Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (260)

Search Parameters:
Keywords = roadside unit

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 19197 KiB  
Article
Empirical Evaluation of TLS-Enhanced MQTT on IoT Devices for V2X Use Cases
by Nikolaos Orestis Gavriilidis, Spyros T. Halkidis and Sophia Petridou
Appl. Sci. 2025, 15(15), 8398; https://doi.org/10.3390/app15158398 - 29 Jul 2025
Viewed by 113
Abstract
The rapid growth of Internet of Things (IoT) deployment has led to an unprecedented volume of interconnected, resource-constrained devices. Securing their communication is essential, especially in vehicular environments, where sensitive data exchange requires robust authentication, integrity, and confidentiality guarantees. In this paper, we [...] Read more.
The rapid growth of Internet of Things (IoT) deployment has led to an unprecedented volume of interconnected, resource-constrained devices. Securing their communication is essential, especially in vehicular environments, where sensitive data exchange requires robust authentication, integrity, and confidentiality guarantees. In this paper, we present an empirical evaluation of TLS (Transport Layer Security)-enhanced MQTT (Message Queuing Telemetry Transport) on low-cost, quad-core Cortex-A72 ARMv8 boards, specifically the Raspberry Pi 4B, commonly used as prototyping platforms for On-Board Units (OBUs) and Road-Side Units (RSUs). Three MQTT entities, namely, the broker, the publisher, and the subscriber, are deployed, utilizing Elliptic Curve Cryptography (ECC) for key exchange and authentication and employing the AES_256_GCM and ChaCha20_Poly1305 ciphers for confidentiality via appropriately selected libraries. We quantify resource consumption in terms of CPU utilization, execution time, energy usage, memory footprint, and goodput across TLS phases, cipher suites, message packaging strategies, and both Ethernet and WiFi interfaces. Our results show that (i) TLS 1.3-enhanced MQTT is feasible on Raspberry Pi 4B devices, though it introduces non-negligible resource overheads; (ii) batching messages into fewer, larger packets reduces transmission cost and latency; and (iii) ChaCha20_Poly1305 outperforms AES_256_GCM, particularly in wireless scenarios, making it the preferred choice for resource- and latency-sensitive V2X applications. These findings provide actionable recommendations for deploying secure MQTT communication on an IoT platform. Full article
(This article belongs to the Special Issue Cryptography in Data Protection and Privacy-Enhancing Technologies)
Show Figures

Figure 1

18 pages, 1138 KiB  
Article
Intelligent Priority-Aware Spectrum Access in 5G Vehicular IoT: A Reinforcement Learning Approach
by Adeel Iqbal, Tahir Khurshaid and Yazdan Ahmad Qadri
Sensors 2025, 25(15), 4554; https://doi.org/10.3390/s25154554 - 23 Jul 2025
Viewed by 257
Abstract
Efficient and intelligent spectrum access is crucial for meeting the diverse Quality of Service (QoS) demands of Vehicular Internet of Things (V-IoT) systems in next-generation cellular networks. This work proposes a novel reinforcement learning (RL)-based priority-aware spectrum management (RL-PASM) framework, a centralized self-learning [...] Read more.
Efficient and intelligent spectrum access is crucial for meeting the diverse Quality of Service (QoS) demands of Vehicular Internet of Things (V-IoT) systems in next-generation cellular networks. This work proposes a novel reinforcement learning (RL)-based priority-aware spectrum management (RL-PASM) framework, a centralized self-learning priority-aware spectrum management framework operating through Roadside Units (RSUs). RL-PASM dynamically allocates spectrum resources across three traffic classes: high-priority (HP), low-priority (LP), and best-effort (BE), utilizing reinforcement learning (RL). This work compares four RL algorithms: Q-Learning, Double Q-Learning, Deep Q-Network (DQN), and Actor-Critic (AC) methods. The environment is modeled as a discrete-time Markov Decision Process (MDP), and a context-sensitive reward function guides fairness-preserving decisions for access, preemption, coexistence, and hand-off. Extensive simulations conducted under realistic vehicular load conditions evaluate the performance across key metrics, including throughput, delay, energy efficiency, fairness, blocking, and interruption probability. Unlike prior approaches, RL-PASM introduces a unified multi-objective reward formulation and centralized RSU-based control to support adaptive priority-aware access for dynamic vehicular environments. Simulation results confirm that RL-PASM balances throughput, latency, fairness, and energy efficiency, demonstrating its suitability for scalable and resource-constrained deployments. The results also demonstrate that DQN achieves the highest average throughput, followed by vanilla QL. DQL and AC maintain fairness at high levels and low average interruption probability. QL demonstrates the lowest average delay and the highest energy efficiency, making it a suitable candidate for edge-constrained vehicular deployments. Selecting the appropriate RL method, RL-PASM offers a robust and adaptable solution for scalable, intelligent, and priority-aware spectrum access in vehicular communication infrastructures. Full article
(This article belongs to the Special Issue Emerging Trends in Next-Generation mmWave Cognitive Radio Networks)
Show Figures

Figure 1

31 pages, 4220 KiB  
Article
A Novel Multi-Server Federated Learning Framework in Vehicular Edge Computing
by Fateme Mazloomi, Shahram Shah Heydari and Khalil El-Khatib
Future Internet 2025, 17(7), 315; https://doi.org/10.3390/fi17070315 - 19 Jul 2025
Viewed by 264
Abstract
Federated learning (FL) has emerged as a powerful approach for privacy-preserving model training in autonomous vehicle networks, where real-world deployments rely on multiple roadside units (RSUs) serving heterogeneous clients with intermittent connectivity. While most research focuses on single-server or hierarchical cloud-based FL, multi-server [...] Read more.
Federated learning (FL) has emerged as a powerful approach for privacy-preserving model training in autonomous vehicle networks, where real-world deployments rely on multiple roadside units (RSUs) serving heterogeneous clients with intermittent connectivity. While most research focuses on single-server or hierarchical cloud-based FL, multi-server FL can alleviate the communication bottlenecks of traditional setups. To this end, we propose an edge-based, multi-server FL (MS-FL) framework that combines performance-driven aggregation at each server—including statistical weighting of peer updates and outlier mitigation—with an application layer handover protocol that preserves model updates when vehicles move between RSU coverage areas. We evaluate MS-FL on both MNIST and GTSRB benchmarks under shard- and Dirichlet-based non-IID splits, comparing it against single-server FL and a two-layer edge-plus-cloud baseline. Over multiple communication rounds, MS-FL with the Statistical Performance-Aware Aggregation method and Dynamic Weighted Averaging Aggregation achieved up to a 20-percentage-point improvement in accuracy and consistent gains in precision, recall, and F1-score (95% confidence), while matching the low latency of edge-only schemes and avoiding the extra model transfer delays of cloud-based aggregation. These results demonstrate that coordinated cooperation among servers based on model quality and seamless handovers can accelerate convergence, mitigate data heterogeneity, and deliver robust, privacy-aware learning in connected vehicle environments. Full article
Show Figures

Figure 1

21 pages, 2725 KiB  
Article
A Strategy for Improving Millimeter Wave Communication Reliability by Hybrid Network Considering Rainfall Attenuation
by Jiaqing Sun, Chunxiao Li, Junfeng Wei and Jiajun Shen
Symmetry 2025, 17(7), 1054; https://doi.org/10.3390/sym17071054 - 3 Jul 2025
Viewed by 325
Abstract
With the rapid development of smart connected vehicles, vehicle network communications demand high-speed data transmission to support advanced automotive services. Millimeter Wave (mmWave) communication offers fast data rates, strong anti-interference capabilities, high precision localization and low-latency, making it suitable for high-speed in-vehicle communications. [...] Read more.
With the rapid development of smart connected vehicles, vehicle network communications demand high-speed data transmission to support advanced automotive services. Millimeter Wave (mmWave) communication offers fast data rates, strong anti-interference capabilities, high precision localization and low-latency, making it suitable for high-speed in-vehicle communications. However, mmWave communication performance in vehicular networks is hindered by high path loss and frequent beam alignment updates, significantly degrading the coverage and connectivity of vehicle nodes (VNs). In addition, atmospheric propagation attenuation further deteriorates signal quality and limits system performance due to raindrop absorption and scattering. Therefore, the pure mmWave networks cannot meet the high requirements of highway vehicular communications. To address these challenges, this paper proposes a hybrid mmWave and microwave network architecture to improve VNs’ coverage and connectivity performances through the strategic deployment of Roadside Units (RSUs). Using Radio Access Technology (RAT), mmWave and microwave RSUs are symmetrically deployed on both sides of the road to communicate with VNs located at the road center. This symmetric RSUs deployment significantly improves the network reliability. Analytical expressions for coverage and connectivity in the proposed hybrid networks are derived and compared with the pure mmWave networks, accounting for rainfall attenuation. The study results show that the proposed hybrid network shows better performance than the pure mmWave network in both coverage and connectivity. Full article
(This article belongs to the Special Issue Symmetry/Asymmetry in Future Wireless Networks)
Show Figures

Figure 1

25 pages, 5088 KiB  
Article
Improved Perceptual Quality of Traffic Signs and Lights for the Teleoperation of Autonomous Vehicle Remote Driving via Multi-Category Region of Interest Video Compression
by Itai Dror and Ofer Hadar
Entropy 2025, 27(7), 674; https://doi.org/10.3390/e27070674 - 24 Jun 2025
Viewed by 714
Abstract
Autonomous vehicles are a promising solution to traffic congestion, air pollution, accidents, wasted time, and resources. However, remote driver intervention may be necessary in extreme situations to ensure safe roadside parking or complete remote takeover. In these cases, high-quality real-time video streaming is [...] Read more.
Autonomous vehicles are a promising solution to traffic congestion, air pollution, accidents, wasted time, and resources. However, remote driver intervention may be necessary in extreme situations to ensure safe roadside parking or complete remote takeover. In these cases, high-quality real-time video streaming is crucial for remote driving. In a preliminary study, we presented a region of interest (ROI) High-Efficiency Video Coding (HEVC) method where the image was segmented into two categories: ROI and background. This involved allocating more bandwidth to the ROI, which yielded an improvement in the visibility of classes essential for driving while transmitting the background at a lower quality. However, migrating the bandwidth to the large ROI portion of the image did not substantially improve the quality of traffic signs and lights. This study proposes a method that categorizes ROIs into three tiers: background, weak ROI, and strong ROI. To evaluate this approach, we utilized a photo-realistic driving scenario database created with the Cognata self-driving car simulation platform. We used semantic segmentation to categorize the compression quality of a Coding Tree Unit (CTU) according to its pixel classes. A background CTU contains only sky, trees, vegetation, or building classes. Essentials for remote driving include classes such as pedestrians, road marks, and cars. Difficult-to-recognize classes, such as traffic signs (especially textual ones) and traffic lights, are categorized as a strong ROI. We applied thresholds to determine whether the number of pixels in a CTU of a particular category was sufficient to classify it as a strong or weak ROI and then allocated bandwidth accordingly. Our results demonstrate that this multi-category ROI compression method significantly enhances the perceptual quality of traffic signs (especially textual ones) and traffic lights by up to 5.5 dB compared to a simpler two-category (background/foreground) partition. This improvement in critical areas is achieved by reducing the fidelity of less critical background elements, while the visual quality of other essential driving-related classes (weak ROI) is at least maintained. Full article
(This article belongs to the Special Issue Information Theory and Coding for Image/Video Processing)
Show Figures

Figure 1

26 pages, 831 KiB  
Article
An Efficient and Fair Map-Data-Sharing Mechanism for Vehicular Networks
by Kuan Fan, Qingdong Liu, Chuchu Liu, Ning Lu and Wenbo Shi
Electronics 2025, 14(12), 2437; https://doi.org/10.3390/electronics14122437 - 15 Jun 2025
Viewed by 431
Abstract
With the rapid advancement in artificial intelligence, autonomous driving has emerged as a prominent research frontier. Autonomous vehicles rely on high-precision high-definition map data, necessitating timely map updates by map companies to accurately reflect road conditions. This paper proposes an efficient and fair [...] Read more.
With the rapid advancement in artificial intelligence, autonomous driving has emerged as a prominent research frontier. Autonomous vehicles rely on high-precision high-definition map data, necessitating timely map updates by map companies to accurately reflect road conditions. This paper proposes an efficient and fair map-data-sharing mechanism for vehicular networks. To encourage vehicles to share data, we introduce a reputation unit to resolve the cold-start issue for new vehicles, effectively distinguishing legitimate new vehicles from malicious attackers. Considering both the budget constraints of map companies and heterogeneous data collection capabilities of vehicles, we design a fair incentive mechanism based on the proposed reputation unit and a reverse auction algorithm, achieving an optimal balance between data quality and procurement costs. Furthermore, the scheme has been developed to facilitate mutual authentication between vehicles and Roadside Unit(RSU), thereby ensuring the security of shared data. In order to address the issue of redundant authentication in overlapping RSU coverage areas, we construct a Merkle hash tree structure using a set of anonymous certificates, enabling single-round identity verification to enhance authentication efficiency. A security analysis demonstrates the robustness of the scheme, while performance evaluations and the experimental results validate its effectiveness and practicality. Full article
(This article belongs to the Special Issue Cryptography and Computer Security)
Show Figures

Figure 1

27 pages, 1065 KiB  
Article
Priority-Aware Spectrum Management for QoS Optimization in Vehicular IoT
by Adeel Iqbal, Tahir Khurshaid, Yazdan Ahmad Qadri, Ali Nauman and Sung Won Kim
Sensors 2025, 25(11), 3342; https://doi.org/10.3390/s25113342 - 26 May 2025
Cited by 1 | Viewed by 484
Abstract
Vehicular Internet of Things (V-IoT) networks, sustained by a high-density deployment of roadside units and sensor-equipped vehicles, are currently at the edge of next-generation intelligent transportation system evolution. However, offering stable, low-latency, and energy-efficient communication in such heterogeneous and delay-prone environments is challenging [...] Read more.
Vehicular Internet of Things (V-IoT) networks, sustained by a high-density deployment of roadside units and sensor-equipped vehicles, are currently at the edge of next-generation intelligent transportation system evolution. However, offering stable, low-latency, and energy-efficient communication in such heterogeneous and delay-prone environments is challenging due to limited spectral resources and diverse quality of service (QoS) requirements. This paper presents a Priority-Aware Spectrum Management (PASM) scheme for IoT-based vehicular networks. This dynamic spectrum access scheme integrates interweave, underlay, and coexistence modes to optimize spectrum utilization, energy efficiency, and throughput while minimizing blocking and interruption probabilities. The algorithm manages resources efficiently and gives proper attention to each device based on its priority, so all IoT devices, from high to low priority, receive continuous and reliable service. A Continuous-Time Markov Chain (CTMC) model is derived to analyze the proposed algorithm for various network loads. Simulation results indicate improved spectral efficiency, throughput, delay, and overall QoS compliance over conventional access methods. These findings establish that the proposed algorithm is a scalable solution for dynamic V-IoT environments. Full article
(This article belongs to the Special Issue Energy Efficient Design in Wireless Ad Hoc and Sensor Networks)
Show Figures

Figure 1

21 pages, 1847 KiB  
Article
A Certificateless Aggregated Signcryption Scheme Based on Edge Computing in VANETs
by Wenfeng Zou, Qiang Guo and Xiaolan Xie
Electronics 2025, 14(10), 1993; https://doi.org/10.3390/electronics14101993 - 14 May 2025
Viewed by 392
Abstract
The development of Vehicle AD Hoc Networks (VANETs) has significantly enhanced the efficiency of intelligent transportation systems. Through real-time communication between vehicles and roadside units (RSUs), the immediate sharing of traffic information has been achieved. However, challenges such as network congestion, data privacy, [...] Read more.
The development of Vehicle AD Hoc Networks (VANETs) has significantly enhanced the efficiency of intelligent transportation systems. Through real-time communication between vehicles and roadside units (RSUs), the immediate sharing of traffic information has been achieved. However, challenges such as network congestion, data privacy, and low computing efficiency still exist. Data privacy is at risk of leakage due to the sensitivity of vehicle information, especially in a resource-constrained vehicle environment, where computing efficiency becomes a bottleneck restricting the development of VANETs. To address these challenges, this paper proposes a certificateless aggregated signcryption scheme based on edge computing. This scheme integrates online/offline encryption (OOE) technology and a pseudonym mechanism. It not only solves the problem of key escrow, generating part of the private key through collaboration between the user and the Key Generation Center (KGC), but also uses pseudonyms to protect the real identities of the vehicle and RSU, effectively preventing privacy leakage. This scheme eliminates bilinear pairing operations, significantly improves efficiency, and supports conditional traceability and revocation of malicious vehicles while maintaining anonymity. The completeness analysis shows that under the assumptions of calculating the Diffie–Hellman (CDH) and elliptic curve discrete logarithm problem (ECDLP), this scheme can meet the requirements of IND-CCA2 confidentiality and EUF-CMA non-forgeability. The performance evaluation further confirmed that, compared with the existing schemes, this scheme performed well in both computing and communication costs and was highly suitable for the resource-constrained VANET environment. Full article
(This article belongs to the Special Issue Unmanned Aerial Vehicles (UAVs) Communication and Networking)
Show Figures

Figure 1

25 pages, 5444 KiB  
Article
Geospatial Data and Google Street View Images for Monitoring Kudzu Vines in Small and Dispersed Areas
by Alba Closa-Tarres, Fernando Rojano and Michael P. Strager
Earth 2025, 6(2), 40; https://doi.org/10.3390/earth6020040 - 13 May 2025
Viewed by 1505
Abstract
Comprehensive reviews of continuously vegetated areas to determine dispersed locations of invasive species require intensive use of computational resources. Furthermore, effective mechanisms aiding identification of locations of specific invasive species require approaches relying on geospatial indicators and ancillary images. This study develops a [...] Read more.
Comprehensive reviews of continuously vegetated areas to determine dispersed locations of invasive species require intensive use of computational resources. Furthermore, effective mechanisms aiding identification of locations of specific invasive species require approaches relying on geospatial indicators and ancillary images. This study develops a two-stage data workflow for the invasive species Kudzu vine (Pueraria montana) often found in small areas along roadsides. The INHABIT database from the United States Geological Survey (USGS) provided geospatial data of Kudzu vines and Google Street View (GSV) a set of images. Stage one built up a set of Kudzu images to be implemented in an object detection technique, You Only Look Once (YOLO v8s), for training, validating, and testing. Stage two defined a dataset of confirmed locations of Kudzu which was followed to retrieve images from GSV and analyzed with YOLO v8s. The effectiveness of the YOLO v8s model was assessed to determine the locations of Kudzu identified from georeferenced GSV images. This data workflow demonstrated that field observations can be virtually conducted by integrating geospatial data and GSV images; however, its potential is confined to the updated periodicity of GSV images or similar services. Full article
Show Figures

Figure 1

28 pages, 1881 KiB  
Article
Enabling Collaborative Forensic by Design for the Internet of Vehicles
by Ahmed M. Elmisery and Mirela Sertovic
Information 2025, 16(5), 354; https://doi.org/10.3390/info16050354 - 28 Apr 2025
Viewed by 550
Abstract
The progress in automotive technology, communication protocols, and embedded systems has propelled the development of the Internet of Vehicles (IoV). In this system, each vehicle acts as a sophisticated sensing platform that collects environmental and vehicular data. These data assist drivers and infrastructure [...] Read more.
The progress in automotive technology, communication protocols, and embedded systems has propelled the development of the Internet of Vehicles (IoV). In this system, each vehicle acts as a sophisticated sensing platform that collects environmental and vehicular data. These data assist drivers and infrastructure engineers in improving navigation safety, pollution control, and traffic management. Digital artefacts stored within vehicles can serve as critical evidence in road crime investigations. Given the interconnected and autonomous nature of intelligent vehicles, the effective identification of road crimes and the secure collection and preservation of evidence from these vehicles are essential for the successful implementation of the IoV ecosystem. Traditional digital forensics has primarily focused on in-vehicle investigations. This paper addresses the challenges of extending artefact identification to an IoV framework and introduces the Collaborative Forensic Platform for Electronic Artefacts (CFPEA). The CFPEA framework implements a collaborative forensic-by-design mechanism that is designed to securely collect, store, and share artefacts from the IoV environment. It enables individuals and groups to manage artefacts collected by their intelligent vehicles and store them in a non-proprietary format. This approach allows crime investigators and law enforcement agencies to gain access to real-time and highly relevant road crime artefacts that have been previously unknown to them or out of their reach, while enabling vehicle owners to monetise the use of their sensed artefacts. The CFPEA framework assists in identifying pertinent roadside units and evaluating their datasets, enabling the autonomous extraction of evidence for ongoing investigations. Leveraging CFPEA for artefact collection in road crime cases offers significant benefits for solving crimes and conducting thorough investigations. Full article
(This article belongs to the Special Issue Information Sharing and Knowledge Management)
Show Figures

Figure 1

23 pages, 7619 KiB  
Article
A Blockchain-Based Collaborative Storage Scheme for Roadside Unit Clusters in Social Internet of Vehicles
by Dai Hou, Lan Wei, Lei Zheng, Geng Wu, Jiaxing Hu, Chenxi Dong, Xinru Li and Kai Peng
Appl. Sci. 2025, 15(8), 4573; https://doi.org/10.3390/app15084573 - 21 Apr 2025
Viewed by 336
Abstract
With the gradual application of blockchain technology in the domain of Social Internet of Vehicles (SIoV), the increasing volume of blockchain data has imposed significant storage pressure on roadside units (RSUs). Collaborative storage schemes, which organize RSUs into clusters to jointly store content [...] Read more.
With the gradual application of blockchain technology in the domain of Social Internet of Vehicles (SIoV), the increasing volume of blockchain data has imposed significant storage pressure on roadside units (RSUs). Collaborative storage schemes, which organize RSUs into clusters to jointly store content for vehicles, have been explored. However, existing collaborative storage solutions in IoV primarily focus on caching content and are not well-suited to the deployment constraints of blockchain networks. Building on blockchain’s decentralized characteristics and data integrity mechanisms, this paper proposes a collaborative storage scheme that reduces RSU storage loads while sustaining distributed ledger operations in SIoV. Specifically, the RSU Access Preference-based Spectral Clustering Algorithm (RAPSCA) is proposed to address RSU clustering by analyzing both the RSUs’ access preferences for blockchain data and their resource availability. Subsequently, the Vehicle Service Priority-based Greedy Block Allocation Algorithm (VSPGBAA) is devised for intra-cluster storage allocation, which considers vehicles’ dwell times and block access probabilities to reduce overall access costs. Experimental results indicate that, compared to baseline algorithms, the proposed method achieves a 27.7% reduction in cost and a 3.5-fold decrease in execution time, thereby demonstrating the feasibility of collaborative storage optimization in blockchain-enabled SIoV. Full article
(This article belongs to the Special Issue IoT and Edge Computing for Smart Infrastructure and Cybersecurity)
Show Figures

Figure 1

21 pages, 4044 KiB  
Article
FedHSQA: Robust Aggregation in Hierarchical Federated Learning via Anomaly Scoring-Based Adaptive Quantization for IoV
by Ling Xing, Zhaocheng Luo, Kaikai Deng, Honghai Wu, Huahong Ma and Xiaoying Lu
Electronics 2025, 14(8), 1661; https://doi.org/10.3390/electronics14081661 - 19 Apr 2025
Cited by 1 | Viewed by 501
Abstract
Hierarchical Federated Learning (HFL) for the Internet of Vehicles (IoV) leverages roadside units (RSU) to construct a low-latency, highly scalable multilayer cooperative training framework. However, with the rapid growth in the number of vehicle nodes, this framework faces two major challenges: (i) communication [...] Read more.
Hierarchical Federated Learning (HFL) for the Internet of Vehicles (IoV) leverages roadside units (RSU) to construct a low-latency, highly scalable multilayer cooperative training framework. However, with the rapid growth in the number of vehicle nodes, this framework faces two major challenges: (i) communication inefficiency under bandwidth-constrained conditions, where uplink congestion imposes significant burden on intra-framework communication; and (ii) interference from untrustworthy vehicle nodes, which disrupts model training and affects convergence. Therefore, in order to achieve secure aggregation while alleviating the communication bottleneck problem, we design a hierarchical three-layer federated learning framework with Gradient Quantization (GQ) and secure aggregation, called FedHSQA, which further integrates anomaly scoring to enhance robustness against untrustworthy vehicle nodes. Specifically, FedHSQA organizes IoV devices into three layers based on their respective roles: the cloud service layer, the RSU layer, and the vehicle node layer. During each non-initial communication round, the cloud server at the cloud layer computes anomaly scores for vehicle nodes using a Kullback–Leibler (KL) divergence-based multilayer perceptron (MLP) model. These anomaly scores are used to design a secure aggregation algorithm (ASA) that is robust to anomalous behavior. The anomaly scores and the aggregated global model are then transmitted to the RSU. To further reduce communication overhead and maintain model utility, FedHSQA introduces an adaptive GQ method based on the anomaly scores (ASQ). Unlike conventional vehicle node-side quantization, ASQ is performed at the RSU layer. It calculates the Jensen–Shannon (JS) distance between each vehicle node’s anomaly distribution and the target distribution, and adaptively adjusts the quantization level to minimize redundant gradient transmission. We validate the robustness of FedHSQA against anomalous nodes through extensive experiments on three real-world datasets. Compared to classical aggregation algorithms and GQ methods, FedHSQA reduced the average network traffic consumption by approximately 30 times while improving the average accuracy of the aggregation model by about 5.3%. Full article
Show Figures

Figure 1

18 pages, 699 KiB  
Article
Role of Roadside Units in Cluster Head Election and Coverage Maximization for Vehicle Emergency Services
by Ravneet Kaur, Robin Doss, Lei Pan, Chaitanya Singla and Selvarajah Thuseethan
Computers 2025, 14(4), 152; https://doi.org/10.3390/computers14040152 - 18 Apr 2025
Viewed by 354
Abstract
Efficient clustering algorithms are critical for enabling the timely dissemination of emergency messages across maximum coverage areas in vehicular networks. While existing clustering approaches demonstrate stability and scalability, there has been a limited amount of work focused on leveraging roadside units (RSUs) for [...] Read more.
Efficient clustering algorithms are critical for enabling the timely dissemination of emergency messages across maximum coverage areas in vehicular networks. While existing clustering approaches demonstrate stability and scalability, there has been a limited amount of work focused on leveraging roadside units (RSUs) for cluster head selection. This research proposes a novel framework that utilizes RSUs to facilitate cluster head election, mitigating the cluster head selection process, clustering overhead, and broadcast storm problem. The proposed scheme mandates selecting an optimal number of cluster heads to maximize information coverage and prevent traffic congestion, thereby enhancing the quality of service through improved cluster head duration, reduced cluster formation time, expanded coverage area, and decreased overhead. The framework comprises three key components: (I) an acknowledgment-based system for legitimate vehicle entry into the RSU for cluster head selection; (II) an authoritative node behavior mechanism for choosing cluster heads from received notifications; and (III) the role of bridge nodes in maximizing the coverage of the established network. The comparative analysis evaluates the clustering framework’s performance under uniform and non-uniform vehicle speed scenarios for time-barrier-based emergency message dissemination in vehicular ad hoc networks. The results demonstrate that the proposed model’s effectiveness for uniform highway speed scenarios is 100% whereas for non-uniform scenarios 99.55% information coverage is obtained. Furthermore, the clustering process accelerates by over 50%, decreasing overhead and reducing cluster head election time using RSUs. The proposed approach outperforms existing methods for the number of cluster heads, cluster head election time, total cluster formation time, and maximum information coverage across varying vehicle densities. Full article
(This article belongs to the Special Issue Emerging Trends in Machine Learning and Artificial Intelligence)
Show Figures

Figure 1

40 pages, 6881 KiB  
Article
Distributed Reputation for Accurate Vehicle Misbehavior Reporting (DRAMBR)
by Dimah Almani, Tim Muller and Steven Furnell
Future Internet 2025, 17(4), 174; https://doi.org/10.3390/fi17040174 - 15 Apr 2025
Viewed by 532
Abstract
Vehicle-to-Vehicle (V2V) communications technology offers enhanced road safety, traffic efficiency, and connectivity. In V2V, vehicles cooperate by broadcasting safety messages to quickly detect and avoid dangerous situations on time or to avoid and reduce congestion. However, vehicles might misbehave, creating false information and [...] Read more.
Vehicle-to-Vehicle (V2V) communications technology offers enhanced road safety, traffic efficiency, and connectivity. In V2V, vehicles cooperate by broadcasting safety messages to quickly detect and avoid dangerous situations on time or to avoid and reduce congestion. However, vehicles might misbehave, creating false information and sharing it with neighboring vehicles, such as, for example, failing to report an observed accident or falsely reporting one when none exists. If other vehicles detect such misbehavior, they can report it. However, false accusations also constitute misbehavior. In disconnected areas with limited infrastructure, the potential for misbehavior increases due to the scarcity of Roadside Units (RSUs) necessary for verifying the truthfulness of communications. In such a situation, identifying malicious behavior using a standard misbehaving management system is ineffective in areas with limited connectivity. This paper presents a novel mechanism, Distributed Reputation for Accurate Misbehavior Reporting (DRAMBR), offering a fully integrated reputation solution that utilizes reputation to enhance the accuracy of the reporting system by identifying misbehavior in rural networks. The system operates in two phases: offline, using the Local Misbehavior Detection Mechanism (LMDM), where vehicles detect misbehavior and store reports locally, and online, where these reports are sent to a central reputation server. DRAMBR aggregates the reports and integrates DBSCAN for clustering spatial and temporal misbehavior reports, Isolation Forest for anomaly detection, and Gaussian Mixture Models for probabilistic classification of reports. Additionally, Random Forest and XGBoost models are combined to improve decision accuracy. DRAMBR distinguishes between honest mistakes, intentional deception, and malicious reporting. Using an existing mechanism, the updated reputation is available even in an offline environment. Through simulations, we evaluate our proposed reputation system’s performance, demonstrating its effectiveness in achieving a reporting accuracy of approximately 98%. The findings highlight the potential of reputation-based strategies to minimize misbehavior and improve the reliability and security of V2V communications, particularly in rural areas with limited infrastructure, ultimately contributing to safer and more reliable transportation systems. Full article
Show Figures

Figure 1

24 pages, 4412 KiB  
Article
Integrating Vehicle-to-Infrastructure Communication for Safer Lane Changes in Smart Work Zones
by Mariam Nour, Mayar Nour and Mohamed H. Zaki
World Electr. Veh. J. 2025, 16(4), 215; https://doi.org/10.3390/wevj16040215 - 4 Apr 2025
Viewed by 889
Abstract
As transportation systems evolve, ensuring safe and efficient mobility in Intelligent Transportation Systems remains a priority. Work zones, in particular, pose significant safety challenges due to lane closures, which can lead to abrupt braking and sudden lane changes. Most previous research on Connected [...] Read more.
As transportation systems evolve, ensuring safe and efficient mobility in Intelligent Transportation Systems remains a priority. Work zones, in particular, pose significant safety challenges due to lane closures, which can lead to abrupt braking and sudden lane changes. Most previous research on Connected and Autonomous Vehicles (CAVs) assumes ideal communication conditions, overlooking the effects of message loss and network unreliability. This study presents a comprehensive smart work zone (SWZ) framework that enhances lane-change safety by the integration of both Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication. Sensor-equipped SWZ barrels and Roadside Units (RSUs) collect and transmit real-time hazard alerts to approaching CAVs, ensuring coverage of critical roadway segments. In this study, a co-simulation framework combining VEINS, OMNeT++, and SUMO is implemented to assess lane-change safety and communication performance under realistic network conditions. Findings indicate that higher Market Penetration Rates (MPRs) of CAVs can lead to improved lane-change safety, with time-to-collision (TTC) values shifting toward safer time ranges. While lower transmission thresholds allow more frequent communication, they contribute to earlier network congestion, whereas higher thresholds maintain efficiency despite increased packet loss at high MPRs. These insights highlight the importance of incorporating realistic communication models when evaluating traffic safety in connected vehicle environments. Full article
(This article belongs to the Special Issue Vehicle Safe Motion in Mixed Vehicle Technologies Environment)
Show Figures

Figure 1

Back to TopTop