[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,187)

Search Parameters:
Keywords = internet of vehicles

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1416 KiB  
Article
Multi-Agent Reinforcement Learning for Efficient Resource Allocation in Internet of Vehicles
by Jun-Han Wang, He He, Jaesang Cha, Incheol Jeong and Chang-Jun Ahn
Electronics 2025, 14(1), 192; https://doi.org/10.3390/electronics14010192 (registering DOI) - 5 Jan 2025
Abstract
The Internet of Vehicles (IoV), a burgeoning technology, merges advancements in the internet, vehicle electronics, and wireless communications to foster intelligent vehicle interactions, thereby enhancing the efficiency and safety of transportation systems. Nonetheless, the continual and high-frequency communications among vehicles, coupled with regional [...] Read more.
The Internet of Vehicles (IoV), a burgeoning technology, merges advancements in the internet, vehicle electronics, and wireless communications to foster intelligent vehicle interactions, thereby enhancing the efficiency and safety of transportation systems. Nonetheless, the continual and high-frequency communications among vehicles, coupled with regional limitations in system capacity, precipitate significant challenges in allocating wireless resources for vehicular networks. In addressing these challenges, this study formulates the resource allocation issue as a multi-agent deep reinforcement learning scenario and introduces a novel multi-agent actor-critic framework. This framework incorporates a prioritized experience replay mechanism focused on distributed execution, which facilitates decentralized computing by structuring the training processes and defining specific reward functions, thus optimizing resource allocation. Furthermore, the framework prioritizes empirical data during the training phase based on the temporal difference error (TD error), selectively updating the network with high-priority data at each sampling point. This strategy not only accelerates model convergence but also enhances the learning efficacy. The empirical validations confirm that our algorithm augments the total capacity of vehicle-to-infrastructure (V2I) links by 9.36% and the success rate of vehicle-to-vehicle (V2V) transmissions by 6.74% compared with a benchmark algorithm. Full article
30 pages, 6901 KiB  
Article
EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network
by Chenyang Fei, Xiaomei Zhang, Dayu Wang, Haomin Hu, Rong Huang and Zejie Wang
Information 2025, 16(1), 21; https://doi.org/10.3390/info16010021 - 3 Jan 2025
Viewed by 372
Abstract
With the increasing connectivity and automation on the Internet of Vehicles, safety, security, and privacy have become stringent challenges. In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. Before generating the [...] Read more.
With the increasing connectivity and automation on the Internet of Vehicles, safety, security, and privacy have become stringent challenges. In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. Before generating the encryption keys, a random number generator (RNG) plays an important component in cybersecurity. Several deep learning-based RNGs have been deployed to train the initial value and generate pseudo-random numbers. However, interference from actual unpredictable driving environments renders the system unreliable for its low-randomness outputs. Furthermore, dynamics in the training process make these methods subject to training instability and pattern collapse by overfitting. In this paper, we propose an Effective Pseudo-Random Number Generator (EPRNG) which exploits a deep convolution generative adversarial network (DCGAN)-based approach using our processed vehicle datasets and entropy-driven stopping method-based training processes for the generation of pseudo-random numbers. Our model starts from the vehicle data source to stitch images and add noise to enhance the entropy of the images and then inputs them into our network. In addition, we design an entropy-driven stopping method that enables our model training to stop at the optimal epoch so as to prevent overfitting. The results of the evaluation indicate that our entropy-driven stopping method can effectively generate pseudo-random numbers in a DCGAN. Our numerical experiments on famous test suites (NIST, ENT) demonstrate the effectiveness of the developed approach in high-quality random number generation for the IoV. Furthermore, the PRNGs are successfully applied to image encryption, and the performance metrics of the encryption are close to ideal values. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>System model of the proposed PRNG.</p>
Full article ">Figure 2
<p>Network model of the IoV.</p>
Full article ">Figure 3
<p>Similarity between images.</p>
Full article ">Figure 4
<p>Comparison of images before and after stitching.</p>
Full article ">Figure 5
<p>Stitching the pixel blocks.</p>
Full article ">Figure 6
<p>Raw images before and after adding noise: (<b>a</b>–<b>c</b>) are the raw images; (<b>d</b>–<b>f</b>) are the noise-added images.</p>
Full article ">Figure 7
<p>Comparison of images before and after adding noise.</p>
Full article ">Figure 8
<p>The noise in 2D.</p>
Full article ">Figure 9
<p>DCGAN network model.</p>
Full article ">Figure 10
<p>The visual representation of the entropy-driven stopping method.</p>
Full article ">Figure 11
<p>Logistic map visualization.</p>
Full article ">Figure 12
<p>The statistics of image entropy.</p>
Full article ">Figure 13
<p>The datasets collected from multi-sensors in vehicle.</p>
Full article ">Figure 14
<p>Comparison of <span class="html-italic">R</span> before and after early stopping.</p>
Full article ">Figure 15
<p>The optimal training epochs.</p>
Full article ">Figure 16
<p>Comparison of <span class="html-italic">R</span> before and after early stopping on the other datasets. (<b>a</b>) Comparison of <span class="html-italic">R</span> before and after early stopping on the BDD100k dataset; (<b>b</b>) Comparison of <span class="html-italic">R</span> before and after early stopping on the Tsinghua-Tencent100K dataset.</p>
Full article ">Figure 16 Cont.
<p>Comparison of <span class="html-italic">R</span> before and after early stopping on the other datasets. (<b>a</b>) Comparison of <span class="html-italic">R</span> before and after early stopping on the BDD100k dataset; (<b>b</b>) Comparison of <span class="html-italic">R</span> before and after early stopping on the Tsinghua-Tencent100K dataset.</p>
Full article ">Figure 17
<p>Optimal <math display="inline"><semantics> <msub> <mi>L</mi> <mrow> <mi>b</mi> <mi>e</mi> <mi>s</mi> <mi>t</mi> </mrow> </msub> </semantics></math> with different <span class="html-italic">p</span> and <span class="html-italic">v</span> parameters.</p>
Full article ">Figure 18
<p>The sensitivity of the optimal epoch. (<b>a</b>) The sensitivity of the optimal epoch when the target variance changes; (<b>b</b>) The sensitivity of the optimal epoch when the patience changes.</p>
Full article ">Figure 19
<p>The encryption and decryption processes of the images.</p>
Full article ">Figure 19 Cont.
<p>The encryption and decryption processes of the images.</p>
Full article ">Figure 20
<p>The histogram of the image pair.</p>
Full article ">Figure 21
<p>The adjacent pixel correlation of the image pair.</p>
Full article ">
28 pages, 910 KiB  
Article
Virtual Force-Based Swarm Trajectory Design for Unmanned Aerial Vehicle-Assisted Data Collection Internet of Things Networks
by Xuanlin Liu, Sihua Wang and Changchuan Yin
Drones 2025, 9(1), 28; https://doi.org/10.3390/drones9010028 - 3 Jan 2025
Viewed by 268
Abstract
In this paper, the problem of trajectory design for unmanned aerial vehicle (UAV) swarms in data collection Internet of Things (IoT) networks is studied. In the considered model, the UAV swarm is deployed to patrol a designated area and collect status information from [...] Read more.
In this paper, the problem of trajectory design for unmanned aerial vehicle (UAV) swarms in data collection Internet of Things (IoT) networks is studied. In the considered model, the UAV swarm is deployed to patrol a designated area and collect status information from sensors monitoring physical processes. The sense-collect-interchange-explore (SCIE) protocol is proposed to regulate UAV actions, ensuring synchronization and adaptability in a distributed manner. To maintain real-time monitoring while reducing data transmission, we introduce status freshness, which is an extension of age of information (AoI) and allows negative values to reflect the swarm’s predictive capabilities. The trajectory design problem is then formulated as an optimization problem to minimize average status freshness. A virtual force-based algorithm is developed to solve this problem, where UAVs are influenced by attractive forces from sensors and repulsive forces from neighbors. These forces guide UAVs toward sensors requiring data transmission while reducing communication overlap. The proposed distributed algorithm allows each UAV to independently design its trajectory, reducing redundancy and enhancing scalability. Simulation results show that the proposed method can significantly reduce average status freshness under the same energy efficiency conditions compared to artificial potential field algorithm. The proposed method also achieves significantly reduction in terms of communication overhead, compared to fully connected strategies, ensuring scalability in large-scale UAV deployments. Full article
(This article belongs to the Special Issue Advances in UAV Networks Towards 6G)
Show Figures

Figure 1

Figure 1
<p>System model of the UAV-assisted Internet of Things (IoT) network.</p>
Full article ">Figure 2
<p>The contrast between traditional age of information (AoI) and status freshness.</p>
Full article ">Figure 3
<p>Time division of sense–collect–interchage–explore (SCIE) protocol.</p>
Full article ">Figure 4
<p>Illustration of the virtual forces.</p>
Full article ">Figure 5
<p>An illustration of the inter-swarm distance and boundary distance.</p>
Full article ">Figure 6
<p>Summary of the virtual-based trajectory design algorithm.</p>
Full article ">Figure 7
<p>UAV swarm two-dimensional position with virtual force over time.</p>
Full article ">Figure 8
<p>Convergence of the average status freshness and virtual forces.</p>
Full article ">Figure 9
<p>Comparison of real-time and estimated status over time.</p>
Full article ">Figure 10
<p>Box plot of the average status freshness as the number of sensors varies.</p>
Full article ">Figure 11
<p>Box plot of the average status freshness as the number of UAVs varies.</p>
Full article ">Figure 12
<p>Average status freshness varies with the number of UAVs and sensors. (APF: artificial potential field)</p>
Full article ">Figure 13
<p>Communication overhead as the number of UAVs varies under different interchange strategy. (FC: fully connected)</p>
Full article ">Figure A1
<p>Principle of attractive force.</p>
Full article ">Figure A2
<p>Principle of repulsive force.</p>
Full article ">
20 pages, 15263 KiB  
Article
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
by Xinzhong Su and Youyun Xu
Sensors 2025, 25(1), 212; https://doi.org/10.3390/s25010212 - 2 Jan 2025
Viewed by 223
Abstract
The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant [...] Read more.
The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant security threats, such as eavesdropping, replay attacks, and message tampering. To address these challenges, this paper proposes the Efficient Cluster-based Mutual Authentication and Key Update Protocol (ECAUP) designed to secure IoV systems within 5G-enabled sensor networks. The ECAUP meets the unique mobility and security demands of IoV by enabling fine-grained access control and dynamic key updates for RSUs through a factorial tree structure, ensuring both forward and backward secrecy. Additionally, physical unclonable functions (PUFs) are utilized to provide end-to-end authentication and physical layer security, further enhancing the system’s resilience against sophisticated cyber-attacks. The security of the ECAUP is formally verified using BAN Logic and ProVerif, and a comparative analysis demonstrates its superiority in terms of overhead efficiency (more than 50%) and security features over existing protocols. This work contributes to the development of secure, resilient, and efficient intelligent transportation systems, ensuring robust communication and protection in sensor-based IoV environments. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Figure 1

Figure 1
<p>IOV authentication model.</p>
Full article ">Figure 2
<p>Factorial-tree-based accessible device table. The number of leaf nodes at each level in factorial tree is <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>t</mi> <mo>+</mo> <mn>1</mn> <mo>)</mo> <mo>!</mo> </mrow> </semantics></math>, where <span class="html-italic">t</span> is the level of the tree.</p>
Full article ">Figure 3
<p><math display="inline"><semantics> <mrow> <mi>R</mi> <mi>S</mi> <mi>U</mi> </mrow> </semantics></math> registration.</p>
Full article ">Figure 4
<p>Mutual authentication between <math display="inline"><semantics> <mrow> <mi>R</mi> <mi>S</mi> <mi>U</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>I</mi> <mi>O</mi> <mi>V</mi> <mi>D</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <mrow> <mi>I</mi> <mi>O</mi> <mi>V</mi> <mi>D</mi> </mrow> </semantics></math> join and leave.</p>
Full article ">Figure 6
<p>Proverif simulation results.</p>
Full article ">Figure 7
<p>Comparison of communication cost and calculation cost.</p>
Full article ">
20 pages, 2765 KiB  
Article
Delay/Disruption Tolerant Networking Performance Characterization in Cislunar Relay Communication Architecture
by Ding Wang, Ethan Wang and Ruhai Wang
Sensors 2025, 25(1), 195; https://doi.org/10.3390/s25010195 - 1 Jan 2025
Viewed by 365
Abstract
Future 7G/8G networks are expected to integrate both terrestrial Internet and space-based networks. Space networks, including inter-planetary Internet such as cislunar and deep-space networks, will become an integral part of future 7G/8G networks. Vehicle-to-everything (V2X) communication networks will also be a significant component [...] Read more.
Future 7G/8G networks are expected to integrate both terrestrial Internet and space-based networks. Space networks, including inter-planetary Internet such as cislunar and deep-space networks, will become an integral part of future 7G/8G networks. Vehicle-to-everything (V2X) communication networks will also be a significant component of 7G/8G networks. Therefore, space networks will eventually integrate with V2X communication networks, with both space vehicles (or spacecrafts) and terrestrial vehicles involved. DTN is the only candidate networking technology for future heterogeneous space communication networks. In this work, we study possible concatenations of different DTN convergence layer protocol adapters (CLAs) over a cislunar relay communication architecture. We present a performance characterization of the concatenations of different CLAs and the associated data transport protocols in an experimental manner. The performance of different concatenations is compared over a typical primary and secondary cislunar relay architecture. The intent is to find out which network relay path and DTN protocol configuration has the best performance over the end-to-end cislunar path. Full article
(This article belongs to the Special Issue Vehicle-to-Everything (V2X) Communication Networks 2024–2025)
Show Figures

Figure 1

Figure 1
<p>A typical IPN communications relay infrastructure.</p>
Full article ">Figure 2
<p>DTN protocol stack vs. OSI stack [<a href="#B57-sensors-25-00195" class="html-bibr">57</a>].</p>
Full article ">Figure 3
<p>Comparison of simulated cislunar communication relay architecture and DTN protocol configurations. (<b>a</b>) LTP LTP PRIM. (<b>b</b>) UDP LTP PRIM. (<b>c</b>) LTP UDP SEC. (<b>d</b>) LTP TCP SEC.</p>
Full article ">Figure 4
<p>SCNT block diagram. (<b>a</b>) For primary cislunar relay architecture. (<b>b</b>) For secondary cislunar relay architecture.</p>
Full article ">Figure 5
<p>Goodput (vs. link delay) comparison of three different protocols and their hybrid over the primary and secondary cislunar communication paths with a BER of 0. (<b>a</b>) Goodput. (<b>b</b>) Goodput differences and <span class="html-italic">p</span>-values.</p>
Full article ">Figure 6
<p>Goodput (vs link delay) comparison of three different protocols and their hybrid over the primary and secondary cislunar communication paths with a BER of 10<sup>−6</sup>. (<b>a</b>) Goodput. (<b>b</b>) Goodput differences and <span class="html-italic">p</span>-values.</p>
Full article ">Figure 7
<p>Goodput (vs. link delay) comparison of three different protocols and their hybrid over the primary and secondary cislunar communication paths with a BER of 10<sup>−5</sup>. (<b>a</b>) Goodput. (<b>b</b>) Goodput differences and <span class="html-italic">p</span>-values.</p>
Full article ">
30 pages, 3765 KiB  
Article
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
by Muhammad Dilshad, Madiha Haider Syed and Semeen Rehman
Future Internet 2025, 17(1), 9; https://doi.org/10.3390/fi17010009 - 1 Jan 2025
Viewed by 287
Abstract
Considering that smart vehicles are becoming interconnected through the Internet of Vehicles, cybersecurity threats like Distributed Denial of Service (DDoS) attacks pose a great challenge. Detection methods currently face challenges due to the complex and enormous amounts of data inherent in IoV systems. [...] Read more.
Considering that smart vehicles are becoming interconnected through the Internet of Vehicles, cybersecurity threats like Distributed Denial of Service (DDoS) attacks pose a great challenge. Detection methods currently face challenges due to the complex and enormous amounts of data inherent in IoV systems. This paper presents a new approach toward improving DDoS attack detection by using the Gini index in feature selection and Federated Learning during model training. The Gini index assists in filtering out important features, hence simplifying the models for higher accuracy. FL enables decentralized training across many devices while preserving privacy and allowing scalability. The results show that the case for this approach is in detecting DDoS attacks, bringing out data confidentiality, and reducing computational load. As noted in this paper, the average accuracy of the models is 91%. Moreover, different types of DDoS attacks were identified by employing our proposed technique. Precisions achieved are as follows: DrDoS_DNS: 28.65%, DrDoS_SNMP: 28.94%, DrDoS_UDP: 9.20%, and NetBIOS: 20.61%. In this research, we foresee the potential for harvesting from integrating advanced feature selection with FL so that IoV systems can meet modern cybersecurity requirements. It also provides a robust and efficient solution for the future automotive industry. By carefully selecting only the most important data features and decentralizing the model training to devices, we reduce both time and memory usage. This makes the system much faster and lighter on resources, making it perfect for real-time IoV applications. Our approach is both effective and efficient for detecting DDoS attacks in IoV environments. Full article
Show Figures

Figure 1

Figure 1
<p>Internet of Vehicles (IoV) illustrating various communication types.</p>
Full article ">Figure 2
<p>IoV network attack detection system.</p>
Full article ">Figure 3
<p>Selected important features.</p>
Full article ">Figure 4
<p>Distribution of different attack types in the dataset.</p>
Full article ">Figure 5
<p>Federated learning and machine learning process flow.</p>
Full article ">Figure 6
<p>ROC Curves for Decision Tree, Random Forest, XGBoost, Gradient Boosting, and K-Nearest Neighbors models; comparing classification performance across multiple classes: (<b>a</b>) ROC Curve for Decision Tree Model. (<b>b</b>) ROC Curve for Random Forest Model. (<b>c</b>) ROC Curve for XGBoost Model. (<b>d</b>) ROC Curve for Gradient Boosting Model. (<b>e</b>) ROC Curve for K-Nearest Neighbors Model.</p>
Full article ">Figure 7
<p>Confusion matrices for Model (<b>a</b>), Model (<b>b</b>), Model (<b>c</b>), Model (<b>d</b>), and Model (<b>e</b>): (<b>a</b>) Confusion Matrix for Decision Tree Model. (<b>b</b>) Confusion Matrix for Random Forest Model. (<b>c</b>) Confusion Matrix for XGBoost Model. (<b>d</b>) Confusion Matrix for Gradient Boosting Model. (<b>e</b>) Confusion Matrix for K-Nearest Neighbors Model. In each confusion matrix, color intensity shows prediction frequency, with darker shades indicating higher values and lighter shades showing lower values, helping to spot misclassifications.</p>
Full article ">Figure 8
<p>Running time of models under different scenarios.</p>
Full article ">Figure 9
<p>Memory usage of models under different scenarios.</p>
Full article ">
21 pages, 769 KiB  
Article
Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones
by Sofiane Zaidi, Mohamed Amine Attalah, Lazhar Khamer and Carlos T. Calafate
Drones 2025, 9(1), 23; https://doi.org/10.3390/drones9010023 (registering DOI) - 30 Dec 2024
Viewed by 307
Abstract
Recently, task offloading in the Internet of Drones (IoD) is considered one of the most important challenges because of the high transmission delay due to the high mobility and limited capacity of drones. This particularity makes it difficult to apply the conventional task [...] Read more.
Recently, task offloading in the Internet of Drones (IoD) is considered one of the most important challenges because of the high transmission delay due to the high mobility and limited capacity of drones. This particularity makes it difficult to apply the conventional task offloading technologies, such as cloud computing and edge computing, in IoD environments. To address these limits, and to ensure a low task offloading delay, in this paper we propose PSO BS-Fog, a task offloading optimization that combines a particle swarm optimization (PSO) heuristic with fog computing technology for the IoD. The proposed solution applies the PSO for task offloading from unmanned aerial vehicles (UAVs) to fog base stations (FBSs) in order to optimize the offloading delay (transmission delay and fog computing delay) and to guarantee higher storage and processing capacity. The performance of PSO BS-Fog was evaluated through simulations conducted in the MATLAB environment and compared against PSO UAV-Fog and PSO UAV-Edge IoD technologies. Experimental results demonstrate that PSO BS-Fog reduces task offloading delay by up to 88% compared to PSO UAV-Fog and by up to 97% compared to PSO UAV-Edge. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed PSO BS-Fog architecture.</p>
Full article ">Figure 2
<p>PSO BS-Fog channel model.</p>
Full article ">Figure 3
<p>Variation in Best Delay with number of fog base stations for various task offloading methods.</p>
Full article ">Figure 4
<p>Variation in Best Delay with task number for various task offloading methods.</p>
Full article ">Figure 5
<p>Variation in Best Delay with number of nodes for IoD technologies.</p>
Full article ">Figure 6
<p>Variation in Best Delay with number of tasks for IoD technologies.</p>
Full article ">Figure 7
<p>Variation in Best Delay with data rate for IoD technologies.</p>
Full article ">Figure 8
<p>Variation in Best Delay with UAV altitudes for IoD technologies.</p>
Full article ">
18 pages, 5057 KiB  
Article
Road Traffic Gesture Autonomous Integrity Monitoring Using Fuzzy Logic
by Kwame Owusu Ampadu and Michael Huebner
Sensors 2025, 25(1), 152; https://doi.org/10.3390/s25010152 - 30 Dec 2024
Viewed by 285
Abstract
Occasionally, four cars arrive at the four legs of an unsignalized intersection at the same time or almost at the same time. If each lane has a stop sign, all four cars are required to stop. In such instances, gestures are used to [...] Read more.
Occasionally, four cars arrive at the four legs of an unsignalized intersection at the same time or almost at the same time. If each lane has a stop sign, all four cars are required to stop. In such instances, gestures are used to communicate approval for one vehicle to leave. Nevertheless, the autonomous vehicle lacks the ability to participate in gestural exchanges. A sophisticated in-vehicle traffic light system has therefore been developed to monitor and facilitate communication among autonomous vehicles and classic car drivers. The fuzzy logic-based system was implemented and evaluated on a self-organizing network comprising eight ESP32 microcontrollers, all operating under the same program. A single GPS sensor connects to each microcontroller that also manages three light-emitting diodes. The ESPNow broadcast feature is used. The system requires no internet service and no large-scale or long-term storage, such as the driving cloud platform, making it backward-compatible with classical vehicles. Simulations were conducted based on the order and arrival direction of vehicles at three junctions. Results have shown that autonomous vehicles at four-legged intersections can now communicate with human drivers at a much lower cost with precise position classification and lane dispersion under 30 s. Full article
Show Figures

Figure 1

Figure 1
<p>Car positions on the Cartesian plane.</p>
Full article ">Figure 2
<p>Priority assignment sequence.</p>
Full article ">Figure 3
<p>Layout of an intersection indicating north, south, west, and east lanes with two car nodes each.</p>
Full article ">Figure 4
<p>Northern lane angles at Junction A.</p>
Full article ">Figure 5
<p>Eastern lane angles at Junction A.</p>
Full article ">Figure 6
<p>The model in MATLAB Release 2023a fuzzy logic designer.</p>
Full article ">Figure 7
<p>Fuzzy rule viewer in MATLAB Release 2023a.</p>
Full article ">Figure 8
<p>ESP32 microcontrollers with Light-Emitting Diodes.</p>
Full article ">Figure 9
<p>Serial monitor displaying standby and direction of arrival.</p>
Full article ">Figure 10
<p>Serial monitor displaying north lane voted to move.</p>
Full article ">
28 pages, 739 KiB  
Article
Cooperative Overbooking-Based Resource Allocation and Application Placement in UAV-Mounted Edge Computing for Internet of Forestry Things
by Xiaoyu Li, Long Suo, Wanguo Jiao, Xiaoming Liu and Yunfei Liu
Drones 2025, 9(1), 22; https://doi.org/10.3390/drones9010022 (registering DOI) - 29 Dec 2024
Viewed by 307
Abstract
Due to the high mobility and low cost, unmanned aerial vehicle (UAV)-mounted edge computing (UMEC) provides an efficient way to provision computing offloading services for Internet of Forestry Things (IoFT) applications in forest areas without sufficient infrastructure. Multiple IoFT applications can be consolidated [...] Read more.
Due to the high mobility and low cost, unmanned aerial vehicle (UAV)-mounted edge computing (UMEC) provides an efficient way to provision computing offloading services for Internet of Forestry Things (IoFT) applications in forest areas without sufficient infrastructure. Multiple IoFT applications can be consolidated into fewer UAV-mounted servers to improve the resource utilization and reduce deployment costs with the precondition that all applications’ Quality of Service (QoS) can be met. However, most existing application placement schemes in UMEC did not consider the dynamic nature of the aggregated computing resource demand. In this paper, the resource allocation and application placement problem based on fine-grained cooperative overbooking in UMEC is studied. First, for the two-tenant overbooking case, a Two-tenant Cooperative Resource Overbooking (2CROB) scheme is designed, which allows tenants to share resource demand violations (RDVs) in the cooperative overbooking region. In 2CROB, an aggregated-resource-demand minimization problem is modeled, and a bisection search algorithm is designed to obtain the minimized aggregated resource demand. Second, for the multiple-tenant overbooking case, a Proportional Fairness-based Cooperative Resource Overbooking (PF-MCROB) scheme is designed, and a bisection search algorithm is also designed to obtain the corresponding minimized aggregated resource demand. Then, on the basis of PF-MCROB, a First Fit Decreasing-based Cooperative Application Placement (FFD-CAP) scheme is proposed to accommodate applications in as few servers as possible. Simulation results verify that the proposed cooperative resource overbooking schemes can save more computing resource in cases including more tenants with higher or differentiated resource demand violation ratio (RDVR) thresholds, and the FFD-ACP scheme can reduce about one third of necessarily deployed UAVs compared with traditional overbooking. Thus, applying efficient cooperative overbooking in application placement can considerably reduce deployment and maintenance costs and improve onboard computing resource utilization and operating revenues in UMEC-aided IoFT applications. Full article
Show Figures

Figure 1

Figure 1
<p>Flowchart of proposed methods.</p>
Full article ">Figure 2
<p>UAV-mounted edge computing for various IoFT applications.</p>
Full article ">Figure 3
<p>Region division for two-tenant cooperative overbooking.</p>
Full article ">Figure 4
<p>Minimum aggregated resource amounts of different overbooking strategies with identical RDVR thresholds.</p>
Full article ">Figure 5
<p>Minimum aggregated resource amounts of different overbooking strategies with differentiated RDVR thresholds.</p>
Full article ">Figure 6
<p>Resource saving ratios of 2CROB in different cases. (<b>a</b>) Identical RDVR thresholds. (<b>b</b>) Differentiated RDVR thresholds.</p>
Full article ">Figure 7
<p>Optimal <math display="inline"><semantics> <msup> <mi>α</mi> <mo>*</mo> </msup> </semantics></math> of 2CROB in different cases. (<b>a</b>) Identical RDVR thresholds. (<b>b</b>) Differentiated RDVR thresholds.</p>
Full article ">Figure 8
<p>Optimal <math display="inline"><semantics> <msup> <mi>α</mi> <mo>*</mo> </msup> </semantics></math> of 2CROB in different cases. (<b>a</b>) Case 2 with differentiated RDVR thresholds. (<b>b</b>) Case 3 with differentiated RDVR thresholds.</p>
Full article ">Figure 9
<p>Performance comparison of 2CROB and PF-MCROB in two-VM overbooking cases. (<b>a</b>) Minimum aggregated resource amounts <math display="inline"><semantics> <msup> <mi>R</mi> <mo>*</mo> </msup> </semantics></math> in Case 1 and Case 3. (<b>b</b>) Achieved RDVRs in Case 1. (<b>c</b>) Achieved RDVRs in Case 3.</p>
Full article ">Figure 10
<p>Minimum aggregated resource amounts of different overbooking strategies in four-VM placement cases.</p>
Full article ">Figure 11
<p>Iteration steps of the bisection search algorithm in PF-MCROB.</p>
Full article ">Figure 12
<p>Minimum aggregated resource amounts of different overbooking strategies in <span class="html-italic">K</span>-homogeneous VM placement cases.</p>
Full article ">Figure 13
<p>RSR of PF-MCROB in <span class="html-italic">K</span>-homogeneous VM placement cases.</p>
Full article ">Figure 14
<p>Executing processes of different application placement schemes from one simulation instance.</p>
Full article ">Figure 15
<p>Minimum number of active servers of different application schemes from fifty simulation instances.</p>
Full article ">
33 pages, 4650 KiB  
Review
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
by Tiansheng Yang, Ruikai Sun, Rajkumar Singh Rathore and Imran Baig
World Electr. Veh. J. 2025, 16(1), 14; https://doi.org/10.3390/wevj16010014 - 28 Dec 2024
Viewed by 369
Abstract
Due to developments in vehicle engineering and communication technologies, vehicular networks have become an attractive and feasible solution for the future of electric, autonomous, and connected vehicles. Electric autonomous vehicles will require more data, computing resources, and communication capabilities to support them. The [...] Read more.
Due to developments in vehicle engineering and communication technologies, vehicular networks have become an attractive and feasible solution for the future of electric, autonomous, and connected vehicles. Electric autonomous vehicles will require more data, computing resources, and communication capabilities to support them. The combination of vehicles, the Internet, and cloud computing together to form vehicular cloud computing (VCC), vehicular edge computing (VEC), and vehicular fog computing (VFC) can facilitate the development of electric autonomous vehicles. However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). In this paper, we adopt a semi-systematic literature review to select 85 articles related to the application of ML for cybersecurity and privacy protection based on VCC. They were categorized into four research themes: intrusion detection system, anomaly vehicle detection, task offloading security and privacy, and privacy protection. A list of suitable ML algorithms and their strengths and weaknesses is summarized according to the characteristics of each research topic. The performance of different ML algorithms in the literature is also collated and compared. Finally, the paper discusses the challenges and future research directions of ML algorithms when applied to vehicular cloud computing. Full article
Show Figures

Figure 1

Figure 1
<p>Vehicular network structure.</p>
Full article ">Figure 2
<p>Structure of Context.</p>
Full article ">Figure 3
<p>Structure of VCC, VEC, VFC.</p>
Full article ">Figure 4
<p>ML training progress.</p>
Full article ">Figure 5
<p>Centralized training structure.</p>
Full article ">Figure 6
<p>Federated training structure.</p>
Full article ">Figure 7
<p>Semi-systematic literature review selection process.</p>
Full article ">Figure 8
<p>Publication and ML training strategy trend.</p>
Full article ">Figure 9
<p>Relationship between ML method and research theme.</p>
Full article ">Figure 10
<p>Comparison of ML accuracy performance.</p>
Full article ">Figure 11
<p>Comparison of ML strategy accuracy performance.</p>
Full article ">Figure 12
<p>Challenges, solutions, and future scope.</p>
Full article ">
18 pages, 3818 KiB  
Communication
Link Characteristics Comparison of Lambertian & Non-Lambertian MIMO-Based 6G Vehicular Visible Light Communications
by Jupeng Ding, Chih-Lin I, Jintao Wang and Hui Yang
Inventions 2025, 10(1), 1; https://doi.org/10.3390/inventions10010001 - 28 Dec 2024
Viewed by 372
Abstract
As one key candidate technology for the 6G internet of vehicles, vehicular visible light communications (VLCs) have received widespread attention and discussion due to their inherent advantages, including broadband, green, security, and ubiquity. In order to improve the quality of vehicular VLC links [...] Read more.
As one key candidate technology for the 6G internet of vehicles, vehicular visible light communications (VLCs) have received widespread attention and discussion due to their inherent advantages, including broadband, green, security, and ubiquity. In order to improve the quality of vehicular VLC links and extend their coverage, various multiple input multiple output (MIMO) techniques have been actively introduced into the field of vehicular VLC, demonstrating the corresponding performance gain potential. Objectively, the existing research works mentioned above are generally limited to the discussion of MIMO vehicular VLC based on conventional Lambertian light-emitting diode (LED) light sources. Consequently, there is one absence of a targeted study and evaluation of the link configuration-based vehicular non-Lambertian LEDs and the potential non-Lambertian MIMO vehicular VLC. To address the limitations of the aforementioned research and explore the novel spatial dimension for vehicular VLC design, this work attempts to introduce the representative non-Lambertian LED light beams into the typical MIMO vehicular VLC application for constructing novel MIMO vehicular VLC transmission links. The numerical results demonstrate that in 2 × 2 MIMO mode, compared to the benchmark Lambertian vehicular VLC scheme, the proposed typical non-Lambertian NSPW vehicular VLC schemes could provide capacity gains of up to 5.18 bps/Hz and 4.71 bps/Hz for the stop mode, and the traffic mode, respectively. Moreover, this article quantitatively evaluates the impact of the spatial spacing of receiver light beams on the performance of MIMO vehicular VLC and the relevant fundamental characteristics. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic of vehicular MIMO visible light communications based on baseline Lambertian light beam for 6G internet of vehicles.</p>
Full article ">Figure 2
<p>Schematic of vehicular MIMO visible light communications based on Z-Power light beam for 6G internet of vehicles.</p>
Full article ">Figure 3
<p>Schematic of vehicular MIMO visible light communications based on asymmetric NSPW non-Lambertian light beam for 6G internet of vehicles.</p>
Full article ">Figure 4
<p>MIMO channel capacity of vehicular visible light communications for 6G IoV in the case of (<b>a</b>) different longitudinal displacement for receiver vehicle along the lane, (<b>b</b>) different lateral displacement for receiver vehicle in stop mode, (<b>c</b>) different lateral displacement for receiver vehicle in traffic mode.</p>
Full article ">Figure 5
<p>MIMO channel capacity of vehicular visible light communications for 6G IoV versus the emitted power of the transmitter in the case of (<b>a</b>) stop mode and (<b>b</b>) traffic mode.</p>
Full article ">Figure 6
<p>BER performance of MIMO vehicular visible light communications for 6G IoV versus the emitted power of the transmitter in the case of (<b>a</b>) stop mode and (<b>b</b>) traffic mode.</p>
Full article ">Figure 7
<p>MIMO channel capacity of vehicular visible light communications for 6G IoV versus the receiver spacing in the case of (<b>a</b>) stop mode and (<b>b</b>) traffic mode.</p>
Full article ">
18 pages, 1747 KiB  
Article
Deep Reinforcement Learning Algorithm with Long Short-Term Memory Network for Optimizing Unmanned Aerial Vehicle Information Transmission
by Yufei He, Ruiqi Hu, Kewei Liang, Yonghong Liu and Zhiyuan Zhou
Mathematics 2025, 13(1), 46; https://doi.org/10.3390/math13010046 - 26 Dec 2024
Viewed by 436
Abstract
The optimization of information transmission in unmanned aerial vehicles (UAVs) is essential for enhancing their operational efficiency across various applications. This issue is framed as a mixed-integer nonconvex optimization challenge, which traditional optimization algorithms and reinforcement learning (RL) methods often struggle to address [...] Read more.
The optimization of information transmission in unmanned aerial vehicles (UAVs) is essential for enhancing their operational efficiency across various applications. This issue is framed as a mixed-integer nonconvex optimization challenge, which traditional optimization algorithms and reinforcement learning (RL) methods often struggle to address effectively. In this paper, we propose a novel deep reinforcement learning algorithm that utilizes a hybrid discrete–continuous action space. To address the long-term dependency issues inherent in UAV operations, we incorporate a long short-term memory (LSTM) network. Our approach accounts for the specific flight constraints of fixed-wing UAVs and employs a continuous policy network to facilitate real-time flight path planning. A non-sparse reward function is designed to maximize data collection from internet of things (IoT) devices, thus guiding the UAV to optimize its operational efficiency. Experimental results demonstrate that the proposed algorithm yields near-optimal flight paths and significantly improves data collection capabilities, compared to conventional heuristic methods, achieving an improvement of up to 10.76%. Validation through simulations confirms the effectiveness and practicality of the proposed approach in real-world scenarios. Full article
(This article belongs to the Special Issue Artificial Intelligence: Large Language Models and Big Data Analysis)
Show Figures

Figure 1

Figure 1
<p>UAV communication sketch.</p>
Full article ">Figure 2
<p>DRL model for UAV messaging.</p>
Full article ">Figure 3
<p>Illustration of UAV path planning and IoT data collection. (<b>A</b>) Starting position; (<b>B</b>) UAV only connects with IoT device 1; (<b>C</b>) UAV connect with both IoT devices; (<b>D</b>) UAV only connects with IoT device 2.</p>
Full article ">Figure 4
<p>Value loss functions at different learning rates.</p>
Full article ">Figure 5
<p>Reward function.</p>
Full article ">Figure 6
<p>Comparison of data collection under different numbers of channels and IoT devices.</p>
Full article ">Figure 7
<p>Flight paths of the UAV with different algorithms and IoT device locations, while <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>λ</mi> <mo>=</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>9</mn> </mrow> </msup> </mrow> </semantics></math>. (<b>A</b>) IoT devices are distributed along the diagonal of the region <math display="inline"><semantics> <mo>Ω</mo> </semantics></math>; (<b>B</b>) IoT devices are distributed in an “S” shape; (<b>C</b>) IoT devices are concentrated on the left side of the diagonal of the region <math display="inline"><semantics> <mo>Ω</mo> </semantics></math>; (<b>D</b>) IoT devices are concentrated on the right side of the diagonal of the region <math display="inline"><semantics> <mo>Ω</mo> </semantics></math>.</p>
Full article ">Figure 8
<p>Amount of information collected by the UAV with different algorithms and IoT device locations. (<b>A</b>) IoT devices are distributed along the diagonal of the region <math display="inline"><semantics> <mo>Ω</mo> </semantics></math>; (<b>B</b>) IoT devices are distributed in an “S” shape; (<b>C</b>) IoT devices are concentrated on the left side of the diagonal of the region <math display="inline"><semantics> <mo>Ω</mo> </semantics></math>; (<b>D</b>) IoT devices are concentrated on the right side of the diagonal of the region <math display="inline"><semantics> <mo>Ω</mo> </semantics></math>.</p>
Full article ">
24 pages, 5495 KiB  
Article
Generative Image Steganography via Encoding Pose Keypoints
by Yi Cao, Wentao Ge, Chengsheng Yuan and Quan Wang
Appl. Sci. 2025, 15(1), 58; https://doi.org/10.3390/app15010058 - 25 Dec 2024
Viewed by 371
Abstract
Existing generative image steganography methods typically encode secret information into latent vectors, which are transformed into the entangled features of generated images. This approach faces two main challenges: (1) Transmission can degrade the quality of stego-images, causing bit errors in information extraction. (2) [...] Read more.
Existing generative image steganography methods typically encode secret information into latent vectors, which are transformed into the entangled features of generated images. This approach faces two main challenges: (1) Transmission can degrade the quality of stego-images, causing bit errors in information extraction. (2) High embedding capacity often reduces the accuracy of information extraction. To overcome these limitations, this paper presents a novel generative image steganography via encoding pose keypoints. This method employs an LSTM-based sequence generation model to embed secret information into the generation process of pose keypoint sequences. Each generated sequence is drawn as a keypoint connectivity graph, which serves as input with an original image to a trained pose-guided person image generation model (DPTN-TA) to generate an image with the target pose. The sender uploads the generated images to a public channel to transmit the secret information. On the receiver’s side, an improved YOLOv8 pose estimation model extracts the pose keypoints from the stego-images and decodes the embedded secret information using the sequence generation model. Extensive experiments on the DeepFashion dataset show that the proposed method significantly outperforms state-of-the-art methods in information extraction accuracy, achieving 99.94%. It also achieves an average hiding capacity of 178.4 bits per image. This method is robust against common image attacks, such as salt and pepper noise, median filtering, compression, and screenshots, with an average bit error rate of less than 0.87%. Additionally, the method is optimized for fast inference and lightweight deployment, enhancing its real-world applicability. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Overall framework of steganography.</p>
Full article ">Figure 2
<p>Distribution heatmap of the original keypoint.</p>
Full article ">Figure 3
<p>Sequence generation process.</p>
Full article ">Figure 4
<p>Structure of the DPTN-TA. It contains a self-reconstruction branch for auxiliary source-to-source task, and a transformation branch for main source-to-target task. These two branches share partial weights and are communicated by a pose transformer module.</p>
Full article ">Figure 5
<p>Structure of the improved YOLOv8n-Pose.</p>
Full article ">Figure 6
<p>Part of the backbone network module.</p>
Full article ">Figure 7
<p>Structure of RepConv at different stages.</p>
Full article ">Figure 8
<p>Marking sequence of pose keypoints.</p>
Full article ">Figure 9
<p>Examples of different image attacks.</p>
Full article ">Figure 10
<p>Robustness comparison under different attitude estimation networks.</p>
Full article ">Figure 11
<p>Promotional Tweet Example with Stego-Images.</p>
Full article ">Figure 12
<p>Generation Results Across Different Epochs.</p>
Full article ">
24 pages, 819 KiB  
Article
AI-Driven Optimization of Urban Logistics in Smart Cities: Integrating Autonomous Vehicles and IoT for Efficient Delivery Systems
by Baha M. Mohsen
Sustainability 2024, 16(24), 11265; https://doi.org/10.3390/su162411265 - 22 Dec 2024
Viewed by 1133
Abstract
Urban logistics play a pivotal role in smart city development, aiming to improve the efficiency and sustainability of goods delivery in urban environments. As cities face growing challenges related to congestion, traffic management, and environmental impact, there is an increasing need for advanced [...] Read more.
Urban logistics play a pivotal role in smart city development, aiming to improve the efficiency and sustainability of goods delivery in urban environments. As cities face growing challenges related to congestion, traffic management, and environmental impact, there is an increasing need for advanced technologies to optimize urban delivery systems. This paper proposes an innovative framework that integrates artificial intelligence (AI), autonomous vehicles (AVs), and Internet of Things (IoT) technologies to address these challenges. The framework leverages real-time data from IoT-enabled infrastructure to optimize route planning, enhance traffic signal control, and enable predictive demand management for delivery services. By incorporating AI-driven analytics, the proposed approach aims to improve traffic flow, reduce congestion, and minimize the carbon footprint of urban logistics, contributing to the development of more sustainable and efficient smart cities. This work highlights the potential for combining these technologies to transform urban logistics, offering a novel approach to enhancing delivery operations in densely populated areas. Full article
(This article belongs to the Collection Sustainable Freight Transportation System)
Show Figures

Figure 1

Figure 1
<p>The proposed framework.</p>
Full article ">Figure 2
<p>System architecture diagram.</p>
Full article ">Figure 3
<p>Traffic flow simulation.</p>
Full article ">
23 pages, 7420 KiB  
Article
Evaluation of Battery Management Systems for Electric Vehicles Using Traditional and Modern Estimation Methods
by Muhammad Talha Mumtaz Noreen, Mohammad Hossein Fouladfar and Nagham Saeed
Network 2024, 4(4), 586-608; https://doi.org/10.3390/network4040029 - 21 Dec 2024
Viewed by 440
Abstract
This paper presents the development of an advanced battery management system (BMS) for electric vehicles (EVs), designed to enhance battery performance, safety, and longevity. Central to the BMS is its precise monitoring of critical parameters, including voltage, current, and temperature, enabled by dedicated [...] Read more.
This paper presents the development of an advanced battery management system (BMS) for electric vehicles (EVs), designed to enhance battery performance, safety, and longevity. Central to the BMS is its precise monitoring of critical parameters, including voltage, current, and temperature, enabled by dedicated sensors. These sensors facilitate accurate calculations of the state of charge (SOC) and state of health (SOH), with real-time data displayed through an IoT cloud interface. The proposed BMS employs data-driven approaches, like advanced Kalman filters (KF), for battery state estimation, allowing continuous updates to the battery state with improved accuracy and adaptability during each charging cycle. Simulation tests conducted in MATLAB’s Simulink across multiple charging and discharging cycles demonstrate the superior accuracy of the advanced Kalman filter (KF), in handling non-linear battery behaviours. Results indicate that the proposed BMS achieves a significantly lower error margin in SOC tracking, ranging from 0.32% to 1%, compared to traditional methods with error margins up to 5%. These findings underscore the importance of integrating robust sensor systems in BMSs to optimise EV battery management, reduce maintenance costs, and improve battery sustainability. Full article
Show Figures

Figure 1

Figure 1
<p>Equivalent Circuit Model of a Battery.</p>
Full article ">Figure 2
<p>EKF Method Block Diagram.</p>
Full article ">Figure 3
<p>System Stages Block Diagram.</p>
Full article ">Figure 4
<p>SOC and SOH Estimation Block Diagram.</p>
Full article ">Figure 5
<p>BMS Model (<b>a</b>) and User-interface (<b>b</b>) for BMS Simulation Simulink Model Implementation.</p>
Full article ">Figure 6
<p>Practical BMS Model Implementation.</p>
Full article ">Figure 7
<p>Measured Voltage and Current Graphs.</p>
Full article ">Figure 8
<p>Real and Estimated SOC Graphs.</p>
Full article ">Figure 9
<p>Zoomed SOC Graph.</p>
Full article ">Figure 10
<p>Estimated SOH Graphs.</p>
Full article ">Figure 11
<p>Estimated R0 Graphs.</p>
Full article ">Figure 12
<p>(<b>a</b>) Show Measured Temperature Graphs with Cooling and (<b>b</b>) without Cooling.</p>
Full article ">Figure 13
<p>(<b>a</b>,<b>b</b>) Show Battery Parameters Displayed on IoT Platform.</p>
Full article ">Figure 14
<p>Red LED Turning on When Battery Overheating.</p>
Full article ">
Back to TopTop