scispace - formally typeset
Search or ask a question

Showing papers on "Intelligent transportation system published in 2022"


Journal ArticleDOI
TL;DR: In this paper , a fusion-based intelligent traffic congestion control system for VNs (FITCCS-VN) using ML techniques that collect traffic data and route traffic on available routes to alleviate traffic congestion in smart cities.

163 citations


Journal ArticleDOI
01 Nov 2022
TL;DR: In this paper , the authors present a comprehensive survey of graph neural networks for traffic forecasting problems, including graph convolutional and graph attention networks, and a comprehensive list of open data and source codes for each problem.
Abstract: Traffic forecasting is important for the success of intelligent transportation systems. Deep learning models, including convolution neural networks and recurrent neural networks, have been extensively applied in traffic forecasting problems to model spatial and temporal dependencies. In recent years, to model the graph structures in transportation systems as well as contextual information, graph neural networks have been introduced and have achieved state-of-the-art performance in a series of traffic forecasting problems. In this survey, we review the rapidly growing body of research using different graph neural networks, e.g. graph convolutional and graph attention networks, in various traffic forecasting problems, e.g. road traffic flow and speed forecasting, passenger flow forecasting in urban rail transit systems, and demand forecasting in ride-hailing platforms. We also present a comprehensive list of open data and source codes for each problem and identify future research directions. To the best of our knowledge, this paper is the first comprehensive survey that explores the application of graph neural networks for traffic forecasting problems. We have also created a public GitHub repository where the latest papers, open data, and source codes will be updated.

103 citations


Journal ArticleDOI
TL;DR: The first IEEE Distributed/Decentralized Hybrid Workshop on Future Directions of Intelligent Vehicles (IEEE DHW-FDIV) as discussed by the authors was organized by the IEEE Transactions on Intelligent Vehicles.
Abstract: This is the brief report of the first IEEE Distributed/Decentralized Hybrid Workshop on Future Directions of Intelligent Vehicles (IEEE DHW-FDIV), part of the IEEE Distributed/Decentralized Hybrid Symposia on Intelligent Vehicles (IEEE DHS-IV) organized by the IEEE Transactions on Intelligent Vehicles (TIV). This DHW was conducted through two events on January 12 and February 7, 2022 with 23 and 12 participants from Asia, Europe, and North America, respectively. Various issues related to the current state of IEEE TIV and potential topics for future research and development of intelligent vehicles are addressed. Based on the suggestion of Professor Fei-Yue Wang, the new Editor-in-Chief of TIV, the first report of DHW-FDIV focuses on meta-vehicles and metaverses for smart mobility and intelligent transportation.

101 citations


Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed edge computing based video pre-processing to eliminate the redundant frames, so that they migrate the partial or all the video processing task to the edge, thereby diminishing the computing, storage and network bandwidth requirements of the cloud center, and enhancing the effectiveness of video analyzes.

91 citations


Journal ArticleDOI
TL;DR: In this paper , the latest deep reinforcement learning (RL) based traffic control applications are surveyed, specifically traffic signal control (TSC) applications based on (deep) RL, which have been studied extensively in the literature, are discussed in detail.
Abstract: Latest technological improvements increased the quality of transportation. New data-driven approaches bring out a new research direction for all control-based systems, e.g., in transportation, robotics, IoT and power systems. Combining data-driven applications with transportation systems plays a key role in recent transportation applications. In this paper, the latest deep reinforcement learning (RL) based traffic control applications are surveyed. Specifically, traffic signal control (TSC) applications based on (deep) RL, which have been studied extensively in the literature, are discussed in detail. Different problem formulations, RL parameters, and simulation environments for TSC are discussed comprehensively. In the literature, there are also several autonomous driving applications studied with deep RL models. Our survey extensively summarizes existing works in this field by categorizing them with respect to application types, control models and studied algorithms. In the end, we discuss the challenges and open questions regarding deep RL-based transportation applications.

86 citations


Journal ArticleDOI
TL;DR: A comprehensive survey on deep learning-based approaches in traffic prediction from multiple perspectives is provided in this article , where the authors provide a taxonomy of traffic prediction methods and discuss open challenges in this field.
Abstract: Traffic prediction plays an essential role in intelligent transportation system. Accurate traffic prediction can assist route planing, guide vehicle dispatching, and mitigate traffic congestion. This problem is challenging due to the complicated and dynamic spatio-temporal dependencies between different regions in the road network. Recently, a significant amount of research efforts have been devoted to this area, especially deep learning method, greatly advancing traffic prediction abilities. The purpose of this paper is to provide a comprehensive survey on deep learning-based approaches in traffic prediction from multiple perspectives. Specifically, we first summarize the existing traffic prediction methods, and give a taxonomy. Second, we list the state-of-the-art approaches in different traffic prediction applications. Third, we comprehensively collect and organize widely used public datasets in the existing literature to facilitate other researchers. Furthermore, we give an evaluation and analysis by conducting extensive experiments to compare the performance of different methods on a real-world public dataset. Finally, we discuss open challenges in this field.

56 citations


Journal ArticleDOI
TL;DR: This article provides an idea of a few smart management systems that have developed to help with traffic congestion reduction via the IoT.

54 citations


Journal ArticleDOI
TL;DR: In this paper , a blockchain-enabled crowdsensing framework for distributed traffic management is proposed, and the authors decompose the problem into two subproblems and propose the corresponding schemes, i.e., a Deep Reinforcement Learning (DRL)-based algorithm and a distributed Alternating Direction mEthod of Multipliers (DIADEM) algorithm.
Abstract: Intelligent Transportation System (ITS) is critical to cope with traffic events, e.g., traffic jams and accidents, and provide services for personal traveling. However, existing researches have not jointly considered the user data safety, utility and system latency comprehensively, to the best of our knowledge. Since both safe and efficient transmissions are significant for ITS, we construct a blockchain-enabled crowdsensing framework for distributed traffic management. First, we illustrate the system model and formulate a multi-objective optimization problem. Due to its complexity, we decompose it into two subproblems, and propose the corresponding schemes, i.e., a Deep Reinforcement Learning (DRL)-based algorithm and a DIstributed Alternating Direction mEthod of Multipliers (DIADEM) algorithm. Extensive experiments are carried out to evaluate the performance of our solutions, and experimental results demonstrate that the DRL-based algorithm can legitimately select active miners and transactions to make a satisfied trade-off between the blockchain safety and latency, and the DIADEM algorithm can effectively select task computation modes for vehicles in a distributed way to maximize their social welfare.

50 citations


Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a short-term traffic flow prediction model based on traffic flow time series analysis, and an improved long shortterm memory network (LSTM) was integrated into the prediction model.
Abstract: The real-time performance and accuracy of traffic flow prediction directly affect the efficiency of traffic flow guidance systems, and traffic flow prediction is a hotspot in the field of intelligent transportation. To further improve the accuracy of short-term traffic flow prediction, a short-term traffic flow prediction model based on traffic flow time series analysis, and an improved long short-term memory network (LSTM) is proposed. First, perform time series analysis on traffic flow data and perform smoothing and standardization processing to obtain a stable time series as model input data, which can improve the accuracy of model training and eliminate the impact of a wide range of feature values. Then, an improved LSTM model based on LSTM and bidirectional LSTM networks are established. Combining the advantages of sequential data and the long-term dependence of forwarding LSTM and reverse LSTM, the bidirectional long-term memory network (BILSTM) is integrated into the prediction model. The first layer of the LSTM network learns and predicts the input time series and further learns and trains through the bidirectional LSTM network to effectively overcome the large prediction errors. Finally, the performance of the proposed method is evaluated by comparing the predicted results with actual traffic data. The model that is proposed in this paper is compared with the long short-term memory network (LSTM) model and the bidirectional long-term memory network (BILSTM) model. The results demonstrate that the proposed method outperforms both compared methods in terms of accuracy and stability.

48 citations


Journal ArticleDOI
TL;DR: In this paper , a CITS DTs model is constructed based on CNN-SVR, whose security performance and effect are analyzed through simulation experiments. And the proposed DL algorithm model can lower the data transmission delay of the system, increase the prediction accuracy, and reasonably changes the paths to suppress the sprawl of traffic congestions, providing an experimental reference for developing and improving urban transportation.
Abstract: The purpose is to solve the security problems of the Cooperative Intelligent Transportation System (CITS) Digital Twins (DTs) in the Deep Learning (DL) environment. The DL algorithm is improved; the Convolutional Neural Network (CNN) is combined with Support Vector Regression (SVR); the DTs technology is introduced. Eventually, a CITS DTs model is constructed based on CNN-SVR, whose security performance and effect are analyzed through simulation experiments. Compared with other algorithms, the security prediction accuracy of the proposed algorithm reaches 90.43%. Besides, the proposed algorithm outperforms other algorithms regarding Precision, Recall, and F1. The data transmission performances of the proposed algorithm and other algorithms are compared. The proposed algorithm can ensure that emergency messages can be responded to in time, with a delay of less than 1.8s. Meanwhile, it can better adapt to the road environment, maintain high data transmission speed, and provide reasonable path planning for vehicles so that vehicles can reach their destinations faster. The impacts of different factors on the transportation network are analyzed further. Results suggest that under path guidance, as the Market Penetration Rate (MPR), Following Rate (FR), and Congestion Level (CL) increase, the guidance strategy’s effects become more apparent. When MPR ranges between 40% ~ 80% and the congestion is level III, the ATT decreases the fastest, and the improvement effect of the guidance strategy is more apparent. The proposed DL algorithm model can lower the data transmission delay of the system, increase the prediction accuracy, and reasonably changes the paths to suppress the sprawl of traffic congestions, providing an experimental reference for developing and improving urban transportation.

48 citations


Journal ArticleDOI
TL;DR: In this article , a series of key enabling technologies from a range of domains, such as new materials, algorithms, and system architectures, are discussed, and the strength, open challenges, maturity, and enhancing areas of these technologies are discussed.
Abstract: We are on the cusp of a new era of connected autonomous vehicles with unprecedented user experiences, tremendously improved road safety and air quality, highly diverse transportation environments and use cases, and a plethora of advanced applications. Realizing this grand vision requires a significantly enhanced vehicle-to-everything (V2X) communication network that should be extremely intelligent and capable of concurrently supporting hyperfast, ultrareliable, and low-latency massive information exchange. It is anticipated that the sixth-generation (6G) communication systems will fulfill these requirements of the next-generation V2X. In this article, we outline a series of key enabling technologies from a range of domains, such as new materials, algorithms, and system architectures. Aiming for truly intelligent transportation systems, we envision that machine learning (ML) will play an instrumental role in advanced vehicular communication and networking. To this end, we provide an overview of the recent advances of ML in 6G vehicular networks. To stimulate future research in this area, we discuss the strength, open challenges, maturity, and enhancing areas of these technologies.

Journal ArticleDOI
TL;DR: In this paper , a review of the applicability of the Metaverse in the transportation industry is presented, which highlights prospective solutions that apply to the data-driven intelligent transportation systems (DDITS).
Abstract: The Metaverse is a concept used to refer to a virtual world that exists in parallel to the physical world. It has grown from a conceptual level to having real applications in virtual reality games. The applicability of the Metaverse in numerous sectors like marketing, education, social, and even advertising exists. However, there exists little or no work on Metaverse applicability to the transportation industry. Data-driven intelligent transportation systems (DDITS) aim to provide more intelligent systems based on exploiting data. This paper reviews the concepts and features of the Metaverse. Also, the review goes over three dominant DDITS challenges: vehicle fault detection and repair, testing new technologies, and anti-theft systems. In addition, it highlights prospective Metaverse solutions that apply to the DDITS. Buttressing the utility of Metaverse in DDITS, this paper presents two major case studies: the invisible to visible (I2V) and the Metaverse on Wheels (MoW) technologies. Finally, the influence, limitations, and open issues of Metaverse applications to DDITS are discussed.

Journal ArticleDOI
TL;DR: In this paper, the authors used high-density traffic monitoring data and land use data to train random forest models capable of accurately predicting dynamic, link-level vehicle emissions in Chengdu, China.

Journal ArticleDOI
TL;DR: In this article , the authors survey the literature for cloud computing use with smart connected vehicles and Intelligent Transportation Systems (ITS) and provide taxonomies for that plus their use cases, identifying where further research is needed in order to enable vehicles and ITS to use edge cloud computing in a fully managed and automated way.
Abstract: Recent advances in smart connected vehicles and Intelligent Transportation Systems (ITS) are based upon the capture and processing of large amounts of sensor data. Modern vehicles contain many internal sensors to monitor a wide range of mechanical and electrical systems and the move to semi-autonomous vehicles adds outward looking sensors such as cameras, lidar, and radar. ITS is starting to connect existing sensors such as road cameras, traffic density sensors, traffic speed sensors, emergency vehicle, and public transport transponders. This disparate range of data is then processed to produce a fused situation awareness of the road network and used to provide real-time management, with much of the decision making automated. Road networks have quiet periods followed by peak traffic periods and cloud computing can provide a good solution for dealing with peaks by providing offloading of processing and scaling-up as required, but in some situations latency to traditional cloud data centres is too high or bandwidth is too constrained. Cloud computing at the edge of the network, close to the vehicle and ITS sensor, can provide a solution for latency and bandwidth constraints but the high mobility of vehicles and heterogeneity of infrastructure still needs to be addressed. This paper surveys the literature for cloud computing use with ITS and connected vehicles and provides taxonomies for that plus their use cases. We finish by identifying where further research is needed in order to enable vehicles and ITS to use edge cloud computing in a fully managed and automated way. We surveyed 496 papers covering a seven-year timespan with the first paper appearing in 2013 and ending at the conclusion of 2019.

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper used an improved gate recurrent unit (GRU) neural network to study the time series of traffic parameter flows, which can store data characteristics over a certain period of time.
Abstract: With the increasing demand for intelligent transportation systems, short-term traffic flow prediction has become an important research direction. The memory unit of a Long Short-Term Memory (LSTM) neural network can store data characteristics over a certain period of time, hence the suitability of this network for time series processing. This paper uses an improved Gate Recurrent Unit (GRU) neural network to study the time series of traffic parameter flows. The LSTM short-term traffic flow prediction based on the flow series is first investigated, and then the GRU model is introduced. The GRU can be regarded as a simplified LSTM. After extracting the spatial and temporal characteristics of the flow matrix, an improved GRU with a bidirectional positive and negative feedback called the Bi-GRU prediction model is used to complete the short-term traffic flow prediction and study its characteristics. The Rectified Adaptive (RAdam) model is adopted to improve the shortcomings of the common optimizer. The cosine learning rate attenuation is also used for the model to avoid converging to the local optimal solution and for the appropriate convergence speed to be controlled. Furthermore, the scientific and reliable model learning rate is set together with the adaptive learning rate in RAdam. In this manner, the accuracy of network prediction can be further improved. Finally, an experiment of the Bi-GRU model is conducted. The comprehensive Bi-GRU prediction results demonstrate the effectiveness of the proposed method.

Journal ArticleDOI
TL;DR: In this article, the authors proposed an attention mechanism to the LSTM network for short-term traffic flow forecasting, which helps the network model to assign different weights to different inputs, focus on critical and important information, and make accurate predictions.
Abstract: Accurate forecasting of future traffic flow has a wide range of applications, which is a fundamental component of intelligent transportation systems. However, timely and accurate traffic forecasting remains an open challenge due to the high nonlinearity and volatility of traffic flow data. Canonical long short-term memory (LSTM) networks are easily drawn to focus on min-to-min fluctuations rather than the long term dependencies of the traffic flow evolution. To address this issue, we propose to introduce an attention mechanism to the long short-term memory network for short-term traffic flow forecasting. The attention mechanism helps the network model to assign different weights to different inputs, focus on critical and important information, and make accurate predictions. Extensive experiments on four benchmark data sets show that the LSTM network equipped with an attention mechanism has superior performance compared with commonly used and state-of-the-art models.

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a privacy-oriented task offloading method that can resist attacks from privacy attackers with prior knowledge, where the local computing model, channel model, and privacy loss model are defined and used to quantify evaluation indicators, such those related to privacy, time, and energy.
Abstract: AI-empowered 5G/6G networks play a substantial role in taking full advantage of the Internet of Things (IoT) to perform complex computing by offloading tasks to edge services deployed in intelligent transport systems. However, offloading behavior has a certain regularity, and the real-time location of users can easily be inferred by attackers who have historical user data during the data transmission process. To address this problem, a privacy-oriented task offloading method that can resist attacks from privacy attackers with prior knowledge is proposed. First, the local computing model, channel model, and privacy loss model are defined and used to quantify evaluation indicators, such those related to privacy, time, and energy. Among them, privacy loss is formalized as the probability of a successful attack by an attacker with prior knowledge. Second, the process of solving an optimal task offloading decision problem is formalized into a Markov decision process (MDP). Finally, the deep reinforcement learning (DRL) method PPO2 is proposed to solve the planning problem of task offloading with good generalization and convergence speed, where we focus on the location privacy requirement. Experiments show that our method can handle large-scale task offloading and obtain offloading policies with reduced privacy loss, energy consumption and time delays.

Journal ArticleDOI
TL;DR: In this article , the authors combine the hyperelliptic curve cryptography (HECC) techniques, digital signature, and hash function to present a privacy-preserving authentication scheme.
Abstract: In this article, unmanned aerial vehicles (UAVs) are expected to play a key role in improving the safety and reliability of transportation systems, particularly where data traffic is nonhomogeneous and nonstationary. However, heterogeneous data sharing raises plenty of security and privacy concerns, which may keep UAVs out of future intelligent transportation systems (ITS). Some of the well-known security and privacy issues in the UAV-enabled ITS ecosystem include tracking UAVs and vehicle locations, unauthorized access to data, and message modification. Therefore, in this article, we contribute to the sum of knowledge by combining the hyperelliptic curve cryptography (HECC) techniques, digital signature, and hash function to present a privacy-preserving authentication scheme. The security features of the proposed scheme are assessed using formal security analysis methods, i.e., real-or- random (ROR) oracle model. To examine the performance of the proposed scheme, a comparison with other existing schemes has been carried out. The results reveal that the proposed scheme outperforms its counterpart schemes in terms of computation and communication costs.

Journal ArticleDOI
TL;DR: In this article , a cloud-assisted Internet of things Intelligent Transportation System (CIoT-ITS) is proposed to overcome traffic management's challenges, where the IoT sensor integrated camera is installed in every traffic signal corner to monitor the vehicle's flow.
Abstract: Presently, most smart cities face massive traffic issues every day. The smart cities’ significant challenge is the traffic control system, wherein some places are automated and cost-effective. In this manuscript, cloud-assisted Internet of things Intelligent Transportation System (CIoT-ITS) is proposed to overcome traffic management’s challenges. Here, the IoT sensor integrated camera is installed in every traffic signal corner to monitor the vehicle’s flow. Further, the optimised vehicle flow data is sent to the cloud processes. The data from the various signal corners runs an algorithm to detect traffic direction and controls the signal lights. The alert notification is sent to the nearest traffic control room during traffic congestion using IoT sensors. Simulation analysis proved that the proposed CIoT-ITS could monitor and manage the vehicle flow successfully and automatically. The proposed system has been validated based on the optimisation parameter, which outperforms conventional methods.

Journal ArticleDOI
TL;DR: In this paper , a Machine Learning (ML) mechanism that takes advantage of three new features, which are mainly related to the sender position, allowing to enhance the performances of IDS for position falsification attacks is proposed.
Abstract: Cooperative Intelligent Transport Systems (C-ITS) is an advanced technology for road safety and traffic efficiency over Vehicular Ad Hoc Networks (VANETs) allowing vehicles to communicate with other vehicles or infrastructures. The security of VANETs is one of the main concerns in C-ITS because there may be some attacks in such type of network that may endanger the safety of the passengers. Intrusion Detection Systems (IDS) play an important role to protect the vehicular network by detecting misbehaving vehicles. In general, the works in the literature use the same well-known features in a centralized IDS. In this paper, we propose a Machine Learning (ML) mechanism that takes advantage of three new features, which are mainly related to the sender position, allowing to enhance the performances of IDS for position falsification attacks. Besides, it presents a comparison of two different ML methods for classification, i.e. k-Nearest Neighbor (kNN) and Random Forest (RF) that are used to detect malicious vehicles using these features. Finally, Ensemble Learning (EL) which combines different ML methods, in our case kNN and RF, is also carried out to improve the detection performance. An IDS is constructed allowing vehicles to detect misbehavior in a distributed way, while the detection mechanism is trained centrally. The results demonstrate that the proposed mechanism gives better results, in terms of classification performance indicators and computational time, than the best previous approaches on average.

Journal ArticleDOI
TL;DR: In this paper , a federated deep learning-based intrusion detection framework (FED-IDS) is proposed to efficiently detect attacks by offloading the learning process from servers to distributed vehicular edge nodes.
Abstract: With the integration of the Internet of Things (IoT) in the field of transportation, the Internet of Vehicles (IoV) turned to be a vital method for designing Smart Transportation Systems (STS). STS consist of various interconnected vehicles and transportation infrastructure exposed to cyber intrusion due to the broad usage of software and the initiation of wireless interfaces. This study proposes a federated deep learning-based intrusion detection framework (FED-IDS) to efficiently detect attacks by offloading the learning process from servers to distributed vehicular edge nodes. FED-IDS introduces a context-aware transformer network to learn spatial-temporal representations of vehicular traffic flows necessary for classifying different categories of attacks. Blockchain-managed federated training is presented to enable multiple edge nodes to offer secure, distributed, and reliable training without the need for centralized authority. In the blockchain, miners confirm the distributed local updates from participating vehicles to stop unreliable updates from being deposited on the blockchain. The experiments on two public datasets (i.e., Car-Hacking, TON_IoT) demonstrated the efficiency of FED-IDS against state-of-the-art approaches. It reveals the credibility of securing networks of intelligent transportation systems against cyber-attacks.

Journal ArticleDOI
TL;DR: In this article , the authors present a comprehensive survey on resource allocation schemes for the two dominant vehicular network technologies, e.g. Dedicated Short Range Communications (DSRC) and cellular based vehicular networks.
Abstract: Vehicular networks, an enabling technology for Intelligent Transportation System (ITS), smart cities, and autonomous driving, can deliver numerous on-board data services, e.g., road-safety, easy navigation, traffic efficiency, comfort driving, infotainment, etc. Providing satisfactory Quality of Service (QoS) in vehicular networks, however, is a challenging task due to a number of limiting factors such as erroneous and congested wireless channels (due to high mobility or uncoordinated channel-access), increasingly fragmented and congested spectrum, hardware imperfections, and anticipated growth of vehicular communication devices. Therefore, it will be critical to allocate and utilize the available wireless network resources in an ultra-efficient manner. In this paper, we present a comprehensive survey on resource allocation schemes for the two dominant vehicular network technologies, e.g. Dedicated Short Range Communications (DSRC) and cellular based vehicular networks. We discuss the challenges and opportunities for resource allocations in modern vehicular networks and outline a number of promising future research directions.

Journal ArticleDOI
TL;DR: In this paper , the authors present a comprehensive review of AI techniques that are currently being explored by various research efforts in the area of VANETs, and discuss the strengths and weaknesses of these proposed AI-based proposed approaches for the VANet environment.

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a Federated Deep Learning based on the Spatial-Temporal Long and Short-Term Networks (FedSTN) algorithm to predict traffic flow by utilizing observed historical traffic data.
Abstract: Predicting traffic flow plays an important role in reducing traffic congestion and improving transportation efficiency for smart cities. Traffic Flow Prediction (TFP) in the smart city requires efficient models, highly reliable networks, and data privacy. As traffic data, traffic trajectory can be transformed into a graph representation, so as to mine the spatio-temporal information of the graph for TFP. However, most existing work adopt a central training mode where the privacy problem brought by the distributed traffic data is not considered. In this paper, we propose a Federated Deep Learning based on the Spatial-Temporal Long and Short-Term Networks (FedSTN) algorithm to predict traffic flow by utilizing observed historical traffic data. In FedSTN, each local TFP model deployed in an edge computing server includes three main components, namely Recurrent Long-term Capture Network (RLCN) module, Attentive Mechanism Federated Network (AMFN) module, and Semantic Capture Network (SCN) module. RLCN can capture the long-term spatial-temporal information in each area. AMFN shares short-term spatio-temporal hidden information when it trains its local TFP model by the additive homomorphic encryption approach based on Vertical Federated Learning (VFL). We employ SCN to capture semantic features such as irregular non-Euclidean connections and Point of Interest (POI). Compared with existing baselines, several simulations are conducted on practical data sets and the results prove the effectiveness of our algorithm.

Journal ArticleDOI
TL;DR: In this paper , a technique for resolving authentication and security issues in Intelligent Transport Systems (ITS) using lightweight cryptography and graph-based machine learning is proposed. But, the solution uses the concepts of identity based authentication technique and graph based machine learning in order to authenticate the smart vehicle in ITS.
Abstract: Intelligent Transport Systems (ITS) is a developing technology that will significantly alter the driving experience. In such systems, smart vehicles and Road-Side Units (RSUs) communicate through the VANET. Safety apps use these data to identify and prevent hazardous situations in real-time. Detection of malicious nodes and attack traffic in Intelligent Transportation Systems (ITS) is a current research subject. Recently, researchers are proposing graph-based machine learning techniques to identify malicious users in the ITS environment, through which it is easy to analyze the network traffic and detect the malicious devices. Therefore, graph-based machine learning techniques could be a technique that efficiently detect malicious nodes in the ITS environment. In this context, this article aims to provide a technique for resolving authentication and security issues in ITS using lightweight cryptography and graph-based machine learning. Our solution uses the concepts of identity based authentication technique and graph-based machine learning in order to provide authentication and security to the smart vehicle in ITS. By authenticating smart vehicles in ITS and identifying various cyber threats, our proposed method substantially contributes to the development of intelligent transportation communication environment.

Book ChapterDOI
01 Jan 2022
TL;DR: This paper focuses on both V2V and V2I latest findings done by previous researcher and describes the operation of DSRC along with its architecture including SAE J2735, Basic Safety Message (BSM) and different type of Wireless Access in Vehicular Environment (WAVE) which is being labeled as IEEE 802p.
Abstract: Intelligent Transportation System (ITS) consisting of Vehicle Ad-hoc Networks (VANET) offers a major role in ensuring a safer environment in cities for drivers and pedestrians. VANET has been classified into two main parts which are Vehicle to Infrastructure (V2I) along with Vehicle to Vehicle (V2V) Communication System. This technology is still in development and has not been fully implemented worldwide. Currently, Dedicated Short Range Communication (DSRC) is a commonly used module for this system. This paper focuses on both V2V and V2I latest findings done by previous researcher and describes the operation of DSRC along with its architecture including SAE J2735, Basic Safety Message (BSM) and different type of Wireless Access in Vehicular Environment (WAVE) which is being labeled as IEEE 802.11p. Interestingly, (i) DSRC technology has been significantly evolved from electronic toll collector application to other V2V and V2I applications such as Emergency Electronics Brake Lights (EEBL), Forward Collision Warning (FCW), Intersection Moving Assist (IMA), Left Turn Assist (LTA) and Do Not Pass Warning (DNPW) (ii) DSRC operates at different standards and frequencies subject to the country regulations (e.g. ITS-G5A for Europe (5.875–5.905 GHz), US (5.850–5.925 GHz), Japan (755.5–764.5 MHz) and most other countries (5.855–5.925 GHz)) where the frequencies affected most on the radius of coverage.

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a privacy-preserving protocol of vehicle feedback (PPVF) for cloud-assisted VANET, in which with the assistance of the roadside units (RSU), cloud service provider (CSP) obtains the total number of vehicles with the corresponding parameters in the feedback for reputation calculation without violating individual feedback privacy.
Abstract: The vehicular ad hoc network (VANET) is a platform for exchanging information between vehicles and everything to enhance driver’s driving experience and improve traffic conditions. The reputation system plays an essential role in judging whether to communicate with the target vehicle based on other vehicles’ feedback. However, existing reputation systems ignore the privacy protection of feedback providers. Additionally, traditional VANET based on wireless sensor networks (WSNs) has limited power, storage, and processing capabilities, which cannot meet the real-world demands in a practical VANET deployment. Thus, we attempt to integrate cloud computing with VANET and proposes a privacy-preserving protocol of vehicle feedback (PPVF) for cloud-assisted VANET. In cloud-assisted VANET, we integrate homomorphic encryption and data aggregation technology to design the scheme PPVF, in which with the assistance of the roadside units (RSU), cloud service provider (CSP) obtains the total number of vehicles with the corresponding parameters in the feedback for reputation calculation without violating individual feedback privacy. Simulation results and security analysis confirm that PPVF achieves effective privacy protection for vehicle feedback with acceptable computational and communication burden. Besides, the RSU is capable of handling 1999 messages for every $300ms$ , so as the number of vehicles in the communication domain increases, the PPVF has a lower message loss rate.

Journal ArticleDOI
01 Apr 2022-Sensors
TL;DR: The experiment outcomes reveal that the proposed ATM system significantly outperformed the conventional traffic-management strategy and will be a frontrunner for transportation planning in smart-city-based transport systems.
Abstract: The rapid growth in the number of vehicles has led to traffic congestion, pollution, and delays in logistic transportation in metropolitan areas. IoT has been an emerging innovation, moving the universe towards automated processes and intelligent management systems. This is a critical contribution to automation and smart civilizations. Effective and reliable congestion management and traffic control help save many precious resources. An IoT-based ITM system set of sensors is embedded in automatic vehicles and intelligent devices to recognize, obtain, and transmit data. Machine learning (ML) is another technique to improve the transport system. The existing transport-management solutions encounter several challenges resulting in traffic congestion, delay, and a high fatality rate. This research work presents the design and implementation of an Adaptive Traffic-management system (ATM) based on ML and IoT. The design of the proposed system is based on three essential entities: vehicle, infrastructure, and events. The design utilizes various scenarios to cover all the possible issues of the transport system. The proposed ATM system also utilizes the machine-learning-based DBSCAN clustering method to detect any accidental anomaly. The proposed ATM model constantly updates traffic signal schedules depending on traffic volume and estimated movements from nearby crossings. It significantly lowers traveling time by gradually moving automobiles across green signals and decreases traffic congestion by generating a better transition. The experiment outcomes reveal that the proposed ATM system significantly outperformed the conventional traffic-management strategy and will be a frontrunner for transportation planning in smart-city-based transport systems. The proposed ATM solution minimizes vehicle waiting times and congestion, reduces road accidents, and improves the overall journey experience.

Journal ArticleDOI
TL;DR: In this paper , the authors take advantage of next-generation network technologies to propose a responsive and lightweight framework for smart transportation system which employs blockchain for authentication using fog computing for distributed applications to provide an efficient and secure transportation system.
Abstract: Rapid urbanization is putting a strain on the transport systems of cities worldwide. The effects of this trend include prolonged traffic jams and increasing environmental pollution from rising C O 2 emissions. As city planning requires innovative ways of dealing with the rapid urbanization trend, technological solutions were proposed such as cloud computing, smart vehicles, and Vehicular Ad hoc NETwork (VANET). In this paper, we take advantage of next-generation network technologies to propose a responsive and lightweight framework for smart transportation system which employs blockchain for authentication using fog computing’s improvement over cloud computing for distributed applications to provide an efficient and secure transportation system. We take into account the future technologies of 5G and Beyond 5G (B5G) and argue that the integration of B5G technologies, federated learning , blockchain, and edge computing provides the perfect platform necessary for a smart transportation system The evaluation of the proposed framework is done by comparing it to the current cloud-based approach in iFogSim, a popular simulation tool for fog computing research. The evaluation of blockchain-based authentication was done using a customized implementation of blockchain executed in an experimental setup. The simulation results showed that the proposed framework provides superior performance in terms of security, latency, and energy consumption of the system.

Journal ArticleDOI
TL;DR: In this article , the authors present a secure and trusted V2V and V2I communication approach using edge infrastructures where instead of direct peer-to-peer communication, they introduce trusted cloudlets to authorize, check and verify the authenticity, integrity and ensure anonymity of messages exchanged in the system.
Abstract: Intelligent Transportation System (ITS) is a vision which offers safe, secure and smart travel experience to drivers. This futuristic plan aims to enable vehicles, roadside transportation infrastructures, pedestrian smart-phones and other devices to communicate with one another to provide safety and convenience services. Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication in ITS offers ability to exchange speed, heading angle, position and other environment related conditions amongst vehicles and with surrounding smart infrastructures. In this intelligent setup, vehicles and users communicate and exchange data with random untrusted entities (like vehicles, smart traffic lights or pedestrians) whom they don't know or have met before. The concerns of location privacy and secure communication further deter the adoption of this smarter and safe transportation. In this paper, we present a secure and trusted V2V and V2I communication approach using edge infrastructures where instead of direct peer to peer communication, we introduce trusted cloudlets to authorize, check and verify the authenticity, integrity and ensure anonymity of messages exchanged in the system. Moving vehicles or road side infrastructure are dynamically connected to nearby cloudlets, where security policies can be implemented to sanitize or stop fake messages and prevent rogue vehicles to exchange messages with other vehicles. We also present a formal attribute-based model for V2V and V2I communication, called AB-ITS, along with proof of concept implementation of the proposed solution in AWS IoT platform. This cloudlet supported architecture complements direct V2V or V2I communication, and serves important use cases such as accident or ice-threat warning and other safety applications. Performance metrics of our proposed architecture are also discussed and compared with existing ITS technologies.