2020
DOI: 10.1109/access.2020.2997729
|View full text |Cite
|
Sign up to set email alerts
|

Virtual Relay Selection in LTE-V: A Deep Reinforcement Learning Approach to Heterogeneous Data

Abstract: The development of Long Term Evolution (LTE) enables wireless communication with high transmission rate, low latency, and wide coverage area. These outstanding features of LTE support the next generation of vehicle-to-everything (V2X) communication, which is named LTE-V. Among the various technologies in LTE-V, placing relay nodes on vehicles is a promising approach to save power and energy, and extend the transmission range. In this paper, we consider the virtual relay node selection problem. In the problem, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…e binding update request mainly contains the cluster vehicle ID of the updated key and the length of the new key x 2 , namely, is paper mainly considers the internal attack on the Internet of Vehicles. e attacker can be a legitimate vehicle Hash function T/T * Send/receive timestamp node in the network, or a controlled malicious vehicle node, which obtains the group key through side-channel attacks such as timing attacks and cache attacks [28], and then implements an electronic spoofing attack [29]. e act of spoofing involves hiding a message or identification so that it looks to be coming from a reliable, approved source.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…e binding update request mainly contains the cluster vehicle ID of the updated key and the length of the new key x 2 , namely, is paper mainly considers the internal attack on the Internet of Vehicles. e attacker can be a legitimate vehicle Hash function T/T * Send/receive timestamp node in the network, or a controlled malicious vehicle node, which obtains the group key through side-channel attacks such as timing attacks and cache attacks [28], and then implements an electronic spoofing attack [29]. e act of spoofing involves hiding a message or identification so that it looks to be coming from a reliable, approved source.…”
Section: System Modelmentioning
confidence: 99%
“…This paper uses Python to build a dynamic cluster simulation scenario to verify the advantages of the low-latency IoV group key distribution management technology based on reinforcement learning in the computing delay and communication security level of encryption and decryption. Reference [ 29 ] for the setting of stimulation parameters are as follows: the group leader and vehicles within a range of 300 m form a cluster, the number of vehicle nodes in the initial cluster is 50, and the average speed of vehicles in the cluster v ∈ [0,120] km/h, and the same as that of the cluster vehicles. The number is inversely proportional [ 30 ].…”
Section: Simulation Experimentsmentioning
confidence: 99%
“…For instance, [35]- [44] develop deep reinforcement (DR) algorithm-based solutions for topology optimization of different network configurations. Deep Q-learning is used in [45] to evaluate the cumulative transmission rate in vehicular networks. Spectrum allocation and access mode selection evaluations are considered in [46], while the potential of using K-means clustering algorithm to design ultra-reliable and low-latency wireless sensor networks is evaluated in [47].…”
Section: Introductionmentioning
confidence: 99%
“…In [25], a relay selection based on deep reinforcement learning was proposed to enhance the robustness. In [26], the deep Q-Learning was applied to select the virtual vehicle relay node. None of these approaches considers buffers and/or full duplex transmission at the relay, which will significantly increase the searching dimension for the learning, making it harder to converge.…”
Section: Introductionmentioning
confidence: 99%