A Short Overview of 6G V2X Communication Standards (2311.16810v1)
Abstract: We are on the verge of a new age of linked autonomous cars with unheard-of user experiences, dramatically improved air quality and road safety, extremely varied transportation settings, and a plethora of cutting-edge apps. A substantially improved Vehicle-to-Everything (V2X) communication network that can simultaneously support massive hyper-fast, ultra-reliable, and low-latency information exchange is necessary to achieve this ambitious goal. These needs of the upcoming V2X are expected to be satisfied by the Sixth Generation (6G) communication system. In this article, we start by introducing the history of V2X communications by giving details on the current, developing, and future developments. We compare the applications of communication technologies such as Wi-Fi, LTE, 5G, and 6G. we focus on the new technologies for 6G V2X which are brain-vehicle interface, blocked-based V2X, and Machine Learning (ML). To achieve this, we provide a summary of the most recent ML developments in 6G vehicle networks. we discuss the security challenges of 6G V2X. We address the strengths, open challenges, development, and improving areas of further study in this field.
- G. Naik, B. Choudhury, and J.-M. Park, “Ieee 802.11 bd & 5g nr v2x: Evolution of radio access technologies for v2x communications,” IEEE access, vol. 7, pp. 70 169–70 184, 2019.
- M. Noor-A-Rahim, Z. Liu, H. Lee, M. O. Khyam, J. He, D. Pesch, K. Moessner, W. Saad, and H. V. Poor, “6g for vehicle-to-everything (v2x) communications: Enabling technologies, challenges, and opportunities,” Proceedings of the IEEE, 2022.
- S. Chen, J. Hu, Y. Shi, Y. Peng, J. Fang, R. Zhao, and L. Zhao, “Vehicle-to-everything (v2x) services supported by lte-based systems and 5g,” IEEE Communications Standards Magazine, vol. 1, no. 2, pp. 70–76, 2017.
- M. H. C. Garcia, A. Molina-Galan, M. Boban, J. Gozalvez, B. Coll-Perales, T. Şahin, and A. Kousaridas, “A tutorial on 5g nr v2x communications,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1972–2026, 2021.
- X. Lin, J. G. Andrews, A. Ghosh, and R. Ratasuk, “An overview of 3gpp device-to-device proximity services,” IEEE Communications Magazine, vol. 52, no. 4, pp. 40–48, 2014.
- H. Bagheri, M. Noor-A-Rahim, Z. Liu, H. Lee, D. Pesch, K. Moessner, and P. Xiao, “5g nr-v2x: Toward connected and cooperative autonomous driving,” IEEE Communications Standards Magazine, vol. 5, no. 1, pp. 48–54, 2021.
- T.-K. Le, U. Salim, and F. Kaltenberger, “An overview of physical layer design for ultra-reliable low-latency communications in 3gpp releases 15, 16, and 17,” IEEE access, vol. 9, pp. 433–444, 2020.
- E. Baena, S. Fortes, and R. Barco, “Kqi performance evaluation of 3gpp lbt priorities for indoor unlicensed coexistence scenarios,” Electronics, vol. 9, no. 10, p. 1701, 2020.
- X. Lin, “An overview of 5g advanced evolution in 3gpp release 18,” arXiv preprint arXiv:2201.01358, 2022.
- T. Bey and G. Tewolde, “Evaluation of dsrc and lte for v2x,” in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2019, pp. 1032–1035.
- A. Filippi, K. Moerman, V. Martinez, A. Turley, O. Haran, and R. Toledano, “Ieee802. 11p ahead of lte-v2v for safety applications,” Autotalks NXP, vol. 1, pp. 1–19, 2017.
- J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong, and J. C. Zhang, “What will 5g be?” IEEE Journal on selected areas in communications, vol. 32, no. 6, pp. 1065–1082, 2014.
- M. Mizmizi, M. Brambilla, D. Tagliaferri, C. Mazzucco, M. Debbah, T. Mach, R. Simeone, S. Mandelli, V. Frascolla, R. Lombardi et al., “6g v2x technologies and orchestrated sensing for autonomous driving,” arXiv preprint arXiv:2106.16146, 2021.
- V. Sharma, I. You, and N. Guizani, “Security of 5g-v2x: Technologies, standardization, and research directions,” IEEE Network, vol. 34, no. 5, pp. 306–314, 2020.
- Z. MacHardy, A. Khan, K. Obana, and S. Iwashina, “V2x access technologies: Regulation, research, and remaining challenges,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 1858–1877, 2018.
- J. Grover, N. K. Prajapati, V. Laxmi, and M. S. Gaur, “Machine learning approach for multiple misbehavior detection in vanet,” in Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1. Springer, 2011, pp. 644–653.
- M. Scalabrin, M. Gadaleta, R. Bonetto, and M. Rossi, “A bayesian forecasting and anomaly detection framework for vehicular monitoring networks,” in 2017 IEEE 27th International Workshop on Machine Learning for Signal Processing (MLSP). IEEE, 2017, pp. 1–6.
- L. A. Maglaras, “A novel distributed intrusion detection system for vehicular ad hoc networks,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 4, pp. 101–106, 2015.
- K. Sequeira and M. Zaki, “Admit: anomaly-based data mining for intrusions,” in Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, 2002, pp. 386–395.
- F. Tang, Y. Kawamoto, N. Kato, and J. Liu, “Future intelligent and secure vehicular network toward 6g: Machine-learning approaches,” Proceedings of the IEEE, vol. 108, no. 2, pp. 292–307, 2019.
- H. Al-Khateeb, G. Epiphaniou, A. Reviczky, P. Karadimas, and H. Heidari, “Proactive threat detection for connected cars using recursive bayesian estimation,” IEEE Sensors Journal, vol. 18, no. 12, pp. 4822–4831, 2017.
- B. M. ElHalawany, A. A. A. El-Banna, and K. Wu, “Physical-layer security and privacy for vehicle-to-everything,” IEEE Communications Magazine, vol. 57, no. 10, pp. 84–90, 2019.
- Y. Liu, H.-H. Chen, and L. Wang, “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 347–376, 2016.
- H. M. Furqan, M. S. J. Solaija, J. M. Hamamreh, and H. Arslan, “Intelligent physical layer security approach for v2x communication,” arXiv preprint arXiv:1905.05075, 2019.
- A. Ferdowsi, S. Ali, W. Saad, and N. B. Mandayam, “Cyber-physical security and safety of autonomous connected vehicles: Optimal control meets multi-armed bandit learning,” IEEE Transactions on Communications, vol. 67, no. 10, pp. 7228–7244, 2019.
- M. Ylianttila, R. Kantola, A. Gurtov, L. Mucchi, I. Oppermann, Z. Yan, T. H. Nguyen, F. Liu, T. Hewa, M. Liyanage et al., “6g white paper: Research challenges for trust, security and privacy,” arXiv preprint arXiv:2004.11665, 2020.
- J. Park, S. Samarakoon, M. Bennis, and M. Debbah, “Wireless network intelligence at the edge,” Proceedings of the IEEE, vol. 107, no. 11, pp. 2204–2239, 2019.
- M. Chen, Z. Yang, W. Saad, C. Yin, H. V. Poor, and S. Cui, “A joint learning and communications framework for federated learning over wireless networks,” IEEE Transactions on Wireless Communications, vol. 20, no. 1, pp. 269–283, 2020.
- Q. Yang, Y. Liu, T. Chen, and Y. Tong, “Federated machine learning: Concept and applications,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 10, no. 2, pp. 1–19, 2019.
- S. Niknam, H. S. Dhillon, and J. H. Reed, “Federated learning for wireless communications: Motivation, opportunities, and challenges,” IEEE Communications Magazine, vol. 58, no. 6, pp. 46–51, 2020.