Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issu...Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issue of automated vehicles affected by replay attacks.A proportional-integral-observer(PIO)with predetermined forgetting parameters is first constructed to acquire the dynamical information of vehicles.Then,a time-varying parameter and two positive scalars are employed to describe the temporal behavior of replay attacks.In light of such a scheme and the common properties of Laplace matrices,the closed-loop system with PIO-based controllers is transformed into a switched and time-delayed one.Furthermore,some sufficient conditions are derived to achieve the desired platooning performance by the view of the Lyapunov stability theory.The controller gains are analytically determined by resorting to the solution of certain matrix inequalities only dependent on maximum and minimum eigenvalues of communication topologies.Finally,a simulation example is provided to illustrate the effectiveness of the proposed control strategy.展开更多
Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead...Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations.展开更多
This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control fram...This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control framework for such ICVs.This framework seamlessly integrates the predesigned optimal control with distributed model predictive control(DMPC)optimization and introduces a unique distributed attack detector to ensure the reliability of the transmitted information among vehicles.Notably,our strategy uses previously broadcasted information and a specialized convex set,termed the“resilience set”,to identify unreliable data.This approach significantly eases graph robustness prerequisites,requiring only an(F+1)-robust graph,in contrast to the established mean sequence reduced algorithms,which require a minimum(2F+1)-robust graph.Additionally,we introduce a verification algorithm to restore trust in vehicles under minor attacks,further reducing communication network robustness.Our analysis demonstrates the recursive feasibility of the DMPC optimization.Furthermore,the proposed method achieves exceptional control performance by minimizing the discrepancies between the DMPC control inputs and predesigned platoon control inputs,while ensuring constraint compliance and cybersecurity.Simulation results verify the effectiveness of our theoretical findings.展开更多
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
This paper investigates the path-following control problem with obstacle avoidance of autonomous surface vehicles in the presence of actuator faults,uncertainty and external disturbances.Autonomous surface vehicles in...This paper investigates the path-following control problem with obstacle avoidance of autonomous surface vehicles in the presence of actuator faults,uncertainty and external disturbances.Autonomous surface vehicles inevitably suffer from actuator faults in complex sea environments,which may cause existing obstacle avoidance strategies to fail.To reduce the influence of actuator faults,an improved artificial potential function is constructed by introducing the lower bound of actuator efficiency factors.The nonlinear state observer,which only depends on measurable position information of the autonomous surface vehicle,is used to address uncertainties and external disturbances.By using a backstepping technique and adaptive mechanism,a path-following control strategy with obstacle avoidance and fault tolerance is designed which can ensure that the tracking errors converge to a small neighborhood of zero.Compared with existing results,the proposed control strategy has the capability of obstacle avoidance and fault tolerance simultaneously.Finally,the comparison results through simulations are given to verify the effectiveness of the proposed method.展开更多
The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time perfor...The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time performance.However,the intricate and unpredictable pedestrian motion patterns lead the INS localization error to significantly diverge with time.This paper aims to enhance the accuracy of zero-velocity interval(ZVI)detection and reduce the heading and altitude drift of foot-mounted INS via deep learning and equation constraint of dual feet.Aiming at the observational noise problem of low-cost inertial sensors,we utilize a denoising autoencoder to automatically eliminate the inherent noise.Aiming at the problem that inaccurate detection of the ZVI detection results in obvious displacement error,we propose a sample-level ZVI detection algorithm based on the U-Net neural network,which effectively solves the problem of mislabeling caused by sliding windows.Aiming at the problem that Zero-Velocity Update(ZUPT)cannot suppress heading and altitude error,we propose a bipedal INS method based on the equation constraint and ellipsoid constraint,which uses foot-to-foot distance as a new observation to correct heading and altitude error.We conduct extensive and well-designed experiments to evaluate the performance of the proposed method.The experimental results indicate that the position error of our proposed method did not exceed 0.83% of the total traveled distance.展开更多
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s...Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.展开更多
With the development of positioning technology,loca-tion services are constantly in demand by people.As a primary location service pedestrian navigation has two main approaches based on radio and inertial navigation.T...With the development of positioning technology,loca-tion services are constantly in demand by people.As a primary location service pedestrian navigation has two main approaches based on radio and inertial navigation.The pedestrian naviga-tion based on radio is subject to environmental occlusion lead-ing to the degradation of positioning accuracy.The pedestrian navigation based on micro-electro-mechanical system inertial measurement unit(MIMU)is less susceptible to environmental interference,but its errors dissipate over time.In this paper,a chest card pedestrian navigation improvement method based on complementary correction is proposed in order to suppress the error divergence of inertial navigation methods.To suppress atti-tude errors,optimal feedback coefficients are established by pedestrian motion characteristics.To extend navigation time and improve positioning accuracy,the step length in subsequent movements is compensated by the first step length.The experi-mental results show that the positioning accuracy of the pro-posed method is improved by more than 47%and 44%com-pared with the pure inertia-based method combined with step compensation and the traditional complementary filtering com-bined method with step compensation.The proposed method can effectively suppress the error dispersion and improve the positioning accuracy.展开更多
This paper presents an integrated control scheme for enhancing the ride comfort and handling performance of a four-wheel-independent-drive electric vehicle through the coordination of active suspension system(ASS)and ...This paper presents an integrated control scheme for enhancing the ride comfort and handling performance of a four-wheel-independent-drive electric vehicle through the coordination of active suspension system(ASS)and anti-lock braking system(ABS).First,a longitudinal-vertical coupled vehicle dynamics model is established by integrating a road input model.Then the coupling mechanisms between longitudinal and vertical vehicle dynamics are analyzed.An ASS-ABS integrated control system is proposed,utilizing an H∞controller for ASS to optimize load transfer effect and a neural network sliding mode control for ABS implementation.Finally,the effectiveness of the proposed control scheme is evaluated through comprehensive tests conducted on a hardware-in-loop(HIL)test platform.The HIL test results demonstrate that the proposed control scheme can significantly improve the braking performance and ride comfort compared to conventional ABS control methods.展开更多
The transportation sector is responsible for 25% of the total Carbon dioxide (CO2) emissions, whereas 60.6% of this sector represents small and medium passenger cars. However, as noted by the European Union Long-term ...The transportation sector is responsible for 25% of the total Carbon dioxide (CO2) emissions, whereas 60.6% of this sector represents small and medium passenger cars. However, as noted by the European Union Long-term strategy, there are two ways to reduce the amount of CO2 emissions in the transportation sector. The first way is characterized by creating more efficient vehicles. In contrast, the second way is characterized by changing the fuel used. The current study addressed the second way, changing the fuel type. The study examined the potential of battery electric vehicles (BEVs) as an alternative fuel type to reduce CO2 emissions in Hungarys transportation sector. The study used secondary data retrieved from Statista and stata.com to analyze the future trends of BEVs in Hungary. The results showed that the percentage of BEVs in Hungary in 2022 was 0.4% compared to the total number of registered passenger cars, which is 3.8 million. The simple exponential smoothing (SES) time series forecast revealed that the number of BEVs is expected to reach 84,192 in 2030, indicating a percentage increase of 2.21% in the next eight years. The study suggests that increasing the number of BEVs is necessary to address the negative impact of CO2 emissions on society. The Hungarian Ministry of Innovation and Technologys strategy to reduce the cost of BEVs may increase the percentage of BEVs by 10%, resulting in a potential average reduction of 76,957,600 g/km of CO2 compared to gasoline, diesel, hybrid electric vehicles (HEVs), and plug-in hybrid vehicles (PHEVs).展开更多
The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have be...The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model.展开更多
●AIM:To explore the combined application of surgical navigation nasal endoscopy(NNE)and three-dimensional printing technology(3DPT)for the adjunctive treatment of orbital blowout fractures(OBF).●METHODS:Retrospectiv...●AIM:To explore the combined application of surgical navigation nasal endoscopy(NNE)and three-dimensional printing technology(3DPT)for the adjunctive treatment of orbital blowout fractures(OBF).●METHODS:Retrospective analysis was conducted on the data of patients with OBF who underwent surgical treatment at the Affiliated Eye Hospital of Nanchang University between July 2012 and November 2022.The control group consisted of patients who received traditional surgical treatment(n=43),while the new surgical group(n=52)consisted of patients who received NNE with 3DPT.The difference in therapeutic effects between the two groups was evaluated by comparing the duration of the operation,best corrected visual acuity(BCVA),enophthalmos difference,recovery rate of eye movement disorder,recovery rate of diplopia,and incidence of postoperative complications.●RESULTS:The study included 95 cases(95 eyes),with 63 men and 32 women.The patients’age ranged from 5 to 67y(35.21±15.75y).The new surgical group and the control group exhibited no statistically significant differences in the duration of the operation,BCVA and enophthalmos difference.The recovery rates of diplopia in the new surgical group were significantly higher than those in the control group at 1mo[OR=0.03,95%CI(0.01–0.15),P<0.0000]and 3mo[OR=0.11,95%CI(0.03–0.36),P<0.0000]postoperation.Additionally,the recovery rates of eye movement disorders at 1 and 3mo after surgery were OR=0.08,95%CI(0.03–0.24),P<0.0000;and OR=0.01,95%CI(0.00–0.18),P<0.0000.The incidence of postoperative complications was lower in the new surgical group compared to the control group[OR=4.86,95%CI(0.95–24.78),P<0.05].●CONCLUSION:The combination of NNE and 3DPT can shorten the recovery time of diplopia and eye movement disorder in patients with OBF.展开更多
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le...The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.展开更多
The development of vehicle integrated photovoltaics-powered electric vehicles (VIPV-EV) significantly reduces CO<sub>2</sub> emissions from the transport sector to realize a decarbonized society. Although ...The development of vehicle integrated photovoltaics-powered electric vehicles (VIPV-EV) significantly reduces CO<sub>2</sub> emissions from the transport sector to realize a decarbonized society. Although long-distance driving of VIPV-EV without electricity charging is expected in sunny regions, driving distance of VIPV-EV is affected by climate conditions such as solar irradiation and temperature rise of PV modules. In this paper, detailed analytical results for effects of climate conditions such as solar irradiation and temperature rise of PV modules upon driving distance of the VIPV-EV were presented by using test data for Toyota Prius and Nissan Van demonstration cars installed with high-efficiency InGaP/GaAs/InGaAs 3-junction solar cell modules with a module efficiency of more than 30%. The temperature rise of some PV modules studied in this study was shown to be expressed by some coefficients related to solar irradiation, wind speed and radiative cooling. The potential of VIPV-EV to be deployed in 10 major cities was also analyzed. Although sunshine cities such as Phoenix show the high reduction ratio of driving range with 17% due to temperature rise of VIPV modules, populous cities such as Tokyo show low reduction ratio of 9%. It was also shown in this paper that the difference between the driving distance of VIPV-EV driving in the morning and the afternoon is due to PV modules’ radiative cooling. In addition, the importance of heat dissipation of PV modules and the development of high-efficiency PV modules with better temperature coefficients was suggested in order to expand driving range of VIPV-EV. The effects of air-conditioner usage and partial shading in addition to the effects of temperature rise of VIPV modules were suggested as the other power losses of VIPV-EV.展开更多
In this study, the problem of measuring noise pollution distribution by the intertial-based integrated navigation system is effectively suppressed. Based on nonlinear inertial navigation error modeling, a nested dual ...In this study, the problem of measuring noise pollution distribution by the intertial-based integrated navigation system is effectively suppressed. Based on nonlinear inertial navigation error modeling, a nested dual Kalman filter framework structure is developed. It consists of unscented Kalman filter (UKF)master filter and Kalman filter slave filter. This method uses nonlinear UKF for integrated navigation state estimation. At the same time, the exact noise measurement covariance is estimated by the Kalman filter dependency filter. The algorithm based on dual adaptive UKF (Dual-AUKF) has high accuracy and robustness, especially in the case of measurement information interference. Finally, vehicle-mounted and ship-mounted integrated navigation tests are conducted. Compared with traditional UKF and the Sage-Husa adaptive UKF (SH-AUKF), this method has comparable filtering accuracy and better filtering stability. The effectiveness of the proposed algorithm is verified.展开更多
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia...The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%.展开更多
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There hav...As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive capabilities.However,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied topic.In addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers.展开更多
Autonomous navigation for intelligent mobile robots has gained significant attention,with a focus on enabling robots to generate reliable policies based on maintenance of spatial memory.In this paper,we propose a lear...Autonomous navigation for intelligent mobile robots has gained significant attention,with a focus on enabling robots to generate reliable policies based on maintenance of spatial memory.In this paper,we propose a learning-based visual navigation pipeline that uses topological maps as memory configurations.We introduce a unique online topology construction approach that fuses odometry pose estimation and perceptual similarity estimation.This tackles the issues of topological node redundancy and incorrect edge connections,which stem from the distribution gap between the spatial and perceptual domains.Furthermore,we propose a differentiable graph extraction structure,the topology multi-factor transformer(TMFT).This structure utilizes graph neural networks to integrate global memory and incorporates a multi-factor attention mechanism to underscore elements closely related to relevant target cues for policy generation.Results from photorealistic simulations on image-goal navigation tasks highlight the superior navigation performance of our proposed pipeline compared to existing memory structures.Comprehensive validation through behavior visualization,interpretability tests,and real-world deployment further underscore the adapt-ability and efficacy of our method.展开更多
While autonomous vehicles are vital components of intelligent transportation systems,ensuring the trustworthiness of decision-making remains a substantial challenge in realizing autonomous driving.Therefore,we present...While autonomous vehicles are vital components of intelligent transportation systems,ensuring the trustworthiness of decision-making remains a substantial challenge in realizing autonomous driving.Therefore,we present a novel robust reinforcement learning approach with safety guarantees to attain trustworthy decision-making for autonomous vehicles.The proposed technique ensures decision trustworthiness in terms of policy robustness and collision safety.Specifically,an adversary model is learned online to simulate the worst-case uncertainty by approximating the optimal adversarial perturbations on the observed states and environmental dynamics.In addition,an adversarial robust actor-critic algorithm is developed to enable the agent to learn robust policies against perturbations in observations and dynamics.Moreover,we devise a safety mask to guarantee the collision safety of the autonomous driving agent during both the training and testing processes using an interpretable knowledge model known as the Responsibility-Sensitive Safety Model.Finally,the proposed approach is evaluated through both simulations and experiments.These results indicate that the autonomous driving agent can make trustworthy decisions and drastically reduce the number of collisions through robust safety policies.展开更多
With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is ...With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security.展开更多
基金supported in part by the National Natural Science Foundation of China (61973219,U21A2019,61873058)the Hainan Province Science and Technology Special Fund (ZDYF2022SHFZ105)。
文摘Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issue of automated vehicles affected by replay attacks.A proportional-integral-observer(PIO)with predetermined forgetting parameters is first constructed to acquire the dynamical information of vehicles.Then,a time-varying parameter and two positive scalars are employed to describe the temporal behavior of replay attacks.In light of such a scheme and the common properties of Laplace matrices,the closed-loop system with PIO-based controllers is transformed into a switched and time-delayed one.Furthermore,some sufficient conditions are derived to achieve the desired platooning performance by the view of the Lyapunov stability theory.The controller gains are analytically determined by resorting to the solution of certain matrix inequalities only dependent on maximum and minimum eigenvalues of communication topologies.Finally,a simulation example is provided to illustrate the effectiveness of the proposed control strategy.
基金supported by the National Natural Science Foundation of China(NSFC)under Grant 62071179.
文摘Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations.
基金the financial support from the Natural Sciences and Engineering Research Council of Canada(NSERC)。
文摘This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control framework for such ICVs.This framework seamlessly integrates the predesigned optimal control with distributed model predictive control(DMPC)optimization and introduces a unique distributed attack detector to ensure the reliability of the transmitted information among vehicles.Notably,our strategy uses previously broadcasted information and a specialized convex set,termed the“resilience set”,to identify unreliable data.This approach significantly eases graph robustness prerequisites,requiring only an(F+1)-robust graph,in contrast to the established mean sequence reduced algorithms,which require a minimum(2F+1)-robust graph.Additionally,we introduce a verification algorithm to restore trust in vehicles under minor attacks,further reducing communication network robustness.Our analysis demonstrates the recursive feasibility of the DMPC optimization.Furthermore,the proposed method achieves exceptional control performance by minimizing the discrepancies between the DMPC control inputs and predesigned platoon control inputs,while ensuring constraint compliance and cybersecurity.Simulation results verify the effectiveness of our theoretical findings.
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
基金the National Natural Science Foundation of China(51939001,52171292,51979020,61976033)Dalian Outstanding Young Talents Program(2022RJ05)+1 种基金the Topnotch Young Talents Program of China(36261402)the Liaoning Revitalization Talents Program(XLYC20-07188)。
文摘This paper investigates the path-following control problem with obstacle avoidance of autonomous surface vehicles in the presence of actuator faults,uncertainty and external disturbances.Autonomous surface vehicles inevitably suffer from actuator faults in complex sea environments,which may cause existing obstacle avoidance strategies to fail.To reduce the influence of actuator faults,an improved artificial potential function is constructed by introducing the lower bound of actuator efficiency factors.The nonlinear state observer,which only depends on measurable position information of the autonomous surface vehicle,is used to address uncertainties and external disturbances.By using a backstepping technique and adaptive mechanism,a path-following control strategy with obstacle avoidance and fault tolerance is designed which can ensure that the tracking errors converge to a small neighborhood of zero.Compared with existing results,the proposed control strategy has the capability of obstacle avoidance and fault tolerance simultaneously.Finally,the comparison results through simulations are given to verify the effectiveness of the proposed method.
基金supported in part by National Key Research and Development Program under Grant No.2020YFB1708800China Postdoctoral Science Foundation under Grant No.2021M700385+5 种基金Guang Dong Basic and Applied Basic Research Foundation under Grant No.2021A1515110577Guangdong Key Research and Development Program under Grant No.2020B0101130007Central Guidance on Local Science and Technology Development Fund of Shanxi Province under Grant No.YDZJSX2022B019Fundamental Research Funds for Central Universities under Grant No.FRF-MP-20-37Interdisciplinary Research Project for Young Teachers of USTB(Fundamental Research Funds for the Central Universities)under Grant No.FRF-IDRY-21-005National Natural Science Foundation of China under Grant No.62002026。
文摘The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time performance.However,the intricate and unpredictable pedestrian motion patterns lead the INS localization error to significantly diverge with time.This paper aims to enhance the accuracy of zero-velocity interval(ZVI)detection and reduce the heading and altitude drift of foot-mounted INS via deep learning and equation constraint of dual feet.Aiming at the observational noise problem of low-cost inertial sensors,we utilize a denoising autoencoder to automatically eliminate the inherent noise.Aiming at the problem that inaccurate detection of the ZVI detection results in obvious displacement error,we propose a sample-level ZVI detection algorithm based on the U-Net neural network,which effectively solves the problem of mislabeling caused by sliding windows.Aiming at the problem that Zero-Velocity Update(ZUPT)cannot suppress heading and altitude error,we propose a bipedal INS method based on the equation constraint and ellipsoid constraint,which uses foot-to-foot distance as a new observation to correct heading and altitude error.We conduct extensive and well-designed experiments to evaluate the performance of the proposed method.The experimental results indicate that the position error of our proposed method did not exceed 0.83% of the total traveled distance.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)the joint funds of National Natural Science Foundation of China and Civil Aviation Administration of China(No.U2133203).
文摘Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.
文摘With the development of positioning technology,loca-tion services are constantly in demand by people.As a primary location service pedestrian navigation has two main approaches based on radio and inertial navigation.The pedestrian naviga-tion based on radio is subject to environmental occlusion lead-ing to the degradation of positioning accuracy.The pedestrian navigation based on micro-electro-mechanical system inertial measurement unit(MIMU)is less susceptible to environmental interference,but its errors dissipate over time.In this paper,a chest card pedestrian navigation improvement method based on complementary correction is proposed in order to suppress the error divergence of inertial navigation methods.To suppress atti-tude errors,optimal feedback coefficients are established by pedestrian motion characteristics.To extend navigation time and improve positioning accuracy,the step length in subsequent movements is compensated by the first step length.The experi-mental results show that the positioning accuracy of the pro-posed method is improved by more than 47%and 44%com-pared with the pure inertia-based method combined with step compensation and the traditional complementary filtering com-bined method with step compensation.The proposed method can effectively suppress the error dispersion and improve the positioning accuracy.
基金Supported by National Natural Science Foundation of China(Grant No.52272387)State Key Laboratory of Mechanical Behavior and System Safety of Traffic Engineering Structures,Shijiazhuang Tiedao University of China(Grant No.KF2020-29)Beijing Municipal Science and Technology Commission through Beijing Nova Program of China(Grant No.20230484475).
文摘This paper presents an integrated control scheme for enhancing the ride comfort and handling performance of a four-wheel-independent-drive electric vehicle through the coordination of active suspension system(ASS)and anti-lock braking system(ABS).First,a longitudinal-vertical coupled vehicle dynamics model is established by integrating a road input model.Then the coupling mechanisms between longitudinal and vertical vehicle dynamics are analyzed.An ASS-ABS integrated control system is proposed,utilizing an H∞controller for ASS to optimize load transfer effect and a neural network sliding mode control for ABS implementation.Finally,the effectiveness of the proposed control scheme is evaluated through comprehensive tests conducted on a hardware-in-loop(HIL)test platform.The HIL test results demonstrate that the proposed control scheme can significantly improve the braking performance and ride comfort compared to conventional ABS control methods.
文摘The transportation sector is responsible for 25% of the total Carbon dioxide (CO2) emissions, whereas 60.6% of this sector represents small and medium passenger cars. However, as noted by the European Union Long-term strategy, there are two ways to reduce the amount of CO2 emissions in the transportation sector. The first way is characterized by creating more efficient vehicles. In contrast, the second way is characterized by changing the fuel used. The current study addressed the second way, changing the fuel type. The study examined the potential of battery electric vehicles (BEVs) as an alternative fuel type to reduce CO2 emissions in Hungarys transportation sector. The study used secondary data retrieved from Statista and stata.com to analyze the future trends of BEVs in Hungary. The results showed that the percentage of BEVs in Hungary in 2022 was 0.4% compared to the total number of registered passenger cars, which is 3.8 million. The simple exponential smoothing (SES) time series forecast revealed that the number of BEVs is expected to reach 84,192 in 2030, indicating a percentage increase of 2.21% in the next eight years. The study suggests that increasing the number of BEVs is necessary to address the negative impact of CO2 emissions on society. The Hungarian Ministry of Innovation and Technologys strategy to reduce the cost of BEVs may increase the percentage of BEVs by 10%, resulting in a potential average reduction of 76,957,600 g/km of CO2 compared to gasoline, diesel, hybrid electric vehicles (HEVs), and plug-in hybrid vehicles (PHEVs).
基金supported by the National Natural Science Foundation of China under Grant 61972148.
文摘The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model.
基金Supported by the Jiangxi Provincial Natural Science Foundation(No.20232ACB206030)。
文摘●AIM:To explore the combined application of surgical navigation nasal endoscopy(NNE)and three-dimensional printing technology(3DPT)for the adjunctive treatment of orbital blowout fractures(OBF).●METHODS:Retrospective analysis was conducted on the data of patients with OBF who underwent surgical treatment at the Affiliated Eye Hospital of Nanchang University between July 2012 and November 2022.The control group consisted of patients who received traditional surgical treatment(n=43),while the new surgical group(n=52)consisted of patients who received NNE with 3DPT.The difference in therapeutic effects between the two groups was evaluated by comparing the duration of the operation,best corrected visual acuity(BCVA),enophthalmos difference,recovery rate of eye movement disorder,recovery rate of diplopia,and incidence of postoperative complications.●RESULTS:The study included 95 cases(95 eyes),with 63 men and 32 women.The patients’age ranged from 5 to 67y(35.21±15.75y).The new surgical group and the control group exhibited no statistically significant differences in the duration of the operation,BCVA and enophthalmos difference.The recovery rates of diplopia in the new surgical group were significantly higher than those in the control group at 1mo[OR=0.03,95%CI(0.01–0.15),P<0.0000]and 3mo[OR=0.11,95%CI(0.03–0.36),P<0.0000]postoperation.Additionally,the recovery rates of eye movement disorders at 1 and 3mo after surgery were OR=0.08,95%CI(0.03–0.24),P<0.0000;and OR=0.01,95%CI(0.00–0.18),P<0.0000.The incidence of postoperative complications was lower in the new surgical group compared to the control group[OR=4.86,95%CI(0.95–24.78),P<0.05].●CONCLUSION:The combination of NNE and 3DPT can shorten the recovery time of diplopia and eye movement disorder in patients with OBF.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)。
文摘The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.
文摘The development of vehicle integrated photovoltaics-powered electric vehicles (VIPV-EV) significantly reduces CO<sub>2</sub> emissions from the transport sector to realize a decarbonized society. Although long-distance driving of VIPV-EV without electricity charging is expected in sunny regions, driving distance of VIPV-EV is affected by climate conditions such as solar irradiation and temperature rise of PV modules. In this paper, detailed analytical results for effects of climate conditions such as solar irradiation and temperature rise of PV modules upon driving distance of the VIPV-EV were presented by using test data for Toyota Prius and Nissan Van demonstration cars installed with high-efficiency InGaP/GaAs/InGaAs 3-junction solar cell modules with a module efficiency of more than 30%. The temperature rise of some PV modules studied in this study was shown to be expressed by some coefficients related to solar irradiation, wind speed and radiative cooling. The potential of VIPV-EV to be deployed in 10 major cities was also analyzed. Although sunshine cities such as Phoenix show the high reduction ratio of driving range with 17% due to temperature rise of VIPV modules, populous cities such as Tokyo show low reduction ratio of 9%. It was also shown in this paper that the difference between the driving distance of VIPV-EV driving in the morning and the afternoon is due to PV modules’ radiative cooling. In addition, the importance of heat dissipation of PV modules and the development of high-efficiency PV modules with better temperature coefficients was suggested in order to expand driving range of VIPV-EV. The effects of air-conditioner usage and partial shading in addition to the effects of temperature rise of VIPV modules were suggested as the other power losses of VIPV-EV.
基金supported by China Postdoctoral Science Foundation(2023M741882)the National Natural Science Foundation of China(62103222,62273195)。
文摘In this study, the problem of measuring noise pollution distribution by the intertial-based integrated navigation system is effectively suppressed. Based on nonlinear inertial navigation error modeling, a nested dual Kalman filter framework structure is developed. It consists of unscented Kalman filter (UKF)master filter and Kalman filter slave filter. This method uses nonlinear UKF for integrated navigation state estimation. At the same time, the exact noise measurement covariance is estimated by the Kalman filter dependency filter. The algorithm based on dual adaptive UKF (Dual-AUKF) has high accuracy and robustness, especially in the case of measurement information interference. Finally, vehicle-mounted and ship-mounted integrated navigation tests are conducted. Compared with traditional UKF and the Sage-Husa adaptive UKF (SH-AUKF), this method has comparable filtering accuracy and better filtering stability. The effectiveness of the proposed algorithm is verified.
基金supported by the National Natural Science Foundation of China(62362013)the Guangxi Natural Science Foundation(2023GXNSFAA026294).
文摘The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%.
基金supported by the Natural Science Foundation of Jiangsu Province of China under grant no.BK20211284the Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps under grant no.2020DB005.
文摘As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive capabilities.However,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied topic.In addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers.
基金supported in part by the National Natural Science Foundation of China (62225309,62073222,U21A20480,62361166632)。
文摘Autonomous navigation for intelligent mobile robots has gained significant attention,with a focus on enabling robots to generate reliable policies based on maintenance of spatial memory.In this paper,we propose a learning-based visual navigation pipeline that uses topological maps as memory configurations.We introduce a unique online topology construction approach that fuses odometry pose estimation and perceptual similarity estimation.This tackles the issues of topological node redundancy and incorrect edge connections,which stem from the distribution gap between the spatial and perceptual domains.Furthermore,we propose a differentiable graph extraction structure,the topology multi-factor transformer(TMFT).This structure utilizes graph neural networks to integrate global memory and incorporates a multi-factor attention mechanism to underscore elements closely related to relevant target cues for policy generation.Results from photorealistic simulations on image-goal navigation tasks highlight the superior navigation performance of our proposed pipeline compared to existing memory structures.Comprehensive validation through behavior visualization,interpretability tests,and real-world deployment further underscore the adapt-ability and efficacy of our method.
基金supported in part by the Start-Up Grant-Nanyang Assistant Professorship Grant of Nanyang Technological Universitythe Agency for Science,Technology and Research(A*STAR)under Advanced Manufacturing and Engineering(AME)Young Individual Research under Grant(A2084c0156)+2 种基金the MTC Individual Research Grant(M22K2c0079)the ANR-NRF Joint Grant(NRF2021-NRF-ANR003 HM Science)the Ministry of Education(MOE)under the Tier 2 Grant(MOE-T2EP50222-0002)。
文摘While autonomous vehicles are vital components of intelligent transportation systems,ensuring the trustworthiness of decision-making remains a substantial challenge in realizing autonomous driving.Therefore,we present a novel robust reinforcement learning approach with safety guarantees to attain trustworthy decision-making for autonomous vehicles.The proposed technique ensures decision trustworthiness in terms of policy robustness and collision safety.Specifically,an adversary model is learned online to simulate the worst-case uncertainty by approximating the optimal adversarial perturbations on the observed states and environmental dynamics.In addition,an adversarial robust actor-critic algorithm is developed to enable the agent to learn robust policies against perturbations in observations and dynamics.Moreover,we devise a safety mask to guarantee the collision safety of the autonomous driving agent during both the training and testing processes using an interpretable knowledge model known as the Responsibility-Sensitive Safety Model.Finally,the proposed approach is evaluated through both simulations and experiments.These results indicate that the autonomous driving agent can make trustworthy decisions and drastically reduce the number of collisions through robust safety policies.
基金This work was financially supported by the National Key Research and Development Program of China(2022YFB3103200).
文摘With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security.