期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Quantitative Survivability Analysis Using Probability Model Checking: A Study of Cluster-Based Vehicle Networks with Dual Cluster Heads 被引量:3
1
作者 Li Jin Guoan Zhang +2 位作者 Jue Wang Hao Zhu Wei Duan 《China Communications》 SCIE CSCD 2020年第2期206-219,共14页
As an important part of future 5G wireless networks,a vehicular network demands safety,reliability and connectivity.In this context,networking survivability is usually considered an important metric to evaluate networ... As an important part of future 5G wireless networks,a vehicular network demands safety,reliability and connectivity.In this context,networking survivability is usually considered an important metric to evaluate network performance.In this paper,we propose a survivability model for vehicle communication networking based on dual cluster heads,wherein a backup cluster head(CH)will be activated if the primary CH fails,thereby effectively enhancing the network lifetime.Additionally,we introduce a software rejuvenation strategy for the prime CH to further improve the survivability of the entire network.Using the Probabilistic Symbolic Model Checker(PRISM),we verify and discuss the proposed survivability model via numerical simulations.The results show that network survivability can be effectively improved by introducing an additional CH and further enhanced by adopting the software rejuvenation technique. 展开更多
关键词 cluster head 5G software recovery SURVIVABILITY vehicle networks
下载PDF
Average Secrecy Capacity of the Reconfigurable Intelligent Surface-Assisted Integrated Satellite Unmanned Aerial Vehicle Relay Networks
2
作者 Ping Li Kefeng Guo +2 位作者 Feng Zhou XuelingWang Yuzhen Huang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1849-1864,共16页
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e... Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks reconfigurable intelligent surface average secrecy capacity(ASC) asymptotic ASC
下载PDF
Secrecy Outage Probability for Two-Way Integrated Satellite Unmanned Aerial Vehicle Relay Networks with Hardware Impairments
3
作者 Xiaoting Ren Kefeng Guo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2515-2530,共16页
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy... In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks two-way unmanned aerial vehicle relay hardware impairments secrecy outage probability(SOP) asymptotic SOP
下载PDF
Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm
4
作者 C.Nandagopal P.Siva Kumar +1 位作者 R.Rajalakshmi S.Anandamurugan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期113-126,共14页
Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data tr... Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data transfer,and data loss,affect the effectiveness of Transmission Control Protocols(TCP)on such wireless ad hoc networks.To avoid the problem,in this paper,mobility-aware zone-based routing in VANET is proposed.To achieve this con-cept,in this paper hybrid optimization algorithm is presented.The hybrid algo-rithm is a combination of Ant colony optimization(ACO)and artificial bee colony optimization(ABC).The proposed hybrid algorithm is designed for the routing process which is transmitting the information from one place to another.The optimal routing process is used to avoid traffic and link failure.Thefitness function is designed based on Link stability and Residual energy.The validation of the proposed algorithm takes solution encoding,fitness calculation,and updat-ing functions.To perform simulation experiments,NS2 simulator software is used.The performance of the proposed approach is analyzed based on different metrics namely,delivery ratio,delay time,throughput,and overhead.The effec-tiveness of the proposed method compared with different algorithms.Compared to other existing VANET algorithms,the hybrid algorithm has proven to be very efficient in terms of packet delivery ratio and delay. 展开更多
关键词 vehicle ad hoc network transmission control protocol multi-hop data transmission ant colony optimization artificial bee colony optimization
下载PDF
A Self-Adaptive Back-off Optimization Scheme Based on Beacons Probability Prediction for Vehicle Ad-Hoc Networks 被引量:1
5
作者 Haitao Zhao Aiqian Du +2 位作者 Hongbo Zhu Dapeng Li Nanjie Liu 《China Communications》 SCIE CSCD 2016年第12期132-138,共7页
In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship ... In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship between expiration probability and minimum window size was reached by building a Markov model. According to this conclusion, a back-off algorithm based on adjusting the size of minimum contention window called CEB is proposed, and this algorithm is on the basis of the differential size between the number of expiration beacons and preset threshold. Simulations were done to compare the performance of CEB with that of RBEB and BEB, and the results show that the performance of the new proposed algorithm is better than that of RBEB and BEB. 展开更多
关键词 vehicle ad-hoc networks back off BEACON expiration probability collision probability
下载PDF
An Anonymous Authentication Scheme with Controllable Linkability for Vehicle Sensor Networks 被引量:1
6
作者 Yousheng Zhou Lvjun Chen +1 位作者 Xiaofeng Zhao Zheng Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第12期1101-1118,共18页
Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible... Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible to a broad range of attacks.In addition to ensuring security for both data-at-rest and data-in-transit,it is essential to preserve the privacy of data and users in vehicle sensor networks.Many existing authentication schemes for vehicle sensor networks are generally not designed to also preserve the privacy between the user and service provider(e.g.,mining user data to provide personalized services without infringing on user privacy).Controllable linkability can be used to facilitate an involved entity with the right linking key to determine whether two messages were generated by the same sender,while preserving the anonymity of the signer.Such a functionality is very useful to provide personalized services.Thus,in this paper,a threshold authentication scheme with anonymity and controllable linkability for vehicle sensor networks is constructed,and its security is analyzed under the random oracle model. 展开更多
关键词 Threshold authentication controllable linkabilty group signature vehicle sensor networks
下载PDF
An Optimization Scheme for Task Offloading and Resource Allocation in Vehicle Edge Networks 被引量:1
7
作者 Yuxin Xu Zilong Jin +1 位作者 Xiaorui Zhang Lejun Zhang 《Journal on Internet of Things》 2020年第4期163-173,共11页
The vehicle edge network(VEN)has become a new research hotspot in the Internet of Things(IOT).However,many new delays are generated during the vehicle offloading the task to the edge server,which will greatly reduce t... The vehicle edge network(VEN)has become a new research hotspot in the Internet of Things(IOT).However,many new delays are generated during the vehicle offloading the task to the edge server,which will greatly reduce the quality of service(QOS)provided by the vehicle edge network.To solve this problem,this paper proposes an evolutionary algorithm-based(EA)task offloading and resource allocation scheme.First,the delay of offloading task to the edge server is generally defined,then the mathematical model of problem is given.Finally,the objective function is optimized by evolutionary algorithm,and the optimal solution is obtained by iteration and averaging.To verify the performance of this method,contrast experiments are conducted.The experimental results show that our purposed method reduces delay and improves QOS,which is superior to other schemes. 展开更多
关键词 vehicle edge network evolutionary algorithm task offloading resource allocation
下载PDF
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network
8
作者 Lemei Da Hai Liang +3 位作者 Yong Ding Yujue Wang Changsong Yang Huiyong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期879-902,共24页
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity. 展开更多
关键词 Unmanned aerial vehicle cluster network certificateless signcryption certificateless signature batch verification source authentication data privacy blockchain
下载PDF
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks
9
作者 Xiaoting Ma Junhui Zhao +1 位作者 Jieyu Liao Ziyang Zhang 《Digital Communications and Networks》 SCIE CSCD 2023年第3期628-637,共10页
Inspired by mobile edge computing(MEC),edge learning has gained a momentum by directly performing model training at network edge without sending massive data to a centralized data center.However,the quality of model t... Inspired by mobile edge computing(MEC),edge learning has gained a momentum by directly performing model training at network edge without sending massive data to a centralized data center.However,the quality of model training will be affected by the limited communication and computing resources of network edge.In this paper,how to improve the training performance of a federated learning system aided by intelligent reflecting surface(IRS)over vehicle platooning networks is studied,where multiple platoons train a shared federated learning model.Multi-platoon cooperation can alleviate the pressure of data processing caused by the limited computing resources of single platoon.Meanwhile,IRS can enhance the inter-platoon communication in a cost-effective and energy-efficient manner.Firstly,the federated learning optimization problem of maximizing the learning accuracy is formulated by jointing platoon scheduling,bandwidth allocation and phase shifts at the IRS to maximize the number of scheduled platoon.Specif-ically,in the proposed learning architecture each platoon updates the learning model with its own data and uploads it to the global model through IRS-based wireless networks.Then,a method based on sequential optimization algorithm(SOA)and a group-based optimization method are analyzed for single IRS aided and large-scale IRS aided commu-nication,respectively.Finally,a platoon scheduling scheme is designed based on the communication reliability and computing reliability of platoons.Simulation results demonstrate that large-scale IRS assisted communication can effectively improve the reliability of multi-user communication networks.The scheduling scheme based on learning reliability balances the communication performance and computing performance of platoons. 展开更多
关键词 vehicle platooning networks Federated learning Intelligent reflecting surface Platoon scheduling Resource allocation
下载PDF
Multi-objective robust secure beamforming for cognitive satellite and UAV networks 被引量:3
10
作者 WANG Zining LIN Min +3 位作者 TANG Xiaogang GUO Kefeng HUANG Shuo CHENG Ming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第4期789-798,共10页
A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with t... A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with the UAV network,we first consider both achievable secrecy rate maximization and total transmit power minimization,and formulate a multi-objective optimization problem(MOOP)using the weighted Tchebycheff approach.Then,by supposing that only imperfect channel state information based on the angular information is available,we propose a method combining angular discretization with Taylor approximation to transform the non-convex objective function and constraints to the convex ones.Next,we adopt semi-definite programming together with randomization technology to solve the original MOOP and obtain the BF weight vector.Finally,simulation results illustrate that the Pareto optimal trade-off can be achieved,and the superiority of our proposed scheme is confirmed by comparing with the existing BF schemes. 展开更多
关键词 cognitive satellite and unmanned aerial vehicle network(CSUN) multi-objective optimization robust secure beamforming(BF) weighted Tchebycheff approach
下载PDF
Vehicle Detection Based on Visual Saliency and Deep Sparse Convolution Hierarchical Model 被引量:4
11
作者 CAI Yingfeng WANG Hai +2 位作者 CHEN Xiaobo GAO Li CHEN Long 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2016年第4期765-772,共8页
Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high ... Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high processing times and low vehicle detection performance.To address this issue,a visual saliency and deep sparse convolution hierarchical model based vehicle detection algorithm is proposed.A visual saliency calculation is firstly used to generate a small vehicle candidate area.The vehicle candidate sub images are then loaded into a sparse deep convolution hierarchical model with an SVM-based classifier to perform the final detection.The experimental results demonstrate that the proposed method is with 94.81% correct rate and 0.78% false detection rate on the existing datasets and the real road pictures captured by our group,which outperforms the existing state-of-the-art algorithms.More importantly,high discriminative multi-scale features are generated by deep sparse convolution network which has broad application prospects in target recognition in the field of intelligent vehicle. 展开更多
关键词 vehicle detection visual saliency deep model convolution neural network
下载PDF
Deep Reinforcement Learning Empowered Edge Collaborative Caching Scheme for Internet of Vehicles
12
作者 Xin Liu Siya Xu +4 位作者 Chao Yang Zhili Wang Hao Zhang Jingye Chi Qinghan Li 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期271-287,共17页
With the development of internet of vehicles,the traditional centralized content caching mode transmits content through the core network,which causes a large delay and cannot meet the demands for delay-sensitive servi... With the development of internet of vehicles,the traditional centralized content caching mode transmits content through the core network,which causes a large delay and cannot meet the demands for delay-sensitive services.To solve these problems,on basis of vehicle caching network,we propose an edge colla-borative caching scheme.Road side unit(RSU)and mobile edge computing(MEC)are used to collect vehicle information,predict and cache popular content,thereby provide low-latency content delivery services.However,the storage capa-city of a single RSU severely limits the edge caching performance and cannot handle intensive content requests at the same time.Through content sharing,col-laborative caching can relieve the storage burden on caching servers.Therefore,we integrate RSU and collaborative caching to build a MEC-assisted vehicle edge collaborative caching(MVECC)scheme,so as to realize the collaborative caching among cloud,edge and vehicle.MVECC uses deep reinforcement learning to pre-dict what needs to be cached on RSU,which enables RSUs to cache more popular content.In addition,MVECC also introduces a mobility-aware caching replace-ment scheme at the edge network to reduce redundant cache and improving cache efficiency,which allows RSU to dynamically replace the cached content in response to the mobility of vehicles.The simulation results show that the pro-posed MVECC scheme can improve cache performance in terms of energy cost and content hit rate. 展开更多
关键词 Internet of vehicles vehicle caching network collaborative caching caching replacement deep reinforcement learning
下载PDF
A Multi-Mode Public Transportation System Using Vehicular to Network Architecture
13
作者 Settawit Poochaya Peerapong Uthansakul +8 位作者 Monthippa Uthansakul Patikorn Anchuen Kontorn Thammakul Arfat Ahmad Khan Niwat Punanwarakorn Pech Sirivoratum Aranya Kaewkrad Panrawee Kanpan Apichart Wantamee 《Computers, Materials & Continua》 SCIE EI 2022年第12期5845-5862,共18页
The number of accidents in the campus of Suranaree University of Technology(SUT)has increased due to increasing number of personal vehicles.In this paper,we focus on the development of public transportation system usi... The number of accidents in the campus of Suranaree University of Technology(SUT)has increased due to increasing number of personal vehicles.In this paper,we focus on the development of public transportation system using Intelligent Transportation System(ITS)along with the limitation of personal vehicles using sharing economy model.The SUT Smart Transit is utilized as a major public transportation system,while MoreSai@SUT(electric motorcycle services)is a minor public transportation system in this work.They are called Multi-Mode Transportation system as a combination.Moreover,a Vehicle toNetwork(V2N)is used for developing theMulti-Mode Transportation system in the campus.Due to equipping vehicles with On Board Unit(OBU)and 4G LTE modules,the real time speed and locations are transmitted to the cloud.The data is then applied in the proposed mathematical model for the estimation of Estimated Time of Arrival(ETA).In terms of vehicle classifications and counts,we deployed CCTV cameras,and the recorded videos are analyzed by using You Only Look Once(YOLO)algorithm.The simulation and measurement results of SUT Smart Transit and MoreSai@SUT before the covid-19 pandemic are discussed.Contrary to the existing researches,the proposed system is implemented in the real environment.The final results unveil the attractiveness and satisfaction of users.Also,due to the proposed system,the CO_(2) gas gets reduced when Multi-Mode Transportation is implemented practically in the campus. 展开更多
关键词 Smart transit intelligent transportation system(ITS) dedicated short range communication(DSRC) vehicle to network(V2N) vehicle to everything(V2X) electric vehicle(EV) you only look once(YOLO)
下载PDF
Central Aggregator Intrusion Detection System for Denial of Service Attacks
14
作者 Sajjad Ahmad Imran Raza +3 位作者 MHasan Jamal Sirojiddin Djuraev Soojung Hur Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2023年第2期2363-2377,共15页
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart gr... Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart grid through a wireless network,it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system.However,existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network.In this paper,the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed.The proposed system,central aggregator–intrusion detection system(CA-IDS),works as a security gateway for EVs to analyze andmonitor incoming traffic for possible DoS attacks.EVs are registered with a Central Aggregator(CAG)to exchange authenticated messages,and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG.A denial of service(DoS)attack is simulated at CAG in a vehicle-to-grid(V2G)network manipulating various network parameters such as transmission overhead,receiving capacity of destination,average packet size,and channel availability.The proposed system is compared with existing intrusion detection systems using different parameters such as throughput,jitter,and accuracy.The analysis shows that the proposed system has a higher throughput,lower jitter,and higher accuracy as compared to the existing schemes. 展开更多
关键词 Denial of service attack vehicle to grid network network security network throughput
下载PDF
Dynamic value iteration networks for the planning of rapidly changing UAV swarms 被引量:3
15
作者 Wei LI Bowei YANG +1 位作者 Guanghua SONG Xiaohong JIANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第5期687-696,共10页
In an unmanned aerial vehicle ad-hoc network(UANET),sparse and rapidly mobile unmanned aerial vehicles(UAVs)/nodes can dynamically change the UANET topology.This may lead to UANET service performance issues.In this st... In an unmanned aerial vehicle ad-hoc network(UANET),sparse and rapidly mobile unmanned aerial vehicles(UAVs)/nodes can dynamically change the UANET topology.This may lead to UANET service performance issues.In this study,for planning rapidly changing UAV swarms,we propose a dynamic value iteration network(DVIN)model trained using the episodic Q-learning method with the connection information of UANETs to generate a state value spread function,which enables UAVs/nodes to adapt to novel physical locations.We then evaluate the performance of the DVIN model and compare it with the non-dominated sorting genetic algorithm II and the exhaustive method.Simulation results demonstrate that the proposed model significantly reduces the decisionmaking time for UAV/node path planning with a high average success rate. 展开更多
关键词 Dynamic value iteration networks Episodic Q-learning Unmanned aerial vehicle(UAV)ad-hoc network Non-dominated sorting genetic algorithm II(NSGA-II) Path planning
原文传递
GGC:Gray-Granger Causality Method for Sensor Correlation Network Structure Mining on High-Speed Train
16
作者 Jie Man Honghui Dong +1 位作者 Limin Jia Yong Qin 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第1期207-222,共16页
Vehicle information on high-speed trains can not only determine whether the various parts of the train are working normally,but also predict the train’s future operating status.How to obtain valuable information from... Vehicle information on high-speed trains can not only determine whether the various parts of the train are working normally,but also predict the train’s future operating status.How to obtain valuable information from massive vehicle data is a difficult point.First,we divide the vehicle data of a high-speed train into 13 subsystem datasets,according to the functions of the collection components.Then,according to the gray theory and the Granger causality test,we propose the Gray-Granger Causality(GGC)model,which can construct a vehicle information network on the basis of the correlation between the collection components.By using the complex network theory to mine vehicle information and its subsystem networks,we find that the vehicle information network and its subsystem networks have the characteristics of a scale-free network.In addition,the vehicle information network is weak against attacks,but the subsystem network is closely connected and strong against attacks. 展开更多
关键词 vehicle information network structure mining gray theory Granger causality theory complex network theory high-speed train
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部