Article
Chemistry, Analytical
Nyi Nyi Linn, Kai Liu, Qiang Gao
Summary: In this paper, a distributed contention-free cooperative medium access control (CFC-MAC) protocol is proposed to reduce heterogenous collisions and unintended access delay in stochastic traffic scenarios. A cooperative communication system model, cooperative forwarding mechanism, and vectorized trajectory estimation mechanism are developed to explore the optimum road path between the source and destination and suppress merging collisions. Performance analysis and simulation results show that the proposed protocol outperforms existing solutions in terms of access delay and collision rate.
Article
Engineering, Civil
Shengchu Wang, Xianbo Jiang
Summary: In this paper, a three-dimensional universal cooperative localizer (3D UCL) is proposed for vehicular ad-hoc networks (VANETs), and a 3D geographical information enhanced UCL (3D GIE-UCL) is developed by combining 3D UCL with a NLOS identification mechanism assisted by geographical information. Both 3D UCL and 3D GIE-UCL show significant improvement in positioning performance after the application of acceleration techniques.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2021)
Article
Telecommunications
Jahnvi Tiwari, Arun Prakash, Rajeev Tripathi, Kshirasagar Naik
Summary: Advancements in intelligent transportation require a dependable MAC protocol for high-priority safety broadcasts. This paper presents a Fair and Cooperative MAC protocol for heterogeneous CR-VANETs (FCCR-MAC) that improves system performance and fairness through cooperation and better resource allocation.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2022)
Article
Telecommunications
Jahnvi Tiwari, Arun Prakash, Rajeev Tripathi
Summary: This paper proposes a novel cooperative MAC protocol for safety applications, which enables proactive channel switching through collaboration and channel status report exchange. CCRV shows advantages in throughput, packet delivery ratio, and average delay, reducing the average delay by 37% compared to existing methods.
VEHICULAR COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Azzam Mourad, Hanine Tout, Omar Abdel Wahab, Hadi Otrok, Toufic Dbouk
Summary: The article discusses the challenges of intrusion detection in Internet of Vehicles and vehicular networks, and proposes a vehicular-edge computing (VEC) fog-enabled scheme to offload intrusion detection tasks with minimal latency. The scheme aims to maximize offloading survivability while minimizing computation execution time and energy consumption.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Tao Wang, Li Kang, Jiang Duan
Summary: The paper proposes a dynamic fine-grained access control scheme based on ABE to ensure vehicle network security, achieving secure and efficient dynamic access control in VANETs. Performance analysis and simulation evaluations show that the algorithm is more efficient in terms of computational delay and communication overhead compared to existing schemes.
Article
Chemistry, Analytical
Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Rui Fu, Ki-Hwan Kim, Young-Sil Lee, Byung-Gook Lee, Sang-Gon Lee, Hoon-Jae Lee
Summary: The evolution of the internet has led to the growth of smart application requirements in VANET. However, this also induces security vulnerabilities, requiring effective security and authentication mechanisms to prevent intruders. Cryptography-based methods aid in preserving user privacy, but existing models come with communication and key management overhead.
Review
Telecommunications
Suchi Johari, M. Bala Krishna
Summary: Vehicular ad hoc networks play a critical role in intelligent transportation systems, particularly in message delivery and protocols. TDMA MAC protocols address issues such as link failures and load imbalance in the network by reducing message collisions and ensuring secure message delivery.
VEHICULAR COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Mohsen Rafiee, Rasool Sadeghi, Sayed Mahdi Faghih Imani
Summary: The paper proposes two multi-objective CMAC protocols: FCGMAC and EECMAC, which respectively improve spectrum efficiency and fairness, as well as energy efficiency and spectrum efficiency. Simulation results show the improvement of network performance.
Article
Engineering, Civil
Xiaomei Qu, Tao Liu, Fan Li, Wenrong Tan
Summary: This paper proposes an improved method to enhance the localization accuracy of vehicles in static scenes by fusing GNSS and relative range information. Through iterative solving of an approximate quadratic programming problem, the algorithm can achieve a global optimal solution and reach the Cramer-Rao lower bound in terms of mean squared error. Compared to existing linearized weighted least-squares and semidefinite relaxation methods, the proposed method outperforms in localization accuracy while exhibiting moderate computational complexity.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Review
Engineering, Electrical & Electronic
Muhammad Yeasir Arafat, Sabitri Poudel, Sangman Moh
Summary: This study extensively investigates existing MAC protocols for FANETs, focusing on design issues, characteristics, advantages, and limitations of the protocols. The MAC protocols are qualitatively compared in terms of major features, characteristics, and performance factors. Open issues and research challenges are summarized and discussed.
IEEE SENSORS JOURNAL
(2021)
Article
Chemistry, Analytical
A. F. M. Suaib Akhter, Mohiuddin Ahmed, A. F. M. Shahen Shah, Adnan Anwar, A. S. M. Kayes, Ahmet Zengin
Summary: Cooperative communication protocols are effective in enhancing the reliability and transmission range of VANET, but identity verification and communication security must be ensured. A blockchain-based secure authentication protocol is proposed for IoV to optimize system throughput, reduce PDR and delay, suitable for IoVs with limited resources.
Article
Computer Science, Hardware & Architecture
Fillipe Santos, Andre L. L. Aquino, Edmundo R. M. Madeira, Raquel S. Cabral
Summary: This study proposed a method using both temporal graphs and temporal measures to model VANETs applications, with comparison showing that the aggregated model is inefficient in modeling the temporal aspects. Network evaluation through simulation revealed the impact of temporal modeling on RSUs deployment, demonstrating that temporal measures had better coverage area results.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Mathematics, Interdisciplinary Applications
Noor Mast, Muhammad Altaf Khan, M. Irfan Uddin, Syed Atif Ali Shah, Atif Khan, Mahmoud Ahmad Al-Khasawneh, Marwan Mahmoud
Summary: This paper presents a routing protocol named CCBR which aims to increase packet delivery ratio, reduce packet delay, and routing overhead by minimizing channel contention in WANETs. Performance study based on NS2 shows that CCBR outperforms AODV by 4% to 9% in terms of packet delivery ratio, end-to-end delay, and routing overhead.
Article
Computer Science, Information Systems
Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, Christian Esposito
Summary: This paper proposes a novel routing protocol for vehicular ad hoc networks, called trustworthiness evaluation-based routing protocol (TERP), which calculates the trustworthiness of each individual using cloud computing and selects reliable forward nodes based on the trustworthiness to complete the route. The simulation results show that the protocol has good performance in terms of packet delivery ratio, normalized routing overhead, and average end-to-end delay.
IEEE TRANSACTIONS ON BIG DATA
(2022)
Article
Telecommunications
Jahnvi Tiwari, Arun Prakash, Rajeev Tripathi
Summary: This paper proposes a novel cooperative MAC protocol for safety applications, which enables proactive channel switching through collaboration and channel status report exchange. CCRV shows advantages in throughput, packet delivery ratio, and average delay, reducing the average delay by 37% compared to existing methods.
VEHICULAR COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Jahnvi Tiwari, Madhuri Purna, Arun Prakash, Rajeev Tripathi
Summary: This research proposes a spatially distributed multichannel MAC protocol based on spatial hybrid division multiple access and time division multiple access for solving data transmission issues in vehicular ad hoc networks. By employing frequency reuse, collision avoidance, and intelligent channel frame structure management, the protocol effectively improves the efficiency and reliability of data transmission. Experimental results demonstrate that compared to current MAC protocols, this proposed protocol significantly reduces latency and improves packet delivery ratio and throughput.
INTERNATIONAL JOURNAL OF ELECTRONICS
(2023)
Article
Telecommunications
Jahnvi Tiwari, Arun Prakash, Rajeev Tripathi, Kshirasagar Naik
Summary: Advancements in intelligent transportation require a dependable MAC protocol for high-priority safety broadcasts. This paper presents a Fair and Cooperative MAC protocol for heterogeneous CR-VANETs (FCCR-MAC) that improves system performance and fairness through cooperation and better resource allocation.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2022)
Article
Computer Science, Information Systems
Muna Al-Hawawreh, Nour Moustafa
Summary: Cyber-physical control loops are crucial in the industrial Internet of Things, but vulnerable to attacks. This study proposes an AI-based attack intelligence framework for identifying and extracting attack intelligence, and demonstrates its effectiveness using a real-world case.
Article
Computer Science, Information Systems
Youcef Azzoug, Abdelmadjid Boukra
Summary: This paper presents a novel JBR routing protocol based on swarm-inspired optimization to reduce data packet loss and introduces a concept of route stability to predict the stability degree of road segments.
Article
Computer Science, Information Systems
Paulo Cesar Prandel, Priscila Solis Barreto
Summary: This study proposes two stateful techniques, LGFS-C and LGFS-C-peak, which optimize AoI metrics by making conditional preemption decisions on packets based on system state variables. Experimental results show that both techniques achieve better optimization results than the state-of-the-art techniques and may improve CPS performance.
Article
Computer Science, Information Systems
Michele Girolami, Davide La Rosa, Paolo Barsocchi
Summary: In this work, a CrowdSensing-based proximity detection technique for visitors in an indoor museum is proposed and investigated. The technique utilizes data collected from users' smartphones, which can collect and upload Received Signal Strength (RSS) values of nearby Bluetooth tags to a backend server along with context-information. Experimental results show a clear improvement in performance when data from the crowd are exploited with the proposed architecture.
Review
Computer Science, Information Systems
Nazli Tekin, Ahmet Aris, Abbas Acar, Selcuk Uluagac, Vehbi Cagri Gungor
Summary: This paper provides a review of existing studies on energy consumption of on-device machine learning models for IoT applications. It introduces a taxonomy to define approaches for energy-aware on-device ML models and discusses open issues for further research in this field.
Article
Computer Science, Information Systems
Yangyang Li, Lei Feng, Yang Yang, Wenjing Li
Summary: This study investigates a task offloading scheme and trajectory optimization in a multi-UAV-assisted system and proposes a heterogeneous multi-agent reinforcement learning-based approach. By training with generated environment states offline, the algorithm's performance is optimized, resulting in superior energy consumption and task latency.
Article
Computer Science, Information Systems
Xinrong Zhang, Ye-Hwa Chen, Dongsheng Zhang, Ruiying Zhao, Lei Guo
Summary: This paper proposes a game-theoretic method based on constraint following theory to enhance the control resilience of cyber-physical systems. It addresses the uncertainties, mechanical constraints, and cyberattacks that these systems may encounter. Experimental results demonstrate the resilience of the controlled system against cyberattack disturbances and other threat attacks, and simulations verify the superiority of the optimal control design parameter.
Article
Computer Science, Information Systems
Shahaf Yamin, Haim H. Permuter
Summary: This study examines the problem of downlink wireless routing in integrated access backhaul (IAB) networks and proposes a multi-agent reinforcement learning algorithm for joint routing optimization. Experimental results demonstrate the effectiveness of the algorithm in achieving near-centralized performance.
Article
Computer Science, Information Systems
Phuong T. Tran, Le Thi Thanh Huyen, Ba Cao Nguyen, Huu Minh Nguyen, Tran Manh Hoang
Summary: This paper introduces and investigates a system utilizing an unmanned aerial vehicle (UAV) to assist terrestrial backscattering devices (BDs) in wireless energy charging and data transmission. The study considers energy efficiency (EE) and age-of-information (AoI) in performance assessment, and solves an optimization problem to maximize EE and minimize transmit power. Analytical and simulation results show that optimizing packet length and UAV altitude can achieve the best performance.
Article
Computer Science, Information Systems
Mohammed Aissaoui, Chiraz Houaidia, Adrien Van Den Bossche, Thierry Val, Leila Azouz Saidane
Summary: This paper proposes a distributed MAC protocol that supports PNC in static multi-hop wireless networks. The protocol's advantages over conventional CSMA/CA and PNCOPP MAC protocols are demonstrated through practical testing and numerical results.
Article
Computer Science, Information Systems
Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, Arun Narayanan, Subham Sahoo, Pedro H. J. Nardelli
Summary: This paper presents a novel framework for intrusion detection in the Internet of Vehicles environment, specifically designed to detect cyberattacks on vehicles. The proposed system uses machine learning to detect abnormal behavior by analyzing network traffic. Experimental results demonstrate the effectiveness of the system in terms of accuracy and speed.
Article
Computer Science, Information Systems
Xue Li, Xiaojuan Chen, Guohua Li
Summary: This study proposes a two-tier cooperative edge network model for Power Internet of Things (PIoT) and introduces a fairness indicator based on the Theil index. By formulating a fairness and delay guaranteed task offloading and load balancing optimization problem, the research demonstrates that cooperation at the edge can significantly improve the performance of PIoT.
Article
Computer Science, Information Systems
Kun Yang, Peng Sun, Dingkang Yang, Jieyu Lin, Azzedine Boukerche, Liang Song
Summary: The focus of this research is to effectively coordinate the limited computing power of various components in intelligent transportation systems (ITS) and provide reliable support for resource-intensive applications through efficient resource allocation methods in the highly dynamic Internet-of-Vehicles environment. A novel joint computing and communication resource scheduling method is proposed, which includes a hierarchical three-layer Vehicular Edge Computing (VEC) framework and onboard joint computation offloading and transmission scheduling policy. Extensive simulation tests and ablation experiments demonstrate the effectiveness and stability of the proposed method in achieving stable performance and reducing scheduling overhead, improving resource utilization, and minimizing data transmission delay caused by vehicle motion.
Article
Computer Science, Information Systems
Rakesh Das, Jitendra Nath Bera
Summary: This paper focuses on the development of a highly reliable customized home area networking (HAN) to provide a robust communication network for smart home owners. The proposed HAN utilizes a multi-gateway-based partial mesh networking topology with ZigBee control boards to enable remote monitoring and control of individual appliances within the home. The introduction of active and pseudo gateway concept enhances the reliability of the HAN by automatically reconfiguring in case of failure. Experimental verification demonstrates the fail-proof and reliable nature of the proposed HAN with alternate routes and activation of pseudo gateway as active gateway.
Article
Computer Science, Information Systems
Changhao Li, Huanjing Li, Tao Wu, Lei Yan, Suzhi Cao
Summary: The maximum flow problem based on a contact graph in Delay-Tolerant Networking (DTN) is important for routing and data planning. Existing algorithms cannot be directly applied to topological networks with time series changes. This paper proposes a method of dismantling and reconstructing the graph to solve the maximum flow problem in a continuously changing network. The method discretizes time on different nodes to reduce the scale of the graph, optimizing data transmission, improving data delivery rate, and reducing link occupation.