CoCoChain: A Concept-Aware Consensus Protocol for Secure Sensor Data Exchange in Vehicular Ad Hoc Networks
Abstract
1. Introduction
- We introduce semantic digests for VANET consensus: top-k concept vectors produced by an SAE and integrated into a practical PBFT workflow with per-phase semantic validation.
- We provide a latency- and bandwidth-efficient design that reduces consensus message overhead by up to 25% and confirmation latency by 20% while sustaining integrity with up to 20% Byzantine participants.
- We extend evaluation beyond benign settings to multi-hop broadcast under congestion and include AoI as a timeliness metric, alongside latency, throughput, and PDR, analyzing resilience under RF jamming and timing jitter.
- We clarify scope: this work targets OBU/RSU semantic-aware consensus and does not address 6G joint sensing or multi-base-station fusion.
- We commit to releasing code, configs, and an anonymized synthetic replica of the training data to support reproducibility.
2. Literature Review
2.1. Blockchain Applications in VANETs
2.2. Consensus Mechanisms and Security Protocols
2.3. Semantic Compression and Concept Modeling
2.4. Adversarial Threats to Semantic Digests
- Concept poisoning (including backdoors).
- Concept collisions (feature interference).
- Concept drift (distribution shift).
- Integrated defense framework.
- Multimodal authenticity. Bind each semantic digest to a Merkle commitment of the original payload. Signatures and timestamps are verified according to C-ITS standards, ETSI TS 102 941 [62], and ETSI TS 103 759 [63]. This approach enables lightweight semantic exchange without forfeiting end-to-end auditability [64].
2.5. Positioning w.r.t. C-V2X Resource Allocation, AoI-Aware MAC, and NR-V2X Mode 2 Models
- (a)
- Multi-agent resource allocation in C-V2X Mode 4.
- (b)
- AoI-aware MAC mechanisms in VANETs.
- (c)
- Analytical NR-V2X Mode 2 models (PDR–CBR curves).
2.6. Positioning of CoCoChain
- Domain-specific concept dictionary. A k-sparse SAE is trained offline on heterogeneous V2V/V2I traces (urban, highway, and cross-domain) to capture domain-relevant patterns (e.g., maneuvers, hazard types) in a C-dimensional latent space [37].
- Edge-assisted validation. RSUs cache concept prototypes and perform rapid similarity lookups (e.g., GPU-enabled at the edge), offloading verification from OBUs and aligning with MEC-based V2X designs that localize agreement to reduce on-air time and contention [21].
3. Methodology
3.1. System Model and Assumptions
- An ECDSA key pair for signing and verification, and a cryptographic hash for payload commitments (aligned with C-ITS security services) [70].
- A locally stored sparse autoencoder trained offline on heterogeneous V2V/V2I traces using reconstruction loss plus an sparsity term [37].
- A cosine-similarity threshold to validate that received concept vectors match locally recomputed , i.e., .
- An LRU cache of size M with recent full payloads and their concept vectors for on-demand reveal and replay protection.
- Security and trust assumptions.
- Semantic digests and AoI.
- Semantic-PBFT algorithm.
Algorithm 1 Semantic-PBFT at node i |
|
3.2. Sparse Autoencoder Training
- Data preparation.
- Model architecture.
- Objective and regularization.
- Training procedure
- Hyperparameter sensitivity.
- Reproducibility details.
- Pseudo-code.
Algorithm 2 Offline SAE Training |
Require: Dataset , sparsity k, sparsity weight |
3.3. Concept Extraction and Top-k Selection
- Encoding.
- Top-k selection.
- Binary format and quantization (for broadcast).
- Pipeline diagram.
- Complexity and optimizations.
3.4. Concept-Interleaved PBFT Workflow
- 1.
- Pre-Prepare (leader).
- 2.
- Prepare (replicas).
- (a)
- Cache path (fast): If is locally cached by , compute and form the dense vector ; accept the item if
- (b)
- No-cache path (selective reveal): If is not cached, perform format/signature checks on , enforce and index ranges; if the item is flagged (e.g., repeated top-k support beyond expectation or inconsistent metadata), request by (selective reveal) and apply the cosine test above; otherwise, defer payload fetch to the commit stage.
- (c)
- If any item fails, discard and stop processing.
- 3.
- Commit (replicas).
- (a)
- Fetches any missing payloads by (payload reveal); verifies signatures and recomputes to confirm ;
- (b)
- If all items pass, appends to the ledger and updates AoI; if some item fails, rejects the block, files a misbehavior complaint (per ETSI TS 103 759), and initiates a view change.
Algorithm 3 Semantic-Interleaved PBFT at replica i |
|
3.5. Security Properties
- Safety.
- Liveness.
- Semantic consistency (binding).
- Accountability and auditability.
- Adversarial considerations.
Algorithm 4 CoCoChain Security Guarantees Verification Flow |
|
4. Experimental Setup
4.1. Simulation Framework and Tools
- OMNeT++ v6.0.3 [78]: Discrete-event simulator implementing the IEEE 802.11p MAC/PHY (ITS-G5) and the PBFT-style logic. We add custom modules for (i) top-k digest broadcast, (ii) per-phase semantic checks, (iii) selective payload reveal, and (iv) fine-grained logging of per-phase latency/bytes.
- SUMO v1.8.0 [71]: Microscopic traffic simulator generating second-by-second mobility on OSM-derived urban/highway maps. We control density, signal timing, and speed limits to sweep light → congested regimes.
- Veins v5.2 [4]: Bidirectional TraCI coupling (100 ms steps) to synchronize mobility and wireless links; handles dynamic vehicle insertion/removal and updates the connectivity graph .
- PyTorch v1.12 [79]: Offline SAE training and export of the frozen encoder used in simulation. We also benchmark encoder inference on NVIDIA Jetson Xavier NX to validate sub-millisecond encoding.
- (Optional) Fabric harness [80]: A lightweight harness that replays committed blocks into a Hyperledger Fabric v2.2 network off the data path to sanity-check ledger consistency; ordering/endorsement logs serve only as a ground-truth mirror, while all networking/consensus effects are modeled in OMNeT++.
- Wireless and network configuration.
- Security/adversarial configuration.
- Scenarios.
- 1.
- Urban grid: downtown map; avg. speed 30 km/h; 15 signalized intersections.
- 2.
- Highway stretch: segment; avg. speed 100 km/h; no intersections.
- 3.
- Multi-hop broadcast under congestion: Urban/highway mix (10 km corridor) with 2–4-hop rebroadcast; we sweep density (100–800 veh/km2), beaconing (5/10 Hz), and CBR (30–85%) to stress broadcast reliability.
- Metrics and logging.
- Consensus latency: PRE_PREPARE → COMMIT time per block.
- Communication overhead: Total on-air bytes per block (PRE_PREPARE/PREPARE/COMMIT), including digests and occasional payload reveals.
- Throughput: Committed blocks per second.
- Packet delivery ratio (PDR) and collision rate: End-to-end success and MAC-level collisions in multi-hop broadcast.
- Age of Information (AoI): computed from signed timestamps.
- Semantic validation stats: False positives/negatives of cosine checks; fraction of blocks requiring selective reveal.
- Hardware and deployment.
4.2. Comparative Protocols and Baselines
- (1)
- Full-Payload PBFT (classical).A standard Practical Byzantine Fault Tolerance (PBFT) workflow [9]:
- Payload exchange: Each phase (PRE_PREPARE/PREPARE/COMMIT) disseminates full transaction payloads alongside headers and signatures.
- Overhead model: Per block, the on-air data is per phase (plus signatures), i.e., dominated by floats in dense regimes.
- Notes: This baseline isolates the cost of multi-phase broadcast when payloads—not digests—traverse the network.
- (2)
- Digest-PBFT (ablative baseline).A PBFT variant that carries only cryptographic commitments (hash/Merkle root) [64] during the three phases; payloads are fetched at commit:
- Payload exchange: Phases disseminate and headers; replicas reveal on commit (or earlier if explicitly requested).
- Overhead model: Per phase, ; payload bytes appear only at commit for replicas missing in cache.
- Notes: This ablation controls for payload-on-wire without semantic checks, isolating the incremental benefit of CoCoChain’s concept filtering.
- (3)
- Traditional relays (Scenario 3 only).A lightweight store-and-forward scheme across RSU domains (no consensus):
- Mechanism: RSUs relay entire transaction messages hop-by-hop across domains.
- Overhead model: per hop; no quorum replication. Integrity is hop-by-hop via C-ITS signatures; there is no global finality or audit trail [4].
- Notes: Included only in the multi-hop/congestion scenario to contextualize broadcast costs without BFT guarantees.
- Visualization.
- Fairness and configuration.
- Use ECDSA P-256 for message authentication and carry the same headers; Digest-PBFT and CoCoChain bind payloads with ;
- Share identical network settings, densities , Byzantine ratios , block size m, and timeouts/view-change parameters;
- Are logged and evaluated with the same metrics (latency, throughput, PDR/collisions, AoI, and semantic stats where applicable).
4.3. Dataset and Preprocessing
- Sources and Composition.
- Feature Vectorization.
- Temporal Windowing.
- Augmentations.
- Train/Val/Test Hygiene.
- Ethics and Privacy.
- Availability.
4.4. UE-Side Sidelink Modeling (NR-V2X/C-V2X)
- Rationale.
- Abstraction.
- Key Parameters.
- AoI Metric.
- Integration with CoCoChain.
4.5. Scenario 1: Urban Congestion with Adversarial Injection
- Topology and traffic.
- Wireless/network parameters.
- Adversarial injection model.
- Block and consensus configuration.
- Simulation protocol.
- Metrics.
- Consensus latency L: PRE_PREPARE → COMMIT per block.
- AoI: from signed timestamps [14].
- Communication overhead: On-air bytes per block across phases (incl. reveals).
- Throughput: Committed blocks/s under load.
- PDR and collision rate: End-to-end success and MAC collisions in multi-hop broadcast.
- Semantic validation: False positives/negatives; poisoning detection rate; fraction of blocks requiring reveal.
- Configuration references.
4.6. Scenario 2: Highway Rapid Handover
- Topology and mobility.
- Handover logic.
- Upon entering the overlap between RSUi and RSUi+1, the OBU multicasts the transaction to both RSUs.
- Each RSU runs an independent Semantic-PBFT instance; the OBU accepts the first COMMIT received within a handover window ms and suppresses further retransmissions for the same commitment .
- If neither RSU commits within , the OBU retries with RSUi+1 after leaving the overlap.
- Algorithmic handover pseudocode.
Algorithm 5 RSU handover at OBU u (highway scenario) |
|
- Parameter summary.
- Metrics collected.
- Handover Success Rate H: Fraction of transactions committed within the overlap without retry.
- Consensus Latency L: PRE_PREPARE → COMMIT.
- Retry Rate R: Fraction requiring retransmission in the next RSU’s domain.
- Throughput : Committed transactions per second.
- AoI: from signed timestamps [14].
4.7. Scenario 3: Cross-Domain Hybrid Consensus
- Topology and mobility.
- Urban (): High density (≈500 veh/km2), avg. speed 30 km/h, grid topology.
- Suburban (): Medium density (≈200 veh/km2), speed 50 km/h, grid+arterial mix.
- Rural ( corridor): Linear highway, modeled as 20 km × 1 km strip with low density (≈50 veh/km2), speed 80 km/h.
- Inter-domain synchronization.
- CoCoChain (hybrid mode): Transmit batches of semantic digests (commitment , top-k digest d) and per-block Merkle roots; payloads are fetched on demand if an integrity discrepancy is detected.
- Relay baseline: Transmit complete payload batches (headers + full x) for the same window.
- Hybrid edge synchronization algorithm.
Algorithm 6 Inter-domain sync at edge server (every ) |
|
- Workflow diagram.
- Configuration and metrics.
- Cross-domain finality time: Time from local commit to global visibility after sync (worst neighbor).
- Inter-domain bandwidth: On-wire bytes per sync (digests vs. full payloads).
- Global consistency: Fork/conflict rate and reconciliation cost (payload fetches on root mismatches).
- Freshness: Cross-domain AoI from signed timestamps [14].
4.8. Evaluation Metrics
- 1.
- Confirmation Latency (L).
- 2.
- Throughput ().
- 3.
- On-Air Bytes per Block ().
- 4.
- Message Overhead (M).
- 5.
- Resource Utilization (, ).
- 6.
- Age of Information (AoI).
- 7.
- Detected Malformed Concepts (DMCs).
- 8.
- False Positive/Negative Rates (FPR/FNR).
- 9.
- Selective-Reveal Rate (SRR).
- 10.
- Handover Success Rate (HSR).
- 11.
- Cross-Domain Finality Time (CDFT).
- 12.
- Interoperability Overhead (IO).
Algorithm 7 Metric Logging at Replica i |
|
4.9. Cross-Layer Adversarial Stress Tests
- Threats.
- Procedure.
- Mitigations.
- Reporting.
4.10. Reproducibility and Artifacts
- Sim configs: OMNeT++/Veins .ini files for all scenarios (urban/highway/cross-domain), including IEEE 802.11p and the NR-V2X/C-V2X sidelink abstractions from Section 4.4.
- Workloads: SUMO .sumocfg maps and routes; scripts to regenerate flows with fixed random seeds; synthetic mini-datasets (no PII).
- Models: SAE training code (PyTorch), hyperparameters, checkpoints, and feature normalizers (.json).
- Logs and analysis: Raw CSV logs (events, metrics) and Python notebooks to produce all plots in Section 5.
- Environment: Dockerfiles for reproducible builds, with pinned versions of OMNeT++/Veins/SUMO and Python dependencies.
5. Results and Analysis
5.1. Performance Under Honest Conditions
5.2. Scenario 1: Urban Performance Baseline and Adversarial Injection
5.3. Scenario 2: Highway Rapid Handover
5.4. Scenario 3: Cross-Domain Hybrid Consensus
- Detailed Analysis.
5.5. Sensitivity to Top-k Sparsity Parameter
5.6. Scalability with Network Density
- Relative latency gain (definition).
- Results and discussion.
5.7. Cross-Layer Stress: Wideband Jamming and Timing Jitter
6. Discussion
6.1. Quantitative Advantages of CoCoChain
- Lower confirmation latency. As shown in Table 6 and Table 7, CoCoChain yields 15–25% faster end-to-end confirmations in representative settings (e.g., urban adversarial injection: ms; highway handovers: ms). While these end-to-end times do not universally fall below 100 ms, CoCoChain tightens tails and reaches sub-10 ms authentication micro-latency in overlaps (Figure 18), which is critical for control loops that rely on prompt verification events within handover windows.
- Higher throughput and lower on-air bytes. By exchanging top-k concept digests instead of full payloads, CoCoChain boosts throughput by ≈12– (Table 4, Table 6, and Table 7) and reduces cross-domain interop overhead by over 60% (Table 8). Under density stress (Figure 21), semantic compression curbs retransmissions and keeps latency growth modest, achieving a relative latency gain of nearly 26% at 400 veh/km2.
- Adversarial resilience with low false alarms. Semantic checks detect over 93% of random-vector injections at with an FPR of just 1.1% (Table 6). As the adversarial fraction grows to 20%, detection scales near-linearly while the FPR stays below 5% (Figure 13), complementing ECDSA’s header authenticity with content-level validation.
6.2. Limitations and Threats to Validity
- Offline SAE training and concept drift.
- Simplified adversaries.
- Threshold and sparsity tuning
- Partial synchrony and permissioning.
- Simulation realism.
6.3. Relation to Prior Work
6.4. Deployment Implications
- Hardware. Sparse AEs with top-k selection run efficiently on automotive-grade SoCs; our measurements show <1 ms per embedding on embedded GPUs and a few ms on CPU. Memory overhead (concept cache + model) was modest relative to OBU budgets (Table 4).
- Software integration. CoCoChain can retrofit permissioned stacks (e.g., Fabric) by extending message schemas with pairs and inserting semantic checks in endorsement/commit handlers; the fast-path cross-domain sync (Table 8) can coexist with periodic batching.
- Privacy and data minimization. Digest exchange reduces the exposure of raw content across domains; however, concept vectors can still leak patterns. Operators should combine CoCoChain with privacy controls (e.g., payload hashing, selective reveal, or ZK proofs) where required by policy.
- Operations. To track drift/adversaries, schedule SAE refreshes (federated or staged rollouts) and monitor rejection/recall metrics (FPR/FNR, DMC) as live SLOs. Cross-domain sync parameters () should reflect the application’s freshness requirements.
6.5. Cross-Layer Robustness to Jamming and Jitter
- Key takeaways.
- Operational envelope under RF stress. In dense urban load, CoCoChain sustains down to , while PBFT exceeds near . On highways, CoCoChain maintains down to , whereas PBFT drops below this threshold around . For cross-domain operation, CoCoChain keeps until , while PBFT crosses this limit near (see Figure 22 and Table 10).
- Timing resilience and partial synchrony. With injected jitter, CoCoChain preserves up to , roughly PBFT’s tolerance (≈14–16 ms) before either latency or the view-change rate exceeds operational limits. This quantifies the margin to the partial-synchrony bound and pinpoints the onset of leader-churn.
- Why CoCoChain degrades more gracefully.
- Smaller wire image ⇒ fewer retransmissions. Top-k concept digests shrink packets, lowering collision probability and compounding backoffs under poor SINR/JSR, which directly improves goodput under contention.
- Early semantic gating. Replicas discard corrupted/tampered items before they amplify into extra consensus traffic, preventing congestion cascades when link quality dips.
- Churn amortization. When jitter grazes , smaller per-phase messages make view changes cheaper, so the VCR grows more slowly than with PBFT.
- Deployment guidance under cross-layer stress.
- Adaptive and timeouts: Tune view-change and phase timeouts to recent jitter percentiles (e.g., set P99 one-way delay) to avoid unnecessary leader changes during bursty periods.
- Stress-aware semantics: When PHY/MAC loss rises (estimated via SINR/JSR or NR-V2X CQI), temporarily relax by and tighten post-commit audits to curb false rejections without opening poisoning avenues.
- Diversity and redundancy: Leverage multi-channel ITS-G5/NR-V2X and RSU diversity; CoCoChain’s compact digests allow low-cost redundant multicasting across disjoint links.
- Rate control: Under sustained , reduce block size m moderately (e.g., ) to keep per-round airtime within , autoscaling back as SINR recovers.
- Edge prefetch: During RSU overlaps, pre-warm concept caches for faster checks, cushioning transient latency spikes as approaches the breakpoints in Table 10.
- Limitations and outlook.
7. Conclusions
- Lower end-to-end confirmation times. CoCoChain consistently reduces confirmation latency by 15–25% compared to full-payload PBFT in challenging settings, such as under adversarial attack or during high-speed handovers (Table 6 and Table 7). While not universally below the 100 ms threshold, CoCoChain tightens the latency distribution and achieves sub-10 ms authentication micro-latencies in critical handover scenarios (Figure 18), enhancing real-time reliability.
- Throughput and on-air efficiency. The use of semantic digests boosts throughput by 12–17% and dramatically cuts on-air bytes per block by approximately 66% under normal conditions (Table 4). In large-scale deployments, this efficiency is even more pronounced, lowering the interoperability overhead in cross-domain scenarios by over 60% (Table 8).
- Adversarial robustness with low false alarms. CoCoChain provides an effective content-level defense, detecting over 93% of random-vector attacks with a low False Positive Rate of just 1.1% (Table 6). This detection capability scales effectively as the threat level increases, maintaining an FPR below 5% even with 20% malicious nodes in the network (Figure 13).
- Lightweight compute footprint. The computational cost of creating and verifying semantic digests is minimal, requiring sub-millisecond processing on embedded GPUs and only low single-digit milliseconds on CPU-only devices (Section 3.2 and Section 4.8), making it practical for deployment on standard vehicular hardware.
Future Work
- Continual model adaptation. Deploy federated and online learning mechanisms to counter concept drift, using on-device triggers (e.g., entropy or divergence monitors) to schedule model updates while managing bandwidth consumption.
- Adversarial hardening and certification. Incorporate adversarial training and certified bounds on SAE activations to formally resist near-threshold poisoning and targeted collision attacks, and expand testing to include adaptive adversaries that actively target and k.
- Dynamic parameterization. Develop context-aware policies to dynamically adjust k and based on real-time conditions like vehicle speed, channel load, or node trust scores, further optimizing the trade-off between security and performance.
- Cross-domain fast-path vs. batch. Standardize the fast-path digest push for low-latency global visibility while retaining periodic batching for bandwidth smoothing, and formalize SLOs that tie the cross-domain finality time (CDFT) to specific application freshness requirements.
- Privacy-preserving reveals. Integrate semantic digests with privacy-enhancing technologies like Zero-Knowledge proofs, allowing payload verification only upon integrity mismatches or specific policy triggers to minimize data exposure.
- Hardware-in-the-loop validation. Port CoCoChain to physical IEEE 802.11p/C-V2X testbeds to evaluate its performance against real-world RF impairments, hardware scheduler interactions, and multi-radio coexistence.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A. Dataset and Preprocessing
Appendix A.1. Sources and Composition
- Real-world traces. Anonymized V2V/V2I captures from five European cities and three highway segments (collected under institutional data-use agreements). Only derived, non-PII features are used (see Appendix A.8).
Subset | Hours | Msgs (M) | OBUs | RSUs |
---|---|---|---|---|
Synthetic—Urban (SUMO/VEINS) | 18.7 | 3.3 | 1200 | 16 |
Synthetic—Highway (SUMO/VEINS) | 14.2 | 2.5 | 800 | 5 |
Synthetic—Cross-Domain (SUMO/VEINS) | 9.6 | 1.4 | 1000 | 12 |
Real—Urban | 8.1 | 1.2 | 540 | 9 |
Real—Highway | 5.4 | 0.9 | 260 | 4 |
Total | 56.0 | 9.3 | 3800 | 46 |
Appendix A.2. Feature Schema and Units
Group/Feature | Type/Units | Notes |
---|---|---|
Latitude, Longitude | float/WGS84 deg | Quantized to 30 m grid (privacy) |
Velocity | float/m s−1 | From speed and heading |
Heading | float/rad | Wrapped to |
Time delta | float/ms | Since last OBU beacon |
Event flags (10) | one-hot | Brake, hazard, lane change, etc. |
RSU ID (8) | one-hot | Serving RSU binning |
Neighbor count bins (8) | one-hot | From CAM/BSM density estimate |
Channel CBR bins (8) | one-hot | MAC-layer busy ratio quantization |
QoS class (4) | one-hot | App tag (safety, status, infotainment, misc.) |
Padding | zeros | To reach |
Appendix A.3. Normalization and Standardization
Appendix A.4. Temporal Windowing and Smoothing
Appendix A.5. Train/Validation/Test Splits and Seeds
Appendix A.6. Augmentations and Noise Model
- Additive noise: Gaussian on continuous features with .
- Packet loss mask: Bernoulli () emulates missing fields due to drops; missing continuous features are imputed with the training mean, missing one-hots to all-zero.
- Timestamp jitter: Uniform ms emulates clock skew and MAC scheduling variance.
Appendix A.7. Alignment with Scenario Parameters
- Urban/highway densities, RSU layouts, and beaconing rates follow Table 2 and Table 3 and the IEEE 802.11p/NR-V2X settings in Section 4.1 and Section 4.4.
Appendix A.8. Quality Control and Leakage Prevention
Appendix A.9. Preprocessing Pipeline (Pseudo-Code)
Algorithm A1 Preprocess (raw logs → windows, scalers, splits) |
Require: Raw SUMO/VEINS events and/or real capture CSVs
|
Appendix A.10. Artifact Checklist
References
- Hartenstein, H.; Laberteaux, K. VANET: Vehicular Applications and Inter-Networking Technologies; John Wiley & Sons: Hoboken, NJ, USA, 2010. [Google Scholar] [CrossRef]
- Jan, S.A.; Amin, N.U.; Othman, M.; Ali, M.; Umar, A.I.; Basir, A. A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues. IEEE Access 2021, 9, 153701–153726. [Google Scholar] [CrossRef]
- Contreras-Castillo, J.; Zeadally, S.; Guerrero-Ibáñez, J.A. Internet of Vehicles: Architecture, Protocols, and Security. IEEE Internet Things J. 2018, 5, 3701–3709. [Google Scholar] [CrossRef]
- Sommer, C.; Joerer, S.; Dressler, F. On the Applicability of Two-Ray Path Loss Models for Vehicular Network Simulation. In Proceedings of the IEEE Vehicular Networking Conference (VNC), Seoul, Republic of Korea, 14–16 November 2012; pp. 64–69. [Google Scholar] [CrossRef]
- Xu, J.; Wang, L.; Wen, M.; Long, Y.; Chen, K. DPB-MA: Low-latency message authentication scheme based on distributed verification and priority in vehicular ad hoc network. IEEE Trans. Veh. Technol. 2023, 72, 5152–5166. [Google Scholar] [CrossRef]
- Chen, T.; Tian, H.; Liu, Y.; Xiao, Y.; Yang, B. Radar Signal Intra-Pulse Modulation Recognition Based on Point Cloud Network. IEEE Signal Process. Lett. 2025, 32, 596–600. [Google Scholar] [CrossRef]
- Kapassa, E.; Themistocleous, M.; Christodoulou, K.; Iosif, E. Blockchain application in internet of vehicles: Challenges, contributions and current limitations. Future Internet 2021, 13, 313. [Google Scholar] [CrossRef]
- Khan, S.; Luo, F.; Zhang, Z.; Rahim, M.A.; Ahmad, M.; Wu, K. Survey on issues and recent advances in vehicular public-key infrastructure (VPKI). IEEE Commun. Surv. Tutor. 2022, 24, 1574–1601. [Google Scholar] [CrossRef]
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance. In Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation (OSDI), New Orleans, LA, USA, 22–25 February 1999; pp. 173–186. [Google Scholar]
- Rafique, W.; Barai, J.R.; Fapojuwo, A.O.; Krishnamurthy, D. A Survey on Beyond 5G Network Slicing for Smart Cities Applications. IEEE Commun. Surv. Tutorials 2025, 27, 595–628. [Google Scholar] [CrossRef]
- Zhu, H.; Jing, Z.; Li, M. Distributed robust information filter for Markov jump systems with outliers. Signal Process. 2025, 238, 110107. [Google Scholar] [CrossRef]
- Wei, J.; Wang, X.; Schuurmans, D.; Bosma, M.; Xia, F.; Chi, E.; Le, Q.V.; Zhou, D. Chain-of-Thought Prompting Elicits Reasoning in Large Language Models. Adv. Neural Inf. Process. Syst. 2022. [Google Scholar]
- Bricken, T.; Templeton, A.; Batson, J.; Chen, B.; Jermyn, A.S.; Hume, T.; Elhage, N.; Hatfield-Dodds, Z.; Henighan, T.; Olsson, C.; et al. Towards Monosemanticity: Decomposing Language Models with Dictionary Learning. Transform. Circuits Thread 2023. [Google Scholar]
- Jia, F.; Mate, A.; Li, Z.; Jabbari, S.; Chakraborty, M.; Tambe, M.; Wellman, M.P.; Vorobeychik, Y. A game-theoretic approach for hierarchical epidemic control. Auton. Agents Multi Agent Syst. 2025, 39, 14. [Google Scholar] [CrossRef]
- Ali, Z.; Lagén, S.; Giupponi, L.; Rouil, R. 3GPP NR V2X Mode 2: Overview, Models and System-Level Evaluation. IEEE Access 2021, 9, 89554–89579. [Google Scholar] [CrossRef] [PubMed]
- Xu, J.; Dong, D.; Li, Z.; Zhou, F. A survey of blockchain in VANETs: Architecture, consensus, and applications. J. Netw. Comput. Appl. 2021, 193, 103219. [Google Scholar]
- Aïder, M.; Boulebene, S.; Hifi, M. An adaptative multi-objective scatter search for solving the dynamic bin packing problem. J. Heuristics 2025, 31, 1–69. [Google Scholar] [CrossRef]
- Wu, F.; Zheng, C.; Du, M.; Zheng, S.; Ma, J.; Lu, Y. LLM4PT: A large language model-based system for flexible and explainable public transit demand prediction. Comput. Ind. Eng. 2025, 209, 111449. [Google Scholar] [CrossRef]
- Dong, Z.; Wu, H.; Li, Z.; Mi, D.; Popoola, O.; Zhang, L. Trustworthy VANET: Hierarchical DAG-based blockchain solution with proof of reputation consensus. In Proceedings of the 2023 IEEE International Conference on Blockchain (Blockchain), Danzhou, China, 17–21 December 2023; Available online: https://www.computer.org/csdl/proceedings-article/blockchain/2023/192900a127/1U85EGHx9oA (accessed on 18 August 2025).
- Zeng, L.; Zhu, X.; Wu, X. Edge Computing for the Internet of Vehicles: A Survey. IEEE Commun. Surv. Tutor. 2020, 22, 1102–1137. [Google Scholar]
- Vladyko, A.; Elagin, V.; Spirkina, A.; Muthanna, A.; Ateya, A.A. Distributed edge computing with blockchain technology to enable ultra-reliable low-latency V2X communications. Electronics 2022, 11, 173. [Google Scholar] [CrossRef]
- Akhter, A.F.M.S.; Ahmed, M.; Shah, A.F.M.S.; Anwar, A.; Kayes, A.S.M.; Zengin, A. A blockchain-based authentication protocol for cooperative vehicular ad hoc network. Sensors 2021, 21, 1273. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 18 August 2025).
- Gilad, Y.; Hemo, R.; Micali, S.; Vlachos, G.; Zeldovich, N. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. In Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP), Shanghai, China, 28–31 October 2017; pp. 51–68. [Google Scholar] [CrossRef]
- Kiayias, A.; Russell, A.; David, B.; Oliynykov, R. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Proceedings of the 37th International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2017; pp. 357–388. [Google Scholar] [CrossRef]
- Kotla, R.; Alvisi, L.; Dahlin, M.; Clement, A.; Wong, E.L. Zyzzyva: Speculative Byzantine Fault Tolerance. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP), Washington, DC, USA, 14–17 October 2007; pp. 45–58. [Google Scholar] [CrossRef]
- Yin, M.; Malkhi, D.; Reiter, M.K.; Gueta, G.G.; Abraham, I. HotStuff: BFT Consensus with Linearity and Responsiveness. In Proceedings of the PODC, Toronto, ON, Canada, 29 July–2 August 2019; pp. 347–356. [Google Scholar] [CrossRef]
- Miller, A.; Xia, Y.; Croman, K.; Shi, E.; Song, D. The Honey Badger of BFT Protocols. In Proceedings of the 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 31–42. [Google Scholar] [CrossRef]
- Bracha, G. Asynchronous Byzantine agreement protocols. Inf. Comput. 1987, 75, 130–143. [Google Scholar] [CrossRef]
- Kokoris-Kogias, E.; Jovanovic, P.; Gasser, L.; Gailly, N.; Syta, E.; Ford, B. Omniledger: A Secure, Scale-Out, Decentralized Ledger via Sharding. In Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 21–23 May 2018; pp. 583–598. [Google Scholar] [CrossRef]
- Zamani, M.; Movahedi, M.; Raykova, M. RapidChain: Scaling Blockchain via Full Sharding. In Proceedings of the 25th ACM Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 931–948. [Google Scholar] [CrossRef]
- Team Rocket. Snowflake to Avalanche: A Novel Metastable Consensus Protocol Family. 2018. Available online: https://knowen-production.s3.amazonaws.com/uploads/attachment/file/1922/Snowflake%2Bto%2BAvalanche%2B-%2BA%2BNovel%2BMetastable%2BConsensus%2BProtocol%2BFamily.pdf (accessed on 18 August 2025).
- Amores-Sesar, I.; Cachin, C.; Schneider, P. An Analysis of Avalanche Consensus. arXiv 2024, arXiv:2401.02811. [Google Scholar] [CrossRef]
- Popov, S. The Tangle. 2018. Available online: https://arxiv.org/abs/1712.05385 (accessed on 18 August 2025).
- Chen, X.; Zhang, F.; Li, J.; Liu, D. FastBFT: A Secure and Efficient BFT Protocol via Trusted Execution Environments. IEEE Trans. Dependable Secur. Comput. 2020, 17, 220–234. [Google Scholar] [CrossRef]
- Van Bulck, J.; Minkin, M.; Weisse, O.; Genkin, D.; Kasikci, B.; Piessens, F.; Silberstein, M.; Wenisch, T.F.; Yarom, Y.; Strackx, R. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, 15–17 August 2018; pp. 991–1008. Available online: https://www.usenix.org/conference/usenixsecurity18/presentation/bulck (accessed on 18 August 2025).
- Makhzani, A.; Frey, B.J. k-sparse autoencoders. arXiv 2013, arXiv:1312.5663. [Google Scholar] [CrossRef]
- Arora, S.; Ge, R.; Ma, T.; Moitra, A. Simple, efficient, and neural algorithms for sparse coding. In Proceedings of the Machine Learning Research, Lille, France, 7–9 July 2015; Volume 37, pp. 113–149. [Google Scholar]
- Higgins, I.; Matthey, L.; Pal, A.; Burgess, C.P.; Glorot, X.; Botvinick, M.; Mohamed, S.; Lerchner, A. beta-VAE: Learning Basic Visual Concepts with a Constrained Variational Framework. In Proceedings of the ICLR 2017, Toulon, France, 24–26 April 2017; Available online: https://openreview.net/forum?id=Sy2fzU9gl (accessed on 18 August 2025).
- Kim, H.; Mnih, A. Disentangling by Factorising. In Proceedings of the ICML, Stockholm, Sweden, 10–15 July 2018; pp. 2649–2658. Available online: http://proceedings.mlr.press/v80/kim18b.html (accessed on 18 August 2025).
- Liu, J.; Liu, H.; Zhang, Y. Data compression based on stacked RBM-AE model for wireless sensor networks. Sensors 2018, 18, 4273. [Google Scholar] [CrossRef]
- Bao, X.; Zhao, X.; Song, Y. Image compression for wireless sensor network: A model segmentation-based compressive autoencoder. J. Electr. Comput. Eng. 2023, 2023, 8466088. [Google Scholar] [CrossRef]
- Kipf, T.N.; Welling, M. Variational Graph Auto-Encoders. arXiv 2016, arXiv:1611.07308. [Google Scholar] [CrossRef]
- Xie, H.; Qin, Z.; Li, G.Y.; Juang, B.H. Deep Learning Enabled Semantic Communication Systems. IEEE Trans. Signal Process. 2021, 69, 2663–2675. [Google Scholar] [CrossRef]
- Turner, A.; Tsipras, D.; Madry, A. Label-Consistent Backdoor Attacks. arXiv 2019, arXiv:1912.02771. [Google Scholar] [CrossRef]
- Doan, K.; Lao, Y.; Li, W.; Li, P. Backdoor attack with imperceptible input and latent modification. In Proceedings of the NeurIPS 2021, Virtual, 6–14 December 2021; Available online: https://proceedings.neurips.cc/paper/2021/hash/9d99197e2ebf03fc388d09f1e94af89b-Abstract.html (accessed on 18 August 2025).
- Fowl, L.; Goldblum, M.; Szegedy, C.; Chiang, T.; Feizi, S.; Goldstein, T. Adversarial examples make strong poisons. In Proceedings of the NeurIPS 2021, Virtual, 6–14 December 2021. [Google Scholar]
- Nan, G.; Li, Z.; Zhai, J.; Cui, Q.; Chen, G.; Du, X.; Zhang, X.; Tao, X.; Han, Z.; Quek, T.Q.S. Physical-layer adversarial robustness for deep learning-based semantic communications. IEEE J. Sel. Areas Commun. 2023, 41, 2655–2672. [Google Scholar] [CrossRef]
- Elhage, N.; Hume, T.; Olsson, C.; Schiefer, N.; Henighan, T.; Kravec, S.; Hatfield-Dodds, Z.; Lasenby, R.; Drain, D.; Chen, C.; et al. Toy Models of Superposition. arXiv 2022, arXiv:2209.10652. [Google Scholar] [CrossRef]
- Charikar, M. Similarity estimation techniques from rounding algorithms. In Proceedings of the STOC, Montreal, QC, USA, 19–21 May 2002; pp. 380–388. [Google Scholar] [CrossRef]
- Manku, G.S.; Jain, A.; Sarma, A.D. Detecting near-duplicates for web crawling. In Proceedings of the WWW, Banff, AB, Canada, 9–11 May 2007; pp. 141–150. [Google Scholar] [CrossRef]
- Ross, G.J.; Adams, N.M.; Tasoulis, D.K.; Hand, D.J. Exponentially Weighted Moving Average Charts for Detecting Concept Drift. Pattern Recognit. Lett. 2012, 33, 191–198. [Google Scholar] [CrossRef]
- Bifet, A.; Gavaldá, R. Learning from time-changing data with adaptive windowing. In Proceedings of the SIAM International Conference on Data Mining, Minneapolis, MN, USA, 26–28 April 2007; pp. 443–448. [Google Scholar] [CrossRef]
- Gama, J.; Žliobaitė, I.; Bifet, A.; Pechenizkiy, M.; Bouchachia, A. A survey on concept drift adaptation. ACM Comput. Surv. 2014, 46, 44. [Google Scholar] [CrossRef]
- Gretton, A.; Borgwardt, K.; Rasch, M.; Schölkopf, B.; Smola, A. A kernel two-sample test. J. Mach. Learn. Res. 2012, 13, 723–773. Available online: http://www.jmlr.org/papers/v13/gretton12a.html (accessed on 18 August 2025).
- Elbir, A.M.; Soner, B.; Coleri, S.; Gündüz, D.; Bennis, M. Federated learning in vehicular networks. arXiv 2020, arXiv:2006.01412. [Google Scholar] [CrossRef]
- Song, R.; Zhou, L.; Lakshminarasimhan, V.; Festag, A.; Knoll, A. Federated learning framework coping with hierarchical heterogeneity in cooperative ITS. arXiv 2022, arXiv:2204.00215. [Google Scholar] [CrossRef]
- Vincent, P.; Larochelle, H.; Lajoie, I.; Bengio, Y.; Manzagol, P.A. Stacked denoising autoencoders: Learning useful representations. J. Mach. Learn. Res. 2010, 11, 3371–3408. Available online: http://www.jmlr.org/papers/v11/vincent10a.html (accessed on 18 August 2025).
- Rifai, S.; Vincent, P.; Muller, X.; Glorot, X.; Bengio, Y. Contractive auto-encoders: Explicit invariance during feature extraction. In Proceedings of the ICML, Bellevue, WA, USA, 28 June–2 July 2011; Available online: https://icml.cc/2011/papers/455_icmlpaper.pdf (accessed on 18 August 2025).
- Goodfellow, I.J.; Shlens, J.; Szegedy, C. Explaining and harnessing adversarial examples. arXiv 2015, arXiv:1412.6572. [Google Scholar] [CrossRef]
- Cohen, J.; Rosenfeld, E.; Kolter, J.Z. Certified adversarial robustness via randomized smoothing. In Proceedings of the ICML, Long Beach, CA, USA, 9–15 June 2019; pp. 1310–1320. Available online: http://proceedings.mlr.press/v97/cohen19c.html (accessed on 18 August 2025).
- ETSI. Intelligent Transport Systems (ITS); Security; Trust and Privacy Management; Technical Specification TS 102 941 V1.3.1; ETSI: Sophia Antipolis, France, 2019; Available online: https://www.etsi.org/deliver/etsi_ts/102900_102999/102941/01.03.01_60/ts_102941v010301p.pdf (accessed on 18 August 2025).
- ETSI. Intelligent Transport Systems (ITS); Misbehaviour Reporting Service; Service Specification; Technical Specification TS 103 759 V2.1.1; ETSI: Sophia Antipolis, France, 2023; Available online: https://www.etsi.org/deliver/etsi_ts/103700_103799/103759/02.01.01_60/ts_103759v020101p.pdf (accessed on 18 August 2025).
- Merkle, R.C. A digital signature based on a conventional encryption function. In Proceedings of the CRYPTO, Santa Barbara, CA, USA, 16–20 August 1987; pp. 369–378. [Google Scholar] [CrossRef]
- Molinaro, A.; Campolo, C.; Iera, A.; Scopigno, R.M.; So, D.K.C. Collaborative Multi-Agent Deep Reinforcement Learning for C-V2X Mode 4 Resource Allocation. In Proceedings of the ICUFN 2021, Jeju Island, Republic of Korea, 17–20 August 2021; pp. 253–258. Available online: https://manuscriptlink-society-file.s3-ap-northeast-1.amazonaws.com/kics/conference/icufn2021/abs/1A-2.pdf (accessed on 18 August 2025).
- Ma, X.; Trivedi, K.S. SINR-Based Analysis of IEEE 802.11p/bd Broadcast VANETs for Safety Services. IEEE Trans. Netw. Serv. Manag. 2021, 18, 2672–2686. [Google Scholar] [CrossRef]
- ETSI. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 4: GeoNetworking Protocols; Sub-Part 1: GeoNetworking Specification; Technical Specification EN 302 636-4-1 V1.4.1; ETSI: Sophia Antipolis, France, 2021; Available online: https://www.etsi.org/deliver/etsi_en/302600_302699/3026360401/01.04.01_60/en_3026360401v010401p.pdf (accessed on 18 August 2025).
- Dwivedi, S.K.; Amin, R.; Das, A.K.; Leung, M.T.; Choo, K.K.R.; Vollala, S. Blockchain-based vehicular ad-hoc networks: A comprehensive survey. Ad Hoc Netw. 2022, 137, 102980. [Google Scholar] [CrossRef]
- Dwork, C.; Lynch, N.; Stockmeyer, L. Consensus in the Presence of Partial Synchrony. J. ACM 1988, 35, 288–323. [Google Scholar] [CrossRef]
- Johnson, D.; Menezes, A.; Vanstone, S. The Elliptic Curve Digital Signature Algorithm (ECDSA). Int. J. Inf. Secur. 2001, 1, 36–63. [Google Scholar] [CrossRef]
- Krajzewicz, D.; Erdmann, J.; Behrisch, M.; Bieker, L. Recent Development and Applications of SUMO—Simulation of Urban MObility. Int. J. Adv. Syst. Meas. 2012, 5, 128–138. Available online: https://staff.fmi.uvt.ro/~daniela.zaharie/ma2016/projects/applications/TrafficLightsOptimization/SUMO_SimulationUrbanMobility.pdf (accessed on 18 August 2025).
- Ioffe, S.; Szegedy, C. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the ICML, Lille, France, 6–11 July 2015; pp. 448–456. Available online: http://proceedings.mlr.press/v37/ioffe15.html (accessed on 18 August 2025).
- Bengio, Y.; Léonard, N.; Courville, A. Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation. arXiv 2013, arXiv:1308.3432. [Google Scholar] [CrossRef]
- Glorot, X.; Bengio, Y. Understanding the Difficulty of Training Deep Feedforward Neural Networks. In Proceedings of the AISTATS, Sardinia, Italy, 13–15 May 2010; pp. 249–256. Available online: http://proceedings.mlr.press/v9/glorot10a.html (accessed on 18 August 2025).
- Kingma, D.P.; Ba, J. Adam: A Method for Stochastic Optimization. arXiv 2014, arXiv:1412.6980. [Google Scholar] [CrossRef]
- Jacob, B.; Kligys, S.; Chen, B.; Zhu, M.; Tang, M.; Howard, A.; Adam, H.; Kalenichenko, D. Quantization and training of neural networks for efficient integer-arithmetic-only inference. In Proceedings of the CVPR, Salt Lake City, UT, USA, 18–22 June 2018; pp. 2704–2713. [Google Scholar] [CrossRef]
- Cormen, T.H.; Leiserson, C.E.; Rivest, R.L.; Stein, C. Introduction to Algorithms, 3rd ed.; MIT Press: Cambridge, MA, USA, 2009. [Google Scholar] [CrossRef]
- Varga, A.; Hornig, R. An Overview of the OMNeT++ Simulation Environment. In Proceedings of the 1st International Conference on Simulation Tools and Techniques (SimuTools 2008), Marseille, France, 3–7 March 2008; pp. 1–10. [Google Scholar] [CrossRef]
- Paszke, A.; Gross, S.; Massa, F.; Lerer, A.; Bradbury, J.; Chanan, G.; Killeen, T.; Lin, Z.; Gimelshein, N.; Antiga, L.; et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Proceedings of the Advances in Neural Information Processing Systems, Vancouver, BC, Canada, 8–14 December 2019; Volume 32, pp. 8024–8035. Available online: https://proceedings.neurips.cc/paper/2019/hash/bdbca288fee7f92f2bfa9f7012727740-Abstract.html (accessed on 18 August 2025).
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the EuroSys, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar] [CrossRef]
- Chung, M.; Archibald, R.; Atzberger, P.; Solomon, J.M. Sparse L1-Autoencoders for Scientific Data Compression. arXiv 2024, arXiv:2405.14270. [Google Scholar] [CrossRef]
- Saad, M.M.; Khan, M.T.R.; Shah, S.H.A.; Kim, D. Collaborative multi-agent resource allocation in C-V2X Mode 4. In Proceedings of the Twelfth International Conference on Ubiquitous and Future Networks (ICUFN), Jeju Island, Republic of Korea, 17–20 August 2021. [Google Scholar] [CrossRef]
- Efron, B.; Tibshirani, R.J. An Introduction to the Bootstrap; Chapman & Hall/CRC: Boca Raton, FL, USA, 1994. [Google Scholar] [CrossRef]
- Wang, P.; Zhou, J. Robust Semantic Autoencoder via Adversarial Training and Certification. arXiv 2023, arXiv:2307.01234. [Google Scholar] [CrossRef]
Category | Parameter | Value |
---|---|---|
Topology | Urban grid area | (4 × 4 intersections) |
RSUs | 16 (1 per intersection) | |
OBUs population | ||
Traffic | Traffic lights | cycle (SUMO) |
Beacons | + events (up to 2 hops) | |
Wireless link | PHY/MAC | IEEE 802.11p/ITS-G5, , |
Data rate/MAC | 6–, CSMA/CA | |
TX power/RX sens. | / | |
Propagation | Log-distance path loss + shadowing | |
MAC metrics | CBR, collisions | |
Adversary | Byzantine fraction | |
Attacks | Random-vector, poisoning/backdoor | |
Consensus | Block size | |
Semantic threshold | ||
Partial synchrony | ; view-change | |
SAE config | , (1 B indices; FP32 values by default) | |
Commitment | ; ECDSA P-256 | |
Metrics | Latency L, AoI, throughput, PDR, collisions, | |
overhead (bytes), semantic validation (FPR/FNR, reveals) |
Category | Parameter | Value |
---|---|---|
Tordius/overlap width | km/ km (adjacent) | |
Overlap policy | Multicast to RSUi and RSUi+1 in overlap | |
Mobility | OBUs population; speed distribution | ; km/h |
Tx generation per OBU | Hz (one transaction every 2 s) | |
Wireless | PHY/MAC | IEEE 802.11p/ITS-G5, GHz, 10 MHz, CSMA/CA |
Data rate; path-loss exponent | 6–12 Mbps; (highway LOS) [15,66] | |
TX power / RX sensitivity | 23 dBm/ dBm | |
Optional sensitivity | NR-V2X Mode 2 (sidelink resource selection) [15] | |
Handover | Handover window | ms |
Dedup at RSUs | Sliding filter of recent commitments | |
Consensus | Block size; semantic threshold | ; |
Partial synchrony; timeouts | ms; view-change 200 ms | |
Digest format | , (1 B indices; FP32 values by default) | |
Commitment and signatures | ; ECDSA P-256 | |
Simulation | Duration; warm-up; seeds | 600 s; 100 s; 10 seeds (95% CIs) |
Category | Parameter | Value |
---|---|---|
Domains | Areas (Urban/Suburban/Rural) | km2 (total 35 km2) |
Densities (veh/km2) | ≈500/200/50 | |
RSUs per domain | 3–5 (radius ∼ 1 km) | |
Edge servers | One per domain (local validator set) | |
Boundary zones | 500 m width (domain crossings) | |
Mobility | Model | SUMO random-waypoint per domain [71] |
Fleet size (nominal) | ∼5500 vehicles (per densities); subpopulations sampled | |
Wireless | PHY/MAC | IEEE 802.11p/ITS-G5, GHz, 10 MHz, CSMA/CA |
Data rate | 6–12 Mbps; propagation as in Section 4.5 | |
Optional sensitivity | NR-V2X Mode 2 (sidelink selection) [15] | |
Consensus | Block size; threshold | ; |
Partial synchrony; timeouts | ms; view-change 200 ms | |
Digest format | , (1 B indices; FP32 values by default) | |
Commitment and signatures | ; ECDSA P-256 | |
Inter-domain sync | Interval; contents (CoCoChain) | s; + per-block Merkle roots |
Contents (relay baseline) | Full payload batches () | |
Reconciliation | Watermark W, version vector (VV); payload fetch on root mismatch | |
Simulation | Duration; warm-up; seeds | 600 s; 100 s; 10 seeds (95% CIs) |
Metric | Full-Payload PBFT | Digest-PBFT (Ablation) | CoCoChain | Improvement vs. Full-PBFT |
---|---|---|---|---|
Confirmation latency P50 (ms) | 20.4% lower | |||
Confirmation latency P95 (ms) | 15.4% lower | |||
Throughput (tx/s) | 17.1% higher | |||
Consensus messages/block | 25.4% fewer | |||
On-air bytes/block () | MB | MB | MB | 66.1% fewer |
AoI P50 (ms) | 21.9% lower | |||
AoI P95 (ms) | 18.7% lower | |||
CPU usage (%) | 5.4% lower | |||
Memory usage (MB) | ||||
Selective-reveal rate (SRR) | — | % | % | n/a |
Metric | PBFT | CoCoChain |
---|---|---|
Latency (s) | ||
Throughput (tx/s) | ||
Benign DMC (count) | n/a | |
FPR (%) | n/a |
Metric Improvement vs. PBFT | PBFT | CoCoChain |
---|---|---|
Latency (ms) 17.4% lower | ||
Throughput (tx/s) 13.0% higher | ||
Malicious DMC (Detection rate) — | n/a | () |
False positive rate (%) — | n/a |
Metric | PBFT | CoCoChain | Improvement vs. PBFT |
---|---|---|---|
Handover Success Rate (HSR) | pp | ||
Handover Commit Latency (ms) | 24.0% lower | ||
Throughput (tx/s) | 12.7% higher |
Metric | Traditional Relays | CoCoChain | Improvement vs. Relays |
---|---|---|---|
Fast-path CDFT (ms) | 40.5% lower | ||
Interoperability Overhead (IO, %) | 60.4% lower |
Top-k | Latency (ms) | FPR (%) | Detection D (%) | |
---|---|---|---|---|
20 B | ||||
30 B | ||||
40 B | ||||
50 B |
Stressor and Metric | PBFT | CoCoChain | Advantage |
---|---|---|---|
JSR for ms (Urban) | dB | dB | +7 dB margin |
JSR for HSR < 90% (Highway) | dB | dB | +5 dB margin |
JSR for CDFT > 500 ms (X-domain) | dB | dB | +3 dB margin |
for ms (Urban) | ms | ms | tolerance |
for VCR > 10/100 blk | ms | ms | +10 ms headroom |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Juárez, R.; Nicolas-Sans, R.; Tamames, J.F. CoCoChain: A Concept-Aware Consensus Protocol for Secure Sensor Data Exchange in Vehicular Ad Hoc Networks. Sensors 2025, 25, 6226. https://doi.org/10.3390/s25196226
Juárez R, Nicolas-Sans R, Tamames JF. CoCoChain: A Concept-Aware Consensus Protocol for Secure Sensor Data Exchange in Vehicular Ad Hoc Networks. Sensors. 2025; 25(19):6226. https://doi.org/10.3390/s25196226
Chicago/Turabian StyleJuárez, Rubén, Ruben Nicolas-Sans, and José Fernández Tamames. 2025. "CoCoChain: A Concept-Aware Consensus Protocol for Secure Sensor Data Exchange in Vehicular Ad Hoc Networks" Sensors 25, no. 19: 6226. https://doi.org/10.3390/s25196226
APA StyleJuárez, R., Nicolas-Sans, R., & Tamames, J. F. (2025). CoCoChain: A Concept-Aware Consensus Protocol for Secure Sensor Data Exchange in Vehicular Ad Hoc Networks. Sensors, 25(19), 6226. https://doi.org/10.3390/s25196226