Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (54)

Search Parameters:
Keywords = infotainment system

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
40 pages, 3342 KiB  
Article
Enhancing Infotainment Services in Integrated Aerial–Ground Mobility Networks
by Chenn-Jung Huang, Liang-Chun Chen, Yu-Sen Cheng, Ken-Wen Hu and Mei-En Jian
Sensors 2025, 25(13), 3891; https://doi.org/10.3390/s25133891 - 22 Jun 2025
Viewed by 351
Abstract
The growing demand for bandwidth-intensive vehicular applications—particularly ultra-high-definition streaming and immersive panoramic video—is pushing current network infrastructures beyond their limits, especially in urban areas with severe congestion and degraded user experience. To address these challenges, we propose an aerial-assisted vehicular network architecture that [...] Read more.
The growing demand for bandwidth-intensive vehicular applications—particularly ultra-high-definition streaming and immersive panoramic video—is pushing current network infrastructures beyond their limits, especially in urban areas with severe congestion and degraded user experience. To address these challenges, we propose an aerial-assisted vehicular network architecture that integrates 6G base stations, distributed massive MIMO networks, visible light communication (VLC), and a heterogeneous aerial network of high-altitude platforms (HAPs) and drones. At its core is a context-aware dynamic bandwidth allocation algorithm that intelligently routes infotainment data through optimal aerial relays, bridging connectivity gaps in coverage-challenged areas. Simulation results show a 47% increase in average available bandwidth over conventional first-come-first-served schemes. Our system also satisfies the stringent latency and reliability requirements of emergency and live infotainment services, creating a sustainable ecosystem that enhances user experience, service delivery, and network efficiency. This work marks a key step toward enabling high-bandwidth, low-latency smart mobility in next-generation urban networks. Full article
(This article belongs to the Special Issue Sensing and Machine Learning Control: Progress and Applications)
Show Figures

Figure 1

18 pages, 17301 KiB  
Article
Threat Classification and Vulnerability Analysis on 5G Firmware Over-the-Air Updates for Mobile and Automotive Platforms
by Insu Oh, Mahdi Sahlabadi, Kangbin Yim and Sunyoung Lee
Electronics 2025, 14(10), 2034; https://doi.org/10.3390/electronics14102034 - 16 May 2025
Viewed by 999
Abstract
The integration of 5G technology with existing LTE architectures has facilitated the widespread adoption of firmware over-the-air (FOTA) updates across Android-based devices, including mobile and automotive infotainment systems. While 5G enhances communication speed and convenience, vulnerabilities related to firmware tampering and Man-in-the-Middle (MitM) [...] Read more.
The integration of 5G technology with existing LTE architectures has facilitated the widespread adoption of firmware over-the-air (FOTA) updates across Android-based devices, including mobile and automotive infotainment systems. While 5G enhances communication speed and convenience, vulnerabilities related to firmware tampering and Man-in-the-Middle (MitM) attacks still present considerable risks. This study analyzes the security of the FOTA update process for six Android-based mobile manufacturers and one vehicle model, all of which utilize LTE architectures within 5G networks. Through comprehensive security testing, we explore the potential threats of certificate bypass, firmware tampering, and communication interception. Our proposed framework identifies critical security flaws in the FOTA implementation, recommending improvements in encryption protocols and integrity verification mechanisms to secure the firmware update process. Our findings underscore the urgent requirement for enhanced security measures in the deployment of FOTA updates to address vulnerabilities in Android-based IoT devices and automotive systems. Full article
Show Figures

Figure 1

14 pages, 2091 KiB  
Article
Personalizing Multimedia Content Recommendations for Intelligent Vehicles Through Text–Image Embedding Approaches
by Jin-A Choi, Taekeun Hong and Kiho Lim
Analytics 2025, 4(1), 4; https://doi.org/10.3390/analytics4010004 - 5 Feb 2025
Viewed by 664
Abstract
The ability to automate and personalize the recommendation of multimedia contents to consumers has been gaining significant attention recently. The burgeoning demand for digitization and automation of formerly analog communication processes has caught the attention of researchers and professionals alike. In light of [...] Read more.
The ability to automate and personalize the recommendation of multimedia contents to consumers has been gaining significant attention recently. The burgeoning demand for digitization and automation of formerly analog communication processes has caught the attention of researchers and professionals alike. In light of the recent interest and anticipated transition to fully autonomous vehicles, this study proposes a text–image embedding method recommender system for the optimization of personalized multimedia content for in-vehicle infotainment. This study leverages existing pre-trained text embedding models and pre-trained image feature extraction methods. Previous research to date has focused mainly on textual-only or image-only analyses. By employing similarity measurements, this study demonstrates how recommendation of the most relevant multimedia content to consumers is enhanced through text–image embedding. Full article
Show Figures

Figure 1

34 pages, 6387 KiB  
Article
CANGuard: An Enhanced Approach to the Detection of Anomalies in CAN-Enabled Vehicles
by Damilola Oladimeji, Razaq Jinad, Amar Rasheed and Mohamed Baza
Sensors 2025, 25(1), 278; https://doi.org/10.3390/s25010278 - 6 Jan 2025
Cited by 2 | Viewed by 1858
Abstract
As modern vehicles continue to evolve, advanced technologies are integrated to enhance the driving experience. A key enabler of this advancement is the Controller Area Network (CAN) bus, which facilitates seamless communication between vehicle components. Despite its widespread adoption, the CAN bus was [...] Read more.
As modern vehicles continue to evolve, advanced technologies are integrated to enhance the driving experience. A key enabler of this advancement is the Controller Area Network (CAN) bus, which facilitates seamless communication between vehicle components. Despite its widespread adoption, the CAN bus was not designed with security as a priority, making it vulnerable to various attacks. In this paper, we propose CANGuard, an Intrusion Detection System (IDS) designed to detect attacks on the CAN network and identify the originating node in real time. Using a simulated CAN-enabled system with four nodes representing diverse vehicle components, we generated a dataset featuring Denial-of-Service (DoS) attacks by exploiting the arbitration feature of the CAN bus, which prioritizes high-criticality messages (e.g., engine control) over lower-criticality ones (e.g., infotainment). We trained and evaluated several machine learning models for their ability to detect attacks and pinpoint the responsible node. Results indicate that Gradient Boosting outperformed other models, achieving high accuracy in both attack detection and node identification. While the Multi-Layer Perceptron (MLP) model demonstrated strong attack detection performance, it struggled with node identification, achieving less than 50% accuracy. These findings underscore the potential of tree-based models for real-time IDS applications in CAN-enabled vehicles. Full article
(This article belongs to the Special Issue Feature Papers in the Internet of Things Section 2024)
Show Figures

Figure 1

18 pages, 3797 KiB  
Article
Influence of Infotainment-System Audio Cues on the Sound Quality Perception Onboard Electric Vehicles in the Presence of Air-Conditioning Noise
by Massimiliano Masullo, Katsuya Yamauchi, Minori Dan, Federico Cioffi and Luigi Maffei
Acoustics 2025, 7(1), 1; https://doi.org/10.3390/acoustics7010001 - 25 Dec 2024
Cited by 1 | Viewed by 2145
Abstract
Car cabin noise generated by heating, ventilation, and air-conditioning (HVAC) systems significantly impacts passengers’ acoustic comfort. In fact, with the reduction in engine noise due to the passage from internal combustion to electric or hybrid-electric engines, interior background noise has dramatically reduced, especially [...] Read more.
Car cabin noise generated by heating, ventilation, and air-conditioning (HVAC) systems significantly impacts passengers’ acoustic comfort. In fact, with the reduction in engine noise due to the passage from internal combustion to electric or hybrid-electric engines, interior background noise has dramatically reduced, especially at 25% and 50% HVAC airflow rates. While previous research has focused on the effect of HVAC noise in car cabins, this paper investigates the possibility of using car infotainment-system audio cues to moderate onboard sound quality perception. A laboratory experiment combining the factors of infotainment-system audio (ISA) cues, signal-to-noise ratios (SNRs), and airflow rates (AFRs) at different levels was performed in two university laboratories in Italy and Japan involving groups of local individuals. The results indicate that introducing ISA cues in car cabins fosters improvements in the perceived aesthetic dimension of sound quality, making it more functioning, natural, and pleasant. For the Italian group, adding ISA cues also moderated the loudness dimension by reducing noise perception. The moderating effects of ISA cues differed between the Italian and Japanese groups, depending on the AFR. All these effects were more evident at the SNR level of −4 dB when the ISA cues competed with existing background noise. Full article
Show Figures

Figure 1

12 pages, 2304 KiB  
Article
L-GraphSAGE: A Graph Neural Network-Based Approach for IoV Application Encrypted Traffic Identification
by Shihe Zhang, Ruidong Chen, Jingxue Chen, Yukun Zhu, Manyuan Hua, Jiaying Yuan and Fenghua Xu
Electronics 2024, 13(21), 4222; https://doi.org/10.3390/electronics13214222 - 28 Oct 2024
Cited by 1 | Viewed by 1589
Abstract
Recently, with a crucial role in developing smart transportation systems, the Internet of Vehicles (IoV), with all kinds of in-vehicle devices, has undergone significant advancement for autonomous driving, in-vehicle infotainment, etc. With the development of these IoV devices, the complexity and volume of [...] Read more.
Recently, with a crucial role in developing smart transportation systems, the Internet of Vehicles (IoV), with all kinds of in-vehicle devices, has undergone significant advancement for autonomous driving, in-vehicle infotainment, etc. With the development of these IoV devices, the complexity and volume of in-vehicle data flows within information communication have increased dramatically. To adapt these changes to secure and smart transportation, encrypted communication realization, real-time decision-making, traffic management enhancement, and overall transportation efficiency improvement are essential. However, the security of a traffic system under encrypted communication is still inadequate, as attackers can identify in-vehicle devices through fingerprinting attacks, causing potential privacy breaches. Nevertheless, existing IoV traffic application models for encrypted traffic identification are weak and often exhibit poor generalization in some dynamic scenarios, where route switching and TCP congestion occur frequently. In this paper, we propose LineGraph-GraphSAGE (L-GraphSAGE), a graph neural network (GNN) model designed to improve the generalization ability of the IoV application of traffic identification in these dynamic scenarios. L-GraphSAGE utilizes node features, including text attributes, node context information, and node degree, to learn hyperparameters that can be transferred to unknown nodes. Our model demonstrates promising results in both UNSW Sydney public datasets and real-world environments. In public IoV datasets, we achieve an accuracy of 94.23%(↑0.23%). Furthermore, our model achieves an F1 change rate of 0.20%(↑96.92%) in α train, β infer, and 0.60%(↑75.00%) in β train, α infer when evaluated on a dataset consisting of five classes of data collected from real-world environments. These results highlight the effectiveness of our proposed approach in enhancing IoV application identification in dynamic network scenarios. Full article
(This article belongs to the Special Issue Graph-Based Learning Methods in Intelligent Transportation Systems)
Show Figures

Figure 1

23 pages, 707 KiB  
Article
VonEdgeSim: A Framework for Simulating IoT Application in Volunteer Edge Computing
by Yousef Alsenani
Electronics 2024, 13(20), 4124; https://doi.org/10.3390/electronics13204124 - 19 Oct 2024
Viewed by 1258
Abstract
Recently, various emerging technologies have been introduced to host IoT applications. Edge computing, utilizing volunteer devices, could be a feasible solution due to the significant and underutilized resources at the edge. However, cloud providers are still reluctant to offer it as an edge [...] Read more.
Recently, various emerging technologies have been introduced to host IoT applications. Edge computing, utilizing volunteer devices, could be a feasible solution due to the significant and underutilized resources at the edge. However, cloud providers are still reluctant to offer it as an edge infrastructure service because of the unpredictable nature of volunteer resources. Volunteer edge computing introduces challenges such as reliability, trust, and availability. Testing this infrastructure is prohibitively expensive and not feasible in real-world scenarios. This emerging technology will not be fully realized until dedicated research and development efforts have substantiated its potential for running reliable services. Therefore, this paper proposes VonEdgeSim, a simulation of volunteer edge computing. To the best of our knowledge, it is the first and only simulation capable of mimicking volunteer behavior at the edge. Researchers and developers can utilize this simulation to test and develop resource management models. We conduct experiments with various IoT applications, including Augmented Reality, Infotainment, and Health Monitoring. Our results show that incorporating volunteer devices at the edge can significantly enhance system performance by reducing total task delay, and improving task execution time. This emphasizes the potential of volunteers to provide reliable services in an edge computing environment. The simulation code is publicly available for further development and testing. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

17 pages, 4996 KiB  
Article
Safeguarding Personal Identifiable Information (PII) after Smartphone Pairing with a Connected Vehicle
by Jason Carlton and Hafiz Malik
J. Sens. Actuator Netw. 2024, 13(5), 63; https://doi.org/10.3390/jsan13050063 - 6 Oct 2024
Cited by 1 | Viewed by 1646
Abstract
The integration of connected autonomous vehicles (CAVs) has significantly enhanced driving convenience, but it has also raised serious privacy concerns, particularly regarding the personal identifiable information (PII) stored on infotainment systems. Recent advances in connected and autonomous vehicle control, such as multi-agent system [...] Read more.
The integration of connected autonomous vehicles (CAVs) has significantly enhanced driving convenience, but it has also raised serious privacy concerns, particularly regarding the personal identifiable information (PII) stored on infotainment systems. Recent advances in connected and autonomous vehicle control, such as multi-agent system (MAS)-based hierarchical architectures and privacy-preserving strategies for mixed-autonomy platoon control, underscore the increasing complexity of privacy management within these environments. Rental cars with infotainment systems pose substantial challenges, as renters often fail to delete their data, leaving it accessible to subsequent renters. This study investigates the risks associated with PII in connected vehicles and emphasizes the necessity of automated solutions to ensure data privacy. We introduce the Vehicle Inactive Profile Remover (VIPR), an innovative automated solution designed to identify and delete PII left on infotainment systems. The efficacy of VIPR is evaluated through surveys, hands-on experiments with rental vehicles, and a controlled laboratory environment. VIPR achieved a 99.5% success rate in removing user profiles, with an average deletion time of 4.8 s or less, demonstrating its effectiveness in mitigating privacy risks. This solution highlights VIPR as a critical tool for enhancing privacy in connected vehicle environments, promoting a safer, more responsible use of connected vehicle technology in society. Full article
(This article belongs to the Special Issue Feature Papers in the Section of Network Security and Privacy)
Show Figures

Figure 1

17 pages, 21133 KiB  
Technical Note
V-Cockpit: A Platform for the Design, Testing, and Validation of Car Infotainment Systems through Virtual Reality
by Michela Papandrea, Achille Peternier, Diego Frei, Nicolò La Porta, Mirko Gelsomini, Daniele Allegri and Tiziano Leidi
Appl. Sci. 2024, 14(18), 8160; https://doi.org/10.3390/app14188160 - 11 Sep 2024
Cited by 3 | Viewed by 2269
Abstract
The V-Cockpit platform aims to transform the design, testing, and validation of car infotainment systems from the physical realm to virtual reality. It uniquely integrates various aspects of the creative phases—from conceptualization to evaluation—streamlining the process and reducing time and costs compared to [...] Read more.
The V-Cockpit platform aims to transform the design, testing, and validation of car infotainment systems from the physical realm to virtual reality. It uniquely integrates various aspects of the creative phases—from conceptualization to evaluation—streamlining the process and reducing time and costs compared to traditional methods that focus on individual activities and rely heavily on physical prototyping. This technical note provides a comprehensive overview of the main platform’s aspects, highlighting the integration of hardware and behavioral analysis algorithms to improve user experience and detect potential design flaws early on. The V-Cockpit platform, composed of six key components, leverages virtual reality and digital twins, promising significant cost savings and enhanced design efficiency. This work details the system architecture, implementation, and first benefits of this innovative approach through the analysis of three use cases. Full article
(This article belongs to the Special Issue Human–Computer Interaction and Virtual Environments)
Show Figures

Figure 1

35 pages, 4120 KiB  
Review
Intelligent Cockpits for Connected Vehicles: Taxonomy, Architecture, Interaction Technologies, and Future Directions
by Fei Gao, Xiaojun Ge, Jinyu Li, Yuze Fan, Yun Li and Rui Zhao
Sensors 2024, 24(16), 5172; https://doi.org/10.3390/s24165172 - 10 Aug 2024
Cited by 8 | Viewed by 6328
Abstract
Highly integrated information sharing among people, vehicles, roads, and cloud systems, along with the rapid development of autonomous driving technologies, has spurred the evolution of automobiles from simple “transportation tools” to interconnected “intelligent systems”. The intelligent cockpit is a comprehensive application space for [...] Read more.
Highly integrated information sharing among people, vehicles, roads, and cloud systems, along with the rapid development of autonomous driving technologies, has spurred the evolution of automobiles from simple “transportation tools” to interconnected “intelligent systems”. The intelligent cockpit is a comprehensive application space for various new technologies in intelligent vehicles, encompassing the domains of driving control, riding comfort, and infotainment. It provides drivers and passengers with safety, comfort, and pleasant driving experiences, serving as the gateway for traditional automobile manufacturing to upgrade towards an intelligent automotive industry ecosystem. This is the optimal convergence point for the intelligence, connectivity, electrification, and sharing of automobiles. Currently, the form, functions, and interaction methods of the intelligent cockpit are gradually changing, transitioning from the traditional “human adapts to the vehicle” viewpoint to the “vehicle adapts to human”, and evolving towards a future of natural interactive services where “humans and vehicles mutually adapt”. This article reviews the definitions, intelligence levels, functional domains, and technical frameworks of intelligent automotive cockpits. Additionally, combining the core mechanisms of human–machine interactions in intelligent cockpits, this article proposes an intelligent-cockpit human–machine interaction process and summarizes the current state of key technologies in intelligent-cockpit human–machine interactions. Lastly, this article analyzes the current challenges faced in the field of intelligent cockpits and forecasts future trends in intelligent cockpit technologies. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

24 pages, 5510 KiB  
Article
STRIDE-Based Cybersecurity Threat Modeling, Risk Assessment and Treatment of an In-Vehicle Infotainment System
by Popy Das, Md. Rashid Al Asif, Sohely Jahan, Kawsar Ahmed, Francis M. Bui and Rahamatullah Khondoker
Vehicles 2024, 6(3), 1140-1163; https://doi.org/10.3390/vehicles6030054 - 30 Jun 2024
Cited by 6 | Viewed by 6413
Abstract
In modern automobiles, the infotainment system is crucial for enhancing driver and passenger capabilities, offering advanced features such as music, navigation, communication, and entertainment. Leveraging Wi-Fi, cellular networks, NFC, and Bluetooth, the system ensures continuous internet connectivity, providing seamless access to information. However, [...] Read more.
In modern automobiles, the infotainment system is crucial for enhancing driver and passenger capabilities, offering advanced features such as music, navigation, communication, and entertainment. Leveraging Wi-Fi, cellular networks, NFC, and Bluetooth, the system ensures continuous internet connectivity, providing seamless access to information. However, the increasing complexity of IT connectivity in vehicles raises significant cybersecurity concerns, including potential data breaches and exposure of sensitive information. To enhance security in infotainment systems, this study applied component-level threat modeling to a proposed infotainment system using the Microsoft STRIDE model. This approach illustrates potential component-level security issues impacting privacy and security concerns. The study also assessed these impacts using SAHARA and DREAD risk assessment methodologies. The threat modeling process identified 34 potential security threats, each accompanied by detailed information. Moreover, a comparative analysis is performed to compute risk values for prioritizing treatment, followed by recommending mitigation strategies for each identified threat. These identified threats and associated risks require careful consideration to prevent potential cyberattacks before deploying the infotainment system in automotive vehicles. Full article
Show Figures

Figure 1

14 pages, 6445 KiB  
Article
Multi-Sensor-Assisted Low-Cost Indoor Non-Visual Semantic Map Construction and Localization for Modern Vehicles
by Guangxiao Shao, Fanyu Lin, Chao Li, Wei Shao, Wennan Chai, Xiaorui Xu, Mingyue Zhang, Zhen Sun and Qingdang Li
Sensors 2024, 24(13), 4263; https://doi.org/10.3390/s24134263 - 30 Jun 2024
Cited by 1 | Viewed by 1761
Abstract
With the transformation and development of the automotive industry, low-cost and seamless indoor and outdoor positioning has become a research hotspot for modern vehicles equipped with in-vehicle infotainment systems, Internet of Vehicles, or other intelligent systems (such as Telematics Box, Autopilot, etc.). This [...] Read more.
With the transformation and development of the automotive industry, low-cost and seamless indoor and outdoor positioning has become a research hotspot for modern vehicles equipped with in-vehicle infotainment systems, Internet of Vehicles, or other intelligent systems (such as Telematics Box, Autopilot, etc.). This paper analyzes modern vehicles in different configurations and proposes a low-cost, versatile indoor non-visual semantic mapping and localization solution based on low-cost sensors. Firstly, the sliding window-based semantic landmark detection method is designed to identify non-visual semantic landmarks (e.g., entrance/exit, ramp entrance/exit, road node). Then, we construct an indoor non-visual semantic map that includes the vehicle trajectory waypoints, non-visual semantic landmarks, and Wi-Fi fingerprints of RSS features. Furthermore, to estimate the position of modern vehicles in the constructed semantic maps, we proposed a graph-optimized localization method based on landmark matching that exploits the correlation between non-visual semantic landmarks. Finally, field experiments are conducted in two shopping mall scenes with different underground parking layouts to verify the proposed non-visual semantic mapping and localization method. The results show that the proposed method achieves a high accuracy of 98.1% in non-visual semantic landmark detection and a low localization error of 1.31 m. Full article
Show Figures

Figure 1

37 pages, 1004 KiB  
Systematic Review
Safety Aspects of In-Vehicle Infotainment Systems: A Systematic Literature Review from 2012 to 2023
by Rafael Krstačić, Alesandro Žužić and Tihomir Orehovački
Electronics 2024, 13(13), 2563; https://doi.org/10.3390/electronics13132563 - 29 Jun 2024
Cited by 8 | Viewed by 5775
Abstract
This systematic literature review investigates the safety aspects of in-vehicle infotainment systems (IVISs) from 2012 to 2023, analyzing 96 studies. IVISs have significantly evolved, incorporating technologies such as navigation systems, parking assistance, and video games. However, these innovations introduce safety concerns like driver [...] Read more.
This systematic literature review investigates the safety aspects of in-vehicle infotainment systems (IVISs) from 2012 to 2023, analyzing 96 studies. IVISs have significantly evolved, incorporating technologies such as navigation systems, parking assistance, and video games. However, these innovations introduce safety concerns like driver distraction and cognitive overload. This review identifies six primary safety issues: driving distraction, situational awareness, cognitive load, driving performance, interaction success, and emotional state. Head-down displays and touchscreens often have negative safety implications, while speech-based interfaces and Bluetooth-integrated systems are generally considered safer. Suggested improvements include enhancing interface design for touchscreens and exploring gesture-based alternatives. Despite these developments, significant gaps remain in real-world evaluations and studies in diverse driving conditions, highlighting the need for standardized manufacturing norms. Addressing these issues is essential for creating future IVIS that are both reliable and safe. This review serves as a foundation for future research, safety regulations, and design principles aimed at improving IVIS safety. Overcoming these challenges will require a multi-faceted approach that considers user-friendly design, adaptive technologies, and predictive analytics. The goal is to balance technological advancements with road safety, ensuring that IVISs contribute to a safer driving experience without compromising convenience and functionality. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

13 pages, 420 KiB  
Article
Machine Learning-Based Anomaly Detection for Securing In-Vehicle Networks
by Asma Alfardus and Danda B. Rawat
Electronics 2024, 13(10), 1962; https://doi.org/10.3390/electronics13101962 - 16 May 2024
Cited by 6 | Viewed by 3228
Abstract
In-vehicle networks (IVNs) are networks that allow communication between different electronic components in a vehicle, such as infotainment systems, sensors, and control units. As these networks become more complex and interconnected, they become more vulnerable to cyber-attacks that can compromise safety and privacy. [...] Read more.
In-vehicle networks (IVNs) are networks that allow communication between different electronic components in a vehicle, such as infotainment systems, sensors, and control units. As these networks become more complex and interconnected, they become more vulnerable to cyber-attacks that can compromise safety and privacy. Anomaly detection is an important tool for detecting potential threats and preventing cyber-attacks in IVNs. The proposed machine learning-based anomaly detection technique uses deep learning and feature engineering to identify anomalous behavior in real-time. Feature engineering involves selecting and extracting relevant features from the data that are useful for detecting anomalies. Deep learning involves using neural networks to learn complex patterns and relationships in the data. Our experiments show that the proposed technique have achieved high accuracy in detecting anomalies and outperforms existing state-of-the-art methods. This technique can be used to enhance the security of IVNs and prevent cyber-attacks that can have serious consequences for drivers and passengers. Full article
Show Figures

Figure 1

21 pages, 4594 KiB  
Article
Multiple-Junction-Based Traffic-Aware Routing Protocol Using ACO Algorithm in Urban Vehicular Networks
by Seung-Won Lee, Kyung-Soo Heo, Min-A Kim, Do-Kyoung Kim and Hoon Choi
Sensors 2024, 24(9), 2913; https://doi.org/10.3390/s24092913 - 2 May 2024
Cited by 2 | Viewed by 1800
Abstract
The burgeoning interest in intelligent transportation systems (ITS) and the widespread adoption of in-vehicle amenities like infotainment have spurred a heightened fascination with vehicular ad-hoc networks (VANETs). Multi-hop routing protocols are pivotal in actualizing these in-vehicle services, such as infotainment, wirelessly. This study [...] Read more.
The burgeoning interest in intelligent transportation systems (ITS) and the widespread adoption of in-vehicle amenities like infotainment have spurred a heightened fascination with vehicular ad-hoc networks (VANETs). Multi-hop routing protocols are pivotal in actualizing these in-vehicle services, such as infotainment, wirelessly. This study presents a novel protocol called multiple junction-based traffic-aware routing (MJTAR) for VANET vehicles operating in urban environments. MJTAR represents an advancement over the improved greedy traffic-aware routing (GyTAR) protocol. MJTAR introduces a distributed mechanism capable of recognizing vehicle traffic and computing curve metric distances based on two-hop junctions. Additionally, it employs a technique to dynamically select the most optimal multiple junctions between source and destination using the ant colony optimization (ACO) algorithm. We implemented the proposed protocol using the network simulator 3 (NS-3) and simulation of urban mobility (SUMO) simulators and conducted performance evaluations by comparing it with GSR and GyTAR. Our evaluation demonstrates that the proposed protocol surpasses GSR and GyTAR by over 20% in terms of packet delivery ratio, with the end-to-end delay reduced to less than 1.3 s on average. Full article
(This article belongs to the Special Issue Advanced Vehicular Ad Hoc Networks: 2nd Edition)
Show Figures

Figure 1

Back to TopTop