Khalid Mahmood , Salman Shamshad , Mohammad Hossein Anisi , Alessandro Brighente , Muhammad Asad Saleem , Ashok Kumar Das
{"title":"A privacy-preserving access control protocol for 6G supported intelligent UAV networks","authors":"Khalid Mahmood , Salman Shamshad , Mohammad Hossein Anisi , Alessandro Brighente , Muhammad Asad Saleem , Ashok Kumar Das","doi":"10.1016/j.vehcom.2025.100937","DOIUrl":"10.1016/j.vehcom.2025.100937","url":null,"abstract":"<div><div>Due to their autonomous operation, high mobility, and real-time communication capabilities, 6G-supported Unmanned Aerial Vehicles (6G-UAVs) (i.e., drones) are increasingly being utilized to enhance data collection and management in Intelligent Transportation Systems (ITSs). Despite their manifold benefits, 6G-supported UAV-based ITS (6G-U-ITS) faces unique security challenges beyond conventional cyber and physical threats. These include real-time authentication, impersonation attacks, physical tampering or cloning and protection against identity spoofing in highly dynamic environments. For instance, an attacker may steal a drone and use its identity to send authenticated malicious messages to the ITS, causing road accidents. Therefore, a secure authentication scheme must ensure resilience against UAV identity theft and unauthorized access while maintaining low-latency and computational efficiency to support the stringent real-time security requirements of 6G-U-ITS. Existing authentication schemes are not specifically designed to address these challenges, making it imperative to develop a lightweight and robust authentication mechanism tailored for 6G-U-ITS. Moreover, most of the existing protocols are vulnerable to physical tampering and impersonation attacks and also require high computation overhead. In this paper, to mitigate these limitations and satisfy the aforementioned requirements, we propose a secure access control protocol for 6G-U-ITS. To the best of our knowledge, this is the first security solution in the literature that can achieve security against UAVs physical attacks. Furthermore, we justify the robustness of the designed protocol against potential attacks through detailed formal and informal security assessment. Via testbed experiments, we show that our protocol achieves 20.66% and 22.82% higher efficiency on communication and computation overhead, respectively, compared to other contemporary competing protocols.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100937"},"PeriodicalIF":5.8,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144106564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EGBCR-FANET: Enhanced genghis Khan shark optimizer based Bayesian-driven clustered routing model for FANETs","authors":"Reham R. Mostafa , Dilna Vijayan , Ahmed M. Khedr","doi":"10.1016/j.vehcom.2025.100935","DOIUrl":"10.1016/j.vehcom.2025.100935","url":null,"abstract":"<div><div>Unmanned Aerial Vehicle (UAV) technology has advanced rapidly, with broad use in both the military and commercial sectors. As a result, multi-UAV networks, also known as Flying Ad Hoc Networks (FANETs), have become a vital part of current communication systems. However, FANETs confront numerous challenges such as limited energy resources, high mobility, frequent topological changes, and inconsistent communication links. These difficulties influence network stability, limit data transmission efficiency, and shorten network longevity. Addressing these issues requires an adaptable routing strategy in FANETs. Cluster-based routing in UAVs is a great way to save energy, increase scalability, and improve network performance. This paper introduces a new clustering and routing framework for FANETs based on the Enhanced Genghis Khan Shark Optimizer (EGKSO). Unlike previous clustering approaches, the suggested solution dynamically selects the appropriate number of clusters while taking node coverage and network bandwidth into account. EGKSO is used to choose energy-efficient and stable cluster heads, resulting in balanced load distribution and a longer network lifetime. A dynamic cluster maintenance technique is proposed to ensure network stability and maintain efficient communication performance. In addition, a Bayesian-inspired next-hop selection model for adaptive routing is presented, allowing probabilistic decision-making to respond to network changes efficiently. This combination of swarm intelligence and probabilistic modeling improves communication reliability, reduces latency, and maximizes energy efficiency. The simulation results show that the suggested method outperforms existing clustering and routing protocols in terms of delivery ratio, energy consumption, latency, and clustering stability. The results demonstrate the efficacy of combining metaheuristic-based clustering with Bayesian-inspired routing, providing a resilient and scalable solution for FANETs in dynamic and resource-constrained contexts.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100935"},"PeriodicalIF":5.8,"publicationDate":"2025-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143947097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J Akshya , M Sundarrajan , S. Amutha , Rajesh Kumar Dhanaraj , Adil O. Khadidos , Alaa O. Khadidos , Shitharth Selvarajan
{"title":"Geometric Optimisation of Unmanned Aerial Vehicle Trajectories in Uncertain Environments","authors":"J Akshya , M Sundarrajan , S. Amutha , Rajesh Kumar Dhanaraj , Adil O. Khadidos , Alaa O. Khadidos , Shitharth Selvarajan","doi":"10.1016/j.vehcom.2025.100938","DOIUrl":"10.1016/j.vehcom.2025.100938","url":null,"abstract":"<div><div>The problem of efficient trajectory optimisation for Unmanned Aerial Vehicles (UAVS) in dynamic and constrained environments is one where energy efficiency, spatial coverage, and path smoothness need to be balanced. The existing methods, namely RRT*, A*, and Dijkstra, are popular but generally heuristic and do not provide globally optimal solutions. They face significant limitations while dealing with complex geometries, dynamic obstacles, and multi-objective requirements. These challenges call for a mathematically sound framework that seamlessly integrates convex analysis and computational geometry to provide an optimal trajectory planning framework. This research work introduces a convex optimisation framework for UAV trajectory planning which unifies multiple objectives, like minimising energy consumption, maximising spatial coverage, and ensuring the smoothness of the path, into a single convex objective function. More importantly, it indicates that obstacle dynamics and uncertain environmental conditions are handled better by it, so it is relatively easier for safe and efficient navigation. Proven to converge faster and with higher precision than RRT*, A*, and Dijkstra, the approach proposed here enjoys intrinsic convex properties, which ensure global optimality. Qualitative measurements show the efficiency of the proposed framework. The result is energy efficiency of 90%, with 92% coverage, 98% constraint satisfaction, and 95% path smoothness, which is 15-25% better on all metrics than traditional approaches can offer. By bridging between theory in convex optimisation and practice for solving multi-objective problems in a dynamic setting, this study provides a more robust solution for UAV trajectory planning.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100938"},"PeriodicalIF":5.8,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144068776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amir Zakerimanesh , Tony Zhijun Qiu , Mahdi Tavakoli
{"title":"Rigid communication topologies: Impact on stability, safety, energy consumption, passenger comfort, and robustness of vehicular platoons","authors":"Amir Zakerimanesh , Tony Zhijun Qiu , Mahdi Tavakoli","doi":"10.1016/j.vehcom.2025.100936","DOIUrl":"10.1016/j.vehcom.2025.100936","url":null,"abstract":"<div><div>This paper investigates the impact of rigid communication topologies (RCTs) on the performance of vehicular platoons, aiming to identify beneficial features in RCTs that enhance vehicles behavior. Four performance metrics are introduced, focusing on safety, energy consumption, passenger comfort, and robustness of vehicular platoons. The safety metric is based on momentary distances between neighboring vehicles, their relative velocities, and relative accelerations. Thus, to have access to these relative values, the coupled dynamics between pairs of neighboring vehicles are formulated, considering initial conditions (position, velocity, acceleration), the velocity/acceleration trajectory of the leader vehicle, deployed RCT, and the parity/disparity between vehicles. By decoupling the dynamics using a mapping matrix structured on deployed RCT, the features of the vehicles, and control gains, precise formulations for distance errors, relative velocities, and relative accelerations between all neighboring vehicles, over the travel time, are obtained. Comparing performance metric results across RCTs highlights that downstream information transmission—from vehicles ahead, particularly the leader vehicle, to vehicles behind—significantly enhances platoon stability, safety, energy consumption, and passenger comfort metrics. Conversely, receiving state information from vehicles behind degrades metrics, compromising safety, increasing energy consumption, and reducing passenger comfort. These findings underscore that forward-looking, leader-centric communications between vehicles markedly enhance platoon efficiency and safety.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100936"},"PeriodicalIF":5.8,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144068777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimal transmit power allocation scheme using UAV position estimation in MmWave NTNs","authors":"Pawan Srivastava, M.P.R.S. Kiran","doi":"10.1016/j.vehcom.2025.100934","DOIUrl":"10.1016/j.vehcom.2025.100934","url":null,"abstract":"<div><div>Non-terrestrial networks (NTNs) typically consist of UAV swarms equipped with multiple sensors that generate massive data, requiring real-time communication to a gateway for further processing. Hence, millimeter-wave (mmWave) communication technologies operating above 24 GHz emerge as a suitable solution for enabling high-speed intra-UAV swarm communication. However, mmWave communication technologies use multiple antenna-based directional beamforming for improved coverage, which leads to higher power consumption and frequent beam training overhead, affecting swarm endurance. To address this, we propose a novel optimal transmit power allocation scheme that enhances swarm endurance and improves throughput by reducing beam training overhead. Firstly, the proposed scheme uses the Kalman filter (in this paper, but not limited to) at the transmitting UAV to estimate the real-time position of the receiving UAV. The estimated position is utilized to calculate path loss and select the optimal transmit power level needed to meet the required received signal power threshold at the receiving UAV. To reduce outages from errors in UAV position estimation, the proposed scheme also adjusts the transmit power level by incorporating an additional buffer distance around the estimated position, thereby enhancing reliability with a minimal increase in transmit power. The performance analysis shows that the proposed scheme achieves an average reliability of more than 99% and power savings of up to 49.4% while increasing the throughput under saturated traffic conditions, thus establishing its effectiveness in mobile UAV swarms. Also, the proposed scheme is compared with three popular mechanisms existing in the literature: 1) baseline approach where constant transmit power is utilized, 2) deep learning (long short-term memory, LSTM) based transmit power allocation, and 3) power allocation using <span><math><mi>α</mi><mo>−</mo><mi>β</mi><mo>−</mo><mi>γ</mi></math></span> filter for receiving UAV position estimation. The performance comparison shows that the proposed scheme offers superior performance in terms of power savings, reliability, throughput, and computational complexity.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100934"},"PeriodicalIF":5.8,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143941755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DAME-IoV: Dynamic Adaptive Multi-Edge authentication protocol with post-quantum security for Internet of Vehicles","authors":"Iftikhar Rasheed , Hala Mostafa","doi":"10.1016/j.vehcom.2025.100933","DOIUrl":"10.1016/j.vehcom.2025.100933","url":null,"abstract":"<div><div>The Internet of Vehicles (IoV) faces increasing security challenges with the advent of quantum computing, which threatens traditional cryptographic protocols while demanding efficient authentication mechanisms for large-scale vehicle networks. This paper presents DAME-IoV, a Dynamic Adaptive Multi-Edge authentication protocol that provides post-quantum security while leveraging edge computing capabilities for enhanced performance. Our framework introduces three key innovations: (1) a lightweight post-quantum authentication scheme optimized for vehicular networks, featuring lattice-based cryptography with dynamic parameter adjustment; (2) an adaptive security mechanism that dynamically adjusts protection levels based on real-time threat assessment and resource availability; and (3) an efficient edge-assisted processing architecture that enables scalable authentication through intelligent caching and batch verification. We provide formal security proofs demonstrating the protocol's resistance to quantum attacks while maintaining conditional privacy preservation. Extensive experimental evaluation on a prototype implementation shows that DAME-IoV achieves 45% lower computational overhead, 35% reduced memory footprint, and 40% better scaling efficiency compared to existing solutions. Performance analysis under various network conditions demonstrates that our framework maintains authentication latency below 50 ms while supporting over 1000 concurrent vehicle requests. The proposed solution successfully addresses the critical challenges of post-quantum security, scalability, and efficiency in IoV environments, providing a practical foundation for securing next-generation vehicular networks.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100933"},"PeriodicalIF":5.8,"publicationDate":"2025-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143924921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiquan Bai , Runlai Wang , Yingchao Yang , Huili Hu , Jingxin Li , Xiao Zhou , Chengyou Wang , Jian Dai
{"title":"Capacity and outage analysis of SM-OTFS system with imperfect CSI in V2V communications","authors":"Zhiquan Bai , Runlai Wang , Yingchao Yang , Huili Hu , Jingxin Li , Xiao Zhou , Chengyou Wang , Jian Dai","doi":"10.1016/j.vehcom.2025.100931","DOIUrl":"10.1016/j.vehcom.2025.100931","url":null,"abstract":"<div><div>With the continuous emergence of high-mobility communication scenarios, such as the Internet of Vehicles (IoV) and Vehicle to Vehicle (V2V) communications, more unique challenges have appeared in mobile communications, due to the severe Doppler frequency shift and fast time-varying channel caused by high mobility. Meanwhile, the moving speed, data volume, and quality of service are becoming more and more important in V2V communications. Providing efficient and reliable wireless communication services to high-mobility users has become a critical issue. Spatial modulation (SM) based orthogonal time frequency space (OTFS) (SM-OTFS) system can improve the reliability and effectiveness of V2V communications because of the excellent Doppler shift resistance of OTFS modulation and the low complexity of SM transmission. In this paper, considering the case that achieving perfect channel estimation is really challenging in actual situation, we derive and analyze the capacity and outage performance of the SM-OTFS system under the circumstance of ideal pulse and imperfect channel state information (CSI) based on the statistical probability and the delay-Doppler domain (DD) input-output relationship. Our theoretical analysis and derivation are approved by the numerical results. Moreover, we also demonstrate the effect of the number of resolvable multipaths, the error of channel estimation, and the different moving speeds on the performance of the SM-OTFS system in V2V communications.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100931"},"PeriodicalIF":5.8,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143911619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zekun Lu, Linbo Zhai, Wenjie Zhou, Kai Xue, Xingxia Gao
{"title":"Beamforming design and trajectory optimization for integrated sensing and communication supported by multiple UAVs based on DRL","authors":"Zekun Lu, Linbo Zhai, Wenjie Zhou, Kai Xue, Xingxia Gao","doi":"10.1016/j.vehcom.2025.100932","DOIUrl":"10.1016/j.vehcom.2025.100932","url":null,"abstract":"<div><div>With the rapid development of Unmanned aerial vehicle (UAV) technology and the high flexibility and maneuverability of UAV itself, UAV will play a very important role in the development of integrated sensing and communication (ISAC) in the future. In this paper, the communication and sensing system supported by multiple UAVs is studied. And we propose a new ISAC balance mode (BISAC). In this mode, the sensing time is set reasonably according to the number of potential targets (PTs) and sensing requirements while the UAV is communicating with ground equipment (GEs), so as to reduce the interaction between communication and sensing and improve the utilization of resources. We also introduce the Age of Information (AoI) to measure the freshness of GEs' data information in order to reduce the delay. Therefore, our goal is to minimize the Average AoI of GEs by jointly optimizing UAV trajectory, user association, target sensing selection and communication and sensing beamforming while maintaining communication quality and sensing requirements. In order to obtain long-term AoI performance and effectively solve non-convex problems with continuous and discrete variables, we propose a deep reinforcement learning (DRL) algorithm based on a combination of deep deterministic policy gradient (DDPG) and Dueling Double Deep Q networks (D3QN). Continuous and discrete variables in the system are processed by invoking a DDPG and D3QN. Specifically, we have improved DDPG's actor-critic structure by incorporating D3QN, which utilizes the actor portion of DDPG to search for optimal communication and sensing beams. At the same time, the critic part of DDPG is combined with D3QN to select the optimal flight direction of UAV. Simulation results show that the proposed DDPG-D3QN algorithm has better stability, faster convergence rate, and higher reward than existing DRL-based methods.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100932"},"PeriodicalIF":5.8,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143911620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the performance of a UAV-based Malaga-distributed FSO/FSO communication system with NOMA","authors":"Aanchal Gupta , Divya Dhawan , Neena Gupta , Hemani Kaushal","doi":"10.1016/j.vehcom.2025.100930","DOIUrl":"10.1016/j.vehcom.2025.100930","url":null,"abstract":"<div><div>Non-Orthogonal Multiple Access (NOMA) is an efficient communication technique that can offer improved spectral efficiency, ultra-low latency and massive connectivity and its integration with Free Space Optical (FSO) communication can improve the network capacity to a great extent. In this manuscript, an Unmanned Aerial Vehicle (UAV) is employed as a relay in an FSO/FSO downlink network, comprising of two users, user 1, U1 and user 2, U2, using Amplify-and-Forward (AF) protocol. UAVs can prove to be assets in disaster-struck situations (during natural disasters such as earthquakes, floods, etc.), when all terrestrial communication is at halt. The performance of this system is determined in the presence of atmospheric attenuation, Malaga (<span><math><mi>M</mi></math></span>) turbulence fading, pointing errors and Angle-of-Arrival (AoA) fluctuations. Heterodyne detection (HD) technique is used for information detection at the users for providing improved sensitivity and Signal-to-Noise Ratio (SNR). The closed-form expressions for Outage Probability (OP), Ergodic Capacity and Bit Error Rate (BER) are derived in terms of Meijer-G function and OP is analyzed with respect to different weather conditions, turbulence levels, pointing error coefficients, NOMA coefficients and Field-of-View (FoV) angles. It is observed that at an SNR of 0 dB, the outage at U1 and U2 is 0.5489 and 0.7423, respectively. A comparison of OP is presented for the cases of HD and Intensity Modulation/Direct Detection (IM/DD) techniques and for NOMA and Orthogonal Multiple Access (OMA) technologies. Ergodic Capacity is analyzed for different turbulence strengths and pointing error values and it can be noticed that it is enhanced by reducing the turbulence strength and pointing error impairment. BER is observed for different modulation schemes and it is found to be <span><math><mn>7.7</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mo>−</mo><mn>3</mn></mrow></msup></math></span>, <span><math><mn>1.9</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup></math></span>, <span><math><mn>7.9</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup></math></span> and <span><math><mn>2.8</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup></math></span>, for QPSK, 8-PSK, 16-PSK and 16-QAM, respectively, at an SNR of 30 dB. In addition, BER is analyzed for clear, rainy and foggy weather along with different pointing errors and turbulence regimes. Monte-Carlo simulations are also carried out in order to validate the correctness of the obtained analytical results.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100930"},"PeriodicalIF":5.8,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143887098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Avneet Kaur , Makhduma F. Saiyed , Irfan Al-Anbagi , M. Shamim Hossain
{"title":"A QoS-aware adaptive cross-layer cyber-attack detection algorithm for vehicular networks","authors":"Avneet Kaur , Makhduma F. Saiyed , Irfan Al-Anbagi , M. Shamim Hossain","doi":"10.1016/j.vehcom.2025.100929","DOIUrl":"10.1016/j.vehcom.2025.100929","url":null,"abstract":"<div><div>Securing data transmission and detecting cyber-attacks in consumer Vehicular Ad hoc Networks (VANETs) pose significant challenges due to the highly dynamic topology of the network and frequent mobility of nodes. These characteristics enable attackers to exploit vulnerabilities and evade detection, making real-time attack detection complex while maintaining the Quality of Service (QoS). In this paper, we propose an Adaptive Cross-layer Cyber-attack Detection (ACCD) algorithm that dynamically detects and isolates malicious nodes while optimizing traffic routing based on application-specific requirements. The proposed algorithm uses a cross-layer traffic-aware approach to classify data flows into security-critical and delay-sensitive applications, ensuring optimal routing through the selection of Ant Colony Optimization (ACO) and Ad hoc On-Demand Multipath Distance Vector (AOMDV) protocols. The integration of pre-route authentication (PRA) enhances malicious node isolation, reducing the impact of selective forwarding and blocking attacks. Simulation results show that ACCD achieves lower end-to-end delay and higher Packet Delivery Ratio (PDR) while effectively balancing network security and performance.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100929"},"PeriodicalIF":5.8,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143911618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}