期刊文献+
共找到1,122篇文章
< 1 2 57 >
每页显示 20 50 100
Dynamic Event-Triggered Scheduling and Platooning Control Co-Design for Automated Vehicles Over Vehicular Ad-Hoc Networks 被引量:35
1
作者 Xiaohua Ge Shunyuan Xiao +2 位作者 Qing-Long Han Xian-Ming Zhang Derui Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第1期31-46,共16页
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr... This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency. 展开更多
关键词 Automated vehicles dynamic event-triggered communication information flow topology platooning control vehicular ad-hoc networks(VANETs)
在线阅读 下载PDF
Power Allocation for Cooperative Communications in Non-Orthogonal Cognitive Radio Vehicular Ad-Hoc Networks 被引量:1
2
作者 Yancheng Ji Dan Sun +1 位作者 Xiaojun Zhu Danfeng Dong 《China Communications》 SCIE CSCD 2020年第11期91-99,共9页
To achieve the better system performance for cooperative communication in non-orthogonal cognitive radio vehicular adhoc networks(CR-VANETs),this paper investigates the power allocation considering the interference to... To achieve the better system performance for cooperative communication in non-orthogonal cognitive radio vehicular adhoc networks(CR-VANETs),this paper investigates the power allocation considering the interference to the main system in a controllable range.We propose a three-slot one-way vehicle system model where the mobile vehicle nodes complete information interaction with the assistance of other independent nodes by borrowing the unused radio spectrum with the primary networks.The end-to-end SNR relationship in overlay and underlay cognitive communication system mode are analyzed by using two forwarding protocol,namely,decode-and-forward(DF)protocol and amplify-and-forward(AF)protocol,respectively.The system outage probability is derived and the optimal power allocation factor is obtained via seeking the minimum value of the approximation of system outage probability.The analytical results have been confirmed by means of Monte Carlo simulations.Simulation results show that the proposed system performance in terms of outage under the optimal power allocation is superior to that under the average power allocation,and is also better than that under other power allocation systems. 展开更多
关键词 DECODE-AND-FORWARD AMPLIFY-AND-FORWARD outage probability optimal power allocation cooperative communication cognitive radio vehicular ad-hoc networks
在线阅读 下载PDF
A reliable and high throughput hybrid routing protocol for vehicular ad-hoc network 被引量:1
3
作者 郭庆 杨明川 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期87-92,共6页
Due to highly dynamic topology caused by fast moving nodes the Vehicular ad-hoc network (VANET) results in the existence of transient communication links, which degrade the performance of developed protocols. Establis... Due to highly dynamic topology caused by fast moving nodes the Vehicular ad-hoc network (VANET) results in the existence of transient communication links, which degrade the performance of developed protocols. Established routes frequently become stale, and existing communication flows are interrupted, incurring delay and additional overhead. In this paper we propose a novel hybrid routing protocol, which is the combined between of the table-driven routing and on-demand routing in VANET. It makes fast convergence in routing process, minimal drop links, making more reliable links, and adaptive with changing of VANET topology. With neighbor table is updated instantaneously, and using strong neighbor for routing process makes route discovery process start whenever it received requirement, and through using route mechanism appropriately it reduces significantly route overhead at each node. The simulation results illustrate the outstanding properties of our proposed routing protocol. 展开更多
关键词 vehicular ad-hoc network Routing protocol HYBRID table-driven routing protocol on-demand routing orotocol
在线阅读 下载PDF
Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks
4
作者 M.Almutiq L.Sellami B.Alaya 《Computers, Materials & Continua》 SCIE EI 2022年第8期3493-3510,共18页
Nowadays,video streaming applications are becoming one of the tendencies driving vehicular network users.In this work,considering the unpredictable vehicle density,the unexpected acceleration or deceleration of the di... Nowadays,video streaming applications are becoming one of the tendencies driving vehicular network users.In this work,considering the unpredictable vehicle density,the unexpected acceleration or deceleration of the different vehicles included in the vehicular traffic load,and the limited radio range of the employed communication scheme,we introduce the“Dynamic Vehicular Clustering”(DVC)algorithm as a new scheme for video streaming systems over vehicular ad-hoc networks(VANET).The proposed algorithm takes advantage of the small cells concept and the introduction of wireless backhauls,inspired by the different features and the performance of the Long Term Evolution(LTE)-Advanced network.Vehicles are clustered together to form dynamically ad-hoc sub-networks included in the vehicular network.The goal of our clustering algorithm is to take into account several characteristics,such as the vehicle’s position and acceleration to reduce latency and packet loss.Therefore,each cluster is counted as a small cell containing vehicular nodes and an access point that is elected regarding some particular specifications.Based on the exceptional features of the LTE-Advanced network(small cells and wireless backhauls)the DVC algorithm is a promising scheme for video streaming services over VANET systems.Experiments were carried out with a virtual topology of the VANET network created with four clusters to implement the DVC algorithm.The results were compared with other algorithms such as Virtual Trust-ability Data transmission(VTD),Named Data Networking(NDN),and Socially Aware Security Message Forwarding(SASMF).Our algorithm can effectively improve the transmission rate of data packets at the expense of a slight increase in end-to-end delay and control overhead. 展开更多
关键词 5G VIDEO-ON-DEMAND vehicular ad-hoc network MOBILITY vehicular traffic load small cell wireless backhaul LTE-ADVANCED LATENCY packet loss
在线阅读 下载PDF
Quantitative and qualitative correlation analysis of optimal route discovery for vehicular ad-hoc networks
5
作者 MUKUND B.Wagh GOMATHI N. 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第7期1732-1745,共14页
Vehicular ad-hoc networks (VANETs) are a significant field in the intelligent transportation system (ITS) for improving road security. The interaction among the vehicles is enclosed under VANETs. Many experiments ... Vehicular ad-hoc networks (VANETs) are a significant field in the intelligent transportation system (ITS) for improving road security. The interaction among the vehicles is enclosed under VANETs. Many experiments have been performed in the region of VANET improvement. A familiar challenge that occurs is obtaining various constrained quality of service (QoS) metrics. For resolving this issue, this study obtains a cost design for the vehicle routing issue by focusing on the QoS metrics such as collision, travel cost, awareness, and congestion. The awareness of QoS is fuzzified into a price design that comprises the entire cost of routing. As the genetic algorithm (GA) endures from the most significant challenges such as complexity, unassisted issues in mutation, detecting slow convergence, global maxima, multifaceted features under genetic coding, and better fitting, the currently established lion algorithm (LA) is employed. The computation is analyzed by deploying three well-known studies such as cost analysis, convergence analysis, and complexity investigations. A numerical analysis with quantitative outcome has also been studied based on the obtained correlation analysis among various cost functions. It is found that LA performs better than GA with a reduction in complexity and routing cost. 展开更多
关键词 vehicular ad-hoc network lion algorithm fuzzy quality of service ROUTING
在线阅读 下载PDF
An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
6
作者 Tao Xu Cheng Xu Zisang Xu 《China Communications》 SCIE CSCD 2021年第12期315-331,共17页
As an indispensable part of the Intelli-gent Transportation System(ITS),the vehicular ad-hoc network(VANET)has attracted widespread atten-tion from academia and industry.In order to ensure the security of VANET,vehicl... As an indispensable part of the Intelli-gent Transportation System(ITS),the vehicular ad-hoc network(VANET)has attracted widespread atten-tion from academia and industry.In order to ensure the security of VANET,vehicles need to be authen-ticated before accessing the network.Most existing authentication protocols in VANET adopt the Trusted Authority(TA)with centralized structure which is re-sponsible for the authentication tasks of all vehicles.However,the large-scale network consume a lot of computing resources,which leads to unacceptable de-lay in message transmission in VANET.For reducing the computational cost of TA,an efficient three-factor privacy-preserving authentication and key agreement protocol was proposed in our paper.Different from before,the RoadSide Unit(RSU)no longer acts as an intermediate node but is responsible for assisting user authentication,which lead to the computational cost of TA is very low.Through formal and informal analysis,our protocol demonstrates excellent security.Com-pared with previous studies,our work emerges advan-tages and superiorities in the following aspects:com-putational cost,communication cost,security proper-ties and functions,message loss ratio,and message de-lay.These data and evidence indicate that our protocol is an ideal choice for large-scale VANET. 展开更多
关键词 AUTHENTICATION vehicular ad-hoc network SECURITY three-factor
在线阅读 下载PDF
Vehicle Positioning Method Based on RFID in Vehicular Ad-Hoc Networks
7
作者 于德新 郑坤 张伟 《Journal of Donghua University(English Edition)》 EI CAS 2015年第5期800-806,共7页
With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accurac... With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs. 展开更多
关键词 vehicular ad-hoc network(VANET) radio frequency identification(RFID) vehicle positioning fuzzy technology
在线阅读 下载PDF
Effective Life and Area Based Data Storing and Deployment in Vehicular Ad-Hoc Networks
8
作者 Hirokazu Miura Hideki Tode Hirokazu Taki 《Communications and Network》 2015年第3期146-157,共12页
In vehicular ad-hoc networks (VANETs), store-carry-forward approach may be used for data sharing, where moving vehicles carry and exchange data when they go by each other. In this approach, storage resource in a vehic... In vehicular ad-hoc networks (VANETs), store-carry-forward approach may be used for data sharing, where moving vehicles carry and exchange data when they go by each other. In this approach, storage resource in a vehicle is generally limited. Therefore, attributes of data that have to be stored in vehicles are an important factor in order to efficiently distribute desired data. In VANETs, there are different types of data which depend on the time and location. Such kind of data cannot be deployed adequately to the requesting vehicles only by popularity-based rule. In this paper, we propose a data distribution method that takes into account the effective life and area in addition to popularity of data. Our extensive simulation results demonstrate drastic improvements on acquisition performance of the time and area specific data. 展开更多
关键词 vehicular ad-hoc networks (VANETs) POPULARITY EFFECTIVE LIFE EFFECTIVE Area Data DEPLOYMENT
暂未订购
Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks
9
作者 Pino Caballero-Gil Francisco Martín-Fernández Cándido Caballero-Gil 《Journal of Computer and Communications》 2014年第9期14-21,共8页
This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificateless au... This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificateless authentication, membership revocation is not a trivial problem. Thus, in order to improve the performance of revocation in such networks, the use of a dynamic authenticated data structure based on perfect k-ary hash trees combined with a duplex version of the new standard SHA-3 is here presented. Efficient algorithms in the used revocation trees allow reaching a refresh rate of at most simple updates per inserted node. Consequently, the proposal is especially useful for situations with frequent revocations, which are foreseeable when vehicular ad- hoc networks are widely deployed. 展开更多
关键词 K-Ary TREE IDENTITY-BASED Cryptography REVOCATION Hash Function vehicular ad-hoc network
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
10
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 AUTHENTICATION key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
Enhanced multi-agent deep reinforcement learning for efficient task offloading and resource allocation in vehicular networks
11
作者 Long Xu Jiale Tan Hongcheng Zhuang 《Digital Communications and Networks》 2026年第1期66-75,共10页
In response to the rising demand for low-latency,computation-intensive applications in vehicular networks,this paper proposes an adaptive task offloading approach for Vehicle-to-Everything(V2X)environments.Leveraging ... In response to the rising demand for low-latency,computation-intensive applications in vehicular networks,this paper proposes an adaptive task offloading approach for Vehicle-to-Everything(V2X)environments.Leveraging an enhanced Multi-Agent Deep Deterministic Policy Gradient(MADDPG)algorithm with an attention mechanism,the proposed approach optimizes computation offloading and resource allocation,aiming to minimize energy consumption and service delay.In this paper,vehicles dynamically offload computing-intensive tasks to both nearby vehicles through V2V links and roadside units through V2I links.The adaptive attention mechanism enables the system to prioritize relevant state information,leading to faster convergence.Simulations conducted in a realistic urban V2X scenario demonstrate that the proposed Attention-enhanced MADDPG(AT-MADDPG)algorithm significantly improves performance,achieving notable reductions in both energy consumption and latency compared to baseline algorithms,especially in high-demand,dynamic scenarios. 展开更多
关键词 Computation offloading vehicular networks Deep reinforcement learning Adaptive offloading Spectrum and power allocation
在线阅读 下载PDF
An Intelligent Transportation System Application for Smartphones Based on Vehicle Position Advertising and Route Sharing in Vehicular Ad-Hoc Networks 被引量:2
12
作者 Seilendria A. Hadiwardoyo Subhadeep Patra +2 位作者 Carlos T. Calafate Juan-Carlos Cano Pietro Manzoni 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第2期249-262,共14页
Alerting drivers about incoming emergency vehicles and their routes can greatly improve their travel time in congested cities, while reducing the risk of accidents due to distractions. This paper contributes to this g... Alerting drivers about incoming emergency vehicles and their routes can greatly improve their travel time in congested cities, while reducing the risk of accidents due to distractions. This paper contributes to this goal by proposing Messiah, an Android application capable of informing regular vehicles about incoming emergency vehicles like ambulances, police cars and fire brigades. This is made possible by creating a network of vehicles capable of directly communicating between them. The user can, therefore, take driving decisions in a timely manner by considering incoming alerts. Using the support of our GRCBox hardware, the application can rely on vehicular ad-hoc network communications in the 5 GHz band, being V2V (vehicle-to-vehicle) communication provided through a combination of Android-based smartphone and our GRCBox device. The application was tested in three different scenarios with different levels of obstruction, showing that it is capable of providing alerts up to 300 meters, and notifying vehicles within less than one second. 展开更多
关键词 intelligent transportation systems (ITS) vehicular ad-hoc network (VANET) mobile application Android navigation ad-hoc network
原文传递
Lattice-Based Double-Authentication-Preventing Ring Signature for Security and Privacy in Vehicular Ad-Hoc Networks 被引量:11
13
作者 Jinhui Liu Yong Yu +4 位作者 Jianwei Jia Shijia Wang Peiru Fan Houzhen Wang Huanguo Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期575-584,共10页
Amidst the rapid development of the Internet of Things (loT), Vehicular Ad-Hoc NETwork (VANET), a typical loT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives o... Amidst the rapid development of the Internet of Things (loT), Vehicular Ad-Hoc NETwork (VANET), a typical loT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives of individuals. However, there remain challenges for VANETs in preserving privacy and security. In this paper, we propose the first lattice-based Double-Authentication-Preventing Ring Signature (DAPRS) and adopt it to propose a novel privacy-preserving authentication scheme for VANETs, offering the potential for security against quantum computers. The new construction is proven secure against chosen message attacks. Our scheme is more efficient than other ring signature in terms of the time cost of the message signing phase and verification phase, and also in terms of signature length. Analyses of security and efficiency demonstrate that our proposed scheme is provably secure and efficient in the application. 展开更多
关键词 vehicular ad-hoc network(VANET) privacy security Double-Authentication-Preventing Ring Signature(DAPRS) LATTICE
原文传递
An Efficient Content Caching Strategy for Fog-Enabled Road Side Units in Vehicular Networks
14
作者 Faareh Ahmed Babar Mansoor +1 位作者 Muhammad Awais Javed Abdul Khader Jilani Saudagar 《Computer Modeling in Engineering & Sciences》 2025年第9期3783-3804,共22页
Vehicular networks enable seamless connectivity for exchanging emergency and infotainment content.However,retrieving infotainment data from remote servers often introduces high delays,degrading the Quality of Service(... Vehicular networks enable seamless connectivity for exchanging emergency and infotainment content.However,retrieving infotainment data from remote servers often introduces high delays,degrading the Quality of Service(QoS).To overcome this,caching frequently requested content at fog-enabled Road Side Units(RSUs)reduces communication latency.Yet,the limited caching capacity of RSUs makes it impractical to store all contents with varying sizes and popularity.This research proposes an efficient content caching algorithm that adapts to dynamic vehicular demands on highways to maximize request satisfaction.The scheme is evaluated against Intelligent Content Caching(ICC)and Random Caching(RC).The obtained results show that our proposed scheme entertains more contentrequesting vehicles as compared to ICC and RC,with 33%and 41%more downloaded data in 28%and 35%less amount of time from ICC and RC schemes,respectively. 展开更多
关键词 vehicular networks fog computing content caching infotainment services
在线阅读 下载PDF
Optimized Resource Allocation for Dual-Band Cooperation-Based Edge Computing Vehicular Network
15
作者 Cheng Kaijun Fang Xuming 《China Communications》 2025年第9期352-367,共16页
With miscellaneous applications gener-ated in vehicular networks,the computing perfor-mance cannot be satisfied owing to vehicles’limited processing capabilities.Besides,the low-frequency(LF)band cannot further impro... With miscellaneous applications gener-ated in vehicular networks,the computing perfor-mance cannot be satisfied owing to vehicles’limited processing capabilities.Besides,the low-frequency(LF)band cannot further improve network perfor-mance due to its limited spectrum resources.High-frequency(HF)band has plentiful spectrum resources which is adopted as one of the operating bands in 5G.To achieve low latency and sustainable development,a task processing scheme is proposed in dual-band cooperation-based vehicular network where tasks are processed at local side,or at macro-cell base station or at road side unit through LF or HF band to achieve sta-ble and high-speed task offloading.Moreover,a utility function including latency and energy consumption is minimized by optimizing computing and spectrum re-sources,transmission power and task scheduling.Ow-ing to its non-convexity,an iterative optimization algo-rithm is proposed to solve it.Numerical results eval-uate the performance and superiority of the scheme,proving that it can achieve efficient edge computing in vehicular networks. 展开更多
关键词 dual-band cooperation edge computing resource allocation task processing vehicular network
在线阅读 下载PDF
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
16
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5G vehicular networks key agreement key management
在线阅读 下载PDF
Robust Control and Stabilization of Autonomous Vehicular Systems under Deception Attacks and Switching Signed Networks
17
作者 Muflih Alhazmi Waqar Ul Hassan +5 位作者 Saba Shaheen Mohammed M.A.Almazah Azmat Ullah Khan Niazi Nafisa A.Albasheir Ameni Gargouri Naveed Iqbal 《Computer Modeling in Engineering & Sciences》 2025年第11期1903-1940,共38页
This paper proposes a model-based control framework for vehicle platooning systems with secondorder nonlinear dynamics operating over switching signed networks,time-varying delays,and deception attacks.The study inclu... This paper proposes a model-based control framework for vehicle platooning systems with secondorder nonlinear dynamics operating over switching signed networks,time-varying delays,and deception attacks.The study includes two configurations:a leaderless structure using Finite-Time Non-Singular Terminal Bipartite Consensus(FNTBC)and Fixed-Time Bipartite Consensus(FXTBC),and a leader—follower structure ensuring structural balance and robustness against deceptive signals.In the leaderless model,a bipartite controller based on impulsive control theory,gauge transformation,and Markovian switching Lyapunov functions ensures mean-square stability and coordination under deception attacks and communication delays.The FNTBC achieves finite-time convergence depending on initial conditions,while the FXTBC guarantees fixed-time convergence independent of them,providing adaptability to different operating states.In the leader—follower case,a discontinuous impulsive control law synchronizes all followers with the leader despite deceptive attacks and switching topologies,maintaining robust coordination through nonlinear corrective mechanisms.To validate the approach,simulations are conducted on systems of five and seventeen vehicles in both leaderless and leader—follower configurations.The results demonstrate that the proposed framework achieves rapid consensus,strong robustness,and high resistance to deception attacks,offering a secure and scalable model-based control solution for modern vehicular communication networks. 展开更多
关键词 Autonomous vehicles vehicle platooning STABILIZATION decision and control systems switching signed networks leader–follower coordination gauge transformation Lyapunov stability deception and cybe-security attacks secure vehicular networks
在线阅读 下载PDF
Research on Polling MAC Protocols for Flying Ad-Hoc Networks
18
作者 Shujian Wang Zhijun Yang +1 位作者 Hongwei Ding Xiong Wang 《国际计算机前沿大会会议论文集》 2025年第1期489-503,共15页
Flying ad hoc networks(FANETs),which are composed of unmanned aerial vehicles(UAVs),face severe quality-of-service(QoS)challenges because of their high mobility,rapidly changing topologies,and limited infrastructure s... Flying ad hoc networks(FANETs),which are composed of unmanned aerial vehicles(UAVs),face severe quality-of-service(QoS)challenges because of their high mobility,rapidly changing topologies,and limited infrastructure support.Conventional MAC protocols,such as contention-based CSMA/CA,often fail to guarantee low latency and high throughput under these conditions.To address these challenges,this paper investigates the MAC-layer QoS problem in FANETs and proposes a polling-based MAC protocol integrated with the IEEE 802.11 point coordination function(PCF).The protocol adopts a centralized scheduling mechanism using a master node to coordinate data transmission on the basis of a first-in-first-out(FIFO)policy.While this centralized approach simplifies coordination and reduces contention,it introduces limitations regarding scalability and robustness in decentralized or dynamic environments,which are common in FANET scenarios.To analyse protocol behavior,a polling system model is developed with three service strategies:Gated Service,Exhaustive Service,and Limited-1 Service.Analytical models are derived for queue length and delay,and MATLAB simulations validate the feasibility of the proposed scheme.The results show that despite its structural constraints,the proposed protocol can achieve a balance between throughput,delay,and fairness in specific mission-driven UAV applications,such as coordinated surveillance and real-time task distribution.Further research will explore decentralized adaptations to improve protocol flexibility and fault tolerance in dynamic UAV networks. 展开更多
关键词 Flying ad-hoc networks(FANETs) UAV Swarm Communication Polling MAC Proto cols·QualityofService(QoS)
原文传递
Data driven vehicular heterogeneity based intelligent collision avoidance system for Internet of Vehicles(IoV)
19
作者 Iqra Adnan Tariq Umer +3 位作者 Ahmad Arsalan Maryam M.Al Dabel Ali Kashif Bashir Arooj Ansif 《Digital Communications and Networks》 2026年第1期180-197,共18页
The Internet of Vehicles(IoV)is an emerging technology that aims to connect vehicles,infrastructure,and other devices to enable intelligent transportation systems.One of the key challenges in IoV is to ensure safe and... The Internet of Vehicles(IoV)is an emerging technology that aims to connect vehicles,infrastructure,and other devices to enable intelligent transportation systems.One of the key challenges in IoV is to ensure safe and efficient communication among vehicles of different types and capabilities.This paper proposes a data-driven vehicular heterogeneity-based intelligent collision avoidance system for IoV.The system leverages Vehicle-to-Vehicle(V2V)and Vehicle-to-Infrastructure(V2I)communication to collect real-time data about the environment and the vehicles.The data is collected to acknowledge the heterogeneity of vehicles and human behavior.The data is analyzed using machine learning algorithms to identify potential collision risks and recommend appropriate actions to avoid collisions.The system takes into account the heterogeneity of vehicles,such as their size,speed,and maneuverability,to optimize collision avoidance strategies.The proposed system is experimented with real-time datasets and compared with existing collision avoidance systems.The results are shown using the evaluation metrics that show the proposed system can significantly reduce the number of collisions and improve the overall safety and efficiency of IoV with an accuracy of 96.5%using the SVM algorithm.The trial outcomes demonstrated that the new system,incorporating vehicular,weather,and human behavior factors,outperformed previous systems that only considered vehicular and weather aspects.This innovative approach is poised to lead transportation efforts,reducing accident rates and improving the quality of transportation systems in smart cities.By offering predictive capabilities,the proposed model not only helps control accident rates but also prevents them in advance,ensuring road safety. 展开更多
关键词 Internet of Vehicles Collision avoidance Machine learning Traffic safety Autonomous vehicles vehicular networks vehicular heterogeneity Smart transportation Traffic modeling
在线阅读 下载PDF
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
20
作者 Bruno Macena Celio Albuquerque Raphael Machado 《Advances in Internet of Things》 2023年第4期109-118,共10页
As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challe... As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles. 展开更多
关键词 vehicular ad-hoc networks (VANETs) Privacy and Data Protection CYBERSECURITY Pseudonymization Schemes Internet of Vehicles (IoV)
在线阅读 下载PDF
上一页 1 2 57 下一页 到第
使用帮助 返回顶部