Ad Hoc Networks最新文献

筛选
英文 中文
iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning iTRPL:基于多代理强化学习的智能可信 RPL 协议
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-07-03 DOI: 10.1016/j.adhoc.2024.103586
Debasmita Dey, Nirnay Ghosh
{"title":"iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning","authors":"Debasmita Dey,&nbsp;Nirnay Ghosh","doi":"10.1016/j.adhoc.2024.103586","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103586","url":null,"abstract":"<div><p>Routing Protocol for Low Power and Lossy Networks (RPL) is the de-facto routing standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc networks modeled by tree-like destination-oriented direct acyclic graphs (DODAG). Despite its widespread usage in industry and healthcare domains, RPL is susceptible to insider attacks. Although the state-of-the-art RPL ensures that only authenticated nodes participate in DODAG, such hard security measures are still inadequate to prevent insider threats. This entails a need to integrate soft security mechanisms to support decision-making. This paper proposes <em>iTRPL</em>, an intelligent and behavior-based framework that incorporates trust to segregate honest and malicious nodes within a DODAG. It also leverages multi-agent reinforcement learning (MARL) to make autonomous decisions concerning the DODAG. The framework enables a parent node to compute the trust for its child and decide if the latter can join the DODAG. It tracks the behavior of the child node, updates the trust, computes the rewards (or penalties), and shares them with the root. The root aggregates the rewards/penalties of all nodes, computes the overall return, and decides via its <span><math><mi>ϵ</mi></math></span>-Greedy MARL module if the DODAG will be retained or modified for the future. A simulation-based performance evaluation demonstrates that <em>iTRPL</em> learns to make optimal decisions with time.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning IoV-BCFL:基于区块链和联合学习的物联网入侵检测方法
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-07-03 DOI: 10.1016/j.adhoc.2024.103590
Nannan Xie, Chuanxue Zhang, Qizhao Yuan, Jing Kong, Xiaoqiang Di
{"title":"IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning","authors":"Nannan Xie,&nbsp;Chuanxue Zhang,&nbsp;Qizhao Yuan,&nbsp;Jing Kong,&nbsp;Xiaoqiang Di","doi":"10.1016/j.adhoc.2024.103590","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103590","url":null,"abstract":"<div><p>In recent years, Internet of Vehicles (IoV) is in a booming stage. But at the same time, the methods of attack against IoV such as Denial of Service (DoS) and deception are great threats to personal and social security. Traditional IoV intrusion detection usually adopts a centralized detection model, which has the disadvantages of untimely detection results and is difficult to protect vehicle privacy in practical applications. Meanwhile, centralized computation requires a large amount of vehicle data transmission, which overloads the wireless bandwidth. Combined the distributed computing resources of Federated Learning (FL) and the decentralized features of blockchain, an IoV intrusion detection framework named IoV-BCFL is proposed, which is capable of distributed intrusion detection and reliable logging with privacy protection. FL is used for distributing training on vehicle nodes and aggregating the training models at Road Side Unit (RSU) to reduce data transmission, protect the privacy of training data, and ensure the security of the model. A blockchain-based intrusion logging mechanism is presented, which enhances vehicle privacy protection through Rivest-Shamir-Adleman (RSA) algorithm encryption and uses Inter Planetary File System (IPFS) to store the intrusion logs. The intrusion behavior can be faithfully recorded by logging smart contract after detecting the intrusion, which can be used to track intruders, analyze security vulnerabilities, and collect evidence. Experiments based on different open source datasets show that FL achieves a high detection rates on intrusion data and effectively reduce the communication overhead, the smart contract performs well on evaluation indicators such as sending rate, latency, and throughput.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning assisted framework to periodically identify user communities in urban space 联合学习辅助框架,定期识别城市空间中的用户社区
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-07-02 DOI: 10.1016/j.adhoc.2024.103589
Cláudio Diego T. de Souza , José Ferreira de Rezende , Carlos Alberto V. Campos
{"title":"Federated Learning assisted framework to periodically identify user communities in urban space","authors":"Cláudio Diego T. de Souza ,&nbsp;José Ferreira de Rezende ,&nbsp;Carlos Alberto V. Campos","doi":"10.1016/j.adhoc.2024.103589","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103589","url":null,"abstract":"<div><p>Identifying individuals with similar behaviors and mobility patterns has become essential to improving the functioning of urban services. However, since these patterns can vary over time, such identification needs to be done periodically. Furthermore, once mobility data expresses the routine of individuals, privacy must be guaranteed. In this work, we propose a framework for periodically detecting and grouping individuals with behavioral similarities into communities. To accomplish this, we built an autoencoder model to extract spatio-temporal mobility features from raw user data at periodic intervals. We used Federated Learning (FL) as a training approach to preserve privacy and alleviate time-consuming training and communication costs. To determine the number of communities without risking an arbitrary number, we compared the choices of two probabilistic methods, the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC). Since the communities are updated periodically, we also analyzed the impact of aged samples on the proposed framework. Finally, we compared the performance of our FL-based solution to a centralized training approach. We analyzed similarity and dissimilarity metrics on mobility samples and the contact time of individuals in three different scenarios. Our results indicate that AIC outperforms BIC when choosing the number of communities, although both satisfy the evaluation metrics. We also found that using older samples benefits more complex spatio-temporal scenarios. Finally, no significant losses were detected when compared to a centralized training approach, reinforcing the advantages of using the FL-based method.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ILLUMINE: Illumination UAVs deployment optimization based on consumer drone ILLUMINE:基于消费级无人机的照明无人机部署优化
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-06-28 DOI: 10.1016/j.adhoc.2024.103587
Bo Ma, Yexin Pan, Yong Xu, Zitian Zhang, Chao Chen, Chuanhuang Li
{"title":"ILLUMINE: Illumination UAVs deployment optimization based on consumer drone","authors":"Bo Ma,&nbsp;Yexin Pan,&nbsp;Yong Xu,&nbsp;Zitian Zhang,&nbsp;Chao Chen,&nbsp;Chuanhuang Li","doi":"10.1016/j.adhoc.2024.103587","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103587","url":null,"abstract":"<div><p>Traditional ground-based illumination equipment is limited in mobility and light source height, making it difficult to adapt to diverse living scenarios such as camping that require quick and flexible illumination solutions. With the rapid development of Unmanned Aerial Vehicle (UAV) technology, particularly in illumination services, UAVs have demonstrated unique advantages. Addressing the inadequacies of conventional illumination, this study proposes a prototype of an autonomously deployed illumination system based on the RoboMaster Tello Talent (Tello) UAV, designed to provide quick and flexible on-site illumination solutions. The system’s design encompasses three complementary modules to enhance its overall functionality and efficiency. Firstly, the illumination module equips the Tello UAV with a specialized illumination extension, ensuring flight stability and effective illumination. Secondly, the addressing module employs iterative algorithms to identify optimal UAV deployment locations and precisely plan flight paths. Lastly, the flight control module, guided by the results from the addressing module, scripts flight commands, integrates with the Tello UAV’s Application Programming Interface (API), and executes flight plans optimized for path efficiency, ensuring the UAV quickly and accurately reaches designated locations, coordinating with the illumination module to deliver effective illumination. Experimental results demonstrate that the proposed illumination system can swiftly respond to various user demands, autonomously deploy UAVs to optimal illumination positions, and provide high-quality service.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An innovative multi-agent approach for robust cyber–physical systems using vertical federated learning 利用垂直联合学习的创新多代理方法,实现稳健的网络物理系统
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-06-27 DOI: 10.1016/j.adhoc.2024.103578
Shivani Gaba , Ishan Budhiraja , Vimal Kumar , Sahil Garg , Mohammad Mehedi Hassan
{"title":"An innovative multi-agent approach for robust cyber–physical systems using vertical federated learning","authors":"Shivani Gaba ,&nbsp;Ishan Budhiraja ,&nbsp;Vimal Kumar ,&nbsp;Sahil Garg ,&nbsp;Mohammad Mehedi Hassan","doi":"10.1016/j.adhoc.2024.103578","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103578","url":null,"abstract":"<div><p>Federated learning presents a compelling approach to training artificial intelligence systems in decentralized settings, prioritizing data safety over traditional centralized training methods. Understanding correlations among higher-level threats exhibiting abnormal behavior in the data stream becomes paramount to developing cyber–physical systems resilient to diverse attacks within a continuous data exchange framework. This work introduces a novel vertical federated multi-agent learning framework to address the challenges of modeling attacker and defender agents in stationary and non-stationary vertical federated learning environments. Our approach uniquely applies synchronous Deep Q-Network (DQN) based agents in stationary environments, facilitating convergence towards optimal strategies. Conversely, in non-stationary contexts, we employ synchronous Advantage Actor–Critic (A2C) based agents, adapting to the dynamic nature of multi-agent vertical federated reinforcement learning (VFRL) environments. This methodology enables us to simulate and analyze the adversarial interplay between attacker and defender agents, ensuring robust policy development. Our exhaustive analysis demonstrates the effectiveness of our approach, showcasing its capability to learn optimal policies in both static and dynamic setups, thus significantly advancing the field of cyber-security in federated learning contexts. To evaluate the effectiveness of our approach, we have done a comparative analysis with its baseline schemes. The findings of our study show significant enhancements compared to the standard methods, confirming the efficacy of our methodology. This progress dramatically enhances the area of cyber-security in the context of federated learning by facilitating the formulation of substantial policies. The proposed scheme attains 15.93%, 32.91%, 31.02%, and 47.26% higher results as compared to the A3C, DDQN, DQN, and Reinforce, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategic deployment of RSUs in urban settings: Optimizing IEEE 802.11p infrastructure 在城市环境中战略性部署 RSU:优化 IEEE 802.11p 基础设施
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-06-26 DOI: 10.1016/j.adhoc.2024.103585
Juan Pablo Astudillo León , Anthony Busson , Luis J. de la Cruz Llopis , Thomas Begin , Azzedine Boukerche
{"title":"Strategic deployment of RSUs in urban settings: Optimizing IEEE 802.11p infrastructure","authors":"Juan Pablo Astudillo León ,&nbsp;Anthony Busson ,&nbsp;Luis J. de la Cruz Llopis ,&nbsp;Thomas Begin ,&nbsp;Azzedine Boukerche","doi":"10.1016/j.adhoc.2024.103585","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103585","url":null,"abstract":"<div><p>The efficient deployment of Roadside Units (RSUs) in an infrastructure based on IEEE 802.11p is essential for delivering Internet-based services to vehicles. In this paper, we introduce novel strategies that, in contrast to prior works, exclusively rely on the average vehicular density within specific urban areas, and these strategies depend on a performance model of IEEE 802.11p for guidance and decision-making regarding RSU placement. This minimal upfront information contributes to the practicality and ease of implementation of our strategies. We apply our strategies to three real-world urban scenarios, utilizing the ns-3 and <span>sumo</span> simulators for validation. This study contributes to three fundamental aspects. First, we establish that any efficient deployment of RSUs is closely linked to the unique characteristics of the city under consideration such as the street layout and spatial density of vehicles. In other words, the characteristics of an efficient RSU deployment are unique to each city. Second, we show that the optimal strategy is not to place the RSUs at the locations with the highest traffic density. Instead, with the help of an analytical performance model of IEEE 802.11, we propose a more efficient strategy wherein the location of each RSU is determined to maximize the number of vehicles receiving the target QoS. This can lead to a significant drop in the number of RSUs required to equip a city. Finally, we demonstrate that, by preventing the use of the lowest transmission rate of IEEE 802.11p at each RSU, a collective benefit can be achieved, even though each RSU experiences a shorter radio range.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141486944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous data sharing scheme for resource-constrained internet of things environments 针对资源有限的物联网环境的匿名数据共享方案
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-06-25 DOI: 10.1016/j.adhoc.2024.103588
Zetian Zhang , Jingyu Wang , Lixin Liu , Yongfeng Li , Yun Hao , Hanqing Yang
{"title":"Anonymous data sharing scheme for resource-constrained internet of things environments","authors":"Zetian Zhang ,&nbsp;Jingyu Wang ,&nbsp;Lixin Liu ,&nbsp;Yongfeng Li ,&nbsp;Yun Hao ,&nbsp;Hanqing Yang","doi":"10.1016/j.adhoc.2024.103588","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103588","url":null,"abstract":"<div><p>With the rapid development of Internet of Things (IoT) technology in industrial, agricultural, medical and other fields, IoT terminal devices face security and privacy challenges when sharing data. Among them, ensuring data confidentiality, achieving dual-side privacy protection, and performing reliable data integrity verification are basic requirements. Especially in resource-constrained environments, limitations in the storage, computing, and communication capabilities of devices increase the difficulty of implementing these security safeguards. To address this problem, this paper proposes a resource-constrained anonymous data-sharing scheme (ADS-RC) for the IoT. In ADS-RC, we use elliptic curve operations to replace computation-intensive bilinear pairing operations, thereby reducing the computational and communication burden on end devices. We combine an anonymous verifiable algorithm and an attribute encryption algorithm to ensure double anonymity and data confidentiality during the data-sharing process. To deal with potential dishonest behavior, this solution supports the revocation of malicious user permissions. In addition, we designed a batch data integrity verification algorithm and stored verification evidence on the blockchain to ensure the security and traceability of data during transmission and storage. Through experimental verification, the ADS-RC scheme achieves reasonable efficiency in correctness, security and efficiency, providing a new solution for data sharing in resource-constrained IoT environments.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141539962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing longevity: Sustainable channel modeling for wireless-powered implantable BANs 延长使用寿命:无线供电植入式 BAN 的可持续信道建模
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-06-25 DOI: 10.1016/j.adhoc.2024.103584
Sameeksha Chaudhary , Anirudh Agarwal , Deepak Mishra , Santosh Shah
{"title":"Enhancing longevity: Sustainable channel modeling for wireless-powered implantable BANs","authors":"Sameeksha Chaudhary ,&nbsp;Anirudh Agarwal ,&nbsp;Deepak Mishra ,&nbsp;Santosh Shah","doi":"10.1016/j.adhoc.2024.103584","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103584","url":null,"abstract":"<div><p>Wireless body area network (WBAN) has revolutionized the healthcare sector by enabling remote monitoring and control of wearable and implantable devices, providing freedom of mobility to patients. However, wireless channel modeling in BAN is a crucial aspect for designing an efficient off-body, on-body and in-body communication. Due to the unique characteristics of the human body, it aims to characterize the signal propagation through skin, tissues, internal organs and biological fluids of a patient’s body. Moreover, it is important to enhance the battery life of the low-powered devices for a sustainable BAN. In this work, we provide a hybrid communication channel model for wireless power transfer in a BAN including both off-body and in-body communication channels. An indoor room scenario is considered in which a movable patient having an implant inside its body is present along with an RF power source (for example, a Wi-Fi access point) situated in a ceiling corner. Implant is assumed to inhibit energy harvesting capability. For practicability, we have considered the effect of path loss, partition walls, floor attenuation factor along with other important body parameters. Specifically, we aim to statistically characterize this hybrid communication system, for which unique closed-form expressions of the probability distribution functions of the received power have been derived, thereby first calculating the instantaneous power at different layers of human body and then obtaining the closed-form expression for average received power. All the derived mathematical expressions have been verified via numerical simulations. Further, for elongating the lifespan of implants, we investigated the average power harvested by an implant and its power outage probability for analyzing the sustainability of implants. The results are numerically validated, considering different types of indoor room scenarios, in addition to providing key design insights.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141486943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Status update scheduling in remote sensing under variable activation and propagation delays 可变激活和传播延迟下的遥感状态更新调度
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-06-24 DOI: 10.1016/j.adhoc.2024.103583
Leonardo Badia , Alberto Zancanaro , Giulia Cisotto , Andrea Munari
{"title":"Status update scheduling in remote sensing under variable activation and propagation delays","authors":"Leonardo Badia ,&nbsp;Alberto Zancanaro ,&nbsp;Giulia Cisotto ,&nbsp;Andrea Munari","doi":"10.1016/j.adhoc.2024.103583","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103583","url":null,"abstract":"<div><p>Sensor data exchanges in IoT applications can experience a variable delay due to changes in the communication environment and sharing of processing capabilities. This variability can impact the performance and effectiveness of the systems being controlled, and is especially reflected on Age of Information (AoI), a performance metric that quantifies the freshness of updates in remote sensing. In this work, we discuss the quantitative impact of activation and propagation delays, both taken as random variables, on AoI. In our analysis we consider an offline scheduling over a finite horizon, we derive a closed form solution to evaluate the average AoI, and we validate our results through numerical simulation. We also provide further analysis on which type of delay has more influence on the system, as well as the probability that the system fails to deliver all the scheduled updates due to excessive delays of either kind.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-aware resource allocation for vehicle-to-vehicle communications in cellular-V2X networks 蜂窝-V2X 网络中车对车通信的情境感知资源分配
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-06-19 DOI: 10.1016/j.adhoc.2024.103582
Fuxin Zhang, Guangping Wang
{"title":"Context-aware resource allocation for vehicle-to-vehicle communications in cellular-V2X networks","authors":"Fuxin Zhang,&nbsp;Guangping Wang","doi":"10.1016/j.adhoc.2024.103582","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103582","url":null,"abstract":"<div><p>Cellular Vehicle-to-Everything (C-V2X) networks provide critical support for intelligently connected vehicles (ICVs) and intelligent transport systems (ITS). C-V2X utilizes vehicle-to-vehicle (V2V) communication technology to exchange safety–critical information among neighbors. V2V communication has stringent high-reliability and low-latency requirements. The existing solutions on resource allocation for V2V communications mainly rely on channel states to optimize resource utilization but fail to consider vehicle safety requirements, which cannot satisfy safety application performance. In this paper, we focus on application-driven channel resource allocation strategy for V2V communications. First, we propose an inter-packet reception model to represent the delay between two consecutive and successful reception packets at a receiver. We then design an application-specific utility function where the utility depends on the packet reception performance and vehicle safety context. Finally, we formulate the channel resource allocation problem as a non-cooperative game model. The game model can guide each node to cooperate and achieve the trade-off between fairness and efficiency in channel resource allocation. The simulation results show that our work can significantly improve the reliability of V2V communications and guarantee the vehicle safety application performance.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141487027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信