Skip to main content
Erschienen in: Wireless Networks 1/2023

06.09.2022 | Original Paper

Highly efficient approach for discordant BSMs detection in connected vehicles environment

verfasst von: Djamila Zamouche, Sofiane Aissani, Mawloud Omar, Mohamed Mohammedi

Erschienen in: Wireless Networks | Ausgabe 1/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Connected Vehicles (CVs) are the key enabling technology for Intelligent Transportation Systems (ITSs) that offer great opportunities for improving traffic safety and efficiency. They provide several innovative safety-related applications such as traffic management and monitoring, which involve the transmission of messages from all vehicles on the road. Basic Safety Messages (BSMs) constitute an essential type of control message. However, several critical issues affect the BSM messages’ reliability. In this paper, a model-based approach for detecting discordant BSMs is proposed, which allows to avoid the vehicle disturbance. This approach consists of detecting incoherence in communication metric values, where the detection is formulated as an anomaly detection problem that is solved using the Gaussian distribution. The detection process allows the vehicles to cross their prediction to achieve more precision in deciding whether to accept or reject a message from a vehicle. The efficiency of our model for detecting an anomaly has been evaluated through simulations using our generated dataset. The obtained results indicate that the proposed model provides high performance in terms of detection rate. Moreover, we evaluate and validate the proposed approach through formal evaluation, where it demonstrates promising performances, as compare it with a concurrent approach through simulations considering important metrics.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Giliberto, M., Arena, F., & Pau, G. (2019). A fuzzy-based solution for optimized management of energy consumption in e-bikes. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 10(3), 45–64. Giliberto, M., Arena, F., & Pau, G. (2019). A fuzzy-based solution for optimized management of energy consumption in e-bikes. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 10(3), 45–64.
2.
Zurück zum Zitat Kang, J., Kim, J., & Sohn, M. M. (2019). Supervised learning-based lifetime extension of wireless sensor network nodes. Journal of Internet Services and Information Security, 9(4), 59–67. Kang, J., Kim, J., & Sohn, M. M. (2019). Supervised learning-based lifetime extension of wireless sensor network nodes. Journal of Internet Services and Information Security, 9(4), 59–67.
3.
Zurück zum Zitat Shih, C. S., Chou, J. J., & Lin, K. J. (2018). WuKong: Secure run-time environment and data-driven IoT applications for Smart Cities and Smart Buildings. Journal of Internet Services and Information Security, 8(2), 1–17. Shih, C. S., Chou, J. J., & Lin, K. J. (2018). WuKong: Secure run-time environment and data-driven IoT applications for Smart Cities and Smart Buildings. Journal of Internet Services and Information Security, 8(2), 1–17.
4.
Zurück zum Zitat Rahman, M. S., Basu, A., Nakamura, T., Takasaki, H., & Kiyomoto, S. (2018). PPM: Privacy policy manager for home energy management system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(2), 42–56. Rahman, M. S., Basu, A., Nakamura, T., Takasaki, H., & Kiyomoto, S. (2018). PPM: Privacy policy manager for home energy management system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(2), 42–56.
5.
Zurück zum Zitat Trubia, S., Severino, A., Curto, S., Arena, F., & Pau, G. (2020). On BRT spread around the world: Analysis of some particular cities. Infrastructures, 5(10), 88.CrossRef Trubia, S., Severino, A., Curto, S., Arena, F., & Pau, G. (2020). On BRT spread around the world: Analysis of some particular cities. Infrastructures, 5(10), 88.CrossRef
6.
Zurück zum Zitat NHTSA, "Cybersecurity best practices for modern vehicles, " National Highway Traffic Safety Administration, USDOT, Technical Report Report No. DOT HS 812 333, 2016. NHTSA, "Cybersecurity best practices for modern vehicles, " National Highway Traffic Safety Administration, USDOT, Technical Report Report No. DOT HS 812 333, 2016.
7.
Zurück zum Zitat Rajkumar, M. N., Nithya, M., & Krithika, M. (2016). Security requirements and mechanisms in vehicular ad-hoc networks (VANET). World Scientific News, 41, 214. Rajkumar, M. N., Nithya, M., & Krithika, M. (2016). Security requirements and mechanisms in vehicular ad-hoc networks (VANET). World Scientific News, 41, 214.
8.
Zurück zum Zitat Najafzadeh, S., Ithnin, N., Abd, R. S., & Karimi, R. (2014). Bsm:Broadcasting of safety messages in vehicular ad hoc networks. Arabian Journal for Science and Engineering, 39(2), 777–782.CrossRef Najafzadeh, S., Ithnin, N., Abd, R. S., & Karimi, R. (2014). Bsm:Broadcasting of safety messages in vehicular ad hoc networks. Arabian Journal for Science and Engineering, 39(2), 777–782.CrossRef
9.
Zurück zum Zitat Kenney, J. B. (2011). Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7), 1162–1182.CrossRef Kenney, J. B. (2011). Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7), 1162–1182.CrossRef
10.
Zurück zum Zitat Jafarzadeh, H., Fleming, C. (2021). Gaussian process-based model predictive controller for connected vehicles with uncertain wireless channel. arXiv preprint arXiv:2106.12366. Jafarzadeh, H., Fleming, C. (2021). Gaussian process-based model predictive controller for connected vehicles with uncertain wireless channel. arXiv preprint arXiv:​2106.​12366.
11.
Zurück zum Zitat Zaidi, K., Milojevic, M. B., Rakocevic, V., Nallanathan, A., & Rajarajan, M. (2015). Hostbased intrusion detection for VANETs: A statistical approach to rogue node detection. IEEE transactions on vehicular technology, 65(8), 6703–6714.CrossRef Zaidi, K., Milojevic, M. B., Rakocevic, V., Nallanathan, A., & Rajarajan, M. (2015). Hostbased intrusion detection for VANETs: A statistical approach to rogue node detection. IEEE transactions on vehicular technology, 65(8), 6703–6714.CrossRef
12.
Zurück zum Zitat Li, Q., Malip, A., Martin, K. M., Ng, S. L., & Zhang, J. (2012). A reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology, 61(9), 4095–4108.CrossRef Li, Q., Malip, A., Martin, K. M., Ng, S. L., & Zhang, J. (2012). A reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology, 61(9), 4095–4108.CrossRef
13.
Zurück zum Zitat So S., Petit J., Starobinski, D. (2019) Physical layer plausibility checks for misbehavior detection in V2X networks. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 84–93. So S., Petit J., Starobinski, D. (2019) Physical layer plausibility checks for misbehavior detection in V2X networks. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 84–93.
14.
Zurück zum Zitat Eziama, E., Awin, F., Ahmed, S., Santos-Jaimes, L. M., Pelumi, A., & Corral-DeWitt, D. (2020). Detection and identification of malicious cyber-attacks in connected and automated vehicles’ real-time sensors. Applied Sciences, 10(21), 7833.CrossRef Eziama, E., Awin, F., Ahmed, S., Santos-Jaimes, L. M., Pelumi, A., & Corral-DeWitt, D. (2020). Detection and identification of malicious cyber-attacks in connected and automated vehicles’ real-time sensors. Applied Sciences, 10(21), 7833.CrossRef
15.
Zurück zum Zitat Liu, J., Yang, W., Zhang, J., & Yang, C. (2020). Detecting false messages in vehicular ad hoc networks based on a traffic flow model. International Journal of Distributed Sensor Networks, 16(2), 1–12.CrossRef Liu, J., Yang, W., Zhang, J., & Yang, C. (2020). Detecting false messages in vehicular ad hoc networks based on a traffic flow model. International Journal of Distributed Sensor Networks, 16(2), 1–12.CrossRef
16.
Zurück zum Zitat Ferng, H. W., Chen, J. Y., Lotfolahi, M., Tseng, Y. T., & Zhang, S. Y. (2019). Messages classification and dynamic batch verification scheme for VANETs. IEEE Transactions on Mobile Computing, 20(3), 1156–1172.CrossRef Ferng, H. W., Chen, J. Y., Lotfolahi, M., Tseng, Y. T., & Zhang, S. Y. (2019). Messages classification and dynamic batch verification scheme for VANETs. IEEE Transactions on Mobile Computing, 20(3), 1156–1172.CrossRef
17.
Zurück zum Zitat Banani, S., Kittipiyakul, S., Thiemjarus, S., & Gordon, S. (2019). Safety message verification using history-based relative-time zone priority scheme. Journal of Computer Networks and Communications, 2019, 1–14.CrossRef Banani, S., Kittipiyakul, S., Thiemjarus, S., & Gordon, S. (2019). Safety message verification using history-based relative-time zone priority scheme. Journal of Computer Networks and Communications, 2019, 1–14.CrossRef
18.
Zurück zum Zitat Banani, S., Gordon, S., Thiemjarus, S., & Kittipiyakul, S. (2018). Verifying safety messages using relative-time and zone priority in vehicular ad hoc networks. Sensors, 18(4), 1195.CrossRef Banani, S., Gordon, S., Thiemjarus, S., & Kittipiyakul, S. (2018). Verifying safety messages using relative-time and zone priority in vehicular ad hoc networks. Sensors, 18(4), 1195.CrossRef
19.
Zurück zum Zitat Banani S., Gordon S. (2014) Selecting basic safety messages to verify in VANETs using zone priority. In: Proceedings of the 20th Asia-Pacific Conference on Communication (APCC2014), pp. 423–28. Banani S., Gordon S. (2014) Selecting basic safety messages to verify in VANETs using zone priority. In: Proceedings of the 20th Asia-Pacific Conference on Communication (APCC2014), pp. 423–28.
20.
Zurück zum Zitat Jha S., Yavvari C., Wijesekera, D. (2018). Pseudonym certificate validationsunder heavy vehicular traffic loads. In Proceedings of the 2018 IEEE Vehicular Networking Conference (VNC), pp. 1–7. Jha S., Yavvari C., Wijesekera, D. (2018). Pseudonym certificate validationsunder heavy vehicular traffic loads. In Proceedings of the 2018 IEEE Vehicular Networking Conference (VNC), pp. 1–7.
21.
Zurück zum Zitat Chen C., Lee S. W., Watson T., Maple C., Lu Y. (2017) Caesar: A criticality-aware ecdsa signature verification scheme with markov model. In Proceedings of the 2017 IEEE Vehicular Networking Conference, pp. 151-–154. Chen C., Lee S. W., Watson T., Maple C., Lu Y. (2017) Caesar: A criticality-aware ecdsa signature verification scheme with markov model. In Proceedings of the 2017 IEEE Vehicular Networking Conference, pp. 151-–154.
22.
Zurück zum Zitat Hamida, E. B., Javed, M. A., & Znaidi, W. (2017). Adaptive security provisioning for vehicular safety applications. International Journal of Space-Based and Situated Computing, 7(1), 16–31.CrossRef Hamida, E. B., Javed, M. A., & Znaidi, W. (2017). Adaptive security provisioning for vehicular safety applications. International Journal of Space-Based and Situated Computing, 7(1), 16–31.CrossRef
23.
Zurück zum Zitat Ayoob A., Khalil G., Yingzhuang L., Chowdhury M., Al, T. (2020) Efficiency broadcast base safety message bsm through vanet based on transmit packet coding (tpc). In: Proceedings of the 2nd Global Conference on Life Sciences and Technologies (LifeTech), pp. 383–387. Ayoob A., Khalil G., Yingzhuang L., Chowdhury M., Al, T. (2020) Efficiency broadcast base safety message bsm through vanet based on transmit packet coding (tpc). In: Proceedings of the 2nd Global Conference on Life Sciences and Technologies (LifeTech), pp. 383–387.
24.
Zurück zum Zitat Gao Y., Chong P.H.J., Guan Y.L. (2017) Bsm dissemination with network coded relaying in VANETs at nlos intersections. In: Proceedings of the International Conference on Communications (ICC), pp. 1–6. Gao Y., Chong P.H.J., Guan Y.L. (2017) Bsm dissemination with network coded relaying in VANETs at nlos intersections. In: Proceedings of the International Conference on Communications (ICC), pp. 1–6.
25.
Zurück zum Zitat Zhang M., Chong P.H.J., Seet B.C., Rehman S.U., Kumar A. (2017) Integrating pnc and rlnc for bsm dissemination in VANETs. In: Proceedings of the 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–5. Zhang M., Chong P.H.J., Seet B.C., Rehman S.U., Kumar A. (2017) Integrating pnc and rlnc for bsm dissemination in VANETs. In: Proceedings of the 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–5.
26.
Zurück zum Zitat Saxena S., Isukapati I.K. (2019) Simulated basic safety message: Concept application. In: 2019 IEEE Intelligent Vehicles Symposium (IV), pp. 2450–2456. Saxena S., Isukapati I.K. (2019) Simulated basic safety message: Concept application. In: 2019 IEEE Intelligent Vehicles Symposium (IV), pp. 2450–2456.
27.
Zurück zum Zitat Yanbin, W., Zhuofei, W., Jing, Z., Zhijuan, L., & Xiaomin, M. (2020). (2020) Analysis and adaptive optimization of vehicular safety message communications at intersections. Ad Hoc Networks, 107, 102241.CrossRef Yanbin, W., Zhuofei, W., Jing, Z., Zhijuan, L., & Xiaomin, M. (2020). (2020) Analysis and adaptive optimization of vehicular safety message communications at intersections. Ad Hoc Networks, 107, 102241.CrossRef
28.
Zurück zum Zitat Benaissa K., Mellouk A., Bitam S. (2017) Efficient messages broadcasting within vehicular safety applications. In: Proceedings of the 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–5. IEEE, 2017.bibliography. Benaissa K., Mellouk A., Bitam S. (2017) Efficient messages broadcasting within vehicular safety applications. In: Proceedings of the 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–5. IEEE, 2017.bibliography.
30.
Zurück zum Zitat Abbasi H.I., Voicu R.C., Copeland J.A., Chang Y. (2017) Cooperative bsm architecture to improve transportation safety in vanets. In: Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.1016–1022. Abbasi H.I., Voicu R.C., Copeland J.A., Chang Y. (2017) Cooperative bsm architecture to improve transportation safety in vanets. In: Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.1016–1022.
31.
Zurück zum Zitat Yu, K., Peng, L., Ding, X., Zhang, F., & Chen, M. (2019). (2019) Prediction of instantaneous driving safety in emergency scenarios based on connected vehicle basic safety messages. Journal of Intelligent and Connected Vehicles, 2(2), 78–90.CrossRef Yu, K., Peng, L., Ding, X., Zhang, F., & Chen, M. (2019). (2019) Prediction of instantaneous driving safety in emergency scenarios based on connected vehicle basic safety messages. Journal of Intelligent and Connected Vehicles, 2(2), 78–90.CrossRef
32.
Zurück zum Zitat Kamrani, M., Arvin, R., & KhattakA, J. (2018). Extracting useful information from basic safety message data: An empirical study of driving volatility measures and crash frequency at intersections. Transportation research record, 2672(38), 290–301.CrossRef Kamrani, M., Arvin, R., & KhattakA, J. (2018). Extracting useful information from basic safety message data: An empirical study of driving volatility measures and crash frequency at intersections. Transportation research record, 2672(38), 290–301.CrossRef
33.
Zurück zum Zitat Emara K., Woerndl W., Schlichter J. (2013) Vehicle tracking using vehicular network beacons. In: Proceedings of the 13th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6. Emara K., Woerndl W., Schlichter J. (2013) Vehicle tracking using vehicular network beacons. In: Proceedings of the 13th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6.
34.
Zurück zum Zitat Hosseini, M. K., Talebpour, A., & Shakkottai, S. (2019). Privacy risk of connected vehicles in relation to vehicle tracking when transmitting basic safety message type 1 data. Transportation research record, 2673(12), 636–643.CrossRef Hosseini, M. K., Talebpour, A., & Shakkottai, S. (2019). Privacy risk of connected vehicles in relation to vehicle tracking when transmitting basic safety message type 1 data. Transportation research record, 2673(12), 636–643.CrossRef
35.
Zurück zum Zitat Miao, Z., Head, K. L., & Beak, B. (2018). Vehicle reidentification in a connected vehicle environment using machine learning algorithms. Transportation Research Record, 2672(45), 160–172.CrossRef Miao, Z., Head, K. L., & Beak, B. (2018). Vehicle reidentification in a connected vehicle environment using machine learning algorithms. Transportation Research Record, 2672(45), 160–172.CrossRef
36.
Zurück zum Zitat Vaas C., Roeschlin M., Papadimitratos P., Martinovic I. (2018) Poster: Tracking vehicles through encrypted mix-zones using physical layer properties. In 2018 IEEE Vehicular Networking Conference (VNC), pp. 1–2. Vaas C., Roeschlin M., Papadimitratos P., Martinovic I. (2018) Poster: Tracking vehicles through encrypted mix-zones using physical layer properties. In 2018 IEEE Vehicular Networking Conference (VNC), pp. 1–2.
37.
Zurück zum Zitat Wiedersheim B., Ma Z., Kargl F., Papadimitratos P. (2010) Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In Proceedings of the 7th International conference on wireless on-demand network systems and services (WONS), pp. 176–183. Wiedersheim B., Ma Z., Kargl F., Papadimitratos P. (2010) Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In Proceedings of the 7th International conference on wireless on-demand network systems and services (WONS), pp. 176–183.
38.
Zurück zum Zitat Robinson C.L., Caminiti L., Caveney D., Laberteaux K. (2006) Efficient coordination and transmission of data for cooperative vehicular safety applications. In: Proceedings of the 3rd international workshop, pp. 10–19. Robinson C.L., Caminiti L., Caveney D., Laberteaux K. (2006) Efficient coordination and transmission of data for cooperative vehicular safety applications. In: Proceedings of the 3rd international workshop, pp. 10–19.
39.
Zurück zum Zitat Gao, K., Han, F., Dong, P., Xiong, N., & Du, R. (2019). Connected vehicle as a mobile sensor for real time queue length at signalized intersections. Sensors, 19(9), 1–22.CrossRef Gao, K., Han, F., Dong, P., Xiong, N., & Du, R. (2019). Connected vehicle as a mobile sensor for real time queue length at signalized intersections. Sensors, 19(9), 1–22.CrossRef
40.
Zurück zum Zitat Li, D., Zhao, Y., Ranjitkar, P., Zhao, H., & Bai, Q. (2018). Hybrid approach for variable speed limit implementation and application to mixed traffic conditions with connected autonomous vehicles. IET Intelligent Transport Systems, 12(5), 327–334.CrossRef Li, D., Zhao, Y., Ranjitkar, P., Zhao, H., & Bai, Q. (2018). Hybrid approach for variable speed limit implementation and application to mixed traffic conditions with connected autonomous vehicles. IET Intelligent Transport Systems, 12(5), 327–334.CrossRef
41.
Zurück zum Zitat Uzcátegui, R. A., Sucre, A. J. D., & Acosta-Marum, G. (2009). WAVE: A tutorial. IEEE Communications magazine, 47(5), 126–133.CrossRef Uzcátegui, R. A., Sucre, A. J. D., & Acosta-Marum, G. (2009). WAVE: A tutorial. IEEE Communications magazine, 47(5), 126–133.CrossRef
43.
Zurück zum Zitat Ingibergsson, J. T. M., Kraft, D., & Schultz, U. P. (2017). Declarative rule-based safety for robotic perception systems. Journal of Software Engineering for Robotics, 8(1), 17–31. Ingibergsson, J. T. M., Kraft, D., & Schultz, U. P. (2017). Declarative rule-based safety for robotic perception systems. Journal of Software Engineering for Robotics, 8(1), 17–31.
45.
Zurück zum Zitat Carneiro G. (2010) “Ns-3: Network simulator 3. In: UTM Lab Meeting April, 20:4–5. Carneiro G. (2010) “Ns-3: Network simulator 3. In: UTM Lab Meeting April, 20:4–5.
48.
Zurück zum Zitat Zamouche, D., Mohammedi, M., Aissani, S., & Omar, M. (2022). Ultra-safe and reliable enhanced train-centric communication-based train control system. Computing, 104(3), 533–552.CrossRef Zamouche, D., Mohammedi, M., Aissani, S., & Omar, M. (2022). Ultra-safe and reliable enhanced train-centric communication-based train control system. Computing, 104(3), 533–552.CrossRef
49.
Zurück zum Zitat Raya M., Hubaux J.P. (2005) The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks. Raya M., Hubaux J.P. (2005) The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks.
50.
Zurück zum Zitat Ma, X., Zhang, J., Yin, X., & Trivedi, K. S. (2011). Design and analysis of a robust broadcast scheme for VANET safety-related services. Vehicular Technology IEEE Transactions on Vehicular Technology, 61(1), 46–61.CrossRef Ma, X., Zhang, J., Yin, X., & Trivedi, K. S. (2011). Design and analysis of a robust broadcast scheme for VANET safety-related services. Vehicular Technology IEEE Transactions on Vehicular Technology, 61(1), 46–61.CrossRef
Metadaten
Titel
Highly efficient approach for discordant BSMs detection in connected vehicles environment
verfasst von
Djamila Zamouche
Sofiane Aissani
Mawloud Omar
Mohamed Mohammedi
Publikationsdatum
06.09.2022
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 1/2023
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-022-03104-8

Weitere Artikel der Ausgabe 1/2023

Wireless Networks 1/2023 Zur Ausgabe

Neuer Inhalt