Sensors 23 05817
Sensors 23 05817
Sensors 23 05817
Article
A Novel Energy-Efficient Reservation System for Edge
Computing in 6G Vehicular Ad Hoc Network
Farhan Javed 1 , Zuhaib Ashfaq Khan 2, * , Shahzad Rizwan 3 , Sonia Shahzadi 4 , Nauman Riaz Chaudhry 4, *
and Muddesar Iqbal 5
1 Department of Electrical and Computer Engineering, COMSATS University Islamabad, Attock Campus,
Attock 43600, Pakistan; farhan44933@gmail.com
2 School of Architecture, Technology, and Engineering (ATE), University of Brighton, Brighton BN2 4AT, UK
3 Department of Computer Science, COMSATS University Islamabad, Attock Campus, Attock 43600, Pakistan;
shehzad.rizwan@cuiatk.edu.pk
4 Department of Computer Science, University of Gujrat, Gujrat 50700, Pakistan; 18036119-002@uog.edu.pk
5 Renewable Energy Laboratory, Communications and Networks Engineering Department, College of
Engineering, Prince Sultan University, Riyadh 11586, Saudi Arabia; miqbal@psu.edu.sa
* Correspondence: z.a.khan@brighton.ac.uk (Z.A.K.); nauman.riaz@uog.edu.pk (N.R.C.)
Abstract: The roadside unit (RSU) is one of the fundamental components in a vehicular ad hoc
network (VANET), where a vehicle communicates in infrastructure mode. The RSU has multiple
functions, including the sharing of emergency messages and the updating of vehicles about the
traffic situation. Deploying and managing a static RSU (sRSU) requires considerable capital and
operating expenditures (CAPEX and OPEX), leading to RSUs that are sparsely distributed, continuous
handovers amongst RSUs, and, more importantly, frequent RSU interruptions. At present, researchers
remain focused on multiple parameters in the sRSU to improve the vehicle-to-infrastructure (V2I)
communication; however, in this research, the mobile RSU (mRSU), an emerging concept for sixth-
generation (6G) edge computing vehicular ad hoc networks (VANETs), is proposed to improve the
connectivity and efficiency of communication among V2I. In addition to this, the mRSU can serve
as a computing resource for edge computing applications. This paper proposes a novel energy-
efficient reservation technique for edge computing in 6G VANETs that provides an energy-efficient,
Citation: Javed, F.; Khan, Z.A.;
reservation-based, cost-effective solution by introducing the concept of the mRSU. The simulation
Rizwan, S.; Shahzadi, S.; Chaudhry,
outcomes demonstrate that the mRSU exhibits superior performance compared to the sRSU in
N.R.; Iqbal, M. A Novel
multiple aspects. The mRSU surpasses the sRSU with a packet delivery ratio improvement of 7.7%, a
Energy-Efficient Reservation System
throughput increase of 5.1%, a reduction in end-to-end delay by 4.4%, and a decrease in hop count
for Edge Computing in 6G Vehicular
Ad Hoc Network. Sensors 2023, 23,
by 8.7%. The results are generated across diverse propagation models, employing realistic urban
5817. https://doi.org/10.3390/ scenarios with varying packet sizes and numbers of vehicles. However, it is important to note that the
s23135817 enhanced performance parameters and improved connectivity with more nodes lead to a significant
increase in energy consumption by 2%.
Academic Editor: Qiong Wu
Received: 30 April 2023 Keywords: edge computing; energy-efficient system; roadside unit; vehicular ad hoc network;
Revised: 25 May 2023 vehicle-to-infrastructure; vehicle-to-vehicle; sixth-generation wireless communication
Accepted: 30 May 2023
Published: 22 June 2023
1. Introduction
Copyright: © 2023 by the authors.
VANETs are wireless ad hoc networks that allow vehicles to interact with one another,
Licensee MDPI, Basel, Switzerland. with infrastructures, and with other highway users. VANETs have the capacity to trans-
This article is an open access article form the field of transportation by serving as an operating system to ensure safeguarding,
distributed under the terms and improve the efficiency of traffic, and offer entertainment applications. The VANET is a well-
conditions of the Creative Commons known vehicle network with capabilities including self-configuration and self-organization.
Attribution (CC BY) license (https:// It can range from a highly dense to a very sparse topology. Along with cases of dense
creativecommons.org/licenses/by/ network topologies, the presence of vehicles on the route makes it easy to offer end-to-end
4.0/). multi-hop connectivity among the nodes. VANETs, however, have several limitations,
including high mobility, frequent topology changes, and a restricted transmission reach.
The introduction of 6G technology provides an opportunity to overcome a few of these
issues and increase the VANET’s efficiency. The term “6G” refers to the sixth generation
of technology for wireless communication, which is projected to deliver even faster data
speeds, fewer delays, and more security than the existing 5G technology. The 6G tech-
nology is still in its early stages, with many of its characteristics and applications still
being researched and developed. Despite this, a few of the most important characteristics
anticipated to be incorporated in 6G include Terahertz (THz) frequencies to operate at
higher frequencies than the current 5G technology [1,2], with frequencies ranging from
300 GHz to 3 THz. These high-frequency bands offer a higher bandwidth and lower latency
but require new antenna designs and signal processing techniques. In addition, 6G is
expected to leverage the power of AI [3] to optimize network performance, improve energy
efficiency, and enable new applications, such as autonomous driving and smart cities.
Moreover, the Massive MIMO [4] is anticipated to be used in 6G to increase the number of
antennas in the base station and enable better beamforming and interference management.
Holographic beamforming is among the techniques with the potential to enable precise
directional communication and improve energy efficiency. The RSU is one of the funda-
mental components in VANETs, as it is the first point at which the vehicle communicates
in the infrastructure. The state-of-the-art swarm of UAVs for network management in 6G,
which is anticipated to offer gigantic connection, all-around coverage, ultra-reliability, and
intelligence has been reviewed in this article [5].
Numerous challenges can impact the operational efficiency of VANETs, such as high
mobility, frequent topology changes, and a restricted communication range. The 6G
technology, with data speeds of up to 1 Tbps, has the ability to overcome some of the afore-
mentioned obstacles and enhance the performance of VANETs in a variety of approaches.
The increased data rate has the potential to support novel applications including real-time
video streaming and high-definition mapping. Similarly, 6G connectivity is predicted to
provide latency that is as low as 1 millisecond; 6G is also expected to provide increased
dependability through greater redundancy and enhanced error correction algorithms. Even
in high-mobility circumstances, enhanced dependability may ensure that communica-
tions are transmitted accurately and on time. This will also boost energy efficiency by
utilizing improved power management techniques and innovative antenna layouts. This
increased energy efficiency may improve the car battery life and minimize the requirement
for battery replacements.
The combination of VANETs and delay-tolerant networks (DTNs) has resulted in the
concept of vehicular delay-tolerant networks (VDTNs) [6], which is based on the stored-
carry-and-forward mechanism of DTNs and applied to the vehicular context. In order to
sustain the increasing variety of intelligent transportation systems (ITS) as well as smart city
applications, the VDTNs also integrate communications including vehicle-to-vehicle (V2V),
vehicle-to-roadside-unit (V2R), and vehicle-to-infrastructure (V2I), as shown in Figure 1.
The RSU has many functions, including the sharing of emergency messages and updating
vehicles about the traffic situation.
Cars travel at fast speeds, the network topology is dynamic, and vehicles must be sep-
arated frequently. While 6G technology has the potential to increase VANETs’ effectiveness,
various difficulties must be overcome before it can be extensively used. High-frequency
operation is one of the main issues since 6G is planned to run at greater frequencies than
the existing 5G technology, which might result in significant attenuation and signal loss.
This can make maintaining consistent communication over a greater distance problematic,
especially in metropolitan settings with high-rise buildings and additional obstructions.
The adoption of sophisticated signal processing techniques such as holographic beamform-
ing and large MIMO, which may boost system complexity, is also an issue. This complexity
might make optimizing the system and ensuring reliable communication challenging [7].
Because 6G technology is currently in the early phase of advancement, no standardization
initiatives are presently underway. This absence of standardization may contribute to mar-
Sensors 2023, 23, 5817 3 of 29
ket fragmentation and make ensuring compatibility across different devices and systems
challenging. To guarantee that communications are safe and shielded from assault, 6G
must address security issues such as authentication, encryption, and privacy.
The mRSU is an emerging concept that has been highlighted in some papers during
the last few years. This research presents the concept of the installation of RSUs in traffic
police vehicles and public transport vehicles that remain in motion during patrolling; it
helps to reduce the likelihood of packet loss during communication. As police vehicles
remain in motion during patrolling, they cover the same group of vehicles, and the like-
lihood of packet loss is reduced because of a reduction in connection breakage and the
re-establishment of communication among vehicles.
Considering the multiple obstacles, 6G technology offers several opportunities in
VANETs, notably the deployment of new, safety-essential features such as accident avoid-
ance and emergency braking. Because of the low latency and great reliability of 6G tech-
nology, these features can be run in real time and offer correct knowledge to drivers. The
technology will also allow for the development of novel traffic management strategies such
as dynamic route optimization, traffic flow forecasting, and the real-time management of
congestion. These strategies can assist in alleviating traffic congestion and enhance the
overall transportation system’s performance. High-definition maps, the real-time broad-
casting of videos, and interactive entertainment experiences may all be enabled with 6G [8].
Sensors 2023, 23, 5817 4 of 29
The aforementioned applications have the potential to improve the experience of driv-
ing, while also providing additional revenue opportunities for vendors of services. One
of the most important prospects is that 6G technology, by offering high-bandwidth and
low-latency transmission between vehicles and buildings, might allow new autonomous
driving technologies. Vehicles may run more effectively and safely as a result, reducing
the possibility of errors and enhancing the whole system of transportation. However,
by resolving the problems and capitalizing on the advantages, 6G technology has the ability
to exploit the full potential of VANETs and revolutionize the transportation sector.
In the context of VANETs, edge computing [7] can be used to address the challenges
associated with data processing, communication, and storage in a highly dynamic and
resource-constrained environment. This research will discuss the potential benefits of edge
computing in VANETs, the challenges associated with implementing edge computing in
VANETs, and the current research trends in this area. One of the main advantages of edge
computing is that it can significantly reduce the latency in data processing and communica-
tion. By processing data closer to the source, edge computing can eliminate the need to
transmit data to a centralized server for processing, which can result in significant delays.
In the context of VANETs, reduced latency is particularly important for applications that
require real-time processing, such as collision avoidance and emergency response systems.
The work is organized as follows. Section 2 discusses the past research work on
network simulation in the context of a vehicular environment. Section 3 delves into
the proposed research methodology, both experimental and theoretical, while Section 4
discusses the results. Finally, Section 5 contains the conclusions.
2. Related Works
Jeongyoon et al. [9] provide two models, FMNMS1 and FMNMS2, that generate
network-based judgements by taking into account characteristics including the speed
of the vehicle, tyre sensitiveness, data size, geographical position, vehicle surroundings,
temperature, level of noise, heart rate with ECG, breathing rate, EEG, and EOG. Meanwhile,
Suresh Kumar et al. [2] recommends a framework for the management of network resources,
as well as for monitoring drivers in a VANET system. The simulation model incorporates
the 6G technology’s parameters and edge, fog, and cloud computing features to create
a realistic and accurate representation of the system. The proposed system can handle
high volumes of data with low latency and high throughput, making it suitable for real-
time communication and data processing in VANETs. The concept entails the use of
fuzzy logic and is regulated using edge/fog/cloud computing to enable optimal network
resource management and increase road safety. The study uses a Raspberry Pi and deep
learning techniques to forecast the driver’s state by collecting information from several
biosensors. The system activates the actuator based on the outcome. In addition, the study
features integrated edge/fog/cloud computing to solve scalability, security, seamless
connection, and dependability concerns. The system presented in [3] can anticipate the
relative speed, sensitivity, and traffic rate of the vehicle, as well as the driver’s state, such
as sleepiness or exhaustion. Based on these data, the suggested system can park the
car, notify the driver, reduce the vehicle’s speed, or shut down the engine in a critical
situation. The proposed fuzzy-based VANET system intends to create a safe and user-
friendly transportation infrastructure capable of reducing serious accidents and improving
personal transportation security.
Wali Ullah et al. [4] present a new strategy for data sharing in 6G-VANET that
utilizes blockchain and edge intelligence to improve privacy protection. The proposed
approach comprises three primary elements: a data owner, a data requester, and edge
nodes. The data owner encrypts data and shares them on the blockchain, while the data
requester uses edge intelligence to obtain and decrypt the data. The edge nodes act as
intermediaries to facilitate data sharing and enhance privacy protection by keeping the data
owner’s and requester’s identities anonymous. The authors assess the proposed approach’s
performance in terms of the data retrieval time, communication overhead, and privacy
Sensors 2023, 23, 5817 5 of 29
protection. The findings in [7] indicate that the proposed strategy outperforms current
approaches in terms of data retrieval times and communication overhead, while providing
robust privacy protection. Throughout the data sharing process, the identities of the data
owner and requester are kept anonymous. Overall, this research introduces a promising
solution for data sharing in 6G-VANET that leverages blockchain and edge intelligence to
improve privacy protection while maintaining efficient data retrieval.
According to the study in [8], the current access control and security mechanisms for
vehicular communication systems are insufficient in tackling the distinct issues that arise
with 6G networks, such as higher data rates, reduced latency, and more extensive connec-
tivity. The authors suggest a more elaborate approach that includes three main elements:
authentication, authorization, and encryption. Authentication is responsible for verifying
the user or device’s identity before granting access to the network, while authorization
regulates the level of access granted to each user or device based on their privileges or
roles. Encryption guarantees the confidentiality and security of all communication between
users or devices. Furthermore, the proposed strategy in [10] introduces a trust manage-
ment system that examines the reliability of each user or device based on their conduct
and interactions with the network, thereby preventing malicious attacks or unauthorized
access. The authors test their approach via simulations and experiments, concluding that
it improves security and performance in vehicular communication systems within 6G
networks compared to existing methods. The study presents a new access control and
security approach for vehicular communication systems, addressing the specific challenges
of 6G networks and offering a secure and efficient communication setting for intelligent
vehicular transport in the future. An effective and reliable autonomous vehicle routing sys-
tem for 6G networks with computational intelligence has been proposed in this article [11].
The protocol establishes a routing method that enhances energy optimization amongst
IoT-based vehicles and ensures the ideal solution under challenging conditions [11].
The authentication scheme proposed in [12] is based on the combination of elliptic
curve cryptography (ECC) and symmetric key encryption. The scheme uses both public
key cryptography and symmetric key cryptography to authenticate messages transmitted
between vehicles in a VANET. The scheme also employs a secure key management mech-
anism to generate and distribute keys among vehicles. It involves two models, a secure
key management model and a message authentication model. The secure key management
model [13] is responsible for generating and distributing the keys required for the message
authentication model. On the other hand, the message authentication model is responsible
for verifying the authenticity of the messages transmitted between vehicles. The proposed
authentication scheme in [14] was tested using a simulator and the simulation results
showed that the proposed scheme performed better than other authentication schemes
concerning security, computational overhead, and communication overhead. The proposed
scheme achieved a high level of security with a low computational overhead and low com-
munication overhead, making it a suitable option for 6G-enabled VANETs. The research
study in [15] includes several algorithms, including a key generation algorithm that is used
to create the public and private keys necessary for the authentication process. The key
distribution algorithm is used to securely distribute the keys among the vehicles in the
VANET. The message authentication algorithm [16] is applied to authenticate the messages
transmitted between the vehicles in the VANET. The key update algorithm is introduced to
periodically update the keys to ensure the security of the VANET. The scheme is based on
well-established cryptography techniques and employs a secure key management mecha-
nism to guarantee the confidentiality and integrity of the messages exchanged between
vehicles. The experimental results demonstrate that the proposed scheme outperforms
other authentication schemes regarding security, computational overhead, and communica-
tion overhead. The research in [17] proposes an intelligent trust-based e-learning-based
intrusion detection system (IDS) for vehicular ad hoc networks (VANETs) in 6G. The pro-
posed IDS system is based on a hybrid model of machine learning and deep learning
algorithms. The proposed IDS system comprises three models: a trust model, a feature
Sensors 2023, 23, 5817 6 of 29
extraction model, and a classification model. The trust model evaluates the trustworthiness
of the vehicles in the network based on their behavior. The feature extraction model extracts
features from the network data, and the classification model classifies the extracted features
as normal or anomalous. The proposed system outperforms existing IDS systems [18]
in terms of detection accuracy and the false alarm rate. Specifically, he proposed system
achieves a high level of accuracy with a low false alarm rate, making it a suitable option for
6G-enabled VANETs. The proposed intelligent trust-based e-learning-based IDS system
in [19] is also a promising solution for intrusion detection in 6G-enabled VANETs. The sys-
tem is based on a hybrid model of machine learning and deep learning algorithms and
comprises several algorithms for trust evaluation, feature extraction, and classification.
The experimental results demonstrate that the proposed system outperforms existing IDS
systems in terms of detection accuracy and the false alarm rate.
The 5G-NR, vehicle-to-everything (V2X) [20] is a technology that provides improved
performance and advanced services by investing in more spectral and hardware resources.
With the growth of autonomous vehicles due to urbanization, improved living standards,
and technological advancements, there is an increased demand for communication devices
and digital applications to enable intelligent autonomous vehicles. The emergence of many
new services, such as 3D displays, holographic control display systems, and improved in-
car infotainment, will bring communication challenges to the V2X network. This will push
the capacity limits of existing wireless networks, posing new scientific and technical chal-
lenges for vehicular networks. Legacy V2X communication systems [21] can only provide
limited intelligence; therefore, there is a need for a significant shift away from traditional
communication networks to more versatile and diversified network approaches. The pro-
posed 6G wireless communication network will combine terrestrial and non-terrestrial
communication networks to enable intelligent and ubiquitous V2X systems with enhanced
reliability, security, and high data rates. New techniques are needed to enable adaptive
learning and intelligent decision-making in future V2X networks; 6G is expected to work
with machine learning to bring enhanced context awareness, self-aggregation, adaptive
coordination, and self-configuration, among other features. The concept of intelligent reflec-
tive surfaces (IRSs) [22] refers to a disruptive communication technique that has recently
gained attention. IRSs are programmable meta-surfaces consisting of numerous passive
antenna elements that can control the phase, amplitude, frequency, and polarization of
wireless signals, improving the propagation conditions and enabling higher rates, wider
coverage, and uninterrupted connectivity. In this paper, a multi-IRS and multi- unmanned
aerial vehicle (UAV)-assisted MEC system for 5G/6G networks are discussed where several
UAVs support numerous IRSs to serve a high number of User Equipment’s (UEs) [23].
In scenarios where V2X communications operate at the millimeter-wave or THz bands
or under unfavorable propagation conditions, the use of IRSs can enhance the vehicular
channel conditions and expand the transmission coverage. IRSs can also be used to miti-
gate the negative effects of the Doppler effect [24] and multi-path fading, making them an
appealing research direction for 6G-V2X. A use case scenario for IRSs is their installation
on buildings around out-of-coverage traffic intersections, enhancing the communication
coverage for transmitting vehicles in the perpendicular streets by fine-tuning the reflecting
elements of IRSs. To efficiently integrate them with 6G-V2X, some fundamental challenges,
such as reflection optimization, the optimal placement of IRSs, channel estimation in a
highly dynamic vehicular environment, and adaptation to different spectral ranges, must
be overcome.
Tactile communication [25] is a new technology that allows the real-time transmission
of touch, motion, vibration, and other sensory information. This technology is expected
to revolutionize communications in 6G-V2X by providing an immersive experience for
onboard vehicle users. Tactile communication will also enhance specific vehicular ap-
plications such as remote driving, vehicle platooning, and driver training. The use of
haptic-based warning signals can also help to improve driving safety. Tactile-based V2X
can also benefit vulnerable road users by providing appropriate haptic signals that en-
Sensors 2023, 23, 5817 7 of 29
hance their safety and activity. However, as noted in [26], there are several challenges in
implementing this technology. Tactile communication requires high-speed, low-latency
communication that can exchange large volumes of haptic information, which is difficult to
achieve in high-mobility vehicular environments. Furthermore, the technology requires
higher frequencies that are not very reliable, making it challenging to provide reliable high-
rate communications. Other challenges include developing control and communication
protocols, human-to-machine interfaces, haptic codecs, and the reconstruction of haptic
data. The security of V2X networks [27] is essential for the large-scale distribution and
verification of vehicular messages. To meet the security needs of different types of data,
such as mission-critical messages and multimedia data services, different frame structures,
routing strategies, and power/spectrum allocation methods are necessary.
Blockchain technology [4,28] is a potential solution to enhance the security and pri-
vacy of V2X communications. It can provide decentralized security management, mobile
cloud/edge/fog computing, and content caching. A blockchain-based security solution
can verify the authenticity of messages while preserving the sender’s privacy. Additionally,
blockchain can be used for spectrum sharing, allowing different users to share the same
spectrum, providing secure and highly efficient decentralized sharing. However, the adop-
tion of existing blockchain technology is not feasible for V2X communication scenarios
due to their dynamic network characteristics and real-time processing requirements. De-
veloping new blockchain algorithms with ultra-low latency and addressing the limited
throughput and scalability of current blockchain technology are significant challenges.
Quantum computing [29] is seen as a promising technology for 6G wireless commu-
nications, but it is still in its early stages of development. If practical solutions become
available, quantum computing could enhance security in V2X communications, which
is crucial for the prevention of accidents in autonomous vehicles. Traditional encryption
strategies may not be adequate, and quantum computing’s inherent security feature of
quantum entanglement makes it suitable to enhance security in V2X communications.
Quantum computing can also offer an enhanced computational capability to optimize
6G-V2X services and execute complex optimization algorithms with reduced complex-
ity. However, there are still many challenges to overcome, such as the development of
large-scale quantum computing, the design of quantum security architectures, and the
characterization of entanglement distribution. Current quantum computer chips can only
operate at extremely low temperatures, making them difficult to use in vehicles, and signif-
icant research is needed on the thermal stability of quantum computer chips [30].
Recent advancements in machine learning (ML) research [31], aided by the availabil-
ity of large datasets, high computational power, and storage capacity, have given rise to
novel technologies such as voice assistants and self-driving vehicles. In the context of 6G
vehicular networks [32], ML is an increasingly indispensable tool for highly autonomous
and intelligent operation. Traditional wireless communication systems rely heavily on
model-based approaches, which may not be accurate in certain scenarios, such as chan-
nel estimation and interference modeling. ML’s ability to extract features and identify
hidden relationships between input and output data makes it a powerful tool in such
scenarios where traditional communication system designs may fail. ML’s data-driven
nature can also help to predict channel dynamics, network traffic, user behavior, application
requirements, and security threats, leading to better resource provisioning and network
operation [33]. In addition to enhancing road safety and driver experiences, advancements
in ML techniques are contributing to the realization of autonomous cars. For instance, as
seen in [34,35], data streams from cameras, GPS units, sensors, and LiDAR can be processed
to make data-driven intelligent decisions through modular perception–planning–action
or end-to-end learning methods. Thus, research focuses on the impact of ML on 6G-V2X
networks, discussing the opportunities, challenges, and overall vision, with a focus on the
physical layer, radio resource allocation, and system security. Additionally, researchers
have introduced federated learning, one of the most promising ML technologies.
Sensors 2023, 23, 5817 8 of 29
The objective of the research study in [36] was to optimize the gas solubility and
forecast the traffic flow in vehicular networks enabled by 6G. The authors emphasize
that gas solubility is an essential aspect of vehicular networks as it impacts the energy
consumption, quality of service, and safety of vehicles. To optimize the gas solubility,
the authors suggest a novel approach utilizing deep learning techniques. The deep learning
model is trained on traffic flow data and can predict the ideal gas solubility for varying
traffic scenarios. Additionally, the authors propose a traffic flow forecasting model that uses
historical traffic data and deep learning techniques to forecast the traffic flow in real time.
The anticipated traffic flow can subsequently be employed to optimize the gas solubility
and enhance the overall performance of vehicular networks. The authors evaluate the
proposed approach through simulations and experiments and observe that the traffic flow
forecasting model can predict the traffic flow accurately. The optimized gas solubility
improves the quality of service, energy consumption, and safety of vehicles in different
traffic scenarios. Overall, the study suggests a novel deep learning-based approach for
the optimization of gas solubility and prediction of traffic flow in 6G-enabled vehicular
networks, which could enhance the efficiency and performance of vehicular networks and
enable intelligent transportation systems in the future.
Stefano et al. [37] present a novel bidirectional visible light communication (VLC)
system and evaluate its performance via various parameters, such as the data rate, latency,
reliability, and coverage for 6G vehicular communication. The bidirectional VLC system
outperforms the IEEE 802.11p and LTE/5G C-V2X technologies in terms of the data rate
and latency. The bidirectional VLC system can achieve a data rate of up to 10 Gbps, which
is significantly higher than that of the other technologies. Moreover, the VLC system has
lower latency than the other technologies, which is important for safety-critical applications
in 6G-enabled vehicular networks.
The protocols proposed by Pandi et al. [38] are designed to ensure secure communi-
cation in vehicular ad hoc networks (VANETs) enabled with 6G technology. The authors
use a combination of batch authentication and key exchange techniques to improve the
network efficiency and reduce the communication overhead. The authors add two new
protocols for anonymous batch authentication and key exchange in VANETs enabled with
6G technology: ABKA and ABKA-R. ABKA allows multiple messages to be authenticated
simultaneously, thereby reducing the communication overhead. ABKA-R is an improved
version of ABKA that includes a revocation mechanism to handle compromised or malfunc-
tioning nodes. The authors describe the message flow, security properties, and advantages
of each protocol.
Jiayu and Gao [39] make certain assumptions about the network and its attackers, such
as the availability of public key infrastructure (PKI) and the existence of malicious nodes in
the network. The paper also defines the notations and terminologies used in the proposed
protocols, including batch authentication, key exchange, and anonymity. Fan et al. [40]
demonstrate that the proposed protocols provide strong security guarantees, including
confidentiality, integrity, authenticity, and anonymity. The paper also evaluates the perfor-
mance of the proposed protocols in terms of communication overhead, computation time,
and memory usage. The results show that the proposed protocols are efficient and can be
implemented in practice.
The main challenge for web service providers [41] is to provide internet access inside
moving vehicles with the best speed possible. The cloud radio vehicular ad hoc network
architecture is a sensible solution for data broadcasting from the cloud to moving vehicles
within a specific radius for road safety and traffic supervision. Traditional radio network
architectures [42] are less efficient with respect to energy consumption, so a multilayer
system with the elimination of intermediate points is proposed to improve energy efficiency.
The creation of a 6G environment with dynamic objects is possible by setting dedicated
paths with higher speeds and energy efficiency. A neuro-fuzzy system is proposed [42,43] as
an efficient tool to reduce intermediate points, and a comparison with various parameters is
performed to validate its effectiveness. VANETs can benefit from the Cloud Radio Network
Sensors 2023, 23, 5817 9 of 29
(C-RAN), which provides a durable platform for ad hoc networks. Node selection can be
improved with Learning Vector Quantization (LVQ) and neuro-fuzzy techniques such as
back-propagation. Next-generation technology, such as a sixth-generation virtual network,
may be introduced in the next decade using advanced techniques such as learning vector
quantization and a neuro-fuzzy forwarder scheme.
The cost-effective interchange and viability of buses used as mRSUs [1] have been
investigated, and the results show that the performance was improved after the sRSU was
replaced by the mRSU, but the costs increased and remediation was difficult, so both static
and moving RSUs were implemented in accordance with all relevant requirements: static,
installed on public transportation, and mobile. The simulation results [44] corroborate the
analytical model’s findings, which show that the greater the number of mRSUs, the greater
the probability of communication in VANETs. According to the findings, adopting a
5 per cent rate in mRSUs may increase the communication efficiency by two times while
decreasing the cost. Because the automobile is not under fixed RSU radio coverage, it may
communicate with adjacent mRSUs to obtain traffic information. The simulation findings
of the social-aware mobile roadside unit scheme [45] for content distribution in vehicular
social networks show that it improves the source vehicle’s mean throughput performance.
It is a cross-layer RSU/mobile relay station (RS) detection method for VANETs that takes
into account many variables from various protocol levels, such as the connection status,
bandwidth, and latency aspects, and user services.
3. Methodology
To improve the connection stability and to reduce the packet loss during the handover
from one RSU to another, this research introduces the mRSU; in addition, to evaluate the
results, the urban mobility traffic scenario is considered. For the simulation and results,
the NS-3 simulator is selected, in which the scenario is designed, and then the results of
the simulation are compared to other conditions in which the RSU is static. As in [46],
the standard energy that is assumed for the storage, carrying, and transmission of the
message of 500 KB is 1.7 J, but this is only the assumed value. Our results indicate the actual
value at the node that is required to store, carry, and transmit the message. We then note
the value that a mobile node consumes, while performing normal operations; after this,
the sender sends a message and we note the change in energy consumption at the receiver
node. The value that is finally found is 4.3136 J for a message of 0.16 KB.
To measure the energy and power consumption when sending or receiving a message,
in this research, a DC power supply is used, which will change in current and voltage
when sending or receiving a message. Thus, by obtaining the values of the current and
voltage, the power can be determined; then, by obtaining the value of the power, the energy
consumption is calculated. At the start, the DC power supply is used during the movement
of the vehicle. Here, to determine the values for current and voltage, a DC power supply
(Power Net 1502DD) of 15 V and 2 Amperes (A) is used.
Initially, the voltage encoder wheel is set to 4.4 V because the nodes mostly bear
a voltage of around 4.4 V and, after increasing this, there will be the possibility of IC
damage; thus, we set the voltage at 4.4 V and the current to a maximum of 2 Ampere to
calculate the power consumption of the mRSU before sending and receiving the message
as shown in Figure 3. Next, we connect the positive terminal of the power supply with
the positive terminal of the node and the negative one with the negative terminal. Next,
before sending or receiving any message, we first observe on the screen that the mRSU is
consuming a current of 480 mA at a voltage of 4.017 V; there is a small variation from the
set value, so the power is calculated by using the product of the voltage and current, which
is 1.92816 Watts before sending any message. Then, by maintaining the same motion at
the speed of 15 km/h, we send a message of 300 KB to another node while keeping the
DC power supply connected to our mRSU, and we note the readings. There is a change in
value and the current value reaches 362 mA, while the voltage reaches 4.002 V, thus, the
power value at this point is 1.449086 Watts as shown in Figure 4. Therefore, taking the
Sensors 2023, 23, 5817 10 of 29
difference between the two values of power, we determine the amount of power consumed
when sending the message. We calculate this energy value using the change in the values
of current and voltage, and we then calculate the power; from the power, the energy
consumption can be calculated.
(a) DC power supply installed vehicle (b) Adjusting voltage of DC power supply
(a) Energy consumption while sending a message (b) RSU installed vehicle
energy consumption when interacting with the vehicle during time slot ‘t’. We utilize the
following model, since it is dependent on the location of the vehicle within the mRSU’s
transmission range.
P1 = 1.623762 W (1)
Current = 426 mA
Voltage = 3.685 V
P=V×I
P = 3.685 V × 426 mA
P2 = 1.56981 W (2)
Thus, the change in power can be found by subtracting Equation (2) from Equation (1):
E = P×T
E = 0.05392 × 40 s
E = 2.1568 J (4)
Hence, for a 0.16 KB message size, the energy consumption is 2.1568 J.
Here, the packet size is in KB, the current is in mA, and the voltage value of the node is
in volts. To calculate the power consumption and energy consumption for message transfer,
we use the formula and multiply the voltage and current to obtain the power in Watts.
As in physics, the power is the amount of energy transferred per unit of time. Here, to
find the energy, the power is multiplied by the time and we obtain the result in J, which is
the energy consumption during the message transfer, i.e., 2.1568 J. In the actual scenario,
the message size is about 300 KB, and we have to determine the energy consumption
for a 300 KB message. For this, there are 2 methodologies: we can calculate it using the
unitary method or by practically sending a message of 300 KB and checking the change in
energy consumption at the receiver end. We implement both methodologies and obtain the
following results. When implementing the unitary method, the value is about 4.044 kJ for a
300 KB message; meanwhile, when calculating the real-time value by sending the message
from one node to another, the change in energy at the receiving end is calculated using the
Sensors 2023, 23, 5817 13 of 29
Ampere Meter app and is 0.5546202 J for a 300 KB message. We can calculate the energy
consumption by applying the “unitary method” for a 300 KB message size as follows.
Energy consumption for 0.16 KB message is 2.1568 J.
Energy consumption for 1 KB message is 2.1568/0.16 = 13.48 J.
Energy consumption for 300 KB message is 13.48 × 300 = 4.044 kJ.
By applying the unitary method, we calculate the energy consumption for the 300 KB
message and it is 4.044 kJ.
The experimental energy consumption values for a 300 KB message size are shown in
Table 1.
Energy
Energy
I1 V1 P1 = VI I2 V2 P2 = VI P1 −P2 Time Distance per Day
E=P×T
kJ/Day
1 480 4.01 1.92 362 4.00 1.44 0.47 2 60 0.9581 14.3721
2 445 4.02 1.78 314 4.01 1.26 0.52 20 130 10.581 158.724
3 467 4.00 1.86 332 4.00 1.32 0.54 40 200 21.642 324.636
4 483 3.99 1.92 336 4.01 1.34 0.58 60 400 34.860 522.909
5 468 4.01 1.87 308 4.01 1.23 0.64 80 600 51.428 771.432
6 470 4.00 1.88 330 4.02 1.32 0.55 100 650 55.401 831.015
workable VANET scenario. Additionally, route loss owing to impediments (such as cars,
buildings, road curvature, and so on) along the path of signal transmission from one vehicle
to another must be considered, as shown in Figure 7.
Data packet loss reflects the network channel properties, while route loss is estimated
using propagation models. As a result, route loss and fading models, as well as correct
routing protocol selection, are examined. The IEEE 802.11p and IEEE 1609.14 standards are
included in the WAVE. CSMA/CA [51] is implemented in the IEEE standard with QoS and
reliable communication. As a result, interface protocols such as IEEE 802.11p and 1609.x
allow effective short-range transmission in this context.
At each channel, different traffic is generated and we analyze the energy consumption
for each node. In this scenario, there is a “tcp” agent that is integrated with n0 as well
as n2, and communication takes place to a “TCP” “sink” agent connected to n1 and n3.
The maximum size of a packet created by a “TCP” agent is 1 KByte by default. A tcp
“sink” agent produces and transmits ACK packets to the sender (tcp agent), and then frees
the packets that it has obtained. A “UDP” agent connected to n4 and n5 is linked to a
“null” agent connected to n6 and n7, respectively. A “null” agent simply frees the packets
that have been received. To the “TCP” and “UDP” agents, an “FTP” and a “CBR” traffic
generator are connected, respectively. The “CBR” is configured to produce 1 KByte packets
at a 1 Mbps rate. “CBR” is planned to begin and stop, while “FTP” is set to begin at 1.0 s
and end at 15.0 s.
Here, at the start, the NS-3 script generates an object instance and assigns it to a
variable; then, we initialize the packet format. After this, we create a scheduler and then
select the default address format. The simulator object has member functions that create
compound objects such as nodes and links; it then connects the network component objects
created. After this, it sets the network component parameters and then creates connections
between agents (forming a connection between “tcp” and “sink”). Similarly, the “Cell
Breathing” concept of the varying coverage area of mRSU will be considered, as it appears
in UMTS. According to this, the coverage area will be increased where the traffic travels
only in one direction or is not too abundant, while the coverage area of the mRSU will
be decreased to provide the maximum connectivity among vehicles in the coverage of a
relative mRSU.
for processing, while providing real-time data analysis and responses. Research is being
conducted to develop architectures for edge computing that can efficiently process data
closer to the source. This includes investigating various edge computing models, such
as cloud edge computing, fog computing, and mobile edge computing. It has a wide
range of potential applications, including industrial Internet of Things (IoTs), smart cities,
healthcare, and autonomous vehicles. Research is focused on developing applications
that can benefit from edge computing and designing solutions that address the specific
requirements of these applications. As edge computing involves processing data closer to
the source, security is a major concern. Thus, it is necessary to develop security solutions
that can protect edge computing devices and networks from various threats, such as data
breaches, malware attacks, and denial-of-service attacks. It also requires a robust and reli-
able network infrastructure to enable efficient communication between edge devices and
the cloud. Research in [18] focused on developing networking solutions that can support
edge computing, such as 5G, SDN, and NFV. Edge computing involves processing data in
real time, which requires high performance and low latency. Research is also focused on
optimizing the performance of edge computing systems, including developing efficient al-
gorithms, optimizing resource allocation, and reducing energy consumption. By processing
data at the edge, edge computing can significantly reduce the amount of data that need to
be transmitted to the cloud. This can help to reduce the bandwidth requirements and asso-
ciated costs. Edge computing [28] can enable new business models, such as providing edge
services to customers or leveraging edge computing to enable new products or services.
For example, edge computing could be used to provide real-time monitoring and analysis
for industrial IoT applications. This may include developing new algorithms and analytics
tools, as well as building applications that can operate effectively in resource-constrained
edge environments. Edge computing research is focused on developing technologies and
architectures for the efficient and effective processing of data at the edge of the network.
Mobile edge computing (MEC) [7] is a paradigm within distributed computing that
enables the processing of data at the edge of the mobile network, closer to the end-user
devices. Research is focused on developing architectures for MEC that can efficiently
process data closer to the end-user devices. This includes investigating various MEC
models, such as centralized MEC, decentralized MEC, and hybrid MEC.
Edge computing can also improve the reliability of communication in VANETs by
reducing the dependence on centralized servers. By distributing computing resources
and services closer to the source, edge computing [40] ensures that communication can
continue even in the event of a network outage or server failure. This is particularly
important in the context of VANETs, where communication can be disrupted by factors
such as high-speed mobility, signal attenuation, and interference. Edge computing can also
enhance privacy and security in VANETs by reducing the need to transmit sensitive data
over the network, as shown in Figure 8. By processing data locally, edge computing can
limit the amount of data that need to be transmitted over the network, which can reduce
the risk of data interception and unauthorized access. Edge computing can also enable
the use of encryption and other security measures closer to the source, which can further
enhance security. It can also improve the utilization of computing resources in VANETs by
distributing computation and storage tasks to devices in the network. This can reduce the
load on centralized servers and enable the more efficient use of available resources. Edge
computing can also enable the use of low-power devices, such as smartphones and tablets,
as computing nodes, which can further enhance resource utilization.
Sensors 2023, 23, 5817 16 of 29
Notation Description
Th avg Average throughput
Pr Packet received
Ps Packet sent
Tl Time of last received packet
Tf Time of first transmit packet
EED End-to-end delay
Tdelay Transmission delay
Pdelay Propagation delay
Pro delay Processing delay
Qdelay Queuing delay
PDR Packet delivery ratio
TSim Total simulation
kB Packet size in kilobytes
kJ/day Energy per day
number of vehicles and their positions, speeds, and directions. The mobility.tcl file is used
to run the simulation in NS-3. The 802.11p MAC/PHY, with a frequency of 5.9 GHz, is
kept steady for the delivery of basic messages to analyze the surrounding BSM. Variations
in transmission schemes and routing protocols depending on the simulation time and the
number of nodes are used to evaluate the performance of the network (vehicles). Figure 9
shows a screenshot of a plausible scenario with the simulated SUMO scenario generated.
(a) Open Street Map Sector F5 Islamabad (b) SUMO Map Sector F5 Islamabad
Pt Gt GT λ2
Pr = (8)
(4πd)2 L
The transmission power (W) is Pt , the reception power (W) is Pr , and the wavelength is
(m). Gt and Gr are the transmission and reception gains, respectively. The network loss
is L and the transmission distance and recipient are d. The received radio signal intensity
is determined by the broadcast signal intensity, the reception and broadcasting antenna
Sensors 2023, 23, 5817 19 of 29
gain, and the separation between the transmitters to the receiver, according to the equation
mentioned above.
d
L = Lo + 10nlog( ) (9)
do
The path loss is designated by L, the length is indicated by d, and the reference distance
is represented by do ; the path loss for the reference distance is defined as Lo , and the path
loss exponential is marked by n.
2mm m 2
p( x; m, ω ) = x2m−1 e− ω x (10)
Γ(m)ω m
The fading depth and average power received are denoted by the m and ω variables,
respectively. Updating the gamma distributions yields the probability density function
(pdf) at a given distance. As with a stochastic model, the message continues to follow a
gamma distribution with average power fading and intensity with amplitude x ≥ 0. When
m = 1, the Nakagami model transforms into the Rayleigh model.
and the normalized power envelope is derived from the previous two equations as
r2 1 h √ i
= ( x1 + 2K )2 + x22 (13)
P 2( K + 1)
Sensors 2023, 23, 5817 20 of 29
P is the power in the dominating path as expressed by a large-scale model. The outcome
of a sizable propagation model may be modulated with this power envelope. The power
anticipated by the large-scale scenario is assumed to be the mean-squared value of the
envelope. This power includes the dominant-path and multi-path power in the Rician
model. In some transmission schemes, representing simply the value in the dominant
channel will be much more suitable for large-scale power computation. The above equation
is divided by A2 = 2σ2 K. The normalized power envelope then becomes
r2 1 h √ i
= ( x1 + 2K )2 + x22 (14)
P 2( K )
where P is the power in the dominating route as represented by such a large-scale model.
This Equation (15) can also be transformed with greater detail as follows:
d
PL(d) = −αlog10( ) (17)
do
( Pr ∗ 8)
Th avg = (18)
(Tl ) − (T f )
Thus, in this equation, Ptx (t) is the power transfer of the mRSU at the particular time
slot t, while the received power of vehicle i is Prx (i, t), the reference distance is denoted by
do , Po is the path loss at the reference distance, [54] the distance between the mRSU and
vehicle i at time slot i is expressed by d(i,t) , the path loss exponent is γ, D is the data rate, B
is the bandwidth of the channel, and N is the noise power.
refers to the transmission distance for only a hop [55,56]. The bits, on either side, are
passed from one hop to the next, with the computation cost depending on the distance
between the transmitter and the receiver. The hop count is divided into two types: one is
between the source node and the target node (next-hop node), and the other is between the
next-hop node and the destination node. For the first category, the hop count is calculated
using the node broadcast range, which is the node diameter. The initial hop count would
be the neighbor node with the greatest distance from the source node within the node
radius of X meters. The hops’ region will be limited to the propagation range of the node
alone. The estimated hop count (H) may be used to acquire the farthest distance inside the
node diameter.
D
H= (22)
l+d
where
D = distance between a source and a target node;
l = average Length of a vehicle;
d = average distance between vehicles.
4.1.2. Simulation Results of Three-Log Distance Propagation Model regarding Packet Size
In the three-log distance propagation model, the mobile RSU has a much smaller delay
than the sRSU because the distance is limited; hence, the mRSU packet arrives at the node
earlier. The mobile RSU also has a better packet delivery ratio because the possibility of
packet dropping is reduced. After all, the RSU is in motion with the vehicles.
the Rician propagation model as compared to the sRSU. Because the mRSU is in motion
with the nodes, the distance between them is reduced, and therefore the latency is reduced.
Similarly, the throughput increases owing to the multi-path process since messages can be
received from any hop.
4.2. Discussion of mRSU and sRSU for Propagation Models regarding Packet Size
Regarding constant parameters, this instance takes Sector F5 in Islamabad, Pakistan,
with routing algorithm AODV and a simulation time of 360 s, vehicle velocity of 20 m/s,
and the random way point mobility model. Every node transmits power and the broadcast
range is similarly set. The performance characteristics of the propagation model are
evaluated with the packet size modifications. Figure 11a shows that the Friis model and
three-log distance model outperform the other models both for the mobile RSU and sRSU
in terms of end-to-end delay, because the receiving power is inversely proportional to
the distance, and as the mRSU remains in motion with the vehicles, the distance does
not increase rapidly and the delay remains the lowest. Meanwhile, the Nakagami model
gives the worst result regarding the delay due to the variations in signal strength due to
multi-path fading.
For the packet delivery ratio, the mRSU gives the best results at all packet sizes in the
different models, e.g., at 100 KB, the mRSU in the range propagation and three-log models
gives the best results, while, at 200 KB, 300 KB, and 400 KB, the mRSU in the Nakagami
model gives the best results, and at 500 KB, the Friis model gives the best result. Overall,
the mRSU gives best packet delivery ratio at all packet sizes because the possibility of
packet drop reduces as the RSU is in motion along with the vehicles. On the other hand,
the throughput, as shown in Figure 11e, shows better performance with the increase in the
packet size for the mRSU in the Nakagami, Rician, and Rayleigh propagation models and
shows a gradual increment. Thus, the throughput presents better results for the mRSU,
especially for Nakagami, because, through the multi-path process, the MIMO helps to
receive multiple inputs at the receiver and achieves greater throughput. On the other
hand, regarding the energy consumption, the sRSU consumes less energy than the mRSU
in all propagation models because of its continuous mobility; however, it is necessary to
determine the quantity of energy in the mRSU that should be reserved for emergency
packets per day. Overall, the mRSU outperforms the sRSU in terms of the throughput,
end-to-end delay, and packet delivery ratio.
Sensors 2023, 23, 5817 24 of 29
(d) (e)
Figure 11. Computational modeling outcomes pertaining to the deployment of mRSUs and sRSUs in
the context of propagation models, in relation to the variation in the packet size. (a) Average delay
analysis of mRSU and sRSU with regard to packet size; (b) hop count analysis of mRSU and sRSU
with regard to packet size; (c) PDR analysis of mRSU and sRSU with regard to packet size; (d) energy
consumption analysis of mRSU and sRSU with regard to packet size; (e) throughput analysis of
mRSU and sRSU with regard to packet size.
4.4. Discussion of mRSU and sRSU for Propagation Models regarding Number of Vehicles
The propagation models using a consistent routing protocol, an interfacing protocol,
and an increasing number of nodes are evaluated in this scenario. A realistic situation is
used, with 49, 79, and 109 vehicles interacting through 500 KB packets. The mRSU in the
three-log distance and Friis propagation models has the best performance since it has the
least latency, as seen in Figure 12a. In the event of a delay, the sRSU and mRSU for the
Nakagami propagation model operate similarly. The highest packet delivery ratio is shown
in Figure 12c using the mRSU for the Nakagami, Rician, and Rayleigh propagation models.
However, the throughput of the sRSU in the Friis propagation model decreases as
the number of nodes increases, but the throughput of the mRSU rises as the number of
nodes increases. For the mRSU, the packet delivery ratios in the Friis, three-log distance,
and Rayleigh propagation models show the best outcomes, but the performance of the
mRSU in Nakagami improves dramatically as the number of nodes increases, while the
sRSU delivers the opposite results. In terms of energy consumption, when the number of
nodes is varied, the FreeSpace and shadowing propagation models produce nearly identical
performance for both sRSUs and mRSUs, whereas the sRSU’s energy consumption is lower
than that of the mRSU in the range propagation and Nakagami propagation models.
However, the precise energy quota to be saved for emergency packets for mRSUs may be
obtained using the related computations. Ultimately, from the perspective of the end-to-end
delay and packet delivery ratio, the three-log distance and Friis models surpass the other
models, while Nakagami, Rayleigh, and Rician have higher throughput.
Sensors 2023, 23, 5817 26 of 29
(d) (e)
Figure 12. Computational modeling outcomes pertaining to the deployment of mRSUs and sRSUs in
the context of propagation models, in relation to the variation in the number of vehicles. (a) Average
delay analysis of mRSU and sRSU with regard to number of vehicles; (b) hop count analysis of mRSU
and sRSU with regard to number of vehicles; (c) PDR analysis of mRSU and sRSU with regard to
number of vehicles; (d) energy consumption analysis of mRSU and sRSU with regard to number of
vehicles; (e) throughput analysis of mRSU and sRSU with regard to number of vehicles.
RSU, the Nakagami, Rician, and Rayleigh models deliver superior outcomes in terms of
throughput. The experimental computational findings suggest that collaborating for energy
usage in VANET technology may significantly increase the network lifespan.
Author Contributions: Conceptualization, Z.A.K.; Methodology, F.J.; Validation, S.R.; Formal analy-
sis, S.S.; Resources, N.R.C.; Writing—review & editing, M.I. All authors have read and agreed to the
published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not Applicable.
Informed Consent Statement: Not Applicable.
Data Availability Statement: Not Applicable.
Acknowledgments: The authors would like to acknowledge the support of Prince Sultan University
for paying the Article Processing Charges (APC) of this publication.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Luo, G.; Zhou, H.; Cheng, N.; Yuan, Q.; Li, J.; Yang, F.; Shen, X. Software-defined cooperative data sharing in edge computing
assisted 5G-VANET. IEEE Trans. Mob. Comput. 2019, 20, 1212–1229. [CrossRef]
2. Suresh Kumar, K.; Radha Mani, A.; Sundaresan, S.; Ananth Kumar, T. Modeling of VANET for future generation transportation
system through Edge/Fog/Cloud computing powered by 6G. In Cloud and IoT-Based Vehicular Ad Hoc Networks; Scrivener
Publishing LLC: Beverly, MA, USA, 2021 ; pp. 105–124.
3. Ko, W.; Oh, K.; Jeon, E.; Suk, H.I. Vignet: A deep convolutional neural network for eeg-based driver vigilance estimation. In
Proceedings of the 2020 8th International Winter Conference on Brain-Computer Interface (BCI), Gangwon, Republic of Korea,
26–28 February 2020; pp. 1–3.
4. Khan, W.U.; Jameel, F.; Jamshed, M.A.; Pervaiz, H.; Khan, S.; Liu, J. Efficient power allocation for NOMA-enabled IoT networks
in 6G era. Phys. Commun. 2020, 39, 101043. [CrossRef]
5. Khan, M.A.; Kumar, N.; Mohsan, S.A.H.; Khan, W.U.; Nasralla, M.M.; Alsharif, M.H.; Żywiołek, J.; Ullah, I. Swarm of UAVs for
network management in 6G: A technical review. IEEE Trans. Netw. Serv. Manag. 2022, 20, 741–761.
6. Cao, Y.; Wang, N.; Sun, Z.; Cruickshank, H. A Reliable and Efficient Encounter-Based Routing Framework for Delay/Disruption
Tolerant Networks. IEEE Sens. J. 2015, 15, 4004–4018. [CrossRef]
7. Wang, Z.; Xu, Y.; Liu, J.; Li, Z.; Li, Z.; Jia, H.; Wang, D. An Efficient Data Sharing Scheme for Privacy Protection Based on
Blockchain and Edge Intelligence in 6G-VANET. Wirel. Commun. Mob. Comput. 2022, 2022, 5031112. [CrossRef]
8. Ning, Z.; Dong, P.; Wen, M.; Wang, X.; Guo, L.; Kwok, R.Y.; Poor, H.V. 5G-enabled UAV-to-community offloading: Joint trajectory
design and task scheduling. IEEE J. Sel. Areas Commun. 2021, 39, 3306–3320. [CrossRef]
9. Heo, J.; Kang, B.; Yang, J.M.; Paek, J.; Bahk, S. Performance-cost tradeoff of using mobile roadside units for V2X communication.
IEEE Trans. Veh. Technol. 2019, 68, 9049–9059. [CrossRef]
10. Zhou, Z.; Gaurav, A.; Gupta, B.B.; Lytras, M.D.; Razzak, I. A fine-grained access control and security approach for intelligent
vehicular transport in 6g communication system. IEEE Trans. Intell. Transp. Syst. 2021, 23, 9726–9735. [CrossRef]
11. Haseeb, K.; Rehman, A.; Saba, T.; Bahaj, S.A.; Wang, H.; Song, H. Efficient and trusted autonomous vehicle routing protocol for
6G networks with computational intelligence. ISA Trans. 2023, 132, 61–68. [CrossRef]
12. Fatemidokht, H.; Rafsanjani, M.K.; Gupta, B.B.; Hsu, C.H. Efficient and secure routing protocol based on artificial intelligence
algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans. Intell. Transp. Syst.
2021, 22, 4757–4769. [CrossRef]
13. Liao, L.; Zhao, J.; Hu, H.; Sun, X. Secure and Efficient Message Authentication Scheme for 6G-Enabled VANETs. Electronics 2022,
11, 2385. [CrossRef]
14. Xiong, W.; Wang, R.; Wang, Y.; Zhou, F.; Luo, X. CPPA-D: Efficient conditional privacy-preserving authentication scheme with
double-insurance in VANETs. IEEE Trans. Veh. Technol. 2021, 70, 3456–3468. [CrossRef]
15. Wang, P.; Liu, Y. SEMA: Secure and efficient message authentication protocol for VANETs. IEEE Syst. J. 2021, 15, 846–855.
[CrossRef]
Sensors 2023, 23, 5817 28 of 29
16. Zhou, H.; Xu, W.; Chen, J.; Wang, W. Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities.
Proc. IEEE 2020, 108, 308–323. [CrossRef]
17. Zhao, J.; Liu, J.; Yang, L.; Ai, B.; Ni, S. Future 5G-oriented system for urban rail transit: Opportunities and challenges. China
Commun. 2021, 18, 1–12. [CrossRef]
18. Shameem, A.; Singh, B.; Lourens, M.E. Intelligent Trust based e-learning based IDS system and VANET in 6G. J. Pharm. Negat.
Results 2022, 13, 473–484. [CrossRef]
19. Omarov, B.; Narynov, S.; Zhumanov, Z.; Gumar, A.; Khassanova, M. State-of-the-art violence detection techniques in video
surveillance security systems: A systematic review. PeerJ Comput. Sci. 2022, 8, e920. [CrossRef]
20. Tursynova, A.; Omarov, B. 3D U-Net for brain stroke lesion segmentation on ISLES 2018 dataset. In Proceedings of the 2021 16th
International Conference on Electronics Computer and Computation (ICECCO), Kaskelen, Kazakhstan, 25–26 November 2021;
pp. 1–4.
21. Noor-A-Rahim, M.; Liu, Z.; Lee, H.; Khyam, M.O.; He, J.; Pesch, D.; Moessner, K.; Saad, W.; Poor, H.V. 6G for vehicle-to-everything
(V2X) communications: Enabling technologies, challenges, and opportunities. Proc. IEEE 2022, 110, 712–734. [CrossRef]
22. Saad, W.; Bennis, M.; Chen, M. A vision of 6G wireless systems: Applications, trends, technologies, and open research problems.
IEEE Netw. 2019, 34, 134–142. [CrossRef]
23. Asim, M.; ELAffendi, M.; Abd El-Latif, A.A. Multi-IRS and multi-UAV-assisted MEC system for 5G/6G networks: Efficient joint
trajectory optimization and passive beamforming framework. IEEE Trans. Intell. Transp. Syst. 2022, 24, 4553–4564. [CrossRef]
24. Naik, G.; Choudhury, B.; Park, J.M. IEEE 802.11 bd & 5G NR V2X: Evolution of radio access technologies for V2X communications.
IEEE Access 2019, 7, 70169–70184.
25. Sadio, O.; Ngom, I.; Lishou, C. Controlling WiFi direct group formation for non-critical applications in C-V2X network. IEEE
Access 2020, 8, 79947–79957. [CrossRef]
26. Bagheri, H.; Noor-A-Rahim, M.; Liu, Z.; Lee, H.; Pesch, D.; Moessner, K.; Xiao, P. 5G NR-V2X: Toward connected and cooperative
autonomous driving. IEEE Commun. Stand. Mag. 2021, 5, 48–54. [CrossRef]
27. Tariq, F.; Khandaker, M.R.; Wong, K.K.; Imran, M.A.; Bennis, M.; Debbah, M. A speculative study on 6G. IEEE Wirel. Commun.
2020, 27, 118–125. [CrossRef]
28. Nayak, S.; Patgiri, R. 6G communication: A vision on the potential applications. In Proceedings of the Edge Analytics: Select
Proceedings of 26th International Conference—ADCOM 2020, Silchar, India, 16–18 December 2020; Springer: Singapore, 2022; pp.
203–218.
29. Akyildiz, I.F.; Kak, A.; Nie, S. 6G and beyond: The future of wireless communications systems. IEEE Access 2020, 8, 133995–134030.
[CrossRef]
30. Xiao, Z.; Zeng, Y. An overview on integrated localization and communication towards 6G. Sci. China Inf. Sci. 2022, 65, 131301.
[CrossRef]
31. Liu, Z.; Yang, L.L. Sparse or dense: A comparative study of code-domain NOMA systems. IEEE Trans. Wirel. Commun. 2021,
20, 4768–4780. [CrossRef]
32. Wymeersch, H.; Shrestha, D.; De Lima, C.M.; Yajnanarayana, V.; Richerzhagen, B.; Keskin, M.F.; Schindhelm, K.; Ramirez,
A.; Wolfgang, A.; De Guzman, M.F.; et al. Integration of communication and sensing in 6G: A joint industrial and academic
perspective. In Proceedings of the 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio
Communications (PIMRC), Helsinki, Finland, 13–16 September 2021; pp. 1–7.
33. Bartoletti, S.; Wymeersch, H.; Mach, T.; Brunnegård, O.; Giustiniano, D.; Hammarberg, P.; Keskin, M.F.; Lacruz, J.O.; Razavi, S.M.;
Rönnblom, J.; et al. Positioning and sensing for vehicular safety applications in 5G and beyond. IEEE Commun. Mag. 2021,
59, 15–21. [CrossRef]
34. ElGhanam, E.; Hassan, M.; Osman, A.; Ahmed, I. Review of communication technologies for electric vehicle charging management
and coordination. World Electr. Veh. J. 2021, 12, 92. [CrossRef]
35. Wang, J.; Zhu, K.; Hossain, E. Green Internet of Vehicles (IoV) in the 6G era: Toward sustainable vehicular communications and
networking. IEEE Trans. Green Commun. Netw. 2021, 6, 391–423. [CrossRef]
36. Escorcia-Gutierrez, J.; Torres-Torres, M.; Madera, N.; Soto, C. Henry Gas Solubility Optimization with Deep Learning Enabled
Traffic Flow Forecasting in 6G Enabled Vehicular Networks. In AI-Enabled 6G Networks and Applications; John Wiley & Sons Ltd.:
Hoboken, NJ, USA, 2023 ; pp. 35–53.
37. Caputo, S.; Mucchi, L.; Umair, M.A.; Meucci, M.; Seminara, M.; Catani, J. The Role of Bidirectional VLC Systems in Low-Latency
6G Vehicular Networks and Comparison with IEEE802. 11p and LTE/5G C-V2X. Sensors 2022, 22, 8618. [CrossRef] [PubMed]
38. Vijayakumar, P.; Azees, M.; Kozlov, S.A.; Rodrigues, J.J. An anonymous batch authentication and key exchange protocols for 6G
enabled VANETs. IEEE Trans. Intell. Transp. Syst. 2021, 23, 1630–1638. [CrossRef]
39. Qi, J.; Gao, T. A privacy-preserving authentication and pseudonym revocation scheme for VANETs. IEEE Access 2020, 8, 177693–
177707. [CrossRef]
40. Wu, F.; Chen, Y.; Chen, X.; Fan, W.; Liu, Y. An adaptive dual prediction scheme based on edge intelligence. IEEE Internet Things J.
2020, 7, 9481–9493. [CrossRef]
41. Shankar, T.; Padhy, S.; Ch, S.M.; Ravella, H.; Varun, M.; Kumar, N. Development of 6G web by Multilayer Perceptron in C-RAN
for VANETs. In Proceedings of the 2022 IEEE Global Conference on Computing, Power and Communication Technologies
(GlobConPT), New Delhi, India, 23–25 September 2022; pp. 1–6.
Sensors 2023, 23, 5817 29 of 29
42. Shankar, T. Hybrid Energy Efficient Secured Attribute based ZRP Aiding Authentic Data Transmission. J. Sci. Ind. Res. 2022,
81, 69–75.
43. Basith, K.A.; Shankar, T. Hybrid state analysis with improved firefly optimized linear congestion models of WSNs for DDOS &
CRA attacks. PeerJ Comput. Sci. 2022, 8, e845.
44. Ercan, S.; Ayaida, M.; Messai, N. How mobile RSUs can enhance communications in VANETs? In Proceedings of the 2018 6th
International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakesh, Morocco, 16–19 October
2018; pp. 1–5.
45. Bitaghsir, S.A.; Kashipazha, S.; Dadlani, A.; Khonsari, A. Social-aware Mobile Road Side Unit for Content Distribution in
Vehicular Social Networks. In Proceedings of the 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona,
Spain, 29 June–3 July 2019; pp. 1–6.
46. Rashid, S.; Ayub, Q.; Abdullah, A.H. Reactive Weight Based Buffer Management Policy for DTN Routing Protocols. Wirel. Pers.
Commun. 2015, 80, 993–1010. [CrossRef]
47. Krajzewicz, D. Traffic simulation with SUMO–simulation of urban mobility. In Fundamentals of Traffic Simulation; Springer:
Berlin/Heidelberg, Germany, 2010; pp. 269 –293. [CrossRef]
48. Haklay, M.; Weber, P. Openstreetmap: User-generated street maps. IEEE Pervasive Comput. 2008, 7, 12–18. [CrossRef]
49. Riley, G.F.; Henderson, T.R. The ns-3 Network Simulator. Modeling and Tools for Network Simulation. 2010. pp. 15–34. Available
online: https://www.nsnam.org (accessed on 29 May 2023).
50. Hota, L.; Nayak, B.; Kumar, A.; Sahoo, B.; Ali, G.G.M.N. A Performance Analysis of VANETs Propagation Models and Routing
Protocols. Sustainability 2022, 14, 1379. [CrossRef]
51. Siraj, M.; Kanrar, S. Performance of Modeling wireless networks in realistic environment. arXiv 2012, arXiv:1201.0842.
52. Van Eenennaam, E. A Survey of Propagation Models used in Vehicular Ad hoc Network (Vanet) Research. Available online:
https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=997d3f1fc33b89964cb0ea837490ecd3977b39c3 (accessed on
29 May 2023).
53. Hu, M.; Chen, H.; Hu, J.; Yan, H.; Yu, P. Maximum Lifetime Optimized Collaboration of Data and Energy Routing in VANET.
In Proceedings of the 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS), Jishou, China, 14–15
September 2019; pp. 290–294. [CrossRef]
54. Bondok, A.H.; Lee, W.; Kim, T. Efficient Scheduling for VANET Considering Renewable Energy. In Proceedings of the 2020 22nd
International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Republic of Korea, 19–22 February
2020; pp. 217–221.
55. Tripp-Barba, C.; Zaldívar-Colado, A.; Urquiza-Aguiar, L.; Aguilar-Calderón, J.A. Survey on routing protocols for vehicular ad hoc
networks based on multimetrics. Electronics 2019, 8, 1177. [CrossRef]
56. Abdeen, M.A.; Beg, A.; Mostafa, S.M.; AbdulGhaffar, A.; Sheltami, T.R.; Yasar, A. Performance Evaluation of VANET Routing
Protocols in Madinah City. Electronics 2022, 11, 777. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.