期刊文献+
共找到1,066篇文章
< 1 2 54 >
每页显示 20 50 100
Dynamic Event-Triggered Scheduling and Platooning Control Co-Design for Automated Vehicles Over Vehicular Ad-Hoc Networks 被引量:33
1
作者 Xiaohua Ge Shunyuan Xiao +2 位作者 Qing-Long Han Xian-Ming Zhang Derui Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第1期31-46,共16页
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr... This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency. 展开更多
关键词 Automated vehicles dynamic event-triggered communication information flow topology platooning control vehicular ad-hoc networks(VANETs)
下载PDF
Power Allocation for Cooperative Communications in Non-Orthogonal Cognitive Radio Vehicular Ad-Hoc Networks 被引量:1
2
作者 Yancheng Ji Dan Sun +1 位作者 Xiaojun Zhu Danfeng Dong 《China Communications》 SCIE CSCD 2020年第11期91-99,共9页
To achieve the better system performance for cooperative communication in non-orthogonal cognitive radio vehicular adhoc networks(CR-VANETs),this paper investigates the power allocation considering the interference to... To achieve the better system performance for cooperative communication in non-orthogonal cognitive radio vehicular adhoc networks(CR-VANETs),this paper investigates the power allocation considering the interference to the main system in a controllable range.We propose a three-slot one-way vehicle system model where the mobile vehicle nodes complete information interaction with the assistance of other independent nodes by borrowing the unused radio spectrum with the primary networks.The end-to-end SNR relationship in overlay and underlay cognitive communication system mode are analyzed by using two forwarding protocol,namely,decode-and-forward(DF)protocol and amplify-and-forward(AF)protocol,respectively.The system outage probability is derived and the optimal power allocation factor is obtained via seeking the minimum value of the approximation of system outage probability.The analytical results have been confirmed by means of Monte Carlo simulations.Simulation results show that the proposed system performance in terms of outage under the optimal power allocation is superior to that under the average power allocation,and is also better than that under other power allocation systems. 展开更多
关键词 DECODE-AND-FORWARD AMPLIFY-AND-FORWARD outage probability optimal power allocation cooperative communication cognitive radio vehicular ad-hoc networks
下载PDF
A reliable and high throughput hybrid routing protocol for vehicular ad-hoc network 被引量:1
3
作者 郭庆 杨明川 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期87-92,共6页
Due to highly dynamic topology caused by fast moving nodes the Vehicular ad-hoc network (VANET) results in the existence of transient communication links, which degrade the performance of developed protocols. Establis... Due to highly dynamic topology caused by fast moving nodes the Vehicular ad-hoc network (VANET) results in the existence of transient communication links, which degrade the performance of developed protocols. Established routes frequently become stale, and existing communication flows are interrupted, incurring delay and additional overhead. In this paper we propose a novel hybrid routing protocol, which is the combined between of the table-driven routing and on-demand routing in VANET. It makes fast convergence in routing process, minimal drop links, making more reliable links, and adaptive with changing of VANET topology. With neighbor table is updated instantaneously, and using strong neighbor for routing process makes route discovery process start whenever it received requirement, and through using route mechanism appropriately it reduces significantly route overhead at each node. The simulation results illustrate the outstanding properties of our proposed routing protocol. 展开更多
关键词 vehicular ad-hoc network Routing protocol HYBRID table-driven routing protocol on-demand routing orotocol
下载PDF
Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks
4
作者 M.Almutiq L.Sellami B.Alaya 《Computers, Materials & Continua》 SCIE EI 2022年第8期3493-3510,共18页
Nowadays,video streaming applications are becoming one of the tendencies driving vehicular network users.In this work,considering the unpredictable vehicle density,the unexpected acceleration or deceleration of the di... Nowadays,video streaming applications are becoming one of the tendencies driving vehicular network users.In this work,considering the unpredictable vehicle density,the unexpected acceleration or deceleration of the different vehicles included in the vehicular traffic load,and the limited radio range of the employed communication scheme,we introduce the“Dynamic Vehicular Clustering”(DVC)algorithm as a new scheme for video streaming systems over vehicular ad-hoc networks(VANET).The proposed algorithm takes advantage of the small cells concept and the introduction of wireless backhauls,inspired by the different features and the performance of the Long Term Evolution(LTE)-Advanced network.Vehicles are clustered together to form dynamically ad-hoc sub-networks included in the vehicular network.The goal of our clustering algorithm is to take into account several characteristics,such as the vehicle’s position and acceleration to reduce latency and packet loss.Therefore,each cluster is counted as a small cell containing vehicular nodes and an access point that is elected regarding some particular specifications.Based on the exceptional features of the LTE-Advanced network(small cells and wireless backhauls)the DVC algorithm is a promising scheme for video streaming services over VANET systems.Experiments were carried out with a virtual topology of the VANET network created with four clusters to implement the DVC algorithm.The results were compared with other algorithms such as Virtual Trust-ability Data transmission(VTD),Named Data Networking(NDN),and Socially Aware Security Message Forwarding(SASMF).Our algorithm can effectively improve the transmission rate of data packets at the expense of a slight increase in end-to-end delay and control overhead. 展开更多
关键词 5G VIDEO-ON-DEMAND vehicular ad-hoc network MOBILITY vehicular traffic load small cell wireless backhaul LTE-ADVANCED LATENCY packet loss
下载PDF
Quantitative and qualitative correlation analysis of optimal route discovery for vehicular ad-hoc networks
5
作者 MUKUND B.Wagh GOMATHI N. 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第7期1732-1745,共14页
Vehicular ad-hoc networks (VANETs) are a significant field in the intelligent transportation system (ITS) for improving road security. The interaction among the vehicles is enclosed under VANETs. Many experiments ... Vehicular ad-hoc networks (VANETs) are a significant field in the intelligent transportation system (ITS) for improving road security. The interaction among the vehicles is enclosed under VANETs. Many experiments have been performed in the region of VANET improvement. A familiar challenge that occurs is obtaining various constrained quality of service (QoS) metrics. For resolving this issue, this study obtains a cost design for the vehicle routing issue by focusing on the QoS metrics such as collision, travel cost, awareness, and congestion. The awareness of QoS is fuzzified into a price design that comprises the entire cost of routing. As the genetic algorithm (GA) endures from the most significant challenges such as complexity, unassisted issues in mutation, detecting slow convergence, global maxima, multifaceted features under genetic coding, and better fitting, the currently established lion algorithm (LA) is employed. The computation is analyzed by deploying three well-known studies such as cost analysis, convergence analysis, and complexity investigations. A numerical analysis with quantitative outcome has also been studied based on the obtained correlation analysis among various cost functions. It is found that LA performs better than GA with a reduction in complexity and routing cost. 展开更多
关键词 vehicular ad-hoc network lion algorithm fuzzy quality of service ROUTING
下载PDF
An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
6
作者 Tao Xu Cheng Xu Zisang Xu 《China Communications》 SCIE CSCD 2021年第12期315-331,共17页
As an indispensable part of the Intelli-gent Transportation System(ITS),the vehicular ad-hoc network(VANET)has attracted widespread atten-tion from academia and industry.In order to ensure the security of VANET,vehicl... As an indispensable part of the Intelli-gent Transportation System(ITS),the vehicular ad-hoc network(VANET)has attracted widespread atten-tion from academia and industry.In order to ensure the security of VANET,vehicles need to be authen-ticated before accessing the network.Most existing authentication protocols in VANET adopt the Trusted Authority(TA)with centralized structure which is re-sponsible for the authentication tasks of all vehicles.However,the large-scale network consume a lot of computing resources,which leads to unacceptable de-lay in message transmission in VANET.For reducing the computational cost of TA,an efficient three-factor privacy-preserving authentication and key agreement protocol was proposed in our paper.Different from before,the RoadSide Unit(RSU)no longer acts as an intermediate node but is responsible for assisting user authentication,which lead to the computational cost of TA is very low.Through formal and informal analysis,our protocol demonstrates excellent security.Com-pared with previous studies,our work emerges advan-tages and superiorities in the following aspects:com-putational cost,communication cost,security proper-ties and functions,message loss ratio,and message de-lay.These data and evidence indicate that our protocol is an ideal choice for large-scale VANET. 展开更多
关键词 AUTHENTICATION vehicular ad-hoc network SECURITY three-factor
下载PDF
Vehicle Positioning Method Based on RFID in Vehicular Ad-Hoc Networks
7
作者 于德新 郑坤 张伟 《Journal of Donghua University(English Edition)》 EI CAS 2015年第5期800-806,共7页
With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accurac... With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs. 展开更多
关键词 vehicular ad-hoc network(VANET) radio frequency identification(RFID) vehicle positioning fuzzy technology
下载PDF
Effective Life and Area Based Data Storing and Deployment in Vehicular Ad-Hoc Networks
8
作者 Hirokazu Miura Hideki Tode Hirokazu Taki 《Communications and Network》 2015年第3期146-157,共12页
In vehicular ad-hoc networks (VANETs), store-carry-forward approach may be used for data sharing, where moving vehicles carry and exchange data when they go by each other. In this approach, storage resource in a vehic... In vehicular ad-hoc networks (VANETs), store-carry-forward approach may be used for data sharing, where moving vehicles carry and exchange data when they go by each other. In this approach, storage resource in a vehicle is generally limited. Therefore, attributes of data that have to be stored in vehicles are an important factor in order to efficiently distribute desired data. In VANETs, there are different types of data which depend on the time and location. Such kind of data cannot be deployed adequately to the requesting vehicles only by popularity-based rule. In this paper, we propose a data distribution method that takes into account the effective life and area in addition to popularity of data. Our extensive simulation results demonstrate drastic improvements on acquisition performance of the time and area specific data. 展开更多
关键词 vehicular ad-hoc networks (VANETs) POPULARITY EFFECTIVE LIFE EFFECTIVE Area Data DEPLOYMENT
下载PDF
Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks
9
作者 Pino Caballero-Gil Francisco Martín-Fernández Cándido Caballero-Gil 《Journal of Computer and Communications》 2014年第9期14-21,共8页
This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificateless au... This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificateless authentication, membership revocation is not a trivial problem. Thus, in order to improve the performance of revocation in such networks, the use of a dynamic authenticated data structure based on perfect k-ary hash trees combined with a duplex version of the new standard SHA-3 is here presented. Efficient algorithms in the used revocation trees allow reaching a refresh rate of at most simple updates per inserted node. Consequently, the proposal is especially useful for situations with frequent revocations, which are foreseeable when vehicular ad- hoc networks are widely deployed. 展开更多
关键词 K-Ary TREE IDENTITY-BASED Cryptography REVOCATION Hash Function vehicular ad-hoc network
下载PDF
An Intelligent Transportation System Application for Smartphones Based on Vehicle Position Advertising and Route Sharing in Vehicular Ad-Hoc Networks 被引量:2
10
作者 Seilendria A. Hadiwardoyo Subhadeep Patra +2 位作者 Carlos T. Calafate Juan-Carlos Cano Pietro Manzoni 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第2期249-262,共14页
Alerting drivers about incoming emergency vehicles and their routes can greatly improve their travel time in congested cities, while reducing the risk of accidents due to distractions. This paper contributes to this g... Alerting drivers about incoming emergency vehicles and their routes can greatly improve their travel time in congested cities, while reducing the risk of accidents due to distractions. This paper contributes to this goal by proposing Messiah, an Android application capable of informing regular vehicles about incoming emergency vehicles like ambulances, police cars and fire brigades. This is made possible by creating a network of vehicles capable of directly communicating between them. The user can, therefore, take driving decisions in a timely manner by considering incoming alerts. Using the support of our GRCBox hardware, the application can rely on vehicular ad-hoc network communications in the 5 GHz band, being V2V (vehicle-to-vehicle) communication provided through a combination of Android-based smartphone and our GRCBox device. The application was tested in three different scenarios with different levels of obstruction, showing that it is capable of providing alerts up to 300 meters, and notifying vehicles within less than one second. 展开更多
关键词 intelligent transportation systems (ITS) vehicular ad-hoc network (VANET) mobile application Android navigation ad-hoc network
原文传递
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
11
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Lattice-Based Double-Authentication-Preventing Ring Signature for Security and Privacy in Vehicular Ad-Hoc Networks 被引量:10
12
作者 Jinhui Liu Yong Yu +4 位作者 Jianwei Jia Shijia Wang Peiru Fan Houzhen Wang Huanguo Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期575-584,共10页
Amidst the rapid development of the Internet of Things (loT), Vehicular Ad-Hoc NETwork (VANET), a typical loT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives o... Amidst the rapid development of the Internet of Things (loT), Vehicular Ad-Hoc NETwork (VANET), a typical loT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives of individuals. However, there remain challenges for VANETs in preserving privacy and security. In this paper, we propose the first lattice-based Double-Authentication-Preventing Ring Signature (DAPRS) and adopt it to propose a novel privacy-preserving authentication scheme for VANETs, offering the potential for security against quantum computers. The new construction is proven secure against chosen message attacks. Our scheme is more efficient than other ring signature in terms of the time cost of the message signing phase and verification phase, and also in terms of signature length. Analyses of security and efficiency demonstrate that our proposed scheme is provably secure and efficient in the application. 展开更多
关键词 vehicular ad-hoc network(VANET) privacy security Double-Authentication-Preventing Ring Signature(DAPRS) LATTICE
原文传递
Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments
13
作者 Wenming Wang Zhiquan Liu +1 位作者 Shumin Zhang Guijiang Liu 《Computers, Materials & Continua》 SCIE EI 2024年第11期2517-2545,共29页
Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among vehicles.However,malicious vehicles providing illegal and incorrect information ... Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among vehicles.However,malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users.Trust mechanisms serve as an effective solution to this issue.In recent years,many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes,incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area.In this paper,we propose a distributed vehicular network scheme based on trust scores.Specifically,the designed architecture partitions multiple vehicle regions into clusters.Then,cloud supervision systems(CSSs)verify the accuracy of the information transmitted by vehicles.Additionally,the trust scores for vehicles are calculated to reward or penalize them based on the trust evaluation model.Our proposed scheme demonstrates good scalability and effectively addresses the main cause of malicious information distribution among vehicles.Both theoretical and experimental analysis show that our scheme outperforms the compared schemes. 展开更多
关键词 DISTRIBUTED trust mechanism vehicular network privacy protection
下载PDF
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
14
作者 Vincent Omollo Nyangaresi Arkan A.Ghaib +6 位作者 Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah 《Computers, Materials & Continua》 SCIE EI 2024年第10期1029-1057,共29页
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov... Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads. 展开更多
关键词 ATTACKS BILINEAR elliptic curve cryptography(ECC) PRIVACY SECURITY vehicular ad hoc network(VANET)
下载PDF
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
15
作者 Bruno Macena Celio Albuquerque Raphael Machado 《Advances in Internet of Things》 2023年第4期109-118,共10页
As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challe... As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles. 展开更多
关键词 vehicular ad-hoc networks (VANETs) Privacy and Data Protection CYBERSECURITY Pseudonymization Schemes Internet of Vehicles (IoV)
下载PDF
Trust Access Authentication in Vehicular Network Based on Blockchain 被引量:12
16
作者 Shaoyong Guo Xing Hu +3 位作者 Ziqiang Zhou Xinyan Wang Feng Qi Lifang Gao 《China Communications》 SCIE CSCD 2019年第6期18-30,共13页
Data sharing and privacy securing present extensive opportunities and challenges in vehicular network.This paper introducestrust access authentication scheme’as a mechanism to achieve real-time monitoring and promote... Data sharing and privacy securing present extensive opportunities and challenges in vehicular network.This paper introducestrust access authentication scheme’as a mechanism to achieve real-time monitoring and promote collaborative sharing for vehicles.Blockchain,which can provide secure authentication and protected privacy,is a crucial technology.However,traditional cloud computing performs poorly in supplying low-latency and fast-response services for moving vehicles.In this situation,edge computing enabled Blockchain network appeals to be a promising method,where moving vehicles can access storage or computing resource and get authenticated from Blockchain edge nodes directly.In this paper,a hierarchical architecture is proposed consist of vehicular network layer,Blockchain edge layer and Blockchain network layer.Through a authentication mechanism adopting digital signature algorithm,it achieves trusted authentication and ensures valid verification.Moreover,a caching scheme based on many-to-many matching is proposed to minimize average delivery delay of vehicles.Simulation results prove that the proposed caching scheme has a better performance than existing schemes based on central-ized model or edge caching strategy in terms of hit ratio and average delay. 展开更多
关键词 blockchain vehicular network EDGE COMPUTING AUTHENTICATION MECHANISM many-to-many MATCHING
下载PDF
V2X Offloading and Resource Allocation in SDN-Assisted MEC-Based Vehicular Networks 被引量:16
17
作者 Haibo Zhang Zixin Wang Kaijian Liu 《China Communications》 SCIE CSCD 2020年第5期266-283,共18页
As an important application scenario of 5G, the vehicular network has a huge amount of computing data, which brings challenges to the scarce network resources. Mobile edge computing(MEC) sinks cloud services to the ed... As an important application scenario of 5G, the vehicular network has a huge amount of computing data, which brings challenges to the scarce network resources. Mobile edge computing(MEC) sinks cloud services to the edge of network, which reduces the delay jitter caused by remote cloud computing. Software-defined networking(SDN) is an emerging network paradigm with the features of logic centralized control and programmability. In this paper, we construct an SDN-assisted MEC network architecture for the vehicular network. By introducing SDN controller, the efficiency and flexibility of vehicular network are improved, and the network state can be perceived from the global perspective. To further reduce the system overhead, the problem of vehicle to everything(V2X) offloading and resource allocation is proposed, where the optimal offloading decision, transmission power control, subchannels assignment, and computing resource allocation scheme are given. The optimization problem is transformed into three stages because of the heterogeneity of the offloaded tasks and the NP-hard property of the problem. Firstly, the analytic hierarchy process is used to select initial offloading node, then stateless Q-learning is adopted to allocate transmission power, subchannels and computing resources. In addition, the offloading decision is modeled as a potential game, and the Nash equilibrium is proved by the potential function construction. Finally, the numerical results show that the proposed mechanism can effectively reduce the system overhead and achieve better results compared with others’ algorithms. 展开更多
关键词 vehicular network mobile edge computing software-defined networking resource allocation
下载PDF
Mobility-Aware Partial Computation Offloading in Vehicular Networks: A Deep Reinforcement Learning Based Scheme 被引量:8
18
作者 Jianfei Wang Tiejun Lv +1 位作者 Pingmu Huang P.Takis Mathiopoulos 《China Communications》 SCIE CSCD 2020年第10期31-49,共19页
Encouraged by next-generation networks and autonomous vehicle systems,vehicular networks must employ advanced technologies to guarantee personal safety,reduce traffic accidents and ease traffic jams.By leveraging the ... Encouraged by next-generation networks and autonomous vehicle systems,vehicular networks must employ advanced technologies to guarantee personal safety,reduce traffic accidents and ease traffic jams.By leveraging the computing ability at the network edge,multi-access edge computing(MEC)is a promising technique to tackle such challenges.Compared to traditional full offloading,partial offloading offers more flexibility in the perspective of application as well as deployment of such systems.Hence,in this paper,we investigate the application of partial computing offloading in-vehicle networks.In particular,by analyzing the structure of many emerging applications,e.g.,AR and online games,we convert the application structure into a sequential multi-component model.Focusing on shortening the application execution delay,we extend the optimization problem from the single-vehicle computing offloading(SVCOP)scenario to the multi-vehicle computing offloading(MVCOP)by taking multiple constraints into account.A deep reinforcement learning(DRL)based algorithm is proposed as a solution to this problem.Various performance evaluation results have shown that the proposed algorithm achieves superior performance as compared to existing offloading mechanisms in deducing application execution delay. 展开更多
关键词 partial offloading MEC fog computing vehicular networks D2D AR
下载PDF
Edge Computing-Based Joint Client Selection and Networking Scheme for Federated Learning in Vehicular IoT 被引量:6
19
作者 Wugedele Bao Celimuge Wu +3 位作者 Siri Guleng Jiefang Zhang Kok-Lim Alvin Yau Yusheng Ji 《China Communications》 SCIE CSCD 2021年第6期39-52,共14页
In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in ... In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments.Federated learning(FL),which is a type of distributed learning technology,has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy.However,client selection and networking scheme for enabling FL in dynamic vehicular environments,which determines the communication delay between FL clients and the central server that aggregates the models received from the clients,is still under-explored.In this paper,we propose an edge computing-based joint client selection and networking scheme for vehicular IoT.The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach,and uses the edge vehicles as FL clients to conduct the training of local models,which learns optimal behaviors based on the interaction with environments.The clients also work as forwarder nodes in information sharing among network entities.The client selection takes into account the vehicle velocity,vehicle distribution,and the wireless link connectivity between vehicles using a fuzzy logic algorithm,resulting in an efficient learning and networking architecture.We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning. 展开更多
关键词 vehicular IoT federated learning client selection networking scheme
下载PDF
Joint Allocation of Wireless Resource and Computing Capability in MEC-Enabled Vehicular Network 被引量:9
20
作者 Yanzhao Hou Chengrui Wang +3 位作者 Min Zhu Xiaodong Xu Xiaofeng Tao Xunchao Wu 《China Communications》 SCIE CSCD 2021年第6期64-76,共13页
In MEC-enabled vehicular network with limited wireless resource and computation resource,stringent delay and high reliability requirements are challenging issues.In order to reduce the total delay in the network as we... In MEC-enabled vehicular network with limited wireless resource and computation resource,stringent delay and high reliability requirements are challenging issues.In order to reduce the total delay in the network as well as ensure the reliability of Vehicular UE(VUE),a Joint Allocation of Wireless resource and MEC Computing resource(JAWC)algorithm is proposed.The JAWC algorithm includes two steps:V2X links clustering and MEC computation resource scheduling.In the V2X links clustering,a Spectral Radius based Interference Cancellation scheme(SR-IC)is proposed to obtain the optimal resource allocation matrix.By converting the calculation of SINR into the calculation of matrix maximum row sum,the accumulated interference of VUE can be constrained and the the SINR calculation complexity can be effectively reduced.In the MEC computation resource scheduling,by transforming the original optimization problem into a convex problem,the optimal task offloading proportion of VUE and MEC computation resource allocation can be obtained.The simulation further demonstrates that the JAWC algorithm can significantly reduce the total delay as well as ensure the communication reliability of VUE in the MEC-enabled vehicular network. 展开更多
关键词 vehicular network delay optimization wireless resource allocation matrix spectral radius MEC computation resource allocation
下载PDF
上一页 1 2 54 下一页 到第
使用帮助 返回顶部