As an important part of future 5G wireless networks,a vehicular network demands safety,reliability and connectivity.In this context,networking survivability is usually considered an important metric to evaluate networ...As an important part of future 5G wireless networks,a vehicular network demands safety,reliability and connectivity.In this context,networking survivability is usually considered an important metric to evaluate network performance.In this paper,we propose a survivability model for vehicle communication networking based on dual cluster heads,wherein a backup cluster head(CH)will be activated if the primary CH fails,thereby effectively enhancing the network lifetime.Additionally,we introduce a software rejuvenation strategy for the prime CH to further improve the survivability of the entire network.Using the Probabilistic Symbolic Model Checker(PRISM),we verify and discuss the proposed survivability model via numerical simulations.The results show that network survivability can be effectively improved by introducing an additional CH and further enhanced by adopting the software rejuvenation technique.展开更多
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e...Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.展开更多
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy...In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.展开更多
Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data tr...Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data transfer,and data loss,affect the effectiveness of Transmission Control Protocols(TCP)on such wireless ad hoc networks.To avoid the problem,in this paper,mobility-aware zone-based routing in VANET is proposed.To achieve this con-cept,in this paper hybrid optimization algorithm is presented.The hybrid algo-rithm is a combination of Ant colony optimization(ACO)and artificial bee colony optimization(ABC).The proposed hybrid algorithm is designed for the routing process which is transmitting the information from one place to another.The optimal routing process is used to avoid traffic and link failure.Thefitness function is designed based on Link stability and Residual energy.The validation of the proposed algorithm takes solution encoding,fitness calculation,and updat-ing functions.To perform simulation experiments,NS2 simulator software is used.The performance of the proposed approach is analyzed based on different metrics namely,delivery ratio,delay time,throughput,and overhead.The effec-tiveness of the proposed method compared with different algorithms.Compared to other existing VANET algorithms,the hybrid algorithm has proven to be very efficient in terms of packet delivery ratio and delay.展开更多
In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship ...In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship between expiration probability and minimum window size was reached by building a Markov model. According to this conclusion, a back-off algorithm based on adjusting the size of minimum contention window called CEB is proposed, and this algorithm is on the basis of the differential size between the number of expiration beacons and preset threshold. Simulations were done to compare the performance of CEB with that of RBEB and BEB, and the results show that the performance of the new proposed algorithm is better than that of RBEB and BEB.展开更多
Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible...Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible to a broad range of attacks.In addition to ensuring security for both data-at-rest and data-in-transit,it is essential to preserve the privacy of data and users in vehicle sensor networks.Many existing authentication schemes for vehicle sensor networks are generally not designed to also preserve the privacy between the user and service provider(e.g.,mining user data to provide personalized services without infringing on user privacy).Controllable linkability can be used to facilitate an involved entity with the right linking key to determine whether two messages were generated by the same sender,while preserving the anonymity of the signer.Such a functionality is very useful to provide personalized services.Thus,in this paper,a threshold authentication scheme with anonymity and controllable linkability for vehicle sensor networks is constructed,and its security is analyzed under the random oracle model.展开更多
The vehicle edge network(VEN)has become a new research hotspot in the Internet of Things(IOT).However,many new delays are generated during the vehicle offloading the task to the edge server,which will greatly reduce t...The vehicle edge network(VEN)has become a new research hotspot in the Internet of Things(IOT).However,many new delays are generated during the vehicle offloading the task to the edge server,which will greatly reduce the quality of service(QOS)provided by the vehicle edge network.To solve this problem,this paper proposes an evolutionary algorithm-based(EA)task offloading and resource allocation scheme.First,the delay of offloading task to the edge server is generally defined,then the mathematical model of problem is given.Finally,the objective function is optimized by evolutionary algorithm,and the optimal solution is obtained by iteration and averaging.To verify the performance of this method,contrast experiments are conducted.The experimental results show that our purposed method reduces delay and improves QOS,which is superior to other schemes.展开更多
Inspired by mobile edge computing(MEC),edge learning has gained a momentum by directly performing model training at network edge without sending massive data to a centralized data center.However,the quality of model t...Inspired by mobile edge computing(MEC),edge learning has gained a momentum by directly performing model training at network edge without sending massive data to a centralized data center.However,the quality of model training will be affected by the limited communication and computing resources of network edge.In this paper,how to improve the training performance of a federated learning system aided by intelligent reflecting surface(IRS)over vehicle platooning networks is studied,where multiple platoons train a shared federated learning model.Multi-platoon cooperation can alleviate the pressure of data processing caused by the limited computing resources of single platoon.Meanwhile,IRS can enhance the inter-platoon communication in a cost-effective and energy-efficient manner.Firstly,the federated learning optimization problem of maximizing the learning accuracy is formulated by jointing platoon scheduling,bandwidth allocation and phase shifts at the IRS to maximize the number of scheduled platoon.Specif-ically,in the proposed learning architecture each platoon updates the learning model with its own data and uploads it to the global model through IRS-based wireless networks.Then,a method based on sequential optimization algorithm(SOA)and a group-based optimization method are analyzed for single IRS aided and large-scale IRS aided commu-nication,respectively.Finally,a platoon scheduling scheme is designed based on the communication reliability and computing reliability of platoons.Simulation results demonstrate that large-scale IRS assisted communication can effectively improve the reliability of multi-user communication networks.The scheduling scheme based on learning reliability balances the communication performance and computing performance of platoons.展开更多
A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with t...A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with the UAV network,we first consider both achievable secrecy rate maximization and total transmit power minimization,and formulate a multi-objective optimization problem(MOOP)using the weighted Tchebycheff approach.Then,by supposing that only imperfect channel state information based on the angular information is available,we propose a method combining angular discretization with Taylor approximation to transform the non-convex objective function and constraints to the convex ones.Next,we adopt semi-definite programming together with randomization technology to solve the original MOOP and obtain the BF weight vector.Finally,simulation results illustrate that the Pareto optimal trade-off can be achieved,and the superiority of our proposed scheme is confirmed by comparing with the existing BF schemes.展开更多
Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high ...Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high processing times and low vehicle detection performance.To address this issue,a visual saliency and deep sparse convolution hierarchical model based vehicle detection algorithm is proposed.A visual saliency calculation is firstly used to generate a small vehicle candidate area.The vehicle candidate sub images are then loaded into a sparse deep convolution hierarchical model with an SVM-based classifier to perform the final detection.The experimental results demonstrate that the proposed method is with 94.81% correct rate and 0.78% false detection rate on the existing datasets and the real road pictures captured by our group,which outperforms the existing state-of-the-art algorithms.More importantly,high discriminative multi-scale features are generated by deep sparse convolution network which has broad application prospects in target recognition in the field of intelligent vehicle.展开更多
With the development of internet of vehicles,the traditional centralized content caching mode transmits content through the core network,which causes a large delay and cannot meet the demands for delay-sensitive servi...With the development of internet of vehicles,the traditional centralized content caching mode transmits content through the core network,which causes a large delay and cannot meet the demands for delay-sensitive services.To solve these problems,on basis of vehicle caching network,we propose an edge colla-borative caching scheme.Road side unit(RSU)and mobile edge computing(MEC)are used to collect vehicle information,predict and cache popular content,thereby provide low-latency content delivery services.However,the storage capa-city of a single RSU severely limits the edge caching performance and cannot handle intensive content requests at the same time.Through content sharing,col-laborative caching can relieve the storage burden on caching servers.Therefore,we integrate RSU and collaborative caching to build a MEC-assisted vehicle edge collaborative caching(MVECC)scheme,so as to realize the collaborative caching among cloud,edge and vehicle.MVECC uses deep reinforcement learning to pre-dict what needs to be cached on RSU,which enables RSUs to cache more popular content.In addition,MVECC also introduces a mobility-aware caching replace-ment scheme at the edge network to reduce redundant cache and improving cache efficiency,which allows RSU to dynamically replace the cached content in response to the mobility of vehicles.The simulation results show that the pro-posed MVECC scheme can improve cache performance in terms of energy cost and content hit rate.展开更多
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such...The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity.展开更多
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart gr...Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart grid through a wireless network,it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system.However,existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network.In this paper,the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed.The proposed system,central aggregator–intrusion detection system(CA-IDS),works as a security gateway for EVs to analyze andmonitor incoming traffic for possible DoS attacks.EVs are registered with a Central Aggregator(CAG)to exchange authenticated messages,and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG.A denial of service(DoS)attack is simulated at CAG in a vehicle-to-grid(V2G)network manipulating various network parameters such as transmission overhead,receiving capacity of destination,average packet size,and channel availability.The proposed system is compared with existing intrusion detection systems using different parameters such as throughput,jitter,and accuracy.The analysis shows that the proposed system has a higher throughput,lower jitter,and higher accuracy as compared to the existing schemes.展开更多
The number of accidents in the campus of Suranaree University of Technology(SUT)has increased due to increasing number of personal vehicles.In this paper,we focus on the development of public transportation system usi...The number of accidents in the campus of Suranaree University of Technology(SUT)has increased due to increasing number of personal vehicles.In this paper,we focus on the development of public transportation system using Intelligent Transportation System(ITS)along with the limitation of personal vehicles using sharing economy model.The SUT Smart Transit is utilized as a major public transportation system,while MoreSai@SUT(electric motorcycle services)is a minor public transportation system in this work.They are called Multi-Mode Transportation system as a combination.Moreover,a Vehicle toNetwork(V2N)is used for developing theMulti-Mode Transportation system in the campus.Due to equipping vehicles with On Board Unit(OBU)and 4G LTE modules,the real time speed and locations are transmitted to the cloud.The data is then applied in the proposed mathematical model for the estimation of Estimated Time of Arrival(ETA).In terms of vehicle classifications and counts,we deployed CCTV cameras,and the recorded videos are analyzed by using You Only Look Once(YOLO)algorithm.The simulation and measurement results of SUT Smart Transit and MoreSai@SUT before the covid-19 pandemic are discussed.Contrary to the existing researches,the proposed system is implemented in the real environment.The final results unveil the attractiveness and satisfaction of users.Also,due to the proposed system,the CO_(2) gas gets reduced when Multi-Mode Transportation is implemented practically in the campus.展开更多
In an unmanned aerial vehicle ad-hoc network(UANET),sparse and rapidly mobile unmanned aerial vehicles(UAVs)/nodes can dynamically change the UANET topology.This may lead to UANET service performance issues.In this st...In an unmanned aerial vehicle ad-hoc network(UANET),sparse and rapidly mobile unmanned aerial vehicles(UAVs)/nodes can dynamically change the UANET topology.This may lead to UANET service performance issues.In this study,for planning rapidly changing UAV swarms,we propose a dynamic value iteration network(DVIN)model trained using the episodic Q-learning method with the connection information of UANETs to generate a state value spread function,which enables UAVs/nodes to adapt to novel physical locations.We then evaluate the performance of the DVIN model and compare it with the non-dominated sorting genetic algorithm II and the exhaustive method.Simulation results demonstrate that the proposed model significantly reduces the decisionmaking time for UAV/node path planning with a high average success rate.展开更多
Vehicle information on high-speed trains can not only determine whether the various parts of the train are working normally,but also predict the train’s future operating status.How to obtain valuable information from...Vehicle information on high-speed trains can not only determine whether the various parts of the train are working normally,but also predict the train’s future operating status.How to obtain valuable information from massive vehicle data is a difficult point.First,we divide the vehicle data of a high-speed train into 13 subsystem datasets,according to the functions of the collection components.Then,according to the gray theory and the Granger causality test,we propose the Gray-Granger Causality(GGC)model,which can construct a vehicle information network on the basis of the correlation between the collection components.By using the complex network theory to mine vehicle information and its subsystem networks,we find that the vehicle information network and its subsystem networks have the characteristics of a scale-free network.In addition,the vehicle information network is weak against attacks,but the subsystem network is closely connected and strong against attacks.展开更多
基金supported by the National Natural Science Foundation of China (No. 61971245 and 61801249 )Nantong University-Nantong Joint Research Center for Intelligent Information Technology (No. KFKT2016A01)
文摘As an important part of future 5G wireless networks,a vehicular network demands safety,reliability and connectivity.In this context,networking survivability is usually considered an important metric to evaluate network performance.In this paper,we propose a survivability model for vehicle communication networking based on dual cluster heads,wherein a backup cluster head(CH)will be activated if the primary CH fails,thereby effectively enhancing the network lifetime.Additionally,we introduce a software rejuvenation strategy for the prime CH to further improve the survivability of the entire network.Using the Probabilistic Symbolic Model Checker(PRISM),we verify and discuss the proposed survivability model via numerical simulations.The results show that network survivability can be effectively improved by introducing an additional CH and further enhanced by adopting the software rejuvenation technique.
基金the National Natural Science Foundation of China under Grants 62001517 and 61971474the Beijing Nova Program under Grant Z201100006820121.
文摘Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.
基金supported by the Natural Science Foundation of China under Grant No.62001517.
文摘In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.
文摘Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data transfer,and data loss,affect the effectiveness of Transmission Control Protocols(TCP)on such wireless ad hoc networks.To avoid the problem,in this paper,mobility-aware zone-based routing in VANET is proposed.To achieve this con-cept,in this paper hybrid optimization algorithm is presented.The hybrid algo-rithm is a combination of Ant colony optimization(ACO)and artificial bee colony optimization(ABC).The proposed hybrid algorithm is designed for the routing process which is transmitting the information from one place to another.The optimal routing process is used to avoid traffic and link failure.Thefitness function is designed based on Link stability and Residual energy.The validation of the proposed algorithm takes solution encoding,fitness calculation,and updat-ing functions.To perform simulation experiments,NS2 simulator software is used.The performance of the proposed approach is analyzed based on different metrics namely,delivery ratio,delay time,throughput,and overhead.The effec-tiveness of the proposed method compared with different algorithms.Compared to other existing VANET algorithms,the hybrid algorithm has proven to be very efficient in terms of packet delivery ratio and delay.
基金supported by National Basic Research Program of China (2013CB329005)National Natural Science Foundation of China (61302100, 61201162, 61471203)+1 种基金Basic Research Program of Jiangsu Province (BK2011027)Specialized Research Fund for the Doctoral Program of Higher Education (20133223120002)
文摘In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship between expiration probability and minimum window size was reached by building a Markov model. According to this conclusion, a back-off algorithm based on adjusting the size of minimum contention window called CEB is proposed, and this algorithm is on the basis of the differential size between the number of expiration beacons and preset threshold. Simulations were done to compare the performance of CEB with that of RBEB and BEB, and the results show that the performance of the new proposed algorithm is better than that of RBEB and BEB.
基金Our work was jointly supported by the National Natural Science Foundation of China(Nos.61872051,61702067)the Venture&Innovation Support Program for Chongqing Overseas Returnees(No.CX2018122)the Chongqing Natural Science Foundation(No.cstc2020jcyjmsxmX0343).
文摘Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible to a broad range of attacks.In addition to ensuring security for both data-at-rest and data-in-transit,it is essential to preserve the privacy of data and users in vehicle sensor networks.Many existing authentication schemes for vehicle sensor networks are generally not designed to also preserve the privacy between the user and service provider(e.g.,mining user data to provide personalized services without infringing on user privacy).Controllable linkability can be used to facilitate an involved entity with the right linking key to determine whether two messages were generated by the same sender,while preserving the anonymity of the signer.Such a functionality is very useful to provide personalized services.Thus,in this paper,a threshold authentication scheme with anonymity and controllable linkability for vehicle sensor networks is constructed,and its security is analyzed under the random oracle model.
基金This work was supported by the National Natural Science Foundation of China(Grant Nos.61602252,61802197,61972207)the Natural Science Foundation of Jiangsu Province of China(Grant No.BK20160967)the Project through the Priority Academic Program Development(PAPD)of Jiangsu Higher Education Institution。
文摘The vehicle edge network(VEN)has become a new research hotspot in the Internet of Things(IOT).However,many new delays are generated during the vehicle offloading the task to the edge server,which will greatly reduce the quality of service(QOS)provided by the vehicle edge network.To solve this problem,this paper proposes an evolutionary algorithm-based(EA)task offloading and resource allocation scheme.First,the delay of offloading task to the edge server is generally defined,then the mathematical model of problem is given.Finally,the objective function is optimized by evolutionary algorithm,and the optimal solution is obtained by iteration and averaging.To verify the performance of this method,contrast experiments are conducted.The experimental results show that our purposed method reduces delay and improves QOS,which is superior to other schemes.
基金supported in part by National Key Research and Development Project under Grant 2020YFB1807204in part by the National Natural Science Foundation of China under Grant U2001213,61971191+2 种基金in part by the Beijing Natural Science Foundation under Grant L201011in part by the Key project of Natural Science Foundation of Jiangxi Province under Grant 20202ACBL202006in part by the Science and Technology Foundation of Jiangxi Province(20202BCD42010).
文摘Inspired by mobile edge computing(MEC),edge learning has gained a momentum by directly performing model training at network edge without sending massive data to a centralized data center.However,the quality of model training will be affected by the limited communication and computing resources of network edge.In this paper,how to improve the training performance of a federated learning system aided by intelligent reflecting surface(IRS)over vehicle platooning networks is studied,where multiple platoons train a shared federated learning model.Multi-platoon cooperation can alleviate the pressure of data processing caused by the limited computing resources of single platoon.Meanwhile,IRS can enhance the inter-platoon communication in a cost-effective and energy-efficient manner.Firstly,the federated learning optimization problem of maximizing the learning accuracy is formulated by jointing platoon scheduling,bandwidth allocation and phase shifts at the IRS to maximize the number of scheduled platoon.Specif-ically,in the proposed learning architecture each platoon updates the learning model with its own data and uploads it to the global model through IRS-based wireless networks.Then,a method based on sequential optimization algorithm(SOA)and a group-based optimization method are analyzed for single IRS aided and large-scale IRS aided commu-nication,respectively.Finally,a platoon scheduling scheme is designed based on the communication reliability and computing reliability of platoons.Simulation results demonstrate that large-scale IRS assisted communication can effectively improve the reliability of multi-user communication networks.The scheduling scheme based on learning reliability balances the communication performance and computing performance of platoons.
基金supported by the Key International Cooperation Research Project(61720106003)the National Natural Science Foundation of China(62001517)+2 种基金the Shanghai Aerospace Science and Technology Innovation Foundation(SAST2019-095)the NUPTSF(NY220111)the Foundational Research Project of Complex Electronic System Simulation Laboratory(DXZT-JC-ZZ-2019-009,DXZTJC-ZZ-2019-005).
文摘A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with the UAV network,we first consider both achievable secrecy rate maximization and total transmit power minimization,and formulate a multi-objective optimization problem(MOOP)using the weighted Tchebycheff approach.Then,by supposing that only imperfect channel state information based on the angular information is available,we propose a method combining angular discretization with Taylor approximation to transform the non-convex objective function and constraints to the convex ones.Next,we adopt semi-definite programming together with randomization technology to solve the original MOOP and obtain the BF weight vector.Finally,simulation results illustrate that the Pareto optimal trade-off can be achieved,and the superiority of our proposed scheme is confirmed by comparing with the existing BF schemes.
基金Supported by National Natural Science Foundation of China(Grant Nos.U1564201,61573171,61403172,51305167)China Postdoctoral Science Foundation(Grant Nos.2015T80511,2014M561592)+3 种基金Jiangsu Provincial Natural Science Foundation of China(Grant No.BK20140555)Six Talent Peaks Project of Jiangsu Province,China(Grant Nos.2015-JXQC-012,2014-DZXX-040)Jiangsu Postdoctoral Science Foundation,China(Grant No.1402097C)Jiangsu University Scientific Research Foundation for Senior Professionals,China(Grant No.14JDG028)
文摘Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high processing times and low vehicle detection performance.To address this issue,a visual saliency and deep sparse convolution hierarchical model based vehicle detection algorithm is proposed.A visual saliency calculation is firstly used to generate a small vehicle candidate area.The vehicle candidate sub images are then loaded into a sparse deep convolution hierarchical model with an SVM-based classifier to perform the final detection.The experimental results demonstrate that the proposed method is with 94.81% correct rate and 0.78% false detection rate on the existing datasets and the real road pictures captured by our group,which outperforms the existing state-of-the-art algorithms.More importantly,high discriminative multi-scale features are generated by deep sparse convolution network which has broad application prospects in target recognition in the field of intelligent vehicle.
基金supported by the Science and Technology Project of State Grid Corporation of China:Research and Application of Key Technologies in Virtual Operation of Information and Communication Resources.
文摘With the development of internet of vehicles,the traditional centralized content caching mode transmits content through the core network,which causes a large delay and cannot meet the demands for delay-sensitive services.To solve these problems,on basis of vehicle caching network,we propose an edge colla-borative caching scheme.Road side unit(RSU)and mobile edge computing(MEC)are used to collect vehicle information,predict and cache popular content,thereby provide low-latency content delivery services.However,the storage capa-city of a single RSU severely limits the edge caching performance and cannot handle intensive content requests at the same time.Through content sharing,col-laborative caching can relieve the storage burden on caching servers.Therefore,we integrate RSU and collaborative caching to build a MEC-assisted vehicle edge collaborative caching(MVECC)scheme,so as to realize the collaborative caching among cloud,edge and vehicle.MVECC uses deep reinforcement learning to pre-dict what needs to be cached on RSU,which enables RSUs to cache more popular content.In addition,MVECC also introduces a mobility-aware caching replace-ment scheme at the edge network to reduce redundant cache and improving cache efficiency,which allows RSU to dynamically replace the cached content in response to the mobility of vehicles.The simulation results show that the pro-posed MVECC scheme can improve cache performance in terms of energy cost and content hit rate.
基金supported in part by the National Key R&D Program of China under Project 2020YFB1006004the Guangxi Natural Science Foundation under Grants 2019GXNSFFA245015 and 2019GXNSFGA245004+2 种基金the National Natural Science Foundation of China under Projects 62162017,61862012,61962012,and 62172119the Major Key Project of PCL under Grants PCL2021A09,PCL2021A02 and PCL2022A03the Innovation Project of Guangxi Graduate Education YCSW2021175.
文摘The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity.
基金Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2021R1A6A1A03039493).
文摘Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart grid through a wireless network,it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system.However,existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network.In this paper,the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed.The proposed system,central aggregator–intrusion detection system(CA-IDS),works as a security gateway for EVs to analyze andmonitor incoming traffic for possible DoS attacks.EVs are registered with a Central Aggregator(CAG)to exchange authenticated messages,and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG.A denial of service(DoS)attack is simulated at CAG in a vehicle-to-grid(V2G)network manipulating various network parameters such as transmission overhead,receiving capacity of destination,average packet size,and channel availability.The proposed system is compared with existing intrusion detection systems using different parameters such as throughput,jitter,and accuracy.The analysis shows that the proposed system has a higher throughput,lower jitter,and higher accuracy as compared to the existing schemes.
基金This work was supported by Suranaree University of Technology(SUT).The authors would also like to thank SUT Smart Transit and Thai AI for supporting the experimental and datasets.
文摘The number of accidents in the campus of Suranaree University of Technology(SUT)has increased due to increasing number of personal vehicles.In this paper,we focus on the development of public transportation system using Intelligent Transportation System(ITS)along with the limitation of personal vehicles using sharing economy model.The SUT Smart Transit is utilized as a major public transportation system,while MoreSai@SUT(electric motorcycle services)is a minor public transportation system in this work.They are called Multi-Mode Transportation system as a combination.Moreover,a Vehicle toNetwork(V2N)is used for developing theMulti-Mode Transportation system in the campus.Due to equipping vehicles with On Board Unit(OBU)and 4G LTE modules,the real time speed and locations are transmitted to the cloud.The data is then applied in the proposed mathematical model for the estimation of Estimated Time of Arrival(ETA).In terms of vehicle classifications and counts,we deployed CCTV cameras,and the recorded videos are analyzed by using You Only Look Once(YOLO)algorithm.The simulation and measurement results of SUT Smart Transit and MoreSai@SUT before the covid-19 pandemic are discussed.Contrary to the existing researches,the proposed system is implemented in the real environment.The final results unveil the attractiveness and satisfaction of users.Also,due to the proposed system,the CO_(2) gas gets reduced when Multi-Mode Transportation is implemented practically in the campus.
基金Project supported by the National Natural Science Foundation of China(No.61501399)the SAIC MOTOR(No.1925)the National Key R&D Program of China(No.2018AAA0102302)。
文摘In an unmanned aerial vehicle ad-hoc network(UANET),sparse and rapidly mobile unmanned aerial vehicles(UAVs)/nodes can dynamically change the UANET topology.This may lead to UANET service performance issues.In this study,for planning rapidly changing UAV swarms,we propose a dynamic value iteration network(DVIN)model trained using the episodic Q-learning method with the connection information of UANETs to generate a state value spread function,which enables UAVs/nodes to adapt to novel physical locations.We then evaluate the performance of the DVIN model and compare it with the non-dominated sorting genetic algorithm II and the exhaustive method.Simulation results demonstrate that the proposed model significantly reduces the decisionmaking time for UAV/node path planning with a high average success rate.
基金supported by the Graduate Innovation Project of Beijing Jiaotong University(No.2020YJS098)。
文摘Vehicle information on high-speed trains can not only determine whether the various parts of the train are working normally,but also predict the train’s future operating status.How to obtain valuable information from massive vehicle data is a difficult point.First,we divide the vehicle data of a high-speed train into 13 subsystem datasets,according to the functions of the collection components.Then,according to the gray theory and the Granger causality test,we propose the Gray-Granger Causality(GGC)model,which can construct a vehicle information network on the basis of the correlation between the collection components.By using the complex network theory to mine vehicle information and its subsystem networks,we find that the vehicle information network and its subsystem networks have the characteristics of a scale-free network.In addition,the vehicle information network is weak against attacks,but the subsystem network is closely connected and strong against attacks.