期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
Research on the life prediction of vehicle engine cylinder head driven by dual channel Markov chain
1
作者 LI Zhijie WANG Yonglai +3 位作者 CHEN Cuicui ZHOU Long WANG Yao YUAN Shaoshe 《High Technology Letters》 2025年第1期12-19,共8页
The performance degradation of vehicle engine cylinder heads is a complex phenomenon,and the accurate prediction of their remaining useful life is essential for maintenance planning.To address the problem of low predi... The performance degradation of vehicle engine cylinder heads is a complex phenomenon,and the accurate prediction of their remaining useful life is essential for maintenance planning.To address the problem of low prediction accuracy caused by insufficient data mining depth in current prediction models for the remaining service life of engine cylinder heads,a prediction method of dualchannel model is proposed.Firstly,the driving status data of multiple vehicles is summarized and analyzed,and the on-board network common variables related to cylinder head life are screened.Secondly,driving segments are defined,the driving state features of each driving segment are extracted,and feature correlation analysis and principal component analysis are performed.All driving state profiles of the vehicle are divided using the clustering algorithm,and the cumulative degradation factors for driving state profiles are defined and calculated.Furthermore,the mileage of each driving segment is classified into intervals by applying fuzzy set theory,and the state transfer probability matrices of driving state profiles and driving segment mileage are calculated.A new engine head life prediction model based on dual channel Markov chain(DCMC)is established.Finally,the proposed method is applied to the residual life prediction of cylinder head of seven actual vehicles,and the comparison with actual life statistics results proved the validity of the proposed method. 展开更多
关键词 engine cylinder head driving cycle vehicle networking life prediction
在线阅读 下载PDF
Average Secrecy Capacity of the Reconfigurable Intelligent Surface-Assisted Integrated Satellite Unmanned Aerial Vehicle Relay Networks
2
作者 Ping Li Kefeng Guo +2 位作者 Feng Zhou XuelingWang Yuzhen Huang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1849-1864,共16页
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e... Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks reconfigurable intelligent surface average secrecy capacity(ASC) asymptotic ASC
在线阅读 下载PDF
RFID assisted intelligent vehicle communication management system 被引量:1
3
作者 YANG Qing-xue Zhou Jiang 《International Journal of Technology Management》 2017年第3期70-72,共3页
RFID is an important technology in the Internet of things that has the characteristics of safe, affordable, efficient, which received widespread attention and research. This paper proposes a UHF RFID-based intelligent... RFID is an important technology in the Internet of things that has the characteristics of safe, affordable, efficient, which received widespread attention and research. This paper proposes a UHF RFID-based intelligent vehicle management system (the Internet). The system consists of RFID hardware system, CDMA system, the GIA system, data processing system, and can realize intelligent vehicle identification, location, tracking, velocity measurement, monitoring and management, to address the current severe road congestion, speeding, vehicle theft and vehicle overload management and other issues. Software and hardware design of intelligent vehicle management system based on RFID, focuses on systems, security design, selection of RFID cards and vehicle access control software features, the fleet management system is not only convenient, but also intelligent identification of vehicles and vehicle theft, in the community, school, car park and vehicle management occasions has a good application. 展开更多
关键词 RFID vehicle networking LOCATION vehicle management intelligent identification
在线阅读 下载PDF
A blockchain-assisted lightweight UAV network authentication mechanism via covert communication
4
作者 Yuwen QIAN Huan CAI +4 位作者 Long SHI Zhen MEI Yumeng SHAO Feng SHU Xiangwei ZHOU 《Chinese Journal of Aeronautics》 2025年第10期216-229,共14页
The increasing importance of terminal privacy in the Unmanned Aerial Vehicle(UAV)network has led to a growing recognition of the crucial role of authentication technology in UAV network security.However,traditional au... The increasing importance of terminal privacy in the Unmanned Aerial Vehicle(UAV)network has led to a growing recognition of the crucial role of authentication technology in UAV network security.However,traditional authentication approaches are vulnerable due to the transmission of identity information between UAVs and cryptographic paradigm management centers over a public channel.These vulnerabilities include brute-force attacks,single point of failure,and information leakage.Blockchain,as a decentralized distributed ledger with blockchain storage,tamper-proof,secure,and trustworthy features,can solve problems such as single-point-of-failure and trust issues,while the hidden communication in the physical layer can effectively resist information leakage and violent attacks.In this paper,we propose a lightweight UAV network authentication mechanism that leverages blockchain and covert communication,where the identity information is transmitted as covert tags carried by normal modulated signals.In addition,a weight-based Practical Byzantine Fault-Tolerant(wPBFT)consensus protocol is devised,where the weights are determined by the channel states of UAVs and the outcomes of past authentication scenarios.Simulation results demonstrate that the proposed mechanism outperforms traditional benchmarks in terms of security and robustness,particularly under conditions of low Signal-to-Noise Ratio(SNR)and short tag length. 展开更多
关键词 Unmanned Aerial vehicle(UAV)network Covert communication Blockchain Physical layer AUTHENTICATION
原文传递
Co-Design Enhanced Power Scheme and Trajectory Optimization of UAV-Enabled Data Collection from WSNs
5
作者 Guangshun Li Tielin Wang +1 位作者 Junhua Wu Zhiyun Guan 《Tsinghua Science and Technology》 2025年第6期2343-2365,共23页
Due to their versatility and ease of movement,Unmanned Aerial Vehicles(UAVs)have become crucial tools in data collection for Wireless Sensor Networks(WSNs).While numerous UAV-based solutions exist,the focus often need... Due to their versatility and ease of movement,Unmanned Aerial Vehicles(UAVs)have become crucial tools in data collection for Wireless Sensor Networks(WSNs).While numerous UAV-based solutions exist,the focus often needs to be on optimizing flight trajectories and managing energy use,sometimes neglecting key factors affecting channel quality.In this article,we introduce a collaborative design framework designed to alleviate channel quality degradation caused by UAV flight distance in three-dimensional spaces.Our approach jointly optimizes UAV power schemes,positions,and flight trajectories.Firstly,we start by introducing a novel enhancing power model developed explicitly for rotary-wing UAVs gathering data,utilizing an alternating optimization method to achieve locally optimal solutions.Next,we frame an optimization problem aimed at maximizing the total average collection rate while achieving approximate optimal position relationships among UAVs.Additionally,we propose a new trajectory optimization model based on the Steiner Minimal Tree(SMT)concept,which is called the Circumcircle Steiner Minimal Tree Problem with Neighborhood(CSMTPN).Finally,we confirm our theoretical insights and numerical outcomes through extensive simulations demonstrating our framework's effectiveness. 展开更多
关键词 Unmanned Aerial vehicle(UAV)-enabled Wireless Sensor Networks(WSNs) data collection energy management trajectory optimization
原文传递
An Optimized Vertical Handoff Algorithm Based on Markov Process in Vehicle Heterogeneous Network 被引量:4
6
作者 MA Bin DENG Hong +1 位作者 XIE Xianzhong LIAO Xiaofeng 《China Communications》 SCIE CSCD 2015年第4期106-116,共11页
In order to solve the problem the existing vertical handoff algorithms of vehicle heterogeneous wireless network do not consider the diversification of network's status, an optimized vertical handoff algorithm bas... In order to solve the problem the existing vertical handoff algorithms of vehicle heterogeneous wireless network do not consider the diversification of network's status, an optimized vertical handoff algorithm based on markov process is proposed and discussed in this paper. This algorithm takes into account that the status transformation of available network will affect the quality of service(Qo S) of vehicle terminal's communication service. Firstly, Markov process is used to predict the transformation of wireless network's status after the decision via transition probability. Then the weights of evaluating parameters will be determined by fuzzy logic method. Finally, by comparing the total incomes of each wireless network, including handoff decision incomes, handoff execution incomes and communication service incomes after handoff, the optimal network to handoff will be selected. Simulation results show that: the algorithm proposed, compared to the existing algorithm, is able to receive a higher level of load balancing and effectively improves the average blocking rate, packet loss rate and ping-pang effect. 展开更多
关键词 vehicle heterogeneous network vertical handoff markov process fuzzy logic multi-attribute decision
在线阅读 下载PDF
Quantitative Survivability Analysis Using Probability Model Checking: A Study of Cluster-Based Vehicle Networks with Dual Cluster Heads 被引量:3
7
作者 Li Jin Guoan Zhang +2 位作者 Jue Wang Hao Zhu Wei Duan 《China Communications》 SCIE CSCD 2020年第2期206-219,共14页
As an important part of future 5G wireless networks,a vehicular network demands safety,reliability and connectivity.In this context,networking survivability is usually considered an important metric to evaluate networ... As an important part of future 5G wireless networks,a vehicular network demands safety,reliability and connectivity.In this context,networking survivability is usually considered an important metric to evaluate network performance.In this paper,we propose a survivability model for vehicle communication networking based on dual cluster heads,wherein a backup cluster head(CH)will be activated if the primary CH fails,thereby effectively enhancing the network lifetime.Additionally,we introduce a software rejuvenation strategy for the prime CH to further improve the survivability of the entire network.Using the Probabilistic Symbolic Model Checker(PRISM),we verify and discuss the proposed survivability model via numerical simulations.The results show that network survivability can be effectively improved by introducing an additional CH and further enhanced by adopting the software rejuvenation technique. 展开更多
关键词 cluster head 5G software recovery SURVIVABILITY vehicle networks
在线阅读 下载PDF
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles 被引量:1
8
作者 LIANG Wei RUAN Zhiqiang +1 位作者 TANG Mingdong LI Peng 《China Communications》 SCIE CSCD 2016年第2期121-129,共9页
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ... Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms. 展开更多
关键词 wireless vehicle network datacollection protocol network sensing chain self'-adaptive sensing sensing distance threshold.
在线阅读 下载PDF
A Self-Adaptive Back-off Optimization Scheme Based on Beacons Probability Prediction for Vehicle Ad-Hoc Networks 被引量:1
9
作者 Haitao Zhao Aiqian Du +2 位作者 Hongbo Zhu Dapeng Li Nanjie Liu 《China Communications》 SCIE CSCD 2016年第12期132-138,共7页
In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship ... In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship between expiration probability and minimum window size was reached by building a Markov model. According to this conclusion, a back-off algorithm based on adjusting the size of minimum contention window called CEB is proposed, and this algorithm is on the basis of the differential size between the number of expiration beacons and preset threshold. Simulations were done to compare the performance of CEB with that of RBEB and BEB, and the results show that the performance of the new proposed algorithm is better than that of RBEB and BEB. 展开更多
关键词 vehicle ad-hoc networks back off BEACON expiration probability collision probability
在线阅读 下载PDF
An Anonymous Authentication Scheme with Controllable Linkability for Vehicle Sensor Networks 被引量:1
10
作者 Yousheng Zhou Lvjun Chen +1 位作者 Xiaofeng Zhao Zheng Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第12期1101-1118,共18页
Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible... Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible to a broad range of attacks.In addition to ensuring security for both data-at-rest and data-in-transit,it is essential to preserve the privacy of data and users in vehicle sensor networks.Many existing authentication schemes for vehicle sensor networks are generally not designed to also preserve the privacy between the user and service provider(e.g.,mining user data to provide personalized services without infringing on user privacy).Controllable linkability can be used to facilitate an involved entity with the right linking key to determine whether two messages were generated by the same sender,while preserving the anonymity of the signer.Such a functionality is very useful to provide personalized services.Thus,in this paper,a threshold authentication scheme with anonymity and controllable linkability for vehicle sensor networks is constructed,and its security is analyzed under the random oracle model. 展开更多
关键词 Threshold authentication controllable linkabilty group signature vehicle sensor networks
在线阅读 下载PDF
Deep Reinforcement Learning Empowered Edge Collaborative Caching Scheme for Internet of Vehicles 被引量:1
11
作者 Xin Liu Siya Xu +4 位作者 Chao Yang Zhili Wang Hao Zhang Jingye Chi Qinghan Li 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期271-287,共17页
With the development of internet of vehicles,the traditional centralized content caching mode transmits content through the core network,which causes a large delay and cannot meet the demands for delay-sensitive servi... With the development of internet of vehicles,the traditional centralized content caching mode transmits content through the core network,which causes a large delay and cannot meet the demands for delay-sensitive services.To solve these problems,on basis of vehicle caching network,we propose an edge colla-borative caching scheme.Road side unit(RSU)and mobile edge computing(MEC)are used to collect vehicle information,predict and cache popular content,thereby provide low-latency content delivery services.However,the storage capa-city of a single RSU severely limits the edge caching performance and cannot handle intensive content requests at the same time.Through content sharing,col-laborative caching can relieve the storage burden on caching servers.Therefore,we integrate RSU and collaborative caching to build a MEC-assisted vehicle edge collaborative caching(MVECC)scheme,so as to realize the collaborative caching among cloud,edge and vehicle.MVECC uses deep reinforcement learning to pre-dict what needs to be cached on RSU,which enables RSUs to cache more popular content.In addition,MVECC also introduces a mobility-aware caching replace-ment scheme at the edge network to reduce redundant cache and improving cache efficiency,which allows RSU to dynamically replace the cached content in response to the mobility of vehicles.The simulation results show that the pro-posed MVECC scheme can improve cache performance in terms of energy cost and content hit rate. 展开更多
关键词 Internet of vehicles vehicle caching network collaborative caching caching replacement deep reinforcement learning
在线阅读 下载PDF
A Vehicle Routing Problem Based on Intelligent Batteries Transfer Management for the EV Network 被引量:2
12
作者 XIA Yamei CHENG Bo 《China Communications》 SCIE CSCD 2014年第5期160-169,共10页
Batteries transfer management is one important aspect in electric vehicle(EV)network's intelligent operation management system.Batteries transfer is a special and much more complex VRP(Vehicle Routing Problem) whi... Batteries transfer management is one important aspect in electric vehicle(EV)network's intelligent operation management system.Batteries transfer is a special and much more complex VRP(Vehicle Routing Problem) which takes the multiple constraints such as dynamic multi-depots,time windows,simultaneous pickups and deliveries,distance minimization,etc.into account.We call it VRPEVB(VRP with EV Batteries).This paper,based on the intelligent management model of EV's battery power,puts forward a battery transfer algorithm for the EV network which considers the traffic congestion that changes dynamically and uses improved Ant Colony Optimization.By setting a reasonable tabv range,special update rules of the pheromone and path list memory functions,the algorithm can have a better convergence,and its feasibility is proved by the experiment in an EV's demonstration operation system. 展开更多
关键词 VRP battery power management ant colony algorithm electric vehicle network
在线阅读 下载PDF
Vehicle Detection Based on Visual Saliency and Deep Sparse Convolution Hierarchical Model 被引量:4
13
作者 CAI Yingfeng WANG Hai +2 位作者 CHEN Xiaobo GAO Li CHEN Long 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2016年第4期765-772,共8页
Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high ... Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high processing times and low vehicle detection performance.To address this issue,a visual saliency and deep sparse convolution hierarchical model based vehicle detection algorithm is proposed.A visual saliency calculation is firstly used to generate a small vehicle candidate area.The vehicle candidate sub images are then loaded into a sparse deep convolution hierarchical model with an SVM-based classifier to perform the final detection.The experimental results demonstrate that the proposed method is with 94.81% correct rate and 0.78% false detection rate on the existing datasets and the real road pictures captured by our group,which outperforms the existing state-of-the-art algorithms.More importantly,high discriminative multi-scale features are generated by deep sparse convolution network which has broad application prospects in target recognition in the field of intelligent vehicle. 展开更多
关键词 vehicle detection visual saliency deep model convolution neural network
在线阅读 下载PDF
An Optimization Scheme for Task Offloading and Resource Allocation in Vehicle Edge Networks 被引量:1
14
作者 Yuxin Xu Zilong Jin +1 位作者 Xiaorui Zhang Lejun Zhang 《Journal on Internet of Things》 2020年第4期163-173,共11页
The vehicle edge network(VEN)has become a new research hotspot in the Internet of Things(IOT).However,many new delays are generated during the vehicle offloading the task to the edge server,which will greatly reduce t... The vehicle edge network(VEN)has become a new research hotspot in the Internet of Things(IOT).However,many new delays are generated during the vehicle offloading the task to the edge server,which will greatly reduce the quality of service(QOS)provided by the vehicle edge network.To solve this problem,this paper proposes an evolutionary algorithm-based(EA)task offloading and resource allocation scheme.First,the delay of offloading task to the edge server is generally defined,then the mathematical model of problem is given.Finally,the objective function is optimized by evolutionary algorithm,and the optimal solution is obtained by iteration and averaging.To verify the performance of this method,contrast experiments are conducted.The experimental results show that our purposed method reduces delay and improves QOS,which is superior to other schemes. 展开更多
关键词 vehicle edge network evolutionary algorithm task offloading resource allocation
在线阅读 下载PDF
Secrecy Outage Probability for Two-Way Integrated Satellite Unmanned Aerial Vehicle Relay Networks with Hardware Impairments
15
作者 Xiaoting Ren Kefeng Guo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2515-2530,共16页
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy... In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks two-way unmanned aerial vehicle relay hardware impairments secrecy outage probability(SOP) asymptotic SOP
在线阅读 下载PDF
Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm
16
作者 C.Nandagopal P.Siva Kumar +1 位作者 R.Rajalakshmi S.Anandamurugan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期113-126,共14页
Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data tr... Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data transfer,and data loss,affect the effectiveness of Transmission Control Protocols(TCP)on such wireless ad hoc networks.To avoid the problem,in this paper,mobility-aware zone-based routing in VANET is proposed.To achieve this con-cept,in this paper hybrid optimization algorithm is presented.The hybrid algo-rithm is a combination of Ant colony optimization(ACO)and artificial bee colony optimization(ABC).The proposed hybrid algorithm is designed for the routing process which is transmitting the information from one place to another.The optimal routing process is used to avoid traffic and link failure.Thefitness function is designed based on Link stability and Residual energy.The validation of the proposed algorithm takes solution encoding,fitness calculation,and updat-ing functions.To perform simulation experiments,NS2 simulator software is used.The performance of the proposed approach is analyzed based on different metrics namely,delivery ratio,delay time,throughput,and overhead.The effec-tiveness of the proposed method compared with different algorithms.Compared to other existing VANET algorithms,the hybrid algorithm has proven to be very efficient in terms of packet delivery ratio and delay. 展开更多
关键词 vehicle ad hoc network transmission control protocol multi-hop data transmission ant colony optimization artificial bee colony optimization
在线阅读 下载PDF
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
17
作者 Khattab M.Ali Alheeti Anna Gruebler Klaus McDonald-Maier 《Digital Communications and Networks》 SCIE 2017年第3期180-187,共8页
Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propos... Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DOS) and black hole attacks on vehicular ad hoe networks (VANETs). The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA) and Quadratic Diseriminant Analysis (QDA) which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection. 展开更多
关键词 Secure communication vehicle ad hoc networks IDS Self-driving vehicles Linear and quadratic discriminant analysis
在线阅读 下载PDF
Sensing and Communication Integrated Fast Neighbor Discovery for UAV Networks 被引量:1
18
作者 WEI Zhiqing ZHANG Yongji +1 位作者 JI Danna LI Chenfei 《ZTE Communications》 2024年第3期69-82,共14页
In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communicati... In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms. 展开更多
关键词 unmanned aerial vehicle networks neighbor discovery integrated sensing and communication reinforcement learning Kalman filter
在线阅读 下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
19
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
在线阅读 下载PDF
Multi-objective robust secure beamforming for cognitive satellite and UAV networks 被引量:3
20
作者 WANG Zining LIN Min +3 位作者 TANG Xiaogang GUO Kefeng HUANG Shuo CHENG Ming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第4期789-798,共10页
A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with t... A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with the UAV network,we first consider both achievable secrecy rate maximization and total transmit power minimization,and formulate a multi-objective optimization problem(MOOP)using the weighted Tchebycheff approach.Then,by supposing that only imperfect channel state information based on the angular information is available,we propose a method combining angular discretization with Taylor approximation to transform the non-convex objective function and constraints to the convex ones.Next,we adopt semi-definite programming together with randomization technology to solve the original MOOP and obtain the BF weight vector.Finally,simulation results illustrate that the Pareto optimal trade-off can be achieved,and the superiority of our proposed scheme is confirmed by comparing with the existing BF schemes. 展开更多
关键词 cognitive satellite and unmanned aerial vehicle network(CSUN) multi-objective optimization robust secure beamforming(BF) weighted Tchebycheff approach
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部