Sign in to use this feature.

Years

Between: -

Search Results (500)

Search Parameters:
Keywords = VANET

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
13 pages, 4781 KiB  
Article
An Intelligent System for Determining Driver Anxiety Level: A Comparison Study of Two Fuzzy-Based Models
by Yi Liu and Leonard Barolli
Future Internet 2024, 16(10), 348; https://doi.org/10.3390/fi16100348 - 24 Sep 2024
Abstract
While driving, stress and frustration can affect safe driving and pose the risk of causing traffic accidents. Therefore, it is important to control the driver’s anxiety level in order to improve the driving experience. In this paper, we propose and implement an intelligent [...] Read more.
While driving, stress and frustration can affect safe driving and pose the risk of causing traffic accidents. Therefore, it is important to control the driver’s anxiety level in order to improve the driving experience. In this paper, we propose and implement an intelligent system based on fuzzy logic (FL) for deciding the driver’s anxiety level (DAL). In order to investigate the effects of the considered parameters and compare the evaluation results, we implement two models: DAL Model 1 (DALM1) and DAL Model 2 (DALM2). The input parameters of DALM1 include driving experience (DE), in-car environment conditions (IECs), and driver age (DA), while for DALM2, we add a new parameter called the accident anxiety state (AAS). For both models, the output parameter is DAL. We carried out many simulations and compared the results of DALM1 and DALM2. The evaluation results show that the DAL is very good for drivers’ ages between 30 to 50 years old. However, when the driver’s age is below 30 or above 50, DAL tends to decline. With an increase in DE and IECs, the DAL value is decreased. But when the AAS is increased, the DAL is increased. DALM2 is more complex because the rule base is larger than DALM1, but it makes a better decision of DAL value. Full article
(This article belongs to the Special Issue Edge Intelligence: Edge Computing for 5G and the Internet of Things)
Show Figures

Figure 1

16 pages, 1860 KiB  
Article
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
by Ahmad Kabil, Heba Aslan, Marianne A. Azer and Mohamed Rasslan
Cryptography 2024, 8(3), 43; https://doi.org/10.3390/cryptography8030043 - 17 Sep 2024
Abstract
Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles. This necessitates secure transmission, which requires guarantees of message availability, integrity, source authenticity, and user privacy. Moreover, the traceability of network participants is [...] Read more.
Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles. This necessitates secure transmission, which requires guarantees of message availability, integrity, source authenticity, and user privacy. Moreover, the traceability of network participants is essential as it deters malicious actors and allows lawful authorities to identify message senders for accountability. This introduces a challenge: balancing privacy with traceability. Conditional privacy-preserving authentication (CPPA) schemes are designed to mitigate this conflict. CPPA schemes utilize cryptographic protocols, including certificate-based schemes, group signatures, identity-based schemes, and certificateless schemes. Due to the critical time constraints in VANETs, efficient batch verification techniques are crucial. Combining certificateless schemes with batch verification leads to certificateless aggregate signature (CLAS) schemes. In this paper, cryptanalysis of Xiong’s CLAS scheme revealed its vulnerabilities to partial key replacement and identity replacement attacks, alongside mathematical errors in the batch verification process. Our proposed CLAS scheme remedies these issues by incorporating an identity authentication module that leverages chameleon hashing within elliptic curve cryptography (CHAM-CLAS). The signature and verification modules are also redesigned to address the identified vulnerabilities in Xiong’s scheme. Additionally, we implemented the small exponents test within the batch verification module to achieve Type III security. While this enhances security, it introduces a slight performance trade-off. Our scheme has been subjected to formal security and performance analyses to ensure robustness. Full article
Show Figures

Figure 1

14 pages, 884 KiB  
Article
Secure Cognitive Radio Vehicular Ad Hoc Networks Using Blockchain Technology in Smart Cities
by Fatima Asif, Huma Ghafoor and Insoo Koo
Appl. Sci. 2024, 14(18), 8146; https://doi.org/10.3390/app14188146 - 11 Sep 2024
Abstract
Security is an important consideration when delivering information-aware messages to vehicles that are far away from the current location of the information-sending vehicle. This information helps the receiver to save fuel and time by making wise decisions to avoid damaged or blocked roads. [...] Read more.
Security is an important consideration when delivering information-aware messages to vehicles that are far away from the current location of the information-sending vehicle. This information helps the receiver to save fuel and time by making wise decisions to avoid damaged or blocked roads. To ensure the safety and security of this type of information using blockchain technology, we propose a new cognitive vehicular communication scheme to transfer messages from source to destination. Due to spectrum scarcity in vehicular networks, there needs to be a wireless medium available for every communication link since vehicles require it to communicate. The primary user (PU) makes a public announcement about a free channel to all secondary users nearby and only gives it to authentic vehicles. The authenticity of vehicles is guaranteed by a roadside unit (RSU) that offers secure keys to any vehicle that joins this blockchain network. Those who participate in this network must pay a certain amount and receive rewards for their honesty that exceed the amount spent. To test the performance of various parameters, the proposed scheme utilizes the Ethereum smart contract and compares them to blockchain and non-blockchain methods. Our results show a minimum delivery time of 0.16 s and a minimum overhead of 350 bytes in such a dynamic vehicle environment. Full article
(This article belongs to the Special Issue Transportation in the 21st Century: New Vision on Future Mobility)
Show Figures

Figure 1

20 pages, 2709 KiB  
Article
A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs
by Haitham Y. Adarbah, Mehmet Sabir Kiraz, Suleyman Kardas, Ali H. Al-Bayatti and Hilal M. Y. Al-Bayatti
Future Internet 2024, 16(9), 328; https://doi.org/10.3390/fi16090328 - 9 Sep 2024
Abstract
This work proposes a new architectural approach to enhance the security, privacy, and scalability of VANETs through threshold key management and Privacy Enhancing Technologies (PETs), such as homomorphic encryption and secure multiparty computation, integrated with Decentralized Ledger Technologies (DLTs). These advanced mechanisms are [...] Read more.
This work proposes a new architectural approach to enhance the security, privacy, and scalability of VANETs through threshold key management and Privacy Enhancing Technologies (PETs), such as homomorphic encryption and secure multiparty computation, integrated with Decentralized Ledger Technologies (DLTs). These advanced mechanisms are employed to eliminate centralization and protect the privacy of transferred and processed information in VANETs, thereby addressing privacy concerns. We begin by discussing the weaknesses of existing VANET architectures concerning trust, privacy, and scalability and then introduce a new architectural framework that shifts from centralized to decentralized approaches. This transition applies a decentralized ledger mechanism to ensure correctness, reliability, accuracy, and security against various known attacks. The use of Layer 2 DLTs in our framework enhances key management, trust distribution, and data privacy, offering cost and speed advantages over Layer 1 DLTs, thereby enabling secure vehicle-to-everything (V2X) communication. The proposed framework is superior to other frameworks as it improves decentralized trust management, adopts more efficient PETs, and leverages Layer 2 DLT for scalability. The integration of multiparty threshold key management and homomorphic encryption also enhances data confidentiality and integrity, thus securing against various existing cryptographic attacks. Finally, we discuss potential future developments to improve the security and reliability of VANETs in the next generation of networks, including 5G networks. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

17 pages, 3648 KiB  
Article
Privacy-Preserving Authentication Based on PUF for VANETs
by Lihui Li, Hanwen Deng, Zhongyi Zhai and Sheng-Lung Peng
Future Internet 2024, 16(9), 326; https://doi.org/10.3390/fi16090326 - 8 Sep 2024
Abstract
The secret key is stored in an ideal tamper-proof device so that a vehicle can implement a secure authentication with the road-side units (RSUs) and other drivers. However, some adversaries can capture the secret key by physical attacks. To resist physical attacks, we [...] Read more.
The secret key is stored in an ideal tamper-proof device so that a vehicle can implement a secure authentication with the road-side units (RSUs) and other drivers. However, some adversaries can capture the secret key by physical attacks. To resist physical attacks, we propose a physical-preserving authentication based on a physical unclonable function for vehicular ad hoc networks. In the proposed scheme, a physical unclonable function is deployed on the vehicle and the RSU to provide a challenge–response mechanism. A secret key is only generated by the challenge–response mechanism when it is needed, which eliminates the need to store a long-term secret key. As a result, this prevents secret keys from being captured by adversaries, improving system security. In addition, route planning is introduced into the proposed scheme so that a vehicle can obtain the authentication key of RSUs on its route before vehicle-to-infrastructure authentication, which greatly speeds up the authentication when the vehicle enters the RSUs’ coverage. Furthermore, a detailed analysis demonstrates that the proposed scheme achieves security objectives in vehicular ad hoc networks. Ultimately, when contrasted with similar schemes, the performance assessment demonstrates that our proposed scheme surpasses others in terms of computational overhead, communication overhead and packet loss rate. Full article
Show Figures

Figure 1

23 pages, 2789 KiB  
Article
PSAU-Defender: A Lightweight and Low-Cost Comprehensive Framework for BeiDou Spoofing Mitigation in Vehicular Networks
by Usman Tariq
World Electr. Veh. J. 2024, 15(9), 407; https://doi.org/10.3390/wevj15090407 - 5 Sep 2024
Abstract
The increasing reliance of Vehicular Ad-hoc Networks (VANETs) on the BeiDou Navigation Satellite System (BDS) for precise positioning and timing information has raised significant concerns regarding their vulnerability to spoofing attacks. This research proposes a novel approach to mitigate BeiDou spoofing attacks in [...] Read more.
The increasing reliance of Vehicular Ad-hoc Networks (VANETs) on the BeiDou Navigation Satellite System (BDS) for precise positioning and timing information has raised significant concerns regarding their vulnerability to spoofing attacks. This research proposes a novel approach to mitigate BeiDou spoofing attacks in VANETs by leveraging a hybrid machine learning model that combines XGBoost and Random Forest with a Kalman Filter for real-time anomaly detection in BeiDou signals. It also introduces a geospatial message authentication mechanism to enhance vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication security. The research investigates low-cost and accessible countermeasures against spoofing attacks using COTS receivers and open-source SDRs. Spoofing attack scenarios are implemented in both software and hardware domains using an open-source BeiDou signal simulator to examine the effects of different spoofing attacks on victim receivers and identify detection methods for each type, focusing on pre-correlation techniques with power-related metrics and signal quality monitoring using correlator values. The emulation results demonstrate the effectiveness of the proposed approach in detecting and mitigating BeiDou spoofing attacks in VANETs, ensuring the integrity and reliability of safety-critical information. This research contributes to the development of robust security mechanisms for VANETs and has practical implications for enhancing the resilience of transportation systems against spoofing threats. Future research will focus on extending the proposed approach to other GNSS constellations and exploring the integration of additional security measures to further strengthen VANET security. Full article
Show Figures

Figure 1

20 pages, 5667 KiB  
Article
Optimized Feature Selection for DDoS Attack Recognition and Mitigation in SD-VANETs
by Usman Tariq
World Electr. Veh. J. 2024, 15(9), 395; https://doi.org/10.3390/wevj15090395 - 28 Aug 2024
Viewed by 493
Abstract
Vehicular Ad-Hoc Networks (VANETs) are pivotal to the advancement of intelligent transportation systems (ITS), enhancing safety and efficiency on the road through secure communication networks. However, the integrity of these systems is severely threatened by Distributed Denial-of-Service (DDoS) attacks, which can disrupt the [...] Read more.
Vehicular Ad-Hoc Networks (VANETs) are pivotal to the advancement of intelligent transportation systems (ITS), enhancing safety and efficiency on the road through secure communication networks. However, the integrity of these systems is severely threatened by Distributed Denial-of-Service (DDoS) attacks, which can disrupt the transmission of safety-critical messages and put lives at risk. This research paper focuses on developing robust detection methods and countermeasures to mitigate the impact of DDoS attacks in VANETs. Utilizing a combination of statistical analysis and machine learning techniques (i.e., Autoencoder with Long Short-Term Memory (LSTM), and Clustering with Classification), the study introduces innovative approaches for real-time anomaly detection and system resilience enhancement. Emulation results confirm the effectiveness of the proposed methods in identifying and countering DDoS threats, significantly improving (i.e., 94 percent anomaly detection rate) the security posture of a high mobility-aware ad hoc network. This research not only contributes to the ongoing efforts to secure VANETs against DDoS attacks but also lays the groundwork for more resilient intelligent transportation systems architectures. Full article
Show Figures

Figure 1

23 pages, 654 KiB  
Article
EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V
by Qianmin Du, Jianhong Zhou and Maode Ma
Sensors 2024, 24(16), 5376; https://doi.org/10.3390/s24165376 - 20 Aug 2024
Viewed by 591
Abstract
Vehicle Ad-hoc Networks (VANETs) have experienced significant development in recent years, playing a crucial role in enhancing the driving experience by enabling safer and more efficient inter-vehicle interactions through information exchange. Vehicle-to-Vehicle (V2V) communication is particularly vital as it not only helps to [...] Read more.
Vehicle Ad-hoc Networks (VANETs) have experienced significant development in recent years, playing a crucial role in enhancing the driving experience by enabling safer and more efficient inter-vehicle interactions through information exchange. Vehicle-to-Vehicle (V2V) communication is particularly vital as it not only helps to prevent collisions and improve traffic efficiency but also provides essential situational awareness to drivers or autonomous driving systems. Communication is typically supported by roadside units (RSUs); however, in practical applications, vehicles may exceed the communication range of RSUs, thus exposing them to various malicious attacks. Additionally, considering the limited computational resources of onboard units (OBUs) in vehicles, there is a high demand for designing lightweight security protocols that support V2V communication. To address this issue, this paper proposes an efficient anonymous V2V identity-authentication protocol tailored for scenarios that lack RSU support. The proposed protocol was formally assessed using the Scyther tool, demonstrating its capability to withstand major typical malicious attacks. Performance evaluations indicate that the proposed protocol is efficient in terms of communication and computational overhead, making it a viable solution for V2V communication. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

26 pages, 3806 KiB  
Article
Proposed Supercluster-Based UMBBFS Routing Protocol for Emergency Message Dissemination in Edge-RSU for 5G VANET
by Maath A. Albeyar, Ikram Smaoui, Hassene Mnif and Sameer Alani
Computers 2024, 13(8), 208; https://doi.org/10.3390/computers13080208 - 19 Aug 2024
Viewed by 340
Abstract
Vehicular ad hoc networks (VANETs) can bolster road safety through the proactive dissemination of emergency messages (EMs) among vehicles, effectively reducing the occurrence of traffic-related accidents. It is difficult to transmit EMs quickly and reliably due to the high-speed mobility of VANET and [...] Read more.
Vehicular ad hoc networks (VANETs) can bolster road safety through the proactive dissemination of emergency messages (EMs) among vehicles, effectively reducing the occurrence of traffic-related accidents. It is difficult to transmit EMs quickly and reliably due to the high-speed mobility of VANET and the attenuation of the wireless signal. However, poor network design and high vehicle mobility are the two most difficult problems that affect VANET’s network performance. The real-time traffic situation and network dependability will also be significantly impacted by route selection and message delivery. Many of the current works have undergone studies focused on forwarder selection and message transmission to address these problems. However, these earlier approaches, while effective in forwarder selection and routing, have overlooked the critical aspects of communication overhead and excessive energy consumption, resulting in transmission delays. To address the prevailing challenges, the proposed solutions use edge computing to process and analyze data locally from surrounding cars and infrastructure. EDGE-RSUs are positioned by the side of the road. In intelligent transportation systems, this lowers latency and enhances real-time decision-making by employing proficient forwarder selection techniques and optimizing the dissemination of EMs. In the context of 5G-enabled VANET, this paper introduces a novel routing protocol, namely, the supercluster-based urban multi-hop broadcast and best forwarder selection protocol (UMB-BFS). The improved twin delay deep deterministic policy gradient (IT3DPG) method is used to select the target region for emergency message distribution after route selection. Clustering is conducted using modified density peak clustering (MDPC). Improved firefly optimization (IFO) is used for optimal path selection. In this way, all emergency messages are quickly disseminated to multiple directions and also manage the traffic in VANET. Finally, we plotted graphs for the following metrics: throughput (3.9 kbps), end-to-end delay (70), coverage (90%), packet delivery ratio (98%), packet received (12.75 k), and transmission delay (57 ms). Our approach’s performance is examined using numerical analysis, demonstrating that it performs better than the current methodologies across all measures. Full article
Show Figures

Figure 1

17 pages, 4387 KiB  
Article
Adaptive Load Balancing Approach to Mitigate Network Congestion in VANETS
by Syed Ehsan Haider, Muhammad Faizan Khan and Yousaf Saeed
Computers 2024, 13(8), 194; https://doi.org/10.3390/computers13080194 - 13 Aug 2024
Viewed by 405
Abstract
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, [...] Read more.
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, RSU-based medium access control (MAC) schemes, simplified clustering, and network activity control, a significant gap persists in employing a load-balancing server for effective traffic management. We propose a server-based network congestion handling mechanism (SBNC) in VANETs to bridge this gap. Our approach clusters RSUs within specified ranges and incorporates dedicated load balancing and network scheduler RSUs to manage route selection and request–response scheduling, thereby balancing RSU loads. We introduce three key algorithms: optimal placement of dedicated RSUs, a scheduling policy for packets/data/requests/responses, and a congestion control algorithm for load balancing. Using the VanetMobiSim library of Network Simulator-2 (NS-2), we evaluate our approach based on residual energy consumption, end-to-end delay, packet delivery ratio (PDR), and control packet overhead. Results indicate substantial improvements in load balancing through our proposed server-based approach. Full article
Show Figures

Figure 1

25 pages, 2303 KiB  
Article
Unlinkable and Revocable Signcryption Scheme for VANETs
by Lihui Li, Dongmei Chen, Yining Liu, Yangfan Liang, Yujue Wang and Xianglin Wu
Electronics 2024, 13(16), 3164; https://doi.org/10.3390/electronics13163164 - 10 Aug 2024
Viewed by 417
Abstract
Vehicular ad-hoc networks (VANETs) can significantly improve the level of urban traffic management. However, the sender unlinkability has become an intricate issue in the field of VANETs’ encryption. As the sender signcrypts a message, the receiver has to use the sender’s identity or [...] Read more.
Vehicular ad-hoc networks (VANETs) can significantly improve the level of urban traffic management. However, the sender unlinkability has become an intricate issue in the field of VANETs’ encryption. As the sender signcrypts a message, the receiver has to use the sender’s identity or public key to decrypt it. Consequently, the sender can be traced using the same identity or public key, which poses some security risks to the sender. To address this issue, we present an unlinkable and revocable signcryption scheme (URSCS), where an efficient and powerful signcryption mechanism is adopted for communication. The sender constructs a polynomial to generate a unique session key for each communication, which is then transmitted to a group of receivers, enabling the same secret message to be sent to multiple receivers. Each time a secret message is sent, a new key pair is generated, and an anonymization mechanism is introduced to conceal the true identity of the vehicle, thus preventing malicious attackers from tracing the sender through the public key or the real identity. With the introduction of the identification public key, this scheme supports either multiple receivers or a single receiver, where the receiver can be either road side units (RSUs) or vehicles. Additionally, a complete revocation mechanism is constructed with extremely low communication overhead, utilizing the Chinese remainder theorem (CRT). Formal and informal security analyses demonstrate that our URSCS scheme meets the expected security and privacy requirements of VANETs. The performance analysis shows that our URSCS scheme outperforms other represented schemes. Full article
(This article belongs to the Special Issue Unmanned Aerial Vehicles (UAVs) Communication and Networking)
Show Figures

Figure 1

13 pages, 71992 KiB  
Article
The Impact of Spoofing Attacks in Connected Autonomous Vehicles under Traffic Congestion Conditions
by Zisis-Rafail Tzoannos, Dimitrios Kosmanos, Apostolos Xenakis and Costas Chaikalis
Telecom 2024, 5(3), 747-759; https://doi.org/10.3390/telecom5030037 - 2 Aug 2024
Viewed by 923
Abstract
In recent years, the Internet of Things (IoT) and the Internet of Vehicles (IoV) represent rapidly developing technologies. The majority of car manufacturing companies invest large amounts of money in the field of connected autonomous vehicles. Applications of connected and autonomous vehicles (CAVs) [...] Read more.
In recent years, the Internet of Things (IoT) and the Internet of Vehicles (IoV) represent rapidly developing technologies. The majority of car manufacturing companies invest large amounts of money in the field of connected autonomous vehicles. Applications of connected and autonomous vehicles (CAVs) relate to smart transport services and offer benefits to both society and the environment. However, the development of autonomous vehicles may create vulnerabilities in security systems, through which attacks could harm both vehicles and their drivers. To this end, CAV development in vehicular ad hoc networks (VANETs) requires secure wireless communication. However, this kind of communication is vulnerable to a variety of cyber-attacks, such as spoofing. In essence, this paper presents an in-depth analysis of spoofing attack impacts under realistic road conditions, which may cause some traffic congestion. The novelty of this work has to do with simulation scenarios that take into consideration a set of cross-layer parameters, such as packet delivery ratio (PDR), acceleration, and speed. These parameters can determine the integrity of the exchanged wave short messages (WSMs) and are aggregated in a central trusted authority (CTA) for further analysis. Finally, a statistical metric, coefficient of variation (CoV), which measures the consequences of a cyber-attack in a future crash, is estimated, showing a significant increase (12.1%) in a spoofing attack scenario. Full article
Show Figures

Figure 1

21 pages, 475 KiB  
Article
A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET
by Deokkyu Kwon, Seunghwan Son, Kisung Park and Youngho Park
Mathematics 2024, 12(15), 2383; https://doi.org/10.3390/math12152383 - 31 Jul 2024
Viewed by 564
Abstract
Edge intelligence is a technology that integrates edge computing and artificial intelligence to achieve real-time and localized model generation. Thus, users can receive more precise and personalized services in vehicular ad hoc networks (VANETs) using edge intelligence. However, privacy and security challenges still [...] Read more.
Edge intelligence is a technology that integrates edge computing and artificial intelligence to achieve real-time and localized model generation. Thus, users can receive more precise and personalized services in vehicular ad hoc networks (VANETs) using edge intelligence. However, privacy and security challenges still exist, because sensitive data of the vehicle user is necessary for generating a high-accuracy AI model. In this paper, we propose an authentication scheme to preserve the privacy of user data in edge intelligence-enabled VANETs. The proposed scheme can establish a secure communication channel using fuzzy extractor, elliptic curve cryptography (ECC), and physical unclonable function (PUF) technology. The proposed data upload process can provide privacy of the data using local differential privacy and symmetric key encryption. We validate the security robustness of the proposed scheme using informal analysis, the Real-Or-Random (ROR) model, and the Scyther tool. Moreover, we evaluate the computation and communication efficiency of the proposed and related schemes using Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) software development kit (SDK). We simulate the practical deployment of the proposed scheme using network simulator 3 (NS-3). Our results show that the proposed scheme has a performance improvement of 10∼48% compared to the state-of-the-art research. Thus, we can demonstrate that the proposed scheme provides comprehensive and secure communication for data management in edge intelligence-enabled VANET environments. Full article
Show Figures

Figure 1

47 pages, 2597 KiB  
Review
A Survey on Artificial-Intelligence-Based Internet of Vehicles Utilizing Unmanned Aerial Vehicles
by Syed Ammad Ali Shah, Xavier Fernando and Rasha Kashef
Drones 2024, 8(8), 353; https://doi.org/10.3390/drones8080353 - 29 Jul 2024
Viewed by 1153
Abstract
As Autonomous Vehicles continue to advance and Intelligent Transportation Systems are implemented globally, vehicular ad hoc networks (VANETs) are increasingly becoming a part of the Internet, creating the Internet of Vehicles (IoV). In an IoV framework, vehicles communicate with each other, roadside units [...] Read more.
As Autonomous Vehicles continue to advance and Intelligent Transportation Systems are implemented globally, vehicular ad hoc networks (VANETs) are increasingly becoming a part of the Internet, creating the Internet of Vehicles (IoV). In an IoV framework, vehicles communicate with each other, roadside units (RSUs), and the surrounding infrastructure, leveraging edge, fog, and cloud computing for diverse tasks. These networks must support dynamic vehicular mobility and meet strict Quality of Service (QoS) requirements, such as ultra-low latency and high throughput. Terrestrial wireless networks often fail to satisfy these needs, which has led to the integration of Unmanned Aerial Vehicles (UAVs) into IoV systems. UAV transceivers provide superior line-of-sight (LOS) connections with vehicles, offering better connectivity than ground-based RSUs and serving as mobile RSUs (mRSUs). UAVs improve IoV performance in several ways, but traditional optimization methods are inadequate for dynamic vehicular environments. As a result, recent studies have been incorporating Artificial Intelligence (AI) and Machine Learning (ML) algorithms into UAV-assisted IoV systems to enhance network performance, particularly in complex areas like resource allocation, routing, and mobility management. This survey paper reviews the latest AI/ML research in UAV-IoV networks, with a focus on resource and trajectory management and routing. It analyzes different AI techniques, their training features, and architectures from various studies; addresses the limitations of AI methods, including the demand for computational resources, availability of real-world data, and the complexity of AI models in UAV-IoV contexts; and considers future research directions in UAV-IoV. Full article
(This article belongs to the Special Issue Wireless Networks and UAV)
Show Figures

Figure 1

34 pages, 14611 KiB  
Article
Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles
by Mira M. Zarie, Abdelhamied A. Ateya, Mohammed S. Sayed, Mohammed ElAffendi and Mohammad Mahmoud Abdellatif
Future Internet 2024, 16(7), 257; https://doi.org/10.3390/fi16070257 - 19 Jul 2024
Viewed by 758
Abstract
The fifth-generation (5G) cellular infrastructure is expected to bring about the widespread use of connected vehicles. This technological progress marks the beginning of a new era in vehicular networks, which includes a range of different types and services of self-driving cars and the [...] Read more.
The fifth-generation (5G) cellular infrastructure is expected to bring about the widespread use of connected vehicles. This technological progress marks the beginning of a new era in vehicular networks, which includes a range of different types and services of self-driving cars and the smooth sharing of information between vehicles. Connected vehicles have also been announced as a main use case of the sixth-generation (6G) cellular, with ultimate requirements beyond the 5G (B5G) and 6G eras. These networks require full coverage, extremely high reliability and availability, very low latency, and significant system adaptability. The significant specifications set for vehicular networks pose considerable design and development challenges. The goals of establishing a latency of 1 millisecond, effectively handling large amounts of data traffic, and facilitating high-speed mobility are of utmost importance. To address these difficulties and meet the demands of upcoming networks, e.g., 6G, it is necessary to improve the performance of vehicle networks by incorporating innovative technology into existing network structures. This work presents significant enhancements to vehicular networks to fulfill the demanding specifications by utilizing state-of-the-art technologies, including distributed edge computing, e.g., mobile edge computing (MEC) and fog computing, software-defined networking (SDN), and microservice. The work provides a novel vehicular network structure based on micro-services architecture that meets the requirements of 6G networks. The required offloading scheme is introduced, and a handover algorithm is presented to provide seamless communication over the network. Moreover, a migration scheme for migrating data between edge servers was developed. The work was evaluated in terms of latency, availability, and reliability. The results outperformed existing traditional approaches, demonstrating the potential of our approach to meet the demanding requirements of next-generation vehicular networks. Full article
(This article belongs to the Special Issue Moving towards 6G Wireless Technologies)
Show Figures

Figure 1

Back to TopTop