期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks
1
作者 A.F.M.Suaib Akhter A.F.M.Shahen Shah +3 位作者 Mohiuddin Ahmed Nour Moustafa UnalÇavu¸soglu Ahmet Zengin 《Computers, Materials & Continua》 SCIE EI 2021年第7期229-246,共18页
Vehicular Ad hoc Networks(VANETs)become a very crucial addition in the Intelligent Transportation System(ITS).It is challenging for a VANET system to provide security services and parallelly maintain high throughput b... Vehicular Ad hoc Networks(VANETs)become a very crucial addition in the Intelligent Transportation System(ITS).It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources.To overcome these challenges,we propose a blockchain-based Secured Cluster-based MAC(SCB-MAC)protocol.The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages.The message which contains emergency information and requires Strict Delay Requirement(SDR)for transmission are called safety messages(SM).Cluster Members(CMs)sign SMs with their private keys while sending them to the blockchain to confirm authentication,integrity,and confidentiality of the message.A Certificate Authority(CA)is responsible for physical verification,key generation,and privacy preservation of the vehicles.We implemented a test scenario as proof of concept and tested the safety message transmission(SMT)protocol in a real-world platform.Computational and storage overhead analysis shows that the proposed protocol for SMT implements security,authentication,integrity,robustness,non-repudiation,etc.while maintaining the SDR.Messages that are less important compared to the SMs are called non-safety messages(NSM)and vehicles use RTS/CTS mechanism for NSM transmission.Numerical studies show that the proposed NSM transmission method maintains 6 times more throughput,2 times less delay and 125%less Packet Dropping Rate(PDR)than traditional MAC protocols.These results prove that the proposed protocol outperforms the traditional MAC protocols. 展开更多
关键词 ad hoc networks data security digital signatures distributed storage intelligent vehicles vehicular ad hoc networks wireless communication
下载PDF
Cluster-based RSU deployment strategy for vehicular ad hoc networks with integration of communication,sensing and computing
2
作者 Xinrui Gu Shengfeng Wang +1 位作者 Zhiqing Wei Zhiyong Feng 《Journal of Information and Intelligence》 2024年第4期325-338,共14页
The integration of communications,sensing and computing(I-CSC)has significant applications in vehicular ad hoc networks(VANETs).A roadside unit(RSU)plays an important role in I-CSC by performing functions such as info... The integration of communications,sensing and computing(I-CSC)has significant applications in vehicular ad hoc networks(VANETs).A roadside unit(RSU)plays an important role in I-CSC by performing functions such as information transmission and edge computing in vehicular communication.Due to the constraints of limited resources,RSU cannot achieve full coverage and deploying RSUs at key cluster heads of hierarchical structures of road networks is an effective management method.However,direct extracting the hierarchical structures for the resource allocation in VANETs is an open issue.In this paper,we proposed a network-based renormalization method based on information flow and geographical location to hierarchically deploy the RSU on the road networks.The renormalization method is compared with two deployment schemes:genetic algorithm(GA)and memetic framework-based optimal RSU deployment(MFRD),to verify the improvement of communication performance.Our results show that the renormalization method is superior to other schemes in terms of RSU coverage and information reception rate. 展开更多
关键词 Roadside unit(RSU)deployment strategy vehicular ad hoc networks(VANETs) Hierarchical structures Renormalization group Complex network
原文传递
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
3
作者 Juli Yin Linfeng Wei +4 位作者 Zhiquan Liu Xi Yang Hongliang Sun Yudan Cheng Jianbin Mai 《Big Data Mining and Analytics》 EI CSCD 2023年第4期391-403,共13页
With the rapid development of mobile devices,aggregation security and efficiency topics are more important than past in crowd sensing.When collecting large-scale vehicle-provided data,the data transmitted via autonomo... With the rapid development of mobile devices,aggregation security and efficiency topics are more important than past in crowd sensing.When collecting large-scale vehicle-provided data,the data transmitted via autonomous networks are publicly accessible to all attackers,which increases the risk of vehicle exposure.So we need to ensure data aggregation security.In addition,low aggregation efficiency will lead to insufficient sensing data,making the data unable to provide data mining services.Aiming at the problem of aggregation security and efficiency in large-scale data collection,this article proposes a data collection mechanism(VDCM)for crowd sensing in vehicular ad hoc networks(VANETs).The mechanism includes two mechanism assumptions and selects appropriate methods to reduce consumption.It selects sub mechanism 1 when there exist very few vehicles or the coalition cannot be formed,otherwise selects sub mechanism 2.Single aggregation is used to collect data in sub mechanism 1.In sub mechanism 2,cooperative vehicles are selected by using coalition formation strategy and auction cooperation agreement,and multi aggregation is used to collect data.Two sub mechanisms use Paillier homomorphic encryption technology to ensure the security of data aggregation.In addition,mechanism supplements the data update and scoring steps to increase the amount of available data.The performance analysis shows that the mechanism proposed in this paper can safely aggregate data and reduce consumption.The simulation results indicate that the proposed mechanism reduces time consumption and increases the amount of available data compared with existing mechanisms. 展开更多
关键词 vehicular ad hoc networks(VANETs) crowd sensing data collection data aggregation security
原文传递
Caching Strategies in NDN Based Wireless Ad Hoc Network:A Survey
4
作者 Ahmed Khalid Rana Asif Rehman Byung-Seo Kim 《Computers, Materials & Continua》 SCIE EI 2024年第7期61-103,共43页
Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Int... Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Internet is used in wireless ad hoc network.Internet is based on Transmission Control Protocol(TCP)/Internet Protocol(IP)network where clients and servers interact with each other with the help of IP in a pre-defined environment.Internet fetches data from a fixed location.Data redundancy,mobility,and location dependency are the main issues of the IP network paradigm.All these factors result in poor performance of wireless ad hoc networks.The main disadvantage of IP is that,it does not provide in-network caching.Therefore,there is a need to move towards a new network that overcomes these limitations.Named Data Network(NDN)is a network that overcomes these limitations.NDN is a project of Information-centric Network(ICN).NDN provides in-network caching which helps in fast response to user queries.Implementing NDN in wireless ad hoc network provides many benefits such as caching,mobility,scalability,security,and privacy.By considering the certainty,in this survey paper,we present a comprehensive survey on Caching Strategies in NDN-based Wireless AdHocNetwork.Various cachingmechanism-based results are also described.In the last,we also shed light on the challenges and future directions of this promising field to provide a clear understanding of what caching-related problems exist in NDN-based wireless ad hoc networks. 展开更多
关键词 Content centric network Internet of Things mobile ad hoc network named data network vehicular ad hoc network
下载PDF
On the security of warning message dissemina-tion in vehicular Ad hoc networks 被引量:2
5
作者 Jieqiong Chen Guoqiang Mao 《Journal of Communications and Information Networks》 2017年第2期46-58,共13页
Information security is an important issue in vehicular networks as the accuracy and integrity of information is a prerequisite to the satisfactory performance of virtually all vehicular network applications.We study ... Information security is an important issue in vehicular networks as the accuracy and integrity of information is a prerequisite to the satisfactory performance of virtually all vehicular network applications.We study the information security of a vehicular Ad hoc network whose message could be tampered by malicious vehicles.An analytical framework is developed to analyze the process of message dissemination in a vehicular network with malicious vehicles randomly distributed in the network.The probability that a destination vehicle at a xed distance can receive the message correctly from the source vehicle is obtained.Simulations are conducted to validate the accuracy of the theoretical analysis.Our results demonstrate the impact of network topology and the distribution of malicious vehicles on the correct delivery of a message in vehicular Ad hoc networks,and provides insight on the design of security mechanisms to improve the security of message dissemination in vehicular networks. 展开更多
关键词 vehicular ad hoc networks Internet-of-Vehicles technology message dissemination malicious vehicles SECURITY
原文传递
Data dissemination model using Epidemic and Transmission-Segment-based Geographic Routing protocol:a new perspective in vehicular ad hoc networks
6
作者 Ravi Kumar D.N.S. Barani S. 《International Journal of Intelligent Computing and Cybernetics》 EI 2021年第2期287-301,共15页
Purpose-The purpose of this paper is to introduce a new data dissemination model in order to improve the performance of transmission in VANET.It proposes a protocol named Epidemic and Transmission-Segmentbased Geograp... Purpose-The purpose of this paper is to introduce a new data dissemination model in order to improve the performance of transmission in VANET.It proposes a protocol named Epidemic and Transmission-Segmentbased Geographic Routing(ETSGR)and outlining the issues due to high mobility of nodes and uncertain physical topologies in the network.The proposed ETSGR is mainly used to analyze the vehicle state,direction,distance,traffic density and link quality of the network.Design/methodology/approach-This research work based on ETSGR protocol mainly uses epidemic algorithmin order to find the vehicle state based on susceptible,infected and recovered(SIR)model.Furthermore,the vehicle position and finding the head node in the network is utilized using the transmission segment protocol based on geographic routing and analyses each node to formthe segments and find the destination to transmit the data in timely manner.Findings-The paper provides the enhancement of the performance based on some metrics such as end-to-end delaythat obtained 0.62%,data throughput as 32.3%,packetdelivery ratio as 67%and one-hop communicationas 13%.The proposed ETSGR protocolanalyzes the state of the vehiclecorrectly and each node segmented to transmit the data with the timely manner and obtaining reliable performanceeven with highmobility of nodes in the network.Research limitations/implications-The proposed ETSGR protocol may have some limitation when considering the timing which should improve even in increasing many number of vehicles and different road segments.Practical implications-This paper includes some suggestions for the practical deployment of the approach in which a real-time traffic analysis can be evaluated for taking prior actions during an emergency situation and proper dissemination of data in timely manner can help utilize the guidance of proper planning of roads.Originality/value-This research fulfills an enhanced protocol to improve the performance of data dissemination. 展开更多
关键词 ETSGR vehicular ad hoc networks(VANETs) Data dissemination Routing protocol Transmission segment
原文传递
Modeling of Propagation of Road Hazard Information in Sparse Vehicular ad hoc Networks
7
作者 Sepehr Keykhaie Saleh Yousefi Mehdi Dehghan 《International Journal of Automation and computing》 EI CSCD 2015年第5期518-528,共11页
In this paper, we study the propagation of road hazard information to vehicles which enter the hazard segment of a highway in a sparse 1D vehicular ad hoc network(VANET) with store-and-forward mechanism. Store-and-for... In this paper, we study the propagation of road hazard information to vehicles which enter the hazard segment of a highway in a sparse 1D vehicular ad hoc network(VANET) with store-and-forward mechanism. Store-and-forward is an option for message propagation in sparse vehicular networks where connectivity is intermittent. Upon receiving the message, the vehicle becomes an informed vehicle, it carries the message for a while and then forwards it to the approaching vehicles which are about to enter the highway segment. In this way, a platoon of informed vehicles is formed. We establish an analytical model to obtain the probability that a vehicle receives the message and joins the informed platoon. Moreover, we prove that traffic dynamics increase the reception probability of messages. We find the expected message propagation delay in the platoon using the store-and-forward policy. We also show that the propagation delay in store-and-forward inter-vehicle communications is tightly related to traffic parameters such as traffic flow rate and vehicle speeds on the highway. Results show that for smaller transmission ranges, smaller platoons are formed, the expected message propagation delay in the platoon is low, and it increases very slightly as the traffic flow rate increases. But for larger transmission ranges, larger platoons are formed, the expected delay is high, and it increases remarkably with a small increase in the traffic flow rate. The impacts of some network and traffic parameters such as transmission range, speed of vehicles, and highway speed limits on the message propagation are investigated as well. Finally, the accuracy of the analytical results is evaluated by an extensive simulation study. 展开更多
关键词 vehicular ad hoc networks(VANETs) store-and-forwar
原文传递
An Adaptive and Opportunistic Broadcast Protocol for Vehicular Ad Hoc Networks 被引量:6
8
作者 Li, Gui-Sen Wang, Wan-Liang Yao, Xin-Wei 《International Journal of Automation and computing》 EI 2012年第4期378-387,共10页
A primary goal of broadcasting in vehicular ad hoc network (VANET) is to improve the road safety by transmitting alert messages to all surrounding vehicles as soon as possible. In this paper, we adopt the concept of o... A primary goal of broadcasting in vehicular ad hoc network (VANET) is to improve the road safety by transmitting alert messages to all surrounding vehicles as soon as possible. In this paper, we adopt the concept of opportunistic routing and propose a multiple candidate relays opportunistic broadcast (MCROB) protocol for VANET. The MCROB protocol is a sender-driven broadcast scheme independent of node density. The packet delivery ratio (PDR) is derived and an expected transmission speed (ETS) for the MCROB is proposed. A priority rule for selecting a proper candidate relay and an adaptive algorithm for forwarding timers of candidate relays are also presented in this paper. Simulations show that MCROB is adaptive to the rapid changing of network conditions. It keeps a low communication overhead introduced by the broadcast and increases the average transmission speed by around 40%. 展开更多
关键词 Broadcast storm opportunistic broadcast multiple candidates transmission speed vehicular ad hoc network (VANET).
原文传递
An Improved Cooperative Adaptive Cruise Control(CACC) Algorithm Considering Invalid Communication 被引量:3
9
作者 WANG Pangwei WANG Yunpeng +1 位作者 YU Guizhen TANG Tieqiao 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2014年第3期468-474,共7页
For the Cooperative Adaptive Cruise Control (CACC) Algorithm, existing research studies mainly focus on how inter-vehicle communication can be used to develop CACC controller, the influence of the communication dela... For the Cooperative Adaptive Cruise Control (CACC) Algorithm, existing research studies mainly focus on how inter-vehicle communication can be used to develop CACC controller, the influence of the communication delays and lags of the actuators to the string stability. However, whether the string stability can be guaranteed when inter-vehicle communication is invalid partially has hardly been considered. This paper presents an improved CACC algorithm based on the sliding mode control theory and analyses the range of CACC controller parameters to maintain string stability. A dynamic model of vehicle spacing deviation in a platoon is then established, and the string stability conditions under improved CACC are analyzed. Unlike the traditional CACC algorithms, the proposed algorithm can ensure the functionality of the CACC system even if inter-vehicle communication is partially invalid. Finally, this paper establishes a platoon of five vehicles to simulate the improved CACC algorithm in MATLAB/Simulink, and the simulation results demonstrate that the improved CACC algorithm can maintain the string stability of a CACC platoon through adjusting the controller parameters and enlarging the spacing to prevent accidents. With guaranteed string stability, the proposed CACC algorithm can prevent oscillation of vehicle spacing and reduce chain collision accidents under real-world circumstances. This research proposes an improved CACC algorithm, which can guarantee the string stability when inter-vehicle communication is invalid. 展开更多
关键词 Cooperative adaptive cruise control (CACC) sliding mode control chain collision accidents vehicular ad hoc networks (VANETs)
下载PDF
A Review on the Recent Trends of Image Steganography for VANET Applications
10
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 STEGANOGRAPHY image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(VANET) transportation system
下载PDF
Secure and Reliable Routing in the Internet of Vehicles Network:AODV-RL with BHA Attack Defense
11
作者 Nadeem Ahmed Khalid Mohammadani +3 位作者 Ali Kashif Bashir Marwan Omar Angel Jones Fayaz Hassan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期633-659,共27页
Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad h... Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad hoc Networks(VANETs),a core component of IoV,face security issues,particularly the Black Hole Attack(BHA).This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability;also,BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether.Recognizing the importance of this challenge,we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier Factor(AODV-RL).The significance of AODVRL lies in its unique approach:it verifies and confirms the trustworthiness of network components,providing robust protection against BHA.An additional safety layer is established by implementing the Local Outlier Factor(LOF),which detects and addresses abnormal network behaviors.Rigorous testing of our solution has revealed its remarkable ability to enhance communication in VANETs.Specifically,Our experimental results achieve message delivery ratios of up to 94.25%andminimal packet loss ratios of just 0.297%.Based on our experimental results,the proposedmechanismsignificantly improves VANET communication reliability and security.These results promise a more secure and dependable future for IoV,capable of transforming transportation safety and efficiency. 展开更多
关键词 Black hole attack IoV vehicular ad hoc network AODV routing protocol
下载PDF
A Scalable Privacy Preserving Scheme in Vehicular Network 被引量:1
12
作者 YAN Gong-jun SHI Hui +1 位作者 Awny Alnusair Matthew Todd Bradley 《Computer Aided Drafting,Design and Manufacturing》 2014年第1期64-73,共10页
Vehicles enlisted with computing, sensing and communicating devices can create vehicular networks, a subset of cooperative systems in heterogeneous environments, aiming at improving safety and entertainment in traffic... Vehicles enlisted with computing, sensing and communicating devices can create vehicular networks, a subset of cooperative systems in heterogeneous environments, aiming at improving safety and entertainment in traffic. In vehicular networks, a vehicle's identity is associated to its owner's identity as a unique linkage. Therefore, it is of importance to protect privacy of vehicles from being possibly tracked. Obviously, the privacy protection must be scalable because of the high mobility and large population of vehicles. In this work, we take a non-trivial step towards protecting privacy of vehicles. As privacy draws public concerns, we firstly present privacy implications of operational challenges from the public policy perspective. Additionally, we envision vehicular networks as geographically partitioned subnetworks (cells). Each subnetwork maintains a list of pseudonyms. Each pseudonym includes the cell's geographic id and a random number as host id. Before starting communication, vehicles need to request a pseudonym on demand from pseudonym server. In order to improve utilization of pseudonyms, we address a stochastic model with time-varying arrival and departure rates. Our main contribution includes: 1) proposing a scalable and effective algorithm to protect privacy; 2) providing analytical results of probability, variance and expected number of requests on pseudonym servers. The empirical results confirm the accuracy of our analytical predictions. 展开更多
关键词 PRIVACY vehicular ad hoc networks analytical prediction
下载PDF
A RELIABILITY ENHANCED DENSITY ADAPTIVE DATA DISSEMINATION SCHEME FOR VANETS
13
作者 Zhou Lianke Cui Gang Luo Danyan Liu Hongwei 《Journal of Electronics(China)》 2011年第1期44-52,共9页
In this paper,a reliability enhanced and density adaptive data disseminating scheme is proposed for Vehicular Ad hoc NETworks(VANETs).The distributed on demand inquiring and responding mechanism is employed to get nod... In this paper,a reliability enhanced and density adaptive data disseminating scheme is proposed for Vehicular Ad hoc NETworks(VANETs).The distributed on demand inquiring and responding mechanism is employed to get nodes' connectivity information.The announcing-listening process is also designed to find the nodes with bigger additional degree to rebroadcast,by which the relaying node is selected freely from density's influence.Simultaneously,a reliability parameter is designed to choose redundant relays for each hop.According to the importance of the broadcast,the parameter is set by the source node properly.Simulation results show that the scheme has achieved good performances such as low forwarding ratio,short latency and low load.The broadcast coverage ratio is ensured against the influence of key link errors and relaying nodes failure by paying suitable additional communication. 展开更多
关键词 vehicular ad hoc networks(VANETs) BROadCAST COMMUNICATION Wireless network Density adaptive
下载PDF
On Coexistence of Vehicular Overlay Network and H2H Terminals on PRACH in LTE
14
作者 Nargis Khan Jelena Mii Vojislav B.Mii 《ZTE Communications》 2016年第3期3-12,共10页
Vehicular ad hoc networks (VANETs) that use the IEEE 802.11p communication standard face a number of challenges, not least when it comes to safety messages on the VANET control channel (CCH) where short delay time... Vehicular ad hoc networks (VANETs) that use the IEEE 802.11p communication standard face a number of challenges, not least when it comes to safety messages on the VANET control channel (CCH) where short delay times and reliable delivery are of pri- mary importance. In this paper we propose a vehicular machine-to-machine (VM2M) overlay network that uses Long Term Evolu- tion (LTE) physical random access channel (PRACH) to emulate VANET CCH. The overlay network uses dedicated preambles to separate vehicular traffic from regular LTE traffic and a cartier sense multiple access with collision avoidance (CSMA-CA) layer similar to the one used in IEEE 802.15.4 to avoid the four step handshake and the overhead it incurs. The performance of the pro- posed overlay is evaluated under a wide range of PRACH parameters which conform to the scenarios with high vehicle velocities and large distances between roadside units (RSUs) that may be encountered in rural areas and on highways. 展开更多
关键词 vehicular ad hoc networks (VANETs) VANET control channel (CCH) 3GPP long term evolution (LTE) physical random accesschannel (PRACH) IEEE 802.15.4 human-to-human (H2H) traffic
下载PDF
Secure Model to Generate Path Map for Vehicles in Unusual Road Incidents Using Association Rule Based Mining in VANET 被引量:2
15
作者 Arun Malik Babita Pandey Chia-Chun Wu 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第2期153-162,共10页
Logical behavioral arrangements are a class of conventional arrangements to illustrate the happening of incidents in an appropriate and structured approach in vehicular ad hoc network (VANET). These incidents are ch... Logical behavioral arrangements are a class of conventional arrangements to illustrate the happening of incidents in an appropriate and structured approach in vehicular ad hoc network (VANET). These incidents are characterized as a list of path segments that are passed through by the vehicles for the duration of their journeys from a pre-decided local source to a local destination in a structured manner. A set of proper description illustrating the paths traversed by the vehicles as logical behavioral arrangements is describedin this paper. The data gathering scheme based on secure authentication to gather the data from the vehicles is proposed in this paper. This proposed data gathering scheme based on secure authentication is compared with the existing data gathering schemes by using veins framework and the results of analysis reflect that the proposed scheme outperforms among others. The data collected from the vehicles by the proposed data gathering scheme is stored at distributed road side units (RSUs). From these collected paths, the common and frequent paths opted by the vehicles in a certain region are determined by using frequent arrangement mining approach. An estimation model is used to decidethe next path and the whole path map opted by the vehicles in unusual situations like accident, jams, or a particular time of day. The proposed scheme will helpthe society in reducing the waiting time in vent of emergency or normal working days. 展开更多
关键词 CONFIDENCE motion arrangements support vehicular ad hoc network(VANET) vehicle-toroad side unit(V2R) vehicle-to-vehicle(V2V)
下载PDF
The research of traffic density extraction method under vehicular ad hoc network environment
16
作者 Zhizhou Wu Yiming Zhang +1 位作者 Guishan Tan Jia Hu 《Journal of Intelligent and Connected Vehicles》 2019年第1期25-32,共8页
Purpose–Traffic density is one of the most important parameters to consider in the traffic operationfield.Owing to limited data sources,traditional methods cannot extract traffic density directly.In the vehicular ad hoc ... Purpose–Traffic density is one of the most important parameters to consider in the traffic operationfield.Owing to limited data sources,traditional methods cannot extract traffic density directly.In the vehicular ad hoc network(VANET)environment,the vehicle-to-vehicle(V2V)and vehicle-to-infrastructure(V2I)interaction technologies create better conditions for collecting the whole time-space and refined traffic data,which provides a new approach to solving this problem.Design/methodology/approach–On that basis,a real-time traffic density extraction method has been proposed,including lane density,segment density and network density.Meanwhile,using SUMO and OMNet11 as traffic simulator and network simulator,respectively,the Veins framework as middleware and the two-way coupling VANET simulation platform was constructed.Findings–Based on the simulation platform,a simulated intersection in Shanghai was developed to investigate the adaptability of the model.Originality/value–Most research studies use separate simulation methods,importing trace data obtained by using from the simulation software to the communication simulation software.In this paper,the tight coupling simulation method is applied.Using real-time data and history data,the research focuses on the establishment and validation of the traffic density extraction model. 展开更多
关键词 Traffic density VANET simulation vehicular ad hoc network Paper type Technical paper Figure 1 Structure of VANET simulation platform
原文传递
Cooperative Channel Assignment for VANETs Based on Dual Reinforcement Learning 被引量:2
17
作者 Xuting Duan Yuanhao Zhao +3 位作者 Kunxian Zheng Daxin Tian Jianshan Zhou Jian Gao 《Computers, Materials & Continua》 SCIE EI 2021年第2期2127-2140,共14页
Dynamic channel assignment(DCA)is significant for extending vehicular ad hoc network(VANET)capacity and mitigating congestion.However,the un-known global state information and the lack of centralized control make chan... Dynamic channel assignment(DCA)is significant for extending vehicular ad hoc network(VANET)capacity and mitigating congestion.However,the un-known global state information and the lack of centralized control make channel assignment performances a challenging task in a distributed vehicular direct communication scenario.In our preliminary field test for communication under V2X scenario,we find that the existing DCA technology cannot fully meet the communication performance requirements of VANET.In order to improve the communication performance,we firstly demonstrate the feasibility and potential of reinforcement learning(RL)method in joint channel selection decision and access fallback adaptation design in this paper.Besides,a dual reinforcement learning(DRL)-based cooperative DCA(DRL-CDCA)mechanism is proposed.Specifically,DRL-CDCA jointly optimizes the decision-making behaviors of both the channel selection and back-off adaptation based on a multi-agent dual reinforcement learning framework.Besides,nodes locally share and incorporate their individual rewards after each communication to achieve regional consistency optimization.Simulation results show that the proposed DRL-CDCA can better reduce the one-hop packet delay,improve the packet delivery ratio on average when compared with two other existing mechanisms. 展开更多
关键词 vehicular ad hoc networks reinforcement learning dynamic channel assignment
下载PDF
Unicast routing protocols for urban vehicular networks:review, taxonomy, and open research issues
18
作者 Syed Adeel Ali SHAH Muhammad SHIRAZ +1 位作者 Mostofa Kamal NASIR Rafidah Binti MD NOOR 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2014年第7期489-513,共25页
Over the past few years, numerous traffic safety applications have been developed using vehicular ad hoc networks(VANETs). These applications represent public interest and require network-wide dissemination techniques... Over the past few years, numerous traffic safety applications have been developed using vehicular ad hoc networks(VANETs). These applications represent public interest and require network-wide dissemination techniques. On the other hand, certain non-safety applications do not require network-wide dissemination techniques.Such applications can be characterized by their individual interest between two vehicles that are geographically apart. In the existing literature, several proposals of unicast protocols exist that can be used for these non-safety applications. Among the proposals, unicast protocols for city scenarios are considered to be most challenging.This implies that in city scenarios unicast protocols show minimal persistence towards highly dynamic vehicular characteristics, including mobility, road structure, and physical environment. Unlike other studies, this review is motivated by the diversity of vehicular characteristics and difficulty of unicast protocol adaption in city scenarios.The review starts with the categorization of unicast protocols for city scenarios according to their requirement for a predefined unicast path. Then, properties of typical city roads are discussed, which helps to explore limitations in efficient unicast communication. Through an exhaustive literature review, we propose a thematic taxonomy based on different aspects of unicast protocol operation. It is followed by a review of selected unicast protocols for city scenarios that reveal their fundamental characteristics. Several significant parameters from the taxonomy are used to qualitatively compare the reviewed protocols. Qualitative comparison also includes critical investigation of distinct approaches taken by researchers in experimental protocol evaluation. As an outcome of this review, we point out open research issues in unicast routing. 展开更多
关键词 Unicast protocols TAXONOMY Protocol review vehicular ad hoc networks Geographic routing
原文传递
A Robust Emergency Messages Routing Scheme for Urban VANETs
19
作者 Mumtaz Ali Shah Farrukh Zeeshan Khan Ghulam Abbas 《Computers, Materials & Continua》 SCIE EI 2022年第8期2617-2632,共16页
Vehicular ad-hoc networks(VANETs)play an essential role in enhancing transport infrastructure by making vehicles intelligent and proficient in preventing traffic fatalities.Direction-based greedy protocols pick the ne... Vehicular ad-hoc networks(VANETs)play an essential role in enhancing transport infrastructure by making vehicles intelligent and proficient in preventing traffic fatalities.Direction-based greedy protocols pick the next route vehicle for transmitting emergency messages(EMs)depending upon the present location of adjacent vehicles towards sink vehicles by using an optimal uni-directional road traffic approach.Nevertheless,such protocols suffer performance degradation by ignoring the moving directions of vehicles in bi-directional road traffic where topological changes happen continuously.Due to the high number of vehicles,it is essential to broadcast EMs to all vehicles to prevent traffic delays and collisions.A cluster-based EM transmitting technique is proposed in this paper.For urban VANETs,this paper pioneers the clustering of bi-directional road traffic for robust and efficient routing of EMs.In this regard,this paper introduces a routing protocol,namely,the bi-directional urban routing protocol(BURP).In addition to the paths and relative locations of vehicles,BURP takes account of the distance parameter by using the Hamming distance function to determine the direction ofmotion of vehicles and communicates EMs through the cluster head(CH).Amodified k-medoids algorithm is presented for the clustering of bi-directional road traffic.A median method is presented for selecting CH to ensure the longrunning of a cluster.Simulation results show that BURP provides enhanced throughput,a maximized packet delivery ratio,low energy consumption,and network delay relative to eminent routing protocols. 展开更多
关键词 vehicular ad hoc networks bi-directional road traffic routing protocol emergency message broadcasting direction-based greedy forwarding
下载PDF
Reliable connectivity and efficient data dissemination in VANETs
20
作者 白星振 李珊珊 高正中 《Journal of Measurement Science and Instrumentation》 CAS 2012年第3期243-247,共5页
Connectivity and data dissemination in vehicular ad hoc networks(VANETs)have recently received considerable attention.Due to the unique characteristics of VANETs,the network connectivity is poor and reliable transmiss... Connectivity and data dissemination in vehicular ad hoc networks(VANETs)have recently received considerable attention.Due to the unique characteristics of VANETs,the network connectivity is poor and reliable transmission in VANETs is hard to achieve.In this paper,we analyze the connectivity of randomly deployed vehicles on a road in VANETs and show the relation among the connectivity,the vehicle density and the communication radius.The reliable data dissemination scheme based on assisted nodes is studied.The simulation results show our novel scheme increases the network performance in terms of data dissemination rate. 展开更多
关键词 CONNECTIVITY data dissemination vehicular ad hoc networks(VANETs)
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部