A method of chained recommendation for charging piles in internet of vehicles

With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing increasing demand and more severe challenges. With the ubiquity of Internet of vehicles (IoVs), inter-vehicle communication can share information about the charging experience and traffic condition to help achieving better charging recommendation and higher energy efficiency. The recommendation of charging piles is of great value. However, the existing methods related to such recommendation consider inadequate reference factors and most of them are generalized for all users, rather than personalized for specific populations. In this paper, we propose a recommendation method based on dynamic charging area mechanism, which recommends the appropriate initial charging area according to the user's warning level, and dynamically changes the charging area according to the real-time state of EVs and charging piles. The recommendation method based on a classification chain provides more personalized services for users according to different charging needs and improves the utilization ratio of charging piles. This satisfies users' multilevel charging demands and realizes a more effective charging planning, which is beneficial to overall balance. The chained recommendation method mainly consists of three modules: intention detection, warning levels classification, and chained recommendation. The dynamic charging area mechanism reduces the occurrence of recommendation conflict and provides more personalized service for users according to different charging needs. Simulations and computations validate the correctness and effectiveness of the proposed method.

[1]  Lai Tu,et al.  Understanding operational and charging patterns of Electric Vehicle taxis using GPS records , 2014, 17th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[2]  Tianle Zhang,et al.  Realistic Traffic Data Based Mobility Modeling and Simulation of Smart EV , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[3]  Xianfu Chen,et al.  Age of Information Aware Radio Resource Management in Vehicular Networks: A Proactive Deep Reinforcement Learning Perspective , 2019, IEEE Transactions on Wireless Communications.

[4]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[5]  Mohsen Guizani,et al.  Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles , 2019, IEEE Internet of Things Journal.

[6]  Mohsen Guizani,et al.  A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[7]  Feng Jiang,et al.  A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices , 2018, Wirel. Commun. Mob. Comput..

[8]  Liang Xiao,et al.  Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.

[9]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[10]  Yusheng Ji,et al.  AVE: Autonomous Vehicular Edge Computing Framework with ACO-Based Scheduling , 2017, IEEE Transactions on Vehicular Technology.

[11]  Mohsen Guizani,et al.  Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[12]  Shen Su,et al.  Automatically Traceback RDP-Based Targeted Ransomware Attacks , 2018, Wirel. Commun. Mob. Comput..

[13]  Ming Zhu,et al.  The charging-scheduling problem for electric vehicle networks , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[14]  Camino R. Vela,et al.  Electric Vehicle Charging Scheduling by an Enhanced Artificial Bee Colony Algorithm , 2018, Energies.

[15]  Yan Jia,et al.  Bidirectional self-adaptive resampling in internet of things big data learning , 2018, Multimedia Tools and Applications.

[16]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[17]  Xiaojiang Du,et al.  Achieving big data privacy via hybrid cloud , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[18]  Mohan Li,et al.  Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.

[19]  Binxing Fang,et al.  A Survey on Access Control in the Age of Internet of Things , 2020, IEEE Internet of Things Journal.

[20]  C. Rehtanz,et al.  Large-Scale Modeling of Grid-Connected Electric Vehicles , 2013, IEEE Transactions on Power Delivery.

[21]  Tat-Seng Chua,et al.  Neural Collaborative Filtering , 2017, WWW.

[22]  Yu Jiang,et al.  Time series behavior modeling with digital twin for Internet of Vehicles , 2019, EURASIP J. Wirel. Commun. Netw..

[23]  Shen Su,et al.  A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection , 2019, Applied Sciences.

[24]  Mohsen Guizani,et al.  A data-driven method for future Internet route decision modeling , 2019, Future Gener. Comput. Syst..

[25]  Shen Su,et al.  Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.

[26]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[27]  Jinqiao Shi,et al.  Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services , 2019, IEEE Internet of Things Journal.

[28]  Hua Qin,et al.  Charging scheduling with minimal waiting in a network of electric vehicles and charging stations , 2011, VANET '11.

[29]  Mohsen Guizani,et al.  Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks , 2018, IEEE Journal on Selected Areas in Communications.

[30]  Xiaojiang Du,et al.  A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.

[31]  Xiaojiang Du,et al.  Implementation and performance analysis of SNMP on a TLS/TCP base , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).

[32]  Yusheng Ji,et al.  Mobile Edge Computing for the Internet of Vehicles: Offloading Framework and Job Scheduling , 2019, IEEE Vehicular Technology Magazine.

[33]  Mohsen Guizani,et al.  Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory , 2019, IEEE Transactions on Vehicular Technology.

[34]  Dongwen Zhang,et al.  Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City , 2020, IEEE Transactions on Industrial Informatics.

[35]  Lai Tu,et al.  Real-Time Charging Station Recommendation System for Electric-Vehicle Taxis , 2016, IEEE Transactions on Intelligent Transportation Systems.

[36]  P. Castoldi,et al.  Designing and Evaluating Activity-Based Electric Vehicle Charging in Urban Areas , 2013, 2013 IEEE International Electric Vehicle Conference (IEVC).

[37]  Joseph Ying Jun Chow,et al.  Stochastic Dynamic Itinerary Interception Refueling Location Problem with Queue Delay for Electric Taxi Charging Stations , 2014 .

[38]  Xiaojiang Du,et al.  Self-healing sensor networks with distributed decision making , 2007, Int. J. Sens. Networks.

[39]  Matthew J. Rutherford,et al.  The impact of Electric Vehicle battery charging on distribution transformers , 2011, 2011 Twenty-Sixth Annual IEEE Applied Power Electronics Conference and Exposition (APEC).

[40]  Yusheng Ji,et al.  Spatial Intelligence toward Trustworthy Vehicular IoT , 2018, IEEE Communications Magazine.

[41]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[42]  Shen Su,et al.  Block-DEF: A secure digital evidence framework using blockchain , 2019, Inf. Sci..

[43]  Christian Rehtanz,et al.  Testing environment for Vehicle to Grid (V2G) applications for investigating a voltage stability support method , 2014, 2014 IEEE Transportation Electrification Conference and Expo (ITEC).