2022
DOI: 10.1109/tmc.2022.3179254
|View full text |Cite
|
Sign up to set email alerts
|

ELITE: An Intelligent Digital Twin-based Hierarchical Routing Scheme for Softwarized Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 65 publications
(17 citation statements)
references
References 40 publications
0
16
0
Order By: Relevance
“…It can successfully defend against switching attacks (CCS 2007, Boldyreva et al [8]) and reordering attacks (ISPEC 2007, Shao [9]). In recent years, the combination of signature scheme and blockchain technology [10][11][12], federated learning technology [13], 6G network [14], homomorphic learning [15], network routing protocol [16], edge computing [17], vehicular ad hoc networks [18], and software-defned vehicular network [19][20][21] by applying signature algorithms and encryption algorithms to the experimental scheme to further strengthen the security of the scheme and improve the privacy protection capability of the scheme is also a hot topic. In the blockchain, the digital signature is one of the three basic technologies, and its importance is self-evident.…”
Section: Related Workmentioning
confidence: 99%
“…It can successfully defend against switching attacks (CCS 2007, Boldyreva et al [8]) and reordering attacks (ISPEC 2007, Shao [9]). In recent years, the combination of signature scheme and blockchain technology [10][11][12], federated learning technology [13], 6G network [14], homomorphic learning [15], network routing protocol [16], edge computing [17], vehicular ad hoc networks [18], and software-defned vehicular network [19][20][21] by applying signature algorithms and encryption algorithms to the experimental scheme to further strengthen the security of the scheme and improve the privacy protection capability of the scheme is also a hot topic. In the blockchain, the digital signature is one of the three basic technologies, and its importance is self-evident.…”
Section: Related Workmentioning
confidence: 99%
“…By adding roadside perception to vehicle-side perception, the technical path of vehicle-road coordination improves the coupling relationship between people, vehicles, and roads. It also realizes cooperative perception and decision-making of human-vehicle-roadcloud [6], which ensures the safety of autonomous driving [7]; transfers a portion of the vehicle-side cost to the roadside, which quickens the adoption of intelligent networked vehicles [8]. Additionally, its fitted vehicle external information interaction device (V2X: vehicle to everything) can be used to link the vehicle with the environment, for instance, Mushroom Car Union assists Hengyang City in the development of a smart transportation system from the perspective of both the vehicle and the road, using the technical path of vehicle-infrastructure cooperation and the full package of intelligent transportation AI cloud platform [9], which not only boosts traffic safety in Hengyang City but also increases Hengyang City's effectiveness.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we focus on the specific framework and security protocols of blockchain in data transmission application field as the research focus, and study the secure and trustworthy general data transmission model and transmission protocols, and propose different protocol contents according to different application requirements. With the continuous progress of science and technology and economic development, the formation of a globalized market and the acceleration of technological change, the competition in the product market has become increasingly fierce, and the external macro environment and internal micro environment in which enterprises are located have undergone fundamental changes, and modern enterprises are faced with numerous challenges [9]. At the same time, all enterprises can break the limitation of geographical resources, use global manufacturing resources, and proactively seek market opportunities; the development of information technology makes the core technology of superior products of enterprises be quickly imitated and acquisition, thus losing market opportunities and advantages [10].…”
Section: Introductionmentioning
confidence: 99%