As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challe...As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles.展开更多
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr...This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency.展开更多
This paper comes up with a SDN Based Vehicle Ad-Hoc On-Demand Routing Protocol(SVAO),which separates the data forwarding layer and network control layer,as in software defined networking(SDN),to enhance data transmiss...This paper comes up with a SDN Based Vehicle Ad-Hoc On-Demand Routing Protocol(SVAO),which separates the data forwarding layer and network control layer,as in software defined networking(SDN),to enhance data transmission efficiency within vehicle ad-hoc networks(VANETs).The roadside service unit plays the role of local controller and is in charge of selecting vehicles to forward packets within a road segment.All the vehicles state in the road.Correspondingly,a two-level design is used.The global level is distributed and adopts a ranked query scheme to collect vehicle information and determine the road segments along which a message should be forwarded.On the other hand,the local level is in charge of selecting forwarding vehicles in each road segment determined by the global level.We implement two routing algorithms of SVAO,and compare their performance in our simulation.We compare SVAO with popular ad-hoc network routing protocols,including Optimized Link State Routing(OLSR),Dynamic Source Routing(DSR),Destination Sequence Distance Vector(DSDV),and distance-based routing protocol(DB)via simulations.We consider the impact of vehicle density,speed on data transmission rate and average packet delay.The simulation results show that SVAO performs better than the others in large-scale networks or with high vehicle speeds.展开更多
In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship ...In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship between expiration probability and minimum window size was reached by building a Markov model. According to this conclusion, a back-off algorithm based on adjusting the size of minimum contention window called CEB is proposed, and this algorithm is on the basis of the differential size between the number of expiration beacons and preset threshold. Simulations were done to compare the performance of CEB with that of RBEB and BEB, and the results show that the performance of the new proposed algorithm is better than that of RBEB and BEB.展开更多
With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accurac...With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs.展开更多
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio...Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.展开更多
Mobile multimedia streaming is an open topic in vehicular environment.Due to the high intermittent links,it has become a critical challenge to deliver high quality video streaming in vehicular networks.In this paper,w...Mobile multimedia streaming is an open topic in vehicular environment.Due to the high intermittent links,it has become a critical challenge to deliver high quality video streaming in vehicular networks.In this paper,we reform the Information Centric Networking(ICN) concept for multimedia delivery in urban vehicular networks.By leveraging the ICN perspective,we highlight that vehicular peers can obtain multimedia chunks via the vehicle-to-cloud(V2C) approach to improve the delivery quality.Based on this,we propose a lightweight multipath selection strategy to guide the network system to adaptively adjust the forwarding means.Extensive simulations show that the proposed solution can optimize the utilization of network paths,lighten network loads as well as avoid wasting resources.展开更多
The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face...The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL.展开更多
Logical behavioral arrangements are a class of conventional arrangements to illustrate the happening of incidents in an appropriate and structured approach in vehicular ad hoc network (VANET). These incidents are ch...Logical behavioral arrangements are a class of conventional arrangements to illustrate the happening of incidents in an appropriate and structured approach in vehicular ad hoc network (VANET). These incidents are characterized as a list of path segments that are passed through by the vehicles for the duration of their journeys from a pre-decided local source to a local destination in a structured manner. A set of proper description illustrating the paths traversed by the vehicles as logical behavioral arrangements is describedin this paper. The data gathering scheme based on secure authentication to gather the data from the vehicles is proposed in this paper. This proposed data gathering scheme based on secure authentication is compared with the existing data gathering schemes by using veins framework and the results of analysis reflect that the proposed scheme outperforms among others. The data collected from the vehicles by the proposed data gathering scheme is stored at distributed road side units (RSUs). From these collected paths, the common and frequent paths opted by the vehicles in a certain region are determined by using frequent arrangement mining approach. An estimation model is used to decidethe next path and the whole path map opted by the vehicles in unusual situations like accident, jams, or a particular time of day. The proposed scheme will helpthe society in reducing the waiting time in vent of emergency or normal working days.展开更多
In vehicular ad-hoc networks (VANETs), store-carry-forward approach may be used for data sharing, where moving vehicles carry and exchange data when they go by each other. In this approach, storage resource in a vehic...In vehicular ad-hoc networks (VANETs), store-carry-forward approach may be used for data sharing, where moving vehicles carry and exchange data when they go by each other. In this approach, storage resource in a vehicle is generally limited. Therefore, attributes of data that have to be stored in vehicles are an important factor in order to efficiently distribute desired data. In VANETs, there are different types of data which depend on the time and location. Such kind of data cannot be deployed adequately to the requesting vehicles only by popularity-based rule. In this paper, we propose a data distribution method that takes into account the effective life and area in addition to popularity of data. Our extensive simulation results demonstrate drastic improvements on acquisition performance of the time and area specific data.展开更多
There is a significant increase in the rates of vehicle accidents in countries around the world and also the casualties involved ever year. New technologies have been explored relating to the Vehicular Ad Hoc Network ...There is a significant increase in the rates of vehicle accidents in countries around the world and also the casualties involved ever year. New technologies have been explored relating to the Vehicular Ad Hoc Network (VANET) due to the increase in vehicular traffic/congestions around us. Vehicular communication is very important as technology has evolved. The research of VANET and development of proposed systems and implementation would increase safety among road users and improve the comfort for the corresponding passengers, drivers and also other road users, and a great improvement in the traffic efficiency would be achieved. This research paper investigates the current and existing security issues associated with the VANET and exposes any slack amongst them in order to lighten possible problem domains in this field.展开更多
The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the Internet of Vehicles(IoV).With the rapid development of computation and communication technologies,IoV pr...The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the Internet of Vehicles(IoV).With the rapid development of computation and communication technologies,IoV promises huge commercial interest and research value,thereby attracting a large number of companies and researchers.This paper proposes an abstract network model of the IoV,discusses the technologies required to create the IoV,presents different applications based on certain currently existing technologies,provides several open research challenges and describes essential future research in the area of IoV.展开更多
Trust is one of the core components of any ad hoc network security system.Trust management(TM)has always been a challenging issue in a vehicular network.One such developing network is the Internet of vehicles(IoV),whi...Trust is one of the core components of any ad hoc network security system.Trust management(TM)has always been a challenging issue in a vehicular network.One such developing network is the Internet of vehicles(IoV),which is expected to be an essential part of smart cities.IoV originated from the merger of Vehicular ad hoc networks(VANET)and the Internet of things(IoT).Security is one of the main barriers in the on-road IoV implementation.Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements.Trust plays a vital role in ensuring security,especially during vehicle to vehicle communication.Vehicular networks,having a unique nature among other wireless ad hoc networks,require dedicated efforts to develop trust protocols.Current TM schemes are inflexible and static.Predefined scenarios and limited parameters are the basis for existing TM models that are not suitable for vehicle networks.The vehicular network requires agile and adaptive solutions to ensure security,especially when it comes to critical messages.The vehicle network’s wireless nature increases its attack surface and exposes the network to numerous security threats.Moreover,internet involvement makes it more vulnerable to cyberattacks.The proposed TM framework is based on context-based cognition and machine learning to be best suited to IoV dynamics.Machine learning is the best solution to utilize the big data produced by vehicle sensors.To handle the uncertainty Bayesian machine learning statistical model is used.The proposed framework can adapt scenarios dynamically and infer using the maximum possible parameter available.The results indicated better performance than existing TM methods.Furthermore,for future work,a high-level machine learning model is proposed.展开更多
When a natural disaster such as earthquake strikes, people go away to safety areas by cars. Some roads are broken and impenetrable by buildings falling down. Furthermore, some fixed infrastructures for radio communica...When a natural disaster such as earthquake strikes, people go away to safety areas by cars. Some roads are broken and impenetrable by buildings falling down. Furthermore, some fixed infrastructures for radio communication may be broken. In order to quickly bring ambulances and fire trucks to their destinations, it is necessary to provide real-time road conditions to these emergency vehicles via ad-hoc networks. In this paper, we propose a method to periodically reconstruct a route for an emergency vehicle by collecting real-time road conditions via vehicle ad-hoc networks. As simulation results, we confirmed that the proposed method collects 12% more road conditions than existing method. We also confirmed that the proposed method achieves 10% faster arrival than the existing method.展开更多
提供车辆位置服务是车载网络(vehicle ad hoc networks,VANETs)的重要应用。而用户(车辆行驶人)希望他的位置信息只能暴露于他授权的消息发送者,这就涉及位置隐私问题。提出基于代理重加密的安全位置服务算法(proxy re-encryption-based...提供车辆位置服务是车载网络(vehicle ad hoc networks,VANETs)的重要应用。而用户(车辆行驶人)希望他的位置信息只能暴露于他授权的消息发送者,这就涉及位置隐私问题。提出基于代理重加密的安全位置服务算法(proxy re-encryption-based secure location service,PRESLS)。PRESLS算法采用中心管理模式,并由交通信息港(traffic information center,TIC)扮演中心管理者,且由TIC维持车辆轨迹数据,同时,TIC作为车辆与路边设施单元的中介,使得路边设施单元能安全地共享轨迹数据。利用代理重加密算法,使得轨迹数据不仅对未授权的实体,而且对TIC也是隐匿的,进而实现了位置数据所保密性。通过安全性能分析和基于地图位置服务(map-based location service,MBLS)的实验评估PRESLS算法的性能。分析表明,车辆能够控制仅由车辆允可的路边设施单元才能接入车辆的轨迹数据。同时,基于MBLS的实验数据表明,PRESLS算法在维持车辆轨迹数据安全的同时,并没有降低位置查询成功率。展开更多
This paper explains trajectory-based data forwarding schemes for multihop data delivery in vehicular networks where the trajectory is the GPS navigation path for driving in a road network. Nowadays, GPS-based navigati...This paper explains trajectory-based data forwarding schemes for multihop data delivery in vehicular networks where the trajectory is the GPS navigation path for driving in a road network. Nowadays, GPS-based navigation is popular with drivers either for efficient driv- ing in unfamiliar road networks or for a better route, even in familiar road networks with heavy traffic. In this paper, we describe how to take advantage of vehicle trajectories in order to design data-forwarding schemes for information exchange in vehicular networks. The design of data-forwarding schemes takes into account not only the macro-scoped mobility of vehicular traffic statistics in road net- works, but also the micro-scoped mobility of individual vehicle trajectories. This paper addresses the importance of vehicle trajectory in the design of multihop vehicle-to-infrastructure, infrastructure-to-vehicle, and vehicle-to-vehicle data forwarding schemes. First, we explain the modeling of packet delivery delay and vehicle travel delay in both a road segment and an end-to-end path in a road net- work. Second, we describe a state-of-the-art data forwarding scheme using vehicular traffic statistics for the estimation of the end-to- end delivery delay as a forwarding metric. Last, we describe two data forwarding schemes based on both vehicle trajectory and vehicu- lar traffic statistics in a privacy-preserving manner.展开更多
文摘As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles.
基金This work was supported in part by the Australian Research Council Discovery Early Career Researcher Award under Grant DE200101128.
文摘This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency.
基金partially supported by National Key Research and Development Program of China(2016YFB0200400)National Natural Science Foundation of China(No.61379157)+1 种基金Program of Science and Technology of Guangdong(No.2015B010111001)MOE-CMCC Joint Research Fund of China(No.MCM20160104)
文摘This paper comes up with a SDN Based Vehicle Ad-Hoc On-Demand Routing Protocol(SVAO),which separates the data forwarding layer and network control layer,as in software defined networking(SDN),to enhance data transmission efficiency within vehicle ad-hoc networks(VANETs).The roadside service unit plays the role of local controller and is in charge of selecting vehicles to forward packets within a road segment.All the vehicles state in the road.Correspondingly,a two-level design is used.The global level is distributed and adopts a ranked query scheme to collect vehicle information and determine the road segments along which a message should be forwarded.On the other hand,the local level is in charge of selecting forwarding vehicles in each road segment determined by the global level.We implement two routing algorithms of SVAO,and compare their performance in our simulation.We compare SVAO with popular ad-hoc network routing protocols,including Optimized Link State Routing(OLSR),Dynamic Source Routing(DSR),Destination Sequence Distance Vector(DSDV),and distance-based routing protocol(DB)via simulations.We consider the impact of vehicle density,speed on data transmission rate and average packet delay.The simulation results show that SVAO performs better than the others in large-scale networks or with high vehicle speeds.
基金supported by National Basic Research Program of China (2013CB329005)National Natural Science Foundation of China (61302100, 61201162, 61471203)+1 种基金Basic Research Program of Jiangsu Province (BK2011027)Specialized Research Fund for the Doctoral Program of Higher Education (20133223120002)
文摘In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship between expiration probability and minimum window size was reached by building a Markov model. According to this conclusion, a back-off algorithm based on adjusting the size of minimum contention window called CEB is proposed, and this algorithm is on the basis of the differential size between the number of expiration beacons and preset threshold. Simulations were done to compare the performance of CEB with that of RBEB and BEB, and the results show that the performance of the new proposed algorithm is better than that of RBEB and BEB.
基金Chinese National High Technology Research and Development Program(No.2014BAG03B03)
文摘With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs.
基金the Iran Telecommunication Research Center (ITRC)
文摘Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.
基金partially supported by the Fundamental Research Funds for the Central Universities under Grant No.2015JBM009the National Natural Science Foundation of China(NSFC) under Grant 61602030 U1404611,61301081+1 种基金the Project Funded by China Postdoctoral Science Foundation under Grant No.2016T90031,2015M570028 and 2015M580970the Program for Science & Technology Innovation Talents in the University of Henan Province under Grant No.16HASTIT035
文摘Mobile multimedia streaming is an open topic in vehicular environment.Due to the high intermittent links,it has become a critical challenge to deliver high quality video streaming in vehicular networks.In this paper,we reform the Information Centric Networking(ICN) concept for multimedia delivery in urban vehicular networks.By leveraging the ICN perspective,we highlight that vehicular peers can obtain multimedia chunks via the vehicle-to-cloud(V2C) approach to improve the delivery quality.Based on this,we propose a lightweight multipath selection strategy to guide the network system to adaptively adjust the forwarding means.Extensive simulations show that the proposed solution can optimize the utilization of network paths,lighten network loads as well as avoid wasting resources.
基金supported in part by the Office of Research and Sponsored Programs,Kean University,the RIF Activity Code 23009 of Zayed University,UAE,and the National Natural Science Foundation of China under Grant 62172366.
文摘The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL.
文摘Logical behavioral arrangements are a class of conventional arrangements to illustrate the happening of incidents in an appropriate and structured approach in vehicular ad hoc network (VANET). These incidents are characterized as a list of path segments that are passed through by the vehicles for the duration of their journeys from a pre-decided local source to a local destination in a structured manner. A set of proper description illustrating the paths traversed by the vehicles as logical behavioral arrangements is describedin this paper. The data gathering scheme based on secure authentication to gather the data from the vehicles is proposed in this paper. This proposed data gathering scheme based on secure authentication is compared with the existing data gathering schemes by using veins framework and the results of analysis reflect that the proposed scheme outperforms among others. The data collected from the vehicles by the proposed data gathering scheme is stored at distributed road side units (RSUs). From these collected paths, the common and frequent paths opted by the vehicles in a certain region are determined by using frequent arrangement mining approach. An estimation model is used to decidethe next path and the whole path map opted by the vehicles in unusual situations like accident, jams, or a particular time of day. The proposed scheme will helpthe society in reducing the waiting time in vent of emergency or normal working days.
文摘In vehicular ad-hoc networks (VANETs), store-carry-forward approach may be used for data sharing, where moving vehicles carry and exchange data when they go by each other. In this approach, storage resource in a vehicle is generally limited. Therefore, attributes of data that have to be stored in vehicles are an important factor in order to efficiently distribute desired data. In VANETs, there are different types of data which depend on the time and location. Such kind of data cannot be deployed adequately to the requesting vehicles only by popularity-based rule. In this paper, we propose a data distribution method that takes into account the effective life and area in addition to popularity of data. Our extensive simulation results demonstrate drastic improvements on acquisition performance of the time and area specific data.
文摘There is a significant increase in the rates of vehicle accidents in countries around the world and also the casualties involved ever year. New technologies have been explored relating to the Vehicular Ad Hoc Network (VANET) due to the increase in vehicular traffic/congestions around us. Vehicular communication is very important as technology has evolved. The research of VANET and development of proposed systems and implementation would increase safety among road users and improve the comfort for the corresponding passengers, drivers and also other road users, and a great improvement in the traffic efficiency would be achieved. This research paper investigates the current and existing security issues associated with the VANET and exposes any slack amongst them in order to lighten possible problem domains in this field.
基金supported by the Natural Science Foundation of Beijing under Grant No.4132048,NSFC(61472047),and NSFC(61202435)
文摘The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the Internet of Vehicles(IoV).With the rapid development of computation and communication technologies,IoV promises huge commercial interest and research value,thereby attracting a large number of companies and researchers.This paper proposes an abstract network model of the IoV,discusses the technologies required to create the IoV,presents different applications based on certain currently existing technologies,provides several open research challenges and describes essential future research in the area of IoV.
基金The work is partially funded by CGS Universiti Teknologi PETRONAS,Malaysia.
文摘Trust is one of the core components of any ad hoc network security system.Trust management(TM)has always been a challenging issue in a vehicular network.One such developing network is the Internet of vehicles(IoV),which is expected to be an essential part of smart cities.IoV originated from the merger of Vehicular ad hoc networks(VANET)and the Internet of things(IoT).Security is one of the main barriers in the on-road IoV implementation.Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements.Trust plays a vital role in ensuring security,especially during vehicle to vehicle communication.Vehicular networks,having a unique nature among other wireless ad hoc networks,require dedicated efforts to develop trust protocols.Current TM schemes are inflexible and static.Predefined scenarios and limited parameters are the basis for existing TM models that are not suitable for vehicle networks.The vehicular network requires agile and adaptive solutions to ensure security,especially when it comes to critical messages.The vehicle network’s wireless nature increases its attack surface and exposes the network to numerous security threats.Moreover,internet involvement makes it more vulnerable to cyberattacks.The proposed TM framework is based on context-based cognition and machine learning to be best suited to IoV dynamics.Machine learning is the best solution to utilize the big data produced by vehicle sensors.To handle the uncertainty Bayesian machine learning statistical model is used.The proposed framework can adapt scenarios dynamically and infer using the maximum possible parameter available.The results indicated better performance than existing TM methods.Furthermore,for future work,a high-level machine learning model is proposed.
文摘When a natural disaster such as earthquake strikes, people go away to safety areas by cars. Some roads are broken and impenetrable by buildings falling down. Furthermore, some fixed infrastructures for radio communication may be broken. In order to quickly bring ambulances and fire trucks to their destinations, it is necessary to provide real-time road conditions to these emergency vehicles via ad-hoc networks. In this paper, we propose a method to periodically reconstruct a route for an emergency vehicle by collecting real-time road conditions via vehicle ad-hoc networks. As simulation results, we confirmed that the proposed method collects 12% more road conditions than existing method. We also confirmed that the proposed method achieves 10% faster arrival than the existing method.
文摘提供车辆位置服务是车载网络(vehicle ad hoc networks,VANETs)的重要应用。而用户(车辆行驶人)希望他的位置信息只能暴露于他授权的消息发送者,这就涉及位置隐私问题。提出基于代理重加密的安全位置服务算法(proxy re-encryption-based secure location service,PRESLS)。PRESLS算法采用中心管理模式,并由交通信息港(traffic information center,TIC)扮演中心管理者,且由TIC维持车辆轨迹数据,同时,TIC作为车辆与路边设施单元的中介,使得路边设施单元能安全地共享轨迹数据。利用代理重加密算法,使得轨迹数据不仅对未授权的实体,而且对TIC也是隐匿的,进而实现了位置数据所保密性。通过安全性能分析和基于地图位置服务(map-based location service,MBLS)的实验评估PRESLS算法的性能。分析表明,车辆能够控制仅由车辆允可的路边设施单元才能接入车辆的轨迹数据。同时,基于MBLS的实验数据表明,PRESLS算法在维持车辆轨迹数据安全的同时,并没有降低位置查询成功率。
基金supported by Faculty Research Fund,Sungkyunkwan University,2013 and by DGIST CPS Global Centerpartly supported by Next-Generation Information Computing Development Program through the National Research Foundation of Korea(NRF)+1 种基金funded by the Ministry of Science,ICT & Future Planning(No.2012033347)the ITR & D program of MKE/KEIT(10041244,SmartTV 2.0 Software Platform)
文摘This paper explains trajectory-based data forwarding schemes for multihop data delivery in vehicular networks where the trajectory is the GPS navigation path for driving in a road network. Nowadays, GPS-based navigation is popular with drivers either for efficient driv- ing in unfamiliar road networks or for a better route, even in familiar road networks with heavy traffic. In this paper, we describe how to take advantage of vehicle trajectories in order to design data-forwarding schemes for information exchange in vehicular networks. The design of data-forwarding schemes takes into account not only the macro-scoped mobility of vehicular traffic statistics in road net- works, but also the micro-scoped mobility of individual vehicle trajectories. This paper addresses the importance of vehicle trajectory in the design of multihop vehicle-to-infrastructure, infrastructure-to-vehicle, and vehicle-to-vehicle data forwarding schemes. First, we explain the modeling of packet delivery delay and vehicle travel delay in both a road segment and an end-to-end path in a road net- work. Second, we describe a state-of-the-art data forwarding scheme using vehicular traffic statistics for the estimation of the end-to- end delivery delay as a forwarding metric. Last, we describe two data forwarding schemes based on both vehicle trajectory and vehicu- lar traffic statistics in a privacy-preserving manner.