104 research outputs found

    A Study of V2V Communication on VANET: Characteristic, Challenges and Research Trends

    Get PDF
    Vehicle to Vehicle (V2V) communication is a specific type of communication on Vehicular Ad Hoc Network (VANET)  that attracts the great interest of researchers, industries, and government attention in due to its essential application to improve safety driving purposes for the next generation of vehicles. Our paper is a systematic study of V2V communication in VANET that cover the particular research issue, and trends from the recent works of literature. We begin the article with a brief V2V communication concept and the V2V application to safety purposes and non-safety purposes; then, we analyze several problems of V2V communication for VANET related to safety issues and non-safety issues. Next, we provide the trends of the V2V communication application for VANET. Finally, provide SWOT analysis as a discussion to identify opportunities and challenges of V2V communication for VANET in the future. The paper does not include a technical explanation. Still, the article describes the general perspective of VANET to the reader, especially for the beginner reader, who intends to learn about the topic

    Effects of Data Resolution and Human Behavior on Large Scale Evacuation Simulations

    Get PDF
    Traffic Analysis Zones (TAZ) based macroscopic simulation studies are mostly applied in evacuation planning and operation areas. The large size in TAZ and aggregated information of macroscopic simulation underestimate the real evacuation performance. To take advantage of the high resolution demographic data LandScan USA (the zone size is much smaller than TAZ) and agent-based microscopic traffic simulation models, many new problems appeared and novel solutions are needed. A series of studies are conducted using LandScan USA Population Cells (LPC) data for evacuation assignments with different network configurations, travel demand models, and travelers compliance behavior. First, a new Multiple Source Nearest Destination Shortest Path (MSNDSP) problem is defined for generating Origin Destination matrix in evacuation assignments when using LandScan dataset. Second, a new agent-based traffic assignment framework using LandScan and TRANSIMS modules is proposed for evacuation planning and operation study. Impact analysis on traffic analysis area resolutions (TAZ vs LPC), evacuation start times (daytime vs nighttime), and departure time choice models (normal S shape model vs location based model) are studied. Third, based on the proposed framework, multi-scale network configurations (two levels of road networks and two scales of zone sizes) and three routing schemes (shortest network distance, highway biased, and shortest straight-line distance routes) are implemented for the evacuation performance comparison studies. Fourth, to study the impact of human behavior under evacuation operations, travelers compliance behavior with compliance levels from total complied to total non-complied are analyzed.Comment: PhD dissertation. UT Knoxville. 130 pages, 37 figures, 8 tables. University of Tennessee, 2013. http://trace.tennessee.edu/utk_graddiss/259

    Simulating MIMT Attackers' Strategies in VANET to Secure ITS in Smart Cities via Multiverse Optimization-based Hybrid Routing Approach

    Get PDF
    The connection between moving vehicles and stationary Road Side Units is made possible by VANET technology, which is an essential component of Intelligent Transportation Systems. Vanet based intelligent transportation system (ITS) security is major issue in present days. MIMT Attackers' Strategies are taken into account to test the security of VANET based ITS system in present research paper. The major objective of research paper is to evaluate the potential of security model in case of different type of message dropping and delay attack. It is observed that there is probability of message delay, message drop, and message tampering attack in VANET based ITS system. Due to such attacks there is huge impact on content delivery ratio, packet delay and dropping. Thus proposed hybrid routing approach that is considering Multi-verse optimization has been used to simulate the Quantifying MIMT attacks. In present research, Vanet security in case of intelligent transportation system in smart cities has been considered

    Optimization of vehicular networks in smart cities: from agile optimization to learnheuristics and simheuristics

    Get PDF
    Vehicular ad hoc networks (VANETs) are a fundamental component of intelligent transportation systems in smart cities. With the support of open and real-time data, these networks of inter-connected vehicles constitute an ‘Internet of vehicles’ with the potential to significantly enhance citizens’ mobility and last-mile delivery in urban, peri-urban, and metropolitan areas. However, the proper coordination and logistics of VANETs raise a number of optimization challenges that need to be solved. After reviewing the state of the art on the concepts of VANET optimization and open data in smart cities, this paper discusses some of the most relevant optimization challenges in this area. Since most of the optimization problems are related to the need for real-time solutions or to the consideration of uncertainty and dynamic environments, the paper also discusses how some VANET challenges can be addressed with the use of agile optimization algorithms and the combination of metaheuristics with simulation and machine learning methods. The paper also offers a numerical analysis that measures the impact of using these optimization techniques in some related problems. Our numerical analysis, based on real data from Open Data Barcelona, demonstrates that the constructive heuristic outperforms the random scenario in the CDP combined with vehicular networks, resulting in maximizing the minimum distance between facilities while meeting capacity requirements with the fewest facilities.Peer ReviewedPostprint (published version

    Angle-Aware Greedy Forwarding Algorithm for Vehicular Ad Hoc Networks

    Get PDF
    Greedy Perimeter Stateless Routing (GPSR) gives the good forwarding nodes for Mobile Ad Hoc Networks (MANET) but does not provide the right directional forwarding nodes in Vehicular Ad Hoc Network (VANET). This is the fact that MANET uses the nodes without limitations in moving but VANET uses fixed infrastructure in mobility such as roads with lanes. The key of original greedy forwarding is choosing the forwarding node with the shortest distance between the source and the destination. It does not consider the direction of the forwarding nodes, which possibly cause the selected forwarding node going opposite direction from the destination. This paper thus tries to improve the greedy forwarding method of Greedy Perimeter Stateless Routing (GPSR) by taking into considerations in both the distance and the direction. Moreover it shows the mystery of angle that gives the right direction. The optimized GPSR (OGPSR) using improved greedy forwarding provides the better throughput, average end-to-end delay and routing overheads than the original GPSR

    A RELIABILITY-BASED ROUTING PROTOCOL FOR VEHICULAR AD-HOC NETWORKS

    Get PDF
    Vehicular Ad hoc NETworks (VANETs), an emerging technology, would allow vehicles to form a self-organized network without the aid of a permanent infrastructure. As a prerequisite to communication in VANETs, an efficient route between communicating nodes in the network must be established, and the routing protocol must adapt to the rapidly changing topology of vehicles in motion. This is one of the goals of VANET routing protocols. In this thesis, we present an efficient routing protocol for VANETs, called the Reliable Inter-VEhicular Routing (RIVER) protocol. RIVER utilizes an undirected graph that represents the surrounding street layout where the vertices of the graph are points at which streets curve or intersect, and the graph edges represent the street segments between those vertices. Unlike existing protocols, RIVER performs real-time, active traffic monitoring and uses this data and other data gathered through passive mechanisms to assign a reliability rating to each street edge. The protocol then uses these reliability ratings to select the most reliable route. Control messages are used to identify a node’s neighbors, determine the reliability of street edges, and to share street edge reliability information with other nodes
    • …
    corecore