Vehicular Communications最新文献

筛选
英文 中文
A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones 基于后量子安全 PUF 的无人机互联网跨域身份验证机制
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-25 DOI: 10.1016/j.vehcom.2024.100780
Aiswarya S. Nair , Sabu M. Thampi , Jafeel V.
{"title":"A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones","authors":"Aiswarya S. Nair ,&nbsp;Sabu M. Thampi ,&nbsp;Jafeel V.","doi":"10.1016/j.vehcom.2024.100780","DOIUrl":"10.1016/j.vehcom.2024.100780","url":null,"abstract":"<div><p>With the increasing prevalence of drones, guaranteeing their authentication and secure communication has become paramount in drone networks to mitigate unauthorized access and malicious attacks. Cross-domain authentication is crucial in the context of the Internet of Drones (IoD) for safely verifying and establishing trust between diverse drones and their respective control stations, which may belong to different regions or organizations. Effectively accessing resources or services in another domain while maintaining security and efficiency poses a significant challenge. Conventional authentication mechanisms relying on challenging problems like discrete logarithm and integer factorization might not be sufficient to guarantee the security and effectiveness of drone-based systems in the post-quantum era. To address this, we propose a distributed post-quantum cryptography and Physical Unclonable Function (PUF) based cross-domain authentication protocol for IoD. Key contributions of this work include the elimination of secret key storage on drones, mutual authentication, emphasis on hardware security, incorporation of post-quantum security measures, efficient cross-domain authentication and resilience against cyber attacks such as eavesdropping, impersonation, replay attack, untraceability, and PUF-modeling attack. The performance of the proposed protocol is assessed utilizing metrics like processing time, communication cost and storage utilization. In operations associated to the blockchain ledger, variables such as latency, throughput, CPU utilization, and memory utilization are also examined. The protocol shows a reduced computation time and zero sensitive data storage in drone memory, despite a slightly higher communication cost that is manageable with 5G-enabled drones. Comparative analysis against existing solutions in the domain highlights the superior security of the proposed protocol, positioning it as a promising solution for the evolving quantum landscape.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100780"},"PeriodicalIF":6.7,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140764702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV swarm communication reliability based on a comprehensive SINR model 基于综合 SINR 模型的无人机蜂群通信可靠性
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-21 DOI: 10.1016/j.vehcom.2024.100781
Reuben Yaw Hui Lim , Joanne Mun-Yee Lim , Boon Leong Lan , Patrick Wan Chuan Ho , Nee Shen Ho , Thomas Wei Min Ooi
{"title":"UAV swarm communication reliability based on a comprehensive SINR model","authors":"Reuben Yaw Hui Lim ,&nbsp;Joanne Mun-Yee Lim ,&nbsp;Boon Leong Lan ,&nbsp;Patrick Wan Chuan Ho ,&nbsp;Nee Shen Ho ,&nbsp;Thomas Wei Min Ooi","doi":"10.1016/j.vehcom.2024.100781","DOIUrl":"10.1016/j.vehcom.2024.100781","url":null,"abstract":"<div><p>Communication reliability is one of the most important factors in ensuring the safe operation of unmanned aerial vehicles (UAVs). The reliability of wireless communication for a UAV swarm is typically characterized by the signal-to-interference-and-noise ratio (SINR). However, previous work on UAV swarm communication reliability did not use a comprehensive SINR model. In this paper, we derived two novel closed-form approximations – lognormal and generalized beta prime (GBP) - of UAV swarm communication reliability based on a comprehensive SINR model. The model includes shadowing, multipath fading, the dependence of fading on external factors, which are the probability of line-of-sight (LoS) and the physical environment, as well as all possible interference within the system, which may be from the UAVs and the ground control station (GCS). For typical swarm heights between 60 – 300 m and up to 32 UAVs, comparisons of the approximate and simulated reliabilities for UAV swarms with a radius up to a critical value (which increases with the number and transmit power of the UAVs) show that only the lognormal approximation is accurate for all uplink and downlink communications, up to a critical horizontal distance from the GCS (which increases with height). Benchmarking of the lognormal approximation shows that neglecting either shadowing or multipath fading leads to high approximation errors. An example of how the lognormal approximation can be used to evaluate and maintain the communication reliability of a UAV swarm during deployment is given. Furthermore, it can be used to derive other SINR-dependent performance metrics, such as ergodic capacity and symbol error rate, which are useful in UAV network design and monitoring.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100781"},"PeriodicalIF":6.7,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140787209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DCFH: A dynamic clustering approach based on fire hawk optimizer in flying ad hoc networks DCFH:基于飞行 ad hoc 网络中火鹰优化器的动态聚类方法
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-21 DOI: 10.1016/j.vehcom.2024.100778
Mehdi Hosseinzadeh , Saqib Ali , Husham Jawad Ahmad , Faisal Alanazi , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Aso Darwesh , Amir Masoud Rahmani , Sang-Woong Lee
{"title":"DCFH: A dynamic clustering approach based on fire hawk optimizer in flying ad hoc networks","authors":"Mehdi Hosseinzadeh ,&nbsp;Saqib Ali ,&nbsp;Husham Jawad Ahmad ,&nbsp;Faisal Alanazi ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Efat Yousefpoor ,&nbsp;Aso Darwesh ,&nbsp;Amir Masoud Rahmani ,&nbsp;Sang-Woong Lee","doi":"10.1016/j.vehcom.2024.100778","DOIUrl":"10.1016/j.vehcom.2024.100778","url":null,"abstract":"<div><p>In flying ad hoc networks (FANETs), unmanned aerial vehicles (UAVs) communicate with each other without any fixed infrastructure. Because of frequent topological changes, instability of wireless communication, three-dimensional movement of UAVs, and limited resources, especially energy, FANETs deal with many challenges, especially the instability of UAV swarms. One solution to address these problems is clustering because it maintains network performance and increases scalability. In this paper, a <strong><u>d</u></strong>ynamic <strong><u>c</u></strong>lustering scheme based on <strong><u>f</u></strong>ire <strong><u>h</u></strong>awk optimizer (DCFH) is proposed for FANETs. In DCFH, each cluster head calculates the period of hello messages in its cluster based on its velocity. Then, a fire hawk optimizer (FHO)-based dynamic clustering operation is carried out to determine the role of each UAV (cluster head (CH) or cluster member (CM)) in the network. To calculate the fitness value of each fire hawk, a fitness function is suggested based on four elements, namely the balance of energy consumption, the number of isolated clusters, the distribution of CHs, and the neighbor degree. To improve cluster stability, each CH manages the movement of its CMs and adjusts it based on its movement in the network. In the last phase, DCFH defines a greedy routing process to determine the next-hop node based on a score, which consists of distance between CHs, energy, and buffer capacity. Finally, DCFH is simulated using the network simulator version 2 (NS2), and its performance is compared with three methods, including the mobility-based weighted cluster routing scheme (MWCRSF), the dynamic clustering mechanism (DCM), and the Grey wolf optimization (GWO)-based clustering protocol. The simulation results show that DCFH well manages the number of clusters in the network. It improves the cluster construction time (about 55.51%), cluster lifetime (approximately 11.13%), energy consumption (about 15.16%), network lifetime (about 2.6%), throughput (approximately 3.9%), packet delivery rate (about 0.61%), and delay (approximately 14.29%). However, its overhead is approximately 8.72% more than MWCRSF.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100778"},"PeriodicalIF":6.7,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140640638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation and analysis of 5G waveforms to reduce BER for vehicular communications 模拟和分析 5G 波形以降低车辆通信的误码率
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-16 DOI: 10.1016/j.vehcom.2024.100777
Fowzia Sultana Sowdagar , Krishna Naik Karamtot
{"title":"Simulation and analysis of 5G waveforms to reduce BER for vehicular communications","authors":"Fowzia Sultana Sowdagar ,&nbsp;Krishna Naik Karamtot","doi":"10.1016/j.vehcom.2024.100777","DOIUrl":"10.1016/j.vehcom.2024.100777","url":null,"abstract":"<div><p>In today's rapidly evolving world, wireless communication has become a pervasive force, profoundly impacting various facets of our daily lives. Wireless Vehicular Networks stand out as a captivating realm of research, with a key focus on fostering information exchange among autonomous vehicles. As researchers witness surging demand in this domain, there is a growing emphasis on devising advanced techniques to augment network performance, particularly within the context of Fifth-generation (5G) applications, such as vehicular communication. The concept of Vehicle-to-vehicle (V2V) communications is poised to play a pivotal role in the future, presenting formidable challenges for the air interface by accommodating asynchronous multiple access and high mobility. Within this dynamic landscape, security and privacy issues loom large for 5G-enabled vehicle networks, many of which remain largely unexplored. The conventional waveforms, including Orthogonal Frequency Division Multiplexing (OFDM), may fall short of meeting these evolving standards. In this paper, authors delve into a comparative exploration of two waveform families, namely Filter Bank Multicarrier (FBMC) and Universal Filtered Multi-Carrier (UFMC), concerning their design and performance trade-offs. authors also examine their compatibility with various digital modulation schemes like 4-Quadrature Amplitude Modulation (QAM), 16-QAM, Offset Quadrature Phase Shift Keying (OQPSK), and Shaped offset OQPSK (SOQPSK). Through MATLAB simulations, our research vividly demonstrates the superior performance of UFMC when juxtaposed with OFDM and FBMC, especially concerning Bit Error Rate (BER) in both Rayleigh and Nakagami fading channels. In particular, authors consider a Nakagami shape parameter of 10, which yields a remarkable minimum BER for UFMC.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100777"},"PeriodicalIF":6.7,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140640602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving target defense approach for secure relay selection in vehicular networks 用于在车载网络中安全选择中继器的移动目标防御方法
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-16 DOI: 10.1016/j.vehcom.2024.100774
Esraa M. Ghourab , Shimaa Naser , Sami Muhaidat , Lina Bariah , Mahmoud Al-Qutayri , Ernesto Damiani , Paschalis C. Sofotasios
{"title":"Moving target defense approach for secure relay selection in vehicular networks","authors":"Esraa M. Ghourab ,&nbsp;Shimaa Naser ,&nbsp;Sami Muhaidat ,&nbsp;Lina Bariah ,&nbsp;Mahmoud Al-Qutayri ,&nbsp;Ernesto Damiani ,&nbsp;Paschalis C. Sofotasios","doi":"10.1016/j.vehcom.2024.100774","DOIUrl":"10.1016/j.vehcom.2024.100774","url":null,"abstract":"<div><p>Ensuring the security and reliability of cooperative vehicle-to-vehicle (V2V) communications is an extremely challenging task due to the dynamic nature of vehicular networks as well as the delay-sensitive wireless medium. In this context, the moving target defense (MTD) paradigm has been proposed to overcome the challenges of conventional solutions based on static network services and configurations. Specifically, the MTD approach involves the dynamic altering of network configurations to improve resilience to cyberattacks. Nevertheless, the current MTD solution for cooperative networks poses several limitations, such as that they require high synchronization modules that are resource-intensive and difficult to implement; and they rely heavily on attack-defense models, which may not always be accurate or comprehensive to use. To overcome these challenges, the proposed approach introduces an adaptive defense strategy within the MTD framework. This strategy proposes an intelligent spatiotemporal diversification-based MTD scheme to defend against eavesdropping attacks in cooperative V2V networks. It involves altering the system configuration spatially through relay selection and adjusting the percentage of injected fake data over time. This approach aims to balance reducing intercept probability while ensuring high throughput. Our methodology involves modeling the configuration of vehicular relays and data injection patterns as a Markov decision process, followed by applying deep reinforcement learning to determine the optimal configuration. We then iteratively evaluate the intercept probability and the percentage of transmitted real data for each configuration until convergence is achieved. To optimize the security-real data percentage (S-RDP), we developed a two-agent framework, namely MTD-DQN-RSS &amp; MTD-DQN-RSS-RDP. The first agent, MTD-DQN-RSS, tries to minimize the intercept probability by injecting additional fake data, which in turn reduces the overall RDP, while the second agent, MTD-DQN-RSS-RDP, attempts to inject a sufficient amount of fake data to achieve a target S-RDP. Finally, extensive simulation results are conducted to demonstrate the effectiveness of our proposed solution, which improved system security compared to the conventional relay selection approach.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100774"},"PeriodicalIF":6.7,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140775053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantum-secure certificateless aggregate signature protocol for vehicular ad hoc networks 用于车载特设网络的量子安全无证书聚合签名协议
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-15 DOI: 10.1016/j.vehcom.2024.100775
Yongfei Huang , Guangxia Xu , Xiaoling Song , Yong Liu , Qiuyan Wang
{"title":"A quantum-secure certificateless aggregate signature protocol for vehicular ad hoc networks","authors":"Yongfei Huang ,&nbsp;Guangxia Xu ,&nbsp;Xiaoling Song ,&nbsp;Yong Liu ,&nbsp;Qiuyan Wang","doi":"10.1016/j.vehcom.2024.100775","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100775","url":null,"abstract":"<div><p>Vehicular ad hoc networks (VANETs) have revolutionized communication between vehicles and infrastructure, notably enhancing traffic management and passenger safety. However, VANETs are vulnerable to security threats, especially regarding data authenticity. Aggregate signature is a powerful technique that reduces computational and communication burdens by aggregating multiple signatures from different signers into a single signature. Traditional aggregate signature schemes, based on large prime number decomposition and the discrete logarithm problem, cannot effectively resist quantum attacks. This paper introduces a novel quantum secure certificateless aggregate signature (QSCLAS) scheme designed to enhance data security and privacy in VANETs. Our proposed scheme employs the number theory research unit (NTRU) algorithm. As a lattice-based cryptographic algorithm, NTRU is renowned for its security against quantum computer attacks, making it an essential component of our quantum-secure solution. By eliminating the need for expensive bilinear pairing operations, our proposed scheme achieves high efficiency and practicality in resource-limited VANETs environments. The security analysis demonstrates our scheme's resilience against both Type-I and Type-II adversaries in the random oracle model under the small integer solution (SIS) problem on the NTRU lattice. Furthermore, compared with existing approaches, the results illustrate that our proposed scheme offers significant advantages in signature generation and verification cost, as well as lower transmission overhead than other lattice-based schemes, thereby making it highly suitable for VANETs environments.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100775"},"PeriodicalIF":6.7,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140555172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service-oriented data consistency research for in-vehicle Ethernet 车载以太网面向服务的数据一致性研究
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-12 DOI: 10.1016/j.vehcom.2024.100776
Bingkui Li , Lei Zhuang , Guoqing Wang , Yanglong Sun
{"title":"Service-oriented data consistency research for in-vehicle Ethernet","authors":"Bingkui Li ,&nbsp;Lei Zhuang ,&nbsp;Guoqing Wang ,&nbsp;Yanglong Sun","doi":"10.1016/j.vehcom.2024.100776","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100776","url":null,"abstract":"<div><p>As the number of in-vehicle electronic devices and system complexity increases, it drives the evolution of the in-vehicle electrical/electronic architecture (E/E). The most promising future architecture is the zone architecture divided by physical location. Zones are connected via high-speed Ethernet, and time-sensitive networking enhances Ethernet in terms of real-time and determinism. In service-oriented communication methods, there are issues with quality assurance and data inconsistency. This paper addresses these issues by combining traffic scheduling strategies in time-sensitive networking, proposing an algorithm for quality assurance and data consistency. Simulation results demonstrate that, under the premise of satisfying the quality of service, the data stream of the same service can reach multiple subscribers simultaneously. This further demonstrates the feasibility and effectiveness of the proposed method.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100776"},"PeriodicalIF":6.7,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140619928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based data storage architecture for Internet of Vehicles: Delay-aware consensus and data query algorithms 基于区块链的车联网数据存储架构:延迟感知共识和数据查询算法
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-08 DOI: 10.1016/j.vehcom.2024.100772
Zhiqiang Ren , Shumei Liu , Yisheng An , Yonghui Li , Naiqi Wu
{"title":"A blockchain-based data storage architecture for Internet of Vehicles: Delay-aware consensus and data query algorithms","authors":"Zhiqiang Ren ,&nbsp;Shumei Liu ,&nbsp;Yisheng An ,&nbsp;Yonghui Li ,&nbsp;Naiqi Wu","doi":"10.1016/j.vehcom.2024.100772","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100772","url":null,"abstract":"<div><p>The recent development of the Internet of Vehicles (IoV) relies heavily on the secure store and analysis of reliable driving data. Blockchain technology has been widely used in the IoV field due to its security advantages, where consensus and query algorithms are two key modules determining its performance. However, existing solutions do not perform well enough in terms of delay performance, thus limiting their ability to support IoV environments with ultra-low-latency requirements. To address this challenge, we design a blockchain-based data storage architecture, focusing on the design of delay-aware consensus and data query algorithms. Specifically, to reduce the consensus delay, we propose a reputation-assisted and grouping-simplified Practical Byzantine Fault Tolerant (RGS-PBFT) algorithm. First, we develop a novel node credit value evaluation model by combining the behavior and configuration reputation to select the primary node with both high security and high computing capacity. Second, after determining the primary node, we reduce the communication complexity of traditional PBFT from <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>Z</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> to <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>Z</mi></mrow><mrow><mfrac><mrow><mn>4</mn></mrow><mrow><mn>3</mn></mrow></mfrac></mrow></msup><mo>)</mo></math></span> by establishing a grouping-simplified consensus structure. These contributions effectively reduce the consensus delay. To reduce the query delay and index construction time, we propose an index query algorithm based on the data tracking chain (DTC-Index query). By introducing the LevelDB database, it establishes a transaction index chain coupled to vehicle ID in the blockchain. This approach avoids the time-consuming block traversal during data querying. Experimental results demonstrate that the proposed algorithms outperform existing solutions, achieving significant improvements in both consensus delay and query time reduction. Notably, our solutions offer exceptional delay performance, making them well-suited for IoV environments.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100772"},"PeriodicalIF":6.7,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140558733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-protecting predictive cache method based on blockchain and machine learning in Internet of vehicles 车联网中基于区块链和机器学习的隐私保护预测缓存方法
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-04 DOI: 10.1016/j.vehcom.2024.100771
Zihao Shen , Yuanjie Wang , Hui Wang , Peiqian Liu , Kun Liu , Mengke Liu
{"title":"Privacy-protecting predictive cache method based on blockchain and machine learning in Internet of vehicles","authors":"Zihao Shen ,&nbsp;Yuanjie Wang ,&nbsp;Hui Wang ,&nbsp;Peiqian Liu ,&nbsp;Kun Liu ,&nbsp;Mengke Liu","doi":"10.1016/j.vehcom.2024.100771","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100771","url":null,"abstract":"<div><p>To solve the privacy leakage problem faced by Internet of Vehicles (IoV) users when enjoying location-based services (LBS), a privacy-protecting predictive cache method based on blockchain and machine learning (BML-PPPCM) is proposed. First, a Bi-directional Long-Short Term Memory (Bi-LSTM) model is used to predict query requests over a future period based on historical request information. The predicted results are recommended to neighbors and broadcast to requestors. Then, deep Q-learning (DQN) is utilized to determine the optimal cache decision. Finally, a trust mechanism is introduced to calculate trust values, and blockchain is used to store transaction data and trust data, preventing malicious tampering by attackers. The simulation results show that BML-PPPCM has a higher cache hit ratio than other similar schemes and performs well in privacy protection and suppression of malicious and incentive denial of service providers.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"47 ","pages":"Article 100771"},"PeriodicalIF":6.7,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fair and efficient resource allocation via vehicle-edge cooperation in 5G-V2X networks 通过 5G-V2X 网络中的车辆边缘合作实现公平高效的资源分配
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-04 DOI: 10.1016/j.vehcom.2024.100773
Muhammed Nur Avcil , Mujdat Soyturk , Burak Kantarci
{"title":"Fair and efficient resource allocation via vehicle-edge cooperation in 5G-V2X networks","authors":"Muhammed Nur Avcil ,&nbsp;Mujdat Soyturk ,&nbsp;Burak Kantarci","doi":"10.1016/j.vehcom.2024.100773","DOIUrl":"10.1016/j.vehcom.2024.100773","url":null,"abstract":"<div><p>To cope with safety risks and operational efficiency problems, it is of paramount importance to ensure high data rates and meet the latency requirements in Connected and Autonomous Vehicles. The problem in such environments is two-fold: 1. Heavy load on the network due to increasing demands; 2) Resource imbalance, due to variations in the vehicular traffic density in certain regions. The consequences of these two phenomena may lead to service disruptions, as well as the fairness of resource allocation across vehicles. In this work, we propose a resource allocation method that distributes high workload among edge nodes and allocates network resources efficiently and fairly. Performance of the proposed method is evaluated under realistic scenarios, and compared to the state-of-the-art approaches in the literature. Behavior and performance of all methods in overload conditions in certain regions were analyzed. Simulation results exhibit a 38% improvement in the successful demand rate and a 48% improvement in capacity usage compared to state-of-the-art approaches.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"48 ","pages":"Article 100773"},"PeriodicalIF":6.7,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140778015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信