1
|
Huang J, Xu C, Ji Z, Xiao S, Liu T, Ma N, Zhou Q. An Intelligent Channel Estimation Algorithm Based on Extended Model for 5G-V2X. Big Data 2024; 12:127-140. [PMID: 36848263 DOI: 10.1089/big.2022.0029] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/18/2023]
Abstract
Car networking systems based on 5G-V2X (vehicle-to-everything) have high requirements for reliability and low-latency communication to further improve communication performance. In the V2X scenario, this article establishes an extended model (basic expansion model) suitable for high-speed mobile scenarios based on the sparsity of the channel impulse response. And propose a channel estimation algorithm based on deep learning, the method designed a multilayer convolutional neural network to complete frequency domain interpolation. A two-way control cycle gating unit (bidirectional gated recurrent unit) is designed to predict the state in the time domain. And introduce speed parameters and multipath parameters to accurately train channel data under different moving speed environments. System simulation shows that the proposed algorithm can accurately train the number of channels. Compared with the traditional car networking channel estimation algorithm, the proposed algorithm improves the accuracy of channel estimation and effectively reduces the bit error rate.
Collapse
Affiliation(s)
- Jie Huang
- Beijing Information Technology College, Beijing, China
| | - Cheng Xu
- Beijing Key Laboratory of Information Service Engineering, Beijing Union University, Beijing, China
| | - Zhaohua Ji
- Beijing Information Technology College, Beijing, China
| | - Shan Xiao
- Beijing Information Technology College, Beijing, China
| | - Teng Liu
- Beijing Key Laboratory of Information Service Engineering, Beijing Union University, Beijing, China
| | - Nan Ma
- Beijing University of Technology, Beijing, China
| | - Qinghui Zhou
- Beijing University of Civil Engineering and Architecture, Beijing, China
| |
Collapse
|
2
|
Wang Y, Mahmood A, Sabri MFM, Zen H, Kho LC. MESMERIC: Machine Learning-Based Trust Management Mechanism for the Internet of Vehicles. Sensors (Basel) 2024; 24:863. [PMID: 38339580 PMCID: PMC10857207 DOI: 10.3390/s24030863] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/20/2023] [Revised: 01/18/2024] [Accepted: 01/25/2024] [Indexed: 02/12/2024]
Abstract
The emerging yet promising paradigm of the Internet of Vehicles (IoV) has recently gained considerable attention from researchers from academia and industry. As an indispensable constituent of the futuristic smart cities, the underlying essence of the IoV is to facilitate vehicles to exchange safety-critical information with the other vehicles in their neighborhood, vulnerable pedestrians, supporting infrastructure, and the backbone network via vehicle-to-everything communication in a bid to enhance the road safety by mitigating the unwarranted road accidents via ensuring safer navigation together with guaranteeing the intelligent traffic flows. This requires that the safety-critical messages exchanged within an IoV network and the vehicles that disseminate the same are highly reliable (i.e., trustworthy); otherwise, the entire IoV network could be jeopardized. A state-of-the-art trust-based mechanism is, therefore, highly imperative for identifying and removing malicious vehicles from an IoV network. Accordingly, in this paper, a machine learning-based trust management mechanism, MESMERIC, has been proposed that takes into account the notions of direct trust (encompassing the trust attributes of interaction success rate, similarity, familiarity, and reward and punishment), indirect trust (involving confidence of a particular trustor on the neighboring nodes of a trustee, and the direct trust between the said neighboring nodes and the trustee), and context (comprising vehicle types and operating scenarios) in order to not only ascertain the trust of vehicles in an IoV network but to segregate the trustworthy vehicles from the untrustworthy ones by means of an optimal decision boundary. A comprehensive evaluation of the envisaged trust management mechanism has been carried out which demonstrates that it outperforms other state-of-the-art trust management mechanisms.
Collapse
Affiliation(s)
- Yingxun Wang
- Faculty of Engineering, Universiti Malaysia Sarawak, Kota Samarahan 94300, Sarawak, Malaysia; (M.F.M.S.); (L.C.K.)
- Faculty of Computer and Information Engineering, Qilu Institute of Technology, Jinan 250200, China
| | - Adnan Mahmood
- School of Computing, Macquarie University, Sydney, NSW 2109, Australia;
| | | | - Hushairi Zen
- Faculty of Engineering and Technology, i-CATS University College, Kuching 93350, Sarawak, Malaysia;
| | - Lee Chin Kho
- Faculty of Engineering, Universiti Malaysia Sarawak, Kota Samarahan 94300, Sarawak, Malaysia; (M.F.M.S.); (L.C.K.)
| |
Collapse
|
3
|
Alalwany E, Mahgoub I. Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions. Sensors (Basel) 2024; 24:368. [PMID: 38257461 PMCID: PMC10819911 DOI: 10.3390/s24020368] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/29/2023] [Revised: 01/04/2024] [Accepted: 01/05/2024] [Indexed: 01/24/2024]
Abstract
The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is a subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a mobile and wireless network. Numerous vehicles, users, things, and networks allow nodes to communicate information with their surroundings via various communication channels. IoV aims to enhance the comfort of driving, improve energy management, secure data transmission, and prevent road accidents. Despite IoV's advantages, it comes with its own set of challenges, particularly in the highly important aspects of security and trust. Trust management is one of the potential security mechanisms aimed at increasing reliability in IoV environments. Protecting IoV environments from diverse attacks poses significant challenges, prompting researchers to explore various technologies for security solutions and trust evaluation methods. Traditional approaches have been employed, but innovative solutions are imperative. Amid these challenges, machine learning (ML) has emerged as a potent solution, leveraging its remarkable advancements to effectively address IoV's security and trust concerns. ML can potentially be utilized as a powerful technology to address security and trust issues in IoV environments. In this survey, we delve into an overview of IoV and trust management, discussing security requirements, challenges, and attacks. Additionally, we introduce a classification scheme for ML techniques and survey ML-based security and trust management schemes. This research provides an overview for understanding IoV and the potential of ML in improving its security framework. Additionally, it provides insights into the future of trust and security enhancement.
Collapse
Affiliation(s)
- Easa Alalwany
- College of Computer Science and Engineering, Taibah University, Yanbu 46421, Saudi Arabia;
| | - Imad Mahgoub
- Electrical Engineering & Computer Science, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA
| |
Collapse
|
4
|
Gou W, Zhang H, Zhang R. Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles. Sensors (Basel) 2023; 23:8788. [PMID: 37960485 PMCID: PMC10650551 DOI: 10.3390/s23218788] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/30/2023] [Revised: 10/20/2023] [Accepted: 10/26/2023] [Indexed: 11/15/2023]
Abstract
The Internet of Vehicles(IoV) employs vehicle-to-everything (V2X) technology to establish intricate interconnections among the Internet, the IoT network, and the Vehicle Networks (IVNs), forming a complex vehicle communication network. However, the vehicle communication network is very vulnerable to attacks. The implementation of an intrusion detection system (IDS) emerges as an essential requisite to ensure the security of in-vehicle/inter-vehicle communication in IoV. Within this context, the imbalanced nature of network traffic data and the diversity of network attacks stand as pivotal factors in IDS performance. On the one hand, network traffic data often heavily suffer from data imbalance, which impairs the detection performance. To address this issue, this paper employs a hybrid approach combining the Synthetic Minority Over-sampling Technique (SMOTE) and RandomUnderSampler to achieve a balanced class distribution. On the other hand, the diversity of network attacks constitutes another significant factor contributing to poor intrusion detection model performance. Most current machine learning-based IDSs mainly perform binary classification, while poorly dealing with multiclass classification. This paper proposes an adaptive tree-based ensemble network as the intrusion detection engine for the IDS in IoV. This engine employs a deep-layer structure, wherein diverse ML models are stacked as layers and are interconnected in a cascading manner, which enables accurate and efficient multiclass classification, facilitating the precise identification of diverse network attacks. Moreover, a machine learning-based approach is used for feature selection to reduce feature dimensionality, substantially alleviating the computational overhead. Finally, we evaluate the proposed IDS performance on various cyber-attacks from the in-vehicle and external networks in IoV by using the network intrusion detection dataset CICIDS2017 and the vehicle security dataset Car-Hacking. The experimental results demonstrate remarkable performance, with an F1-score of 0.965 on the CICIDS2017 dataset and an F1-score of 0.9999 on the Car-Hacking dataset. These scores demonstrate that our IDS can achieve efficient and precise multiclass classification. This research provides a valuable reference for ensuring the cybersecurity of IoV.
Collapse
Affiliation(s)
- Wanting Gou
- China Telecom Research Institute, Guangzhou 510630, China;
| | - Haodi Zhang
- China Telecom Research Institute, Guangzhou 510630, China;
| | - Ronghui Zhang
- Guangdong Provincial Key Laboratory of Intelligent Transport System, School of Intelligent Systems Engineering, Sun Yat-sen University, Guangzhou 510275, China;
| |
Collapse
|
5
|
Bhukya CR, Thakur P, Mudhivarthi BR, Singh G. Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives. Sensors (Basel) 2023; 23:8107. [PMID: 37836937 PMCID: PMC10575081 DOI: 10.3390/s23198107] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/02/2023] [Revised: 09/13/2023] [Accepted: 09/22/2023] [Indexed: 10/15/2023]
Abstract
The "Internet-of-Medical-Vehicles (IOMV)" is one of the special applications of the Internet of Things resulting from combining connected healthcare and connected vehicles. As the IOMV communicates with a variety of networks along its travel path, it incurs various security risks due to sophisticated cyber-attacks. This can endanger the onboard patient's life. So, it is critical to understand subjects related to "cybersecurity" in the IOMV to develop robust cybersecurity measures. In this paper, the goal is to evaluate recent trends and state-of-the-art publications, gaps, and future outlooks related to this research area. With this aim, a variety of publications between 2016 and 2023 from "Web-of-Science" and "Scopus" databases were analysed. Our analysis revealed that the IOMV is a niche and unexplored research area with few defined standards and frameworks, and there is a great need to implement robust cybersecurity measures. This paper will help researchers to gain a comprehensive idea of this niche research topic, as it presents an analysis of top journals and highly cited papers, their challenges and limitations, the system model and architecture of the IOMV, related applicable standards, potential cyber-attacks, factors causing cybersecurity risks, various artificial intelligence techniques for developing potential countermeasures, the assessment and parameterisation of cybersecurity risks, constraints and challenges, and future outlooks for implementing cybersecurity measures in the IOMV.
Collapse
Affiliation(s)
- Chidambar Rao Bhukya
- Symbiosis Institute of Technology, Symbiosis International Deemed University (SIDU), Pune 412115, India; (C.R.B.); (B.R.M.); (G.S.)
| | - Prabhat Thakur
- Symbiosis Institute of Technology, Symbiosis International Deemed University (SIDU), Pune 412115, India; (C.R.B.); (B.R.M.); (G.S.)
- Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg 2006, South Africa
| | - Bhavesh Raju Mudhivarthi
- Symbiosis Institute of Technology, Symbiosis International Deemed University (SIDU), Pune 412115, India; (C.R.B.); (B.R.M.); (G.S.)
| | - Ghanshyam Singh
- Symbiosis Institute of Technology, Symbiosis International Deemed University (SIDU), Pune 412115, India; (C.R.B.); (B.R.M.); (G.S.)
| |
Collapse
|
6
|
Ruan W, Liu J, Chen Y, Islam SMN, Alam M. A Double-Layer Blockchain Based Trust Management Model for Secure Internet of Vehicles. Sensors (Basel) 2023; 23:4699. [PMID: 37430611 DOI: 10.3390/s23104699] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/19/2023] [Revised: 04/26/2023] [Accepted: 05/03/2023] [Indexed: 07/12/2023]
Abstract
The Internet of Vehicles (IoV) enables vehicles to share data that help vehicles perceive the surrounding environment. However, vehicles can spread false information to other IoV nodes; this incorrect information misleads vehicles and causes confusion in traffic, therefore, a vehicular trust model is needed to check the trustworthiness of the message. To eliminate the spread of false information and detect malicious nodes, we propose a double-layer blockchain trust management (DLBTM) mechanism to objectively and accurately evaluate the trustworthiness of vehicle messages. The double-layer blockchain consists of the vehicle blockchain and the RSU blockchain. We also quantify the evaluation behavior of vehicles to show the trust value of the vehicle's historical behavior. Our DLBTM uses logistic regression to accurately compute the trust value of vehicles, and then predict the probability of vehicles providing satisfactory service to other nodes in the next stage. The simulation results show that our DLBTM can effectively identify malicious nodes, and over time, the system can recognize at least 90% of malicious nodes.
Collapse
Affiliation(s)
- Wenbo Ruan
- School of Cyberspace Security, Hangzhou Dianzi University, Hangzhou 310018, China
- Key Laboratory of Discrete Industrial Internet of Things of Zhejiang Province, Hangzhou 310018, China
| | - Jia Liu
- School of Cyberspace Security, Hangzhou Dianzi University, Hangzhou 310018, China
- Key Laboratory of Discrete Industrial Internet of Things of Zhejiang Province, Hangzhou 310018, China
| | - Yuanfang Chen
- School of Cyberspace Security, Hangzhou Dianzi University, Hangzhou 310018, China
- Key Laboratory of Discrete Industrial Internet of Things of Zhejiang Province, Hangzhou 310018, China
| | - Sardar M N Islam
- Institute for Sustainable Industries and Liveable Cities (ISILC), Victoria University, Melbourne, VIC 3030, Australia
| | - Muhammad Alam
- School of Engineering, London South Bank University, London SE1 0AA, UK
| |
Collapse
|
7
|
Xing L, Wang K, Wu H, Ma H, Zhang X. Intrusion Detection Method for Internet of Vehicles Based on Parallel Analysis of Spatio-Temporal Features. Sensors (Basel) 2023; 23:s23094399. [PMID: 37177603 PMCID: PMC10181641 DOI: 10.3390/s23094399] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/06/2023] [Revised: 04/26/2023] [Accepted: 04/26/2023] [Indexed: 05/15/2023]
Abstract
The problems with network security that the Internet of Vehicles (IoV) faces are becoming more noticeable as it continues to evolve. Deep learning-based intrusion detection techniques can assist the IoV in preventing network threats. However, previous methods usually employ a single deep learning model to extract temporal or spatial features, or extract spatial features first and then temporal features in a serial manner. These methods usually have the problem of insufficient extraction of spatio-temporal features of the IoV, which affects the performance of intrusion detection and leads to a high false-positive rate. To solve the above problems, this paper proposes an intrusion detection method for IoV based on parallel analysis of spatio-temporal features (PA-STF). First, we built an optimal subset of features based on feature correlations of IoV traffic. Then, we used the temporal convolutional network (TCN) and long short-term memory (LSTM) to extract spatio-temporal features in the IoV traffic in a parallel manner. Finally, we fused the spatio-temporal features extracted in parallel based on the self-attention mechanism and used a multilayer perceptron to detect attacks in the Internet of Vehicles. The experimental results show that the PA-STF method reduces the false-positive rate by 1.95% and 1.57% on the NSL-KDD and UNSW-NB15 datasets, respectively, with the accuracy and F1 score also being superior.
Collapse
Affiliation(s)
- Ling Xing
- School of Information Engineering, Henan University of Science and Technology, Luoyang 471000, China
| | - Kun Wang
- School of Information Engineering, Henan University of Science and Technology, Luoyang 471000, China
| | - Honghai Wu
- School of Information Engineering, Henan University of Science and Technology, Luoyang 471000, China
| | - Huahong Ma
- School of Information Engineering, Henan University of Science and Technology, Luoyang 471000, China
| | - Xiaohui Zhang
- School of Information Engineering, Henan University of Science and Technology, Luoyang 471000, China
| |
Collapse
|
8
|
Ijemaru GK, Ang LM, Seng KP. Swarm Intelligence Internet of Vehicles Approaches for Opportunistic Data Collection and Traffic Engineering in Smart City Waste Management. Sensors (Basel) 2023; 23:2860. [PMID: 36905062 PMCID: PMC10006939 DOI: 10.3390/s23052860] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/31/2023] [Revised: 03/02/2023] [Accepted: 03/03/2023] [Indexed: 06/18/2023]
Abstract
Recent studies have shown the efficacy of mobile elements in optimizing the energy consumption of sensor nodes. Current data collection approaches for waste management applications focus on exploiting IoT-enabled technologies. However, these techniques are no longer sustainable in the context of smart city (SC) waste management applications due to the emergence of large-scale wireless sensor networks (LS-WSNs) in smart cities with sensor-based big data architectures. This paper proposes an energy-efficient swarm intelligence (SI) Internet of Vehicles (IoV)-based technique for opportunistic data collection and traffic engineering for SC waste management strategies. This is a novel IoV-based architecture exploiting the potential of vehicular networks for SC waste management strategies. The proposed technique involves deploying multiple data collector vehicles (DCVs) traversing the entire network for data gathering via a single-hop transmission. However, employing multiple DCVs comes with additional challenges including costs and network complexity. Thus, this paper proposes analytical-based methods to investigate critical tradeoffs in optimizing energy consumption for big data collection and transmission in an LS-WSN such as (1) finding the optimal number of data collector vehicles (DCVs) required in the network and (2) determining the optimal number of data collection points (DCPs) for the DCVs. These critical issues affect efficient SC waste management and have been overlooked by previous studies exploring waste management strategies. Simulation-based experiments using SI-based routing protocols validate the efficacy of the proposed method in terms of the evaluation metrics.
Collapse
Affiliation(s)
- Gerald K. Ijemaru
- School of Science, Technology & Engineering, University of the Sunshine Coast, Moreton Bay Campus, 1 Moreton Parade, Petrie, QLD 4502, Australia
| | - Li-Minn Ang
- School of Science, Technology & Engineering, University of the Sunshine Coast, Moreton Bay Campus, 1 Moreton Parade, Petrie, QLD 4502, Australia
| | - Kah Phooi Seng
- School of AI and Advanced Computing, Xian Jiaotong Liverpool University, Suzhou 215123, China
| |
Collapse
|
9
|
Siddiqui SA, Mahmood A, Sheng QZ, Suzuki H, Ni W. Towards a Machine Learning Driven Trust Management Heuristic for the Internet of Vehicles. Sensors (Basel) 2023; 23:2325. [PMID: 36850923 PMCID: PMC9967436 DOI: 10.3390/s23042325] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/16/2023] [Revised: 02/13/2023] [Accepted: 02/16/2023] [Indexed: 06/18/2023]
Abstract
The rapid proliferation of the emerging yet promising notion of the Internet-of-Vehicles (IoV) has led to the development of a variety of conventional trust assessment schemes to tackle insider attackers. The primary reliance of these frameworks is on the accumulation of individual trust attributes. While aggregating these influential parameters, weights are often associated with each individual attribute to reflect its impact on the final trust score. It is of paramount importance that such weights be precise to lead to an accurate trust assessment. Moreover, the value of the minimum acceptable trust threshold employed for the identification of dishonest vehicles needs to be carefully defined to avoid delayed or erroneous detection. This paper employs an IoT data set from CRAWDAD by suitably transforming it into an IoV format. This data set encompasses information regarding 18,226 interactions among 76 nodes, both honest and dishonest. First, the influencing parameters (i.e., packet delivery ratio, familiarity, timeliness and interaction frequency) were computed, and two feature matrices were formed. The first matrix (FM1) takes into account all the pairwise individual parameters as individual features, whereas the second matrix (FM2) considers the average of all pairwise computations performed for each individual parameter as one feature. Subsequently, unsupervised learning is employed to achieve the ground truth prior to applying supervised machine learning algorithms for classification purposes. It is worth noting that Subspace KNN yielded a perfect precision, recall, and the F1-score equal to 1 for individual parametric scores, whereas Subspace Discriminant returned an ideal precision, recall, and the F1-score equal to 1 for mean parametric scores. It is also evident from extensive simulations that FM2 yielded more accurate classification results compared to FM1. Furthermore, decision boundaries among honest and dishonest vehicles have also been computed for respective feature matrices.
Collapse
Affiliation(s)
- Sarah Ali Siddiqui
- School of Computing, Macquarie University, Sydney, NSW 2109, Australia
- Data61, Commonwealth Science and Industrial Research Organisation (CSIRO), Marsfield, NSW 2122, Australia
| | - Adnan Mahmood
- School of Computing, Macquarie University, Sydney, NSW 2109, Australia
| | - Quan Z. Sheng
- School of Computing, Macquarie University, Sydney, NSW 2109, Australia
| | - Hajime Suzuki
- Data61, Commonwealth Science and Industrial Research Organisation (CSIRO), Marsfield, NSW 2122, Australia
| | - Wei Ni
- Data61, Commonwealth Science and Industrial Research Organisation (CSIRO), Marsfield, NSW 2122, Australia
| |
Collapse
|
10
|
Biswas A, Wang HC. Autonomous Vehicles Enabled by the Integration of IoT, Edge Intelligence, 5G, and Blockchain. Sensors (Basel) 2023; 23:1963. [PMID: 36850560 PMCID: PMC9963447 DOI: 10.3390/s23041963] [Citation(s) in RCA: 4] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/05/2022] [Revised: 02/02/2023] [Accepted: 02/06/2023] [Indexed: 06/18/2023]
Abstract
The wave of modernization around us has put the automotive industry on the brink of a paradigm shift. Leveraging the ever-evolving technologies, vehicles are steadily transitioning towards automated driving to constitute an integral part of the intelligent transportation system (ITS). The term autonomous vehicle has become ubiquitous in our lives, owing to the extensive research and development that frequently make headlines. Nonetheless, the flourishing of AVs hinges on many factors due to the extremely stringent demands for safety, security, and reliability. Cutting-edge technologies play critical roles in tackling complicated issues. Assimilating trailblazing technologies such as the Internet of Things (IoT), edge intelligence (EI), 5G, and Blockchain into the AV architecture will unlock the potential of an efficient and sustainable transportation system. This paper provides a comprehensive review of the state-of-the-art in the literature on the impact and implementation of the aforementioned technologies into AV architectures, along with the challenges faced by each of them. We also provide insights into the technological offshoots concerning their seamless integration to fulfill the requirements of AVs. Finally, the paper sheds light on future research directions and opportunities that will spur further developments. Exploring the integration of key enabling technologies in a single work will serve as a valuable reference for the community interested in the relevant issues surrounding AV research.
Collapse
Affiliation(s)
- Anushka Biswas
- Department of Power Engineering, Jadavpur University, Kolkata 700056, India
| | - Hwang-Cheng Wang
- Department of Electronic Engineering, National Ilan University, Yilan 260007, Taiwan
| |
Collapse
|
11
|
Zhou C, Lu H, Xiang Y, Wu J, Wang F. Geohash-Based Rapid Query Method of Regional Transactions in Blockchain for Internet of Vehicles. Sensors (Basel) 2022; 22:8885. [PMID: 36433481 PMCID: PMC9693887 DOI: 10.3390/s22228885] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/23/2022] [Revised: 11/10/2022] [Accepted: 11/15/2022] [Indexed: 06/16/2023]
Abstract
Many researchers have introduced blockchain into the Internet of Vehicles (IoV) to support trading or other authentication applications between vehicles. However, the traditional blockchain cannot well support the query of transactions that occur in a specified area which is important for vehicle users since they are bound to the geolocations. Therefore, the querying efficiency of the geolocation attribute of transactions is vital for blockchain-based applications. Existing work does not well handle the geolocation of vehicles in the blockchain, and thus the querying efficiency is questionable. In this paper, we design a rapid query method of regional transactions in blockchain for IoV, including data structures and query algorithms. The main idea is to utilize the Geohash code to represent the area and serve as the key for transaction indexing and querying, and the geolocation is marked as one of the attributes of transactions in the blockchain. To further verify and evaluate the proposed design, on the basis of the implementation of Ethereum, which is a well-known blockchain, the results show that the proposed design achieves significantly better-querying speed than Ethereum.
Collapse
Affiliation(s)
- Chang Zhou
- School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
| | - Huimei Lu
- School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
| | - Yong Xiang
- Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
| | - Jingbang Wu
- School of Computer and Information Engineering, Beijing Technology and Business University, Beijing 102488, China
| | - Feng Wang
- Department of Computer and Information Science, University of Mississippi, Oxford, MS 38677, USA
| |
Collapse
|
12
|
Wang Z, Dong P, Zhang Y, Zhang H. A Data-Driven Noninteractive Authentication Scheme for the Internet of Vehicles in Mobile Heterogeneous Networks. Sensors (Basel) 2022; 22:8623. [PMID: 36433220 PMCID: PMC9699295 DOI: 10.3390/s22228623] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/29/2022] [Revised: 10/26/2022] [Accepted: 11/04/2022] [Indexed: 06/16/2023]
Abstract
The rapid development of intelligent vehicle networking technology has posed new requirements for in-vehicle gateway authentication security in the heterogeneous Internet of Vehicles (IoV). The current research on network layer authentication mechanisms usually relies on PKI infrastructure and interactive key agreement protocols, which have poor support for mobile and multihomed devices. Due to bandwidth and interaction delay overheads, they are not suitable for heterogeneous IoV scenarios with network state fluctuations. In this study, we propose a data-driven noninteractive authentication scheme, a lightweight, stateless scheme supporting mobility and multihoming to meet the lightweight data security requirements of the IoV. Our scheme implements device authentication and noninteractive key agreement through context parameters during data communication. Due to saving the signaling interactive delay and certificate overhead, in the IoV scenario, the proposed scheme reduced the delay by 20.1% and 11.8%, respectively, in the authentication and handover processes and brought higher bandwidth aggregation efficiency.
Collapse
|
13
|
Elsagheer Mohamed SA, Alshalfan KA, Al-Hagery MA, Ben Othman MT. Safe Driving Distance and Speed for Collision Avoidance in Connected Vehicles. Sensors (Basel) 2022; 22:s22187051. [PMID: 36146401 PMCID: PMC9504624 DOI: 10.3390/s22187051] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/18/2022] [Revised: 09/10/2022] [Accepted: 09/12/2022] [Indexed: 05/26/2023]
Abstract
Vehicle tailgating or simply tailgating is a hazardous driving habit. Tailgating occurs when a vehicle moves very close behind another one while not leaving adequate separation distance in case the vehicle in front stops unexpectedly; this separation distance is technically called "Assured Clear Distance Ahead" (ACDA) or Safe Driving Distance. Advancements in Intelligent Transportation Systems (ITS) and the Internet of Vehicles (IoV) have made it of tremendous significance to have an intelligent approach for connected vehicles to avoid tailgating; this paper proposes a new Internet of Vehicles (IoV) based technique that enables connected vehicles to determine ACDA or Safe Driving Distance and Safe Driving Speed to avoid a forward collision. The technique assumes two cases: In the first case, the vehicle has Autonomous Emergency Braking (AEB) system, while in the second case, the vehicle has no AEB. Safe Driving Distance and Safe Driving Speed are calculated under several variables. Experimental results show that Safe Driving Distance and Safe Driving Speed depend on several parameters such as weight of the vehicle, tires status, length of the vehicle, speed of the vehicle, type of road (snowy asphalt, wet asphalt, or dry asphalt or icy road) and the weather condition (clear or foggy). The study found that the technique is effective in calculating Safe Driving Distance, thereby resulting in forward collision avoidance by connected vehicles and maximizing road utilization by dynamically enforcing the minimum required safe separating gap as a function of the current values of the affecting parameters, including the speed of the surrounding vehicles, the road condition, and the weather condition.
Collapse
Affiliation(s)
- Samir A. Elsagheer Mohamed
- Computer Engineering Department, College of Computer, Qassim University, Buraydah 52571, Saudi Arabia
- Computer Science and Engineering Department, Egypt-Japan University of Science and Technology (E-JUST), New Borg-El-Arab City 21934, Egypt
- Faculty of Engineering, Aswan University, Qism Aswan 81528, Egypt
| | - Khaled A. Alshalfan
- College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University, Riyadh 11564, Saudi Arabia
| | - Mohammed A. Al-Hagery
- BIND Research Group, College of Computer, Qassim University, Buraydah 52571, Saudi Arabia
- Department of Computer Science, College of Computer, Qassim University, Buraidah 52571, Saudi Arabia
| | - Mohamed Tahar Ben Othman
- BIND Research Group, College of Computer, Qassim University, Buraydah 52571, Saudi Arabia
- Department of Computer Science, College of Computer, Qassim University, Buraidah 52571, Saudi Arabia
| |
Collapse
|
14
|
Ullah S, Khan MA, Ahmad J, Jamal SS, E Huma Z, Hassan MT, Pitropakis N, Arshad, Buchanan WJ. HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors (Basel) 2022; 22:1340. [PMID: 35214241 DOI: 10.3390/s22041340] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/10/2022] [Revised: 01/26/2022] [Accepted: 02/08/2022] [Indexed: 02/04/2023]
Abstract
Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each other. With the emergence of IoV technology, customers have placed great attention on smart vehicles. However, the rapid growth of IoV has also caused many security and privacy challenges that can lead to fatal accidents. To reduce smart vehicle accidents and detect malicious attacks in vehicular networks, several researchers have presented machine learning (ML)-based models for intrusion detection in IoT networks. However, a proficient and real-time faster algorithm is needed to detect malicious attacks in IoV. This article proposes a hybrid deep learning (DL) model for cyber attack detection in IoV. The proposed model is based on long short-term memory (LSTM) and gated recurrent unit (GRU). The performance of the proposed model is analyzed by using two datasets-a combined DDoS dataset that contains CIC DoS, CI-CIDS 2017, and CSE-CIC-IDS 2018, and a car-hacking dataset. The experimental results demonstrate that the proposed algorithm achieves higher attack detection accuracy of 99.5% and 99.9% for DDoS and car hacks, respectively. The other performance scores, precision, recall, and F1-score, also verify the superior performance of the proposed framework.
Collapse
|
15
|
Abbas S, Talib MA, Ahmed A, Khan F, Ahmad S, Kim DH. Blockchain-Based Authentication in Internet of Vehicles: A Survey. Sensors (Basel) 2021; 21:s21237927. [PMID: 34883933 PMCID: PMC8659854 DOI: 10.3390/s21237927] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/28/2021] [Revised: 11/20/2021] [Accepted: 11/22/2021] [Indexed: 11/16/2022]
Abstract
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. In order for the IoV and VANETs environments to be able to offer such beneficial road services, huge amounts of data are generated and exchanged among the different communicated entities in these vehicular networks wirelessly via open channels, which could attract the adversaries and threaten the network with several possible types of security attacks. In this survey, we target the authentication part of the security system while highlighting the efficiency of blockchains in the IoV and VANETs environments. First, a detailed background on IoV and blockchain is provided, followed by a wide range of security requirements, challenges, and possible attacks in vehicular networks. Then, a more focused review is provided on the recent blockchain-based authentication schemes in IoV and VANETs with a detailed comparative study in terms of techniques used, network models, evaluation tools, and attacks counteracted. Lastly, some future challenges for IoV security are discussed that are necessary to be addressed in the upcoming research.
Collapse
Affiliation(s)
- Sohail Abbas
- Department of Computer Science, College of Computing and Informatics, University of Sharjah, Sharjah 27272, United Arab Emirates; (S.A.); (M.A.T.)
| | - Manar Abu Talib
- Department of Computer Science, College of Computing and Informatics, University of Sharjah, Sharjah 27272, United Arab Emirates; (S.A.); (M.A.T.)
| | - Afaf Ahmed
- College of Engineering, Al Ain University, Al Ain 64141, United Arab Emirates;
| | - Faheem Khan
- Department of Computer Engineering, Gachon University, Seongnam-si 13120, Korea;
| | - Shabir Ahmad
- Department of IT Convergence Engineering, Gachon University, Seongnam-si 13120, Korea;
| | - Do-Hyeun Kim
- Department of Computer Engineering, Jeju National University, Jeju 63243, Korea
- Correspondence:
| |
Collapse
|
16
|
Zhang L, Khalgui M, Li Z. Predictive Intelligent Transportation: Alleviating Traffic Congestion in the Internet of Vehicles. Sensors (Basel) 2021; 21:s21217330. [PMID: 34770637 PMCID: PMC8588429 DOI: 10.3390/s21217330] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/28/2021] [Revised: 10/20/2021] [Accepted: 10/25/2021] [Indexed: 12/03/2022]
Abstract
Due to the limitations of data transfer technologies, existing studies on urban traffic control mainly focused on isolated dimension control such as traffic signal control or vehicle route guidance to alleviate traffic congestion. However, in real traffic, the distribution of traffic flow is the result of multiple dimensions whose future state is influenced by each dimension’s decisions. Presently, the development of the Internet of Vehicles enables an integrated intelligent transportation system. This paper proposes an integrated intelligent transportation model that can optimize predictive traffic signal control and predictive vehicle route guidance simultaneously to alleviate traffic congestion based on their feedback regulation relationship. The challenges of this model lie in that the formulation of the nonlinear feedback relationship between various dimensions is hard to describe and the design of a corresponding solving algorithm that can obtain Pareto optimality for multi-dimension control is complex. In the integrated model, we introduce two medium variables—predictive traffic flow and the predictive waiting time—to two-way link the traffic signal control and vehicle route guidance. Inspired by game theory, an asymmetric information exchange framework-based updating distributed algorithm is designed to solve the integrated model. Finally, an experimental study in two typical traffic scenarios shows that more than 73.33% of the considered cases adopting the integrated model achieve Pareto optimality.
Collapse
Affiliation(s)
- Le Zhang
- School of Intelligent Systems Science and Engineering, Jinan University, Zhuhai 519070, China;
| | - Mohamed Khalgui
- School of Intelligent Systems Science and Engineering, Jinan University, Zhuhai 519070, China;
- National Institute of Applied Sciences and Technology, University of Carthage, Tunis 1080, Tunisia
- Correspondence:
| | - Zhiwu Li
- Institute of Systems Engineering, Macau University of Science and Technology, Taipa 999078, Macau;
| |
Collapse
|
17
|
Xiao S, Wang S, Zhuang J, Wang T, Liu J. Research on a Task Offloading Strategy for the Internet of Vehicles Based on Reinforcement Learning. Sensors (Basel) 2021; 21:s21186058. [PMID: 34577265 PMCID: PMC8468814 DOI: 10.3390/s21186058] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/16/2021] [Revised: 09/07/2021] [Accepted: 09/08/2021] [Indexed: 11/26/2022]
Abstract
Today, vehicles are increasingly being connected to the Internet of Things, which enables them to obtain high-quality services. However, the numerous vehicular applications and time-varying network status make it challenging for onboard terminals to achieve efficient computing. Therefore, based on a three-stage model of local-edge clouds and reinforcement learning, we propose a task offloading algorithm for the Internet of Vehicles (IoV). First, we establish communication methods between vehicles and their cost functions. In addition, according to the real-time state of vehicles, we analyze their computing requirements and the price function. Finally, we propose an experience-driven offloading strategy based on multi-agent reinforcement learning. The simulation results show that the algorithm increases the probability of success for the task and achieves a balance between the task vehicle delay, expenditure, task vehicle utility and service vehicle utility under various constraints.
Collapse
Affiliation(s)
- Shuo Xiao
- School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221000, China; (S.X.); (S.W.); (T.W.)
| | - Shengzhi Wang
- School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221000, China; (S.X.); (S.W.); (T.W.)
| | - Jiayu Zhuang
- Agricultural Information Institute, Chinese Academy of Agricultural Sciences, Beijing 100080, China;
- Key Laboratory of Agri-Information Service Technology, Ministry of Agriculture, Beijing 100080, China
- Correspondence:
| | - Tianyu Wang
- School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221000, China; (S.X.); (S.W.); (T.W.)
| | - Jiajia Liu
- Agricultural Information Institute, Chinese Academy of Agricultural Sciences, Beijing 100080, China;
- Key Laboratory of Agri-Information Service Technology, Ministry of Agriculture, Beijing 100080, China
| |
Collapse
|
18
|
Kebande VR, Awaysheh FM, Ikuesan RA, Alawadi SA, Alshehri MD. A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles. Sensors (Basel) 2021; 21:6018. [PMID: 34577224 DOI: 10.3390/s21186018] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/18/2021] [Revised: 08/23/2021] [Accepted: 09/02/2021] [Indexed: 11/17/2022]
Abstract
Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad.
Collapse
|
19
|
Tufail A, Namoun A, Sen AAA, Kim KH, Alrehaili A, Ali A. Moisture Computing-Based Internet of Vehicles (IoV) Architecture for Smart Cities. Sensors (Basel) 2021; 21:3785. [PMID: 34070719 DOI: 10.3390/s21113785] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/22/2021] [Revised: 05/19/2021] [Accepted: 05/24/2021] [Indexed: 11/16/2022]
Abstract
Recently, the concept of combining ‘things’ on the Internet to provide various services has gained tremendous momentum. Such a concept has also impacted the automotive industry, giving rise to the Internet of Vehicles (IoV). IoV enables Internet connectivity and communication between smart vehicles and other devices on the network. Shifting the computing towards the edge of the network reduces communication delays and provides various services instantly. However, both distributed (i.e., edge computing) and central computing (i.e., cloud computing) architectures suffer from several inherent issues, such as high latency, high infrastructure cost, and performance degradation. We propose a novel concept of computation, which we call moisture computing (MC) to be deployed slightly away from the edge of the network but below the cloud infrastructure. The MC-based IoV architecture can be used to assist smart vehicles in collaborating to solve traffic monitoring, road safety, and management issues. Moreover, the MC can be used to dispatch emergency and roadside assistance in case of incidents and accidents. In contrast to the cloud which covers a broader area, the MC provides smart vehicles with critical information with fewer delays. We argue that the MC can help reduce infrastructure costs efficiently since it requires a medium-scale data center with moderate resources to cover a wider area compared to small-scale data centers in edge computing and large-scale data centers in cloud computing. We performed mathematical analyses to demonstrate that the MC reduces network delays and enhances the response time in contrast to the edge and cloud infrastructure. Moreover, we present a simulation-based implementation to evaluate the computational performance of the MC. Our simulation results show that the total processing time (computation delay and communication delay) is optimized, and delays are minimized in the MC as apposed to the traditional approaches.
Collapse
|
20
|
Akhter AFMS, Ahmed M, Shah AFMS, Anwar A, Kayes ASM, Zengin A. A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network. Sensors (Basel) 2021; 21:s21041273. [PMID: 33670097 PMCID: PMC7916867 DOI: 10.3390/s21041273] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/19/2021] [Revised: 02/05/2021] [Accepted: 02/08/2021] [Indexed: 11/16/2022]
Abstract
The efficiency of cooperative communication protocols to increase the reliability and range of transmission for Vehicular Ad hoc Network (VANET) is proven, but identity verification and communication security are required to be ensured. Though it is difficult to maintain strong network connections between vehicles because of there high mobility, with the help of cooperative communication, it is possible to increase the communication efficiency, minimise delay, packet loss, and Packet Dropping Rate (PDR). However, cooperating with unknown or unauthorized vehicles could result in information theft, privacy leakage, vulnerable to different security attacks, etc. In this paper, a blockchain based secure and privacy preserving authentication protocol is proposed for the Internet of Vehicles (IoV). Blockchain is utilized to store and manage the authentication information in a distributed and decentralized environment and developed on the Ethereum platform that uses a digital signature algorithm to ensure confidentiality, non-repudiation, integrity, and preserving the privacy of the IoVs. For optimized communication, transmitted services are categorized into emergency and optional services. Similarly, to optimize the performance of the authentication process, IoVs are categorized as emergency and general IoVs. The proposed cooperative protocol is validated by numerical analyses which show that the protocol successfully increases the system throughput and decreases PDR and delay. On the other hand, the authentication protocol requires minimum storage as well as generates low computational overhead that is suitable for the IoVs with limited computer resources.
Collapse
Affiliation(s)
- A. F. M. Suaib Akhter
- Department of Computer Engineering, Sakarya University, Serdivan 54050, Sakarya, Turkey; (A.F.M.S.A.); (A.Z.)
| | - Mohiuddin Ahmed
- School of Science, Edith Cowan University, Perth, WA 6027, Australia;
| | - A. F. M. Shahen Shah
- Department of Electrical and Electronics Engineering, Istanbul Gelisim University, Avcilar 34315, Istanbul, Turkey;
| | - Adnan Anwar
- Centre for Cyber Security Research and Innovation (CSRI), School of IT, Deakin University, Waurn Ponds, VIC 3216, Australia;
| | - A. S. M. Kayes
- Department of Computer Science and Information Technology, School of Engineering and Mathematical Sciences (SEMS), La Trobe University, Bundoora, VIC 3086, Australia
- Correspondence:
| | - Ahmet Zengin
- Department of Computer Engineering, Sakarya University, Serdivan 54050, Sakarya, Turkey; (A.F.M.S.A.); (A.Z.)
| |
Collapse
|
21
|
Kim DY, Jung M, Kim S. An Internet of Vehicles (IoV) Access Gateway Design Considering the Efficiency of the In-Vehicle Ethernet Backbone. Sensors (Basel) 2020; 21:E98. [PMID: 33375748 DOI: 10.3390/s21010098] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/26/2020] [Revised: 12/16/2020] [Accepted: 12/22/2020] [Indexed: 11/17/2022]
Abstract
A vehicular network is composed of an in-vehicle network (IVN) and Internet of Vehicles (IoV). IVN exchanges information among in-vehicle devices. IoV constructs Vehicle-to-X (V2X) networks outside vehicles and exchanges information among V2X elements. These days, in-vehicle devices that require high bandwidth is increased for autonomous driving services. Thus, the spread of data for vehicles is exploding. This kind of data is exchanged through IoV. Even if the Ethernet backbone of IVN carries a lot of data in the vehicle, the explosive increase in data from outside the vehicle can affect the backbone. That is, the transmission efficiency of the IVN backbone will be reduced due to excessive data traffic. In addition, when IVN data traffic is transmitted to IoV without considering IoV network conditions, the transmission efficiency of IoV is also reduced. Therefore, in this paper, we propose an IoV access gateway to controls the incoming data traffic to the IVN backbone and the outgoing data traffic to the IoV in the network environment where IVN and IoV are integrated. Computer simulations are used to evaluate the performance of the proposed system, and the proposed system shows better performance in the accumulated average transmission delay.
Collapse
|
22
|
Eze J, Zhang S, Liu E, Eze E. Design Optimization of Resource Allocation in OFDMA-Based Cognitive Radio-Enabled Internet of Vehicles (IoVs). Sensors (Basel) 2020; 20:E6402. [PMID: 33182494 DOI: 10.3390/s20216402] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/24/2020] [Revised: 11/04/2020] [Accepted: 11/06/2020] [Indexed: 11/25/2022]
Abstract
Joint optimal subcarrier and transmit power allocation with QoS guarantee for enhanced packet transmission over Cognitive Radio (CR)-Internet of Vehicles (IoVs) is a challenge. This open issue is considered in this paper. A novel SNBS-based wireless radio resource scheduling scheme in OFDMA CR-IoV network systems is proposed. This novel scheduler is termed the SNBS OFDMA-based overlay CR-Assisted Vehicular NETwork (SNO-CRAVNET) scheduling scheme. It is proposed for efficient joint transmit power and subcarrier allocation for dynamic spectral resource access in cellular OFDMA-based overlay CRAVNs in clusters. The objectives of the optimization model applied in this study include (1) maximization of the overall system throughput of the CR-IoV system, (2) avoiding harmful interference of transmissions of the shared channels’ licensed owners (or primary users (PUs)), (3) guaranteeing the proportional fairness and minimum data-rate requirement of each CR vehicular secondary user (CRV-SU), and (4) ensuring efficient transmit power allocation amongst CRV-SUs. Furthermore, a novel approach which uses Lambert-W function characteristics is introduced. Closed-form analytical solutions were obtained by applying time-sharing variable transformation. Finally, a low-complexity algorithm was developed. This algorithm overcame the iterative processes associated with searching for the optimal solution numerically through iterative programming methods. Theoretical analysis and simulation results demonstrated that, under similar conditions, the proposed solutions outperformed the reference scheduler schemes. In comparison to other scheduling schemes that are fairness-considerate, the SNO-CRAVNET scheme achieved a significantly higher overall average throughput gain. Similarly, the proposed time-sharing SNO-CRAVNET allocation based on the reformulated convex optimization problem is shown to be capable of achieving up to 99.987% for the average of the total theoretical capacity.
Collapse
|
23
|
Cao D, Jiang Y, Wang J, Ji B, Alfarraj O, Tolba A, Ma X, Liu Y. ARNS: Adaptive Relay-Node Selection Method for Message Broadcasting in the Internet of Vehicles. Sensors (Basel) 2020; 20:E1338. [PMID: 32121445 DOI: 10.3390/s20051338] [Citation(s) in RCA: 17] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/18/2020] [Revised: 02/27/2020] [Accepted: 02/27/2020] [Indexed: 11/16/2022]
Abstract
The proper utilization of road information can improve the performance of relay-node selection methods. However, the existing schemes are only applicable to a specific road structure, and this limits their application in real-world scenarios where mostly more than one road structure exists in the Region of Interest (RoI), even in the communication range of a sender. In this paper, we propose an adaptive relay-node selection (ARNS) method based on the exponential partition to implement message broadcasting in complex scenarios. First, we improved a relay-node selection method in the curved road scenarios through the re-definition of the optimal position considering the distribution of the obstacles. Then, we proposed a criterion of classifying road structures based on their broadcast characteristics. Finally, ARNS is designed to adaptively apply the appropriate relay-node selection method based on the exponential partition in realistic scenarios. Simulation results on a real-world map show that the end-to-end broadcast delay of ARNS is reduced by at least 13.8% compared to the beacon-based relay-node selection method, and at least 14.0% compared to the trinary partitioned black-burst-based broadcast protocol (3P3B)-based relay-node selection method. The broadcast coverage is increased by 3.6-7% in curved road scenarios, with obstacles benefitting from the consideration of the distribution of obstacles. Moreover, ARNS achieves a higher and more stable packet delivery ratio (PDR) than existing methods profiting from the adaptive selection mechanism.
Collapse
|
24
|
Ding N, Ma H, Zhao C, Ma Y, Ge H. Data Anomaly Detection for Internet of Vehicles Based on Traffic Cellular Automata and Driving Style. Sensors (Basel) 2019; 19:E4926. [PMID: 31726718 DOI: 10.3390/s19224926] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/18/2019] [Revised: 10/28/2019] [Accepted: 10/29/2019] [Indexed: 11/17/2022]
Abstract
The data validity of safe driving in the Internet of Vehicles (IoV) is the basis of improving the safety of vehicles. Different from a traditional information systems, the data anomaly analysis of vehicle safety driving faces the diversity of data anomaly and the randomness and subjectivity of the driver’s driving behavior. How to combine the characteristics of the IOV data with the driving style analysis to provide effective real-time anomaly data detection has become an important issue in the IOV applications. This paper aims at the critical safety data analysis, considering the large computing cost generated by the real-time anomaly detection of all data in the data package. We preprocess it through the traffic cellular automata model which is built to achieve the ideal abnormal detection effect with limited computing resources. On the basis of this model, the Anomaly Detection based on Driving style (ADD) algorithm is proposed to realize real-time and online detection of anomaly data related to safe driving. Firstly, this paper designs the driving coefficient and proposes a driving style quantization model to represent the driving style of the driver. Then, based on driving style quantization model and vehicle driving state information, a data anomaly detection algorithm is developed by using Gaussian mixture model (GMM). Finally, combining with the application scenarios of multi-vehicle collaboration in the Internet of Vehicles, this paper uses real data sets and simulation data sets to analyze the effectiveness of the proposed ADD algorithm.
Collapse
|
25
|
Ahn S, Choi J. Internet of Vehicles and Cost-Effective Traffic Signal Control. Sensors (Basel) 2019; 19:E1275. [PMID: 30871260 DOI: 10.3390/s19061275] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/31/2019] [Revised: 03/08/2019] [Accepted: 03/08/2019] [Indexed: 11/17/2022]
Abstract
The Internet of Vehicles (IoV) is attracting many researchers with the emergence of autonomous or smart vehicles. Vehicles on the road are becoming smart objects equipped with lots of sensors and powerful computing and communication capabilities. In the IoV environment, the efficiency of road transportation can be enhanced with the help of cost-effective traffic signal control. Traffic signal controllers control traffic lights based on the number of vehicles waiting for the green light (in short, vehicle queue length). So far, the utilization of video cameras or sensors has been extensively studied as the intelligent means of the vehicle queue length estimation. However, it has the deficiencies like high computing overhead, high installation and maintenance cost, high susceptibility to the surrounding environment, etc. Therefore, in this paper, we propose the vehicular communication-based approach for intelligent traffic signal control in a cost-effective way with low computing overhead and high resilience to environmental obstacles. In the vehicular communication-based approach, traffic signals are efficiently controlled at no extra cost by using the pre-equipped vehicular communication capabilities of IoV. Vehicular communications allow vehicles to send messages to traffic signal controllers (i.e., vehicle-to-infrastructure (V2I) communications) so that they can estimate vehicle queue length based on the collected messages. In our previous work, we have proposed a mechanism that can accomplish the efficiency of vehicular communications without losing the accuracy of traffic signal control. This mechanism gives transmission preference to the vehicles farther away from the traffic signal controller, so that the other vehicles closer to the stop line give up transmissions. In this paper, we propose a new mechanism enhancing the previous mechanism by selecting the vehicles performing V2I communications based on the concept of road sectorization. In the mechanism, only the vehicles within specific areas, called sectors, perform V2I communications to reduce the message transmission overhead. For the performance comparison of our mechanisms, we carry out simulations by using the Veins vehicular network simulation framework and measure the message transmission overhead and the accuracy of the estimated vehicle queue length. Simulation results verify that our vehicular communication-based approach significantly reduces the message transmission overhead without losing the accuracy of the vehicle queue length estimation.
Collapse
|
26
|
de la Iglesia I, Hernandez-Jayo U, Osaba E, Carballedo R. Smart Bandwidth Assignation in an Underlay Cellular Network for Internet of Vehicles. Sensors (Basel) 2017; 17:s17102217. [PMID: 28953256 PMCID: PMC5677434 DOI: 10.3390/s17102217] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/31/2017] [Revised: 09/18/2017] [Accepted: 09/25/2017] [Indexed: 11/19/2022]
Abstract
The evolution of the IoT (Internet of Things) paradigm applied to new scenarios as VANETs (Vehicular Ad Hoc Networks) has gained momentum in recent years. Both academia and industry have triggered advanced studies in the IoV (Internet of Vehicles), which is understood as an ecosystem where different types of users (vehicles, elements of the infrastructure, pedestrians) are connected. How to efficiently share the available radio resources among the different types of eligible users is one of the important issues to be addressed. This paper briefly analyzes various concepts presented hitherto in the literature and it proposes an enhanced algorithm for ensuring a robust co-existence of the aforementioned system users. Therefore, this paper introduces an underlay RRM (Radio Resource Management) methodology which is capable of (1) improving cellular spectral efficiency while making a minimal impact on cellular communications and (2) ensuring the different QoS (Quality of Service) requirements of ITS (Intelligent Transportation Systems) applications. Simulation results, where we compare the proposed algorithm to the other two RRM, show the promising spectral efficiency performance of the proposed RRM methodology.
Collapse
Affiliation(s)
- Idoia de la Iglesia
- DeustoTech-Fundacion Deusto, Deusto Foundation, Av. Universidades, 24, 48007 Bilbao, Spain.
- Facultad Ingeniería, Universidad de Deusto, Avda. Universidades, 24, 48007 Bilbao, Spain.
| | - Unai Hernandez-Jayo
- DeustoTech-Fundacion Deusto, Deusto Foundation, Av. Universidades, 24, 48007 Bilbao, Spain.
- Facultad Ingeniería, Universidad de Deusto, Avda. Universidades, 24, 48007 Bilbao, Spain.
| | - Eneko Osaba
- DeustoTech-Fundacion Deusto, Deusto Foundation, Av. Universidades, 24, 48007 Bilbao, Spain.
- Facultad Ingeniería, Universidad de Deusto, Avda. Universidades, 24, 48007 Bilbao, Spain.
| | - Roberto Carballedo
- DeustoTech-Fundacion Deusto, Deusto Foundation, Av. Universidades, 24, 48007 Bilbao, Spain.
- Facultad Ingeniería, Universidad de Deusto, Avda. Universidades, 24, 48007 Bilbao, Spain.
| |
Collapse
|
27
|
Amer H, Salman N, Hawes M, Chaqfeh M, Mihaylova L, Mayfield M. An Improved Simulated Annealing Technique for Enhanced Mobility in Smart Cities. Sensors (Basel) 2016; 16:E1013. [PMID: 27376289 DOI: 10.3390/s16071013] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/24/2016] [Revised: 06/23/2016] [Accepted: 06/24/2016] [Indexed: 11/17/2022]
Abstract
Vehicular traffic congestion is a significant problem that arises in many cities. This is due to the increasing number of vehicles that are driving on city roads of limited capacity. The vehicular congestion significantly impacts travel distance, travel time, fuel consumption and air pollution. Avoidance of traffic congestion and providing drivers with optimal paths are not trivial tasks. The key contribution of this work consists of the developed approach for dynamic calculation of optimal traffic routes. Two attributes (the average travel speed of the traffic and the roads' length) are utilized by the proposed method to find the optimal paths. The average travel speed values can be obtained from the sensors deployed in smart cities and communicated to vehicles via the Internet of Vehicles and roadside communication units. The performance of the proposed algorithm is compared to three other algorithms: the simulated annealing weighted sum, the simulated annealing technique for order preference by similarity to the ideal solution and the Dijkstra algorithm. The weighted sum and technique for order preference by similarity to the ideal solution methods are used to formulate different attributes in the simulated annealing cost function. According to the Sheffield scenario, simulation results show that the improved simulated annealing technique for order preference by similarity to the ideal solution method improves the traffic performance in the presence of congestion by an overall average of 19.22% in terms of travel time, fuel consumption and CO₂ emissions as compared to other algorithms; also, similar performance patterns were achieved for the Birmingham test scenario.
Collapse
|