期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
Quantitative Survivability Analysis Using Probability Model Checking: A Study of Cluster-Based Vehicle Networks with Dual Cluster Heads 被引量:3
1
作者 Li Jin Guoan Zhang +2 位作者 Jue Wang Hao Zhu Wei Duan 《China Communications》 SCIE CSCD 2020年第2期206-219,共14页
As an important part of future 5G wireless networks,a vehicular network demands safety,reliability and connectivity.In this context,networking survivability is usually considered an important metric to evaluate networ... As an important part of future 5G wireless networks,a vehicular network demands safety,reliability and connectivity.In this context,networking survivability is usually considered an important metric to evaluate network performance.In this paper,we propose a survivability model for vehicle communication networking based on dual cluster heads,wherein a backup cluster head(CH)will be activated if the primary CH fails,thereby effectively enhancing the network lifetime.Additionally,we introduce a software rejuvenation strategy for the prime CH to further improve the survivability of the entire network.Using the Probabilistic Symbolic Model Checker(PRISM),we verify and discuss the proposed survivability model via numerical simulations.The results show that network survivability can be effectively improved by introducing an additional CH and further enhanced by adopting the software rejuvenation technique. 展开更多
关键词 cluster head 5G software recovery SURVIVABILITY vehicle networks
下载PDF
Average Secrecy Capacity of the Reconfigurable Intelligent Surface-Assisted Integrated Satellite Unmanned Aerial Vehicle Relay Networks
2
作者 Ping Li Kefeng Guo +2 位作者 Feng Zhou XuelingWang Yuzhen Huang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1849-1864,共16页
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e... Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks reconfigurable intelligent surface average secrecy capacity(ASC) asymptotic ASC
下载PDF
Secure connectivity analysis in unmanned aerial vehicle networks 被引量:4
3
作者 Xin YUAN Zhi-yong FENG +2 位作者 Wen-jun XU Zhi-qing WEI Ren-ping LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第3期409-422,共14页
The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and thr... The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and threats. In this study, we propose a novel trust model for UAVNs that is based on the behavior and mobility pattern of UAV nodes and the characteristics of inter-UAV channels. The proposed trust model consists of four parts: direct trust section, indirect trust section, integrated trust section, and trust update section. Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when there is both a physical link and a trust link between two UAVs. Moreover, the metrics of both the physical connectivity probability and the secure connectivity probability between two UAVs are adopted to analyze the connectivity of UAVNs. We derive accurate and analytical expressions of both the physical connectivity probability and the secure connectivity probability using stochastic geometry with or without Doppler shift. Extensive simulations show that compared with the physical connection probability with or without malicious attacks, the proposed trust model can guarantee secure communication and reliable connectivity between UAVs and enhance network performance when UAVNs face malicious attacks and other security risks. 展开更多
关键词 Unmanned aerial vehicle networks(UAVNs) Trust model Secure connectivity Doppler shift
原文传递
A Vehicle Routing Problem Based on Intelligent Batteries Transfer Management for the EV Network 被引量:2
4
作者 XIA Yamei CHENG Bo 《China Communications》 SCIE CSCD 2014年第5期160-169,共10页
Batteries transfer management is one important aspect in electric vehicle(EV)network's intelligent operation management system.Batteries transfer is a special and much more complex VRP(Vehicle Routing Problem) whi... Batteries transfer management is one important aspect in electric vehicle(EV)network's intelligent operation management system.Batteries transfer is a special and much more complex VRP(Vehicle Routing Problem) which takes the multiple constraints such as dynamic multi-depots,time windows,simultaneous pickups and deliveries,distance minimization,etc.into account.We call it VRPEVB(VRP with EV Batteries).This paper,based on the intelligent management model of EV's battery power,puts forward a battery transfer algorithm for the EV network which considers the traffic congestion that changes dynamically and uses improved Ant Colony Optimization.By setting a reasonable tabv range,special update rules of the pheromone and path list memory functions,the algorithm can have a better convergence,and its feasibility is proved by the experiment in an EV's demonstration operation system. 展开更多
关键词 VRP battery power management ant colony algorithm electric vehicle network
下载PDF
Sensing and Communication Integrated Fast Neighbor Discovery for UAV Networks
5
作者 WEI Zhiqing ZHANG Yongji +1 位作者 JI Danna LI Chenfei 《ZTE Communications》 2024年第3期69-82,共14页
In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communicati... In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms. 展开更多
关键词 unmanned aerial vehicle networks neighbor discovery integrated sensing and communication reinforcement learning Kalman filter
下载PDF
An Optimized Vertical Handoff Algorithm Based on Markov Process in Vehicle Heterogeneous Network 被引量:4
6
作者 MA Bin DENG Hong +1 位作者 XIE Xianzhong LIAO Xiaofeng 《China Communications》 SCIE CSCD 2015年第4期106-116,共11页
In order to solve the problem the existing vertical handoff algorithms of vehicle heterogeneous wireless network do not consider the diversification of network's status, an optimized vertical handoff algorithm bas... In order to solve the problem the existing vertical handoff algorithms of vehicle heterogeneous wireless network do not consider the diversification of network's status, an optimized vertical handoff algorithm based on markov process is proposed and discussed in this paper. This algorithm takes into account that the status transformation of available network will affect the quality of service(Qo S) of vehicle terminal's communication service. Firstly, Markov process is used to predict the transformation of wireless network's status after the decision via transition probability. Then the weights of evaluating parameters will be determined by fuzzy logic method. Finally, by comparing the total incomes of each wireless network, including handoff decision incomes, handoff execution incomes and communication service incomes after handoff, the optimal network to handoff will be selected. Simulation results show that: the algorithm proposed, compared to the existing algorithm, is able to receive a higher level of load balancing and effectively improves the average blocking rate, packet loss rate and ping-pang effect. 展开更多
关键词 vehicle heterogeneous network vertical handoff markov process fuzzy logic multi-attribute decision
下载PDF
A Self-Adaptive Back-off Optimization Scheme Based on Beacons Probability Prediction for Vehicle Ad-Hoc Networks 被引量:1
7
作者 Haitao Zhao Aiqian Du +2 位作者 Hongbo Zhu Dapeng Li Nanjie Liu 《China Communications》 SCIE CSCD 2016年第12期132-138,共7页
In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship ... In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship between expiration probability and minimum window size was reached by building a Markov model. According to this conclusion, a back-off algorithm based on adjusting the size of minimum contention window called CEB is proposed, and this algorithm is on the basis of the differential size between the number of expiration beacons and preset threshold. Simulations were done to compare the performance of CEB with that of RBEB and BEB, and the results show that the performance of the new proposed algorithm is better than that of RBEB and BEB. 展开更多
关键词 vehicle ad-hoc networks back off BEACON expiration probability collision probability
下载PDF
An Anonymous Authentication Scheme with Controllable Linkability for Vehicle Sensor Networks 被引量:1
8
作者 Yousheng Zhou Lvjun Chen +1 位作者 Xiaofeng Zhao Zheng Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第12期1101-1118,共18页
Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible... Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible to a broad range of attacks.In addition to ensuring security for both data-at-rest and data-in-transit,it is essential to preserve the privacy of data and users in vehicle sensor networks.Many existing authentication schemes for vehicle sensor networks are generally not designed to also preserve the privacy between the user and service provider(e.g.,mining user data to provide personalized services without infringing on user privacy).Controllable linkability can be used to facilitate an involved entity with the right linking key to determine whether two messages were generated by the same sender,while preserving the anonymity of the signer.Such a functionality is very useful to provide personalized services.Thus,in this paper,a threshold authentication scheme with anonymity and controllable linkability for vehicle sensor networks is constructed,and its security is analyzed under the random oracle model. 展开更多
关键词 Threshold authentication controllable linkabilty group signature vehicle sensor networks
下载PDF
An Optimization Scheme for Task Offloading and Resource Allocation in Vehicle Edge Networks 被引量:1
9
作者 Yuxin Xu Zilong Jin +1 位作者 Xiaorui Zhang Lejun Zhang 《Journal on Internet of Things》 2020年第4期163-173,共11页
The vehicle edge network(VEN)has become a new research hotspot in the Internet of Things(IOT).However,many new delays are generated during the vehicle offloading the task to the edge server,which will greatly reduce t... The vehicle edge network(VEN)has become a new research hotspot in the Internet of Things(IOT).However,many new delays are generated during the vehicle offloading the task to the edge server,which will greatly reduce the quality of service(QOS)provided by the vehicle edge network.To solve this problem,this paper proposes an evolutionary algorithm-based(EA)task offloading and resource allocation scheme.First,the delay of offloading task to the edge server is generally defined,then the mathematical model of problem is given.Finally,the objective function is optimized by evolutionary algorithm,and the optimal solution is obtained by iteration and averaging.To verify the performance of this method,contrast experiments are conducted.The experimental results show that our purposed method reduces delay and improves QOS,which is superior to other schemes. 展开更多
关键词 vehicle edge network evolutionary algorithm task offloading resource allocation
下载PDF
Secrecy Outage Probability for Two-Way Integrated Satellite Unmanned Aerial Vehicle Relay Networks with Hardware Impairments
10
作者 Xiaoting Ren Kefeng Guo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2515-2530,共16页
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy... In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks two-way unmanned aerial vehicle relay hardware impairments secrecy outage probability(SOP) asymptotic SOP
下载PDF
Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm
11
作者 C.Nandagopal P.Siva Kumar +1 位作者 R.Rajalakshmi S.Anandamurugan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期113-126,共14页
Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data tr... Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data transfer,and data loss,affect the effectiveness of Transmission Control Protocols(TCP)on such wireless ad hoc networks.To avoid the problem,in this paper,mobility-aware zone-based routing in VANET is proposed.To achieve this con-cept,in this paper hybrid optimization algorithm is presented.The hybrid algo-rithm is a combination of Ant colony optimization(ACO)and artificial bee colony optimization(ABC).The proposed hybrid algorithm is designed for the routing process which is transmitting the information from one place to another.The optimal routing process is used to avoid traffic and link failure.Thefitness function is designed based on Link stability and Residual energy.The validation of the proposed algorithm takes solution encoding,fitness calculation,and updat-ing functions.To perform simulation experiments,NS2 simulator software is used.The performance of the proposed approach is analyzed based on different metrics namely,delivery ratio,delay time,throughput,and overhead.The effec-tiveness of the proposed method compared with different algorithms.Compared to other existing VANET algorithms,the hybrid algorithm has proven to be very efficient in terms of packet delivery ratio and delay. 展开更多
关键词 vehicle ad hoc network transmission control protocol multi-hop data transmission ant colony optimization artificial bee colony optimization
下载PDF
Multi-objective robust secure beamforming for cognitive satellite and UAV networks 被引量:3
12
作者 WANG Zining LIN Min +3 位作者 TANG Xiaogang GUO Kefeng HUANG Shuo CHENG Ming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第4期789-798,共10页
A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with t... A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with the UAV network,we first consider both achievable secrecy rate maximization and total transmit power minimization,and formulate a multi-objective optimization problem(MOOP)using the weighted Tchebycheff approach.Then,by supposing that only imperfect channel state information based on the angular information is available,we propose a method combining angular discretization with Taylor approximation to transform the non-convex objective function and constraints to the convex ones.Next,we adopt semi-definite programming together with randomization technology to solve the original MOOP and obtain the BF weight vector.Finally,simulation results illustrate that the Pareto optimal trade-off can be achieved,and the superiority of our proposed scheme is confirmed by comparing with the existing BF schemes. 展开更多
关键词 cognitive satellite and unmanned aerial vehicle network(CSUN) multi-objective optimization robust secure beamforming(BF) weighted Tchebycheff approach
下载PDF
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles 被引量:1
13
作者 LIANG Wei RUAN Zhiqiang +1 位作者 TANG Mingdong LI Peng 《China Communications》 SCIE CSCD 2016年第2期121-129,共9页
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ... Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms. 展开更多
关键词 wireless vehicle network datacollection protocol network sensing chain self'-adaptive sensing sensing distance threshold.
下载PDF
RFID assisted intelligent vehicle communication management system 被引量:1
14
作者 YANG Qing-xue Zhou Jiang 《International Journal of Technology Management》 2017年第3期70-72,共3页
RFID is an important technology in the Internet of things that has the characteristics of safe, affordable, efficient, which received widespread attention and research. This paper proposes a UHF RFID-based intelligent... RFID is an important technology in the Internet of things that has the characteristics of safe, affordable, efficient, which received widespread attention and research. This paper proposes a UHF RFID-based intelligent vehicle management system (the Internet). The system consists of RFID hardware system, CDMA system, the GIA system, data processing system, and can realize intelligent vehicle identification, location, tracking, velocity measurement, monitoring and management, to address the current severe road congestion, speeding, vehicle theft and vehicle overload management and other issues. Software and hardware design of intelligent vehicle management system based on RFID, focuses on systems, security design, selection of RFID cards and vehicle access control software features, the fleet management system is not only convenient, but also intelligent identification of vehicles and vehicle theft, in the community, school, car park and vehicle management occasions has a good application. 展开更多
关键词 RFID vehicle networking LOCATION vehicle management intelligent identification
下载PDF
Vehicle Detection Based on Visual Saliency and Deep Sparse Convolution Hierarchical Model 被引量:4
15
作者 CAI Yingfeng WANG Hai +2 位作者 CHEN Xiaobo GAO Li CHEN Long 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2016年第4期765-772,共8页
Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high ... Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high processing times and low vehicle detection performance.To address this issue,a visual saliency and deep sparse convolution hierarchical model based vehicle detection algorithm is proposed.A visual saliency calculation is firstly used to generate a small vehicle candidate area.The vehicle candidate sub images are then loaded into a sparse deep convolution hierarchical model with an SVM-based classifier to perform the final detection.The experimental results demonstrate that the proposed method is with 94.81% correct rate and 0.78% false detection rate on the existing datasets and the real road pictures captured by our group,which outperforms the existing state-of-the-art algorithms.More importantly,high discriminative multi-scale features are generated by deep sparse convolution network which has broad application prospects in target recognition in the field of intelligent vehicle. 展开更多
关键词 vehicle detection visual saliency deep model convolution neural network
下载PDF
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network
16
作者 Lemei Da Hai Liang +3 位作者 Yong Ding Yujue Wang Changsong Yang Huiyong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期879-902,共24页
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity. 展开更多
关键词 Unmanned aerial vehicle cluster network certificateless signcryption certificateless signature batch verification source authentication data privacy blockchain
下载PDF
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks
17
作者 Xiaoting Ma Junhui Zhao +1 位作者 Jieyu Liao Ziyang Zhang 《Digital Communications and Networks》 SCIE CSCD 2023年第3期628-637,共10页
Inspired by mobile edge computing(MEC),edge learning has gained a momentum by directly performing model training at network edge without sending massive data to a centralized data center.However,the quality of model t... Inspired by mobile edge computing(MEC),edge learning has gained a momentum by directly performing model training at network edge without sending massive data to a centralized data center.However,the quality of model training will be affected by the limited communication and computing resources of network edge.In this paper,how to improve the training performance of a federated learning system aided by intelligent reflecting surface(IRS)over vehicle platooning networks is studied,where multiple platoons train a shared federated learning model.Multi-platoon cooperation can alleviate the pressure of data processing caused by the limited computing resources of single platoon.Meanwhile,IRS can enhance the inter-platoon communication in a cost-effective and energy-efficient manner.Firstly,the federated learning optimization problem of maximizing the learning accuracy is formulated by jointing platoon scheduling,bandwidth allocation and phase shifts at the IRS to maximize the number of scheduled platoon.Specif-ically,in the proposed learning architecture each platoon updates the learning model with its own data and uploads it to the global model through IRS-based wireless networks.Then,a method based on sequential optimization algorithm(SOA)and a group-based optimization method are analyzed for single IRS aided and large-scale IRS aided commu-nication,respectively.Finally,a platoon scheduling scheme is designed based on the communication reliability and computing reliability of platoons.Simulation results demonstrate that large-scale IRS assisted communication can effectively improve the reliability of multi-user communication networks.The scheduling scheme based on learning reliability balances the communication performance and computing performance of platoons. 展开更多
关键词 vehicle platooning networks Federated learning Intelligent reflecting surface Platoon scheduling Resource allocation
下载PDF
Deep Reinforcement Learning Empowered Edge Collaborative Caching Scheme for Internet of Vehicles
18
作者 Xin Liu Siya Xu +4 位作者 Chao Yang Zhili Wang Hao Zhang Jingye Chi Qinghan Li 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期271-287,共17页
With the development of internet of vehicles,the traditional centralized content caching mode transmits content through the core network,which causes a large delay and cannot meet the demands for delay-sensitive servi... With the development of internet of vehicles,the traditional centralized content caching mode transmits content through the core network,which causes a large delay and cannot meet the demands for delay-sensitive services.To solve these problems,on basis of vehicle caching network,we propose an edge colla-borative caching scheme.Road side unit(RSU)and mobile edge computing(MEC)are used to collect vehicle information,predict and cache popular content,thereby provide low-latency content delivery services.However,the storage capa-city of a single RSU severely limits the edge caching performance and cannot handle intensive content requests at the same time.Through content sharing,col-laborative caching can relieve the storage burden on caching servers.Therefore,we integrate RSU and collaborative caching to build a MEC-assisted vehicle edge collaborative caching(MVECC)scheme,so as to realize the collaborative caching among cloud,edge and vehicle.MVECC uses deep reinforcement learning to pre-dict what needs to be cached on RSU,which enables RSUs to cache more popular content.In addition,MVECC also introduces a mobility-aware caching replace-ment scheme at the edge network to reduce redundant cache and improving cache efficiency,which allows RSU to dynamically replace the cached content in response to the mobility of vehicles.The simulation results show that the pro-posed MVECC scheme can improve cache performance in terms of energy cost and content hit rate. 展开更多
关键词 Internet of vehicles vehicle caching network collaborative caching caching replacement deep reinforcement learning
下载PDF
A Multi-Mode Public Transportation System Using Vehicular to Network Architecture
19
作者 Settawit Poochaya Peerapong Uthansakul +8 位作者 Monthippa Uthansakul Patikorn Anchuen Kontorn Thammakul Arfat Ahmad Khan Niwat Punanwarakorn Pech Sirivoratum Aranya Kaewkrad Panrawee Kanpan Apichart Wantamee 《Computers, Materials & Continua》 SCIE EI 2022年第12期5845-5862,共18页
The number of accidents in the campus of Suranaree University of Technology(SUT)has increased due to increasing number of personal vehicles.In this paper,we focus on the development of public transportation system usi... The number of accidents in the campus of Suranaree University of Technology(SUT)has increased due to increasing number of personal vehicles.In this paper,we focus on the development of public transportation system using Intelligent Transportation System(ITS)along with the limitation of personal vehicles using sharing economy model.The SUT Smart Transit is utilized as a major public transportation system,while MoreSai@SUT(electric motorcycle services)is a minor public transportation system in this work.They are called Multi-Mode Transportation system as a combination.Moreover,a Vehicle toNetwork(V2N)is used for developing theMulti-Mode Transportation system in the campus.Due to equipping vehicles with On Board Unit(OBU)and 4G LTE modules,the real time speed and locations are transmitted to the cloud.The data is then applied in the proposed mathematical model for the estimation of Estimated Time of Arrival(ETA).In terms of vehicle classifications and counts,we deployed CCTV cameras,and the recorded videos are analyzed by using You Only Look Once(YOLO)algorithm.The simulation and measurement results of SUT Smart Transit and MoreSai@SUT before the covid-19 pandemic are discussed.Contrary to the existing researches,the proposed system is implemented in the real environment.The final results unveil the attractiveness and satisfaction of users.Also,due to the proposed system,the CO_(2) gas gets reduced when Multi-Mode Transportation is implemented practically in the campus. 展开更多
关键词 Smart transit intelligent transportation system(ITS) dedicated short range communication(DSRC) vehicle to network(V2N) vehicle to everything(V2X) electric vehicle(EV) you only look once(YOLO)
下载PDF
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
20
作者 Khattab M.Ali Alheeti Anna Gruebler Klaus McDonald-Maier 《Digital Communications and Networks》 SCIE 2017年第3期180-187,共8页
Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propos... Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DOS) and black hole attacks on vehicular ad hoe networks (VANETs). The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA) and Quadratic Diseriminant Analysis (QDA) which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection. 展开更多
关键词 Secure communication vehicle ad hoc networks IDS Self-driving vehicles Linear and quadratic discriminant analysis
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部