Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (277)

Search Parameters:
Keywords = Internet of Vehicles (IoVs)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 1435 KiB  
Article
Hardware Acceleration-Based Privacy-Aware Authentication Scheme for Internet of Vehicles Using Physical Unclonable Function
by Ujunwa Madububa Mbachu, Rabeea Fatima, Ahmed Sherif, Elbert Dockery, Mohamed Mahmoud, Maazen Alsabaan and Kasem Khalil
Sensors 2025, 25(5), 1629; https://doi.org/10.3390/s25051629 - 6 Mar 2025
Viewed by 171
Abstract
Due to technological advancement, the advent of smart cities has facilitated the deployment of advanced urban management systems. This integration has been made possible through the Internet of Vehicles (IoV), a foundational technology. By connecting smart cities with vehicles, the IoV enhances the [...] Read more.
Due to technological advancement, the advent of smart cities has facilitated the deployment of advanced urban management systems. This integration has been made possible through the Internet of Vehicles (IoV), a foundational technology. By connecting smart cities with vehicles, the IoV enhances the safety and efficiency of transportation. This interconnected system facilitates wireless communication among vehicles, enabling the exchange of crucial traffic information. However, this significant technological advancement also raises concerns regarding privacy for individual users. This paper presents an innovative privacy-preserving authentication scheme focusing on IoV using physical unclonable functions (PUFs). This scheme employs the k-nearest neighbor (KNN) encryption technique, which possesses a multi-multi searching property. The main objective of this scheme is to authenticate autonomous vehicles (AVs) within the IoV framework. An innovative PUF design is applied to generate random keys for our authentication scheme to enhance security. This two-layer security approach protects against various cyber-attacks, including fraudulent identities, man-in-the-middle attacks, and unauthorized access to individual user information. Due to the substantial amount of information that needs to be processed for authentication purposes, our scheme is implemented using hardware acceleration on an Nexys A7-100T FPGA board. Our analysis of privacy and security illustrates the effective accomplishment of specified design goals. Furthermore, the performance analysis reveals that our approach imposes a minimal communication and computational burden and optimally utilizes hardware resources to accomplish design objectives. The results show that the proposed authentication scheme exhibits a non-linear increase in encryption time with a growing AV ID size, starting at 5μs for 100 bits and rising to 39 μs for 800 bits. Also, the result demonstrates a more gradual, linear increase in the search time with a growing AV ID size, starting at less than 1 μs for 100 bits and rising to less than 8 μs for 800 bits. Additionally, for hardware utilization, our scheme uses only 25% from DSP slides and IO pins, 22.2% from BRAM, 5.6% from flip-flops, and 24.3% from LUTs. Full article
Show Figures

Figure 1

Figure 1
<p>Network model.</p>
Full article ">Figure 2
<p>Proposed PUF architecture.</p>
Full article ">Figure 3
<p>The proposed method architecture.</p>
Full article ">Figure 4
<p>Communication overhead comparison with Refs. [<a href="#B35-sensors-25-01629" class="html-bibr">35</a>,<a href="#B37-sensors-25-01629" class="html-bibr">37</a>,<a href="#B38-sensors-25-01629" class="html-bibr">38</a>,<a href="#B39-sensors-25-01629" class="html-bibr">39</a>].</p>
Full article ">Figure 5
<p>Encryption time.</p>
Full article ">Figure 6
<p>Search time.</p>
Full article ">Figure 7
<p>Encryption time vs. number of AVs.</p>
Full article ">Figure 8
<p>Search time vs. number of AVs.</p>
Full article ">Figure 9
<p>Computational overhead comparison with Refs. [<a href="#B35-sensors-25-01629" class="html-bibr">35</a>,<a href="#B37-sensors-25-01629" class="html-bibr">37</a>,<a href="#B38-sensors-25-01629" class="html-bibr">38</a>,<a href="#B39-sensors-25-01629" class="html-bibr">39</a>].</p>
Full article ">Figure 10
<p>Reliability comparison.</p>
Full article ">Figure 11
<p>Randomness comparison.</p>
Full article ">Figure 12
<p>Uniqueness comparison.</p>
Full article ">
21 pages, 21422 KiB  
Review
Efficient Sensors Selection for Traffic Flow Monitoring: An Overview of Model-Based Techniques Leveraging Network Observability
by Marco Fabris, Riccardo Ceccato and Andrea Zanella
Sensors 2025, 25(5), 1416; https://doi.org/10.3390/s25051416 - 26 Feb 2025
Viewed by 187
Abstract
The emergence of 6G-enabled Internet of Vehicles (IoV) promises to revolutionize mobility and connectivity, integrating vehicles into a mobile Internet of Things (IoT)-oriented wireless sensor network (WSN). Meanwhile, 5G technologies and mobile edge computing further support this vision by facilitating real-time connectivity and [...] Read more.
The emergence of 6G-enabled Internet of Vehicles (IoV) promises to revolutionize mobility and connectivity, integrating vehicles into a mobile Internet of Things (IoT)-oriented wireless sensor network (WSN). Meanwhile, 5G technologies and mobile edge computing further support this vision by facilitating real-time connectivity and empowering massive access to the Internet. Within this context, IoT-oriented WSNs play a crucial role in intelligent transportation systems, offering affordable alternatives for traffic monitoring and management. Efficient sensor selection thus represents a critical concern while deploying WSNs on urban networks. In this paper, we provide an overview of such a notably hard problem. The contribution is twofold: (i) surveying state-of-the-art model-based techniques for efficient sensor selection in traffic flow monitoring, emphasizing challenges of sensor placement, and (ii) advocating for the development of data-driven methodologies to enhance sensor deployment efficacy and traffic modeling accuracy. Further considerations underscore the importance of data-driven approaches for adaptive transportation systems aligned with the IoV paradigm. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

Figure 1
<p>From left to right, the representations of traffic models at different scale levels: microscale [<a href="#B26-sensors-25-01416" class="html-bibr">26</a>], mesoscale [<a href="#B27-sensors-25-01416" class="html-bibr">27</a>], macroscale [<a href="#B27-sensors-25-01416" class="html-bibr">27</a>].</p>
Full article ">Figure 2
<p>The segments highlighted in green indicate the best selection according to the metrics <math display="inline"><semantics> <mrow> <mi>rank</mi> <mo>[</mo> <msub> <mi mathvariant="script">W</mi> <mi>n</mi> </msub> <mo>]</mo> </mrow> </semantics></math> (<b>left</b>) and <math display="inline"><semantics> <mrow> <mi mathvariant="script">K</mi> <mo>[</mo> <msub> <mi mathvariant="script">W</mi> <mi>n</mi> </msub> <mo>]</mo> </mrow> </semantics></math> (<b>right</b>) of <math display="inline"><semantics> <mrow> <msup> <mi>p</mi> <mo>★</mo> </msup> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math> roads among <math display="inline"><semantics> <mrow> <mi>p</mi> <mo>=</mo> <mn>22</mn> </mrow> </semantics></math> possible roads in the industrial zone of Padua, Italy. Whereas, blue segments indicate roads that are not selected. More on these simulations at <a href="https://thesis.unipd.it/handle/20.500.12608/74384" target="_blank">https://thesis.unipd.it/handle/20.500.12608/74384</a> (accessed on 21 October 2024).</p>
Full article ">
23 pages, 4200 KiB  
Article
IoV and Blockchain for Traffic Optimization in Ro-Ro Terminals: A Case Study in the Spanish Port System
by Nicoletta González-Cancelas, Javier Vaca-Cabrero and Alberto Camarero-Orive
Future Internet 2025, 17(3), 99; https://doi.org/10.3390/fi17030099 - 22 Feb 2025
Viewed by 386
Abstract
This study examines the integration of the Internet of Vehicles (IoV) and blockchain as tools to optimize traffic management in Roll-on/Roll-off (Ro-Ro) terminals within the Spanish port system. Faced with increasing operational complexity, these technologies present innovative solutions to enhance efficiency, reduce waiting [...] Read more.
This study examines the integration of the Internet of Vehicles (IoV) and blockchain as tools to optimize traffic management in Roll-on/Roll-off (Ro-Ro) terminals within the Spanish port system. Faced with increasing operational complexity, these technologies present innovative solutions to enhance efficiency, reduce waiting times, and ensure transparency in data management. The methodology follows five main phases: analysis of the current scenario, establishment of a baseline, calculations to evaluate key outcomes, analysis of blockchain implementation, and discussion of results. Key variables include waiting times, vehicular flow, CO2 emissions, and operational costs, comparing manual and automated scenarios. The findings reveal that the combined use of IoV and blockchain can increase vehicular flow by up to 70%, reduce waiting times by 2.56 min, and decrease CO2 emissions by 57.74 kg per hour. Additionally, automation significantly reduces operational costs, yielding average savings of over EUR 500 per hour. This study concludes that adopting these technologies transforms port operations by fostering sustainability, efficiency, and safety. However, challenges remain, including high initial implementation costs and system interoperability issues. This work underscores the need for strategic approaches to overcome these barriers and positions Spanish ports as potential leaders in logistics innovation, aligning with global demands for sustainable, efficient, and transparent port operations. Full article
(This article belongs to the Special Issue Blockchain-Based Internet of Vehicles)
Show Figures

Figure 1

Figure 1
<p>Methodological scheme. Source: own elaboration.</p>
Full article ">Figure 2
<p>Flow of operation of a Ro-Ro terminal (Roll-on/Roll-off). Source: own elaboration.</p>
Full article ">Figure 3
<p>Comparison between terminals. Source: own elaboration.</p>
Full article ">Figure 4
<p>Comparison of operational costs per hour. Source: own elaboration.</p>
Full article ">Figure 5
<p>Percentage reduction in operational costs. Source: own elaboration.</p>
Full article ">Figure 6
<p>Reduction in waiting times. Source: own elaboration.</p>
Full article ">Figure 7
<p>Comparison of vehicle flow. Source: own elaboration.</p>
Full article ">Figure 8
<p>Increase in vehicle flow. Source: own elaboration.</p>
Full article ">Figure 9
<p>Reduction in CO<sub>2</sub> emissions. Source: own elaboration.</p>
Full article ">Figure 10
<p>CO<sub>2</sub> reduction emissions: manual vs. automated. Source: own elaboration.</p>
Full article ">Figure 11
<p>Total economic savings. Source: own elaboration.</p>
Full article ">Figure 12
<p>Comparison of economic costs per hour. Source: own elaboration.</p>
Full article ">Figure 13
<p>Cost comparison of economic costs per hour. Source: own elaboration.</p>
Full article ">Figure 14
<p>Focus group: blockchain implementation. Source: own elaboration.</p>
Full article ">
19 pages, 1237 KiB  
Article
A Seamless Authentication Scheme for Edge-Assisted Internet of Vehicles Environments Using Chaotic Maps
by Seunghwan Son, DeokKyu Kwon and Youngho Park
Electronics 2025, 14(4), 672; https://doi.org/10.3390/electronics14040672 - 9 Feb 2025
Viewed by 406
Abstract
Internet of Vehicles (IoV) is a concept that combines IoT and vehicular ad hoc networks. In IoV environments, vehicles constantly move and communicate with other roadside units (edge servers). Due to the vehicles’ insufficient computing power, repetitive authentication procedures can be burdensome for [...] Read more.
Internet of Vehicles (IoV) is a concept that combines IoT and vehicular ad hoc networks. In IoV environments, vehicles constantly move and communicate with other roadside units (edge servers). Due to the vehicles’ insufficient computing power, repetitive authentication procedures can be burdensome for automobiles. In recent years, numerous authentication protocols for IoV environments have been proposed. However, there is no study that considers both re-authentication and handover authentication situations, which are essential for seamless communication in vehicular networks. In this study, we propose a chaotic map-based seamless authentication scheme for edge-assisted IoV environments. We propose authentication protocols for initial, handover, and re-authentication situations and analyze the security of our scheme using informal methods, the real-or-random (RoR) model, and the Scyther tool. We also compare the proposed scheme with existing schemes and show that our scheme has superior performance and provides more security features. To our knowledge, This paper is the first attempt to design an authentication scheme considering both handover and re-authentication in the IoV environment. Full article
(This article belongs to the Special Issue Intelligent Technologies for Vehicular Networks, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>The edge-assisted IoV network model.</p>
Full article ">Figure 2
<p>The flowchart of the proposed scheme.</p>
Full article ">Figure 3
<p>Proposed login and initial authentication phase.</p>
Full article ">Figure 4
<p>Proposed re-authentication phase.</p>
Full article ">Figure 5
<p>Proposed handover authentication phase.</p>
Full article ">Figure 6
<p>Scyther simulation results.</p>
Full article ">Figure 7
<p>Total computational cost as the number of authentication increases.</p>
Full article ">
27 pages, 892 KiB  
Article
A Blockchain Solution for the Internet of Vehicles with Better Filtering and Adaptive Capabilities
by Xueli Shen and Runyu Ma
Sensors 2025, 25(4), 1030; https://doi.org/10.3390/s25041030 - 9 Feb 2025
Viewed by 564
Abstract
The traditional consensus algorithm based on the Internet of Vehicles (IoV) system has the disadvantages of high latency, low reliability, and weak fault tolerance, and it cannot make real-time adjustments according to the actual environment, making the system vulnerable to malicious control, inefficiency, [...] Read more.
The traditional consensus algorithm based on the Internet of Vehicles (IoV) system has the disadvantages of high latency, low reliability, and weak fault tolerance, and it cannot make real-time adjustments according to the actual environment, making the system vulnerable to malicious control, inefficiency, and poor environmental adaptability. To solve this problem, we propose a gradually accelerating environment adaptive consensus algorithm, AE-PBFT, that can be applied to IoV. It includes a trust management model that achieves gradual acceleration by recording the historical continuous behavior of nodes, thereby improving the efficiency of screening nodes with different intentions, accelerating the consensus process, and reducing latency. At the same time, we introduce a dynamic consensus group division mechanism based on environmental adaptive changes, which can adaptively adjust the number of nodes participating in the consensus process according to the needs of the operating environment, to deal with extreme situations, thereby improving the reliability and fault tolerance of the system. Experiments confirm that the performance of our proposed solution is superior to current solutions in terms of consensus latency and fault tolerance and is more suitable for the operating environment of IoV. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Consensus process of PBFT algorithm.</p>
Full article ">Figure 2
<p>Consensus process of AE-PBFT algorithm.</p>
Full article ">Figure 3
<p>Model training speed under different learning rates.</p>
Full article ">Figure 4
<p>Trust management model based on gradual acceleration mechanism.</p>
Full article ">Figure 5
<p>Recording semaphore mechanism.</p>
Full article ">Figure 6
<p>Simulated mutex semaphore mechanism.</p>
Full article ">Figure 7
<p>Construction of IoV system.</p>
Full article ">Figure 8
<p>Consensus latency.</p>
Full article ">Figure 9
<p>Throughput.</p>
Full article ">Figure 10
<p>Communication overhead.</p>
Full article ">Figure 11
<p>Consensus latency under malicious nodes.</p>
Full article ">Figure 12
<p>Fault-tolerance ability.</p>
Full article ">
25 pages, 16510 KiB  
Article
Hyperledger Fabric-Based Multi-Channel Structure for Data Exchange in Internet of Vehicles
by Yiluo Liu, Yaokai Feng and Kouichi Sakurai
Electronics 2025, 14(3), 572; https://doi.org/10.3390/electronics14030572 - 31 Jan 2025
Viewed by 465
Abstract
The rapid growth of the Internet of Vehicles (IoV) requires secure, efficient, and reliable data exchanges among multiple stakeholders. Traditional centralized database systems can hardly address the challenges associated with data privacy, integrity, and scalability in this decentralized ecosystem. In this paper, we [...] Read more.
The rapid growth of the Internet of Vehicles (IoV) requires secure, efficient, and reliable data exchanges among multiple stakeholders. Traditional centralized database systems can hardly address the challenges associated with data privacy, integrity, and scalability in this decentralized ecosystem. In this paper, we propose a Hyperledger Fabric-Based Multi-Channel Structure to overcome these limitations. By leveraging the blockchain architecture, the system ensures data confidentiality and integrity by segregating data into exclusive channels and enabling different organizations to collaborate. Cross-channel communication ensures security when data are interacted with. Chaincodes automate transactions and enhance trust between participants. Our functional tests and performance tests by using Hyperledger Caliper verified the effectiveness of the system in real-world scenarios, highlighting its advantages over traditional systems in terms of decentralization, transparency, and security. Future work will focus on enhancing the user experience and integrating the system with edge computing. Eventually, attempts will be made to operationalize it in real-world environments. Full article
(This article belongs to the Special Issue Future Technologies for Data Management, Processing and Application)
Show Figures

Figure 1

Figure 1
<p>Structure of our proposal.</p>
Full article ">Figure 2
<p>Data structure of vehicle status.</p>
Full article ">Figure 3
<p>Data structure of insurance.</p>
Full article ">Figure 4
<p>Data structure of parking lot and traffic condition.</p>
Full article ">Figure 5
<p>Chaincode structure.</p>
Full article ">Figure 6
<p>Channel creation test.</p>
Full article ">Figure 7
<p>Peer joining test.</p>
Full article ">Figure 8
<p>Anchor peer update test.</p>
Full article ">Figure 9
<p>Query channel information test.</p>
Full article ">Figure 10
<p>Chaincode installation.</p>
Full article ">Figure 11
<p>Chaincode approval.</p>
Full article ">Figure 12
<p>Chaincode commitment.</p>
Full article ">Figure 13
<p>Functional test in Channel B.</p>
Full article ">Figure 14
<p>Functional test in Channel A.</p>
Full article ">
22 pages, 7903 KiB  
Article
Vehicle Localization in IoV Environments: A Vision-LSTM Approach with Synthetic Data Simulation
by Yi Liu, Jiade Jiang and Zijian Tian
Vehicles 2025, 7(1), 12; https://doi.org/10.3390/vehicles7010012 - 31 Jan 2025
Viewed by 477
Abstract
With the rapid development of the Internet of Vehicles (IoV) and autonomous driving technologies, robust and accurate visual pose perception has become critical for enabling smart connected vehicles. Traditional deep learning-based localization methods face persistent challenges in real-world vehicular environments, including occlusion, lighting [...] Read more.
With the rapid development of the Internet of Vehicles (IoV) and autonomous driving technologies, robust and accurate visual pose perception has become critical for enabling smart connected vehicles. Traditional deep learning-based localization methods face persistent challenges in real-world vehicular environments, including occlusion, lighting variations, and the prohibitive cost of collecting diverse real-world datasets. To address these limitations, this study introduces a novel approach by combining Vision-LSTM (ViL) with synthetic image data generated from high-fidelity 3D models. Unlike traditional methods reliant on costly and labor-intensive real-world data, synthetic datasets enable controlled, scalable, and efficient training under diverse environmental conditions. Vision-LSTM enhances feature extraction and classification performance through its matrix-based mLSTM modules and advanced feature aggregation strategy, effectively capturing both global and local information. Experimental evaluations in independent target scenes with distinct features and structured indoor environments demonstrate significant performance gains, achieving matching accuracies of 91.25% and 95.87%, respectively, and outperforming state-of-the-art models. These findings underscore the innovative advantages of integrating Vision-LSTM with synthetic data, highlighting its potential to overcome real-world limitations, reduce costs, and enhance accuracy and reliability for connected vehicle applications such as autonomous navigation and environmental perception. Full article
(This article belongs to the Special Issue Intelligent Connected Vehicles)
Show Figures

Figure 1

Figure 1
<p>Model construction process.</p>
Full article ">Figure 2
<p>Diagram of active vision position detection.</p>
Full article ">Figure 3
<p>Vision-LSTM network structure.</p>
Full article ">Figure 4
<p>mLSTM block structure.</p>
Full article ">Figure 5
<p>Visualization of traversal paths.</p>
Full article ">Figure 6
<p>Independent object datasets.</p>
Full article ">Figure 7
<p>Dataset for the modeling of drinking fountains in a corridor.</p>
Full article ">Figure 8
<p>The ViL loss–accuracy curve(the Independent Object Scene).</p>
Full article ">Figure 9
<p>Independent object scene: model comparison.</p>
Full article ">Figure 10
<p>The ViL loss–accuracy curve (the complex environment scene).</p>
Full article ">Figure 11
<p>Feature point matching between a real image and synthesized image.</p>
Full article ">Figure 12
<p>Complex environment scene: model comparison.</p>
Full article ">Figure 13
<p>The ViL-T loss–accuracy curve.</p>
Full article ">Figure 14
<p>Perceived performance of ViL on a real image (<b>left</b>) and synthesized image (<b>right</b>).</p>
Full article ">Figure 15
<p>Perceived performance of Swin Transformer V2-Tiny, MobileViT Swin Transformer V2-Tiny (<b>left</b>), and MobileViT (<b>right</b>).</p>
Full article ">
25 pages, 3311 KiB  
Article
A VANET, Multi-Hop-Enabled, Dynamic Traffic Assignment for Road Networks
by Wilmer Arellano and Imad Mahgoub
Electronics 2025, 14(3), 559; https://doi.org/10.3390/electronics14030559 - 30 Jan 2025
Viewed by 568
Abstract
Traffic congestion imposes burdens on society and individuals. In 2022, the average congestion cost per auto commuter in the USA was USD1259. New possibilities to increase traffic efficiency are now available as vehicles can interact using Vehicular Ad Hoc Network (VANET) systems, a [...] Read more.
Traffic congestion imposes burdens on society and individuals. In 2022, the average congestion cost per auto commuter in the USA was USD1259. New possibilities to increase traffic efficiency are now available as vehicles can interact using Vehicular Ad Hoc Network (VANET) systems, a subset of the Internet of Vehicles (IoV). The traffic assignment problem deals with road network traffic optimization. It is a complex and challenging problem. A few solutions incorporating VANET technology have been presented; most are centralized or depend on infrastructure. In previous work, we introduced Road-ACO, an ant colony optimization (ACO), single-hop, decentralized, infrastructure-less, VANET solution. In this paper, we propose a new multi-hop-enabled, decentralized, ant-colony-inspired algorithm for dynamic highway traffic assignment. The algorithm works for large road networks and requires no infrastructure. We develop Veins framework-based simulations to evaluate the algorithm’s performance. The results indicate that the proposed algorithm consistently outperforms Road-ACO and performs optimally on road segments up to 4000 m long, with improvements of up to 40% on average travel time. Full article
(This article belongs to the Special Issue Challenges and Opportunities in the Internet of Vehicles)
Show Figures

Figure 1

Figure 1
<p>Taxonomy of simulation-based models. Centralized and Decentralized algorithms are grouped in brown and green, respectively. Infrastructure Support and No Infrastructure Support are grouped in red and blue, respectively.</p>
Full article ">Figure 2
<p>State machine representation of the algorithm.</p>
Full article ">Figure 3
<p>The illustration shows a receiving vehicle at an edge with an incident. The variables <span class="html-italic">eL</span>, <span class="html-italic">rVP</span>, and <span class="html-italic">aP</span> are shown. They represent the length of the edge, the vehicle position, and the incident position. They are used to compute <span class="html-italic">tTR</span>.</p>
Full article ">Figure 4
<p>Simulation framework. The road system is a 4 × 3 Manhattan grid with cell sizes of (500 m × 125 m), (1000 m × 250 m), (1750 m × 437.5 m), (4000 m × 1000 m), and (8000 m × 2000 m). The system comprises four vertical avenues (A to D) and three horizontal streets (1 to 3). Traffic flows begin at origins in the ellipse on the left and terminate at destinations in the ellipse on the right. The expanded area is a snapshot from the traffic simulator SUMO.</p>
Full article ">Figure 5
<p>Gridlock in the system with cell size (500 m × 125 m). This snapshot from the traffic simulator SUMO illustrates a gridlock where vehicles remain stationary until the traffic incident is resolved. For instance, on the left branch, the first vehicle in the top row cannot turn left due to a blockage in the top branch, while the first vehicle in the bottom row cannot turn right. The algorithm allows vehicles to reroute and continue moving, preventing such gridlocks.</p>
Full article ">Figure 6
<p>System of cell size (500 m × 125 m). Aggregation period of 10 s. MTA-ACO and Road-ACO algorithms. Vertical axis: Percentage of average travel time improvement. Horizontal axis: Evaporation Factor.</p>
Full article ">Figure 7
<p>System of cell size (1000 m × 250 m). Aggregation period of 10 s. MTA-ACO and Road-ACO algorithms. Vertical axis: Percentage of average travel time improvement. Horizontal axis: Evaporation factor.</p>
Full article ">Figure 8
<p>System of cell size (1750 m × 437.5 m). Aggregation period of 10 s. MTA-ACO algorithm. Vertical axis: Percentage of average travel time improvement. Horizontal axis: Evaporation factor.</p>
Full article ">Figure 9
<p>System of cell size (500 m × 125 m). Aggregation period of 2 s. MTA-ACO and Road-ACO algorithms. Vertical axis: Percentage of average travel time improvement. Horizontal axis: Evaporation factor.</p>
Full article ">Figure 10
<p>System of cell size (1750 m × 437.5 m). Aggregation period of 2 s. MTA-ACO and Road-ACO algorithms. Vertical axis: Percentage of average travel time improvement. Horizontal axis: Evaporation factor.</p>
Full article ">Figure 11
<p>System of cell size (4000 m × 1000 m). Aggregation period of 2 s. MTA-ACO algorithm. Vertical axis: Percentage of average travel time improvement. Horizontal axis: Evaporation factor.</p>
Full article ">Figure 12
<p>System of cell size (8000 m × 2000 m). Aggregation period of 2 s. MTA-ACO algorithm. Vertical axis: Percentage of average travel time improvement. Horizontal axis: Evaporation factor.</p>
Full article ">
17 pages, 369 KiB  
Article
Collaborative Sensing-Aware Task Offloading and Resource Allocation for Integrated Sensing-Communication- and Computation-Enabled Internet of Vehicles (IoV)
by Bangzhen Huang, Xuwei Fan, Shaolong Zheng, Ning Chen, Yifeng Zhao, Lianfen Huang, Zhibin Gao and Han-Chieh Chao
Sensors 2025, 25(3), 723; https://doi.org/10.3390/s25030723 - 25 Jan 2025
Viewed by 576
Abstract
Integrated Sensing, Communication, and Computation (ISCC) has become a key technology driving the development of the Internet of Vehicles (IoV) by enabling real-time environmental sensing, low-latency communication, and collaborative computing. However, the increasing sensing data within the IoV leads to demands of fast [...] Read more.
Integrated Sensing, Communication, and Computation (ISCC) has become a key technology driving the development of the Internet of Vehicles (IoV) by enabling real-time environmental sensing, low-latency communication, and collaborative computing. However, the increasing sensing data within the IoV leads to demands of fast data transmission in the context of limited communication resources. To address this issue, we propose a Collaborative Sensing-Aware Task Offloading (CSTO) mechanism for ISCC to reduce the sensing tasks transmission delay. We formulate a joint task offloading and communication resource allocation optimization problem to minimize the total processing delay of all vehicular sensing tasks. To solve this mixed-integer nonlinear programming (MINLP) problem, we design a two-stage iterative optimization algorithm that decomposes the original optimization problem into a task offloading subproblem and a resource allocation subproblem, which are solved iteratively. In the first stage, a Deep Reinforcement Learning algorithm is used to determine task offloading decisions based on the initial setting. In the second stage, a convex optimization algorithm is employed to allocate communication bandwidth according to the current task offloading decisions. We conduct simulation experiments by varying different crucial parameters, and the results demonstrate the superiority of our scheme over other benchmark schemes. Full article
(This article belongs to the Special Issue Feature Papers in Intelligent Sensors 2024)
Show Figures

Figure 1

Figure 1
<p>The considered ISCC system within the IoV scenario.</p>
Full article ">Figure 2
<p>Task processing delay for different mechanisms.</p>
Full article ">Figure 3
<p>Framework of the DQN algorithm.</p>
Full article ">Figure 4
<p>Total task processing delay with different task data sizes.</p>
Full article ">Figure 5
<p>Total task processing delay with different bandwidths of RSU.</p>
Full article ">Figure 6
<p>Total task processing delay with different computing resources of RSU.</p>
Full article ">Figure 7
<p>Total task processing delay with different computing resources of vehicles.</p>
Full article ">Figure 8
<p>RSU workload with or without collaborative computing.</p>
Full article ">
22 pages, 839 KiB  
Article
Multi-Agent Reinforcement Learning-Based Routing and Scheduling Models in Time-Sensitive Networking for Internet of Vehicles Communications Between Transportation Field Cabinets
by Sergi Garcia-Cantón, Carlos Ruiz de Mendoza, Cristina Cervelló-Pastor and Sebastià Sallent
Appl. Sci. 2025, 15(3), 1122; https://doi.org/10.3390/app15031122 - 23 Jan 2025
Viewed by 1010
Abstract
Future autonomous vehicles will interact with traffic infrastructure through roadside units (RSUs) directly connected to transportation field cabinets (TFCs). These TFCs must be interconnected to share traffic information, enabling infrastructure-to-infrastructure (I2I) communications that are reliable, synchronous and capable of transmitting vehicle data to [...] Read more.
Future autonomous vehicles will interact with traffic infrastructure through roadside units (RSUs) directly connected to transportation field cabinets (TFCs). These TFCs must be interconnected to share traffic information, enabling infrastructure-to-infrastructure (I2I) communications that are reliable, synchronous and capable of transmitting vehicle data to the Internet. However, I2I communications present a complex optimization challenge. This study addresses this by proposing the design, implementation, and evaluation of an automated management model for I2I service channels based on multi-agent reinforcement learning (MARL) integrated with deep reinforcement learning (DRL). The proposed models efficiently manage the routing and scheduling of data frames between internet of vehicles (IoV) infrastructure devices through time-sensitive networking (TSN) to ensure real-time synchronous I2I communications. The solution incorporates both a routing model and a scheduling model, evaluated in a simulated shared environment where agents operate within the TSN control plane. Both models are tested for different topologies and background traffic levels. The results demonstrate that the models establish the majority of paths in the scenario, adhering to near-optimal routing and scheduling policies. Recursively, for each individual request to create a service channel, the system establishes online an optimal synchronous path between entities with a limited time budget. In total, 71% of optimal routing paths are established and 97% of optimal schedules are achieved. The approach takes into account the periodic nature of the transmitted data and its robustness through TSN networks, obtaining 99 percent of compliant service requests with flow jitter levels below 100 microseconds for different topologies and different network utility percentages. The proposed solution achieves lower execution delays compared to the iterative ILP approach. Additionally, the solution facilitates the integration of 5G networks for vehicle-to-infrastructure (V2I) communications, which is identified as an area for future exploration. Full article
(This article belongs to the Special Issue Novel Advances in Internet of Vehicles)
Show Figures

Figure 1

Figure 1
<p>Proposed model for a roadside transportation field controller (TFC).</p>
Full article ">Figure 2
<p>Proposed architecture for the next generation of smart roadside infrastructure.</p>
Full article ">Figure 3
<p>Simulation scenario consisting of a set of TSN switches located in the TFC and TMS entities connected by unidirectional fixed network links that make up a service area of several service providers.</p>
Full article ">Figure 4
<p>The proposed temporal division model based on a hyperperiod and several slots with a fixed size.</p>
Full article ">Figure 5
<p>The reward function over episodes (<b>left</b> plot) and the loss function over steps (<b>right</b> plot) of a routing model during training.</p>
Full article ">Figure 6
<p>The reward function over episodes (<b>left</b> plot) and the loss function over steps (<b>right</b> plot) of a routing model during training.</p>
Full article ">Figure 7
<p>MDP-related information flows between agents and the environment in joint evaluations.</p>
Full article ">Figure 8
<p>Distribution of relative end-to-end delays compared with the optimal ones.</p>
Full article ">Figure 9
<p>Larger scenario used for evaluating models’ scalability.</p>
Full article ">
57 pages, 21747 KiB  
Review
Innovative Driver Monitoring Systems and On-Board-Vehicle Devices in a Smart-Road Scenario Based on the Internet of Vehicle Paradigm: A Literature and Commercial Solutions Overview
by Paolo Visconti, Giuseppe Rausa, Carolina Del-Valle-Soto, Ramiro Velázquez, Donato Cafagna and Roberto De Fazio
Sensors 2025, 25(2), 562; https://doi.org/10.3390/s25020562 - 19 Jan 2025
Viewed by 2031
Abstract
In recent years, the growing number of vehicles on the road have exacerbated issues related to safety and traffic congestion. However, the advent of the Internet of Vehicles (IoV) holds the potential to transform mobility, enhance traffic management and safety, and create smarter, [...] Read more.
In recent years, the growing number of vehicles on the road have exacerbated issues related to safety and traffic congestion. However, the advent of the Internet of Vehicles (IoV) holds the potential to transform mobility, enhance traffic management and safety, and create smarter, more interconnected road networks. This paper addresses key road safety concerns, focusing on driver condition detection, vehicle monitoring, and traffic and road management. Specifically, various models proposed in the literature for monitoring the driver’s health and detecting anomalies, drowsiness, and impairment due to alcohol consumption are illustrated. The paper describes vehicle condition monitoring architectures, including diagnostic solutions for identifying anomalies, malfunctions, and instability while driving on slippery or wet roads. It also covers systems for classifying driving style, as well as tire and emissions monitoring. Moreover, the paper provides a detailed overview of the proposed traffic monitoring and management solutions, along with systems for monitoring road and environmental conditions, including the sensors used and the Machine Learning (ML) algorithms implemented. Finally, this review also presents an overview of innovative commercial solutions, illustrating advanced devices for driver monitoring, vehicle condition assessment, and traffic and road management. Full article
Show Figures

Figure 1

Figure 1
<p>Summary picture of the IoV paradigm in the smart city scenario for road safety and transportation efficiency purposes: driver, vehicle, road, and traffic monitoring systems.</p>
Full article ">Figure 2
<p>Document selection method: (<b>a</b>) description of articles’ selecting method with topics related to the presented review paper, (<b>b</b>) main keywords to filter the documents found in the literature.</p>
Full article ">Figure 2 Cont.
<p>Document selection method: (<b>a</b>) description of articles’ selecting method with topics related to the presented review paper, (<b>b</b>) main keywords to filter the documents found in the literature.</p>
Full article ">Figure 3
<p>(<b>a</b>) Selected articles sorted by publishers, (<b>b</b>) selected articles sorted by typology.</p>
Full article ">Figure 3 Cont.
<p>(<b>a</b>) Selected articles sorted by publishers, (<b>b</b>) selected articles sorted by typology.</p>
Full article ">Figure 4
<p>Example of an innovative DMS based on intrusive and non-intrusive methods for the acquisition and processing of biophysical and behavioral driver parameters by using sensors and cameras integrated into the cockpit and wearable devices.</p>
Full article ">Figure 5
<p>The system proposed in [<a href="#B37-sensors-25-00562" class="html-bibr">37</a>] integrates on-board and remote vehicle sensors to develop algorithms that estimate pollutant emissions, fuel consumption, driving behavior, and driver health.</p>
Full article ">Figure 6
<p>Innovative model for facial recognition and driver drowsiness detection proposed in [<a href="#B43-sensors-25-00562" class="html-bibr">43</a>].</p>
Full article ">Figure 7
<p>Main features of the method proposed by the authors in [<a href="#B15-sensors-25-00562" class="html-bibr">15</a>]; the Haar–Cascade classifier was trained to detect faces and extract the related features (a–d). After detection, the authors captured the coordinates of facial landmarks and exported them to a comma-separated value (csv) file, based on the proposed classes.</p>
Full article ">Figure 8
<p>Architecture proposed in [<a href="#B45-sensors-25-00562" class="html-bibr">45</a>] for non-intrusive monitoring of the driver to detect the state of drowsiness by processing the ECG signals via ML algorithms.</p>
Full article ">Figure 9
<p>MQ3 gas sensor array integrated into the steering wheel used for the model proposed by the authors in [<a href="#B48-sensors-25-00562" class="html-bibr">48</a>]. They also integrated an Organic Light-Emitting Diode (OLED) display screen showing the alcohol concentration level, indicating the level of drunkenness.</p>
Full article ">Figure 10
<p>Flowchart of the model proposed in [<a href="#B50-sensors-25-00562" class="html-bibr">50</a>], which checks whether the driver has drunk alcohol, preventing the engine from being started if the outcome is positive.</p>
Full article ">Figure 11
<p>Vehicle monitoring based on ML algorithms for processing data acquired by sensors for detecting and predicting vehicle anomalies.</p>
Full article ">Figure 12
<p>Architecture of the vehicle monitoring system proposed in [<a href="#B59-sensors-25-00562" class="html-bibr">59</a>].</p>
Full article ">Figure 13
<p>Architecture proposed in [<a href="#B66-sensors-25-00562" class="html-bibr">66</a>] based on different functional blocks.</p>
Full article ">Figure 14
<p>Emissions monitoring architecture proposed in [<a href="#B78-sensors-25-00562" class="html-bibr">78</a>].</p>
Full article ">Figure 15
<p>Architecture of a smart city highlighting the interconnectivity between vehicles, infrastructures, and pedestrians within an urban center.</p>
Full article ">Figure 16
<p>UAV system proposed in [<a href="#B89-sensors-25-00562" class="html-bibr">89</a>], able to monitor vehicles’ movement by detecting and highlighting the speeds.</p>
Full article ">Figure 17
<p>Monitoring system for road pavements using IoT technology proposed in [<a href="#B92-sensors-25-00562" class="html-bibr">92</a>].</p>
Full article ">Figure 18
<p>Key features of the “Smart Eye Pro 12” DMS released in 2024 by Smart Eye company [<a href="#B99-sensors-25-00562" class="html-bibr">99</a>].</p>
Full article ">Figure 19
<p>(<b>a</b>) Interior camera system enabling driver and vehicle to interact seamlessly; (<b>b</b>) developed technologies and detection capabilities from Continental Engineering; (<b>c</b>) hardware and software solutions for face gesture detection; (<b>d</b>) key features of “Cabin Sensing” solution and standards met [<a href="#B100-sensors-25-00562" class="html-bibr">100</a>].</p>
Full article ">Figure 20
<p>Key features of Magna DMS: distracted driver detection, drowsy detection, occupant detection, child presence/seat detection, occupant classification, properly worn seatbelt detection.</p>
Full article ">Figure 21
<p>Driver Fatigue Monitoring System for driver’s safety by Speedir [<a href="#B102-sensors-25-00562" class="html-bibr">102</a>].</p>
Full article ">Figure 22
<p>Solution for vehicle condition monitoring by Trakm8: (<b>a</b>) 4G Integrated Telematics Camera RH600 [<a href="#B103-sensors-25-00562" class="html-bibr">103</a>]; (<b>b</b>) RoadHawk DC-4 Dash Cam [<a href="#B104-sensors-25-00562" class="html-bibr">104</a>], (<b>c</b>) RH800 4G Mobile Digital Video Recorder [<a href="#B105-sensors-25-00562" class="html-bibr">105</a>]; (<b>d</b>) ACC750 Driver ID and Feedback device [<a href="#B106-sensors-25-00562" class="html-bibr">106</a>].</p>
Full article ">Figure 22 Cont.
<p>Solution for vehicle condition monitoring by Trakm8: (<b>a</b>) 4G Integrated Telematics Camera RH600 [<a href="#B103-sensors-25-00562" class="html-bibr">103</a>]; (<b>b</b>) RoadHawk DC-4 Dash Cam [<a href="#B104-sensors-25-00562" class="html-bibr">104</a>], (<b>c</b>) RH800 4G Mobile Digital Video Recorder [<a href="#B105-sensors-25-00562" class="html-bibr">105</a>]; (<b>d</b>) ACC750 Driver ID and Feedback device [<a href="#B106-sensors-25-00562" class="html-bibr">106</a>].</p>
Full article ">Figure 23
<p>ADAS functionalities by TrackoBit devices: forward, rear, or side collision alerts, signal violation, lane switch alert, and over-speeding alert.</p>
Full article ">Figure 24
<p>Video Telematics by TrackoBit system: DMS alert example (<b>a</b>), ADAS alert example (<b>b</b>).</p>
Full article ">Figure 25
<p>Route planning and management software by TrackoBit: (<b>a</b>) create tour, (<b>b</b>) monitor route, (<b>c</b>) manage trips.</p>
Full article ">Figure 26
<p>By-wire technology by FORVIA: brake-by-wire system (<b>a</b>) and steering torque sensor (<b>b</b>).</p>
Full article ">Figure 27
<p>Radars and environment sensors by FORVIA: 77GHz radar (<b>a</b>), e-Mirror camera (<b>b</b>), SHAKE road condition sensor (<b>c</b>), HELLA Rain Light Sensor (<b>d</b>).</p>
Full article ">Figure 27 Cont.
<p>Radars and environment sensors by FORVIA: 77GHz radar (<b>a</b>), e-Mirror camera (<b>b</b>), SHAKE road condition sensor (<b>c</b>), HELLA Rain Light Sensor (<b>d</b>).</p>
Full article ">Figure 28
<p>Vision systems by FORVIA: eMirror UX Safe engine (<b>a</b>), surround view system (<b>b</b>).</p>
Full article ">Figure 29
<p>(<b>a</b>) The vehicle learns the driving style from the driver, to be integrated with preloaded programs and duplicated when same conditions occur. (<b>b</b>) Sharing data with other users via web platforms.</p>
Full article ">Figure 30
<p>Insight Count and Classify software interface developed by Clearview Intelligence [<a href="#B116-sensors-25-00562" class="html-bibr">116</a>].</p>
Full article ">Figure 31
<p>Connex Traffic device is installed on the road: a typical scenario [<a href="#B117-sensors-25-00562" class="html-bibr">117</a>].</p>
Full article ">Figure 32
<p>M100 system developed by Clearview Intelligence (<b>a</b>), application scenarios (<b>b</b>,<b>c</b>) [<a href="#B118-sensors-25-00562" class="html-bibr">118</a>].</p>
Full article ">Figure 33
<p>Different layers of TomTom’s Orbi Maps software.</p>
Full article ">
21 pages, 821 KiB  
Article
Federated Learning and Reputation-Based Node Selection Scheme for Internet of Vehicles
by Zhaoyu Su, Ruimin Cheng, Chunhai Li, Mingfeng Chen, Jiangnan Zhu and Yan Long
Electronics 2025, 14(2), 303; https://doi.org/10.3390/electronics14020303 - 14 Jan 2025
Viewed by 659
Abstract
With the rapid development of in-vehicle communication technology, the Internet of Vehicles (IoV) is gradually becoming a core component of next-generation transportation networks. However, ensuring the activity and reliability of IoV nodes remains a critical challenge. The emergence of blockchain technology offers new [...] Read more.
With the rapid development of in-vehicle communication technology, the Internet of Vehicles (IoV) is gradually becoming a core component of next-generation transportation networks. However, ensuring the activity and reliability of IoV nodes remains a critical challenge. The emergence of blockchain technology offers new solutions to the problem of node selection in IoV. Nevertheless, traditional blockchain networks may suffer from malicious nodes, which pose security threats and disrupt normal blockchain operations. To address the issues of low participation and security risks among IoV nodes, this paper proposes a federated learning (FL) scheme based on blockchain and reputation value changes. This scheme encourages active involvement in blockchain consensus and facilitates the selection of trustworthy and reliable IoV nodes. First, we avoid conflicts between computing power for training and consensus by constructing state-channel transitions to move training tasks off-chain. Task rewards are then distributed to participating miner nodes based on their contributions to the FL model. Second, a reputation mechanism is designed to measure the reliability of participating nodes in FL, and a Proof of Contribution Consensus (PoCC) algorithm is proposed to allocate node incentives and package blockchain transactions. Finally, experimental results demonstrate that the proposed incentive mechanism enhances node participation in training and successfully identifies trustworthy nodes. Full article
(This article belongs to the Special Issue Security and Privacy in Distributed Machine Learning)
Show Figures

Figure 1

Figure 1
<p>Federated learning system model.</p>
Full article ">Figure 2
<p>Task publication and incentive process.</p>
Full article ">Figure 3
<p>Federated learning process in the <span class="html-italic">n</span>-th round.</p>
Full article ">Figure 4
<p>The structure of the transaction block.</p>
Full article ">Figure 5
<p>Consensus algorithm workflow diagram.</p>
Full article ">Figure 6
<p>Transmission rate under different proportions of malicious nodes.</p>
Full article ">Figure 7
<p>Latency under different proportions of malicious nodes.</p>
Full article ">Figure 8
<p>Reputation changes affected by malicious messages.</p>
Full article ">Figure 9
<p>Changes in the number of sent message packets under the incentive algorithm.</p>
Full article ">Figure 10
<p>Changes in the number of dropped message packets under the incentive algorithm.</p>
Full article ">
21 pages, 1422 KiB  
Article
Multi-Agent Reinforcement Learning for Efficient Resource Allocation in Internet of Vehicles
by Jun-Han Wang, He He, Jaesang Cha, Incheol Jeong and Chang-Jun Ahn
Electronics 2025, 14(1), 192; https://doi.org/10.3390/electronics14010192 - 5 Jan 2025
Viewed by 927
Abstract
The Internet of Vehicles (IoV), a burgeoning technology, merges advancements in the internet, vehicle electronics, and wireless communications to foster intelligent vehicle interactions, thereby enhancing the efficiency and safety of transportation systems. Nonetheless, the continual and high-frequency communications among vehicles, coupled with regional [...] Read more.
The Internet of Vehicles (IoV), a burgeoning technology, merges advancements in the internet, vehicle electronics, and wireless communications to foster intelligent vehicle interactions, thereby enhancing the efficiency and safety of transportation systems. Nonetheless, the continual and high-frequency communications among vehicles, coupled with regional limitations in system capacity, precipitate significant challenges in allocating wireless resources for vehicular networks. In addressing these challenges, this study formulates the resource allocation issue as a multi-agent deep reinforcement learning scenario and introduces a novel multi-agent actor-critic framework. This framework incorporates a prioritized experience replay mechanism focused on distributed execution, which facilitates decentralized computing by structuring the training processes and defining specific reward functions, thus optimizing resource allocation. Furthermore, the framework prioritizes empirical data during the training phase based on the temporal difference error (TD error), selectively updating the network with high-priority data at each sampling point. This strategy not only accelerates model convergence but also enhances the learning efficacy. The empirical validations confirm that our algorithm augments the total capacity of vehicle-to-infrastructure (V2I) links by 9.36% and the success rate of vehicle-to-vehicle (V2V) transmissions by 6.74% compared with a benchmark algorithm. Full article
Show Figures

Figure 1

Figure 1
<p>Network architecture and data flow of the proposed PER-MAC method.</p>
Full article ">Figure 2
<p>Schematic of the Manhattan grid layout.</p>
Full article ">Figure 3
<p>Total reward change curve for each episode of the training phase.</p>
Full article ">Figure 4
<p>Performance of each model. (<b>a</b>) Total V2I link channel capacity under different payloads. (<b>b</b>) V2V link data transmission completion rate under different loads.</p>
Full article ">Figure 5
<p>Variation in remaining payload over time step for each V2V link for each algorithm. (<b>a</b>) The remaining payload of PER-MAC at each time step. (<b>b</b>) The remaining payload of the MADDPG algorithm at each time step. (<b>c</b>) The remaining payload of the DDPG algorithm at each time step. (<b>d</b>) The remaining payload of MADQN at each time step.</p>
Full article ">Figure 6
<p>Variation in transmission rate over time step for each V2V link for each algorithm. (<b>a</b>) The transmission rate of PER-MAC at each time step. (<b>b</b>) The transmission rate of the MADDPG algorithm at each time step. (<b>c</b>) The transmission rate of the DDPG algorthm at each time step. (<b>d</b>) The transmission rate of MADQN at each time step.</p>
Full article ">
30 pages, 6901 KiB  
Article
EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network
by Chenyang Fei, Xiaomei Zhang, Dayu Wang, Haomin Hu, Rong Huang and Zejie Wang
Information 2025, 16(1), 21; https://doi.org/10.3390/info16010021 - 3 Jan 2025
Viewed by 814
Abstract
With the increasing connectivity and automation on the Internet of Vehicles, safety, security, and privacy have become stringent challenges. In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. Before generating the [...] Read more.
With the increasing connectivity and automation on the Internet of Vehicles, safety, security, and privacy have become stringent challenges. In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. Before generating the encryption keys, a random number generator (RNG) plays an important component in cybersecurity. Several deep learning-based RNGs have been deployed to train the initial value and generate pseudo-random numbers. However, interference from actual unpredictable driving environments renders the system unreliable for its low-randomness outputs. Furthermore, dynamics in the training process make these methods subject to training instability and pattern collapse by overfitting. In this paper, we propose an Effective Pseudo-Random Number Generator (EPRNG) which exploits a deep convolution generative adversarial network (DCGAN)-based approach using our processed vehicle datasets and entropy-driven stopping method-based training processes for the generation of pseudo-random numbers. Our model starts from the vehicle data source to stitch images and add noise to enhance the entropy of the images and then inputs them into our network. In addition, we design an entropy-driven stopping method that enables our model training to stop at the optimal epoch so as to prevent overfitting. The results of the evaluation indicate that our entropy-driven stopping method can effectively generate pseudo-random numbers in a DCGAN. Our numerical experiments on famous test suites (NIST, ENT) demonstrate the effectiveness of the developed approach in high-quality random number generation for the IoV. Furthermore, the PRNGs are successfully applied to image encryption, and the performance metrics of the encryption are close to ideal values. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>System model of the proposed PRNG.</p>
Full article ">Figure 2
<p>Network model of the IoV.</p>
Full article ">Figure 3
<p>Similarity between images.</p>
Full article ">Figure 4
<p>Comparison of images before and after stitching.</p>
Full article ">Figure 5
<p>Stitching the pixel blocks.</p>
Full article ">Figure 6
<p>Raw images before and after adding noise: (<b>a</b>–<b>c</b>) are the raw images; (<b>d</b>–<b>f</b>) are the noise-added images.</p>
Full article ">Figure 7
<p>Comparison of images before and after adding noise.</p>
Full article ">Figure 8
<p>The noise in 2D.</p>
Full article ">Figure 9
<p>DCGAN network model.</p>
Full article ">Figure 10
<p>The visual representation of the entropy-driven stopping method.</p>
Full article ">Figure 11
<p>Logistic map visualization.</p>
Full article ">Figure 12
<p>The statistics of image entropy.</p>
Full article ">Figure 13
<p>The datasets collected from multi-sensors in vehicle.</p>
Full article ">Figure 14
<p>Comparison of <span class="html-italic">R</span> before and after early stopping.</p>
Full article ">Figure 15
<p>The optimal training epochs.</p>
Full article ">Figure 16
<p>Comparison of <span class="html-italic">R</span> before and after early stopping on the other datasets. (<b>a</b>) Comparison of <span class="html-italic">R</span> before and after early stopping on the BDD100k dataset; (<b>b</b>) Comparison of <span class="html-italic">R</span> before and after early stopping on the Tsinghua-Tencent100K dataset.</p>
Full article ">Figure 16 Cont.
<p>Comparison of <span class="html-italic">R</span> before and after early stopping on the other datasets. (<b>a</b>) Comparison of <span class="html-italic">R</span> before and after early stopping on the BDD100k dataset; (<b>b</b>) Comparison of <span class="html-italic">R</span> before and after early stopping on the Tsinghua-Tencent100K dataset.</p>
Full article ">Figure 17
<p>Optimal <math display="inline"><semantics> <msub> <mi>L</mi> <mrow> <mi>b</mi> <mi>e</mi> <mi>s</mi> <mi>t</mi> </mrow> </msub> </semantics></math> with different <span class="html-italic">p</span> and <span class="html-italic">v</span> parameters.</p>
Full article ">Figure 18
<p>The sensitivity of the optimal epoch. (<b>a</b>) The sensitivity of the optimal epoch when the target variance changes; (<b>b</b>) The sensitivity of the optimal epoch when the patience changes.</p>
Full article ">Figure 19
<p>The encryption and decryption processes of the images.</p>
Full article ">Figure 19 Cont.
<p>The encryption and decryption processes of the images.</p>
Full article ">Figure 20
<p>The histogram of the image pair.</p>
Full article ">Figure 21
<p>The adjacent pixel correlation of the image pair.</p>
Full article ">
20 pages, 15263 KiB  
Article
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
by Xinzhong Su and Youyun Xu
Sensors 2025, 25(1), 212; https://doi.org/10.3390/s25010212 - 2 Jan 2025
Viewed by 527
Abstract
The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant [...] Read more.
The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant security threats, such as eavesdropping, replay attacks, and message tampering. To address these challenges, this paper proposes the Efficient Cluster-based Mutual Authentication and Key Update Protocol (ECAUP) designed to secure IoV systems within 5G-enabled sensor networks. The ECAUP meets the unique mobility and security demands of IoV by enabling fine-grained access control and dynamic key updates for RSUs through a factorial tree structure, ensuring both forward and backward secrecy. Additionally, physical unclonable functions (PUFs) are utilized to provide end-to-end authentication and physical layer security, further enhancing the system’s resilience against sophisticated cyber-attacks. The security of the ECAUP is formally verified using BAN Logic and ProVerif, and a comparative analysis demonstrates its superiority in terms of overhead efficiency (more than 50%) and security features over existing protocols. This work contributes to the development of secure, resilient, and efficient intelligent transportation systems, ensuring robust communication and protection in sensor-based IoV environments. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Figure 1

Figure 1
<p>IOV authentication model.</p>
Full article ">Figure 2
<p>Factorial-tree-based accessible device table. The number of leaf nodes at each level in factorial tree is <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>t</mi> <mo>+</mo> <mn>1</mn> <mo>)</mo> <mo>!</mo> </mrow> </semantics></math>, where <span class="html-italic">t</span> is the level of the tree.</p>
Full article ">Figure 3
<p><math display="inline"><semantics> <mrow> <mi>R</mi> <mi>S</mi> <mi>U</mi> </mrow> </semantics></math> registration.</p>
Full article ">Figure 4
<p>Mutual authentication between <math display="inline"><semantics> <mrow> <mi>R</mi> <mi>S</mi> <mi>U</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>I</mi> <mi>O</mi> <mi>V</mi> <mi>D</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <mrow> <mi>I</mi> <mi>O</mi> <mi>V</mi> <mi>D</mi> </mrow> </semantics></math> join and leave.</p>
Full article ">Figure 6
<p>Proverif simulation results.</p>
Full article ">Figure 7
<p>Comparison of communication cost and calculation cost.</p>
Full article ">
Back to TopTop