Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (173)

Search Parameters:
Keywords = roadside units (RSU)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2001 KB  
Article
A Unified Fault-Tolerant Batch Authentication Scheme for Vehicular Networks
by Yifan Zhao, Hu Liu, Xinghua Li, Yunwei Wang, Zhe Ren and Peiyao Wang
Electronics 2025, 14(24), 4973; https://doi.org/10.3390/electronics14244973 - 18 Dec 2025
Viewed by 143
Abstract
This paper proposes a unified fault-tolerant batch authentication scheme for vehicular networks, designed to address key limitations in existing approaches, namely the segregation between in-vehicle and V2I authentication scenarios and the lack of fault tolerance in traditional batch authentication methods. Based on a [...] Read more.
This paper proposes a unified fault-tolerant batch authentication scheme for vehicular networks, designed to address key limitations in existing approaches, namely the segregation between in-vehicle and V2I authentication scenarios and the lack of fault tolerance in traditional batch authentication methods. Based on a hardware–software co-design philosophy, the scheme deeply integrates the security features of hardware such as Tamper-Proof Devices (TPDs) and Physical Unclonable Functions (PUFs) with the efficiency of cryptographic primitives like Aggregate Message Authentication Codes (MACs) and the Chinese Remainder Theorem (CRT). It establishes an end-to-end, integrated authentication framework spanning from in-vehicle electronic control units (ECUs) to external roadside units (RSUs), effectively meeting the diverse requirements for secure and efficient authentication among the three core entities involved in Internet of Vehicles (IoV) data collection: in-vehicle ECUs, vehicle gateways, and RSUs. Security analysis demonstrates that the proposed scheme fulfills the necessary security requirements. And extensive experimental results confirm its high efficiency and practical utility. Full article
(This article belongs to the Special Issue Cryptography and Computer Security)
Show Figures

Figure 1

41 pages, 6103 KB  
Article
H-RT-IDPS: A Hierarchical Real-Time Intrusion Detection and Prevention System for the Smart Internet of Vehicles via TinyML-Distilled CNN and Hybrid BiLSTM-XGBoost Models
by Ikram Hamdaoui, Chaymae Rami, Zakaria El Allali and Khalid El Makkaoui
Technologies 2025, 13(12), 572; https://doi.org/10.3390/technologies13120572 - 5 Dec 2025
Viewed by 414
Abstract
The integration of connected vehicles into smart city infrastructure introduces critical cybersecurity challenges for the Internet of Vehicles (IoV), where resource-constrained vehicles and powerful roadside units (RSUs) must collaborate for secure communication. We propose H-RT-IDPS, a hierarchical real-time intrusion detection and prevention system [...] Read more.
The integration of connected vehicles into smart city infrastructure introduces critical cybersecurity challenges for the Internet of Vehicles (IoV), where resource-constrained vehicles and powerful roadside units (RSUs) must collaborate for secure communication. We propose H-RT-IDPS, a hierarchical real-time intrusion detection and prevention system targeting two high-priority IoV security pillars: availability (traffic overload) and integrity/authenticity (spoofing), with spoofing evaluated across multiple subclasses (GAS, RPM, SPEED, and steering wheel). In the offline phase, deep learning and hybrid models were benchmarked on the vehicular CAN bus dataset CICIoV2024, with the BiLSTM-XGBoost hybrid chosen for its balance between accuracy and inference speed. Real-time deployment uses a TinyML-distilled CNN on vehicles for ultra-lightweight, low-latency detection, while RSU-level BiLSTM-XGBoost performs a deeper temporal analysis. A Kafka–Spark Streaming pipeline supports localized classification, prevention, and dashboard-based monitoring. In baseline, stealth, and coordinated modes, the evaluation achieved accuracy, precision, recall, and F1-scores all above 97%. The mean end-to-end inference latency was 148.67 ms, and the resource usage was stable. The framework remains robust in both high-traffic and low-frequency attack scenarios, enhancing operator situational awareness through real-time visualizations. These results demonstrate a scalable, explainable, and operator-focused IDPS well suited for securing SC-IoV deployments against evolving threats. Full article
(This article belongs to the Special Issue Research on Security and Privacy of Data and Networks)
Show Figures

Figure 1

25 pages, 5384 KB  
Article
Reputation-Aware Multi-Agent Cooperative Offloading Mechanism for Vehicular Network Attack Scenarios
by Liping Ye, Na Fan, Junhui Zhang, Yexiong Shang, Yu Shi and Wenjun Fan
Vehicles 2025, 7(4), 150; https://doi.org/10.3390/vehicles7040150 - 4 Dec 2025
Viewed by 218
Abstract
The air–ground integrated Internet of Vehicles (IoV), which incorporates unmanned aerial vehicles (UAVs), is a key component of a three-dimensional intelligent transportation system. Task offloading is crucial to improving the overall efficiency of the IoV. However, blackhole attacks and false-feedback attacks pose significant [...] Read more.
The air–ground integrated Internet of Vehicles (IoV), which incorporates unmanned aerial vehicles (UAVs), is a key component of a three-dimensional intelligent transportation system. Task offloading is crucial to improving the overall efficiency of the IoV. However, blackhole attacks and false-feedback attacks pose significant challenges to achieving secure and efficient offloading for heavily loaded roadside units (RSUs). To address this issue, this paper proposes a reputation-aware, multi-objective task offloading method. First, we define a set of multi-dimensional Quality of Service (QoS) metrics and combine K-means clustering with a lightweight Proximal Policy Optimization variant (Light-PPO) to realize fine-grained classification of offloading data packets. Second, we develop reputation assessment models for heterogeneous entities—RSUs, vehicles, and UAVs—to quantify node trustworthiness; at the same time, we formulate the RSU task offloading problem as a multi-objective optimization problem and employ the Non-dominated Sorting Genetic Algorithm II (NSGA-II) to find optimal offloading strategies. Simulation results show that, under blackhole and false-feedback attack scenarios, the proposed method effectively improves task completion rate and substantially reduces task latency and energy consumption, achieving secure and efficient task offloading. Full article
(This article belongs to the Special Issue V2X Communication)
Show Figures

Figure 1

24 pages, 1403 KB  
Article
Optimizing Urban Travel Time Using Genetic Algorithms for Intelligent Transportation Systems
by Suhail Odeh, Murad Al Rajab, Mahmoud Obaid, Rafik Lasri and Djemel Ziou
AI 2025, 6(12), 315; https://doi.org/10.3390/ai6120315 - 4 Dec 2025
Viewed by 425
Abstract
Urban congestion causes further increases in travel times, fuel consumption and greenhouse-gas emissions. In this regard, we conduct a systematic study of a Genetic Algorithm (GA) for real-time routing in an urban scenario in Bethlehem City, based on a SUMO microsimulation that has [...] Read more.
Urban congestion causes further increases in travel times, fuel consumption and greenhouse-gas emissions. In this regard, we conduct a systematic study of a Genetic Algorithm (GA) for real-time routing in an urban scenario in Bethlehem City, based on a SUMO microsimulation that has been calibrated using real data from the field. Our work makes four main contributions: (i) the implementation of a reproducible GA framework for dynamic routing with explicit constraints and adaptive termination criterion; (ii) design of a weight sensitivity study for studying a multi term fitness function with travel time and waiting time, and optionally fuel usage; (iii) an edge-assisted distributed architecture on roadside units (RSUs) supported by cloud services; and (iv) specifying and refining the data set description and experimental protocol with a planned statistical analysis. Empirical evidence from the Bethlehem case study shows a consistent decline in total travel time under high congestion cases. Variations in the waiting time between different scenarios are exhibited, reflecting the trade-offs in the fitness weighting scheme. We recognize that we have some limitations, including the manual resolution of data and the inherent problem of differences between simulations and real world, and we are proposing a road-map towards a pilot deployment that handles these issues. Rather than proposing a new GA variant, we present a deployment-oriented framework-an edge- assisted GA with explicit protocols and a latency envelope, and a reproducible multi-objective tuning procedure validated on a city-scale network under severe congestion. Full article
(This article belongs to the Section AI Systems: Theory and Applications)
Show Figures

Figure 1

22 pages, 408 KB  
Article
Many-Objective Edge Computing Server Deployment Optimization for Vehicle Road Cooperation
by Shanshan Fan and Bin Cao
Appl. Sci. 2025, 15(22), 12240; https://doi.org/10.3390/app152212240 - 18 Nov 2025
Viewed by 316
Abstract
In the Internet of Vehicles (IoV), vehicles need to process a large amount of perception data to support tasks such as road navigation and autonomous driving. However, their computational resources are limited. Therefore, it is necessary to explore the combination of vehicle–road cooperation [...] Read more.
In the Internet of Vehicles (IoV), vehicles need to process a large amount of perception data to support tasks such as road navigation and autonomous driving. However, their computational resources are limited. Therefore, it is necessary to explore the combination of vehicle–road cooperation with edge computing. Roadside units (RSUs) can provide data access services for vehicles, and deploying edge servers on RSUs can improve the data processing capability in IoV environments and ensure the sustainability of vehicle communications, thus supporting complex traffic scenarios more effectively. In this work, we study the deployment of RSUs in vehicle–road cooperative systems. To balance the deployment cost of RSUs and the quality of service (QoS) of vehicle users, we propose an RSU deployment optimization model with six objectives, including time delay, energy consumption and security when vehicles offload their tasks to RSUs, as well as load balancing and the number and communication coverage area of RSUs. In addition, we propose a Wasserstein generative adversarial network (WGAN)-based Two_Arch2 (WGTwo_Arch2) to solve this many-objective optimization problem to better ensure the diversity and convergence of the solutions. In addition, a polynomial variation strategy based on Lecy’s flight mechanism and a diversity archive selection strategy with an adaptive Lp-norm are also proposed to balance the exploratory and exploitative capabilities of the algorithm. The effectiveness of the proposed algorithm WGTwo_Arch2 for 6-objective RSU deployment optimization is verified by comparisons with five different algorithms. Full article
Show Figures

Figure 1

27 pages, 2847 KB  
Article
Hierarchical Beamforming Optimization for ISAC-Enabled RSU Systems in Complex Urban Environments
by Zhiyuan You, Na Lv, Guimei Zheng and Xiang Wang
Sensors 2025, 25(21), 6803; https://doi.org/10.3390/s25216803 - 6 Nov 2025
Viewed by 498
Abstract
Integrated Sensing and Communication (ISAC)-enabled Roadside Units (RSUs) encounter significant performance trade-offs between target sensing and multi-user communication in complex urban environments, where conventional optimization methods are prone to converging to local optima and joint optimization methods often yield sub-optimal results due to [...] Read more.
Integrated Sensing and Communication (ISAC)-enabled Roadside Units (RSUs) encounter significant performance trade-offs between target sensing and multi-user communication in complex urban environments, where conventional optimization methods are prone to converging to local optima and joint optimization methods often yield sub-optimal results due to conflicting objectives. To address the challenge of trade-off between sensing and communication performance, this paper proposes a hierarchical beamforming optimization solution designed to tackle joint sensing–communication problems in such scenarios. The overall optimization problem is decomposed into a two-level “leader-follower” structure. In the leader layer, we introduce a max–min strategy based on the bisection method to transform the non-convex Signal-to-Interference-plus-Noise Ratio (SINR) optimization problem into a second-order cone constraint problem and solve the communication beamforming vector. In the follower layer, the Signal-to-Clutter-plus-Noise Ratio (SCNR) maximization problem is converted into a Semi-Definite Programming (SDP) problem solved via the CVX toolbox. Additionally, we introduce a “spatiotemporal resource isolation” mechanism to project the sensing beam onto the null space of the communication channel. The hierarchical optimization solution jointly optimizes communication SINR and sensing SCNR, enabling an effective balance between sensing accuracy and communication reliability. Simulation results demonstrate the proposed method’s effectiveness in simultaneously improving sensing accuracy and communication reliability. Full article
(This article belongs to the Special Issue Integrated Sensing and Communication in IoT Applications)
Show Figures

Figure 1

27 pages, 4763 KB  
Article
Lightweight Reinforcement Learning for Priority-Aware Spectrum Management in Vehicular IoT Networks
by Adeel Iqbal, Ali Nauman and Tahir Khurshaid
Sensors 2025, 25(21), 6777; https://doi.org/10.3390/s25216777 - 5 Nov 2025
Viewed by 598
Abstract
The Vehicular Internet of Things (V-IoT) has emerged as a cornerstone of next-generation intelligent transportation systems (ITSs), enabling applications ranging from safety-critical collision avoidance and cooperative awareness to infotainment and fleet management. These heterogeneous services impose stringent quality-of-service (QoS) demands for latency, reliability, [...] Read more.
The Vehicular Internet of Things (V-IoT) has emerged as a cornerstone of next-generation intelligent transportation systems (ITSs), enabling applications ranging from safety-critical collision avoidance and cooperative awareness to infotainment and fleet management. These heterogeneous services impose stringent quality-of-service (QoS) demands for latency, reliability, and fairness while competing for limited and dynamically varying spectrum resources. Conventional schedulers, such as round-robin or static priority queues, lack adaptability, whereas deep reinforcement learning (DRL) solutions, though powerful, remain computationally intensive and unsuitable for real-time roadside unit (RSU) deployment. This paper proposes a lightweight and interpretable reinforcement learning (RL)-based spectrum management framework for Vehicular Internet of Things (V-IoT) networks. Two enhanced Q-Learning variants are introduced: a Value-Prioritized Action Double Q-Learning with Constraints (VPADQ-C) algorithm that enforces reliability and blocking constraints through a Constrained Markov Decision Process (CMDP) with online primal–dual optimization, and a contextual Q-Learning with Upper Confidence Bound (Q-UCB) method that integrates uncertainty-aware exploration and a Success-Rate Prior (SRP) to accelerate convergence. A Risk-Aware Heuristic baseline is also designed as a transparent, low-complexity benchmark to illustrate the interpretability–performance trade-off between rule-based and learning-driven approaches. A comprehensive simulation framework incorporating heterogeneous traffic classes, physical-layer fading, and energy-consumption dynamics is developed to evaluate throughput, delay, blocking probability, fairness, and energy efficiency. The results demonstrate that the proposed methods consistently outperform conventional Q-Learning and Double Q-Learning methods. VPADQ-C achieves the highest energy efficiency (≈8.425×107 bits/J) and reduces interruption probability by over 60%, while Q-UCB achieves the fastest convergence (within ≈190 episodes), lowest blocking probability (≈0.0135), and lowest mean delay (≈0.351 ms). Both schemes maintain fairness near 0.364, preserve throughput around 28 Mbps, and exhibit sublinear training-time scaling with O(1) per-update complexity and O(N2) overall runtime growth. Scalability analysis confirms that the proposed frameworks sustain URLLC-grade latency (<0.2 ms) and reliability under dense vehicular loads, validating their suitability for real-time, large-scale V-IoT deployments. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

24 pages, 11759 KB  
Review
Data Sources for Traffic Analysis in Urban Canyons—The Comprehensive Literature Review
by Michał Zawodny and Maciej Kruszyna
Appl. Sci. 2025, 15(19), 10686; https://doi.org/10.3390/app151910686 - 3 Oct 2025
Viewed by 1294
Abstract
We propose a comprehensive literature review based on big data and V2X research to find promising tools to detect vehicles for traffic research and provide safe autonomous vehicle (AV) traffic. Presented data sources can provide real-time data for V2X systems and offline databases [...] Read more.
We propose a comprehensive literature review based on big data and V2X research to find promising tools to detect vehicles for traffic research and provide safe autonomous vehicle (AV) traffic. Presented data sources can provide real-time data for V2X systems and offline databases from VATnets for micro- and macro-modeling in traffic research. The authors want to present a set of sources that are not based on GNSS and other systems that could be interrupted by high-rise buildings and dense smart city infrastructure, as well as review of big data sources in traffic modeling that can be useful in future traffic research. Both reviews findings are summarized in tables at the end of the review sections of the paper. The authors added propositions in the form of two hypotheses on how traffic models can obtain data in the urban canyon connected environment scenario. The first hypothesis uses Roadside Units (RSUs) to retrieve data in similar ways to cellular data in traffic research and proves that this source is data rich. The second one acknowledges Bluetooth/Wi-Fi scanners’ research potential in V2X environments. Full article
(This article belongs to the Special Issue Mapping and Localization for Intelligent Vehicles in Urban Canyons)
Show Figures

Figure 1

35 pages, 6608 KB  
Article
BcDKM: Blockchain-Based Dynamic Key Management Scheme for Crowd Sensing in Vehicular Sensor Networks
by Mingrui Zhang, Ru Meng and Lei Zhang
Sensors 2025, 25(18), 5699; https://doi.org/10.3390/s25185699 - 12 Sep 2025
Viewed by 599
Abstract
Vehicular sensor networks (VSNs) consist of vehicles equipped with various sensing devices, such as LiDAR. In a VSN, vehicles and/or roadside units (RSUs) can be organized into a vehicular cloud (VC) to enable the sharing of sensing and computational resources among participants, thereby [...] Read more.
Vehicular sensor networks (VSNs) consist of vehicles equipped with various sensing devices, such as LiDAR. In a VSN, vehicles and/or roadside units (RSUs) can be organized into a vehicular cloud (VC) to enable the sharing of sensing and computational resources among participants, thereby supporting crowd-sensing applications. However, the highly dynamic nature of vehicular mobility poses significant challenges in terms of establishing secure and scalable group communication within the VC. To address these challenges, we first introduce a lightweight extension of the continuous group key agreement (CGKA) scheme by incorporating an administrator mechanism. The resulting scheme, referred to as CGKAwAM, supports the designation of multiple administrators within a single group for flexible member management. Building upon CGKAwAM, we propose a blockchain-based dynamic key management scheme, termed BcDKM. This scheme supports asynchronous join and leave operations while achieving communication round optimality. Furthermore, RSUs are leveraged as blockchain nodes to enable decentralized VC discovery and management, ensuring scalability without relying on a centralized server. We formally analyze the security of both CGKAwAM and BcDKM. The results demonstrate that the proposed scheme satisfies several critical security properties, including known-key security, forward secrecy, post-compromise security, and vehicle privacy. Experimental evaluations further confirm that BcDKM is practical and achieves a well-balanced tradeoff between security and performance. Full article
(This article belongs to the Special Issue Advanced Vehicular Ad Hoc Networks: 2nd Edition)
Show Figures

Figure 1

31 pages, 5528 KB  
Article
Gradient-Based Time-Extended Potential Field Method for Real-Time Path Planning in Infrastructure-Based Cooperative Driving Systems
by Jakyung Ko and Inchul Yang
Sensors 2025, 25(17), 5601; https://doi.org/10.3390/s25175601 - 8 Sep 2025
Viewed by 894
Abstract
This study proposes a real-time path generation method called the Gradient-based Time-extended Potential Field (GT-PF) for cooperative autonomous driving environments. The proposed approach models the road environment and dynamic obstacles as a time-variant potential field and generates safe and feasible paths by tracing [...] Read more.
This study proposes a real-time path generation method called the Gradient-based Time-extended Potential Field (GT-PF) for cooperative autonomous driving environments. The proposed approach models the road environment and dynamic obstacles as a time-variant potential field and generates safe and feasible paths by tracing the negative gradient of the field, which corresponds to the direction of steepest descent. In contrast to conventional sampling-based or optimization-based methods, the proposed PF framework enables lightweight computation and continuous trajectory generation in spatiotemporal domains. Furthermore, a velocity-oriented bias is introduced in the PF formulation to ensure that the generated paths satisfy the vehicle’s kinematic constraints and desired cruising behavior. The effectiveness of the proposed method is verified through comparative simulations against a sampling-based Rapidly exploring Random Tree (RRT) planner. Results demonstrate that the GT-PF approach exhibits superior performance in terms of runtime efficiency and safety. The system is particularly suitable for RSU (Roadside Unit)-based infrastructure control in real-time traffic environments. Future work includes the extension to complex urban scenarios, integration with multi-agent planning frameworks, and deployment in sensor-fused cooperative perception systems. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

19 pages, 1956 KB  
Article
Geohash-Based High-Definition Map Provisioning System Using Smart RSU
by Wangyu Park, Jimin Lee and Changjoo Moon
Sensors 2025, 25(17), 5509; https://doi.org/10.3390/s25175509 - 4 Sep 2025
Viewed by 1312
Abstract
High-definition (HD) maps are essential for safe and reliable autonomous driving, but their growing size and the need for real-time updates pose significant challenges for in-vehicle storage and communication efficiency. This study proposes a lightweight and scalable HD map provisioning system based on [...] Read more.
High-definition (HD) maps are essential for safe and reliable autonomous driving, but their growing size and the need for real-time updates pose significant challenges for in-vehicle storage and communication efficiency. This study proposes a lightweight and scalable HD map provisioning system based on Geohash spatial indexing and Smart Roadside Units (Smart RSUs). The system divides HD map data into Geohash-based spatial blocks and enables vehicles to request only the map segments corresponding to their current location, reducing storage burden and communication load. To validate the system’s effectiveness, we constructed a simulation environment where multiple vehicle clients simultaneously request map data from a Smart RSU. Experimental results showed that the proposed Geohash-based approach achieved an average response time (RTT) of 1244.82 ms—approximately 296.3% faster than the conventional GPS-based spatial query method—and improved database query performance by 1072.6%. Additionally, we demonstrate the system’s scalability by adjusting Geohash levels according to road density, using finer blocks in urban areas and coarser blocks in rural areas. The hierarchical nature of Geohash also enables consistent integration of blocks with different resolutions. These results confirm that the proposed method provides an efficient and real-time HD map delivery framework suitable for dynamic and dense traffic environments. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

35 pages, 2863 KB  
Article
DeepSIGNAL-ITS—Deep Learning Signal Intelligence for Adaptive Traffic Signal Control in Intelligent Transportation Systems
by Mirabela Melinda Medvei, Alin-Viorel Bordei, Ștefania Loredana Niță and Nicolae Țăpuș
Appl. Sci. 2025, 15(17), 9396; https://doi.org/10.3390/app15179396 - 27 Aug 2025
Viewed by 1815
Abstract
Urban traffic congestion remains a major contributor to vehicle emissions and travel inefficiency, prompting the need for adaptive and intelligent traffic management systems. In response, we introduce DeepSIGNAL-ITS (Deep Learning Signal Intelligence for Adaptive Lights in Intelligent Transportation Systems), a unified framework that [...] Read more.
Urban traffic congestion remains a major contributor to vehicle emissions and travel inefficiency, prompting the need for adaptive and intelligent traffic management systems. In response, we introduce DeepSIGNAL-ITS (Deep Learning Signal Intelligence for Adaptive Lights in Intelligent Transportation Systems), a unified framework that leverages real-time traffic perception and learning-based control to optimize signal timing and reduce congestion. The system integrates vehicle detection via the YOLOv8 architecture at roadside units (RSUs) and manages signal control using Proximal Policy Optimization (PPO), guided by global traffic indicators such as accumulated vehicle waiting time. Secure communication between RSUs and cloud infrastructure is ensured through Transport Layer Security (TLS)-encrypted data exchange. We validate the framework through extensive simulations in SUMO across diverse urban settings. Simulation results show an average 30.20% reduction in vehicle waiting time at signalized intersections compared to baseline fixed-time configurations derived from OpenStreetMap (OSM). Furthermore, emissions assessed via the HBEFA-based model in SUMO reveal measurable reductions across pollutant categories, underscoring the framework’s dual potential to improve both traffic efficiency and environmental sustainability in simulated urban environments. Full article
(This article belongs to the Section Transportation and Future Mobility)
Show Figures

Figure 1

31 pages, 1321 KB  
Article
A Method for Fault Tolerance of AES Encryption Systems Focused on Improving the Cybersecurity of VANET Through the Use of Residue Codes
by Igor Anatolyevich Kalmykov, Alexandr Anatolyevich Olenev, Daniil Vyacheslavovich Dukhovnyj, Igor Alexandrovich Provornov and Vladimir Sergeyevich Slyadnev
World Electr. Veh. J. 2025, 16(8), 462; https://doi.org/10.3390/wevj16080462 - 13 Aug 2025
Viewed by 726
Abstract
The problem of cybersecurity of vehicular ad hoc network (VANET) is far from being fully solved. This is due to the fact that when exchanging data between On Board Units (OBUs) and Roadside Units (RSUs) a wireless channel is used, which is subject [...] Read more.
The problem of cybersecurity of vehicular ad hoc network (VANET) is far from being fully solved. This is due to the fact that when exchanging data between On Board Units (OBUs) and Roadside Units (RSUs) a wireless channel is used, which is subject to many cyberattacks. It is known that the use of encryption algorithms, particularly Advanced Encryption Standard (AES), can effectively counter many of them. However, during the operation of AES encryption systems, failures may occur, as a result of which closed communication channels may become open and accessible to attackers. Therefore, giving the property of fault tolerance to the used encryption systems is an urgent task. To solve this problem, the article proposes to use redundant residue codes in the polynomial ring (RCPR). The article describes a method of providing fault tolerance of AES encryption systems based on RCPR. Using the developed error correction algorithm for RCPR with one control module, the redundant RCPR can detect 100% of single and double errors, as well as correct 100% of single and 75% of double errors that occur during encryption and decryption. Thus, the developed method based on error correction of AES encryption system allows to parry cyberattacks on vehicles and ensure a higher level of cyber security of VANET. Full article
Show Figures

Figure 1

24 pages, 1486 KB  
Article
Improving Vehicular Network Authentication with Teegraph: A Hashgraph-Based Efficiency Approach
by Rubén Juárez Cádiz, Ruben Nicolas-Sans and José Fernández Tamámes
Sensors 2025, 25(15), 4856; https://doi.org/10.3390/s25154856 - 7 Aug 2025
Cited by 1 | Viewed by 674
Abstract
Vehicular ad hoc networks (VANETs) are a critical aspect of intelligent transportation systems, improving safety and comfort for drivers. These networks enhance the driving experience by offering timely information vital for safety and comfort. Yet, VANETs come with their own set of challenges [...] Read more.
Vehicular ad hoc networks (VANETs) are a critical aspect of intelligent transportation systems, improving safety and comfort for drivers. These networks enhance the driving experience by offering timely information vital for safety and comfort. Yet, VANETs come with their own set of challenges concerning security, privacy, and design reliability. Traditionally, vehicle authentication occurs every time a vehicle enters the domain of the roadside unit (RSU). In our study, we suggest that authentication should take place only when a vehicle has not covered a set distance, increasing system efficiency. The rise of the Internet of Things (IoT) has seen an upsurge in the use of IoT devices across various fields, including smart cities, healthcare, and vehicular IoT. These devices, while gathering environmental data and networking, often face reliability issues without a trusted intermediary. Our study delves deep into implementing Teegraph in VANETs to enhance authentication. Given the integral role of VANETs in Intelligent Transportation Systems and their inherent challenges, we turn to Hashgraph—an alternative to blockchain. Hashgraph offers a decentralized, secure, and trustworthy database. We introduce an efficient authentication system, which triggers only when a vehicle has not traversed a set distance, optimizing system efficiency. Moreover, we shed light on the indispensable role Hashgraph can occupy in the rapidly expanding IoT landscape. Lastly, we present Teegraph, a novel Hashgraph-based technology, as a superior alternative to blockchain, ensuring a streamlined, scalable authentication solution. Our approach leverages the logical key hierarchy (LKH) and packet update keys to ensure data privacy and integrity in vehicular networks. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

25 pages, 19197 KB  
Article
Empirical Evaluation of TLS-Enhanced MQTT on IoT Devices for V2X Use Cases
by Nikolaos Orestis Gavriilidis, Spyros T. Halkidis and Sophia Petridou
Appl. Sci. 2025, 15(15), 8398; https://doi.org/10.3390/app15158398 - 29 Jul 2025
Cited by 2 | Viewed by 3373
Abstract
The rapid growth of Internet of Things (IoT) deployment has led to an unprecedented volume of interconnected, resource-constrained devices. Securing their communication is essential, especially in vehicular environments, where sensitive data exchange requires robust authentication, integrity, and confidentiality guarantees. In this paper, we [...] Read more.
The rapid growth of Internet of Things (IoT) deployment has led to an unprecedented volume of interconnected, resource-constrained devices. Securing their communication is essential, especially in vehicular environments, where sensitive data exchange requires robust authentication, integrity, and confidentiality guarantees. In this paper, we present an empirical evaluation of TLS (Transport Layer Security)-enhanced MQTT (Message Queuing Telemetry Transport) on low-cost, quad-core Cortex-A72 ARMv8 boards, specifically the Raspberry Pi 4B, commonly used as prototyping platforms for On-Board Units (OBUs) and Road-Side Units (RSUs). Three MQTT entities, namely, the broker, the publisher, and the subscriber, are deployed, utilizing Elliptic Curve Cryptography (ECC) for key exchange and authentication and employing the AES_256_GCM and ChaCha20_Poly1305 ciphers for confidentiality via appropriately selected libraries. We quantify resource consumption in terms of CPU utilization, execution time, energy usage, memory footprint, and goodput across TLS phases, cipher suites, message packaging strategies, and both Ethernet and WiFi interfaces. Our results show that (i) TLS 1.3-enhanced MQTT is feasible on Raspberry Pi 4B devices, though it introduces non-negligible resource overheads; (ii) batching messages into fewer, larger packets reduces transmission cost and latency; and (iii) ChaCha20_Poly1305 outperforms AES_256_GCM, particularly in wireless scenarios, making it the preferred choice for resource- and latency-sensitive V2X applications. These findings provide actionable recommendations for deploying secure MQTT communication on an IoT platform. Full article
(This article belongs to the Special Issue Cryptography in Data Protection and Privacy-Enhancing Technologies)
Show Figures

Figure 1

Back to TopTop