Vehicular Communications最新文献

筛选
英文 中文
Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET 基于多 TA 模型的雾化 VANET 条件隐私保护认证协议
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-05-07 DOI: 10.1016/j.vehcom.2024.100785
Pankaj Kumar , Hari Om
{"title":"Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET","authors":"Pankaj Kumar ,&nbsp;Hari Om","doi":"10.1016/j.vehcom.2024.100785","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100785","url":null,"abstract":"<div><p>The rapid growth of Vehicular Ad-hoc Networks (VANET), fueled by advancements in the Internet-of-Things, cloud computing, Intelligent Transportation Systems, and fog computing, has led to the introduction of fog node-based VANET to serve resource-constrained devices. In the traditional security models of VANET, due to the use of a centralized trusted authority, there is a chance of single-point-of-failure and service unavailable with the increased service access requests. Also, there was one-to-one communication between each roadside unit and trusted authority. This may increase the system complexity and increase the traffic load. To address these issues, a novel authentication protocol for fog-enabled VANET based on multiple trusted authority model is discussed which reduces the chance of service unavailability and single-point-of-failure as the entire traffic load is distributed among multiple sub-trusted authority. Due to the incorporation of fog node, a group of roadside units can be controlled centrally, where trusted authority does not need to perform individual authentication for each roadside unit. The proposed protocol's security is rigorously examined through both informal and formal security analysis. Additionally, the protocol exhibits enhanced security features, as demonstrated in a performance comparison section, showcasing its ability to meet the security and privacy requirements while incurring relatively low communication and computation and storage costs. Thus, the proposed protocol offers a secure and efficient authentication protocol for fog-enabled VANET.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140906357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast and efficient context-aware embedding generation using fuzzy hashing for in-vehicle network intrusion detection 利用模糊散列生成快速高效的上下文感知嵌入,用于车载网络入侵检测
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-05-07 DOI: 10.1016/j.vehcom.2024.100786
Moon Jeong Choi , Ik Rae Jeong , Hyun Min Song
{"title":"Fast and efficient context-aware embedding generation using fuzzy hashing for in-vehicle network intrusion detection","authors":"Moon Jeong Choi ,&nbsp;Ik Rae Jeong ,&nbsp;Hyun Min Song","doi":"10.1016/j.vehcom.2024.100786","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100786","url":null,"abstract":"<div><p>In the rapidly advancing field of automotive cybersecurity, the protection of In-Vehicle Networks (IVNs) against cyber threats is crucial. Current deep learning solutions offer robustness but at the cost of high computational demand and potential privacy breaches due to the extensive IVN data required for model training. Our study proposes a novel intrusion detection system (IDS) specifically designed for IVNs that prioritizes computational efficiency and data privacy. Utilizing fuzzy hashing techniques, we generate context-aware embeddings that effectively preserve the privacy of IVN data. Among the machine learning algorithms evaluated, the Support Vector Machine (SVM) emerged as the most effective, particularly when paired with TLSH hash embeddings. This combination achieved notable detection performance, as substantiated by T-SNE visualizations that demonstrate a distinct segregation of normal and attack traffic within the vector space. To validate the effectiveness and practicality of our proposed IDS, we conducted exhaustive experiments on the well-known car-hacking dataset and the more complex ROAD dataset, which includes diverse and sophisticated attack scenarios. Our findings reveal that the proposed lightweight IDS not only demonstrates high detection accuracy but also maintains this performance within the computational constraints of current IVN systems. The system's capability to operate effectively in real-time environments makes it a viable solution for modern automotive cybersecurity needs.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140906358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared group session key-based conditional privacy-preserving authentication protocol for VANETs 基于共享组会话密钥的 VANET 有条件隐私保护认证协议
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-30 DOI: 10.1016/j.vehcom.2024.100782
Run Zhang, Wenan Zhou
{"title":"Shared group session key-based conditional privacy-preserving authentication protocol for VANETs","authors":"Run Zhang,&nbsp;Wenan Zhou","doi":"10.1016/j.vehcom.2024.100782","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100782","url":null,"abstract":"<div><p>Vehicular Ad-Hoc Networks (VANETs) have significantly enhanced driving safety and comfort by leveraging vehicular wireless communication technology. Due to the open nature of VANETs, conditional privacy-preserving authentication protocol should be offered against potential attacks. Efficient and secure authentication among vehicles in VANETs are important requirements, but there are various limitations in the existing conditional privacy-preserving authentication protocols for securing VANETs. To cope with the inherent issues, we propose a conditional privacy-preserving authentication protocol based share group session key (SGSK) by integrating the self-healing key distribution technique, blockchain, and MTI/C0 protocol. In our protocol, we use SGSK instead of the time-consuming Certificate Revocation List (CRL) checking, and we revoke malicious vehicles by updating SGSK. It is shared among unrevoked vehicles within a domain and across-domain. As a result, when a malicious revoked vehicle enters a new domain, it is difficult for it to access the system and send false messages. Furthermore, our protocol can not only achieve computation efficiency by reducing the number of computing operations of bilinear pairing but also resist various attacks while keeping conditional privacy protection. We implement our protocol in the Hyperledger Fabric platform. The experimental results show that our protocol is available to revoke 180 malicious vehicles in across-domain scenarios within one second, and it can meet the requirement of verifying 600 messages per second easily. Moreover, our comprehensive performance evaluations demonstrates that our protocol outperforms other approaches in terms of vehicle revocation checking cost, computation overhead, and communication overhead. In addition, to show the feasibility and validity of our protocol, we use SUMO and NS2 to simulate the actual VANET scenario and validate the efficiency and performance of our protocol. Simulation results prove the practicability of our protocol for VANETs.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140824811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How secure are our roads? An in-depth review of authentication in vehicular communications 我们的道路有多安全?深入探讨车载通信中的身份验证问题
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-26 DOI: 10.1016/j.vehcom.2024.100784
Mahmoud A. Shawky , Syed Tariq Shah , Mohammed Abdrabou , Muhammad Usman , Qammer H. Abbasi , David Flynn , Muhammad Ali Imran , Shuja Ansari , Ahmad Taha
{"title":"How secure are our roads? An in-depth review of authentication in vehicular communications","authors":"Mahmoud A. Shawky ,&nbsp;Syed Tariq Shah ,&nbsp;Mohammed Abdrabou ,&nbsp;Muhammad Usman ,&nbsp;Qammer H. Abbasi ,&nbsp;David Flynn ,&nbsp;Muhammad Ali Imran ,&nbsp;Shuja Ansari ,&nbsp;Ahmad Taha","doi":"10.1016/j.vehcom.2024.100784","DOIUrl":"https://doi.org/10.1016/j.vehcom.2024.100784","url":null,"abstract":"<div><p>Intelligent transportation systems are pivotal in enhancing road safety by enabling intra-vehicle communication. Due to the nature of the wireless communication link, several potential risks of attacks exist, including impersonation, modification, and replay. To ensure the security of vehicular ad hoc networks (VANETs) against malicious activities, secure data exchange between inter-communicating terminals, specifically vehicle-to-everything (V2X) communication, becomes a critical technological challenge that requires attention. Existing authentication methods for VANET applications mainly rely on crypto-based techniques. The emergence of physical (PHY)-layer authentication has gained prominence, leveraging the inherent characteristics of wireless channels and hardware imperfections to distinguish between wireless devices. The PHY-layer-based authentication is not a standalone alternative to cryptographic methods, but it shows potential as a supplementary approach for re-authentication in VANETs, referred to as “cross-layer authentication”. This comprehensive survey thoroughly evaluates the state-of-the-art of crypto-based, PHY-layer-based, and cross-layer-based authentication methods in VANETs. Furthermore, this survey delves into integrating different sixth-generation (6G) and beyond technologies, such as reconfigurable intelligent surfaces (RIS) and federated learning, for enhancing PHY-layer authentication performance in the presence of active attackers. Furthermore, in-depth insights into the advantages of cross-layer authentication methods are presented, along with exploring various state-of-the-art VANET security techniques. A detailed technical discussion is provided on these advanced approaches, and it is concluded that they can significantly enhance the security of intelligent transportation systems, ensuring safer and more efficient vehicular communications.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214209624000597/pdfft?md5=f27f8596e6fdcaadd09b756262d13174&pid=1-s2.0-S2214209624000597-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140824810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolutionary game based interest forwarding in information centric vehicular networks (R2) 以信息为中心的车载网络中基于进化博弈的兴趣转发(R2)
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-25 DOI: 10.1016/j.vehcom.2024.100779
Surya Samantha Beri, Nitul Dutta
{"title":"Evolutionary game based interest forwarding in information centric vehicular networks (R2)","authors":"Surya Samantha Beri,&nbsp;Nitul Dutta","doi":"10.1016/j.vehcom.2024.100779","DOIUrl":"10.1016/j.vehcom.2024.100779","url":null,"abstract":"<div><p>In Information Centric Network (ICN) a client generates an interest packet when it is in need of a content. The interest packet carries the content name and propagates through the network till it reaches an appropriate cached content store or the producer of the content. Retrieval of the searched content is faster if the interest packet is forwarded in right direction towards a probable content location. An efficient and optimal interest forwarding technique is the key requirement for the success of any ICN implementation. This paper describes an interest forwarding approach for information centric vehicular networks based on evolutionary game theory. It uses the Public Goods Gaming (PGG) strategy to forward interest packets so that the content can be located at the earliest. The interest packets are modeled as goods and various participating entities are categorized either as cooperator or defector. The purpose of the game is to deliver the goods (the interest packet) to the rightful content store. Cooperator tries to optimally deliver the interest packets and hence they are rewarded with certain incentives. However, defectors are not rewarded as they do not participate in the game. At the beginning, a player selects a strategy and confined to it till the completion of the game. During interest forwarding, a node selects its neighbor(s) having higher credits as next level forwarder. The scheme is analyzed mathematically to establish various claims made in this paper. The mathematically established claims are also validated through simulation in <em>ns</em>-3 based <span><math><mi>n</mi><mi>d</mi><mi>n</mi><mi>S</mi><mi>I</mi><mi>M</mi></math></span>-2.0. The model is compared with four other existing ICN forwarding approaches and simulation results depict that the new algorithm performs better.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140758425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoV-6G+: A secure blockchain-based data collection and sharing framework for Internet of vehicles in 6G-assisted environment IoV-6G+:6G 辅助环境下基于区块链的安全车联网数据收集与共享框架
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-25 DOI: 10.1016/j.vehcom.2024.100783
Vipin Kumar, Rifaqat Ali, Pawan Kumar Sharma
{"title":"IoV-6G+: A secure blockchain-based data collection and sharing framework for Internet of vehicles in 6G-assisted environment","authors":"Vipin Kumar,&nbsp;Rifaqat Ali,&nbsp;Pawan Kumar Sharma","doi":"10.1016/j.vehcom.2024.100783","DOIUrl":"10.1016/j.vehcom.2024.100783","url":null,"abstract":"<div><p>The growing need for wide and ubiquitous accessibility to advanced Intelligent Transportation Systems (ITS) has led to the evolution of conventional Vehicle to Everything (V2X) paradigms into the Internet of Vehicles (IoVs). Next-generation IoVs establish seamless connections among humans, vehicles, Internet of Things (IoT) devices, and service platforms to enhance transit efficiency, road safety, and environmental conservation, with notable advancements in IoV technologies, specifically in secure data exchange and user privacy protection. Additionally, Unmanned Aerial Vehicles (UAVs) are envisioned as scalable and adaptable solutions for comprehensive IoV service coverage. The current approaches in IoV mainly concentrate on local infrastructure setups, overlooking the potential of infrastructure-less IoVs that lack extensive edge facilities. Also, the transmission of data over public channels by vehicles equipped with servers is susceptible to interception and tampering by malicious attackers. Moreover, the substantial amount of real-time data generated by vehicles, IoT devices, travelers, and social interactions pose a significant strain on servers as well as latency issues. To address these security concerns, this research suggests a secure-lightweight data collection and sharing framework for 6G-assisted smart transportation using blockchain and UAV, called IoV-6G+. The process entails drones collecting information and transmitting it to dedicated edge servers that securely aggregate the information and generate transactions on a cloud server. A cloud server securely collects data from edge servers, creates transactions, combines them into blocks, and then confirms and adds these blocks to the blockchain through a voting-based consensus method in a peer-to-peer network of cloud servers. Additionally, the security analysis of our proposed IoV-6G+ is assessed using the “Informal and formal (i.e., Scyther Tool, and Real-or-Random (RoR) Model) methods”, showcasing its efficacy in delivering a secure and efficient authentication mechanism for IoV. Moreover, the proposed IoV-6G+ exhibits lower computational and communication costs as well as energy consumption, along with enhanced security features, when compared to existing authentication frameworks.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140779584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones 基于后量子安全 PUF 的无人机互联网跨域身份验证机制
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-25 DOI: 10.1016/j.vehcom.2024.100780
Aiswarya S. Nair , Sabu M. Thampi , Jafeel V.
{"title":"A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones","authors":"Aiswarya S. Nair ,&nbsp;Sabu M. Thampi ,&nbsp;Jafeel V.","doi":"10.1016/j.vehcom.2024.100780","DOIUrl":"10.1016/j.vehcom.2024.100780","url":null,"abstract":"<div><p>With the increasing prevalence of drones, guaranteeing their authentication and secure communication has become paramount in drone networks to mitigate unauthorized access and malicious attacks. Cross-domain authentication is crucial in the context of the Internet of Drones (IoD) for safely verifying and establishing trust between diverse drones and their respective control stations, which may belong to different regions or organizations. Effectively accessing resources or services in another domain while maintaining security and efficiency poses a significant challenge. Conventional authentication mechanisms relying on challenging problems like discrete logarithm and integer factorization might not be sufficient to guarantee the security and effectiveness of drone-based systems in the post-quantum era. To address this, we propose a distributed post-quantum cryptography and Physical Unclonable Function (PUF) based cross-domain authentication protocol for IoD. Key contributions of this work include the elimination of secret key storage on drones, mutual authentication, emphasis on hardware security, incorporation of post-quantum security measures, efficient cross-domain authentication and resilience against cyber attacks such as eavesdropping, impersonation, replay attack, untraceability, and PUF-modeling attack. The performance of the proposed protocol is assessed utilizing metrics like processing time, communication cost and storage utilization. In operations associated to the blockchain ledger, variables such as latency, throughput, CPU utilization, and memory utilization are also examined. The protocol shows a reduced computation time and zero sensitive data storage in drone memory, despite a slightly higher communication cost that is manageable with 5G-enabled drones. Comparative analysis against existing solutions in the domain highlights the superior security of the proposed protocol, positioning it as a promising solution for the evolving quantum landscape.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140764702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV swarm communication reliability based on a comprehensive SINR model 基于综合 SINR 模型的无人机蜂群通信可靠性
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-21 DOI: 10.1016/j.vehcom.2024.100781
Reuben Yaw Hui Lim , Joanne Mun-Yee Lim , Boon Leong Lan , Patrick Wan Chuan Ho , Nee Shen Ho , Thomas Wei Min Ooi
{"title":"UAV swarm communication reliability based on a comprehensive SINR model","authors":"Reuben Yaw Hui Lim ,&nbsp;Joanne Mun-Yee Lim ,&nbsp;Boon Leong Lan ,&nbsp;Patrick Wan Chuan Ho ,&nbsp;Nee Shen Ho ,&nbsp;Thomas Wei Min Ooi","doi":"10.1016/j.vehcom.2024.100781","DOIUrl":"10.1016/j.vehcom.2024.100781","url":null,"abstract":"<div><p>Communication reliability is one of the most important factors in ensuring the safe operation of unmanned aerial vehicles (UAVs). The reliability of wireless communication for a UAV swarm is typically characterized by the signal-to-interference-and-noise ratio (SINR). However, previous work on UAV swarm communication reliability did not use a comprehensive SINR model. In this paper, we derived two novel closed-form approximations – lognormal and generalized beta prime (GBP) - of UAV swarm communication reliability based on a comprehensive SINR model. The model includes shadowing, multipath fading, the dependence of fading on external factors, which are the probability of line-of-sight (LoS) and the physical environment, as well as all possible interference within the system, which may be from the UAVs and the ground control station (GCS). For typical swarm heights between 60 – 300 m and up to 32 UAVs, comparisons of the approximate and simulated reliabilities for UAV swarms with a radius up to a critical value (which increases with the number and transmit power of the UAVs) show that only the lognormal approximation is accurate for all uplink and downlink communications, up to a critical horizontal distance from the GCS (which increases with height). Benchmarking of the lognormal approximation shows that neglecting either shadowing or multipath fading leads to high approximation errors. An example of how the lognormal approximation can be used to evaluate and maintain the communication reliability of a UAV swarm during deployment is given. Furthermore, it can be used to derive other SINR-dependent performance metrics, such as ergodic capacity and symbol error rate, which are useful in UAV network design and monitoring.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140787209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DCFH: A dynamic clustering approach based on fire hawk optimizer in flying ad hoc networks DCFH:基于飞行 ad hoc 网络中火鹰优化器的动态聚类方法
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-21 DOI: 10.1016/j.vehcom.2024.100778
Mehdi Hosseinzadeh , Saqib Ali , Husham Jawad Ahmad , Faisal Alanazi , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Aso Darwesh , Amir Masoud Rahmani , Sang-Woong Lee
{"title":"DCFH: A dynamic clustering approach based on fire hawk optimizer in flying ad hoc networks","authors":"Mehdi Hosseinzadeh ,&nbsp;Saqib Ali ,&nbsp;Husham Jawad Ahmad ,&nbsp;Faisal Alanazi ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Efat Yousefpoor ,&nbsp;Aso Darwesh ,&nbsp;Amir Masoud Rahmani ,&nbsp;Sang-Woong Lee","doi":"10.1016/j.vehcom.2024.100778","DOIUrl":"10.1016/j.vehcom.2024.100778","url":null,"abstract":"<div><p>In flying ad hoc networks (FANETs), unmanned aerial vehicles (UAVs) communicate with each other without any fixed infrastructure. Because of frequent topological changes, instability of wireless communication, three-dimensional movement of UAVs, and limited resources, especially energy, FANETs deal with many challenges, especially the instability of UAV swarms. One solution to address these problems is clustering because it maintains network performance and increases scalability. In this paper, a <strong><u>d</u></strong>ynamic <strong><u>c</u></strong>lustering scheme based on <strong><u>f</u></strong>ire <strong><u>h</u></strong>awk optimizer (DCFH) is proposed for FANETs. In DCFH, each cluster head calculates the period of hello messages in its cluster based on its velocity. Then, a fire hawk optimizer (FHO)-based dynamic clustering operation is carried out to determine the role of each UAV (cluster head (CH) or cluster member (CM)) in the network. To calculate the fitness value of each fire hawk, a fitness function is suggested based on four elements, namely the balance of energy consumption, the number of isolated clusters, the distribution of CHs, and the neighbor degree. To improve cluster stability, each CH manages the movement of its CMs and adjusts it based on its movement in the network. In the last phase, DCFH defines a greedy routing process to determine the next-hop node based on a score, which consists of distance between CHs, energy, and buffer capacity. Finally, DCFH is simulated using the network simulator version 2 (NS2), and its performance is compared with three methods, including the mobility-based weighted cluster routing scheme (MWCRSF), the dynamic clustering mechanism (DCM), and the Grey wolf optimization (GWO)-based clustering protocol. The simulation results show that DCFH well manages the number of clusters in the network. It improves the cluster construction time (about 55.51%), cluster lifetime (approximately 11.13%), energy consumption (about 15.16%), network lifetime (about 2.6%), throughput (approximately 3.9%), packet delivery rate (about 0.61%), and delay (approximately 14.29%). However, its overhead is approximately 8.72% more than MWCRSF.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140640638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation and analysis of 5G waveforms to reduce BER for vehicular communications 模拟和分析 5G 波形以降低车辆通信的误码率
IF 6.7 2区 计算机科学
Vehicular Communications Pub Date : 2024-04-16 DOI: 10.1016/j.vehcom.2024.100777
Fowzia Sultana Sowdagar , Krishna Naik Karamtot
{"title":"Simulation and analysis of 5G waveforms to reduce BER for vehicular communications","authors":"Fowzia Sultana Sowdagar ,&nbsp;Krishna Naik Karamtot","doi":"10.1016/j.vehcom.2024.100777","DOIUrl":"10.1016/j.vehcom.2024.100777","url":null,"abstract":"<div><p>In today's rapidly evolving world, wireless communication has become a pervasive force, profoundly impacting various facets of our daily lives. Wireless Vehicular Networks stand out as a captivating realm of research, with a key focus on fostering information exchange among autonomous vehicles. As researchers witness surging demand in this domain, there is a growing emphasis on devising advanced techniques to augment network performance, particularly within the context of Fifth-generation (5G) applications, such as vehicular communication. The concept of Vehicle-to-vehicle (V2V) communications is poised to play a pivotal role in the future, presenting formidable challenges for the air interface by accommodating asynchronous multiple access and high mobility. Within this dynamic landscape, security and privacy issues loom large for 5G-enabled vehicle networks, many of which remain largely unexplored. The conventional waveforms, including Orthogonal Frequency Division Multiplexing (OFDM), may fall short of meeting these evolving standards. In this paper, authors delve into a comparative exploration of two waveform families, namely Filter Bank Multicarrier (FBMC) and Universal Filtered Multi-Carrier (UFMC), concerning their design and performance trade-offs. authors also examine their compatibility with various digital modulation schemes like 4-Quadrature Amplitude Modulation (QAM), 16-QAM, Offset Quadrature Phase Shift Keying (OQPSK), and Shaped offset OQPSK (SOQPSK). Through MATLAB simulations, our research vividly demonstrates the superior performance of UFMC when juxtaposed with OFDM and FBMC, especially concerning Bit Error Rate (BER) in both Rayleigh and Nakagami fading channels. In particular, authors consider a Nakagami shape parameter of 10, which yields a remarkable minimum BER for UFMC.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":null,"pages":null},"PeriodicalIF":6.7,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140640602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信