Skip to main content

Conclusion and Future Work

  • Chapter
  • First Online:
  • 593 Accesses

Part of the book series: Wireless Networks ((WN))

Abstract

In this book, we first propose a PHY-layer authentication scheme based on ambient radio signals and the RSSI of packets that usually ignored in VANETs. The problem of network selection in VANETs is considered, taking into account the rapid changes in signal strength brought about by high-speed movement of the vehicle. In addition, we propose a hotbooting PHC-based UAV relay strategy to resist smart jamming without the knowledge of the UAV channel model and the jamming model. A learning-based task offloading framework using the multi-armed bandit theory is developed, which enables vehicles to learn the potential task offloading performance of its neighboring vehicles with excessive computing resources and minimizes the average offloading delay [1].

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Y. Sun, X. Guo, S. Zhou, Z. Jiang, X. Liu, and Z. Niu, “Learning-based task offloading for vehicular cloud computing systems,” in Proc. IEEE Int’l Conf. Commun. (ICC), Kansas City, MO, USA, May 2018. CoRR, vol. abs/1804.00785, Apr. 2018. [Online]. Available: https://arxiv.org/abs/1804.00785.

  2. S. Z. X. G. Y. Sun, J. Song and Z. Niu, “Task replication for vehicular edge computing: A combinatorial multi-armed bandit based approach,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Abu Dhabi, UAE, Dec. 2018.

    Google Scholar 

  3. X. G. Z. Jiang, S. Zhou and Z. Niu, “Task replication for deadline-constrained vehicular cloud computing: Optimal policy, performance analysis and implications on road traffic,” IEEE Internet Things J., vol. 5, no. 1, pp. pp. 93–107, Feb. 2018.

    Article  Google Scholar 

  4. L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang, and W. Zhuang, “UAV relay in VANETs against smart jamming with reinforcement learning,” IEEE Trans. Vehicular Technology, vol. 67, no. 5, pp. 4087–4097, May 2018.

    Article  Google Scholar 

  5. X. Lu, X. Wan, L. Xiao, Y. Tang, and W. Zhuang, “Learning-based rogue edge detection in vanets with ambient radio signals,” in Proc. IEEE Int’l Conf. Commun. (ICC), Kansas City, MO, May 2018.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Xiao, L., Zhuang, W., Zhou, S., Chen, C. (2019). Conclusion and Future Work. In: Learning-based VANET Communication and Security Techniques. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-01731-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01731-6_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01730-9

  • Online ISBN: 978-3-030-01731-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics