Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (28)

Search Parameters:
Keywords = cloud-based vehicular technologies

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 1547 KiB  
Article
Dual-Policy Attribute-Based Searchable Encryption with Secure Keyword Update for Vehicular Social Networks
by Qianxue Wan, Muhua Liu, Lin Wang, Feng Wang and Mingchuan Zhang
Electronics 2025, 14(2), 266; https://doi.org/10.3390/electronics14020266 - 10 Jan 2025
Viewed by 984
Abstract
Cloud-to-Vehicle (C2V) integration serves as a fundamental infrastructure to provide robust computing and storage support for Vehicular Social Networks (VSNs). However, the proliferation of sensitive personal data within VSNs poses significant challenges in achieving secure and efficient data sharing while maintaining data usability [...] Read more.
Cloud-to-Vehicle (C2V) integration serves as a fundamental infrastructure to provide robust computing and storage support for Vehicular Social Networks (VSNs). However, the proliferation of sensitive personal data within VSNs poses significant challenges in achieving secure and efficient data sharing while maintaining data usability and precise retrieval capabilities. Although existing searchable attribute-based encryption schemes offer the secure retrieval of encrypted data and fine-grained access control mechanisms, these schemes still exhibit limitations in terms of bilateral access control, dynamic index updates, and search result verification. This study presents a Dual-Policy Attribute-based Searchable Encryption (DP-ABSE) scheme with dynamic keyword update functionality for VSNs. The scheme implements a fine-grained decoupling mechanism that decomposes data attributes into two distinct components: immutable attribute names and mutable attribute values. This decomposition transfers the attribute verification process from data owners to the encrypted files themselves, enabling data attribute-level granularity in access control. Through the integration of an identity-based authentication mechanism derived from the data owner’s unique identifier and bilinear pairing verification, it achieves secure updates of the specified keywords index while preserving both the anonymity of the non-updated data and the confidentiality of the message content. The encryption process employs an offline/online two-phase design, allowing data owners to pre-compute ciphertext pools for efficient real-time encryption. Subsequently, the decryption process introduces an outsourcing local-phase mechanism, leveraging key encapsulation technology for secure attribute computation outsourcing, thereby reducing the terminal computational load. To enhance security at the terminal decryption stage, the scheme incorporates a security verification module based on retrieval keyword and ciphertext correlation validation, preventing replacement attacks and ensuring data integrity. Security analysis under standard assumptions confirms the theoretical soundness of the proposed solution, and extensive performance evaluations showcase its effectiveness. Full article
Show Figures

Figure 1

33 pages, 4650 KiB  
Review
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
by Tiansheng Yang, Ruikai Sun, Rajkumar Singh Rathore and Imran Baig
World Electr. Veh. J. 2025, 16(1), 14; https://doi.org/10.3390/wevj16010014 - 28 Dec 2024
Cited by 1 | Viewed by 2211
Abstract
Due to developments in vehicle engineering and communication technologies, vehicular networks have become an attractive and feasible solution for the future of electric, autonomous, and connected vehicles. Electric autonomous vehicles will require more data, computing resources, and communication capabilities to support them. The [...] Read more.
Due to developments in vehicle engineering and communication technologies, vehicular networks have become an attractive and feasible solution for the future of electric, autonomous, and connected vehicles. Electric autonomous vehicles will require more data, computing resources, and communication capabilities to support them. The combination of vehicles, the Internet, and cloud computing together to form vehicular cloud computing (VCC), vehicular edge computing (VEC), and vehicular fog computing (VFC) can facilitate the development of electric autonomous vehicles. However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). In this paper, we adopt a semi-systematic literature review to select 85 articles related to the application of ML for cybersecurity and privacy protection based on VCC. They were categorized into four research themes: intrusion detection system, anomaly vehicle detection, task offloading security and privacy, and privacy protection. A list of suitable ML algorithms and their strengths and weaknesses is summarized according to the characteristics of each research topic. The performance of different ML algorithms in the literature is also collated and compared. Finally, the paper discusses the challenges and future research directions of ML algorithms when applied to vehicular cloud computing. Full article
Show Figures

Figure 1

17 pages, 1418 KiB  
Article
A Genetic Optimized Federated Learning Approach for Joint Consideration of End-to-End Delay and Data Privacy in Vehicular Networks
by Müge Erel-Özçevik, Akın Özçift, Yusuf Özçevik and Fatih Yücalar
Electronics 2024, 13(21), 4261; https://doi.org/10.3390/electronics13214261 - 30 Oct 2024
Viewed by 1282
Abstract
In 5G vehicular networks, two key challenges have become apparent, including end-to-end delay minimization and data privacy. Learning-based approaches have been used to alleviate these, either by predicting delay or protecting privacy. Traditional approaches train machine learning models on local devices or cloud [...] Read more.
In 5G vehicular networks, two key challenges have become apparent, including end-to-end delay minimization and data privacy. Learning-based approaches have been used to alleviate these, either by predicting delay or protecting privacy. Traditional approaches train machine learning models on local devices or cloud servers, each with their own trade-offs. While pure-federated learning protects privacy, it sacrifices delay prediction performance. In contrast, centralized training improves delay prediction but violates privacy. Existing studies in the literature overlook the effect of training location on delay prediction and data privacy. To address both issues, we propose a novel genetic algorithm optimized federated learning (GAoFL) approach in which end-to-end delay prediction and data privacy are jointly considered to obtain an optimal solution. For this purpose, we analytically define a novel end-to-end delay formula and data privacy metrics. Accordingly, a novel fitness function is formulated to optimize both the location of training model and data privacy. In conclusion, according to the evaluation results, it can be advocated that the outcomes of the study highlight that training location significantly affects privacy and performance. Moreover, it can be claimed that the proposed GAoFL improves data privacy compared to centralized learning while achieving better delay prediction than other federated methods, offering a valuable solution for 5G vehicular computing. Full article
(This article belongs to the Special Issue Intelligent Technologies for Vehicular Networks, 2nd Edition)
Show Figures

Figure 1

26 pages, 3533 KiB  
Systematic Review
Energy-Efficient Industrial Internet of Things in Green 6G Networks
by Xavier Fernando and George Lăzăroiu
Appl. Sci. 2024, 14(18), 8558; https://doi.org/10.3390/app14188558 - 23 Sep 2024
Cited by 11 | Viewed by 6177
Abstract
The research problem of this systematic review was whether green 6G networks can integrate energy-efficient Industrial Internet of Things (IIoT) in terms of distributed artificial intelligence, green 6G pervasive edge computing communication networks and big-data-based intelligent decision algorithms. We show that sensor data [...] Read more.
The research problem of this systematic review was whether green 6G networks can integrate energy-efficient Industrial Internet of Things (IIoT) in terms of distributed artificial intelligence, green 6G pervasive edge computing communication networks and big-data-based intelligent decision algorithms. We show that sensor data fusion can be carried out in energy-efficient IoT smart industrial urban environments by cooperative perception and inference tasks. Our analyses debate on 6G wireless communication, vehicular IoT intelligent and autonomous networks, and energy-efficient algorithm and green computing technologies in smart industrial equipment and manufacturing environments. Mobile edge and cloud computing task processing capabilities of decentralized network control and power grid system monitoring were thereby analyzed. Our results and contributions clarify that sustainable energy efficiency and green power generation together with IoT decision support and smart environmental systems operate efficiently in distributed artificial intelligence 6G pervasive edge computing communication networks. PRISMA was used, and with its web-based Shiny app flow design, the search outcomes and screening procedures were integrated. A quantitative literature review was performed in July 2024 on original and review research published between 2019 and 2024. Study screening, evidence map visualization, and data extraction and reporting tools, machine learning classifiers, and reference management software were harnessed for qualitative and quantitative data, collection, management, and analysis in research synthesis. Dimensions and VOSviewer were deployed for data visualization and analysis. Full article
Show Figures

Figure 1

15 pages, 4429 KiB  
Article
NR Sidelink Performance Evaluation for Enhanced 5G-V2X Services
by Mehnaz Tabassum, Felipe Henrique Bastos, Aurenice Oliveira and Aldebaro Klautau
Vehicles 2023, 5(4), 1692-1706; https://doi.org/10.3390/vehicles5040092 - 24 Nov 2023
Cited by 8 | Viewed by 6807
Abstract
The Third Generation Partnership Project (3GPP) has specified Cellular Vehicle-to-Everything (C-V2X) radio access technology in Releases 15–17, with an emphasis on facilitating direct communication between vehicles through the interface, sidelink PC5. This interface provides end-to-end network slicing functionality together with a stable cloud-native [...] Read more.
The Third Generation Partnership Project (3GPP) has specified Cellular Vehicle-to-Everything (C-V2X) radio access technology in Releases 15–17, with an emphasis on facilitating direct communication between vehicles through the interface, sidelink PC5. This interface provides end-to-end network slicing functionality together with a stable cloud-native core network. The performance of direct vehicle-to-vehicle (V2V) communications has been improved by using the sidelink interface, which allows for a network infrastructure bypass. Sidelink transmissions make use of orthogonal resources that are either centrally allocated (Mode 1, Release 14) or chosen by the vehicles themselves (Mode 2, Release 14). With growing interest in connected and autonomous vehicles, the advancement in radio access technologies that facilitate dependable and low-latency vehicular communications is becoming more significant. This is especially necessary when there are heavy traffic conditions and patterns. We thoroughly examined the New Radio (NR) sidelink’s performance based on 3GPP Releases 15–17 under various vehicle densities, speeds, and distance settings. Thus, by evaluating sidelink’s strengths and drawbacks, we are able to optimize resource allocation to obtain maximum coverage in urban areas. The performance evaluation was conducted on Network Simulator 3 (NS3.34/5G-LENA) utilizing various network metrics such as average packet reception rate, throughput, and latency. Full article
(This article belongs to the Special Issue Reliability Analysis and Evaluation of Automotive Systems)
Show Figures

Figure 1

23 pages, 1520 KiB  
Article
Task Offloading Decision-Making Algorithm for Vehicular Edge Computing: A Deep-Reinforcement-Learning-Based Approach
by Wei Shi, Long Chen and Xia Zhu
Sensors 2023, 23(17), 7595; https://doi.org/10.3390/s23177595 - 1 Sep 2023
Cited by 14 | Viewed by 4601
Abstract
Efficient task offloading decision is a crucial technology in vehicular edge computing, which aims to fulfill the computational performance demands of complex vehicular tasks with respect to delay and energy consumption while minimizing network resource competition and consumption. Conventional distributed task offloading decisions [...] Read more.
Efficient task offloading decision is a crucial technology in vehicular edge computing, which aims to fulfill the computational performance demands of complex vehicular tasks with respect to delay and energy consumption while minimizing network resource competition and consumption. Conventional distributed task offloading decisions rely solely on the local state of the vehicle, failing to optimize the utilization of the server’s resources to its fullest potential. In addition, the mobility aspect of vehicles is often neglected in these decisions. In this paper, a cloud-edge-vehicle three-tier vehicular edge computing (VEC) system is proposed, where vehicles partially offload their computing tasks to edge or cloud servers while keeping the remaining tasks local to the vehicle terminals. Under the restrictions of vehicle mobility and discrete variables, task scheduling and task offloading proportion are jointly optimized with the objective of minimizing the total system cost. Considering the non-convexity, high-dimensional complex state and continuous action space requirements of the optimization problem, we propose a task offloading decision-making algorithm based on deep deterministic policy gradient (TODM_DDPG). TODM_DDPG algorithm adopts the actor–critic framework in which the actor network outputs floating point numbers to represent deterministic policy, while the critic network evaluates the action output by the actor network, and adjusts the network evaluation policy according to the rewards with the environment to maximize the long-term reward. To explore the algorithm performance, this conduct parameter setting experiments to correct the algorithm core hyper-parameters and select the optimal combination of parameters. In addition, in order to verify algorithm performance, we also carry out a series of comparative experiments with baseline algorithms. The results demonstrate that in terms of reducing system costs, the proposed algorithm outperforms the compared baseline algorithm, such as the deep Q network (DQN) and the actor–critic (AC), and the performance is improved by about 13% on average. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

26 pages, 11010 KiB  
Article
Knowledge Development Trajectory of the Internet of Vehicles Domain Based on Main Path Analysis
by Tang-Min Hsieh and Kai-Ying Chen
Sensors 2023, 23(13), 6120; https://doi.org/10.3390/s23136120 - 3 Jul 2023
Cited by 6 | Viewed by 2917
Abstract
The Internet of vehicles (IoV) is an Internet-of-things-based network in the area of transportation. It comprises sensors, network communication, automation control, and data processing and enables connectivity between vehicles and other objects. This study performed main path analysis (MPA) to investigate the trajectory [...] Read more.
The Internet of vehicles (IoV) is an Internet-of-things-based network in the area of transportation. It comprises sensors, network communication, automation control, and data processing and enables connectivity between vehicles and other objects. This study performed main path analysis (MPA) to investigate the trajectory of research regarding the IoV. Studies were extracted from the Web of Science database, and citation networks among these studies were generated. MPA revealed that research in this field has mainly covered media access control, vehicle-to-vehicle channels, device-to-device communications, layers, non-orthogonal multiple access, and sixth-generation communications. Cluster analysis and data mining revealed that the main research topics related to the IoV included wireless channels, communication protocols, vehicular ad hoc networks, security and privacy, resource allocation and optimization, autonomous cruise control, deep learning, and edge computing. By using data mining and statistical analysis, we identified emerging research topics related to the IoV, namely blockchains, deep learning, edge computing, cloud computing, vehicular dynamics, and fifth- and sixth-generation mobile communications. These topics are likely to help drive innovation and the further development of IoV technologies and contribute to smart transportation, smart cities, and other applications. On the basis of the present results, this paper offers several predictions regarding the future of research regarding the IoV. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

16 pages, 1761 KiB  
Article
Research on Offloading Strategy for Mobile Edge Computing Based on Improved Grey Wolf Optimization Algorithm
by Wenzhu Zhang and Kaihang Tuo
Electronics 2023, 12(11), 2533; https://doi.org/10.3390/electronics12112533 - 4 Jun 2023
Cited by 12 | Viewed by 2286
Abstract
With the development of intelligent transportation and the rapid growth of application data, the tasks of offloading vehicles in vehicle-to-vehicle communication technology are continuously increasing. To further improve the service efficiency of the computing platform, energy-efficient and low-latency mobile-edge-computing (MEC) offloading methods are [...] Read more.
With the development of intelligent transportation and the rapid growth of application data, the tasks of offloading vehicles in vehicle-to-vehicle communication technology are continuously increasing. To further improve the service efficiency of the computing platform, energy-efficient and low-latency mobile-edge-computing (MEC) offloading methods are urgently needed, which can solve the insufficient computing capacity of vehicle terminals. Based on an improved gray-wolf algorithm designed, an adaptive joint offloading strategy for vehicular edge computing is proposed, which does not require cloud-computing support. This strategy first establishes an offloading computing model, which takes task computing delays, computing energy consumption, and MEC server computing resources as constraints; secondly, a system-utility function is designed to transform the offloading problem into a constrained system-utility optimization problem; finally, the optimal solution to the computation offloading problem is obtained based on an improved gray-wolf optimization algorithm. The simulation results show that the proposed strategy can effectively reduce the system delay and the total energy consumption. Full article
Show Figures

Figure 1

30 pages, 1457 KiB  
Review
Convergence of Software-Defined Vehicular Cloud and 5G Enabling Technologies: A Survey
by Lionel Nkenyereye, Lewis Nkenyereye and Jong-Wook Jang
Electronics 2023, 12(9), 2066; https://doi.org/10.3390/electronics12092066 - 29 Apr 2023
Cited by 9 | Viewed by 2908
Abstract
Vehicular cloud computing (VCC) and connected vehicles have prompted the intensive investigation of communication and computing solutions. As an important enabler, software-defined network (SDN) broadly changes the design of vehicle services, from resource allocation to ambitious autonomous cars. However, current VCC architectures face [...] Read more.
Vehicular cloud computing (VCC) and connected vehicles have prompted the intensive investigation of communication and computing solutions. As an important enabler, software-defined network (SDN) broadly changes the design of vehicle services, from resource allocation to ambitious autonomous cars. However, current VCC architectures face challenges that hinder the vision of providing reliable services to connected vehicles. As a result, deploying VC services using SDN network has emerged as a viable option. Therefore, software-defined VC architecture (SDVC) dynamically manages the control and resource utilization of VC by centralizing the overall knowledge. In addition, SDN stands as the representative technique of virtual resources and network function virtualization (NFV). NFV is integrated into SDVC frameworks to design extended SDVC (ESDVC) for dynamic, adaptive VC maintenance, VC network slicing management, and to meet constraint requirements such as network latency and reliable connectivity. This paper presents and discusses: (1) the architecture scenario of both SDVC and ESDVC; (2) the effective deployment methods enabling NFV and network slicing (NS) frameworks to customize VC frameworks; (3) challenges and future concepts of more VC services based on ESDVC architecture. From this survey, we believe readers would find relevant methods for realigning information dispersed across the SDVC, fifth generation (5G)-based VC, and NS domains and comprehending the relationships between these technologies while encouraging further debate on the fusion of 5G enabling technologies over SDVC to enable VC network slicing. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

14 pages, 2294 KiB  
Article
Heterogeneous Blockchain-Based Secure Framework for UAV Data
by Abdullah Aljumah, Tariq Ahamed Ahanger and Imdad Ullah
Mathematics 2023, 11(6), 1348; https://doi.org/10.3390/math11061348 - 10 Mar 2023
Cited by 14 | Viewed by 2418
Abstract
Unmanned aerial vehicles, drones, and internet of things (IoT) based devices have acquired significant traction due to their enhanced usefulness. The primary use is aerial surveying of restricted or inaccessible locations. Based on the aforementioned aspects, the current study provides a method based [...] Read more.
Unmanned aerial vehicles, drones, and internet of things (IoT) based devices have acquired significant traction due to their enhanced usefulness. The primary use is aerial surveying of restricted or inaccessible locations. Based on the aforementioned aspects, the current study provides a method based on blockchain technology for ensuring the safety and confidentiality of data collected by virtual circuit-based devices. To test the efficacy of the suggested technique, an IoT-based application is integrated with a simulated vehicle monitoring system. Pentatope-based elliptic curve encryption and secure hash algorithm (SHA) are employed to provide anonymity in data storage. The cloud platform stores technical information, authentication, integrity, and vehicular responses. Additionally, the Ethbalance MetaMask wallet is used for BCN-based transactions. Conspicuously, the suggested technique aids in the prevention of several attacks, including plaintext attacks and ciphertext attacks, on sensitive information. When compared to the state-of-the-art techniques, the outcomes demonstrate the effectiveness and safety of the suggested method in terms of operational cost (2.95 units), scalability (14.98 units), reliability (96.07%), and stability (0.82). Full article
(This article belongs to the Special Issue Analytical Frameworks and Methods for Cybersecurity)
Show Figures

Figure 1

22 pages, 14225 KiB  
Article
A Roadside and Cloud-Based Vehicular Communications Framework for the Provision of C-ITS Services
by Emanuel Vieira, João Almeida, Joaquim Ferreira, Tiago Dias, Ana Vieira Silva and Lara Moura
Information 2023, 14(3), 153; https://doi.org/10.3390/info14030153 - 1 Mar 2023
Cited by 11 | Viewed by 4290
Abstract
Road infrastructure plays a critical role in the support and development of the Cooperative Intelligent Transport Systems (C-ITS) paradigm. Roadside Units (RSUs), equipped with vehicular communication capabilities, traffic radars, cameras, and other sensors, can provide a multitude of vehicular services and enhance the [...] Read more.
Road infrastructure plays a critical role in the support and development of the Cooperative Intelligent Transport Systems (C-ITS) paradigm. Roadside Units (RSUs), equipped with vehicular communication capabilities, traffic radars, cameras, and other sensors, can provide a multitude of vehicular services and enhance the cooperative perception of vehicles on the road, leading to increased road safety and traffic efficiency. Moreover, the central C-ITS system responsible for overseeing the road traffic and infrastructure, such as the RSUs, needs an efficient way of collecting and disseminating important information to road users. Warnings of accidents or other dangers, and other types of vehicular services such as Electronic Toll Collection (ETC), are examples of the types of information that the central C-ITS system is responsible for disseminating. To remedy these issues, we present the design of an implemented roadside and cloud architecture for the support of C-ITS services. With the main objectives of managing Vehicle-to-Everything (V2X) communication units and network messages of a public authority or motorway operator acting as a central C-ITS system, the proposed architecture was developed for different mobility testbeds in Portugal, under the scope of the STEROID research project and the pan-European Connected Roads (C-Roads) initiative. RSUs, equipped with ETSI ITS-G5 communications, are deployed with a cellular link or fiber optics connection for remote control and configuration. These are connected to a cloud Message Queuing Telemetry Transport (MQTT) broker where communication is based on a geographical tiling scheme, which allows the selection of the appropriate coverage areas for the dissemination of C-ITS messages. The architecture is deployed in the field, on several Portuguese motorways, where road traffic and infrastructure are monitored through a C-ITS platform with visualization and event reporting capabilities. The provided architecture is independent of the underlying communication technology and can be easily adapted in the future to support Cellular-V2X (PC5 interface) or 5G RSUs. Performance results of the deployed architecture are provided. Full article
(This article belongs to the Special Issue Feature Papers in Information in 2023)
Show Figures

Figure 1

16 pages, 1515 KiB  
Article
Towards a Conceptual Framework of Using Technology to Support Smart Construction: The Case of Modular Integrated Construction (MiC)
by Becky P. Y. Loo and Rosana W. M. Wong
Buildings 2023, 13(2), 372; https://doi.org/10.3390/buildings13020372 - 29 Jan 2023
Cited by 28 | Viewed by 7933
Abstract
Construction is a major source of carbon emissions. Moreover, it faces various other sustainability challenges, such as construction waste, construction noise, vehicular traffic near construction sites, dust and other air and water pollutants, and safety and well-being of construction workers. Poorly designed and [...] Read more.
Construction is a major source of carbon emissions. Moreover, it faces various other sustainability challenges, such as construction waste, construction noise, vehicular traffic near construction sites, dust and other air and water pollutants, and safety and well-being of construction workers. Poorly designed and constructed buildings will continue to affect the well-being of their occupants and overall energy efficiency throughout the building lifecycle. Hence, accelerating the transformation of the construction industry towards smart construction or Construction 4.0 is an important topic. The ways that technology can help to achieve smart construction, especially with the adoption of construction methods with increasing construction modularity, should be further explored. Focusing on modular integrated construction (MiC), this paper examines the following questions: (1) How has technology been applied to support MiC development and smart construction in Hong Kong? (2) What are the lessons learned? A case study approach of a building information model (BIM)-enabled multifunctional blockchain-based digital platform is adopted to allow us to systematically consider (1) the main objectives and scope, (2) the stakeholders involved, (3) the key outcomes and processes, (4) the applications of blockchain technology, and (5) the integration with other digital software and management platforms in practice. Drawing upon the experience, we propose a generic four-stage approach in understanding and facilitating the adoption of relevant technology towards smart construction. At Stage One, the technologies of BIM, RFID, and blockchain are applied to support the core elements of MiC production: just-in-time transportation and on-site installation. At Stage Two, the digital platform is extended to serve as an interface for third parties, notably government; monitoring, authentication, and certifications for information sharing; visualization; and real-time monitoring and updating of MiC projects. At Stage Three, the system focuses on people in the construction process, aiming to enhance the safety and well-being of workers and drivers throughout the construction process. Different Internet-of-Thing devices and sensors, construction robotics, closed-circuit television, dashboards, and cloud-based monitoring are deployed. At Stage Four, the full construction lifecycle is the focus, whereby a centralized smart command theatre is set up with multiple sources of data in a city information model. Full article
(This article belongs to the Special Issue Smart and Digital Construction in AEC Industry)
Show Figures

Figure 1

24 pages, 3181 KiB  
Article
Cooperative Content Caching Framework Using Cuckoo Search Optimization in Vehicular Edge Networks
by Sardar Khaliq uz Zaman, Saad Mustafa, Hajira Abbasi, Tahir Maqsood, Faisal Rehman, Muhammad Amir Khan, Mushtaq Ahmed, Abeer D. Algarni and Hela Elmannai
Appl. Sci. 2023, 13(2), 780; https://doi.org/10.3390/app13020780 - 5 Jan 2023
Cited by 7 | Viewed by 2545
Abstract
Vehicular edge networks (VENs) connect vehicles to share data and infotainment content collaboratively to improve network performance. Due to technological advancements, data growth is accelerating, making it difficult to always connect mobile devices and locations. For vehicle-to-vehicle (V2V) communication, vehicles are equipped with [...] Read more.
Vehicular edge networks (VENs) connect vehicles to share data and infotainment content collaboratively to improve network performance. Due to technological advancements, data growth is accelerating, making it difficult to always connect mobile devices and locations. For vehicle-to-vehicle (V2V) communication, vehicles are equipped with onboard units (OBU) and roadside units (RSU). Through back-haul, all user-uploaded data is cached in the cloud server’s main database. Caching stores and delivers database data on demand. Pre-caching the data on the upcoming predicted server, closest to the user, before receiving the request will improve the system’s performance. OBUs, RSUs, and base stations (BS) cache data in VENs to fulfill user requests rapidly. Pre-caching reduces data retrieval costs and times. Due to storage and computing expenses, complete data cannot be stored on a single device for vehicle caching. We reduce content delivery delays by using the cuckoo search optimization algorithm with cooperative content caching. Cooperation among end users in terms of data sharing with neighbors will positively affect delivery delays. The proposed model considers cooperative content caching based on popularity and accurate vehicle position prediction using K-means clustering. Performance is measured by caching cost, delivery cost, response time, and cache hit ratio. Regarding parameters, the new algorithm outperforms the alternative. Full article
Show Figures

Figure 1

27 pages, 3058 KiB  
Review
Security in V2I Communications: A Systematic Literature Review
by Pablo Marcillo, Diego Tamayo-Urgilés, Ángel Leonardo Valdivieso Caraguay and Myriam Hernández-Álvarez
Sensors 2022, 22(23), 9123; https://doi.org/10.3390/s22239123 - 24 Nov 2022
Cited by 10 | Viewed by 4053
Abstract
Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications [...] Read more.
Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. This paper aims to discover the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. Thus, the authors found schemes resistant to attacks, authentication schemes, privacy protection models, and intrusion detection and prevention systems. Of the solutions for providing security analyzed in this review, the authors determined that most of them use metrics such as computational cost and communication overhead to measure their performance. Additionally, they determined that the solutions that use emerging technologies such as fog/edge/cloud computing present better results than the rest. Finally, they established that the principal challenge in V2I communication is to protect and dispose of a safe and reliable communication channel to avoid adversaries taking control of the medium. Full article
(This article belongs to the Special Issue Data Privacy, Security, and Trust in New Technological Trends)
Show Figures

Figure 1

15 pages, 2012 KiB  
Article
A Fog Computing Model for VANET to Reduce Latency and Delay Using 5G Network in Smart City Transportation
by Abdul Majid Farooqi, M. Afshar Alam, Syed Imtiyaz Hassan and Sheikh Mohammad Idrees
Appl. Sci. 2022, 12(4), 2083; https://doi.org/10.3390/app12042083 - 17 Feb 2022
Cited by 55 | Viewed by 5198
Abstract
Connected vehicles are a vital part of smart cities, which connect over a wireless connection and bring mobile computation and communication abilities. As a mediator, fog computing resides between vehicles and the cloud and provides vehicles with processing, storage, and networking power through [...] Read more.
Connected vehicles are a vital part of smart cities, which connect over a wireless connection and bring mobile computation and communication abilities. As a mediator, fog computing resides between vehicles and the cloud and provides vehicles with processing, storage, and networking power through Vehicular Ad-hoc networks (VANET). VANET is a time-sensitive technology that requires less time to process a request received from a vehicle. Delay and latency are the notorious issues of VANET and fog computing. To deal with such problems, in this work, we developed a priority-based fog computing model for smart urban vehicle transportation that reduces the delay and latency of fog computing. To upgrade the fog computing infrastructure to meet the latency and Quality of Service (QoS) requirements, 5G localized Multi-Access Edge Computing (MEC) servers have also been used, which resulted tremendously in reducing the delay and the latency. We decreased the data latency by 20% compared to the experiment carried using only cloud computing architecture. We also reduced the processing delay by 35% compared with the utilization of cloud computing architecture. Full article
(This article belongs to the Special Issue Blockchain and Internet of Things for Smart Applications)
Show Figures

Figure 1

Back to TopTop