Security and Communication Networks

Distributed Intelligence Empowered 6G Internet of Vehicles: Safety, Security and Applications


Publishing date
01 Feb 2023
Status
Closed
Submission deadline
30 Sep 2022

Lead Editor

1Xidian University, Xi'an, China

2Virginia Tech, Blacksburg, USA

3Communication Theory Lab. School of Electrical Engineering Royal Institute of Technology (KTH), Stockholm, Sweden

4State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China

This issue is now closed for submissions.

Distributed Intelligence Empowered 6G Internet of Vehicles: Safety, Security and Applications

This issue is now closed for submissions.

Description

Sixth generation (6G) networks combine various sub-network together, aiming to establish a highly dynamic and intelligent system with a heterogeneous structure. With the advance of network performance in 6G, Internet of Vehicles (IoV) will be further developed whereby the fully connected vehicle-road-cloud intelligent perception and collaborative decision-making system will significantly improve the road safety, traffic efficiency, and driving experience. Nevertheless, this could introduce new security and privacy challenges into the system design. In addition, the 6G integrated space-air-ground communication system will help to realize autonomous driving in all scenarios; the intelligent mobile edge computing system will promote the large-scale application of low-cost intelligent vehicles; the digital twin system covering all areas will realize data-driven intelligent city-level traffic management; the blockchain-enabled distributed system will provide distributed trust and security concerns during the data sharing and transactions dealing around vehicles.

To achieve these goals, strict and customized quality-of-service requirements should be satisfied. Therefore, the enormous amount of IoV data needs to be effectively processed, and the diversified resources, e.g., communication, computing, and storage resources should be flexibly managed in different granularities. To meet the diversified requirements of the above-mentioned systems, Edge Intelligence (AI) is a promising technique to address these issues. On the other hand, because of the limitation of the centralized system on time-sensitive analysis, low bandwidth transmission, cost constraint scenario, and privacy protection applications, there exists an urgent demand for decentralized training and learning technologies.

This Special Issue aims to collect original research and review articles on the use of distributed intelligent technologies in the development of safety-guaranteed, security-enhanced, and diversify QoS-satisfied applications for 6G IoV.

Potential topics include but are not limited to the following:

  • Scalable/hybrid systems using distributed intelligence for secure 6G IoV
  • Novel cloud/edge/end cooperated architecture for secure 6G IoV
  • Novel mobile/multi-access edge computing skills for secure 6G IoV
  • Vehicular digital-twin system design with distributed intelligence
  • Distributed privacy-protected learning methods and algorithms for 6G IoV
  • Blockchain-enabled security enhancement using distributed intelligence for 6G IoV
  • Space-Air-Ground integrated services using Distributed intelligence for secure 6G IoV
  • Safe 6G IoV with Distributed intelligence for cooperated sensing
  • Safe 6G IoV with Distributed intelligence for cooperated decision making
  • Safe 6G IoV with Distributed intelligence for cooperated control and action
  • Novel intelligent model for emerging network management, service, and automation in 6G IoV

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 1416999
  • - Research Article

The Design of Vehicle Profile Based on Multivehicle Collaboration for Autonomous Vehicles in Roundabouts

Dongfa Cao | Zhandong Liu | ... | Nan Ding
  • Special Issue
  • - Volume 2023
  • - Article ID 1363639
  • - Research Article

Traffic Safety Oriented Multi-Intersection Flow Prediction Based on Transformer and CNN

Tingting Fu | Qianwen Yu | ... | Shaohua Wan
  • Special Issue
  • - Volume 2022
  • - Article ID 3288308
  • - Research Article

Formal  Model and Analysis for the Random Event in the Intelligent Car with Stochastic Petri Nets and Z

Yang Liu | Yingqi Fan | ... | Liyuan Huang
  • Special Issue
  • - Volume 2022
  • - Article ID 7018360
  • - Research Article

Enhanced Multilink Single-Radio Operation for the Next-Generation IEEE 802.11 BE Wi-Fi Systems

Xiyang Lan | Xinyu Zu | Jie Yang
  • Special Issue
  • - Volume 2022
  • - Article ID 1781757
  • - Research Article

A Novel Approach for Estimating Performance of IIoT-Based Virtual Control Train Sets under DoS Attacks

Shuomei Ma | Hongwei Wang | ... | Qihe Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 8380239
  • - Research Article

A Homomorphic Signcryption-Based Privacy Preserving Federated Learning Framework for IoTs

Weidong Du | Min Li | ... | Zhaoying Wei
  • Special Issue
  • - Volume 2022
  • - Article ID 7507573
  • - Research Article

A V2P Collision Risk Warning Method based on LSTM in IOV

Ruoyu Pan | Lihua Jie | ... | Zhaoying Wei
  • Special Issue
  • - Volume 2022
  • - Article ID 5827056
  • - Research Article

A GRU-Based Lightweight System for CAN Intrusion Detection in Real Time

Haoyu Ma | Jianqiu Cao | ... | Shaoqian Li
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.