Vehicular Communications最新文献

筛选
英文 中文
Enhancing security in vanets: Adaptive Bald Eagle Search Optimization based multi-agent deep Q neural network for Sybil attack detection 增强vanet的安全性:基于自适应秃鹰搜索优化的多智能体深度Q神经网络用于Sybil攻击检测
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-24 DOI: 10.1016/j.vehcom.2025.100928
M. Ajin, R.S. Shaji
{"title":"Enhancing security in vanets: Adaptive Bald Eagle Search Optimization based multi-agent deep Q neural network for Sybil attack detection","authors":"M. Ajin,&nbsp;R.S. Shaji","doi":"10.1016/j.vehcom.2025.100928","DOIUrl":"10.1016/j.vehcom.2025.100928","url":null,"abstract":"<div><div>Currently, the use of Vehicular Ad-Hoc Networks (VANETs) has gained significant attention in toll management systems and traffic control. VANETs facilitate effective communication by connecting Roadside Units (RSUs) and vehicles. VANETs can ease decision-making for drivers, meanwhile, they carry some problems with security since they often modify topology. In VANET, the Sybil attack is a specific attack, that might generate traffic congestion and affect transportation safety services. Different Mechanisms have been implemented to discover various attacks in VANET, yet VANET meets diverse attacks. Therefore, this research article developed an effective Sybil attack detection model namely Adaptive Bald Eagle Search Optimization (ABESO) based Multi-agent-Deep Q Neural network (MA-DQN). The principal objective of the ABESO based DQN is to enhance the security level of VANET by identifying the Sybil Attacks. In this, clustering and effective cluster head selection are performed to discover the Sybil attacks. In the suggested ABESO based DQN algorithm, robust clustering is carried out, in which vehicle nodes of VANET are clustered through the utilization of the BIRCH clustering technique. Our proposed ABESO based DQN algorithm augments the overall network efficiency by effective cluster head selection. Taylor-based Waterwheel Plant (TWP) is exploited in the cluster head selection and diminishes the overhead in the network. In the proposed model, the MDQN-based approach selects the features and ABESO based DQN delivers an optimal output, i.e., it discovers normal and Sybil attacks. Experimental results are carried out on the basis of the sybil attack detection dataset that holds multiple data regarding attacks. The detection results affirm that the efficiency of the proposed ABESO based DQN approach is superior and outperformed previous methods.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100928"},"PeriodicalIF":5.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143935907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging reputation for enhanced decision accuracy in vehicle-to-vehicle communications under limited infrastructure 在有限的基础设施下,利用车辆对车辆通信中提高决策准确性的声誉
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-24 DOI: 10.1016/j.vehcom.2025.100927
Dimah Almani , Tim Muller , Steven Furnell
{"title":"Leveraging reputation for enhanced decision accuracy in vehicle-to-vehicle communications under limited infrastructure","authors":"Dimah Almani ,&nbsp;Tim Muller ,&nbsp;Steven Furnell","doi":"10.1016/j.vehcom.2025.100927","DOIUrl":"10.1016/j.vehcom.2025.100927","url":null,"abstract":"<div><div>Vehicle-to-Vehicle (V2V) networking enhances transportation safety and efficiency by enabling vehicles to share alerts. However, malicious vehicles may inject false messages, leading to disputes. While certificates help ensure security, Certificate Revocation List (CRLs) may be outdated in low-connectivity areas, making it hard to verify conflicting reports. Reputation systems, using a pre-signature scheme, can aid decision-making even in infrastructure-limited environments.</div><div>In this paper, we provide the mechanisms to use reputation in areas with low/no connectivity, whilst allowing for pseudonymous certificates to verify message authenticity without breaking privacy. The approach is integrated into the existing Security Credential Management System (SCMS), a framework for managing digital certificates for secure V2V communication.</div><div>Our simulations evaluate the security performance of our proposed mechanism, with offline available reputation, against plain SCMS certificate management that rely solely on CRL to block malicious vehicles. The results are achieved by integrating vehicular simulation tools like SUMO, OMNeT++, and Veins, to evaluate the V2V communications in each system under two conditions (Accident and No accident) ensuring a comprehensive system evaluation.</div><div>The proposed scheme improves accuracy in decision-making with conflicting information by 36% in accidents and 44.4% in No-Accident situations in a rural environment.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100927"},"PeriodicalIF":5.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143870049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P3AKA: A PUF based privacy preserving authentication and key agreement framework for secure communication in vehicle to grid network P3AKA:一个基于PUF的车辆与电网安全通信的隐私保护认证和密钥协议框架
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-24 DOI: 10.1016/j.vehcom.2025.100925
Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel
{"title":"P3AKA: A PUF based privacy preserving authentication and key agreement framework for secure communication in vehicle to grid network","authors":"Prarthana J. Mehta,&nbsp;Balu L. Parne,&nbsp;Sankita J. Patel","doi":"10.1016/j.vehcom.2025.100925","DOIUrl":"10.1016/j.vehcom.2025.100925","url":null,"abstract":"<div><div>A traditional power grid integrates a Smart Grid (SG) technology to reduce greenhouse gases and increase the efficiency of energy transition. The Vehicle to Grid (V2G) is raised and combined with the SG network to fulfill these objectives of the SG technology. The two-way power flow in the V2G technology allows an Electrical Vehicle (EV) to charge its battery and discharge surplus energy back to the power grid through the Charging Stations (CSs). During the energy transfer, an EV shares identity, location, and charging preferences with the CS through an insecure channel. It raises significant security and privacy vulnerabilities for the V2G network. In addition, the EV and CS are situated in an exposed location that may increase the risk of physical attack. Hence, there is a need to preserve the security and privacy of the EV and CS in the V2G network. Moreover, a lightweight security solution is necessary for the resource constrained CS and EV in the V2G network. Several authentication and key agreement protocols were suggested in the literature to overcome the security challenges in the V2G network. However, the existing approaches fail to maintain the session key secrecy and preserve from the physical attack. Thus, we propose a Physically Unclonable Function (PUF) based Privacy Preserving Authentication and Key Agreement (P3AKA) framework for the V2G network using lightweight cryptographic operations. PUF protects the CS and EV from the physical attack and other lightweight cryptographic functions safeguard the network from other security attacks. Security analysis of the proposed P3AKA framework represents that it protects the V2G network from potential security threats such as impersonation, replay, Man-in-The-Middle (MiTM), physical, and machine learning attacks. Further, it ensures user anonymity and non-traceability of the EV user. The formal security verification uses the ROR model and Scyther tool to verify the proposed P3AKA framework. It illustrates that the P3AKA framework successfully provides bidirectional authentication and session key secrecy in the V2G network. In addition, the performance analysis illustrates that the proposed P3AKA framework improves security with competitive overheads compared to existing relevant schemes.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100925"},"PeriodicalIF":5.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143883170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based receiver structure with superimposed channel estimation for autonomous underwater vehicles 基于深度学习的自主水下航行器信道叠加估计接收机结构
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-24 DOI: 10.1016/j.vehcom.2025.100926
Zeyad A.H. Qasem , Xingbin Tu , Fengzhong Qu , Chunyi Song , Hamada Esmaiel
{"title":"Deep learning-based receiver structure with superimposed channel estimation for autonomous underwater vehicles","authors":"Zeyad A.H. Qasem ,&nbsp;Xingbin Tu ,&nbsp;Fengzhong Qu ,&nbsp;Chunyi Song ,&nbsp;Hamada Esmaiel","doi":"10.1016/j.vehcom.2025.100926","DOIUrl":"10.1016/j.vehcom.2025.100926","url":null,"abstract":"<div><div>Although autonomous underwater vehicles can achieve complex tasks in harsh and inaccessible marine environments, they face several challenges related to the harsh channel effects and limited available bandwidth, making reliable channel estimation crucial task for achieving robust communication. Therefore, to track channel effects, a significant portion of bandwidth is usually reserved for overhead, which dramatically reduces the already limited bandwidth efficiency. In this paper, we present a real signal orthogonal frequency division multiplexing (OFDM) method based on deep learning to accurately track channel effects without losing bandwidth efficiency. The proposed scheme adopts the discrete Hartley transform to produce a real signal modulation, and a unitary neural network (UNN) at the sending end to add extra packages. At the receiving end, we use a deep neural network (DNN) in conjunction with channel estimation and equalization to accurately detect the transmitted information data. Therefore, we jointly train both UNN and DNN to prevent interference between the data and pilot, as well as to address factors that impact data detection performance effectively. We also deploy the carrier frequency offset estimation technique without sacrificing any subcarriers. Consequently, we track channel effects without the need for dedicated pilot subcarriers and/or data detection degradation. The proposed method has a better bit error rate, spectral efficiency, and computational complexity than current benchmarks, as shown by both the simulation and the real experiments done in the sea over a distance of 300 m</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100926"},"PeriodicalIF":5.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143894803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-supported communication: Current and prospective solutions 无人机支持的通信:当前和未来的解决方案
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-18 DOI: 10.1016/j.vehcom.2025.100923
Moayad Aloqaily , Ouns Bouachir , Ismaeel Al Ridhawi
{"title":"UAV-supported communication: Current and prospective solutions","authors":"Moayad Aloqaily ,&nbsp;Ouns Bouachir ,&nbsp;Ismaeel Al Ridhawi","doi":"10.1016/j.vehcom.2025.100923","DOIUrl":"10.1016/j.vehcom.2025.100923","url":null,"abstract":"<div><div>The advancement in wireless communication has significantly resulted in unprecedented new applications and services. This, coupled with Next-Generation Networking (NGN) and the recent advances in cellular communication and networking, predominantly the Fifth-Generation (5G) network, has resulted in the rise of new technological solutions. Unmanned Aerial Vehicles (UAVs) is one such solution that has evolved from its traditional usage in military and civilian applications, towards new and innovative solutions that provide support to wireless communication and networking. With advances in their processing and communication capabilities, UAVs are now supporting both core and edge networks to deliver services to end-users in a reliable and fast manner. The synergy and collective collaboration between UAVs and continuously evolving and progressing technologies such as Artificial Intelligence (AI) and blockchain are reshaping the landscape of wireless communication and networking, enabling more robust, secure and adaptable systems that transcend traditional limitations. In this article, we explore various collaborative solutions that leverage UAV communication and networks that not only bolster communication between mobile nodes and the core network but also reinforce the edge computing infrastructure. This reinforcement enables scalable data storage and intelligent processing to elevate end-user services and applications. Additionally, we address the obstacles, concerns, and future pathways concerning UAV-supported NGNs.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100923"},"PeriodicalIF":5.8,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143941713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal coordinated platoon lane change in highways with mixed traffic 混合交通高速公路最优协调排变道
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-18 DOI: 10.1016/j.vehcom.2025.100924
Fernando V. Monteiro , Ketan Savla , Petros Ioannou
{"title":"Optimal coordinated platoon lane change in highways with mixed traffic","authors":"Fernando V. Monteiro ,&nbsp;Ketan Savla ,&nbsp;Petros Ioannou","doi":"10.1016/j.vehcom.2025.100924","DOIUrl":"10.1016/j.vehcom.2025.100924","url":null,"abstract":"<div><div>In the field of connected autonomous vehicles, platoons - where vehicles closely follow one another - have shown promising results in enhancing safety, traffic flow, and fuel efficiency. This study addresses the unique challenges of platoon lane changes, where multiple platoon vehicles have lane change intention and must remain together after the maneuver is completed. We focus on highway environments because many studies have highlighted the advantages of platooning in these settings. We leverage an offline controller synthesis approach to deal with the combinatorial problem of choosing a strategy. Building on concepts from symbolic optimal control, we represent the problem using a weighted directed acyclic graph where nodes are quantized state vectors, edge weights are costs to transition between nodes, and the shortest path solutions represent the optimal platoon lane change strategies. We use a Cached Branch-and-Bound Depth-First Search algorithm to solve the offline control problem due to its anytime capability and low memory requirements. This approach provides real-time decision making and guarantees maneuver success while minimizing completion time or control effort. Previous works either required control of all vehicles on the road, making them inadequate for mixed-traffic scenarios, or fixed the order in which platoon vehicles change lanes, disregarding the current state of surrounding vehicles and maneuver costs. Our framework can describe all previously proposed methods, relies only on cooperation between platoon vehicles, allows for optimization, and produces solutions whose costs decrease as the allowed computational time increases. We employ the VISSIM traffic simulator to compare our approach to the state of the art. The experiments show that we obtain an increase of 13% in the maneuver completion rate along with a decrease of around 15% to 20% in the maneuver completion time and distance traveled to complete the lane change at the cost of an average increase of 2% to 17% in the longitudinal control effort. This trade-off is a direct consequence of having the platoon occupy suitable lane-changing spaces as soon as possible, and this myopic behavior is necessary when there is no information about the future movements of human-driven vehicles. Moreover, the experiments indicate that our approach yields a sharp decrease in cost in relatively short computational times. These results emphasize the potential for deployment of the proposed method in mixed-traffic highway scenarios.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100924"},"PeriodicalIF":5.8,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143870048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive bendable virtual tunnel routing protocol for flying ad-hoc networks 一种用于飞行自组织网络的自适应弯曲虚拟隧道路由协议
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-18 DOI: 10.1016/j.vehcom.2025.100922
Huizhi Tang , Demin Li , Yihong Zhang , Xuemin Chen , Abdul Rauf
{"title":"An adaptive bendable virtual tunnel routing protocol for flying ad-hoc networks","authors":"Huizhi Tang ,&nbsp;Demin Li ,&nbsp;Yihong Zhang ,&nbsp;Xuemin Chen ,&nbsp;Abdul Rauf","doi":"10.1016/j.vehcom.2025.100922","DOIUrl":"10.1016/j.vehcom.2025.100922","url":null,"abstract":"<div><div>Flying ad-hoc networks (FANETs) play a crucial role in disaster response, surveillance, and remote sensing. However, their highly dynamic topology and frequent link disruptions pose significant challenges to efficient routing. Existing protocols suffer from excessive control overhead, unstable links, and inefficient energy utilization, that limits their practical deployment. To address these issues, we propose an adaptive bendable virtual tunnel routing protocol (ABVTR), which constructs a three-dimensional (3D) adaptive bendable virtual relay tunnel (3D-ABVRT) using Bézier curves. This tunnel restricts the propagation of route request messages, reducing redundant transmissions, and enhancing routing stability, particularly in sparsely connected UAV networks. ABVTR employs a piecewise function to align UAV movement with the tunnel's centerline, effectively minimizing deviations and reducing delays. Furthermore, it dynamically determines the next-hop node by considering movement direction, relative speed, and residual energy. The latter two factors are assessed using a S-function and an exponential function, respectively, to enhance link reliability and optimize energy distribution. This work advances the state-of-the-art by introducing a more adaptive, energy-efficient, and scalable routing solution for FANETs. The simulation results show that ABVTR significantly outperforms existing protocols (EARVRT, iPipe, HMGOC, CF-GPSR, FM-DT-GDR) in end-to-end delay, packet delivery ratio (PDR), and routing overhead. These enhancements position ABVTR as a highly promising solution for mission-critical FANETs application, enabling more resilient, scalable, and efficient aerial networks.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100922"},"PeriodicalIF":5.8,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143859967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security and trust using efficient privacy-preserving authentication in vehicular edge computing networks 在车载边缘计算网络中使用高效的隐私保护认证增强安全性和信任度
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-17 DOI: 10.1016/j.vehcom.2025.100921
Anwar Ghani , Saeed Ullah Jan , Shehzad Ashraf Chaudhry , Rashid Ahmad , Ashok Kumar Das , Do Hyeun Kim
{"title":"Enhancing security and trust using efficient privacy-preserving authentication in vehicular edge computing networks","authors":"Anwar Ghani ,&nbsp;Saeed Ullah Jan ,&nbsp;Shehzad Ashraf Chaudhry ,&nbsp;Rashid Ahmad ,&nbsp;Ashok Kumar Das ,&nbsp;Do Hyeun Kim","doi":"10.1016/j.vehcom.2025.100921","DOIUrl":"10.1016/j.vehcom.2025.100921","url":null,"abstract":"<div><div>The Internet of Vehicles (IoV) requires advanced safety, security, and services in Intelligent Transportation Systems (ITS). Frequent broadcast message intervals and Dedicated Short-Range Communication (DSRC) make validating messages in such short timeframes extremely challenging. Additionally, current authentication protocols cannot meet the demands of the environment due to high communication and computational overheads. Furthermore, lightweight authentication proposals have been put forth to solve the problem; however, such attempts cannot provide a sophisticated solution that can handle advanced security needs and suffer from accuracy issues. This article presents a two-factor authentication protocol using lightweight cryptographic operations such as one-way hashing and exclusive OR (XOR) with acceptable efficiency and security. The identities are generated using Physically Unclonable Functions (PUFs), passwords, and randomized nonces to ensure two-factor authentication. The proposal is rigorously verified through formal security analysis, confirming that the protocol is untraceable, anonymous, protects key secrecy, and is resistant to well-known attacks in the IoV domain. The performance analysis confirms its robustness and reliability, with 43.31% low energy consumption in terms of computation, communication, and support for more security requirements, making it a feasible solution for the IoV domain.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100921"},"PeriodicalIF":5.8,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143855879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing the energy efficiency using M-PSO in multi-hop UAV-IRS network for improved post-disaster emergency communication services 在多跳无人机-红外系统网络中使用 M-PSO 实现能效最大化,以改进灾后应急通信服务
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-11 DOI: 10.1016/j.vehcom.2025.100920
Humairah Hamid, G.R. Begh
{"title":"Maximizing the energy efficiency using M-PSO in multi-hop UAV-IRS network for improved post-disaster emergency communication services","authors":"Humairah Hamid,&nbsp;G.R. Begh","doi":"10.1016/j.vehcom.2025.100920","DOIUrl":"10.1016/j.vehcom.2025.100920","url":null,"abstract":"<div><div>Natural disasters often damage the ground infrastructure, leading to communication failures that hamper emergency response efforts. Solutions dependent on ground-based infrastructure suffer from severe limitations in these scenarios owing to fixed positions, limited energy sources, and limited coverage. Existing methodologies, often relying on terrestrial relay points or fixed infrastructure, face challenges in adjusting to rapidly changing conditions in disaster areas, leading to ineffective energy consumption and limited communication range. To address this challenge, this work proposes a novel approach that employs Unmanned Aerial Vehicles (UAVs) alongside Intelligent Reflecting Surface (IRS) to deal with the connectivity challenges and provide energy-efficient communication services for Ground Users (GUs). The proposed framework includes a multi-hop communication model in which UAV-IRS units function as mobile relays, establishing strong connections between the affected area nodes and a temporary base station. We propose a Modified Particle Swarm Optimization (M-PSO) technique that optimally adjusts UAV placement and transmit power while the IRS phase shifts are independently optimized using Gradient Descent (GD) to enhance energy efficiency. Simulation results indicate that our setup significantly enhances communication capabilities in a disaster-stricken region, outperforming conventional methods for enhancing coverage and energy efficiency, thereby providing a resilient alternative for emergency communication in disaster-affected regions.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"53 ","pages":"Article 100920"},"PeriodicalIF":5.8,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143828420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint carrier frequency offset, doubly selective channel estimation and data detection for RIS assisted MIMO OFDMA uplink system RIS辅助MIMO OFDMA上行系统的联合载波频偏、双选择信道估计和数据检测
IF 5.8 2区 计算机科学
Vehicular Communications Pub Date : 2025-04-11 DOI: 10.1016/j.vehcom.2025.100916
A.G. Murali Krishna , P.S. Sanoopkumar , S.M. Sameer
{"title":"Joint carrier frequency offset, doubly selective channel estimation and data detection for RIS assisted MIMO OFDMA uplink system","authors":"A.G. Murali Krishna ,&nbsp;P.S. Sanoopkumar ,&nbsp;S.M. Sameer","doi":"10.1016/j.vehcom.2025.100916","DOIUrl":"10.1016/j.vehcom.2025.100916","url":null,"abstract":"<div><div>With the presence of an array of passive elements embedded in a reconfigurable intelligent surface (RIS), estimation of time-varying channels between a fast-moving user and the fixed base station (BS) is more challenging than conventional static channels. In this paper, we propose a joint technique for the estimation of carrier frequency offset (CFO) and doubly selective channel (DSC), and data detection in the RIS-assisted multiple input multiple output (MIMO) orthogonal frequency division multiple access (OFDMA) uplink system. The time variations of the channel within the OFDMA symbol are represented using the basis expansion model (BEM), significantly reducing the number of estimated parameters. An autoregressive (AR) model is used to characterize the variations in BEM coefficients and CFOs over successive OFDMA symbols. A novel technique of combining the Schmidt extended Kalman filtering (SEKF) and Gaussian particle filtering (GPF) integrated with an iterative detector and decoder (IDD) receiver structure (IDD-SKGPF) is proposed to estimate the BEM coefficients, CFOs and to detect the symbols in two stages. Performance of the proposed method is evaluated using normalized mean square error (NMSE) and compared with the derived Bayesian Cramer-Rao bound (BCRB) and modified BCRB. Furthermore, the reflection coefficient is optimized in the time domain by maximizing the achievable rate to demonstrate that the exploitation of RIS may result in significant bit error rate (BER) performance improvement of <span><math><mn>6</mn><mi>d</mi><mi>B</mi></math></span> in SNR over non optimized RIS scenario even under high mobility scenarios.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"53 ","pages":"Article 100916"},"PeriodicalIF":5.8,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143828418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信