Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (80)

Search Parameters:
Keywords = heterogeneous Internet of Vehicles

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 2856 KB  
Article
Privacy-Preserving Federated Review Analytics with Data Quality Optimization for Heterogeneous IoT Platforms
by Jiantao Xu, Liu Jin and Chunhua Su
Electronics 2025, 14(19), 3816; https://doi.org/10.3390/electronics14193816 - 26 Sep 2025
Abstract
The proliferation of Internet of Things (IoT) devices has created a distributed ecosystem where users generate vast amounts of review data across heterogeneous platforms, from smart home assistants to connected vehicles. This data is crucial for service improvement but is plagued by fake [...] Read more.
The proliferation of Internet of Things (IoT) devices has created a distributed ecosystem where users generate vast amounts of review data across heterogeneous platforms, from smart home assistants to connected vehicles. This data is crucial for service improvement but is plagued by fake reviews, data quality inconsistencies, and significant privacy risks. Traditional centralized analytics fail in this landscape due to data privacy regulations and the sheer scale of distributed data. To address this, we propose FedDQ, a federated learning framework for Privacy-Preserving Federated Review Analytics with Data Quality Optimization. FedDQ introduces a multi-faceted data quality assessment module that operates locally on each IoT device, evaluating review data based on textual coherence, behavioral patterns, and cross-modal consistency without exposing raw data. These quality scores are then used to orchestrate a quality-aware aggregation mechanism at the server, prioritizing contributions from high-quality, reliable clients. Furthermore, our framework incorporates differential privacy and models system heterogeneity to ensure robustness and practical applicability in resource-constrained IoT environments. Extensive experiments on multiple real-world datasets show that FedDQ significantly outperforms baseline federated learning methods in accuracy, convergence speed, and resilience to data poisoning attacks, achieving up to a 13.8% improvement in F1-score under highly heterogeneous and noisy conditions while preserving user privacy. Full article
(This article belongs to the Special Issue Emerging IoT Sensor Network Technologies and Applications)
Show Figures

Figure 1

23 pages, 1898 KB  
Article
A Container-Native IAM Framework for Secure Green Mobility: A Case Study with Keycloak and Kubernetes
by Alexandre Sousa, Frederico Branco, Arsénio Reis and Manuel J. C. S. Reis
Information 2025, 16(9), 802; https://doi.org/10.3390/info16090802 - 15 Sep 2025
Viewed by 199
Abstract
The rapid adoption of green mobility solutions—such as electric-vehicle sharing and intelligent transportation systems—has accelerated the integration of Internet of Things (IoT) technologies, introducing complex security and performance challenges. While conceptual Identity and Access Management (IAM) frameworks exist, few are empirically validated for [...] Read more.
The rapid adoption of green mobility solutions—such as electric-vehicle sharing and intelligent transportation systems—has accelerated the integration of Internet of Things (IoT) technologies, introducing complex security and performance challenges. While conceptual Identity and Access Management (IAM) frameworks exist, few are empirically validated for the scale, heterogeneity, and real-time demands of modern mobility ecosystems. This work presents a data-backed, container-native reference architecture for secure and resilient Authentication, Authorization, and Accounting (AAA) in green mobility environments. The framework integrates Keycloak within a Kubernetes-orchestrated infrastructure and applies Zero Trust and defense-in-depth principles. Effectiveness is demonstrated through rigorous benchmarking across latency, throughput, memory footprint, and automated fault recovery. Compared to a monolithic baseline, the proposed architecture achieves over 300% higher throughput, 90% faster startup times, and 75% lower idle memory usage while enabling full service restoration in under one minute. This work establishes a validated deployment blueprint for IAM in IoT-driven transportation systems, offering a practical foundation for a secure and scalable mobility infrastructure. Full article
Show Figures

Figure 1

23 pages, 466 KB  
Article
Study on the Mechanism of Wage Growth in China’s Logistics Industry: The Roles of Government and Market
by Fuzhong Wang and Chongyan Li
Economies 2025, 13(8), 234; https://doi.org/10.3390/economies13080234 - 11 Aug 2025
Viewed by 597
Abstract
Government policies and market forces have created new possibilities for wage growth in the logistics industry, which can reshape the development direction and labor reward of enterprises. The inclusive financial policy implemented by the Chinese government is effective, and the inputs of inclusive [...] Read more.
Government policies and market forces have created new possibilities for wage growth in the logistics industry, which can reshape the development direction and labor reward of enterprises. The inclusive financial policy implemented by the Chinese government is effective, and the inputs of inclusive finance can affect the intelligent and low-carbon operations, the technical economic benefits and labor productivity in the logistics industry, thereby promoting wage growth. Meanwhile, the government-led industrial structure transformation and transportation infrastructure have brought a large number of new workers, transport individuals and enterprises into the logistics industry, which intensify the homogeneous service competition of enterprises, thereby hampering wage growth. In the market force, with the scale expansion of Internet access and logistics delivery vehicles and freight volume, the scale effects may enhance the wage level in the logistics industry. In addition, the moderating effect between policy and market forces can also confirm the existence of a positive spillover effect. The heterogeneity of wage growth varies across the eastern, central and western regions, as well as between the northern and southern regions. These findings highlight the importance of promoting the growth of labor wage income by policy implementation in inclusive finance, preferential measures on agricultural product logistics, integrated operation in the manufacturing and logistics field and the Belt and Road Initiative. Full article
Show Figures

Figure 1

21 pages, 1476 KB  
Article
AI-Driven Handover Management and Load Balancing Optimization in Ultra-Dense 5G/6G Cellular Networks
by Chaima Chabira, Ibraheem Shayea, Gulsaya Nurzhaubayeva, Laura Aldasheva, Didar Yedilkhan and Saule Amanzholova
Technologies 2025, 13(7), 276; https://doi.org/10.3390/technologies13070276 - 1 Jul 2025
Cited by 1 | Viewed by 2098
Abstract
This paper presents a comprehensive review of handover management and load balancing optimization (LBO) in ultra-dense 5G and emerging 6G cellular networks. With the increasing deployment of small cells and the rapid growth of data traffic, these networks face significant challenges in ensuring [...] Read more.
This paper presents a comprehensive review of handover management and load balancing optimization (LBO) in ultra-dense 5G and emerging 6G cellular networks. With the increasing deployment of small cells and the rapid growth of data traffic, these networks face significant challenges in ensuring seamless mobility and efficient resource allocation. Traditional handover and load balancing techniques, primarily designed for 4G systems, are no longer sufficient to address the complexity of heterogeneous network environments that incorporate millimeter-wave communication, Internet of Things (IoT) devices, and unmanned aerial vehicles (UAVs). The review focuses on how recent advances in artificial intelligence (AI), particularly machine learning (ML) and deep learning (DL), are being applied to improve predictive handover decisions and enable real-time, adaptive load distribution. AI-driven solutions can significantly reduce handover failures, latency, and network congestion, while improving overall user experience and quality of service (QoS). This paper surveys state-of-the-art research on these techniques, categorizing them according to their application domains and evaluating their performance benefits and limitations. Furthermore, the paper discusses the integration of intelligent handover and load balancing methods in smart city scenarios, where ultra-dense networks must support diverse services with high reliability and low latency. Key research gaps are also identified, including the need for standardized datasets, energy-efficient AI models, and context-aware mobility strategies. Overall, this review aims to guide future research and development in designing robust, AI-assisted mobility and resource management frameworks for next-generation wireless systems. Full article
Show Figures

Figure 1

23 pages, 6982 KB  
Article
An Efficient and Low-Delay SFC Recovery Method in the Space–Air–Ground Integrated Aviation Information Network with Integrated UAVs
by Yong Yang, Buhong Wang, Jiwei Tian, Xiaofan Lyu and Siqi Li
Drones 2025, 9(6), 440; https://doi.org/10.3390/drones9060440 - 16 Jun 2025
Viewed by 566
Abstract
Unmanned aerial vehicles (UAVs), owing to their flexible coverage expansion and dynamic adjustment capabilities, hold significant application potential across various fields. With the emergence of urban low-altitude air traffic dominated by UAVs, the integrated aviation information network combining UAVs and manned aircraft has [...] Read more.
Unmanned aerial vehicles (UAVs), owing to their flexible coverage expansion and dynamic adjustment capabilities, hold significant application potential across various fields. With the emergence of urban low-altitude air traffic dominated by UAVs, the integrated aviation information network combining UAVs and manned aircraft has evolved into a complex space–air–ground integrated Internet of Things (IoT) system. The application of 5G/6G network technologies, such as cloud computing, network function virtualization (NFV), and edge computing, has enhanced the flexibility of air traffic services based on service function chains (SFCs), while simultaneously expanding the network attack surface. Compared to traditional networks, the aviation information network integrating UAVs exhibits greater heterogeneity and demands higher service reliability. To address the failure issues of SFCs under attack, this study proposes an efficient SFC recovery method for recovery rate optimization (ERRRO) based on virtual network functions (VNFs) migration technology. The method first determines the recovery order of failed SFCs according to their recovery costs, prioritizing the restoration of SFCs with the lowest costs. Next, the migration priorities of the failed VNFs are ranked based on their neighborhood certainty, with the VNFs exhibiting the highest neighborhood certainty being migrated first. Finally, the destination nodes for migrating the failed VNFs are determined by comprehensively considering attributes such as the instantiated SFC paths, delay of physical platforms, and residual resources. Experiments demonstrate that the ERRRO performs well under networks with varying resource redundancy and different types of attacks. Compared to methods reported in the literature, the ERRRO achieves superior performance in terms of the SFC recovery rate and delay. Full article
(This article belongs to the Special Issue Space–Air–Ground Integrated Networks for 6G)
Show Figures

Figure 1

27 pages, 1065 KB  
Article
Priority-Aware Spectrum Management for QoS Optimization in Vehicular IoT
by Adeel Iqbal, Tahir Khurshaid, Yazdan Ahmad Qadri, Ali Nauman and Sung Won Kim
Sensors 2025, 25(11), 3342; https://doi.org/10.3390/s25113342 - 26 May 2025
Cited by 1 | Viewed by 703
Abstract
Vehicular Internet of Things (V-IoT) networks, sustained by a high-density deployment of roadside units and sensor-equipped vehicles, are currently at the edge of next-generation intelligent transportation system evolution. However, offering stable, low-latency, and energy-efficient communication in such heterogeneous and delay-prone environments is challenging [...] Read more.
Vehicular Internet of Things (V-IoT) networks, sustained by a high-density deployment of roadside units and sensor-equipped vehicles, are currently at the edge of next-generation intelligent transportation system evolution. However, offering stable, low-latency, and energy-efficient communication in such heterogeneous and delay-prone environments is challenging due to limited spectral resources and diverse quality of service (QoS) requirements. This paper presents a Priority-Aware Spectrum Management (PASM) scheme for IoT-based vehicular networks. This dynamic spectrum access scheme integrates interweave, underlay, and coexistence modes to optimize spectrum utilization, energy efficiency, and throughput while minimizing blocking and interruption probabilities. The algorithm manages resources efficiently and gives proper attention to each device based on its priority, so all IoT devices, from high to low priority, receive continuous and reliable service. A Continuous-Time Markov Chain (CTMC) model is derived to analyze the proposed algorithm for various network loads. Simulation results indicate improved spectral efficiency, throughput, delay, and overall QoS compliance over conventional access methods. These findings establish that the proposed algorithm is a scalable solution for dynamic V-IoT environments. Full article
(This article belongs to the Special Issue Energy Efficient Design in Wireless Ad Hoc and Sensor Networks)
Show Figures

Figure 1

27 pages, 6382 KB  
Article
Utilizing IoT Sensors and Spatial Data Mining for Analysis of Urban Space Actors’ Behavior in University Campus Space Design
by Krzysztof Koszewski, Robert Olszewski, Piotr Pałka, Renata Walczak, Przemysław Korpas, Karolina Dąbrowska-Żółtak, Michał Wyszomirski, Olga Czeranowska-Panufnik, Andrzej Manujło, Urszula Szczepankowska-Bednarek, Joanna Kuźmicz-Kubiś, Anna Szalwa, Krzysztof Ejsmont and Paweł Czernic
Sensors 2025, 25(5), 1393; https://doi.org/10.3390/s25051393 - 25 Feb 2025
Viewed by 1831
Abstract
This paper discusses the use of IoT sensor networks and spatial data mining methods to support the design process in the revitalization of the university campus of the Warsaw University of Technology (WUT) in the spirit of universal design. The aim of the [...] Read more.
This paper discusses the use of IoT sensor networks and spatial data mining methods to support the design process in the revitalization of the university campus of the Warsaw University of Technology (WUT) in the spirit of universal design. The aim of the research was to develop a methodology for the use of IoT and edge computing for the acquisition of spatial knowledge based on spatial big data, as well as for the development of an open (geo)information society that shares the responsibility for the process of shaping the spaces of smart cities. The purpose of the article is to verify the hypothesis on whether it is possible to obtain spatial–temporal quantitative data that are useful in the process of designing the space of a university campus using low-cost Internet of Things sensors, i.e., already existing networks of CCTV cameras supported by simple installed beam-crossing sensors. The methodological approach proposed in the article combines two main areas—the use of IT technologies (IoT, big data, spatial data mining) and data-driven design based on analysis of urban space actors’ behavior for participatory revitalization of a university campus. The research method applied involves placing a network of locally communicating heterogeneous IoT sensors in the space of a campus. These sensors collect data on the behavior of urban space actors: people and vehicles. The data collected and the knowledge gained from its analysis are used to discuss the shape of the campus space. The testbed of the developed methodology was the central campus of the WUT (Warsaw University of Technology), which made it possible to analyze the time-varying use of the selected campus spaces and to identify the premises for the revitalization project in accordance with contemporary trends in the design of the space of HEIs (higher education institutions), as well as the needs of the academic community and the residents of the capital. The results are used not only to optimize the process of redesigning the WUT campus, but also to support the process of discussion and activation of the community in the development of deliberative democracy and participatory shaping of space in general. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

21 pages, 478 KB  
Article
Internet Use, Social Capital, and Farmers’ Green Production Behavior: Evidence from Agricultural Cooperatives in China
by Jingjing Wang, Jiabin Xu and Silin Chen
Sustainability 2025, 17(3), 1137; https://doi.org/10.3390/su17031137 - 30 Jan 2025
Cited by 2 | Viewed by 1172
Abstract
Agricultural cooperatives are the main vehicle for farmers to engage in green agriculture. With the digital transformation in rural areas, it is crucial to explore how cooperative members can effectively access online information and integrate it into green production decision-making processes. Based on [...] Read more.
Agricultural cooperatives are the main vehicle for farmers to engage in green agriculture. With the digital transformation in rural areas, it is crucial to explore how cooperative members can effectively access online information and integrate it into green production decision-making processes. Based on the survey data of 530 members of rice planting cooperatives in Heilongjiang Province in China, this paper selected eight green production behaviors commonly used by rice farmers as explained variables, and constructed an ordered probit model. Using the social capital theory, the impact and mechanism of internet use on cooperative members’ green production behavior were examined. The results showed the following: (1) Internet use facilitates the cooperative members’ green production behavior. This conclusion remains valid even after addressing the endogeneity test and robustness test. (2) The heterogeneity analysis revealed that the internet is particularly effective in enhancing the green production behaviors of farmers who are less educated, middle-aged, and those with strong connections to cooperatives. (3) A further mechanism test indicates that internet use not only significantly influences farmers’ trust in cooperatives but also aids them in comprehending the cooperative’s production specifications, thereby further advancing the improvement in green production behaviors. (4) Members’ satisfaction with cooperative sales can serve as a substitute for the internet in influencing their green production behavior. Full article
(This article belongs to the Special Issue Digital Transformation of Agriculture and Rural Areas-Second Volume)
Show Figures

Figure 1

20 pages, 9475 KB  
Article
Cross-Domain Generalization for LiDAR-Based 3D Object Detection in Infrastructure and Vehicle Environments
by Peng Zhi, Longhao Jiang, Xiao Yang, Xingzheng Wang, Hung-Wei Li, Qingguo Zhou, Kuan-Ching Li and Mirjana Ivanović
Sensors 2025, 25(3), 767; https://doi.org/10.3390/s25030767 - 27 Jan 2025
Cited by 1 | Viewed by 1933
Abstract
In the intelligent transportation field, the Internet of Things (IoT) is commonly applied using 3D object detection as a crucial part of Vehicle-to-Everything (V2X) cooperative perception. However, challenges arise from discrepancies in sensor configurations between vehicles and infrastructure, leading to variations in the [...] Read more.
In the intelligent transportation field, the Internet of Things (IoT) is commonly applied using 3D object detection as a crucial part of Vehicle-to-Everything (V2X) cooperative perception. However, challenges arise from discrepancies in sensor configurations between vehicles and infrastructure, leading to variations in the scale and heterogeneity of point clouds. To address the performance differences caused by the generalization problem of 3D object detection models with heterogeneous LiDAR point clouds, we propose the Dual-Channel Generalization Neural Network (DCGNN), which incorporates a novel data-level downsampling and calibration module along with a cross-perspective Squeeze-and-Excitation attention mechanism for improved feature fusion. Experimental results using the DAIR-V2X dataset indicate that DCGNN outperforms detectors trained on single datasets, demonstrating significant improvements over selected baseline models. Full article
(This article belongs to the Special Issue Connected Vehicles and Vehicular Sensing in Smart Cities)
Show Figures

Figure 1

17 pages, 642 KB  
Article
A Distributed Trustable Framework for AI-Aided Anomaly Detection
by Nikolaos Nomikos, George Xylouris, Gerasimos Patsourakis, Vasileios Nikolakakis, Anastasios Giannopoulos, Charilaos Mandilaris, Panagiotis Gkonis, Charalabos Skianis and Panagiotis Trakadas
Electronics 2025, 14(3), 410; https://doi.org/10.3390/electronics14030410 - 21 Jan 2025
Cited by 3 | Viewed by 1736
Abstract
The evolution towards sixth-generation (6G) networks requires new architecture enhancements to support the broad device ecosystem, comprising users, machines, autonomous vehicles, and Internet-of-things devices. Moreover, high heterogeneity in the desired quality-of-service (QoS) is expected, as 6G networks will offer extremely low-latency and high-throughput [...] Read more.
The evolution towards sixth-generation (6G) networks requires new architecture enhancements to support the broad device ecosystem, comprising users, machines, autonomous vehicles, and Internet-of-things devices. Moreover, high heterogeneity in the desired quality-of-service (QoS) is expected, as 6G networks will offer extremely low-latency and high-throughput services and error-free communication. This complex environment raises significant challenges in resource management while adhering to security and privacy constraints due to the plethora of data generation endpoints. Considering the advances in AI/ML-aided integration in wireless networks and recent efforts on the network data analytics function (NWDAF) by the 3rd generation partnership project (3GPP), this work presents an AI/ML-aided distributed trustable engine (DTE), collecting data from diverse sources of the 6G infrastructure and deploying ML methods for anomaly detection against diverse threat types. Moreover, we present the DTE architecture and its components, providing data management, AI/ML model training, and classification capabilities for anomaly detection. To promote privacy-aware networking, a federated learning (FL) framework to extend the DTE is discussed. Then, the anomaly detection capabilities of the AI/ML-aided DTE are presented in detail, together with the ML model training process, which considers various ML models. For this purpose, we use two open datasets representing attack scenarios in the core and the edge parts of the network. Experimental results, including an ensemble learning method and different supervised learning alternatives, show that the AI/ML-aided DTE can efficiently train ML models with reduced dimensionality and deploy them in diverse cybersecurity scenarios to improve anomaly detection in 6G networks. Full article
(This article belongs to the Special Issue Recent Advances and Challenges in IoT, Cloud and Edge Coexistence)
Show Figures

Figure 1

20 pages, 2765 KB  
Article
Delay/Disruption Tolerant Networking Performance Characterization in Cislunar Relay Communication Architecture
by Ding Wang, Ethan Wang and Ruhai Wang
Sensors 2025, 25(1), 195; https://doi.org/10.3390/s25010195 - 1 Jan 2025
Viewed by 1873
Abstract
Future 7G/8G networks are expected to integrate both terrestrial Internet and space-based networks. Space networks, including inter-planetary Internet such as cislunar and deep-space networks, will become an integral part of future 7G/8G networks. Vehicle-to-everything (V2X) communication networks will also be a significant component [...] Read more.
Future 7G/8G networks are expected to integrate both terrestrial Internet and space-based networks. Space networks, including inter-planetary Internet such as cislunar and deep-space networks, will become an integral part of future 7G/8G networks. Vehicle-to-everything (V2X) communication networks will also be a significant component of 7G/8G networks. Therefore, space networks will eventually integrate with V2X communication networks, with both space vehicles (or spacecrafts) and terrestrial vehicles involved. DTN is the only candidate networking technology for future heterogeneous space communication networks. In this work, we study possible concatenations of different DTN convergence layer protocol adapters (CLAs) over a cislunar relay communication architecture. We present a performance characterization of the concatenations of different CLAs and the associated data transport protocols in an experimental manner. The performance of different concatenations is compared over a typical primary and secondary cislunar relay architecture. The intent is to find out which network relay path and DTN protocol configuration has the best performance over the end-to-end cislunar path. Full article
(This article belongs to the Special Issue Vehicle-to-Everything (V2X) Communication Networks 2024–2025)
Show Figures

Figure 1

30 pages, 6408 KB  
Article
Construction of a Deep Learning Model for Unmanned Aerial Vehicle-Assisted Safe Lightweight Industrial Quality Inspection in Complex Environments
by Zhongyuan Jing and Ruyan Wang
Drones 2024, 8(12), 707; https://doi.org/10.3390/drones8120707 - 27 Nov 2024
Viewed by 1414
Abstract
With the development of mobile communication technology and the proliferation of the number of Internet of Things (IoT) terminal devices, a large amount of data and intelligent applications are emerging at the edge of the Internet, giving rise to the demand for edge [...] Read more.
With the development of mobile communication technology and the proliferation of the number of Internet of Things (IoT) terminal devices, a large amount of data and intelligent applications are emerging at the edge of the Internet, giving rise to the demand for edge intelligence. In this context, federated learning, as a new distributed machine learning method, becomes one of the key technologies to realize edge intelligence. Traditional edge intelligence networks usually rely on terrestrial communication base stations as parameter servers to manage communication and computation tasks among devices. However, this fixed infrastructure is difficult to adapt to the complex and ever-changing heterogeneous network environment. With its high degree of flexibility and mobility, the introduction of unmanned aerial vehicles (UAVs) into the federated learning framework can provide enhanced communication, computation, and caching services in edge intelligence networks, but the limited communication bandwidth and unreliable communication environment increase system uncertainty and may lead to a decrease in overall energy efficiency. To address the above problems, this paper designs a UAV-assisted federated learning with a privacy-preserving and efficient data sharing method, Communication-efficient and Privacy-protection for FL (CP-FL). A network-sparsifying pruning training method based on a channel importance mechanism is proposed to transform the pruning training process into a constrained optimization problem. A quantization-aware training method is proposed to automate the learning of quantization bitwidths to improve the adaptability between features and data representation accuracy. In addition, differential privacy is applied to the uplink data on this basis to further protect data privacy. After the model parameters are aggregated on the pilot UAV, the model is subjected to knowledge distillation to reduce the amount of downlink data without affecting the utility. Experiments on real-world datasets validate the effectiveness of the scheme. The experimental results show that compared with other federated learning frameworks, the CP-FL approach can effectively mitigate the communication overhead, as well as the computation overhead, and has the same outstanding advantage in terms of the balance between privacy and usability in differential privacy preservation. Full article
(This article belongs to the Special Issue Mobile Fog and Edge Computing in Drone Swarms)
Show Figures

Figure 1

18 pages, 970 KB  
Article
Enhancing Federated Learning in Heterogeneous Internet of Vehicles: A Collaborative Training Approach
by Chao Wu, Hailong Fan, Kan Wang and Puning Zhang
Electronics 2024, 13(20), 3999; https://doi.org/10.3390/electronics13203999 - 11 Oct 2024
Cited by 2 | Viewed by 1800
Abstract
The current Internet of Vehicles (IoV) faces significant challenges related to resource heterogeneity, which adversely impacts the convergence speed and accuracy of federated learning models. Existing studies have not adequately addressed the problem of resource-constrained vehicles that slow down the federated learning process [...] Read more.
The current Internet of Vehicles (IoV) faces significant challenges related to resource heterogeneity, which adversely impacts the convergence speed and accuracy of federated learning models. Existing studies have not adequately addressed the problem of resource-constrained vehicles that slow down the federated learning process particularly under conditions of high mobility. To tackle this issue, we propose a model partition collaborative training mechanism that decomposes training tasks for resource-constrained vehicles while retaining the original data locally. By offloading complex computational tasks to nearby service vehicles, this approach effectively accelerates the slow training speed of resource-limited vehicles. Additionally, we introduce an optimal matching method for collaborative service vehicles. By analyzing common paths and time delays, we match service vehicles with similar routes and superior performance within mobile service vehicle clusters to provide effective collaborative training services. This method maximizes training efficiency and mitigates the negative effects of vehicle mobility on collaborative training. Simulation experiments demonstrate that compared to benchmark methods, our approach reduces the impact of mobility on collaboration, achieving large improvements in the training speed and the convergence time of federated learning. Full article
Show Figures

Figure 1

53 pages, 8811 KB  
Article
An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks
by Fahad Alotaibi, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan and Abhishek Rangi
J. Cybersecur. Priv. 2024, 4(3), 678-730; https://doi.org/10.3390/jcp4030033 - 18 Sep 2024
Viewed by 2328
Abstract
The Internet has become the primary vehicle for doing almost everything online, and smartphones are needed for almost everyone to live their daily lives. As a result, cybersecurity is a top priority in today’s world. As Internet usage has grown exponentially with billions [...] Read more.
The Internet has become the primary vehicle for doing almost everything online, and smartphones are needed for almost everyone to live their daily lives. As a result, cybersecurity is a top priority in today’s world. As Internet usage has grown exponentially with billions of users and the proliferation of Internet of Things (IoT) devices, cybersecurity has become a cat-and-mouse game between attackers and defenders. Cyberattacks on systems are commonplace, and defense mechanisms are continually updated to prevent them. Based on a literature review of cybersecurity vulnerabilities, attacks, and preventive measures, we find that cybersecurity problems are rooted in computer system architectures, operating systems, network protocols, design options, heterogeneity, complexity, evolution, open systems, open-source software vulnerabilities, user convenience, ease of Internet access, global users, advertisements, business needs, and the global market. We investigate common cybersecurity vulnerabilities and find that the bare machine computing (BMC) paradigm is a possible solution to address and eliminate their root causes at many levels. We study 22 common cyberattacks, identify their root causes, and investigate preventive mechanisms currently used to address them. We compare conventional and bare machine characteristics and evaluate the BMC paradigm and its applications with respect to these attacks. Our study finds that BMC applications are resilient to most cyberattacks, except for a few physical attacks. We also find that BMC applications have inherent security at all computer and information system levels. Further research is needed to validate the security strengths of BMC systems and applications. Full article
Show Figures

Figure 1

20 pages, 15559 KB  
Article
IoT-Based Assessment of a Driver’s Stress Level
by Veronica Mattioli, Luca Davoli, Laura Belli, Sara Gambetta, Luca Carnevali, Andrea Sgoifo, Riccardo Raheli and Gianluigi Ferrari
Sensors 2024, 24(17), 5479; https://doi.org/10.3390/s24175479 - 23 Aug 2024
Cited by 3 | Viewed by 2159
Abstract
Driver Monitoring Systems (DMSs) play a key role in preventing hazardous events (e.g., road accidents) by providing prompt assistance when anomalies are detected while driving. Different factors, such as traffic and road conditions, might alter the psycho-physiological status of a driver by increasing [...] Read more.
Driver Monitoring Systems (DMSs) play a key role in preventing hazardous events (e.g., road accidents) by providing prompt assistance when anomalies are detected while driving. Different factors, such as traffic and road conditions, might alter the psycho-physiological status of a driver by increasing stress and workload levels. This motivates the development of advanced monitoring architectures taking into account psycho-physiological aspects. In this work, we propose a novel in-vehicle Internet of Things (IoT)-oriented monitoring system to assess the stress status of the driver. In detail, the system leverages heterogeneous components and techniques to collect driver (and, possibly, vehicle) data, aiming at estimating the driver’s arousal level, i.e., their psycho-physiological response to driving tasks. In particular, a wearable sensorized bodice and a thermal camera are employed to extract physiological parameters of interest (namely, the heart rate and skin temperature of the subject), which are processed and analyzed with innovative algorithms. Finally, experimental results are obtained both in simulated and real driving scenarios, demonstrating the adaptability and efficacy of the proposed system. Full article
(This article belongs to the Special Issue Robust Multimodal Sensing for Automated Driving Systems)
Show Figures

Figure 1

Back to TopTop