The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’healt...The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’health conditions.However,the security of sensitive data exchanged within IoHT remains a major concern,as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities.Potential threats include unauthorized access,device compromise,data breaches,and data alteration,all of which may compromise the confidentiality and integrity of patient information.In this paper,we provide an in-depth security analysis of LAP-IoHT,an authentication scheme designed to ensure secure communication in Internet of Healthcare Things environments.This analysis reveals several vulnerabilities in the LAP-IoHT protocol,namely its inability to resist various attacks,including user impersonation and privileged insider threats.To address these issues,we introduce LSAP-IoHT,a secure and lightweight authentication protocol for the Internet of Healthcare Things(IoHT).This protocol leverages Elliptic Curve Cryptography(ECC),Physical Unclonable Functions(PUFs),and Three-Factor Authentication(3FA).Its security is validated through both informal analysis and formal verification using the Scyther tool and the Real-Or-Random(ROR)model.The results demonstrate strong resistance against man-in-the-middle(MITM)attacks,replay attacks,identity spoofing,stolen smart device attacks,and insider threats,while maintaining low computational and communication costs.展开更多
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These in...The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the critical issues, which is the prediction of fraudulent devices, i.e., adversaries, preferably as early as possible in the IoT. In this paper, a hybrid communication mechanism is presented where the Hidden Markov Model (HMM) predicts the legitimacy of the requesting device (both source and destination), and the Advanced Encryption Standard (AES) safeguards the reliability of the transmitted data over a shared communication medium, preferably through a secret shared key, i.e., , and timestamp information. A device becomes trusted if it has passed both evaluation levels, i.e., HMM and message decryption, within a stipulated time interval. The proposed hybrid, along with existing state-of-the-art approaches, has been simulated in the realistic environment of the IoT to verify the security measures. These evaluations were carried out in the presence of intruders capable of launching various attacks simultaneously, such as man-in-the-middle, device impersonations, and masquerading attacks. Moreover, the proposed approach has been proven to be more effective than existing state-of-the-art approaches due to its exceptional performance in communication, processing, and storage overheads, i.e., 13%, 19%, and 16%, respectively. Finally, the proposed hybrid approach is pruned against well-known security attacks in the IoT.展开更多
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu...Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.展开更多
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto...Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.展开更多
Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic ...Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic Graph(DAG)structure often suffer from performance limitations.The DAG lattice structure is a novel blockchain model in which each node maintains its own account chain,and only the node itself is allowed to update it.This feature makes the DAG lattice structure particularly suitable for addressing the challenges in dynamically connected IoV environment.In this paper,we propose a blockchain architecture based on the DAG lattice structure,specifically designed for dynamically connected IoV.In the proposed system,nodes must obtain authorization from a trusted authority before joining,forming a permissioned blockchain.Each node is assigned an individual account chain,allowing vehicles with limited storage capacity to participate in the blockchain by storing transactions only from nearby vehicles’account chains.Every transmitted message is treated as a transaction and added to the blockchain,enablingmore efficient data transmission in a dynamic network environment.Areputation-based incentivemechanism is introduced to encourage nodes to behave normally.Experimental results demonstrate that the proposed architecture achieves better performance compared with traditional single-chain and DAG-based approaches in terms of average transmission delay and storage cost.展开更多
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei...Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.展开更多
The Internet of Vehicles,or IoV,is expected to lessen pollution,ease traffic,and increase road safety.IoV entities’interconnectedness,however,raises the possibility of cyberattacks,which can have detrimental effects....The Internet of Vehicles,or IoV,is expected to lessen pollution,ease traffic,and increase road safety.IoV entities’interconnectedness,however,raises the possibility of cyberattacks,which can have detrimental effects.IoV systems typically send massive volumes of raw data to central servers,which may raise privacy issues.Additionally,model training on IoV devices with limited resources normally leads to slower training times and reduced service quality.We discuss a privacy-preserving Federated Split Learning with Tiny Machine Learning(TinyML)approach,which operates on IoV edge devices without sharing sensitive raw data.Specifically,we focus on integrating split learning(SL)with federated learning(FL)and TinyML models.FL is a decentralisedmachine learning(ML)technique that enables numerous edge devices to train a standard model while retaining data locally collectively.The article intends to thoroughly discuss the architecture and challenges associated with the increasing prevalence of SL in the IoV domain,coupled with FL and TinyML.The approach starts with the IoV learning framework,which includes edge computing,FL,SL,and TinyML,and then proceeds to discuss how these technologies might be integrated.We elucidate the comprehensive operational principles of Federated and split learning by examining and addressingmany challenges.We subsequently examine the integration of SL with FL and various applications of TinyML.Finally,exploring the potential integration of FL and SL with TinyML in the IoV domain is referred to as FSL-TM.It is a superior method for preserving privacy as it conducts model training on individual devices or edge nodes,thereby obviating the necessity for centralised data aggregation,which presents considerable privacy threats.The insights provided aim to help both researchers and practitioners understand the complicated terrain of FL and SL,hence facilitating advancement in this swiftly progressing domain.展开更多
Both large-scale prospective randomized controlled trials(RCTs)and smaller investigator-initiated trials are essential for evaluating the efficacy and safety of medical interventions.Robust protocols and statistical d...Both large-scale prospective randomized controlled trials(RCTs)and smaller investigator-initiated trials are essential for evaluating the efficacy and safety of medical interventions.Robust protocols and statistical designs ensure the reliability of trial outcomes and improve the credibility of research findings.By reviewing the statistical approaches used in the TORCHLIGHT,NCC2167,and NeoTENNIS trials,this article illustrates the principles underlying large-sample confirmatory RCTs,small-sample exploratory adaptive designs,and single-arm two-stage designs.This discussion is aimed at helping researchers apply these design methods more effectively,to increase the likelihood of success in clinical studies.展开更多
Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart ...Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart devices.Furthermore,the IoT plays a key role in multiple domains,including industrial automation,smart homes,and intelligent transportation systems.However,an increasing number of connected devices presents significant challenges related to efficient resource allocation and system responsiveness.To address these issue,this research proposes a Modified Walrus Optimization Algorithm(MWaOA)for effective resource management in smart IoT systems.In the proposed MWaOA,a crowding process is incorporated to maintain diversity and avoid premature convergence thereby enhancing the global search capability.During resource allocation,the MWaOA prevents early convergence,which aids in achieving a better balance between the exploration and exploitation phases during optimization.Empirical evaluations show that the MWaOA reduces energy consumption by approximately 4% to 34%and minimizes the response time by 6% to 33% across different service arrival rates.Compared to traditional optimization algorithms,MWaOA reduces energy consumption by 5% to 30%and minimizes the response time by 4% to 28% across different simulation epochs.The proposed MWaOA provides adaptive and robust resource allocation,thereby minimizing transmission cost while considering network constraints and real-time performance parameters.展开更多
Deploying Large LanguageModel(LLM)-based agents in the Industrial Internet ofThings(IIoT)presents significant challenges,including high latency from cloud-based APIs,data privacy concerns,and the infeasibility of depl...Deploying Large LanguageModel(LLM)-based agents in the Industrial Internet ofThings(IIoT)presents significant challenges,including high latency from cloud-based APIs,data privacy concerns,and the infeasibility of deploying monolithic models on resource-constrained edge devices.While smaller models(SLMs)are suitable for edge deployment,they often lack the reasoning power for complex,multi-step tasks.To address these issues,this paper introduces LEAF,a Lightweight Edge Agent Framework designed for efficiently executing complex tasks at the edge.LEAF employs a novel architecture where multiple expert SLMs—specialized for planning,execution,and interaction—work in concert,decomposing complex problems into manageable sub-tasks.To mitigate the resource overhead of this multi-model approach,LEAF implements an efficient parameter-sharing scheme based on Scalable Low-Rank Adaptation(S-LoRA).We introduce a two-stage training strategy combining Supervised Fine-Tuning(SFT)and Group Relative Policy Optimization(GRPO)to significantly enhance each expert’s capabilities.Furthermore,a Finite StateMachine(FSM)-based decision engine orchestrates the workflow,uniquely balancing deterministic control with intelligent flexibility,making it ideal for industrial environments that demand both reliability and adaptability.Experiments across diverse IIoT scenarios demonstrate that LEAF significantly outperforms baseline methods in both task success rate and user satisfaction.Notably,our fine-tuned 4-billion-parameter model achieves a task success rate over 90%in complex IIoT scenarios,demonstrating LEAF’s ability to deliver powerful and efficient autonomy at the industrial edge.展开更多
TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,th...TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection.展开更多
Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Lever...Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Leveraging IoVtechnologies,operational data fromcore vehicle components can be collected and analyzed to construct fault diagnosis models,thereby enhancing vehicle safety.However,automakers often struggle to acquire sufficient fault data to support effective model training.To address this challenge,a robust and efficient federated learning method(REFL)is constructed for machinery fault diagnosis in collaborative IoV,which can organize multiple companies to collaboratively develop a comprehensive fault diagnosis model while keeping their data locally.In the REFL,the gradient-based adversary algorithm is first introduced to the fault diagnosis field to enhance the deep learning model robustness.Moreover,the adaptive gradient processing process is designed to improve the model training speed and ensure the model accuracy under unbalance data scenarios.The proposed REFL is evaluated on non-independent and identically distributed(non-IID)real-world machinery fault dataset.Experiment results demonstrate that the REFL can achieve better performance than traditional learning methods and are promising for real industrial fault diagnosis.展开更多
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi...With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.展开更多
The convergence of Software Defined Networking(SDN)in Internet of Vehicles(IoV)enables a flexible,programmable,and globally visible network control architecture across Road Side Units(RSUs),cloud servers,and automobil...The convergence of Software Defined Networking(SDN)in Internet of Vehicles(IoV)enables a flexible,programmable,and globally visible network control architecture across Road Side Units(RSUs),cloud servers,and automobiles.While this integration enhances scalability and safety,it also raises sophisticated cyberthreats,particularly Distributed Denial of Service(DDoS)attacks.Traditional rule-based anomaly detection methods often struggle to detectmodern low-and-slowDDoS patterns,thereby leading to higher false positives.To this end,this study proposes an explainable hybrid framework to detect DDoS attacks in SDN-enabled IoV(SDN-IoV).The hybrid framework utilizes a Residual Network(ResNet)to capture spatial correlations and a Bi-Long Short-Term Memory(BiLSTM)to capture both forward and backward temporal dependencies in high-dimensional input patterns.To ensure transparency and trustworthiness,themodel integrates the Explainable AI(XAI)technique,i.e.,SHapley Additive exPlanations(SHAP).SHAP highlights the contribution of each feature during the decision-making process,facilitating security analysts to understand the rationale behind the attack classification decision.The SDN-IoV environment is created in Mininet-WiFi and SUMO,and the hybrid model is trained on the CICDDoS2019 security dataset.The simulation results reveal the efficacy of the proposed model in terms of standard performance metrics compared to similar baseline methods.展开更多
Security and access control for data storage in 5G industrial Internet collaborative systems are facing significant challenges.The characteristics of 5 G networks,such as low latency and high speed,facilitate data tra...Security and access control for data storage in 5G industrial Internet collaborative systems are facing significant challenges.The characteristics of 5 G networks,such as low latency and high speed,facilitate data transmission in the industrial Internet but also increase vulnerability to attacks like theft and tampering.Moreover,in 5G industrial Internet collaborative system environments,data flows across multiple entities and links,which necessitates a flexible access control model to meet specific data access requirements.Traditional role-based and attribute-based access control mechanisms are difficult to apply in such dynamic application scenarios.To address these challenges,we propose a novel data storage solution for 5G industrial Internet collaborative systems.Similar to existing approaches,it provides integrity and confidentiality protection for transmitted data.In terms of security,only authenticated data owners and users can obtain file decryption keys,preventing malicious attackers from data forgery.Regarding access control,decryption is permitted only to authorized data users,safeguarding against unauthorized file access.Furthermore,by introducing an attribute-based encryption mechanism,only data users with specific attributes can decrypt files.In terms of efficiency,our approach utilizes bilinear and modular exponentiation operations solely during the authentication process.For handling substantial data loads,lightweight cryptographic algorithms are employed.Consequently,our solution achieves higher efficiency compared with other known methods.Experimental results demonstrate the feasibility of our approach in real-world applications.展开更多
Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrain...Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit(RSU),thereby achieving lower delay and energy consumption.However,due to the limited storage capacity and energy budget of RSUs,it is challenging to meet the demands of the highly dynamic Internet of Vehicles(IoV)environment.Therefore,determining reasonable service caching and computation offloading strategies is crucial.To address this,this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading.By modeling the dynamic optimization problem using Markov Decision Processes(MDP),the scheme jointly optimizes task delay,energy consumption,load balancing,and privacy entropy to achieve better quality of service.Additionally,a dynamic adaptive multi-objective deep reinforcement learning algorithm is proposed.Each Double Deep Q-Network(DDQN)agent obtains rewards for different objectives based on distinct reward functions and dynamically updates the objective weights by learning the value changes between objectives using Radial Basis Function Networks(RBFN),thereby efficiently approximating the Pareto-optimal decisions for multiple objectives.Extensive experiments demonstrate that the proposed algorithm can better coordinate the three-tier computing resources of cloud,edge,and vehicles.Compared to existing algorithms,the proposed method reduces task delay and energy consumption by 10.64%and 5.1%,respectively.展开更多
1 Introduction The growing connectivity with mobile internet has significantly enhanced our day-to-day life support through various services and applications with on-demand availability at any time or anywhere.As emer...1 Introduction The growing connectivity with mobile internet has significantly enhanced our day-to-day life support through various services and applications with on-demand availability at any time or anywhere.As emerging technologies with continuous revolutions in the digital transformations,various add-on technologies such as quantum computing,AI,and next-generation networks such as 6G are becoming an integral support to mobile internet systems.The emerging technologies in the next-generation mobile internet bring a lot of new security and privacy challenges.展开更多
Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,ex...Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,existing unsupervised learning methods suffer from insufficient temporal and spatial constraints on shallow features,resulting in fragmented feature representations that compromise model stability and accuracy.To improve the extraction of valuable features,this paper investigates the influence of clustering constraints on shallow feature convergence paths at the model level and further proposes an end-to-end intrusion detection system based on efficient deep embedded subspace clustering(EDESC-IDS).Following the standard learning approach,continuous messages are encoded into two-dimensional data frames via a frame builder,which are then input into an extended convolutional autoencoder for extracting shallow features from high-dimensional data.On this basis,the dual constraints of these output features and the embedding clustering module facilitate end-to-end training of the EDESC-IDS in various attack scenarios.Extensive experimental results show that such a system exhibits significant detection performance on four types of attack datasets,including DoS,Gear,Fuzzy,and RPM,with precision,recall,and F1 scores consistently above 97.79%,while maintaining a false negative rate(FNR)and an error rate(ER)below 2.22%.展开更多
The Internet of Vehicles(IoV)is an emerging technology that aims to connect vehicles,infrastructure,and other devices to enable intelligent transportation systems.One of the key challenges in IoV is to ensure safe and...The Internet of Vehicles(IoV)is an emerging technology that aims to connect vehicles,infrastructure,and other devices to enable intelligent transportation systems.One of the key challenges in IoV is to ensure safe and efficient communication among vehicles of different types and capabilities.This paper proposes a data-driven vehicular heterogeneity-based intelligent collision avoidance system for IoV.The system leverages Vehicle-to-Vehicle(V2V)and Vehicle-to-Infrastructure(V2I)communication to collect real-time data about the environment and the vehicles.The data is collected to acknowledge the heterogeneity of vehicles and human behavior.The data is analyzed using machine learning algorithms to identify potential collision risks and recommend appropriate actions to avoid collisions.The system takes into account the heterogeneity of vehicles,such as their size,speed,and maneuverability,to optimize collision avoidance strategies.The proposed system is experimented with real-time datasets and compared with existing collision avoidance systems.The results are shown using the evaluation metrics that show the proposed system can significantly reduce the number of collisions and improve the overall safety and efficiency of IoV with an accuracy of 96.5%using the SVM algorithm.The trial outcomes demonstrated that the new system,incorporating vehicular,weather,and human behavior factors,outperformed previous systems that only considered vehicular and weather aspects.This innovative approach is poised to lead transportation efforts,reducing accident rates and improving the quality of transportation systems in smart cities.By offering predictive capabilities,the proposed model not only helps control accident rates but also prevents them in advance,ensuring road safety.展开更多
The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EIS...The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EISA)framework for 6G unmanned aerial vehicle(UAV)-assisted Internet of vehicles(IoV)networks that integrates task-driven semantic communication,deep reinforcement learning(DRL)-based edge intelligence,and blockchain-based semantic validation across 6G terahertz(THz)links.UAVs in the proposed architecture serve as adaptive edge nodes that receive semantically vital information about the vehicle at any given stage,optimize aggregation and transmission parameters dynamically,and guarantee data integrity through a structured,lightweight consortium blockchain that signs semantically detailed representations rather than raw packets.Simulation results from a hybrid NS-3,MATLAB,and Python environment indicate that the proposed framework can achieve up to 45%reduction in end-to-end latency,an approximately 70%increase in throughput,and semantic efficiency with blockchain verification delays of less than 20 ms(more than 98%).These findings support the effectiveness of the proposed co-design for achieving context-aware,energy-efficient,and reliable communication under heavy-traffic conditions.The proposed framework provides a flexible and scalable foundation for next-generation 6G-enabled automotive networks,with subsequent growth toward federated learning-based collaborative intelligence,digital-twinassisted traffic modeling,and quantum-safe blockchain mechanisms to enhance scalability,intelligence,and long-term security.展开更多
文摘The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’health conditions.However,the security of sensitive data exchanged within IoHT remains a major concern,as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities.Potential threats include unauthorized access,device compromise,data breaches,and data alteration,all of which may compromise the confidentiality and integrity of patient information.In this paper,we provide an in-depth security analysis of LAP-IoHT,an authentication scheme designed to ensure secure communication in Internet of Healthcare Things environments.This analysis reveals several vulnerabilities in the LAP-IoHT protocol,namely its inability to resist various attacks,including user impersonation and privileged insider threats.To address these issues,we introduce LSAP-IoHT,a secure and lightweight authentication protocol for the Internet of Healthcare Things(IoHT).This protocol leverages Elliptic Curve Cryptography(ECC),Physical Unclonable Functions(PUFs),and Three-Factor Authentication(3FA).Its security is validated through both informal analysis and formal verification using the Scyther tool and the Real-Or-Random(ROR)model.The results demonstrate strong resistance against man-in-the-middle(MITM)attacks,replay attacks,identity spoofing,stolen smart device attacks,and insider threats,while maintaining low computational and communication costs.
基金supported by the Deanship of Graduate Studies and Scientific Research at Qassim University via Grant No.(QU-APC-2025).
文摘The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the critical issues, which is the prediction of fraudulent devices, i.e., adversaries, preferably as early as possible in the IoT. In this paper, a hybrid communication mechanism is presented where the Hidden Markov Model (HMM) predicts the legitimacy of the requesting device (both source and destination), and the Advanced Encryption Standard (AES) safeguards the reliability of the transmitted data over a shared communication medium, preferably through a secret shared key, i.e., , and timestamp information. A device becomes trusted if it has passed both evaluation levels, i.e., HMM and message decryption, within a stipulated time interval. The proposed hybrid, along with existing state-of-the-art approaches, has been simulated in the realistic environment of the IoT to verify the security measures. These evaluations were carried out in the presence of intruders capable of launching various attacks simultaneously, such as man-in-the-middle, device impersonations, and masquerading attacks. Moreover, the proposed approach has been proven to be more effective than existing state-of-the-art approaches due to its exceptional performance in communication, processing, and storage overheads, i.e., 13%, 19%, and 16%, respectively. Finally, the proposed hybrid approach is pruned against well-known security attacks in the IoT.
文摘Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.
文摘Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.
基金funded in part by the Supported by Natural Science Foundation of Inner Mongolia Autonomous Region of China under Grants 2024QN06022 and 2023QN06008in part by the First-Class Discipline Research Special Project under Grant YLXKZX-NGD-015in part by the Inner Mongolia University of Technology Scientific Research Start-Up Project under Grant BS2024067.
文摘Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic Graph(DAG)structure often suffer from performance limitations.The DAG lattice structure is a novel blockchain model in which each node maintains its own account chain,and only the node itself is allowed to update it.This feature makes the DAG lattice structure particularly suitable for addressing the challenges in dynamically connected IoV environment.In this paper,we propose a blockchain architecture based on the DAG lattice structure,specifically designed for dynamically connected IoV.In the proposed system,nodes must obtain authorization from a trusted authority before joining,forming a permissioned blockchain.Each node is assigned an individual account chain,allowing vehicles with limited storage capacity to participate in the blockchain by storing transactions only from nearby vehicles’account chains.Every transmitted message is treated as a transaction and added to the blockchain,enablingmore efficient data transmission in a dynamic network environment.Areputation-based incentivemechanism is introduced to encourage nodes to behave normally.Experimental results demonstrate that the proposed architecture achieves better performance compared with traditional single-chain and DAG-based approaches in terms of average transmission delay and storage cost.
基金supported by the National Natural Science Foundation of China (Grant Nos.12475012,62461160263 for P.W.,and 62276171 for H.L.)Quantum Science and Technology-National Science and Technology Major Project of China (Project No.2023ZD0300600 for P.W.)+3 种基金Guangdong Provincial Quantum Science Strategic Initiative (Grant Nos.GDZX240-3009 and GDZX2303005 for P.W.)Guangdong Basic and Applied Basic Research Foundation (Grant No.2024-A1515011938 for H.L.)Shenzhen Fundamental ResearchGeneral Project (Grant No.JCYJ20240813141503005 for H.L.)the Talents Introduction Foundation of Beijing Normal University (Grant No.310432106 for P.W.)。
文摘Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.
文摘The Internet of Vehicles,or IoV,is expected to lessen pollution,ease traffic,and increase road safety.IoV entities’interconnectedness,however,raises the possibility of cyberattacks,which can have detrimental effects.IoV systems typically send massive volumes of raw data to central servers,which may raise privacy issues.Additionally,model training on IoV devices with limited resources normally leads to slower training times and reduced service quality.We discuss a privacy-preserving Federated Split Learning with Tiny Machine Learning(TinyML)approach,which operates on IoV edge devices without sharing sensitive raw data.Specifically,we focus on integrating split learning(SL)with federated learning(FL)and TinyML models.FL is a decentralisedmachine learning(ML)technique that enables numerous edge devices to train a standard model while retaining data locally collectively.The article intends to thoroughly discuss the architecture and challenges associated with the increasing prevalence of SL in the IoV domain,coupled with FL and TinyML.The approach starts with the IoV learning framework,which includes edge computing,FL,SL,and TinyML,and then proceeds to discuss how these technologies might be integrated.We elucidate the comprehensive operational principles of Federated and split learning by examining and addressingmany challenges.We subsequently examine the integration of SL with FL and various applications of TinyML.Finally,exploring the potential integration of FL and SL with TinyML in the IoV domain is referred to as FSL-TM.It is a superior method for preserving privacy as it conducts model training on individual devices or edge nodes,thereby obviating the necessity for centralised data aggregation,which presents considerable privacy threats.The insights provided aim to help both researchers and practitioners understand the complicated terrain of FL and SL,hence facilitating advancement in this swiftly progressing domain.
基金supported by a grant from the National Science and Technology Major Project(Grant No.2024ZD0519800).
文摘Both large-scale prospective randomized controlled trials(RCTs)and smaller investigator-initiated trials are essential for evaluating the efficacy and safety of medical interventions.Robust protocols and statistical designs ensure the reliability of trial outcomes and improve the credibility of research findings.By reviewing the statistical approaches used in the TORCHLIGHT,NCC2167,and NeoTENNIS trials,this article illustrates the principles underlying large-sample confirmatory RCTs,small-sample exploratory adaptive designs,and single-arm two-stage designs.This discussion is aimed at helping researchers apply these design methods more effectively,to increase the likelihood of success in clinical studies.
文摘Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart devices.Furthermore,the IoT plays a key role in multiple domains,including industrial automation,smart homes,and intelligent transportation systems.However,an increasing number of connected devices presents significant challenges related to efficient resource allocation and system responsiveness.To address these issue,this research proposes a Modified Walrus Optimization Algorithm(MWaOA)for effective resource management in smart IoT systems.In the proposed MWaOA,a crowding process is incorporated to maintain diversity and avoid premature convergence thereby enhancing the global search capability.During resource allocation,the MWaOA prevents early convergence,which aids in achieving a better balance between the exploration and exploitation phases during optimization.Empirical evaluations show that the MWaOA reduces energy consumption by approximately 4% to 34%and minimizes the response time by 6% to 33% across different service arrival rates.Compared to traditional optimization algorithms,MWaOA reduces energy consumption by 5% to 30%and minimizes the response time by 4% to 28% across different simulation epochs.The proposed MWaOA provides adaptive and robust resource allocation,thereby minimizing transmission cost while considering network constraints and real-time performance parameters.
文摘Deploying Large LanguageModel(LLM)-based agents in the Industrial Internet ofThings(IIoT)presents significant challenges,including high latency from cloud-based APIs,data privacy concerns,and the infeasibility of deploying monolithic models on resource-constrained edge devices.While smaller models(SLMs)are suitable for edge deployment,they often lack the reasoning power for complex,multi-step tasks.To address these issues,this paper introduces LEAF,a Lightweight Edge Agent Framework designed for efficiently executing complex tasks at the edge.LEAF employs a novel architecture where multiple expert SLMs—specialized for planning,execution,and interaction—work in concert,decomposing complex problems into manageable sub-tasks.To mitigate the resource overhead of this multi-model approach,LEAF implements an efficient parameter-sharing scheme based on Scalable Low-Rank Adaptation(S-LoRA).We introduce a two-stage training strategy combining Supervised Fine-Tuning(SFT)and Group Relative Policy Optimization(GRPO)to significantly enhance each expert’s capabilities.Furthermore,a Finite StateMachine(FSM)-based decision engine orchestrates the workflow,uniquely balancing deterministic control with intelligent flexibility,making it ideal for industrial environments that demand both reliability and adaptability.Experiments across diverse IIoT scenarios demonstrate that LEAF significantly outperforms baseline methods in both task success rate and user satisfaction.Notably,our fine-tuned 4-billion-parameter model achieves a task success rate over 90%in complex IIoT scenarios,demonstrating LEAF’s ability to deliver powerful and efficient autonomy at the industrial edge.
文摘TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection.
基金supported in part by National key R&D projects(2024YFB4207203)National Natural Science Foundation of China(52401376)+3 种基金the Zhejiang Provincial Natural Science Foundation of China under Grant(No.LTGG24F030004)Hangzhou Key Scientific Research Plan Project(2024SZD1A24)“Pioneer”and“Leading Goose”R&DProgramof Zhejiang(2024C03254,2023C03154)Jiangxi Provincial Gan-Po Elite Support Program(Major Academic and Technical Leaders Cultivation Project,20243BCE51180).
文摘Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Leveraging IoVtechnologies,operational data fromcore vehicle components can be collected and analyzed to construct fault diagnosis models,thereby enhancing vehicle safety.However,automakers often struggle to acquire sufficient fault data to support effective model training.To address this challenge,a robust and efficient federated learning method(REFL)is constructed for machinery fault diagnosis in collaborative IoV,which can organize multiple companies to collaboratively develop a comprehensive fault diagnosis model while keeping their data locally.In the REFL,the gradient-based adversary algorithm is first introduced to the fault diagnosis field to enhance the deep learning model robustness.Moreover,the adaptive gradient processing process is designed to improve the model training speed and ensure the model accuracy under unbalance data scenarios.The proposed REFL is evaluated on non-independent and identically distributed(non-IID)real-world machinery fault dataset.Experiment results demonstrate that the REFL can achieve better performance than traditional learning methods and are promising for real industrial fault diagnosis.
基金supported by National Key R&D Program of China(No.2022YFB3105101).
文摘With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.
基金extend their appreciation to the Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2026R760)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors also extend their appreciation to the Deanship of Research and Graduate Studies at King Khalid University for funding this work through small group research under grant number RGP2/714/46.
文摘The convergence of Software Defined Networking(SDN)in Internet of Vehicles(IoV)enables a flexible,programmable,and globally visible network control architecture across Road Side Units(RSUs),cloud servers,and automobiles.While this integration enhances scalability and safety,it also raises sophisticated cyberthreats,particularly Distributed Denial of Service(DDoS)attacks.Traditional rule-based anomaly detection methods often struggle to detectmodern low-and-slowDDoS patterns,thereby leading to higher false positives.To this end,this study proposes an explainable hybrid framework to detect DDoS attacks in SDN-enabled IoV(SDN-IoV).The hybrid framework utilizes a Residual Network(ResNet)to capture spatial correlations and a Bi-Long Short-Term Memory(BiLSTM)to capture both forward and backward temporal dependencies in high-dimensional input patterns.To ensure transparency and trustworthiness,themodel integrates the Explainable AI(XAI)technique,i.e.,SHapley Additive exPlanations(SHAP).SHAP highlights the contribution of each feature during the decision-making process,facilitating security analysts to understand the rationale behind the attack classification decision.The SDN-IoV environment is created in Mininet-WiFi and SUMO,and the hybrid model is trained on the CICDDoS2019 security dataset.The simulation results reveal the efficacy of the proposed model in terms of standard performance metrics compared to similar baseline methods.
基金supported by ZTE Industry-University-Institute Cooperation Funds under Grant No.IA20230628015the State Key Laboratory of Particle Detection and Electronics under Grant No.SKLPDE-KF-202314。
文摘Security and access control for data storage in 5G industrial Internet collaborative systems are facing significant challenges.The characteristics of 5 G networks,such as low latency and high speed,facilitate data transmission in the industrial Internet but also increase vulnerability to attacks like theft and tampering.Moreover,in 5G industrial Internet collaborative system environments,data flows across multiple entities and links,which necessitates a flexible access control model to meet specific data access requirements.Traditional role-based and attribute-based access control mechanisms are difficult to apply in such dynamic application scenarios.To address these challenges,we propose a novel data storage solution for 5G industrial Internet collaborative systems.Similar to existing approaches,it provides integrity and confidentiality protection for transmitted data.In terms of security,only authenticated data owners and users can obtain file decryption keys,preventing malicious attackers from data forgery.Regarding access control,decryption is permitted only to authorized data users,safeguarding against unauthorized file access.Furthermore,by introducing an attribute-based encryption mechanism,only data users with specific attributes can decrypt files.In terms of efficiency,our approach utilizes bilinear and modular exponentiation operations solely during the authentication process.For handling substantial data loads,lightweight cryptographic algorithms are employed.Consequently,our solution achieves higher efficiency compared with other known methods.Experimental results demonstrate the feasibility of our approach in real-world applications.
基金supported by Key Science and Technology Program of Henan Province,China(Grant Nos.242102210147,242102210027)Fujian Province Young and Middle aged Teacher Education Research Project(Science and Technology Category)(No.JZ240101)(Corresponding author:Dong Yuan).
文摘Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit(RSU),thereby achieving lower delay and energy consumption.However,due to the limited storage capacity and energy budget of RSUs,it is challenging to meet the demands of the highly dynamic Internet of Vehicles(IoV)environment.Therefore,determining reasonable service caching and computation offloading strategies is crucial.To address this,this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading.By modeling the dynamic optimization problem using Markov Decision Processes(MDP),the scheme jointly optimizes task delay,energy consumption,load balancing,and privacy entropy to achieve better quality of service.Additionally,a dynamic adaptive multi-objective deep reinforcement learning algorithm is proposed.Each Double Deep Q-Network(DDQN)agent obtains rewards for different objectives based on distinct reward functions and dynamically updates the objective weights by learning the value changes between objectives using Radial Basis Function Networks(RBFN),thereby efficiently approximating the Pareto-optimal decisions for multiple objectives.Extensive experiments demonstrate that the proposed algorithm can better coordinate the three-tier computing resources of cloud,edge,and vehicles.Compared to existing algorithms,the proposed method reduces task delay and energy consumption by 10.64%and 5.1%,respectively.
文摘1 Introduction The growing connectivity with mobile internet has significantly enhanced our day-to-day life support through various services and applications with on-demand availability at any time or anywhere.As emerging technologies with continuous revolutions in the digital transformations,various add-on technologies such as quantum computing,AI,and next-generation networks such as 6G are becoming an integral support to mobile internet systems.The emerging technologies in the next-generation mobile internet bring a lot of new security and privacy challenges.
基金supported by the National Natural Science Foundation of China(Grant No.62172292).
文摘Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,existing unsupervised learning methods suffer from insufficient temporal and spatial constraints on shallow features,resulting in fragmented feature representations that compromise model stability and accuracy.To improve the extraction of valuable features,this paper investigates the influence of clustering constraints on shallow feature convergence paths at the model level and further proposes an end-to-end intrusion detection system based on efficient deep embedded subspace clustering(EDESC-IDS).Following the standard learning approach,continuous messages are encoded into two-dimensional data frames via a frame builder,which are then input into an extended convolutional autoencoder for extracting shallow features from high-dimensional data.On this basis,the dual constraints of these output features and the embedding clustering module facilitate end-to-end training of the EDESC-IDS in various attack scenarios.Extensive experimental results show that such a system exhibits significant detection performance on four types of attack datasets,including DoS,Gear,Fuzzy,and RPM,with precision,recall,and F1 scores consistently above 97.79%,while maintaining a false negative rate(FNR)and an error rate(ER)below 2.22%.
文摘The Internet of Vehicles(IoV)is an emerging technology that aims to connect vehicles,infrastructure,and other devices to enable intelligent transportation systems.One of the key challenges in IoV is to ensure safe and efficient communication among vehicles of different types and capabilities.This paper proposes a data-driven vehicular heterogeneity-based intelligent collision avoidance system for IoV.The system leverages Vehicle-to-Vehicle(V2V)and Vehicle-to-Infrastructure(V2I)communication to collect real-time data about the environment and the vehicles.The data is collected to acknowledge the heterogeneity of vehicles and human behavior.The data is analyzed using machine learning algorithms to identify potential collision risks and recommend appropriate actions to avoid collisions.The system takes into account the heterogeneity of vehicles,such as their size,speed,and maneuverability,to optimize collision avoidance strategies.The proposed system is experimented with real-time datasets and compared with existing collision avoidance systems.The results are shown using the evaluation metrics that show the proposed system can significantly reduce the number of collisions and improve the overall safety and efficiency of IoV with an accuracy of 96.5%using the SVM algorithm.The trial outcomes demonstrated that the new system,incorporating vehicular,weather,and human behavior factors,outperformed previous systems that only considered vehicular and weather aspects.This innovative approach is poised to lead transportation efforts,reducing accident rates and improving the quality of transportation systems in smart cities.By offering predictive capabilities,the proposed model not only helps control accident rates but also prevents them in advance,ensuring road safety.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)-Information Technology Research Center(ITRC)under Grant No.IITP-2025-RS-2023-00259004the Basic Science Research Program through the National Research Foundation of Korea(NRF)under Grant No.RS-2025-25434261.
文摘The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EISA)framework for 6G unmanned aerial vehicle(UAV)-assisted Internet of vehicles(IoV)networks that integrates task-driven semantic communication,deep reinforcement learning(DRL)-based edge intelligence,and blockchain-based semantic validation across 6G terahertz(THz)links.UAVs in the proposed architecture serve as adaptive edge nodes that receive semantically vital information about the vehicle at any given stage,optimize aggregation and transmission parameters dynamically,and guarantee data integrity through a structured,lightweight consortium blockchain that signs semantically detailed representations rather than raw packets.Simulation results from a hybrid NS-3,MATLAB,and Python environment indicate that the proposed framework can achieve up to 45%reduction in end-to-end latency,an approximately 70%increase in throughput,and semantic efficiency with blockchain verification delays of less than 20 ms(more than 98%).These findings support the effectiveness of the proposed co-design for achieving context-aware,energy-efficient,and reliable communication under heavy-traffic conditions.The proposed framework provides a flexible and scalable foundation for next-generation 6G-enabled automotive networks,with subsequent growth toward federated learning-based collaborative intelligence,digital-twinassisted traffic modeling,and quantum-safe blockchain mechanisms to enhance scalability,intelligence,and long-term security.