Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (258)

Search Parameters:
Keywords = Internet of Vehicles (IoVs)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 646 KiB  
Article
An Anonymous and Efficient Authentication Scheme with Conditional Privacy Preservation in Internet of Vehicles Networks
by Chaeeon Kim, DeokKyu Kwon, Seunghwan Son, Sungjin Yu and Youngho Park
Mathematics 2024, 12(23), 3756; https://doi.org/10.3390/math12233756 - 28 Nov 2024
Abstract
The Internet of Vehicles (IoV) is an emerging technology that enables vehicles to communicate with their surroundings, provide convenient services, and enhance transportation systems. However, IoV networks can be vulnerable to security attacks because vehicles communicate with other IoV components through an open [...] Read more.
The Internet of Vehicles (IoV) is an emerging technology that enables vehicles to communicate with their surroundings, provide convenient services, and enhance transportation systems. However, IoV networks can be vulnerable to security attacks because vehicles communicate with other IoV components through an open wireless channel. The recent related work suggested a two-factor-based lightweight authentication scheme for IoV networks. Unfortunately, we prove that the related work cannot prevent various security attacks, such as insider and ephemeral secret leakage (ESL) attacks, and fails to ensure perfect forward secrecy. To address these security weaknesses, we propose an anonymous and efficient authentication scheme with conditional privacy-preserving capabilities in IoV networks. The proposed scheme can ensure robustness against various security attacks and provide essential security features. The proposed scheme ensures conditional privacy to revoke malicious behavior in IoV networks. Moreover, our scheme uses only one-way hash functions and XOR operations, which are low-cost cryptographic operations suitable for IoV. We also prove the security of our scheme using the “Burrows–Abadi–Needham (BAN) logic”, “Real-or-Random (ROR) model”, and “Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool”. We evaluate and compare the performance and security features of the proposed scheme with existing methods. Consequently, our scheme provides improved security and efficiency and is suitable for practical IoV networks. Full article
43 pages, 4383 KiB  
Review
Integrating UAVs and RISs in Future Wireless Networks: A Review and Tutorial on IoTs and Vehicular Communications
by Mohsen Eskandari and Andrey V. Savkin
Future Internet 2024, 16(12), 433; https://doi.org/10.3390/fi16120433 - 21 Nov 2024
Viewed by 596
Abstract
The rapid evolution of smart cities relies heavily on advancements in wireless communication systems and extensive IoT networks. This paper offers a comprehensive review of the critical role and future potential of integrating unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs) to [...] Read more.
The rapid evolution of smart cities relies heavily on advancements in wireless communication systems and extensive IoT networks. This paper offers a comprehensive review of the critical role and future potential of integrating unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs) to enhance Internet of Vehicles (IoV) systems within beyond-fifth-generation (B5G) and sixth-generation (6G) networks. We explore the combination of quasi-optical millimeter-wave (mmWave) signals with UAV-enabled, RIS-assisted networks and their applications in urban environments. This review covers essential areas such as channel modeling and position-aware beamforming in dynamic networks, including UAVs and IoVs. Moreover, we investigate UAV navigation and control, emphasizing the development of obstacle-free trajectory designs in dense urban areas while meeting kinodynamic and motion constraints. The emerging potential of RIS-equipped UAVs (RISeUAVs) is highlighted, along with their role in supporting IoVs and in mobile edge computing. Optimization techniques, including convex programming methods and machine learning, are explored to tackle complex challenges, with an emphasis on studying computational complexity and feasibility for real-time operations. Additionally, this review highlights the integrated localization and communication strategies to enhance UAV and autonomous ground vehicle operations. This tutorial-style overview offers insights into the technical challenges and innovative solutions of the next-generation wireless networks in smart cities, with a focus on vehicular communications. Finally, future research directions are outlined. Full article
Show Figures

Figure 1

Figure 1
<p>Organization of the paper based on the taxonomy of the UAV-enabled, RIS-assisted communication into quintuple studied and topics.</p>
Full article ">Figure 2
<p>Illustration of direct LoS path and multi-path.</p>
Full article ">Figure 3
<p>UAV-enabled, RIS-assisted communication: (<b>a</b>) RISeUAV with a UPA of the RIS aligned in the XY plane facing the ground; (<b>b</b>) UAV-BS as an active aerial (airborne) BS.</p>
Full article ">Figure 4
<p>Schematic of RISeUAV-assisted communication for channel modeling: (<b>a</b>) geometry of system in 3D coordinates; (<b>b</b>) UPA of the RIS in XY plane; <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>v</mi> </mrow> <mrow> <mi>R</mi> <mi>U</mi> </mrow> </msup> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>u</mi> </mrow> <mrow> <mi>R</mi> <mi>U</mi> </mrow> </msup> </mrow> </semantics></math> denote UAV’s horizontal and vertical linear velocities, respectively; <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>ω</mi> </mrow> <mrow> <mi>R</mi> <mi>U</mi> </mrow> </msup> </mrow> </semantics></math> denotes the UAV’s horizontal rotational velocity and <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>θ</mi> </mrow> <mrow> <mi>R</mi> <mi>U</mi> </mrow> </msup> </mrow> </semantics></math> denotes the UAV heading (angle) with respect to the X-axis. The UAV motion is studied in <a href="#sec4-futureinternet-16-00433" class="html-sec">Section 4</a>.</p>
Full article ">Figure 5
<p>Schematic of UAV-enabled, RIS-assisted wireless communication for intelligent vehicles (IVs) in IoVs with mMIMO BSs. Notice that, for the sake of illustration, the sizes of the mMIMO BS and RISeUAV are exaggerated compared with the distances.</p>
Full article ">Figure 6
<p>Aerial backhauling through the RISeUAV to UAV-BSs.</p>
Full article ">Figure 7
<p>The schematic of the actor-critic deep deterministic policy gradient DRL agent.</p>
Full article ">Figure 8
<p>The geometry of the SLAPS for RISeUAV.</p>
Full article ">
22 pages, 1366 KiB  
Article
Mobility-Aware Task Offloading and Resource Allocation in UAV-Assisted Vehicular Edge Computing Networks
by Long Chen, Jiaqi Du and Xia Zhu
Drones 2024, 8(11), 696; https://doi.org/10.3390/drones8110696 - 20 Nov 2024
Viewed by 299
Abstract
The rapid development of the Internet of Vehicles (IoV) and intelligent transportation systems has led to increased demand for real-time data processing and computation in vehicular networks. To address these needs, this paper proposes a task offloading framework for UAV-assisted Vehicular Edge Computing [...] Read more.
The rapid development of the Internet of Vehicles (IoV) and intelligent transportation systems has led to increased demand for real-time data processing and computation in vehicular networks. To address these needs, this paper proposes a task offloading framework for UAV-assisted Vehicular Edge Computing (VEC) systems, which considers the high mobility of vehicles and the limited coverage and computational capacities of drones. We introduce the Mobility-Aware Vehicular Task Offloading (MAVTO) algorithm, designed to optimize task offloading decisions, manage resource allocation, and predict vehicle positions for seamless offloading. MAVTO leverages container-based virtualization for efficient computation, offering flexibility in resource allocation in multiple offload modes: direct, predictive, and hybrid. Extensive experiments using real-world vehicular data demonstrate that the MAVTO algorithm significantly outperforms other methods in terms of task completion success rate, especially under varying task data volumes and deadlines. Full article
(This article belongs to the Special Issue UAV-Assisted Intelligent Vehicular Networks 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Task offloading from bi-directions moving in UAV-assisted Vehicular Edge Computing.</p>
Full article ">Figure 2
<p>Direct offloading model.</p>
Full article ">Figure 3
<p>Prediction offloading model.</p>
Full article ">Figure 4
<p>Mixed offloading model.</p>
Full article ">Figure 5
<p>Example diagram for calculating the remaining travel distance of the vehicle.</p>
Full article ">Figure 6
<p>The performance of different task offloading sequences under a 95% Tukey HSD confidence interval.</p>
Full article ">Figure 7
<p>The performance of different task offloading strategies under a 95% Tukey HSD confidence interval.</p>
Full article ">Figure 8
<p>The performance of different resource allocation strategies under a 95% Tukey HSD confidence interval.</p>
Full article ">Figure 9
<p>Interaction plots of the compared algorithms for tests with different vehicle numbers and task data volume under 95.0% Tukey HSD confidence interval.</p>
Full article ">Figure 10
<p>Interaction plots of the compared algorithms for tests with different container numbers and task data volume intervals under 95.0% Tukey HSD confidence interval.</p>
Full article ">Figure 11
<p>Interaction plots of the compared algorithms for tests with different vehicle numbers and task deadlines under 95.0% Tukey HSD confidence interval.</p>
Full article ">
15 pages, 588 KiB  
Article
Physical Layer Security in RIS-NOMA-Assisted IoV Systems with Uncertain RIS Deployment
by Jinyuan Gu, Zhao Zhang, Wei Duan, Feifei Song and Huaiping Zhang
Electronics 2024, 13(22), 4437; https://doi.org/10.3390/electronics13224437 - 12 Nov 2024
Viewed by 428
Abstract
Reconfigurable intelligent surfaces (RISs), as an emerging radio technology, are widely used to expand the transmission distance and structure cascade channels to improve the performance of communication systems. However, based on the continuous development of wireless communication technology, as Internet of Vehicles (IoV) [...] Read more.
Reconfigurable intelligent surfaces (RISs), as an emerging radio technology, are widely used to expand the transmission distance and structure cascade channels to improve the performance of communication systems. However, based on the continuous development of wireless communication technology, as Internet of Vehicles (IoV) communication systems assisted with RIS and non-orthogonal multiple access (NOMA) can improve the overall transmission rate and system performance, the physical layer security (PLS) issue has gradually attracted attention and has become more and more important in the application of the system. In this paper, our aim is to investigate the potential threats for PLS, where an RIS is utilized in order to improve the security of wireless communications. In particular, we consider the non-fixed RIS location and wiretapping behavior of eavesdroppers on the data in this work, and further analyze the maximum safe-rate for above location assumptions. Numerical results reveal that RIS provides significant advantages on security performance, as well as providing a useful reference for the security design of future wireless communication systems, which verify the correctness of our analysis and the effectiveness of the proposed scheme. Full article
Show Figures

Figure 1

Figure 1
<p>RIS-NOMA-assisted wireless network security communication system model.</p>
Full article ">Figure 2
<p>Total safe-rate versus location of the RIS.</p>
Full article ">Figure 3
<p>Safe-rates of <math display="inline"><semantics> <msub> <mi>x</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>x</mi> <mn>2</mn> </msub> </semantics></math> versus location of the RIS with different power allocations.</p>
Full article ">Figure 4
<p>Safe-rate of <math display="inline"><semantics> <msub> <mi>x</mi> <mn>1</mn> </msub> </semantics></math> versus the angle of the RIS relative to S in the case of different distances between the RIS and S.</p>
Full article ">Figure 5
<p>Relationship between the safe-rate of <math display="inline"><semantics> <msub> <mi>x</mi> <mn>1</mn> </msub> </semantics></math> and location of the RIS under different numbers of RIS reflection elements.</p>
Full article ">Figure 6
<p>Relationship between safe-rate of data <math display="inline"><semantics> <msub> <mi>x</mi> <mn>1</mn> </msub> </semantics></math> and transmission power.</p>
Full article ">Figure 7
<p>Relationship between safe-rate and power allocation factor.</p>
Full article ">
34 pages, 9001 KiB  
Article
Advanced System for Optimizing Electricity Trading and Flow Redirection in Internet of Vehicles Networks Using Flow-DNET and Taylor Social Optimization
by Radhika Somakumar, Padmanathan Kasinathan, Rajvikram Madurai Elavarasan and G. M. Shafiullah
Systems 2024, 12(11), 481; https://doi.org/10.3390/systems12110481 - 12 Nov 2024
Viewed by 653
Abstract
The transportation system has a big impact on daily lifestyle and it is essential to energy transition and decarbonization initiatives. Stabilizing the grid and incorporating sustainable energy sources require technologies like the Internet of Energy (IoE) and Internet of Vehicles (IoV). Electric vehicles [...] Read more.
The transportation system has a big impact on daily lifestyle and it is essential to energy transition and decarbonization initiatives. Stabilizing the grid and incorporating sustainable energy sources require technologies like the Internet of Energy (IoE) and Internet of Vehicles (IoV). Electric vehicles (EVs) are essential for cutting emissions and reliance on fossil fuels. According to research on flexible charging methods, allowing EVs to trade electricity can maximize travel distances and efficiently reduce traffic. In order to improve grid efficiency and vehicle coordination, this study suggests an ideal method for energy trading in the Internet of Vehicles (IoV) in which EVs bid for electricity and Road Side Units (RSUs) act as buyers. The Taylor Social Optimization Algorithm (TSOA) is employed for this auction process, focusing on energy and pricing to select the best Charging Station (CS). The TSOA integrates the Taylor series and Social Optimization Algorithm (SOA) to facilitate flow redirection post-trading, evaluating each RSU’s redirection factor to identify overloaded or underloaded CSs. The Flow-DNET model determines redirection policies for overloaded CSs. The TSOA + Flow-DNET approach achieved a pricing improvement of 0.816% and a redirection success rate of 0.918, demonstrating its effectiveness in optimizing electricity trading and flow management within the IoV framework. Full article
Show Figures

Figure 1

Figure 1
<p>System architecture for an IoV communication network for model EVs’ electricity trading.</p>
Full article ">Figure 2
<p>IoV application of taxonomy in various aspects. (Source: O. Kaiwartya et al., 2016) [<a href="#B19-systems-12-00481" class="html-bibr">19</a>].</p>
Full article ">Figure 3
<p>Taxonomy and realization of IoV communication with heterogeneous vehicular networks (Source: Ishita Seth et al., 2022, O. Kaiwartya et al., 2016) [<a href="#B19-systems-12-00481" class="html-bibr">19</a>,<a href="#B21-systems-12-00481" class="html-bibr">21</a>].</p>
Full article ">Figure 4
<p>Hierarchical integrated energy system enabled with IoV (Source Ying Wu et al., 2021, Elsevier) [<a href="#B22-systems-12-00481" class="html-bibr">22</a>].</p>
Full article ">Figure 5
<p>Comprehensive view of EI framework with three subsystems (Source Ying Wu et al., 2021, Elsevier) [<a href="#B22-systems-12-00481" class="html-bibr">22</a>].</p>
Full article ">Figure 6
<p>Essential components comprise the structure and architecture of the energy-focused network system. (Source Ying Wu et al., 2021, Elsevier) [<a href="#B22-systems-12-00481" class="html-bibr">22</a>].</p>
Full article ">Figure 7
<p>Communication-oriented network architecture and protocols (Source Ying Wu et al., 2021, Elsevier) [<a href="#B22-systems-12-00481" class="html-bibr">22</a>].</p>
Full article ">Figure 8
<p>System model of IoV network for electricity trading.</p>
Full article ">Figure 9
<p>Schematic view of optimal electricity trading model in IoV using proposed TSOA-based Flow-DNET.</p>
Full article ">Figure 10
<p>Integrated framework of IOV: a holistic view from architecture to communication.</p>
Full article ">Figure 11
<p>Proposed Taylor Social Optimization model algorithm flow with an optimal solution.</p>
Full article ">Figure 12
<p>Representation of solution using proposed TSOA algorithm.</p>
Full article ">Figure 13
<p>Structure of DBN.</p>
Full article ">Figure 14
<p>Experimental results of proposed TSOA-based Flow-DNET using (<b>a</b>) 100 nodes, (<b>b</b>) 150 nodes.</p>
Full article ">Figure 15
<p>Assessment with 100 nodes using (<b>a</b>) fitness, (<b>b</b>) pricing, (<b>c</b>) redirection success rate.</p>
Full article ">Figure 16
<p>Assessment with 150 nodes using (<b>a</b>) fitness, (<b>b</b>) pricing, (<b>c</b>) redirection success rate.</p>
Full article ">Figure 17
<p>Assessment with 200 nodes using (<b>a</b>) fitness, (<b>b</b>) pricing, (<b>c</b>) redirection success rate.</p>
Full article ">Figure 18
<p>Assessment with 250 nodes using (<b>a</b>) fitness, (<b>b</b>) pricing, (<b>c</b>) redirection success rate.</p>
Full article ">
12 pages, 2304 KiB  
Article
L-GraphSAGE: A Graph Neural Network-Based Approach for IoV Application Encrypted Traffic Identification
by Shihe Zhang, Ruidong Chen, Jingxue Chen, Yukun Zhu, Manyuan Hua, Jiaying Yuan and Fenghua Xu
Electronics 2024, 13(21), 4222; https://doi.org/10.3390/electronics13214222 - 28 Oct 2024
Viewed by 565
Abstract
Recently, with a crucial role in developing smart transportation systems, the Internet of Vehicles (IoV), with all kinds of in-vehicle devices, has undergone significant advancement for autonomous driving, in-vehicle infotainment, etc. With the development of these IoV devices, the complexity and volume of [...] Read more.
Recently, with a crucial role in developing smart transportation systems, the Internet of Vehicles (IoV), with all kinds of in-vehicle devices, has undergone significant advancement for autonomous driving, in-vehicle infotainment, etc. With the development of these IoV devices, the complexity and volume of in-vehicle data flows within information communication have increased dramatically. To adapt these changes to secure and smart transportation, encrypted communication realization, real-time decision-making, traffic management enhancement, and overall transportation efficiency improvement are essential. However, the security of a traffic system under encrypted communication is still inadequate, as attackers can identify in-vehicle devices through fingerprinting attacks, causing potential privacy breaches. Nevertheless, existing IoV traffic application models for encrypted traffic identification are weak and often exhibit poor generalization in some dynamic scenarios, where route switching and TCP congestion occur frequently. In this paper, we propose LineGraph-GraphSAGE (L-GraphSAGE), a graph neural network (GNN) model designed to improve the generalization ability of the IoV application of traffic identification in these dynamic scenarios. L-GraphSAGE utilizes node features, including text attributes, node context information, and node degree, to learn hyperparameters that can be transferred to unknown nodes. Our model demonstrates promising results in both UNSW Sydney public datasets and real-world environments. In public IoV datasets, we achieve an accuracy of 94.23%(↑0.23%). Furthermore, our model achieves an F1 change rate of 0.20%(↑96.92%) in α train, β infer, and 0.60%(↑75.00%) in β train, α infer when evaluated on a dataset consisting of five classes of data collected from real-world environments. These results highlight the effectiveness of our proposed approach in enhancing IoV application identification in dynamic network scenarios. Full article
(This article belongs to the Special Issue Graph-Based Learning Methods in Intelligent Transportation Systems)
Show Figures

Figure 1

Figure 1
<p>Packet change scenarios caused by route switching.</p>
Full article ">Figure 2
<p>Distribution of feature vectors between <math display="inline"><semantics> <mi>α</mi> </semantics></math> and <math display="inline"><semantics> <mi>β</mi> </semantics></math> environments. The t-SNE [<a href="#B18-electronics-13-04222" class="html-bibr">18</a>] method was used to project high-dimensional feature vectors extracted by algorithm [<a href="#B8-electronics-13-04222" class="html-bibr">8</a>] into 2D vectors. Dahua data collected from <math display="inline"><semantics> <mi>α</mi> </semantics></math> and <math display="inline"><semantics> <mi>β</mi> </semantics></math> environments are shown in <a href="#electronics-13-04222-t001" class="html-table">Table 1</a>.</p>
Full article ">Figure 3
<p>An overview of the L-GraphSAGE system architecture. For each IoV device, there are four phases. In the traffic collection phase, traffic collection and noise filtering are carried out. The flow processing phase uses DPKT to generate tuples and uses the algorithm in [<a href="#B8-electronics-13-04222" class="html-bibr">8</a>] to generate the tuple’s 123-dimensional features. The LineGraph building phase uses (IP, Port) as a node and edges as points to build the (IP, Port) graph, and then converts the points of the (IP, Port) graph to edges, and the edges to points, to build the line graph. In the model training phase, the constructed line graph is put into the model for training. Each of the five IoV device classes is trained on its model.</p>
Full article ">Figure 4
<p>Model generalization on five IoV devices’ data collection.</p>
Full article ">
44 pages, 5949 KiB  
Review
Review of Authentication, Blockchain, Driver ID Systems, Economic Aspects, and Communication Technologies in DWC for EVs in Smart Cities Applications
by Narayanamoorthi Rajamanickam, Pradeep Vishnuram, Dominic Savio Abraham, Miroslava Gono, Petr Kacor and Tomas Mlcak
Smart Cities 2024, 7(6), 3121-3164; https://doi.org/10.3390/smartcities7060122 - 24 Oct 2024
Viewed by 727
Abstract
The rapid advancement and adoption of electric vehicles (EVs) necessitate innovative solutions to address integration challenges in modern charging infrastructure. Dynamic wireless charging (DWC) is an innovative solution for powering electric vehicles (EVs) using multiple magnetic transmitters installed beneath the road and a [...] Read more.
The rapid advancement and adoption of electric vehicles (EVs) necessitate innovative solutions to address integration challenges in modern charging infrastructure. Dynamic wireless charging (DWC) is an innovative solution for powering electric vehicles (EVs) using multiple magnetic transmitters installed beneath the road and a receiver located on the underside of the EV. Dynamic charging offers a solution to the issue of range anxiety by allowing EVs to charge while in motion, thereby reducing the need for frequent stops. This manuscript reviews several pivotal areas critical to the future of EV DWC technology such as authentication techniques, blockchain applications, driver identification systems, economic aspects, and emerging communication technologies. Ensuring secure access to this charging infrastructure requires fast, lightweight authentication systems. Similarly, blockchain technology plays a critical role in enhancing the Internet of Vehicles (IoV) architecture by decentralizing and securing vehicular networks, thus improving privacy, security, and efficiency. Driver identification systems, crucial for EV safety and comfort, are analyzed. Additionally, the economic feasibility and impact of DWC are evaluated, providing essential insights into its potential effects on the EV ecosystem. The paper also emphasizes the need for quick and lightweight authentication systems to ensure secure access to DWC infrastructure and discusses how blockchain technology enhances the efficiency, security, and privacy of IoV networks. The importance of driver identification systems for comfort and safety is evaluated, and an economic study confirms the viability and potential benefits of DWC for the EV ecosystem. Full article
Show Figures

Figure 1

Figure 1
<p>Sectional-wise structure of the manuscript.</p>
Full article ">Figure 2
<p>DWC system: (<b>a</b>) Elongated rails; (<b>b</b>) Lumped pads; (<b>c</b>) Elongated pads.</p>
Full article ">Figure 3
<p>(<b>a</b>) DWC schematic; (<b>b</b>) Top view expressway.</p>
Full article ">Figure 3 Cont.
<p>(<b>a</b>) DWC schematic; (<b>b</b>) Top view expressway.</p>
Full article ">Figure 4
<p>Process of symmetric encryption.</p>
Full article ">Figure 5
<p>Sample four-key hash chain.</p>
Full article ">Figure 6
<p>Architecture model of FLPA (A-Auth: anonymous authentication, PAT: payment authorization token, RTA: registration trusted authority).</p>
Full article ">Figure 7
<p>Blockchain and IoV architecture.</p>
Full article ">Figure 8
<p>Applications of blockchain in IoV.</p>
Full article ">Figure 9
<p>Blockchain applications in IoV—grouping according to their areas of application.</p>
Full article ">Figure 10
<p>Blockchain application areas in the IoV.</p>
Full article ">Figure 11
<p>Restrictions of using blockchain in IoV-assisted smart grids.</p>
Full article ">Figure 12
<p>Data classifications for driver identification.</p>
Full article ">Figure 13
<p>Categorization of driver identification techniques.</p>
Full article ">Figure 14
<p>The RF model’s guiding principle.</p>
Full article ">Figure 15
<p>Structure of RNN.</p>
Full article ">Figure 16
<p>The hybrid model used by Hammann et al. [<a href="#B126-smartcities-07-00122" class="html-bibr">126</a>].</p>
Full article ">Figure 17
<p>The hybrid model pre-processing and model introduction.</p>
Full article ">Figure 18
<p>V2X communication of EVs.</p>
Full article ">Figure 19
<p>Implementing ML algorithms for forecasting EV.</p>
Full article ">Figure 20
<p>Publications on blockchain for EVs.</p>
Full article ">Figure 21
<p>Blockchain network of EV transportation.</p>
Full article ">
23 pages, 4649 KiB  
Article
A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks
by Xinyun Liu, Ronghua Xu and Yu Chen
Future Internet 2024, 16(11), 390; https://doi.org/10.3390/fi16110390 - 24 Oct 2024
Viewed by 684
Abstract
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is [...] Read more.
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is critical in enhancing road safety, traffic efficiency, and the overall driving experience by enabling a comprehensive data exchange platform. However, the open and dynamic nature of IoV networks brings significant performance and security challenges to IoV data acquisition, storage, and usage. To comprehensively tackle these challenges, this paper proposes a Decentralized Digital Watermarking framework for smart Vehicular networks (D2WaVe). D2WaVe consists of two core components: FIAE-GAN, a novel feature-integrated and attention-enhanced robust image watermarking model based on a Generative Adversarial Network (GAN), and BloVA, a Blockchain-based Video frames Authentication scheme. By leveraging an encoder–noise–decoder framework, trained FIAE-GAN watermarking models can achieve the invisibility and robustness of watermarks that can be embedded in video frames to verify the authenticity of video data. BloVA ensures the integrity and auditability of IoV data in the storing and sharing stages. Experimental results based on a proof-of-concept prototype implementation validate the feasibility and effectiveness of our D2WaVe scheme for securing and auditing video data exchange in smart vehicular networks. Full article
Show Figures

Figure 1

Figure 1
<p>The overview of an ITS consisting of multiple IoV networks.</p>
Full article ">Figure 2
<p>Architecture of DenseNet. DenseNet extracts both shallow and deep features, which are then fused with the watermark to enhance its robustness.</p>
Full article ">Figure 3
<p>Architecture of Spatial Attention Module. It helps embed the watermark in less noticeable regions.</p>
Full article ">Figure 4
<p>The architecture of D2WaVe.</p>
Full article ">Figure 5
<p>The illustration of video data authentication.</p>
Full article ">Figure 6
<p>Overall architecture of the proposed FIAE-GAN. The FIAE-GAN is an end-to-end watermarking network designed to automatically generate watermarks with both invisibility and robustness. The key components of the model, indicated in blue boxes, include the encoder, decoder, noise subnetwork, and discriminator.</p>
Full article ">Figure 7
<p>Architecture of encoder. The encoder includes (1) a Feature-Integrated Module (FIM) that utilizes dense connections to extract both shallow and deep features, which are then fused with the watermark to improve its robustness; (2) an Attention-Enhanced Module (AEM) that applies spatial attention to embed the watermark in less noticeable regions of the original image.</p>
Full article ">Figure 8
<p>Watermarking performance of FIAE-GAN. (<b>a</b>) Original image. (<b>b</b>) Encoded image.</p>
Full article ">Figure 9
<p>Subjective evaluation through histogram comparison of the original and watermarked images.</p>
Full article ">Figure 10
<p>Subjective evaluation through SIFT feature matching between the original and watermarked images.</p>
Full article ">Figure 11
<p>Comparative analysis of proposed work with HiDDeN [<a href="#B8-futureinternet-16-00390" class="html-bibr">8</a>], TSDL [<a href="#B47-futureinternet-16-00390" class="html-bibr">47</a>], MBRS [<a href="#B48-futureinternet-16-00390" class="html-bibr">48</a>], ReDMark [<a href="#B7-futureinternet-16-00390" class="html-bibr">7</a>].</p>
Full article ">
13 pages, 6160 KiB  
Article
Robust License Plate Recognition in OCC-Based Vehicle Networks Using Image Reconstruction
by Dingfa Zhang, Ziwei Liu, Weiye Zhu, Jie Zheng, Yimao Sun, Chen Chen and Yanbing Yang
Sensors 2024, 24(20), 6568; https://doi.org/10.3390/s24206568 - 12 Oct 2024
Viewed by 692
Abstract
With the help of traffic lights and street cameras, optical camera communication (OCC) can be adopted in Internet of Vehicles (IoV) applications to realize communication between vehicles and roadside units. However, the encoded light emitted by these OCC transmitters (LED infrastructures on the [...] Read more.
With the help of traffic lights and street cameras, optical camera communication (OCC) can be adopted in Internet of Vehicles (IoV) applications to realize communication between vehicles and roadside units. However, the encoded light emitted by these OCC transmitters (LED infrastructures on the roadside and/or LED-based headlamps embedded in cars) will generate stripe patterns in image frames captured by existing license-plate recognition systems, which seriously degrades the accuracy of the recognition. To this end, we propose and experimentally demonstrate a method that can reduce the interference of OCC stripes in the image frames captured by the license-plate recognition system. We introduce an innovative pipeline with an end-to-end image reconstruction module. This module learns the distribution of images without OCC stripes and provides high-quality license-plate images for recognition in OCC conditions. In order to solve the problem of insufficient data, we model the OCC strips as multiplicative noise and propose a method to synthesize a pairwise dataset under OCC using the existing license-plate dataset. Moreover, we also build a prototype to simulate real scenes of the OCC-based vehicle networks and collect data in such scenes. Overall, the proposed method can achieve a recognition performance of 81.58% and 79.35% on the synthesized dataset and that captured from real scenes, respectively, which is improved by about 31.18% and 24.26%, respectively, compared with the conventional method. Full article
Show Figures

Figure 1

Figure 1
<p>In applications of the IoV that adopt OCC, license-plate recognition cameras can interfere with coded light emitted from OCC devices; thus, the recognition performance is affected.</p>
Full article ">Figure 2
<p>Diagram of proposed license-plate recognition scheme workflow in the vehicle networks.</p>
Full article ">Figure 3
<p>We build a prototype that consists of a 30 W LED to simulate the LED infrastructures on the roadside in the OCC-based vehicle network and a Redmi K40 to simulate the LPR camera. We use this prototype to collect frames that are then used to build our dataset.</p>
Full article ">Figure 4
<p>Synthesize a dataset of OCC noise and original image. (<b>a</b>) OCC noise. (<b>b</b>) Original image. (<b>c</b>) Synthesized image.</p>
Full article ">Figure 5
<p>Examples of the captured dataset from real OCC-based vehicle network scene. (<b>a</b>) Distance 2 m, angle <math display="inline"><semantics> <msup> <mn>0</mn> <mo>∘</mo> </msup> </semantics></math>. (<b>b</b>) Distance 4 m, angle <math display="inline"><semantics> <msup> <mn>0</mn> <mo>∘</mo> </msup> </semantics></math>. (<b>c</b>) Distance 3 m, angle <math display="inline"><semantics> <msup> <mn>60</mn> <mo>∘</mo> </msup> </semantics></math>.</p>
Full article ">Figure 6
<p>A visualization comparison on synthesized image and real-scene image. (<b>a</b>) Synthesized OCC image. (<b>b</b>) Result of band-pass filter on the synthesized dataset. (<b>c</b>) Result of IR module on the synthesized dataset. (<b>d</b>) Real-scene OCC image. (<b>e</b>) Result of band-pass filter in real scenes. (<b>f</b>) Result of IR module in real scenes.</p>
Full article ">Figure 7
<p>Detection accuracy under varying settings on the synthesized dataset. (<b>a</b>) Increasing ISO. (<b>b</b>) Increasing shutter speed. (<b>c</b>) Increasing data rate.</p>
Full article ">Figure 8
<p>Recognition accuracy with different settings on the synthesized dataset. (<b>a</b>) Increasing ISO. (<b>b</b>) Increasing shutter speed. (<b>c</b>) Increasing data rate.</p>
Full article ">Figure 9
<p>Recognition accuracy under varying experiments in real scenes of the OCC-based vehicle networks. (<b>a</b>) Increasing distance. (<b>b</b>) Varying angle.</p>
Full article ">
22 pages, 4831 KiB  
Article
Kinodynamic Model-Based UAV Trajectory Optimization for Wireless Communication Support of Internet of Vehicles in Smart Cities
by Mohsen Eskandari, Andrey V. Savkin and Mohammad Deghat
Drones 2024, 8(10), 574; https://doi.org/10.3390/drones8100574 - 11 Oct 2024
Viewed by 858
Abstract
Unmanned aerial vehicles (UAVs) are utilized for wireless communication support of Internet of Intelligent Vehicles (IoVs). Intelligent vehicles (IVs) need vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) wireless communication for real-time perception knowledge exchange and dynamic environment modeling for safe autonomous driving and mission accomplishment. [...] Read more.
Unmanned aerial vehicles (UAVs) are utilized for wireless communication support of Internet of Intelligent Vehicles (IoVs). Intelligent vehicles (IVs) need vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) wireless communication for real-time perception knowledge exchange and dynamic environment modeling for safe autonomous driving and mission accomplishment. UAVs autonomously navigate through dense urban areas to provide aerial line-of-sight (LoS) communication links for IoVs. Real-time UAV trajectory design is required for minimum energy consumption and maximum channel performance. However, this is multidisciplinary research including (1) dynamic-aware kinematic (kinodynamic) planning by considering UAVs’ motion and nonholonomic constraints; (2) channel modeling and channel performance improvement in future wireless networks (i.e., beyond 5G and 6G) that are limited to beamforming to LoS links with the aid of reconfigurable intelligent surfaces (RISs); and (3) real-time obstacle-free crash avoidance 3D trajectory optimization in dense urban areas by modeling obstacles and LoS paths in convex programming. Modeling and solving this multilateral problem in real-time are computationally prohibitive unless extensive computational and overhead processing costs are imposed. To pave the path for computationally efficient yet feasible real-time trajectory optimization, this paper presents UAV kinodynamic modeling. Then, it proposes a convex trajectory optimization problem with the developed linear kinodynamic models. The optimality and smoothness of the trajectory optimization problem are improved by utilizing model predictive control and quadratic state feedback control. Simulation results are provided to validate the methodology. Full article
Show Figures

Figure 1

Figure 1
<p>Quadrotor motion principle and kinematic-dynamic modeling: (<b>a</b>) quadrotor motion in the Earth reference frame (<math display="inline"><semantics> <mrow> <mi>O</mi> </mrow> </semantics></math>) and its rigid body reference frame (<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>O</mi> </mrow> <mrow> <mi>B</mi> </mrow> </msub> </mrow> </semantics></math>); (<b>b</b>) rotating propellers 1 to 4 create forces <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>F</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> to <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>F</mi> </mrow> <mrow> <mn>4</mn> </mrow> </msub> </mrow> </semantics></math>, and the resultant force of propellers with various speeds results in quadrotor motion in various directions.</p>
Full article ">Figure 2
<p>The UAV (as RISeUAV or UAV-BS) navigates to provide aerial wireless communication support for IoVs in future 6G networks.</p>
Full article ">Figure 3
<p>A naive illustration of the imposed limitations by motion constraints for converging to the global optimum trajectory by solving <math display="inline"><semantics> <mrow> <mi mathvariant="script">P</mi> <mn>1</mn> </mrow> </semantics></math> for each sample time.</p>
Full article ">Figure 4
<p>Illustration of the smoothing algorithm and concepts of the elasticity and smoothness of rubber bands.</p>
Full article ">Figure 5
<p>Simulation results of the proposed trajectory optimization method in the first scenario: (<b>a</b>) 3D occupancy map of the simulated dense urban area; (<b>b</b>) 2D view of the map, including BSs (shown by black triangles) and routes of four ground intelligent vehicles (with colored squares as the waypoints corresponding to discretized sample times) (<b>c</b>) 3D view of the generated trajectory for the proposed method (shown by the green line with red dots indicating the waypoints); (<b>d</b>) 2D view of the trajectories.</p>
Full article ">Figure 6
<p>Simulation results for the second scenario, in which the UAV maximum altitude is limited to be less than the average height of a tall building.</p>
Full article ">Figure 7
<p>Simulation results illustrate the performance of the smoothing technique.</p>
Full article ">Figure 8
<p>Simulation results of the RRT method in 153.546 s: (<b>a</b>) 3D view; (<b>b</b>) 2D view.</p>
Full article ">
18 pages, 970 KiB  
Article
Enhancing Federated Learning in Heterogeneous Internet of Vehicles: A Collaborative Training Approach
by Chao Wu, Hailong Fan, Kan Wang and Puning Zhang
Electronics 2024, 13(20), 3999; https://doi.org/10.3390/electronics13203999 - 11 Oct 2024
Cited by 1 | Viewed by 709
Abstract
The current Internet of Vehicles (IoV) faces significant challenges related to resource heterogeneity, which adversely impacts the convergence speed and accuracy of federated learning models. Existing studies have not adequately addressed the problem of resource-constrained vehicles that slow down the federated learning process [...] Read more.
The current Internet of Vehicles (IoV) faces significant challenges related to resource heterogeneity, which adversely impacts the convergence speed and accuracy of federated learning models. Existing studies have not adequately addressed the problem of resource-constrained vehicles that slow down the federated learning process particularly under conditions of high mobility. To tackle this issue, we propose a model partition collaborative training mechanism that decomposes training tasks for resource-constrained vehicles while retaining the original data locally. By offloading complex computational tasks to nearby service vehicles, this approach effectively accelerates the slow training speed of resource-limited vehicles. Additionally, we introduce an optimal matching method for collaborative service vehicles. By analyzing common paths and time delays, we match service vehicles with similar routes and superior performance within mobile service vehicle clusters to provide effective collaborative training services. This method maximizes training efficiency and mitigates the negative effects of vehicle mobility on collaborative training. Simulation experiments demonstrate that compared to benchmark methods, our approach reduces the impact of mobility on collaboration, achieving large improvements in the training speed and the convergence time of federated learning. Full article
Show Figures

Figure 1

Figure 1
<p>The proposed FedHC framework.</p>
Full article ">Figure 2
<p>Binary collaborative training.</p>
Full article ">Figure 3
<p>Ternary collaborative training.</p>
Full article ">Figure 4
<p>Comparison of test accuracy with the same training time.</p>
Full article ">Figure 5
<p>Comparison of test accuracy under the same training round.</p>
Full article ">Figure 6
<p>Compares the total training time of 150 global aggregation rounds.</p>
Full article ">
20 pages, 3271 KiB  
Article
Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model
by Mostafa Mahmoud El-Gayar, Faheed A. F. Alrslani and Shaker El-Sappagh
Information 2024, 15(10), 583; https://doi.org/10.3390/info15100583 - 24 Sep 2024
Viewed by 844
Abstract
The advent of the Fourth Industrial Revolution has positioned the Internet of Things as a pivotal force in intelligent vehicles. With the source of vehicle-to-everything (V2X), Internet of Things (IoT) networks, and inter-vehicle communication, intelligent connected vehicles are at the forefront of this [...] Read more.
The advent of the Fourth Industrial Revolution has positioned the Internet of Things as a pivotal force in intelligent vehicles. With the source of vehicle-to-everything (V2X), Internet of Things (IoT) networks, and inter-vehicle communication, intelligent connected vehicles are at the forefront of this transformation, leading to complex vehicular networks that are crucial yet susceptible to cyber threats. The complexity and openness of these networks expose them to a plethora of cyber-attacks, from passive eavesdropping to active disruptions like Denial of Service and Sybil attacks. These not only compromise the safety and efficiency of vehicular networks but also pose a significant risk to the stability and resilience of the Internet of Vehicles. Addressing these vulnerabilities, this paper proposes a Dynamic Forest-Structured Ensemble Network (DFSENet) specifically tailored for the Internet of Vehicles (IoV). By leveraging data-balancing techniques and dimensionality reduction, the DFSENet model is designed to detect a wide range of cyber threats effectively. The proposed model demonstrates high efficacy, with an accuracy of 99.2% on the CICIDS dataset and 98% on the car-hacking dataset. The precision, recall, and f-measure metrics stand at 95.6%, 98.8%, and 96.9%, respectively, establishing the DFSENet model as a robust solution for securing the IoV against cyber-attacks. Full article
(This article belongs to the Special Issue Intrusion Detection Systems in IoT Networks)
Show Figures

Figure 1

Figure 1
<p>Proposed CIDSs.</p>
Full article ">Figure 2
<p>Heatmaps Depicting the Feature Correlation in CICIDS data at various processing stages: (<b>a</b>) the heatmap demonstrating data feature correlations following feature selection; (<b>b</b>) the heatmap showing data feature correlations following the implementation of PCA.</p>
Full article ">Figure 3
<p>Structure of the DFSENet.</p>
Full article ">Figure 4
<p>Consolidation of 13 subcategories into six main categories from the original CICIDS2017 dataset during preprocessing.</p>
Full article ">Figure 5
<p>Distribution of the car-hacking dataset, highlighting the preponderance of attack samples at 95%, with no data balancing required.</p>
Full article ">Figure 6
<p>Comparative visualization of the detection performance of the RF model using various data-balancing techniques tested on the original testing set.</p>
Full article ">Figure 7
<p>Performance metrics of the optimal base estimators for the IDS model.</p>
Full article ">Figure 8
<p>Confusion matrices (<b>a</b>) obtained from the CICIDS testing set, and (<b>b</b>) obtained from the car-hacking dataset’s testing set.</p>
Full article ">Figure 9
<p>Evaluation metrics for each category in the CICIDS testing set, highlighting DFSENet’s superior detection performance with a special note of the ‘Botnet’ Category’s high recall and lower precision.</p>
Full article ">Figure 10
<p>Performance overview of the proposed IDS on the car-hacking dataset.</p>
Full article ">
24 pages, 5436 KiB  
Article
An Efficient SM9 Aggregate Signature Scheme for IoV Based on FPGA
by Bolin Zhang, Bin Li, Jiaxin Zhang, Yuanxin Wei, Yunfei Yan, Heru Han and Qinglei Zhou
Sensors 2024, 24(18), 6011; https://doi.org/10.3390/s24186011 - 17 Sep 2024
Viewed by 680
Abstract
With the rapid development of the Internet of Vehicles (IoV), the demand for secure and efficient signature verification is becoming increasingly urgent. To meet this need, we propose an efficient SM9 aggregate signature scheme implemented on Field-Programmable Gate Array (FPGA). The scheme includes [...] Read more.
With the rapid development of the Internet of Vehicles (IoV), the demand for secure and efficient signature verification is becoming increasingly urgent. To meet this need, we propose an efficient SM9 aggregate signature scheme implemented on Field-Programmable Gate Array (FPGA). The scheme includes both fault-tolerant and non-fault-tolerant aggregate signature modes, which are designed to address challenges in various network environments. We provide security proofs for these two signature verification modes based on a K-ary Computational Additive Diffie–Hellman (K-CAA) difficult problem. To handle the numerous parallelizable elliptic curve point multiplication operations required during verification, we utilize FPGA’s parallel processing capabilities to design an efficient parallel point multiplication architecture. By the Montgomery point multiplication algorithm and the Barrett modular reduction algorithm, we optimize the single-point multiplication computation unit, achieving a point multiplication speed of 70776 times per second. Finally, the overall scheme was simulated and analyzed on an FPGA platform. The experimental results and analysis indicate that under error-free conditions, the proposed non-fault-tolerant aggregate mode reduces the verification time by up to 97.1% compared to other schemes. In fault-tolerant conditions, the proposed fault-tolerant aggregate mode reduces the verification time by up to 77.2% compared to other schemes. When compared to other fault-tolerant aggregate schemes, its verification time is only 28.9% of their consumption, and even in the non-fault-tolerant aggregate mode, the verification time is reduced by at least 39.1%. Therefore, the proposed scheme demonstrates significant advantages in both error-free and fault-tolerant scenarios. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

Figure 1
<p>Overall architecture of SM9 algorithm.</p>
Full article ">Figure 2
<p>The overall structure of the efficient SM9 aggregate signature scheme.</p>
Full article ">Figure 3
<p>Hardware acceleration overall structure.</p>
Full article ">Figure 4
<p>The figure of master state machine state transition.</p>
Full article ">Figure 5
<p>The figure of modular addition and subtraction units.</p>
Full article ">Figure 6
<p>Overall architecture of KOA 256 bit algorithm.</p>
Full article ">Figure 7
<p>Efficiency analysis of error free aggregation signature verification.</p>
Full article ">Figure 8
<p>Efficiency analysis of fault-tolerant aggregate signature.</p>
Full article ">
14 pages, 1355 KiB  
Article
Efficient Collaborative Edge Computing for Vehicular Network Using Clustering Service
by Ali Al-Allawee, Pascal Lorenz and Alhamza Munther
Network 2024, 4(3), 390-403; https://doi.org/10.3390/network4030018 - 6 Sep 2024
Viewed by 1045
Abstract
Internet of Vehicles applications are known to be critical and time-sensitive. The value proposition of edge computing comprises its lower latency, advantageous bandwidth consumption, privacy, management, efficiency of treatments, and mobility, which aim to improve vehicular and traffic services. Successful stories have been [...] Read more.
Internet of Vehicles applications are known to be critical and time-sensitive. The value proposition of edge computing comprises its lower latency, advantageous bandwidth consumption, privacy, management, efficiency of treatments, and mobility, which aim to improve vehicular and traffic services. Successful stories have been observed between IoV and edge computing to support smooth mobility and the use of local resources. However, vehicle travel, especially due to high-speed movement and intersections, can result in IoV devices losing connection and/or processing with high latency. This paper proposes a Cluster Collaboration Vehicular Edge Computing (CCVEC) framework that aims to guarantee and enhance the connectivity between vehicle sensors and the cloud by utilizing the edge computing paradigm in the middle. The objectives are achieved by utilizing the cluster management strategies deployed between cloud and edge computing servers. The framework is implemented in OpenStack cloud servers and evaluated by measuring the throughput, latency, and memory parameters in two different scenarios. The results obtained show promising indications in terms of latency (approximately 390 ms of the ideal status) and throughput (30 kB/s) values, and thus appears acceptable in terms of performance as well as memory. Full article
(This article belongs to the Special Issue Convergence of Edge Computing and Next Generation Networking)
Show Figures

Figure 1

Figure 1
<p>Edge vs. cloud server.</p>
Full article ">Figure 2
<p>Architecture of vehicular edge computing.</p>
Full article ">Figure 3
<p>CCVEC framework components.</p>
Full article ">Figure 4
<p>Passing messages.</p>
Full article ">Figure 5
<p>Testing scenario: (<b>a</b>) VM to VM with the same network; (<b>b</b>) VM to VM with a different network.</p>
Full article ">Figure 6
<p>Round trip time in ms (latency) for scenario 1.</p>
Full article ">Figure 7
<p>Throughput (kB/s) in scenario 1.</p>
Full article ">Figure 8
<p>Memory usage (%) in scenario 1.</p>
Full article ">Figure 9
<p>Round trip time in ms (latency) for scenario 2.</p>
Full article ">Figure 10
<p>Throughput (kB/s) in scenario 2.</p>
Full article ">Figure 11
<p>Memory usage (%) in scenario 2.</p>
Full article ">
10 pages, 1662 KiB  
Data Descriptor
TM–IoV: A First-of-Its-Kind Multilabeled Trust Parameter Dataset for Evaluating Trust in the Internet of Vehicles
by Yingxun Wang, Adnan Mahmood, Mohamad Faizrizwan Mohd Sabri and Hushairi Zen
Data 2024, 9(9), 103; https://doi.org/10.3390/data9090103 - 31 Aug 2024
Viewed by 1059
Abstract
The emerging and promising paradigm of the Internet of Vehicles (IoV) employ vehicle-to-everything communication for facilitating vehicles to not only communicate with one another but also with the supporting roadside infrastructure, vulnerable pedestrians, and the backbone network in a bid to primarily address [...] Read more.
The emerging and promising paradigm of the Internet of Vehicles (IoV) employ vehicle-to-everything communication for facilitating vehicles to not only communicate with one another but also with the supporting roadside infrastructure, vulnerable pedestrians, and the backbone network in a bid to primarily address a number of safety-critical vehicular applications. Nevertheless, owing to the inherent characteristics of IoV networks, in particular, of being (a) highly dynamic in nature and which results in a continual change in the network topology and (b) non-deterministic owing to the intricate nature of its entities and their interrelationships, they are susceptible to a number of malicious attacks. Such kinds of attacks, if and when materialized, jeopardizes the entire IoV network, thereby putting human lives at risk. Whilst the cryptographic-based mechanisms are capable of mitigating the external attacks, the internal attacks are extremely hard to tackle. Trust, therefore, is an indispensable tool since it facilitates in the timely identification and eradication of malicious entities responsible for launching internal attacks in an IoV network. To date, there is no dataset pertinent to trust management in the context of IoV networks and the same has proven to be a bottleneck for conducting an in-depth research in this domain. The manuscript-at-hand, accordingly, presents a first of its kind trust-based IoV dataset encompassing 96,707 interactions amongst 79 vehicles at different time instances. The dataset involves nine salient trust parameters, i.e., packet delivery ratio, similarity, external similarity, internal similarity, familiarity, external familiarity, internal familiarity, reward/punishment, and context, which play a considerable role in ascertaining the trust of a vehicle within an IoV network. Full article
Show Figures

Figure 1

Figure 1
<p>An IoV landscape.</p>
Full article ">Figure 2
<p>Depicting a realistic urban mobility scenario for Jinan (a city in the Shandong province of the People’s Republic of China).</p>
Full article ">Figure 3
<p>Packet delivery ratios of 79 vehicles in an IoV network.</p>
Full article ">Figure 4
<p>Similarity-related values of 79 vehicles in an IoV network.</p>
Full article ">Figure 5
<p>Familiarity-related values of 79 vehicles in an IoV network.</p>
Full article ">Figure 6
<p>Reward/punishment-related values of 79 vehicles in an IoV network.</p>
Full article ">Figure 7
<p>Context-related values of 79 vehicles in an IoV network.</p>
Full article ">
Back to TopTop