Nature-Inspired Algorithms in Internet of Vehicles: A Survey and Analysis

被引:0
作者
Alshammari, Thamer [1 ]
Mahgoub, Imad [1 ]
机构
[1] Florida Atlantic Univ, Dept Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
关键词
Clustering; genetic algorithms (GAs); Internet of vehicles (IoV); nature-inspired algorithms (NIAs); routing; security; OPTIMIZATION ALGORITHM; GENETIC ALGORITHM; ROUTING PROTOCOL; CHALLENGES; THINGS; ACO;
D O I
10.1109/JIOT.2025.3528872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As vehicles are becoming increasingly smart and connected to the Internet of Things (IoT), vehicular networks are evolving into the Internet of Vehicles (IoV). IoV technology has a great potential to support intelligent and large-scale safety and nonsafety applications. However, its dynamic nature poses great challenges for efficient routing and network security. To address these challenges, nature-inspired algorithms (NIAs), which mimic strategies from nature, have been employed with notable success across various domains. In this article, we expand on previous categorization of the application domains of NIAs in IoV by introducing clustering as an important domain alongside routing and security domains. We develop an exhaustive taxonomy of NIAs based on their search mechanisms. We then survey, analyze, and classify representative NIAs in IoV within the taxonomy and highlight important areas where NIAs could potentially improve IoV environment. A mapping between swarm intelligence (SI) algorithms and IoV application domains based on common characteristics of SI algorithms has been established to facilitate the selection of suitable algorithms for specific application domains. To enhance the practicality of NIAs models, we identify key performance metrics that are essential to evaluate models fitness in real-world scenarios. Future research can utilize the results of this study to develop NIAs that are suited for specific real-life applications in IoV.
引用
收藏
页码:6347 / 6370
页数:24
相关论文
共 127 条
[1]   Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO) [J].
Aadil, Farhan ;
Ahsan, Waleed ;
Rehman, Zahoor Ur ;
Shah, Peer Azmat ;
Rho, Seungmin ;
Mehmood, Irfan .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (09) :4542-4567
[2]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[3]   Interworking of DSRC and Cellular Network Technologies for V2X Communications: A Survey [J].
Abboud, Khadige ;
Omar, Hassan Aboubakr ;
Zhuang, Weihua .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (12) :9457-9470
[4]   Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review [J].
Abdullahi, Mujaheed ;
Baashar, Yahia ;
Alhussian, Hitham ;
Alwadain, Ayed ;
Aziz, Norshakirah ;
Capretz, Luiz Fernando ;
Abdulkadir, Said Jadid .
ELECTRONICS, 2022, 11 (02)
[5]  
Abraham Ajith., 2008, Soft Comput. Knowl. Discov Data Min., P279, DOI [10.1007/978-0-387-69935-6_12, DOI 10.1007/978-0-387-69935-6_12]
[6]  
Adithyan T. Ajay, 2017, 2017 International Conference on Trends in Electronics and Informatics (ICEI). Proceedings, P1131, DOI 10.1109/ICOEI.2017.8300889
[7]  
Agarwal P., 2014, International Journal of Computer Applications, V100, P14, DOI [DOI 10.5120/17593-8331, 10.5120/17593-8331]
[8]   Spider Monkey Optimization: a survey [J].
Agrawal V. ;
Rastogi R. ;
Tiwari D.C. .
International Journal of System Assurance Engineering and Management, 2018, 9 (04) :929-941
[9]   Classification of Normal and Malicious Traffic Based on an Ensemble of Machine Learning for a Vehicle CAN-Network [J].
Alalwany, Easa ;
Mahgoub, Imad .
SENSORS, 2022, 22 (23)
[10]   A Novel Deception-Based Scheme to Secure the Location Information for IoBT Entities [J].
Alkanjr, Basmh ;
Mahgoub, Imad .
IEEE ACCESS, 2023, 11 :15540-15554