37 research outputs found

    Lightweight Simulation of Hybrid Aerial- and Ground-based Vehicular Communication Networks

    Full text link
    Cooperating small-scale Unmanned Aerial Vehicles (UAVs) will open up new application fields within next-generation Intelligent Transportation Sytems (ITSs), e.g., airborne near field delivery. In order to allow the exploitation of the potentials of hybrid vehicular scenarios, reliable and efficient bidirectional communication has to be guaranteed in highly dynamic environments. For addressing these novel challenges, we present a lightweight framework for integrated simulation of aerial and ground-based vehicular networks. Mobility and communication are natively brought together using a shared codebase coupling approach, which catalyzes the development of novel context-aware optimization methods that exploit interdependencies between both domains. In a proof-of-concept evaluation, we analyze the exploitation of UAVs as local aerial sensors as well as aerial base stations. In addition, we compare the performance of Long Term Evolution (LTE) and Cellular Vehicle-to-Everything (C-V2X) for connecting the ground- and air-based vehicles

    Efficient power control framework for small-cell heterogeneous networks

    Get PDF
    Heterogeneous networks are rapidly emerging as one of the key enablers of beyond fifth-generation (5G) wireless networks. It is gradually becoming clear to the network operators that existing cellular networks may not be able to support the traffic demands of the future. Thus, there is an upsurge in the interest of efficiently deploying small-cell networks for accommodating a growing number of user equipment (UEs). This work further extends the state-of-the-art by proposing an optimization framework for reducing the power consumption of small-cell base stations (BSs). Specifically, a novel algorithm has been proposed which dynamically switches off the redundant small-cell BSs based on the traffic demands of the network. Due to the dynamicity of the formulated problem, a new UE admission control policy has been presented when the problem becomes infeasible to solve. To validate the effectiveness of the proposed solution, the simulation results are compared with conventional techniques. It is shown that the proposed power control solution outperforms the conventional approaches both in terms of accommodating more UEs and reducing power consumption.publishe

    Distributed Cooperative Relaying Based on Space-Time Block Code: System Description and Measurement Campaign

    Get PDF
    In cooperative relaying, intermediate stations are required to enhance the end-to-end transmission performance. The performance of the cooperative relaying scheme has been investigated theoretically and via computer simulations. However, cooperative relaying using transmit diversity techniques in actual environments has not been investigated thus far. This paper presents an experimental system for distributed cooperative relaying using space-time block code and evaluations of its transmission performances in real propagation channels. To this end, four wireless stations-specifically, one source, two relays, and one destination-were developed using analog transceivers and field-programmable gate arrays for real-time digital signal processing. Sample timing and frequency synchronizations among the four wireless stations were established by using the received signals as a reference. The end-to-end error performance of distributed cooperative relaying was compared to those of noncooperative relaying schemes, and the performances of three relaying schemes were evaluated quasisimultaneously in terms of their cumulative distribution functions of the bit-error ratios (BERs). The experimental results indicated that the BER performance of the two-hop distributed cooperative relaying scheme was substantially superior to those of noncooperative two-hop relaying schemes, including a route diversity scheme

    A study of channel and delay-based scheduling algorithms for live video streaming in the fifth generation long term evolution-advanced network

    Get PDF
    This paper investigates the performance of a number of channel and delay-based scheduling algorithms for an efficient QoS (Quality of Service) provision with more live video streaming users over the Fifth Generation Long-Term Evolution-Advanced (5G LTE-A) network. These algorithms were developed for use in legacy wireless networks and minor changes were made to enable these algorithms to perform packet scheduling in the downlink 5G LTE-A. The efficacies of the EXP and M-LWDF algorithms in maximizing the number of live video streaming users at the desired transmission reliability, minimizing the average network delay and maximizing network throughput, are shown via simulations. As the M-LWDF has a simpler mathematical equation as compared to the EXP, it is more favoured for implementation in the complex downlink 5G LTE-A

    Automotive Communication Security Methods and Recommendations for Securing In-vehicle and V2X Communications

    Get PDF
    Today’s vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), together called V2X communications. Such level of connectivity enables car manufacturers to implement new entertainment systems and to provide safety features to decrease the number of road accidents. Moreover, authorities can deploy the traffic information provided by vehicular communications to improve the traffic management. Despite the great benefits that comes with vehicular communications, there are also risks associated with exposing a safety-critical integrated system to external networks. It has already been proved that vehicles can be remotely hacked and the safety critical functions such as braking system and steering wheel can be compromised to endanger the safety of passengers. This putshigh demands on IT security and car manufacturers to secure vehicular communications. This thesis proposes methods and recommendations for improving the security of internal and external vehicular communications.The main contributions of this thesis are contained in six included papers, and cover the following research areas of automotive security: (i) secure network architecture design, (ii) attack protection, (iii) attack detection, and (iv) V2X security. The first two papers in the collection are on the topic of secure network architecture design and propose an automated approach for grouping in-vehicle ECUs into security domains which facilitate the implementation of security measures in in-vehicle networks. The third paper is on the topic of attack protection and evaluates the applicability of existing Controller Area Network (CAN) bus authentication solutions to a vehicular context. In particular, this paper identifies five critical requirements for an authentication solution to be used in such a context. The fourth paper deals with the issue of attack detection in in-vehicle networks and proposes a specification agnostic method for detecting intrusion in vehicles. The fifth paper identifies weaknesses or deficiencies in the design of the ETSI V2X security standard and proposes changes to fix the identified weaknesses or deficiencies. The last paper investigates the security implications of adopting 5G New Radio (NR) for V2X communications

    Autonomous unmanned aerial vehicle for search and rescue using software defined radio

    Get PDF
    To find missing people in a remote area, we propose an autonomous unmanned aerial vehicle (UAV) approach which attempts to locate the target by detecting and localising the radio signals produced by a GSM cell phone. By using a low- weight software defined radio and companion computer, the UAV can act as a GSM base station and induce the missing person's device to attempt to make contact. Through the signal strength values and known UAV location, a series of these contact attempts can be used to quickly and accurately localise their position. As the area in which the missing person might be located may be quite large, and the interaction of radio signals with terrain is potentially complex, an efficient search strategy for exploring the area is required in order to reduce time taken to make contact. We make use of a constraint-based graph-based path planning approach to produce a route for the UAV to traverse in the air passing through expected signals from a large number of possible source locations, and demonstrate through experiments the timely identification and localisation of the cell phone

    SWIPT-Enabled Cooperative NOMA With mth Best Relay Selection

    Get PDF
    Non-orthogonal multiple access (NOMA) was recently regarded as a potential technique for next generation wireless networks. Recent works on relay selection for cooperative NOMA systems have mainly addressed the best relay selection to forward its received signals to terminal nodes. Nonetheless, in practical scenarios, the best relay may be unavailable due to non-ideal conditions such as scheduling and overload constraints or possibly due to channel feedback delay. Therefore, there is compelling need to consider a more practical solution, in which the best available relay is selected. In this article, we examine the error rate performance for simultaneous wireless information and power transfer (SWIPT)-enabled NOMA, while considering the selection of the mth best available relay. In particular, we present an exact pairwise error probability (PEP) expression to obtain a bit error rate (BER) upper bound. The asymptotic PEP is investigated to evaluate the achievable diversity order for NOMA users. Finally, simulation results are provided to verify the accuracy of the derived PEP expressions and to give more insights into the system performance.publishedVersionPeer reviewe

    A novel collaborative IoD-assisted VANET approach for coverage area maximization

    Get PDF
    Internet of Drones (IoD) is an efficient technique that can be integrated with vehicular ad-hoc networks (VANETs) to provide terrestrial communications by acting as an aerial relay when terrestrial infrastructure is unreliable or unavailable. To fully exploit the drones' flexibility and superiority, we propose a novel dynamic IoD collaborative communication approach for urban VANETs. Unlike most of the existing approaches, the IoD nodes are dynamically deployed based on current locations of ground vehicles to effectively mitigate inevitable isolated cars in conventional VANETs. For efficiently coordinating IoD, we model IoD to optimize coverage based on the location of vehicles. The goal is to obtain an efficient IoD deployment to maximize the number of covered vehicles, i.e., minimize the number of isolated vehicles in the target area. More importantly, the proposed approach provides sufficient interconnections between IoD nodes. To do so, an improved version of succinct population-based meta-heuristic, namely Improved Particle Swarm Optimization (IPSO) inspired by food searching behavior of birds or fishes flock, is implemented for IoD assisted VANET (IoDAV). Moreover, the coverage, received signal quality, and IoD connectivity are achieved by IPSO's objective function for optimal IoD deployment at the same time. We carry out an extensive experiment based on the received signal at floating vehicles to examine the proposed IoDAV performance. We compare the results with the baseline VANET with no IoD (NIoD) and Fixed IoD assisted (FIoD). The comparisons are based on the coverage percentage of the ground vehicles and the quality of the received signal. The simulation results demonstrate that the proposed IoDAV approach allows finding the optimal IoD positions throughout the time based on the vehicle's movements and achieves better coverage and better quality of the received signal by finding the most appropriate IoD position compared with NIoD and FIoD schemes. © 2013 IEEE
    corecore