Overtaking is a crucial maneuver in road transportation that requires a clear view of the road ahead.However,limited visibility of ahead vehicles can often make it challenging for drivers to assess the safety of overt...Overtaking is a crucial maneuver in road transportation that requires a clear view of the road ahead.However,limited visibility of ahead vehicles can often make it challenging for drivers to assess the safety of overtaking maneuvers,leading to accidents and fatalities.In this paper,we consider atrous convolution,a powerful tool for explicitly adjusting the field-of-view of a filter as well as controlling the resolution of feature responses generated by Deep Convolutional Neural Networks in the context of semantic image segmentation.This article explores the potential of seeing-through vehicles as a solution to enhance overtaking safety.See-through vehicles leverage advanced technologies such as cameras,sensors,and displays to provide drivers with a real-time view of the vehicle ahead,including the areas hidden from their direct line of sight.To address the problems of safe passing and occlusion by huge vehicles,we designed a see-through vehicle system in this study,we employed a windshield display in the back car together with cameras in both cars.The server within the back car was used to segment the car,and the segmented portion of the car displayed the video from the front car.Our see-through system improves the driver’s field of vision and helps him change lanes,cross a large car that is blocking their view,and safely overtake other vehicles.Our network was trained and tested on the Cityscape dataset using semantic segmentation.This transparent technique will instruct the driver on the concealed traffic situation that the front vehicle has obscured.For our findings,we have achieved 97.1% F1-score.The article also discusses the challenges and opportunities of implementing see-through vehicles in real-world scenarios,including technical,regulatory,and user acceptance factors.展开更多
在车载自组织网络(vehicular Ad hoc networks,VANETs)中,当节点缓存和消息副本数目被限制的情况下,如何合理地选择车载网络的路由节点是实现VANETs高效转发和投递的关键问题。为此提出了一种基于学习方法的决策树理论的多副本VANETs机...在车载自组织网络(vehicular Ad hoc networks,VANETs)中,当节点缓存和消息副本数目被限制的情况下,如何合理地选择车载网络的路由节点是实现VANETs高效转发和投递的关键问题。为此提出了一种基于学习方法的决策树理论的多副本VANETs机会路由协议(D-Tree)。D-Tree将VANETs中节点间的传输和连接因素看做多个属性的集合,并与决策树方法得到一个消息转发规则,同时结合多副本路由与机会路由的"存储─携带─转发"优势进行消息投递。真实数据集上的实验结果表明,在场景密集的情况下,D-Tree相比于Bubble和S&W路由算法投递成功率提高了近10%,同时在投递延迟等方面也具有明显优势。展开更多
在车载自组织VANETs中,为解决车辆间通信数据传输不流畅的问题。提出采用3G辅助VANETs的数据传输技术。在无法利用VANETs多跳通信传输数据时,启动3G传输,将此方案命名为3GDD,首先建立数据传输率和数据传输时延的效用函数,利用3G辅助VAN...在车载自组织VANETs中,为解决车辆间通信数据传输不流畅的问题。提出采用3G辅助VANETs的数据传输技术。在无法利用VANETs多跳通信传输数据时,启动3G传输,将此方案命名为3GDD,首先建立数据传输率和数据传输时延的效用函数,利用3G辅助VANETs数据传输实现最大化效用;其次,为了避开优化问题的复杂性,将原始的优化问题变换成整数线性规范问题ILP(integer linear programming problem);最后通过解决ILP,在不同时刻分配3G预算,并选择最不可能通过VANETs传输的数据用于3G传输。实验结果表明,提出的3GDD与同类的方案相比具有良好的性能。展开更多
针对车载自组织网(Vehicular Ad Hoc Networks,VANETs)拓扑结构经常变化导致通信链路容易断裂而通信质量不可靠的问题,将人工蜂与K-means混合算法应用在VANETs中。在成簇阶段,该混合算法利用人工蜂算法较强的全局搜索能力确定初始聚类中...针对车载自组织网(Vehicular Ad Hoc Networks,VANETs)拓扑结构经常变化导致通信链路容易断裂而通信质量不可靠的问题,将人工蜂与K-means混合算法应用在VANETs中。在成簇阶段,该混合算法利用人工蜂算法较强的全局搜索能力确定初始聚类中心,代替传统的K-means对初始聚类中心的选择,这样就消除了K-means对随机初始聚类中心的依赖。在簇头选取阶段,类内具有最小的速度方差以及到其他节点最小平均距离的车辆节点被选择为簇头。在簇的维护阶段,当最优节点即簇头有变化时,次优节点被选为临时簇头,直至更新为最优节点的簇头信息。为测试该混合算法的性能,将其和PSO与K-means混合算法、经典Kmeans算法进行实验对比,结果表明,该混合算法能够更加稳定VANETs通信链路,具有更高成簇质量和更高通信质量。展开更多
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio...Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.展开更多
With the rapid development of IoT(Internet of Things),VANETs(Vehicular Ad-Hoc Networks)have become an attractive ad-hoc network that brings convenience into people’s lives.Vehicles can be informed of the position,dir...With the rapid development of IoT(Internet of Things),VANETs(Vehicular Ad-Hoc Networks)have become an attractive ad-hoc network that brings convenience into people’s lives.Vehicles can be informed of the position,direction,speed and other real-time information of nearby vehicles to avoid traffic jams and accidents.However,VANET environments could be dangerous in the absence of security protection.Because of the openness and self-organization of VANETs,there are plenty of malicious pathways.To guarantee vehicle security,the research aims to provide an effective VANET security mechanism that can track malicious vehicles as necessary.Therefore,this work focuses on malicious vehicles and proposes an anonymous authentication scheme in VANETs based on the fair blind signature to protect vehicle security.展开更多
Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is ...Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is well known that routing is a challenging problem in VANETs due to the fast-changing network typology caused by high mobility at both ends of transmission. Moreover, under urban environment, there are two non-negligible factors in routing protocol design, the non-uniform vehicle distribution caused by traffic lights, and the network congestion due to high traffic demand in rush hours. In this paper, we propose a greedy traffic light and queue aware routing protocol(GTLQR) which jointly considers the street connectivity, channel quality, relative distance, and queuing delay to alleviate the packet loss caused by vehicle clustering at the intersection and balance the traffic load among vehicles. Through performance evaluation, we show that our proposed protocol outperforms both TLRC and GLSR-L in terms of packet delivery ratio and end-to-end delay.展开更多
Rogue nodes broadcasting false information in beacon messages may lead to catastrophic consequences in Vehicular Ad Hoc Networks(VANETs).Previous researchers used cryptography,trust scores,or past vehicle data to dete...Rogue nodes broadcasting false information in beacon messages may lead to catastrophic consequences in Vehicular Ad Hoc Networks(VANETs).Previous researchers used cryptography,trust scores,or past vehicle data to detect rogue nodes;however,these methods suffer from high processing delay,overhead,and False–Positive Rate(FPR).We propose herein Greenshield's traffic model–based fog computing scheme called Fog–based Rogue Node Detection(F–RouND),which dynamically utilizes the On–Board Units(OBUs)of all vehicles in the region for rogue node detection.We aim to reduce the data processing delays and FPR in detecting rogue nodes at high vehicle densities.The performance of the F–RouND framework was evaluated via simulations.Results show that the F–RouND framework ensures 45%lower processing delays,12%lower overhead,and 36%lower FPR at the urban scenario than the existing rogue node detection schemes even when the number of rogue nodes increases by up to 40%in the region.展开更多
提供车辆位置服务是车载网络(vehicle ad hoc networks,VANETs)的重要应用。而用户(车辆行驶人)希望他的位置信息只能暴露于他授权的消息发送者,这就涉及位置隐私问题。提出基于代理重加密的安全位置服务算法(proxy re-encryption-based...提供车辆位置服务是车载网络(vehicle ad hoc networks,VANETs)的重要应用。而用户(车辆行驶人)希望他的位置信息只能暴露于他授权的消息发送者,这就涉及位置隐私问题。提出基于代理重加密的安全位置服务算法(proxy re-encryption-based secure location service,PRESLS)。PRESLS算法采用中心管理模式,并由交通信息港(traffic information center,TIC)扮演中心管理者,且由TIC维持车辆轨迹数据,同时,TIC作为车辆与路边设施单元的中介,使得路边设施单元能安全地共享轨迹数据。利用代理重加密算法,使得轨迹数据不仅对未授权的实体,而且对TIC也是隐匿的,进而实现了位置数据所保密性。通过安全性能分析和基于地图位置服务(map-based location service,MBLS)的实验评估PRESLS算法的性能。分析表明,车辆能够控制仅由车辆允可的路边设施单元才能接入车辆的轨迹数据。同时,基于MBLS的实验数据表明,PRESLS算法在维持车辆轨迹数据安全的同时,并没有降低位置查询成功率。展开更多
As Vehicle Ad Hoc Networks (VANETs) is part of the applications of the Internet of Things (IoT), and Vehicles in VANETs periodically broadcast the beacon message for status advertisement to provide public safety, the ...As Vehicle Ad Hoc Networks (VANETs) is part of the applications of the Internet of Things (IoT), and Vehicles in VANETs periodically broadcast the beacon message for status advertisement to provide public safety, the impacts of the network parameters on the reliability of broadcast messages are investigated and discussed; meanwhile, a cross-layer safety-critical broadcast service architecture is proposed to obtain an optimized set of packet loss rate and delay based on the Neural Networks (NN) and Back Propagation (BP) algorithm to dynamically adjust the transmission rate-power pairs. Simulation results illustrate that the proposed mechanism can effectively improve the reliability performance while maintaining the fairness among vehicles.展开更多
Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-dr...Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). There are various routing protocol categories used in VANETs, like unicast, multicast, and broadcast protocols. In unicast position-based protocols, the routing decisions are based on the geographic position of the vehicles. This does not require establishment or maintenance of routes but needs location services to determine the position of the destination. Non-delay-tolerant network protocols (non-DTN), also identified as minimum delay protocols, are aimed at minimizing the delivery time of the information. Delay-tolerant protocols (DTN) are used in a variety of operating environments, including those that are subject to failures and interruptions and those with high delay, such as VANETs. This paper discusses the comparison between non-DTN and DTN routing protocols belonging to the unicast delay-tolerant position-based category. The comparison was conducted using the NS2 simulator, and the simulations of three non-DTN routing protocols and three DTN routing protocols were recorded. Simulation results show that the DTN routing protocols outperform in delivery ratio compared to the non-DTN routing protocols, but they lead to more average delay due to buffering, the processing algorithm, and priority calculation. In conclusion, non-DTN protocols are more suitable for the city environment since the distance between nodes is relatively smaller and the variations in the network topology are slower than they are on highways. On the other hand, DTN protocols are more suitable for highways due to the buffering of packets until a clear route to destination is available.展开更多
基金financially supported by the Ministry of Trade,Industry and Energy(MOTIE)and Korea Institute for Advancement of Technology(KIAT)through the International Cooperative R&D Program(Project No.P0016038)supported by the MSIT(Ministry of Sci-ence and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2022-RS-2022-00156354)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation).
文摘Overtaking is a crucial maneuver in road transportation that requires a clear view of the road ahead.However,limited visibility of ahead vehicles can often make it challenging for drivers to assess the safety of overtaking maneuvers,leading to accidents and fatalities.In this paper,we consider atrous convolution,a powerful tool for explicitly adjusting the field-of-view of a filter as well as controlling the resolution of feature responses generated by Deep Convolutional Neural Networks in the context of semantic image segmentation.This article explores the potential of seeing-through vehicles as a solution to enhance overtaking safety.See-through vehicles leverage advanced technologies such as cameras,sensors,and displays to provide drivers with a real-time view of the vehicle ahead,including the areas hidden from their direct line of sight.To address the problems of safe passing and occlusion by huge vehicles,we designed a see-through vehicle system in this study,we employed a windshield display in the back car together with cameras in both cars.The server within the back car was used to segment the car,and the segmented portion of the car displayed the video from the front car.Our see-through system improves the driver’s field of vision and helps him change lanes,cross a large car that is blocking their view,and safely overtake other vehicles.Our network was trained and tested on the Cityscape dataset using semantic segmentation.This transparent technique will instruct the driver on the concealed traffic situation that the front vehicle has obscured.For our findings,we have achieved 97.1% F1-score.The article also discusses the challenges and opportunities of implementing see-through vehicles in real-world scenarios,including technical,regulatory,and user acceptance factors.
文摘在车载自组织网络(vehicular Ad hoc networks,VANETs)中,当节点缓存和消息副本数目被限制的情况下,如何合理地选择车载网络的路由节点是实现VANETs高效转发和投递的关键问题。为此提出了一种基于学习方法的决策树理论的多副本VANETs机会路由协议(D-Tree)。D-Tree将VANETs中节点间的传输和连接因素看做多个属性的集合,并与决策树方法得到一个消息转发规则,同时结合多副本路由与机会路由的"存储─携带─转发"优势进行消息投递。真实数据集上的实验结果表明,在场景密集的情况下,D-Tree相比于Bubble和S&W路由算法投递成功率提高了近10%,同时在投递延迟等方面也具有明显优势。
文摘在车载自组织VANETs中,为解决车辆间通信数据传输不流畅的问题。提出采用3G辅助VANETs的数据传输技术。在无法利用VANETs多跳通信传输数据时,启动3G传输,将此方案命名为3GDD,首先建立数据传输率和数据传输时延的效用函数,利用3G辅助VANETs数据传输实现最大化效用;其次,为了避开优化问题的复杂性,将原始的优化问题变换成整数线性规范问题ILP(integer linear programming problem);最后通过解决ILP,在不同时刻分配3G预算,并选择最不可能通过VANETs传输的数据用于3G传输。实验结果表明,提出的3GDD与同类的方案相比具有良好的性能。
文摘针对车载自组织网(Vehicular Ad Hoc Networks,VANETs)拓扑结构经常变化导致通信链路容易断裂而通信质量不可靠的问题,将人工蜂与K-means混合算法应用在VANETs中。在成簇阶段,该混合算法利用人工蜂算法较强的全局搜索能力确定初始聚类中心,代替传统的K-means对初始聚类中心的选择,这样就消除了K-means对随机初始聚类中心的依赖。在簇头选取阶段,类内具有最小的速度方差以及到其他节点最小平均距离的车辆节点被选择为簇头。在簇的维护阶段,当最优节点即簇头有变化时,次优节点被选为临时簇头,直至更新为最优节点的簇头信息。为测试该混合算法的性能,将其和PSO与K-means混合算法、经典Kmeans算法进行实验对比,结果表明,该混合算法能够更加稳定VANETs通信链路,具有更高成簇质量和更高通信质量。
基金the Iran Telecommunication Research Center (ITRC)
文摘Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.
基金This project is supported by Internet innovation and open platform base of the education Ministry of China(No.KJRP1401)the cooperative education project of the education Ministry of China(No.201702113002)+2 种基金US-China Computer Science Research Centre of Nanjing University of Information Science and Technology(No.KJR16059)Hunan Natural Science Foundation(No.2018JJ2138)Education Department of Hunan Province(No.17B096).
文摘With the rapid development of IoT(Internet of Things),VANETs(Vehicular Ad-Hoc Networks)have become an attractive ad-hoc network that brings convenience into people’s lives.Vehicles can be informed of the position,direction,speed and other real-time information of nearby vehicles to avoid traffic jams and accidents.However,VANET environments could be dangerous in the absence of security protection.Because of the openness and self-organization of VANETs,there are plenty of malicious pathways.To guarantee vehicle security,the research aims to provide an effective VANET security mechanism that can track malicious vehicles as necessary.Therefore,this work focuses on malicious vehicles and proposes an anonymous authentication scheme in VANETs based on the fair blind signature to protect vehicle security.
基金supported by the Beijing University of Posts and Telecommunications project No.500418759the State Key Laboratory of Networking and Switching Technology project No.600118124
文摘Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is well known that routing is a challenging problem in VANETs due to the fast-changing network typology caused by high mobility at both ends of transmission. Moreover, under urban environment, there are two non-negligible factors in routing protocol design, the non-uniform vehicle distribution caused by traffic lights, and the network congestion due to high traffic demand in rush hours. In this paper, we propose a greedy traffic light and queue aware routing protocol(GTLQR) which jointly considers the street connectivity, channel quality, relative distance, and queuing delay to alleviate the packet loss caused by vehicle clustering at the intersection and balance the traffic load among vehicles. Through performance evaluation, we show that our proposed protocol outperforms both TLRC and GLSR-L in terms of packet delivery ratio and end-to-end delay.
文摘Rogue nodes broadcasting false information in beacon messages may lead to catastrophic consequences in Vehicular Ad Hoc Networks(VANETs).Previous researchers used cryptography,trust scores,or past vehicle data to detect rogue nodes;however,these methods suffer from high processing delay,overhead,and False–Positive Rate(FPR).We propose herein Greenshield's traffic model–based fog computing scheme called Fog–based Rogue Node Detection(F–RouND),which dynamically utilizes the On–Board Units(OBUs)of all vehicles in the region for rogue node detection.We aim to reduce the data processing delays and FPR in detecting rogue nodes at high vehicle densities.The performance of the F–RouND framework was evaluated via simulations.Results show that the F–RouND framework ensures 45%lower processing delays,12%lower overhead,and 36%lower FPR at the urban scenario than the existing rogue node detection schemes even when the number of rogue nodes increases by up to 40%in the region.
文摘提供车辆位置服务是车载网络(vehicle ad hoc networks,VANETs)的重要应用。而用户(车辆行驶人)希望他的位置信息只能暴露于他授权的消息发送者,这就涉及位置隐私问题。提出基于代理重加密的安全位置服务算法(proxy re-encryption-based secure location service,PRESLS)。PRESLS算法采用中心管理模式,并由交通信息港(traffic information center,TIC)扮演中心管理者,且由TIC维持车辆轨迹数据,同时,TIC作为车辆与路边设施单元的中介,使得路边设施单元能安全地共享轨迹数据。利用代理重加密算法,使得轨迹数据不仅对未授权的实体,而且对TIC也是隐匿的,进而实现了位置数据所保密性。通过安全性能分析和基于地图位置服务(map-based location service,MBLS)的实验评估PRESLS算法的性能。分析表明,车辆能够控制仅由车辆允可的路边设施单元才能接入车辆的轨迹数据。同时,基于MBLS的实验数据表明,PRESLS算法在维持车辆轨迹数据安全的同时,并没有降低位置查询成功率。
基金supported by the 111 Project under Grant No.B08004the major project of Ministry of Industry and Information Technology of the People's Republic of China under Grant No.2010ZX03002-006China Fundamental Research Funds for the Central Universities
文摘As Vehicle Ad Hoc Networks (VANETs) is part of the applications of the Internet of Things (IoT), and Vehicles in VANETs periodically broadcast the beacon message for status advertisement to provide public safety, the impacts of the network parameters on the reliability of broadcast messages are investigated and discussed; meanwhile, a cross-layer safety-critical broadcast service architecture is proposed to obtain an optimized set of packet loss rate and delay based on the Neural Networks (NN) and Back Propagation (BP) algorithm to dynamically adjust the transmission rate-power pairs. Simulation results illustrate that the proposed mechanism can effectively improve the reliability performance while maintaining the fairness among vehicles.
文摘Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). There are various routing protocol categories used in VANETs, like unicast, multicast, and broadcast protocols. In unicast position-based protocols, the routing decisions are based on the geographic position of the vehicles. This does not require establishment or maintenance of routes but needs location services to determine the position of the destination. Non-delay-tolerant network protocols (non-DTN), also identified as minimum delay protocols, are aimed at minimizing the delivery time of the information. Delay-tolerant protocols (DTN) are used in a variety of operating environments, including those that are subject to failures and interruptions and those with high delay, such as VANETs. This paper discusses the comparison between non-DTN and DTN routing protocols belonging to the unicast delay-tolerant position-based category. The comparison was conducted using the NS2 simulator, and the simulations of three non-DTN routing protocols and three DTN routing protocols were recorded. Simulation results show that the DTN routing protocols outperform in delivery ratio compared to the non-DTN routing protocols, but they lead to more average delay due to buffering, the processing algorithm, and priority calculation. In conclusion, non-DTN protocols are more suitable for the city environment since the distance between nodes is relatively smaller and the variations in the network topology are slower than they are on highways. On the other hand, DTN protocols are more suitable for highways due to the buffering of packets until a clear route to destination is available.