2022
DOI: 10.1109/mits.2020.3014124
|View full text |Cite
|
Sign up to set email alerts
|

Softwarization, Virtualization, and Machine Learning for Intelligent and Effective Vehicle-to-Everything Communications

Abstract: The concept of the fifth generation (5G) mobile network system has emerged in recent years as telecommunication operators and service providers look to upgrade their infrastructure and delivery modes to meet the growing demand. Concepts such as softwarization, virtualization, and machine learning will be key components as innovative and flexible enablers of such networks. In particular, paradigms such as software-defined networks, softwaredefined perimeter, cloud & edge computing, and network function virtuali… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 74 publications
0
17
0
Order By: Relevance
“…To protect the vehicle from being breached, all packets or messages transmitted in the protected vehicular network are captured by packet taps or sniffers (e.g., NetFlow), and then analyzed by the proposed IDS before being forwarded to the protected vehicle [35]. For example, if an attacker is launching a DoS attack by sending a large volume of malicious traffic to a vehicle system, the malicious traffic will be detected by the proposed IDS by processing the traffic data captured by the sniffer; alarms will then be generated, and the attacker's access will be denied, therefore protecting the vehicle from being breached [36]- [38].…”
Section: Attack Scenarios and Ids Deploymentmentioning
confidence: 99%
“…To protect the vehicle from being breached, all packets or messages transmitted in the protected vehicular network are captured by packet taps or sniffers (e.g., NetFlow), and then analyzed by the proposed IDS before being forwarded to the protected vehicle [35]. For example, if an attacker is launching a DoS attack by sending a large volume of malicious traffic to a vehicle system, the malicious traffic will be detected by the proposed IDS by processing the traffic data captured by the sniffer; alarms will then be generated, and the attacker's access will be denied, therefore protecting the vehicle from being breached [36]- [38].…”
Section: Attack Scenarios and Ids Deploymentmentioning
confidence: 99%
“…VLC technology proposes many benefits including high data transmission (up to 10 Gbps), a low level interference range, and considerable vigor against commonly known jamming attacks in wireless communications. However, pitfalls still exist within the technology, as VLC is susceptible to noises formed by additional light sources, which makes it inconvenient in adverse weather conditions and unable to handle non-LOS situations [155,156].…”
Section: Opportunitiesmentioning
confidence: 99%
“…Softwarization, virtualization, and machine learning concepts are also introduced to support vehicular communication. These concepts can be employed to enable mobile big data in V2X [ 26 ].…”
Section: Vehicular Network Preliminarymentioning
confidence: 99%