Search results

1 – 10 of 18
Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 30 April 2024

Lin Kang, Junjie Chen, Jie Wang and Yaqi Wei

In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an…

Abstract

Purpose

In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an efficient V2V spectrum access mechanism is proposed in this paper.

Design/methodology/approach

A long-short-term-memory-based multi-agent hybrid proximal policy optimization (LSTM-H-PPO) algorithm is proposed, through which the distributed spectrum access and continuous power control of V2V link are realized.

Findings

Simulation results show that compared with the baseline algorithm, the proposed algorithm has significant advantages in terms of total system capacity, payload delivery success rate of V2V link and convergence speed.

Originality/value

The LSTM layer uses the time sequence information to estimate the accurate system state, which ensures the choice of V2V spectrum access based on local observation effective. The hybrid PPO framework shares training parameters among agents which speeds up the entire training process. The proposed algorithm adopts the mode of centralized training and distributed execution, so that the agent can achieve the optimal spectrum access based on local observation information with less signaling overhead.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 17 May 2023

Ishita Seth, Kalpna Guleria and Surya Narayan Panda

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…

28

Abstract

Purpose

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.

Design/methodology/approach

The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.

Findings

The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.

Originality/value

The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.

Article
Publication date: 25 January 2024

Lin Kang, Jie Wang, Junjie Chen and Di Yang

Since the performance of vehicular users and cellular users (CUE) in Vehicular networks is highly affected by the allocated resources to them. The purpose of this paper is to…

Abstract

Purpose

Since the performance of vehicular users and cellular users (CUE) in Vehicular networks is highly affected by the allocated resources to them. The purpose of this paper is to investigate the resource allocation for vehicular communications when multiple V2V links and a V2I link share spectrum with CUE in uplink communication under different Quality of Service (QoS).

Design/methodology/approach

An optimization model to maximize the V2I capacity is established based on slowly varying large-scale fading channel information. Multiple V2V links are clustered based on sparrow search algorithm (SSA) to reduce interference. Then, a weighted tripartite graph is constructed by jointly optimizing the power of CUE, V2I and V2V clusters. Finally, spectrum resources are allocated based on a weighted 3D matching algorithm.

Findings

The performance of the proposed algorithm is tested. Simulation results show that the proposed algorithm can maximize the channel capacity of V2I while ensuring the reliability of V2V and the quality of service of CUE.

Originality/value

There is a lack of research on resource allocation algorithms of CUE, V2I and multiple V2V in different QoS. To solve the problem, one new resource allocation algorithm is proposed in this paper. Firstly, multiple V2V links are clustered using SSA to reduce interference. Secondly, the power allocation of CUE, V2I and V2V is jointly optimized. Finally, the weighted 3D matching algorithm is used to allocate spectrum resources.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 23 April 2024

Fahim Ullah, Oluwole Olatunji and Siddra Qayyum

Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning…

Abstract

Purpose

Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning from discipline-specific experiences, this paper articulates recent advancements in the knowledge and concepts of G-IoT in relation to the construction and smart city sectors. It provides a scoping review for G-IoT as an overlooked dimension. Attention was paid to modern circularity, cleaner production and sustainability as key benefits of G-IoT adoption in line with the United Nations’ Sustainable Development Goals (UN-SDGs). In addition, this study also investigates the current application and adoption strategies of G-IoT.

Design/methodology/approach

This study uses the Preferred Reporting Items for Systematic and Meta-Analyses (PRISMA) review approach. Resources are drawn from Scopus and Web of Science repositories using apt search strings that reflect applications of G-IoT in the built environment in relation to construction management, urban planning, societies and infrastructure. Thematic analysis was used to analyze pertinent themes in the retrieved articles.

Findings

G-IoT is an overlooked dimension in construction and smart cities so far. Thirty-three scholarly articles were reviewed from a total of 82 articles retrieved, from which five themes were identified: G-IoT in buildings, computing, sustainability, waste management and tracking and monitoring. Among other applications, findings show that G-IoT is prominent in smart urban services, healthcare, traffic management, green computing, environmental protection, site safety and waste management. Applicable strategies to hasten adoption include raising awareness, financial incentives, dedicated work approaches, G-IoT technologies and purposeful capacity building among stakeholders. The future of G-IoT in construction and smart city research is in smart drones, building information modeling, digital twins, 3D printing, green computing, robotics and policies that incentivize adoption.

Originality/value

This study adds to the normative literature on envisioning potential strategies for adoption and the future of G-IoT in construction and smart cities as an overlooked dimension. No previous study to date has reviewed pertinent literature in this area, intending to investigate the current applications, adoption strategies and future direction of G-IoT in construction and smart cities. Researchers can expand on the current study by exploring the identified G-IoT applications and adoption strategies in detail, and practitioners can develop implementation policies, regulations and guidelines for holistic G-IoT adoption.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 11 April 2024

Ayşe Şengöz, Beste Nisa Orhun and Nil Konyalilar

Developments regarding the use of artificial intelligence (AI) in transportation systems, one of the important stakeholders of tourism, are remarkable. However, no review thus…

Abstract

Purpose

Developments regarding the use of artificial intelligence (AI) in transportation systems, one of the important stakeholders of tourism, are remarkable. However, no review thus far has provided a comprehensive overview of research on AI in transportation systems.

Design/methodology/approach

To fill this gap, this study uses the VOSviewer software to present a bibliometric review of the current scientific literature in the field of AI-related tourism research. The theme of AI in transportation systems was explored in the Web of Science database.

Findings

The original search yielded 642 documents, which were then filtered by parameters. For publications related to AI in transportation systems, the most cited documents, leading authors, productive countries, co-occurrence analysis of keywords and bibliographic matching of documents were examined. This report shows that there has been a recent increase in research on AI in transport systems. However, there is only one study on tourism. The country that contributed the most is China with 298 studies. The most used keyword in the documents was intelligent transportation system.

Originality/value

The bibliometric analysis of the existing work provided a valuable and seminal reference for researchers and practitioners in AI-related in transportation system.

Details

Worldwide Hospitality and Tourism Themes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1755-4217

Keywords

Book part
Publication date: 14 June 2023

Angela Graf, Thomas Hess, Lea Müller and Fabian Zimmer

Talking about smart cities also entails talking about new ways of mobility. Various concepts compete for reimagining future mobility, most prominently connected cars, robo taxis…

Abstract

Talking about smart cities also entails talking about new ways of mobility. Various concepts compete for reimagining future mobility, most prominently connected cars, robo taxis, and other forms of shared mobility. New digital technologies, changing customer requirements, but also new competitors are dynamically affecting previous market logics. To stay future-proof in this new world of mobility, the automotive sector, which is an important nucleus for developing such mobility solutions, is currently undergoing fundamental digital transformation processes. Established car manufacturers have to find their path to choose out of the many possibilities on the rise. Against this backdrop, they face the major challenge to find an answer to the question: Who are we and who do we want to be in the future? Therefore, we argue that organizations’ digital transformation is highly entangled with questions on organizational identity and discuss digital transformation as a potential identity threat for established organizations.

We begin this chapter by introducing the concept of organizational identity. Afterward, we will continue with applying it to the practical context of car manufacturers: After depicting the major trends of digitalization in the mobility and automotive sector, we will focus on the digital transformation processes of established automotive companies and discuss their impact on organizational identity. Empirical illustrations of the Volkswagen case depict our theoretical considerations.

We provide theoretical ideas for better understanding the impact of digital transformation on organizational identity, as well as suggestions for practitioners concerned with organizations’ digital transformation processes.

Details

Smart Cities and Digital Transformation: Empowering Communities, Limitless Innovation, Sustainable Development and the Next Generation
Type: Book
ISBN: 978-1-80455-995-6

Keywords

Article
Publication date: 29 December 2023

Younghwan Kim and Hyunseung Lee

This study aims to develop a safe, wearable clothing system that combines visibility-enhancing and emergency–accident-responding functions for two-wheeled vehicle (TWV) users'…

Abstract

Purpose

This study aims to develop a safe, wearable clothing system that combines visibility-enhancing and emergency–accident-responding functions for two-wheeled vehicle (TWV) users' safety assistance.

Design/methodology/approach

First, the wearable system (WS) allowing users to control turn signals, brake lights and emergency flasher only with head movements was developed. Second, multiconnected systems were developed between WSs and a smartphone application (AS), providing accident occurrence recognition, driving photo capture–storage and emergency notification functions. Third, usability testing in each function was performed to assess the operability of the systems.

Findings

The intuitive interface, which uses head movement as gesture commands, was effectively operated for controlling turn signals, brake lights and emergency flasher when driving, despite differences in user physique and boarding structure among TWVs. In addition, using Bluetooth low energy and Wi-Fi protocols simultaneously can establish automatic accident recognition–notification and driving photo capture–storage–display functions by linking two WSs with one AS.

Research limitations/implications

This study presents a case using relatively accessible technologies within the fashion industry to improve users' safety and provide fundamental data for convergence education for smart fashion products, highlighting the significance of this study in this convergence era.

Originality/value

The WSs and the AS of a TWV user visually evoke the attention of other drivers and pedestrians, reducing the risk of accidents; social contribution regarding public safety will be possible by allowing the system to autonomously inform emergencies and receive emergency medical treatment quickly when the accident occurred.

Details

International Journal of Clothing Science and Technology, vol. 36 no. 1
Type: Research Article
ISSN: 0955-6222

Keywords

1 – 10 of 18