for both user vehicles. Furthermore, Monte-Carlo simulations are conducted to validate our analytical results under various channel and system parameter configurations. We also provide a comparison between the proposed scheme and STAR-RIS based orthogonal multiple access and cooperative relaying systems.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142560694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning based running-track path design for fixed-wing UAV assisted mobile relaying network 基于深度强化学习的固定翼无人机辅助移动中继网络运行轨迹路径设计
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-10-28 DOI: 10.1016/j.vehcom.2024.100851
{"title":"Deep Reinforcement Learning based running-track path design for fixed-wing UAV assisted mobile relaying network","authors":"","doi":"10.1016/j.vehcom.2024.100851","DOIUrl":"10.1016/j.vehcom.2024.100851","url":null,"abstract":"<div><div>This paper studies a fixed-wing unmanned aerial vehicle (UAV) assisted mobile relaying network (FUAVMRN), where a fixed-wing UAV employs an out-band full-duplex relaying fashion to serve a ground source-destination pair. It is confirmed that for a FUAVMRN, straight path is not suitable for the case that a huge amount of data need to be delivered, while circular path may lead to low throughput if the distance of ground source-destination pair is large. Thus, a running-track path (RTP) design problem is investigated for the FUAVMRN with the goal of energy minimization. By dividing an RTP into two straight and two semicircular paths, the total energy consumption of the UAV and the total amount of data transferred from the ground source to the ground destination via the UAV relay are calculated. According to the framework of Deep Reinforcement Learning and taking the UAV's roll-angle limit into consideration, the RTP design problem is formulated as a Markov Decision Process problem, giving the state and action spaces in addition to the policy and reward functions. In order for the UAV relay to obtain the control policy, Deep Deterministic Policy Gradient (DDPG) is used to solve the path design problem, leading to a DDPG based algorithm for the RTP design. Computer simulations are performed and the results show that the DDPG based algorithm always converges when the number of training iterations is around 500, and compared with the circular and straight paths, the proposed RTP design can save at least 12.13 % of energy and 65.93 % of flight time when the ground source and the ground destination are located 2000 m apart and need to transfer <span><math><mrow><mn>5000</mn><mrow><mtext>bit</mtext><mo>/</mo><mtext>Hz</mtext></mrow></mrow></math></span> of data. Moreover, it is more practical and efficient in terms of energy saving compared with the Deep Q Network based design.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142560693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EPAKA: An efficient and privacy-preserving authenticated key agreement scheme based on physical security for VANET EPAKA:基于物理安全的高效且保护隐私的 VANET 验证密钥协议方案
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-10-24 DOI: 10.1016/j.vehcom.2024.100847
{"title":"EPAKA: An efficient and privacy-preserving authenticated key agreement scheme based on physical security for VANET","authors":"","doi":"10.1016/j.vehcom.2024.100847","DOIUrl":"10.1016/j.vehcom.2024.100847","url":null,"abstract":"<div><div>Vehicular ad hoc network (VANET) has been a promising technology in smart transportation system, which can enable information exchange between vehicles and roadside units (RSUs). However, the privacy of vehicles and RSUs is a critical challenge in VANET, as they may expose sensitive information to malicious attackers or unauthorized parties. Many existing authenticated key agreement (AKA) schemes aim to protect the privacy of vehicles and RSUs, but they often neglect the physical security of the devices involved in the communication. Therefore, we propose an efficient and privacy-preserving AKA scheme in VANET, which embeds physical unclonable function (PUF) and fuzzy extraction (FE) technology. PUF is a physical device that generates random strings based on their intrinsic characteristics and external inputs, which can protect the secrets in the devices from being stolen by attackers. FE can compensate for the drawbacks of PUF affected by environmental factors. Our scheme preserves the identity privacy of legitimate RSUs and vehicles, as well as intercepts and traces the identity of malicious attackers. In addition, we eliminate the involvement of the third party (TP) in the AKA phase to better meet the high-speed driving of vehicles. Finally, we conduct formal and informal security analyses in random oracle model (ROM), which prove that our scheme can resist various attacks. We also show in the performance analysis that our scheme has the lowest computational cost, communication overhead, and total energy consumption.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks 基于区块链的小型工业园区车联网快速移交认证协议
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-10-24 DOI: 10.1016/j.vehcom.2024.100848
{"title":"Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks","authors":"","doi":"10.1016/j.vehcom.2024.100848","DOIUrl":"10.1016/j.vehcom.2024.100848","url":null,"abstract":"<div><div>Autonomous vehicles safeguard the security and efficiency of Internet of Vehicles systems in small industrial parks by authenticating and exchanging real-time information with transportation infrastructure. Deploying a multi-server framework reduces the risk of message blocking and privacy information leakage from centralized services. However, in traditional handover authentication protocols, there are still potential security risks such as high-overhead performance issues and single point of failure attacks. Therefore, it is considered challenging to realize efficient authentication while protecting the privacy of vehicles. In this paper, we propose a secure and efficient handover authentication protocol for autonomous vehicles in a small industrial park to address the challenges. The protocol is based on blockchain and Pedersen verifiable secret sharing scheme, which not only ensures lightweight real-time interactions between autonomous vehicles and edge servers in multi-server environments, but also strictly protects the security and privacy of both vehicles and edge servers. We prove the semantic security of the protocol under the Real-Or-Random model and perform a informal analysis of its security attributes to show that it can withstand a wide range of malicious attacks. Performance evaluation shows that the proposed protocol satisfies more security requirements and has better computational efficiency and communication cost than other related protocols.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142528445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-vehicle communication cyber security: A comprehensive review of challenges and solutions 车载通信网络安全:挑战与解决方案综合评述
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-09-30 DOI: 10.1016/j.vehcom.2024.100846
{"title":"In-vehicle communication cyber security: A comprehensive review of challenges and solutions","authors":"","doi":"10.1016/j.vehcom.2024.100846","DOIUrl":"10.1016/j.vehcom.2024.100846","url":null,"abstract":"<div><div>The utilization of autonomous vehicles is experiencing a rapid proliferation in contemporary society. Concurrently, with the relentless evolution of technology, the inexorable integration of autonomous vehicles into urban environments, driven by the overarching paradigm of smart cities, becomes increasingly apparent. This escalating reliance on autonomous vehicles concurrently heightens the susceptibility to malevolent actors orchestrating cyber-attacks against these vehicular systems. While previous years have seen a limited corpus of academic research pertaining to cyber-attack and defense methodologies for autonomous vehicles, the relentless progression of technology mandates a more contemporary and exhaustive inquiry. In addition, to the best of our knowledge, there is no article in the literature that provides detailed information and comparisons about in-vehicle sensors, in-vehicle networks, and in-vehicle network datasets by combining them in one article. Also, to our knowledge, very limited studies have been conducted on separately comparative analysis of in-vehicle networks, in-vehicle sensors or data sets in 2024, and therefore, the necessity of conducting a review study on these topics was recognized. To address this deficiency, we compile articles on attacks and defenses on sensors, in-vehicle networks and present detailed information about the latest datasets and provide comparative analysis. In this paper, we have analyzed 108 papers from the last 10 years on in-vehicle networks and sensors. 38 articles on in-vehicle sensors and 70 articles on in-vehicle networks were reviewed and analyzed. We categorize in-vehicle communication attacks into two main groups: sensor-initiated and network-initiated, with a chronological classification to highlight their evolution. We also compare the progress in securing in-vehicle communication and evaluate the most widely used datasets for attack and protection methods. Additionally, we discuss the advantages and disadvantages of these datasets and suggest future research directions. To the best of our knowledge, this work is the first to offer detailed information and comparative analysis of in-vehicle networks, sensors, and the latest datasets. While the study highlights the significant research conducted to protect in-vehicle networks and sensors from cyber attacks, technological advancements continue to introduce new attack vectors. Cars remain particularly susceptible to threats such as DoS, Fuzzy, Spoofing, and Replay attacks. Moreover, current defense mechanisms, including LSTM and CNN, have notable limitations. Future research is needed to address these challenges and enhance vehicle cybersecurity.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142421182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CANival: A multimodal approach to intrusion detection on the vehicle CAN bus CANival:汽车 CAN 总线入侵检测的多模式方法
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-09-12 DOI: 10.1016/j.vehcom.2024.100845
{"title":"CANival: A multimodal approach to intrusion detection on the vehicle CAN bus","authors":"","doi":"10.1016/j.vehcom.2024.100845","DOIUrl":"10.1016/j.vehcom.2024.100845","url":null,"abstract":"<div><p>Vehicles of today are composed of over 100 electronic embedded devices known as Electronic Control Units (ECU), each of which controls a different component of the vehicle and communicates via the Controller Area Network (CAN) bus. However, unlike other network protocols, the CAN bus communication protocol lacks security features, which is a growing concern as more vehicles become connected to the Internet. To enable the detection of intrusions on the CAN bus, numerous intrusion detection systems (IDS) have been proposed. Although some are able to achieve high accuracy in detecting specific attacks, no IDS has been able to accurately detect all types of attacks against the CAN bus. To overcome the aforementioned issues, we propose a multimodal analysis framework named <span>CANival</span>, which consists of time interval-based and signal-based analyzers developed by designing a novel Time Interval Likelihood (TIL) model and optimizing an existing model CANet. Experimental results show that our multimodal IDS outperforms the base models and enhances the detection performance testing on two recent datasets, X-CANIDS Dataset and SynCAN, achieving average true positive rates of 0.960 and 0.912, and true negative rates of 0.997 and 0.996, respectively.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624001207/pdfft?md5=5a3ea24f061884777e2d92beaac3bc58&pid=1-s2.0-S2214209624001207-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization for service-caching, computation-offloading, and UAVs flight trajectories over rechargeable UAV-aided MEC using hierarchical multi-agent deep reinforcement learning 利用分层多代理深度强化学习,在可充电无人机辅助 MEC 上联合优化服务缓存、计算卸载和无人机飞行轨迹
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-09-11 DOI: 10.1016/j.vehcom.2024.100844
{"title":"Joint optimization for service-caching, computation-offloading, and UAVs flight trajectories over rechargeable UAV-aided MEC using hierarchical multi-agent deep reinforcement learning","authors":"","doi":"10.1016/j.vehcom.2024.100844","DOIUrl":"10.1016/j.vehcom.2024.100844","url":null,"abstract":"<div><p>Due to the high mobility, high chance of line-of-sight (LoS) transmission, and flexible deployment, unmanned aerial vehicles (UAVs) have been used as mobile edge computing (MEC) servers to provide ubiquitous computation services to mobile users (MUs). However, the limited energy storage, caching capacity, and computation resources of UAVs bring new challenges for UAV-aided MEC, e.g., how to recharge UAVs and how to jointly optimize service-caching, computation-offloading, and UAVs flight trajectories. To overcome the above-mentioned difficulties, in this paper we study the joint optimization for service-caching, computation-offloading, and UAVs flight trajectories for UAV-aided MEC, where multiple rechargeable UAVs cooperatively provide MEC services to a number of MUs. First, we formulate an energy minimization problem to minimize all MUs' energy consumptions by taking into account the mobility of MUs and the energy replenishment of UAVs. Then, using the <em>hierarchical multi-agent deep reinforcement learning</em> (<u>HMDRL</u>), we develop a two-timescale based joint <u>s</u>ervice-<u>c</u>aching, <u>c</u>omputation-<u>o</u>ffloading, and UAVs <u>f</u>light <u>t</u>rajectories scheme, called <em>HMDRL-Based SCOFT</em>. Using HMDRL-Based SCOFT, we derive UAVs' service-caching policies in each time frame, and then derive UAVs flight trajectories and MUs' computation-offloading in each time slot. Finally, we validate and evaluate the performances of our proposed HMDRL-Based SCOFT scheme through extensive simulations, which show that our developed scheme outperforms the other baseline schemes to converge faster and greatly reduce MUs' energy consumptions.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142243701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Upper bound of outage probability in unmanned aerial vehicle-assisted cellular networks over fading channels 衰减信道上无人机辅助蜂窝网络的中断概率上限
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-09-05 DOI: 10.1016/j.vehcom.2024.100840
{"title":"Upper bound of outage probability in unmanned aerial vehicle-assisted cellular networks over fading channels","authors":"","doi":"10.1016/j.vehcom.2024.100840","DOIUrl":"10.1016/j.vehcom.2024.100840","url":null,"abstract":"<div><p>In this paper, we consider a multi-tier cellular network in which a hovering Unmanned Aerial Vehicle (UAV) assists the network in the absence of the terrestrial Macrocell base station. The orthogonal sub channels are assumed for communication between the UAV and its attached users. The Femtocell users and Device-to-Device (D2D) pairs transmit their data to the corresponding receivers in the same sub-channels. Achieving the outage probability of the ground users, is a challenge for the operators considering the dominant small scale and large scale fading over the channels, Line-of-Sight and None-Line-of-Sight conditions together. The mentioned problem becomes worse in the presence of cross-tier interferences. We investigate the outage probability of the ground UAV users to evaluate the performance of the network. Due to intractability of the calculations to derive the exact outage probability, the closed-form expressions are derived for the upper bound of outage probability under Rayleigh and Nakagami-<em>m</em> fading. The effect of UAV altitude, density of D2Ds and corresponding transmission powers are discussed. The results verify the simulations and confirm that the proposed approach outperforms the existing upper bound methods.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing vehicular NOMA communication security through reconfigurable intelligent surfaces 通过可重新配置的智能表面加强车辆 NOMA 通信安全
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-09-04 DOI: 10.1016/j.vehcom.2024.100841
{"title":"Enhancing vehicular NOMA communication security through reconfigurable intelligent surfaces","authors":"","doi":"10.1016/j.vehcom.2024.100841","DOIUrl":"10.1016/j.vehcom.2024.100841","url":null,"abstract":"<div><p>Physical layer security (PLS) aims to ensure the confidentiality and authenticity of transmitted data by capitalizing on the inherent randomness of wireless channels. Owing to the popularity of intelligent transportation systems (ITSs), PLS research has sparked renewed interest in the wireless research community. This paper investigates the performance of secure communication in the context of a vehicle-to-vehicle (V2V) communication scenario by employing a reconfigurable intelligent surface (RIS). Further, we introduce the concept of non-orthogonal multiple access (NOMA) to reduce latency and improve communication efficiency in V2V networks. This study aims to comprehensively analyze secrecy performance, encompassing parameters like average secrecy capacity (ASC), secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNZSC). Our research aims to highlight the efficacy of RIS in providing secure and reliable communication within V2V NOMA networks. Ultimately, our study contributes to advancing secure communication protocols in intelligent transportation systems.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624001165/pdfft?md5=f26c6e9ea8dc5acc8055c994ba1cd365&pid=1-s2.0-S2214209624001165-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信