The integration of simultaneous wireless information and power transfer (SWIPT) and cooperative relay (CoR) techniques has evolved as a new phenomenon for the next-generation wireless communication system. CoR is used to get energy and spectral efficient network and to solve the issues of fading, path loss, shadowing, and smaller coverage area. Relay nodes are battery-constrained or battery-less devices. They need some charging systems externally as replacing or recharging of their batteries sometimes which are not feasible and convenient. Energy harvesting (EH) is the most cost-effective, suitable, and safer solutions to power up these relays. Among various types of the EH, SWIPT is the most prominent technique as it provides spectral efficiency by delivering energy and information to the relays at the same time. This paper reviews the combination of CoR and SWIPT. From basic to advanced architectures, applications and taxonomies of CoR and SWIPT are presented, various forms of resource allocation and relay selection algorithms are covered. The usage of CoR and SWIPT in the fifth-generation wireless networks is discussed. This paper focuses on the integral aspects of the CoR and SWIPT to other next-generation wireless communication systems and techniques such as multiple-input-multiple-output, wireless sensor network, cognitive radio, vehicular ad hoc network, non-orthogonal multiple access, beamforming technique, and the Internet of Things. Some open issues and future directions and challenges are given in this paper.
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network, enabling non-internet components in the network to produce a better world of services, like smart home, smart city, smart transportation, and smart industries. On the other hand, security and privacy are the most important aspects of the IoT network, which includes authentication, authorization, data protection, network security, and access control. Additionally, traditional network security cannot be directly used in IoT networks due to its limitations on computational capabilities and storage capacities. Furthermore, authentication is the mainstay of the IoT network, as all components undergo an authentication process before establishing communication. Therefore, securing authentication is essential. In this paper, we have focused on IoT security particularly on their authentication mechanisms. Consequently, we highlighted enormous attacks and technical methods on the IoT authentication mechanism. Additionally, we discussed existing security verification techniques and evaluation schemes of IoT authentication. Furthermore, analysis against current existing protocols have been discussed in all parts and provided some recommendation. Finally, the aim of our study is to help the future researcher by providing security issues, open challenges and future scopes in IoT authentication.
Nowadays, machine learning (ML), which is one of the most rapidly growing technical tools, is extensively used to solve critical challenges in various domains. Vehicular ad hoc network (VANET) is expected to be the key role player in reducing road casualties and traffic congestion. To ensure this role, a gigantic amount of data should be exchanged. However, current allocated wireless access for VANET is inadequate to handle such massive data amounts. Therefore, VANET faces a spectrum scarcity issue. Cognitive radio (CR) is a promising solution to overcome such an issue. CR-based VANET or CR-VANET must achieve several performance enhancement measures, including ultra-reliable and lowlatency communication. ML methods can be integrated with CR-VANET to make CR-VANET highly intelligent, achieve rapid adaptability to the dynamicity of the environment, and improve the quality of service in an energy-efficient manner. This paper presents an overview of ML, CR, VANET, and CR-VANET, including their architectures, functions, challenges, and open issues. The applications and roles of ML methods in CR-VANET scenarios are reviewed. Insights into the use of ML for autonomous or driverless vehicles are also presented. Current advancements in the amalgamation of these prominent technologies and future research directions are discussed. INDEX TERMS Machine learning, VANET, cognitive radio, autonomous vehicles, smart transportation system. performance of CR-VANET [15]. Security enhancement is one of the major issues in CR-VANET. Here, a vehicle can pretend to be a PU and propagate false information to obtain spectrum access selfishly. ML can be used to detect such actions and enhance security [16], [17]. ML also provides an optimum route to CR-VANET users to avoid traffic jams and road accidents. ML can also play a vital role in the best infotainment experience in CR-VANET. It can be used for appropriate scheduling, selecting the best channel, and prioritizing messages. CR and ML can play a major role in the next-generation driverless car system. The role of CR in the next-generation transportation system has been presented in previous discussions. This survey shows how ML can be applied to reduce road accidents and traffic congestion. CR can be used to accommodate the spectrum required to support massive data communication among automated driverless vehicles and networks. ML can be an integral part of this driverless or automated vehicle system. Similar to a robot, an autonomous vehicle (AV) can learn the surrounding environment and communicate with increased safety, reliability, QoS, and energy efficiency by applying such learning. This paper presents the dynamic usages of ML in CR-VANET elaborately. Several of the benefits of CR in VANETs and ML in VANETs and CR-VANETs are presented in Table 1. B. CONTRIBUTIONS OF THIS SURVEY ARTICLE Many survey articles describe CR, VANET, ML, and CR-VANETs individually or describe a few aspects of their amalgamation. To the best of our knowledge, surveys that cover the usage of ML in CR-VANET...
A vehicular ad hoc network (VANET) is an emerging and promising wireless technology aimed to improve traffic safety and provide comfort to road users. However, the high mobility of vehicles and frequent topology changes pose a considerable challenge to the reliable delivery of safety applications. Clustering is one of the control techniques used in VANET to make the frequent topology changes less dynamic. Nevertheless, research has shown that most of the existing clustering algorithms focus on cluster head (CH) election with very few addressing other critical issues such as cluster formation and maintenance. This has led to unstable clusters which could affect the timely delivery of safety applications. In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. We considered any vehicle moving on the same road segment with the same road ID and within the transmission range of its neighbour to be suitable for the cluster formation process. This was attributed to the fact that all safety messages are expected to be shared among the vehicles within the vicinity irrespective of their relative speedto avoid any hazardous situation. To elect a CH, we identified some metrics on the basis of the vehicle mobility information. Each vehicle was associated with a predefined weight value based on its relevance. A vehicle with the highest weight value was elected as the primary cluster head (PCH). We also introduced a secondary cluster head (SeCH) as a backup to the PCH to improve the cluster stability. SeCH took over the leadership whenever the PCH was not suitable for continuing with the leadership. The simulation results of the proposed approach showed a better performance with an increase of approximately40%– 45% in the cluster stability when compared with the existing approaches. Similarly, cluster formation messages were significantly minimized, hence reducing the communication overhead to the system and improving the reliable delivery of the safety applications.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.