Vehicular Communications最新文献

筛选
英文 中文
VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment VESecure:可验证的身份验证和高效的密钥交换,实现安全的智能传输系统部署
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-28 DOI: 10.1016/j.vehcom.2024.100822
Praneetha Surapaneni , Sriramulu Bojjagani , Muhammad Khurram Khan
{"title":"VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment","authors":"Praneetha Surapaneni ,&nbsp;Sriramulu Bojjagani ,&nbsp;Muhammad Khurram Khan","doi":"10.1016/j.vehcom.2024.100822","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100822","url":null,"abstract":"<div><p>The Intelligent Transportation Systems (ITS) is a leading-edge, developing idea that seeks to revolutionize how people and things move inside and outside cities. Internet of Vehicles (IoV) forms a networked environment that joins infrastructure, pedestrians, fog, cloud, and vehicles to develop ITS. The IoV has the potential to improve transportation systems significantly, but as it is networked and data-driven, it poses several security issues. Numerous solutions to these IoV issues have recently been put forth. However, significant computing overhead and security concerns afflict the majority of them. Moreover, malicious vehicles may be injected into the network to access or use unauthorized services. To improve the security of the IoV network, the Mayfly algorithm is used to optimize the private keys continuously. To address these difficulties, we propose a novel VESecure system that provides secure communication, mutual authentication, and key management between vehicles, roadside units (RSU), and cloud servers. The scheme undergoes extensive scrutiny for security and privacy using the Real-or-Random (ROR) oracle model, Tamarin, and Scyther tools, along with the informal security analysis. An Objective Modular Network Testbed in OMNet++ is used to simulate the scheme. We prove our scheme's efficiency by comparing it with other existing methods regarding communication and computation costs.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On a security scheme against collusive attacks in vehicular ad hoc networks 关于车载特设网络中对抗串通攻击的安全方案
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-26 DOI: 10.1016/j.vehcom.2024.100821
Na Fan , Chase Wu , Slimane Benabdallah , Jialong Li , Yuxin Gao , Qinglong Wang
{"title":"On a security scheme against collusive attacks in vehicular ad hoc networks","authors":"Na Fan ,&nbsp;Chase Wu ,&nbsp;Slimane Benabdallah ,&nbsp;Jialong Li ,&nbsp;Yuxin Gao ,&nbsp;Qinglong Wang","doi":"10.1016/j.vehcom.2024.100821","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100821","url":null,"abstract":"<div><p>Vehicular Ad Hoc Networks (VANETs) offer a promising solution to bring drivers comfortable driving experiences and also improve road safety in intelligent transportation systems, but also faces many security issues. Collusive attack is one of the most challenging threats in VANETs because it violates the fundamental assumption made by VANET-based applications that all received information be correct and trustworthy. Collusive attackers can not only generate and send false or forged messages, but also purposely manipulate the reputation value of normal or malicious vehicular nodes. To address these issues, we analyze the behaviors characteristics of collusive attacks and propose a generic, lightweight, and fully distributed detection scheme against collusive attacks in VANETs. This scheme integrates two methods to identify different collusive attacks for fraud reputation and fraud message, respectively, as well as an incentive method to restrain collusive nodes. Simulation-based experiments are conducted and the results illustrate the superiority of the proposed security scheme over state-of-the-art methods.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Broadcast signcryption scheme with equality test in smart transportation system 智能交通系统中带有平等性测试的广播式签名加密方案
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-26 DOI: 10.1016/j.vehcom.2024.100820
Shufen Niu, Runyuan Dong, Wei Liu, Peng Ge, Qi Liu
{"title":"Broadcast signcryption scheme with equality test in smart transportation system","authors":"Shufen Niu,&nbsp;Runyuan Dong,&nbsp;Wei Liu,&nbsp;Peng Ge,&nbsp;Qi Liu","doi":"10.1016/j.vehcom.2024.100820","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100820","url":null,"abstract":"<div><p>With the generation of massive traffic information in the smart transportation system, the traffic control center efficiently utilizes broadcast communication to send multiple messages to multiple vehicles. Besides, diversified privacy disclosure and security attack issues also emerged spontaneously. To achieve secure communication between the traffic control center and vehicles in the smart transportation system, we design a broadcast signcryption scheme with equality test in the smart transportation system based on the certificateless cryptosystem and equality test. The scheme realizes message confidentiality and vehicle privacy by using the Lagrange interpolation theorem to encrypt messages and vehicle identities, while also achieving classify ciphertext by using the equality test and facilitate road traffic information management. Through numerical experiment analysis, the proposed work has higher operation efficiency and is more suitable for application in smart transportation systems.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Markov-reward based estimation of the idle-time in vehicular networks to improve multimetric routing protocols 基于马尔可夫奖励的车辆网络空闲时间估计,以改进多参数路由协议
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-25 DOI: 10.1016/j.vehcom.2024.100823
Isabel V. Martin-Faus , Leticia Lemus Cárdenas , Ahmad Mohamad Mezher , Mónica Aguilar Igartua
{"title":"Markov-reward based estimation of the idle-time in vehicular networks to improve multimetric routing protocols","authors":"Isabel V. Martin-Faus ,&nbsp;Leticia Lemus Cárdenas ,&nbsp;Ahmad Mohamad Mezher ,&nbsp;Mónica Aguilar Igartua","doi":"10.1016/j.vehcom.2024.100823","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100823","url":null,"abstract":"<div><p>Analyzing vehicular ad hoc networks (VANETs) poses a considerable challenge due to their constantly changing network topology and scarce network resources. Furthermore, defining suitable routing metrics for adaptive algorithms is a particularly hard task since these adaptive decisions should be taken according to the current conditions of the VANET. The literature contains different approaches aimed at optimizing the usage of wireless network resources. In a previous study, we introduced an analytical model based on a straightforward Markov reward chain (MRC) to capture transient measurements of the idle time of the link formed between two VANET nodes, which we denote as <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span>. This current study focuses on modeling and analyzing the influence of <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> on adaptive decision mechanisms. Leveraging our MRC models, we have derived a concise equation to compute <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span>. This equation provides a quick evaluation of <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span>, facilitating quick adaptive routing decisions that align with the current VANET conditions. We have integrated our <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> evaluation into multihop routing protocols. We specifically compare performance results of the 3MRP protocol with an enhanced version, I3MRP, which incorporates our <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> metric. Simulation results demonstrate that integrating <span><math><msub><mrow><mi>T</mi></mrow><mrow><mi>i</mi><mi>d</mi><mi>l</mi><mi>e</mi></mrow></msub></math></span> as a decision metric in the routing protocol enhances the performance of VANETs in terms of packet losses, packet delay, and throughput. The findings consistently indicate that I3MRP outperforms 3MRP by up to 50% in various scenarios across high, medium, and low vehicular densities.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000986/pdfft?md5=316bc8cce7c744317806874319ecfaac&pid=1-s2.0-S2214209624000986-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141481657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
S-LDM: Server local dynamic map for 5G-based centralized enhanced collective perception S-LDM:基于 5G 的集中式增强集体感知的服务器本地动态地图
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-25 DOI: 10.1016/j.vehcom.2024.100819
C.M. Risma Carletti , F. Raviglione , C. Casetti , F. Stoffella , G.M. Yilma , F. Visintainer
{"title":"S-LDM: Server local dynamic map for 5G-based centralized enhanced collective perception","authors":"C.M. Risma Carletti ,&nbsp;F. Raviglione ,&nbsp;C. Casetti ,&nbsp;F. Stoffella ,&nbsp;G.M. Yilma ,&nbsp;F. Visintainer","doi":"10.1016/j.vehcom.2024.100819","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100819","url":null,"abstract":"<div><p>The automotive field is undergoing significant technological advances, which includes making the next generation of autonomous vehicles smarter, greener and safer through vehicular networks, which are often referred to as Vehicle-to-Everything (V2X) communications. Together with V2X, centralized maneuver management services for autonomous vehicles are increasingly gaining importance, as, thanks to their complete view over the road, they can optimally manage even the most complex maneuvers targeting L4 driving and beyond. These services face the challenge of strictly requiring a high reliability and low latency, which are tackled with the deployment at orchestrated Multi-Access Edge Computing (MEC) platforms. In order to properly manage safety-critical maneuvers, these services need to receive a large amount of data from vehicles, even though the useful subset of data is often related to a specific context on the road (e.g., to specific road users or geographical areas). Decoding and post-processing a large amount of raw messages, which are then for the most part filtered, increases the load on safety-critical services, which should instead focus on meeting the deadlines for the actual control and management operations. On this basis, we present an innovative open-source, 5G &amp; MEC enabled service, called Server Local Dynamic Map (S-LDM). The S-LDM is a service that collects information about vehicles and other non-connected road objects using standard-compliant messages. Its primary purpose is to create a centralized dynamic map of the road that can be shared efficiently with other services managing L4 automation, when needed. By doing so, the S-LDM enables these services to widely and precisely understand the current situation of sections of the road, offloading them from the need of quickly processing a large number of messages. After a detailed description of the service architecture, we validate it through extensive laboratory and pilot trials, involving the MEC platforms and production 5G networks of three major European network operations and two Stellantis vehicles equipped with V2X On-Board Units (OBUs). We show how it can efficiently handle high update rates and process each messages in less than few tenths of microseconds. We also provide a complete scalability analysis with details on deployment options, providing insights on where new instances should be created in practical 5G-based V2X scenarios.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000949/pdfft?md5=150e5c867ceac116888efba68e0e6ff3&pid=1-s2.0-S2214209624000949-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141481658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GASBO: User grouping–based gradient average subtraction–based optimisation for NOMA-based fog computing vehicular network GASBO:基于用户分组的梯度平均减法优化,用于基于 NOMA 的雾计算车载网络
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-22 DOI: 10.1016/j.vehcom.2024.100824
C Kumara Narayana Swamy, T Velmurugan
{"title":"GASBO: User grouping–based gradient average subtraction–based optimisation for NOMA-based fog computing vehicular network","authors":"C Kumara Narayana Swamy,&nbsp;T Velmurugan","doi":"10.1016/j.vehcom.2024.100824","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100824","url":null,"abstract":"<div><p>The Internet of Vehicles (IoV) for fog computing (FC) addresses issues such as traffic congestion, transportation efficiency, and privacy. Non-orthogonal multiple access (NOMA) is a popular technology that enhances spectral efficiency and increases the network's access capability. The synchronisation between NOMA and FC radio access networks extends the application of augmented or vehicular networking and other promising uses. However, with the rapid increase in user vehicles and mobile data, the existing IoV has not succeeded in meeting the real-world and dependable communication needs of modern intelligent transportation due to its limited flexibility. To overcome this, we propose a user grouping-based hybrid optimistic framework for resource allocation in NOMA-based FC vehicular networks (FCVR), named the gradient average subtraction-based optimisation (GASBO). Initially, the NOMA-based FCVR is simulated. User grouping is performed based on GASBO using the signal-to-interference-plus-noise ratio and user distance. Finally, resource allocation is achieved using the proposed GASBO, which combines gradient descent optimisation and average subtraction-based optimisation. The analytic measures obtained for energy efficiency, throughput, sub-channel utility, capacity, and penalty function are 5,366,844,362.870 bits/joule, 883.411 Mbps, 82.031, 2316.337, and 0.011, respectively.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud-edge-terminal architecture 基于可信云-边缘-终端架构的车联网身份验证和密钥协议
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-22 DOI: 10.1016/j.vehcom.2024.100825
Jun-feng Tian , Rui Ni
{"title":"An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud-edge-terminal architecture","authors":"Jun-feng Tian ,&nbsp;Rui Ni","doi":"10.1016/j.vehcom.2024.100825","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100825","url":null,"abstract":"<div><p>The continuous progression in cloud computing, edge computing, and associated technologies has notably hastened the progress of vehicle networking technology. This advancement is increasingly assuming a crucial role in enhancing driving safety, optimizing traffic management, and revolutionizing traffic control methodologies. The principal aim of Internet of Vehicles (IoV) technology is to establish a secure, convenient, and efficient novel driving paradigm, enabling intelligent transportation through wireless communication connecting roadside units and vehicles. Nevertheless, this wireless communication method is susceptible to potential attacks, including remote control, information monitoring, and identity simulation. Given this situation, effective authentication is required to address this security concern. Thus, this study proposes an identity authentication and key negotiation protocol grounded in a trusted cloud-edge-terminal architecture. This protocol facilitates mutual authentication, generates secure session keys for communication, guarantees the security of vehicle communication, and supports functionalities including privacy protection and password alteration for vehicle users. Time tree technology is employed for managing the edge nodes, facilitating the sharing of vehicle certification information among these nodes, and enhancing certification efficiency. Formal security analysis and informal security analysis are conducted to demonstrate the security of the proposed protocol, evaluating its security and practicality. Theoretical comparisons and experimental results demonstrate the outstanding computational and communication performance of the proposed protocol.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":5.8,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intelligent clustering scheme based on whale optimization algorithm in flying ad hoc networks 基于鲸鱼优化算法的飞行 ad hoc 网络智能聚类方案
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-07 DOI: 10.1016/j.vehcom.2024.100805
Mehdi Hosseinzadeh , Jawad Tanveer , Faisal Alanazi , Khursheed Aurangzeb , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Aso Darwesh , Sang-Woong Lee , Amir Masoud Rahmani
{"title":"An intelligent clustering scheme based on whale optimization algorithm in flying ad hoc networks","authors":"Mehdi Hosseinzadeh ,&nbsp;Jawad Tanveer ,&nbsp;Faisal Alanazi ,&nbsp;Khursheed Aurangzeb ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Efat Yousefpoor ,&nbsp;Aso Darwesh ,&nbsp;Sang-Woong Lee ,&nbsp;Amir Masoud Rahmani","doi":"10.1016/j.vehcom.2024.100805","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100805","url":null,"abstract":"<div><p>Due to the progress of unmanned aerial vehicles (UAVs), this new technology is widely applied in military and civilian areas. Multi-UAV networks are often known as flying ad hoc networks (FANETs). Due to these applications, FANET must ensure communication stability and have high scalability. These goals are achieved by presenting clustering techniques in FANETs. However, the characteristics of these networks, like high-mobility nodes, limited energy, and dynamic topology, have created great challenges in two important processes of clustering protocols, namely cluster construction and the selection of cluster heads. In this paper, an intelligent clustering scheme based on the whale optimization algorithm called ICW is suggested in flying ad hoc networks. Firstly, each UAV specifies its hello interval based on the lifespan of adjacent links to guarantee the adaptability of ICW to FANET. Then, a centralized clustering process is done using a whale optimization algorithm (WOA) to find the best cluster centers on the network. To determine the membership of each UAV in a cluster, ICW employs a new criterion, i.e. closeness ratio, so that each UAV joins a cluster with the best closeness ratio. In addition, the evaluation of each whale is carried out based on a fitness function, consisting of three components, namely the number of isolated clusters, the ratio of inter-cluster distance to intra-cluster distance, and cluster size. Then, a cluster head is selected for each cluster based on a score value. This score is dependent on the weighted sum of four metrics, namely remaining energy, the average link lifespan between each UAV and its neighbors, neighbor degree, and the average distance between each UAV and its neighbors. In the last step, two routing processes, namely intra-cluster routing and inter-cluster routing, are introduced in FANET. Then, the evaluation and implementation of ICW is performed through the NS2 simulator. After completing the simulation process, ICW is compared to MWCRSF, DCM, and GWO, and the evaluation results are presented in two scenarios, namely network evaluation in the clustering process and network evaluation in the routing process. Accordingly, in the first scenario, ICW has low clustering time and a high cluster lifetime. In the second scenario, ICW optimizes energy consumption, network longevity, packet delivery rate, routing overhead, and delay compared to other approaches. However, throughput in ICW is about 3.9% lower than that in MWCRSF.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141325587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength 基于接收信号强度的无损量化方法,用于在车载 ad hoc 网络中生成物理层密钥
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-04 DOI: 10.1016/j.vehcom.2024.100809
Ibraheem Abdelazeem , Weibin Zhang , Abdeldime Mohamedsalih , Mohamed Abdalwohab , Ahmedalmansour Abuobida
{"title":"A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength","authors":"Ibraheem Abdelazeem ,&nbsp;Weibin Zhang ,&nbsp;Abdeldime Mohamedsalih ,&nbsp;Mohamed Abdalwohab ,&nbsp;Ahmedalmansour Abuobida","doi":"10.1016/j.vehcom.2024.100809","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100809","url":null,"abstract":"<div><p>Vehicular Ad Hoc Networks (VANETs) provide various benefits and play a crucial role in improving efficiency and ensuring human safety across different applications. However, these advantages also give rise to security challenges and privacy concerns, necessitating a thorough examination of security attacks. Current key generation schemes, particularly those based on the Physical-Layer Model (PLM), face limitations such as low key generation rates and inadequate randomness. This paper introduces an innovative key generation method that utilizes adaptive physical-layer techniques and lossless quantization. The method involves an eight-level quantization process, which enables precise granularity and adaptive selection of quantization thresholds to tailor the computation of Received Signal Strength (RSS) measurements to individual needs. The adaptive approach ensures the retention of information within RSS measurements, resulting in reduced bit disagreement rates and enhanced randomness of the generated keys. Simulated evaluations demonstrate the effectiveness of the proposed method, showing superior performance in terms of bit generation, entropy, and secrecy rates, while also minimizing the occurrence of unnecessary measurements. This advancement holds significant promise for strengthening the security framework within VANETs.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141303831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fully distributed multi-agent processing strategy applied to vehicular networks 应用于车载网络的全分布式多代理处理策略
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-06-04 DOI: 10.1016/j.vehcom.2024.100806
Vladimir R. de Lima, Marcello L.R. de Campos
{"title":"Fully distributed multi-agent processing strategy applied to vehicular networks","authors":"Vladimir R. de Lima,&nbsp;Marcello L.R. de Campos","doi":"10.1016/j.vehcom.2024.100806","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100806","url":null,"abstract":"<div><p>This work explores distributed processing techniques, together with recent advances in multi-agent reinforcement learning (MARL) to implement a fully decentralized reward and decision-making scheme to efficiently allocate resources (spectrum and power). The method targets processes with strong dynamics and stringent requirements such as cellular vehicle-to-everything networks (C-V2X). In our approach, the C-V2X is seen as a strongly connected network of intelligent agents which adopt a distributed reward scheme in a cooperative and decentralized manner, taking into consideration their channel conditions and selected actions in order to achieve their goals cooperatively. The simulation results demonstrate the effectiveness of the developed algorithm, named Distributed Multi-Agent Reinforcement Learning (DMARL), achieving performances very close to that of a centralized reward design, with the advantage of not having the limitations and vulnerabilities inherent to a fully or partially centralized solution.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141303833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信