343 research outputs found

    Applications

    Get PDF
    Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications

    Routing protocol for V2X communications for Urban VANETs

    Get PDF
    Intelligent Transportation Systems (ITSs) have been attracting tremendous attention in both academia and industry due to emerging applications that pave the way towards safer enjoyable journeys and inclusive digital partnerships. Undoubtedly, these ITS applications will demand robust routing protocols that not only focus on Inter-Vehicle Communications but also on providing fast, reliable, and secure access to the infrastructure. This thesis aims mainly to introduce the challenges of data packets routing through urban environment using the help of infrastructure. Broadcasting transmission is an essential operational technique that serves a broad range of applications which demand different restrictive QoS provisioning levels. Although broadcast communication has been investigated widely in highway vehicular networks, it is undoubtedly still a challenge in the urban environment due to the obstacles, such as high buildings. In this thesis, the Road-Topology based Broadcast Protocol (RTBP) is proposed, a distance and contention-based forwarding scheme suitable for both urban and highway vehicular environments. RTBP aims at assigning the highest forwarding priority to a vehicle, called a mobile repeater, having the greatest capability to send the packet in multiple directions. In this way, RTBP effectively reduces the number of competing vehicles and minimises the number of hops required to retransmit the broadcast packets around the intersections to cover the targeted area. By investigating the RTBP under realistic urban scenarios against well-known broadcast protocols, eMDR and TAF, that are dedicated to retransmitting the packets around intersections, the results showed the superiority of the RTBP in delivering the most critical warning information for 90% of vehicles with significantly lower delay of 58% and 70% compared to eMDR and TAF. The validation of this performance was clear when the increase in the number of vehicles. Secondly, a Fast and Reliable Hybrid routing (FRHR) protocol is introduced for efficient infrastructure access which is capable of handling efficient vehicle to vehicle communications. Interface to infrastructure is provided by carefully placed RoadSide Units (RSUs) which broadcast beacons in a multi-hop fashion in constrained areas. This enables vehicles proactively to maintain fresh minimum-delay routes to other RSUs while reactively discovering routes to nearby vehicles. The proposed protocol utilizes RSUs connected to the wired backbone network to relay packets toward remote vehicles. A vehicle selects an RSU to register with according to the expected mean delay instead of the device’s remoteness. The FRHR performance is evaluated against established infrastructure routing protocols, Trafroute, IGSR and RBVT-R that are dedicated to for urban environment, the results showed an improvement of 20% to 33% in terms of packet delivery ratio and lower latency particularly in sparse networks due to its rapid response to changes in network connectivity. Thirdly, focusing on increasing FRHR’s capability to provide more stable and durable routes to support the QoS requirements of expected wide-range ITS applications on the urban environment, a new route selection mechanism is introduced, aiming at selecting highly connected crossroads. The new protocol is called, Stable Infrastructure Routing Protocol (SIRP). Intensive simulation results showed that SIRP offers low end-to-end delay and high delivery ratio with varying traffic density, while resolving the problem of frequent link failures

    A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

    Full text link
    Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. In this survey, we aimed to present a comprehensive detailed approach to security by classifying possible attacks against UAVs and flying ad hoc networks (FANETs). We classified the security threats into four major categories that make up the basic structure of UAVs; hardware attacks, software attacks, sensor attacks, and communication attacks. In addition, countermeasures against these attacks are presented in separate groups as prevention and detection. In particular, we focus on the security of FANETs, which face significant security challenges due to their characteristics and are also vulnerable to insider attacks. Therefore, this survey presents a review of the security fundamentals for FANETs, and also four different routing attacks against FANETs are simulated with realistic parameters and then analyzed. Finally, limitations and open issues are also discussed to direct future wor

    Cálculo científico distribuido sobre clientes móviles indeterminados en redes MANETs

    Get PDF
    La tecnología wireless en los últimos años ha experimentado una expansión sin precedentes, alcanzando hasta el lugar más recóndito de la tierra. La tecnología inalámbrica permite la creación de redes sin la necesidad de cables, dando al usuario de este tipo de redes la libertad de moverse por su entorno sin la restricción de movilidad asociada a tener una conexión cableada. El mejor exponente del salto tecnológico que experimentan las redes wireless son las MANET (Mobile Ad hoc Networks, Redes móviles ad hoc) que se presentan como la arquitectura de comunicación más flexible que existe actualmente. Este tipo de redes esta integrado por sistemas autónomos móviles con capacidades de enrutamiento y conectados a través de enlaces inalámbricos formando un grafo de comunicación arbitrario. Utilizar las redes móviles ad hoc para desarrollar un esquema de computación distribuida sobre dispositivos heterogéneos que pueda explotar las crecientes capacidades de cómputo de estos, es la motivación principal del estudio plasmado en este documento. La mayor dificultad que se debe superar es encontrar un mecanismo para manejar la indeterminación de las unidades de red disponibles para balancear la carga en el procesamiento distribuido. Esta indeterminación es provocada mayoritariamente por la movilidad de los nodos que conforman estas redes. En este trabajo se propone el diseño de un protocolo que combina un enfoque para lidiar con la indeterminación de clientes al momento de comenzar un cálculo científico distribuido basado en un diseño cross layer con un mecanismo que agrupa los dispositivos presentes en una MANET en clusters, sacando rédito de la heterogeneidad inherente a este tipo de redes a fin de determinar que dispositivos serán los lideres de los agrupamientos conformados. La propuesta de solución implementada se basa en el protocolo de enrutamiento reactivo AODV (Ad hoc On-demand Distance Vector), la cual modifica los formatos de mensajes para dar soporte a toda la nueva funcionalidad. El método de validación de la propuesta presentada en esta investigación se delinea a través de la definición de diversas pruebas de rendimiento bajo diferentes valores en los parámetros que fijan: el número de dispositivos, la movilidad, el tamaño del área de circulación, entre otros; que al dimensionar los valores registrados vía métricas estándar permitirán arribar a los resultados de su desempeño.Facultad de Informátic

    Reliable Data Transmission in Challenging Vehicular Network using Delay Tolerant Network

    Get PDF
    In the 21st century, there has been an increasing tendency toward the wide adoption of wireless networks and technologies due to their significant advantages such as flexibility, mobility, accessibility, and low cost. Wireless technologies have therefore become essential factors in the improvement of intra-vehicle road safety in Vehicular Ad-hoc Network (VANET), which potentially reduce road traffic accidents by enabling efficient exchange of information between vehicles in the early stages. However, due to the inherent high mobility and rapid change of topology, there are numerous challenges in VANET. Hence, different software packages have been combined in this project to create the VANET environment, whereby the Objective Modular Network Testbed (OMNeT++) and the Simulation of Urban Mobility (SUMO), along with Vehicles in Network Simulation (VEINS) are integrated to model the VANET environment. Also, Delay Tolerant Network (DTN) are implemented in the Opportunistic Network Environment (ONE) simulator, where the Store-Carry-Forward technique is used to route traffic. When network resources are not limited, a high delivery ratio is possible. However, when network resources are scarce, these protocols will have a low delivery ratio and high overhead. Due to these limitations, in this research, an extensive performance evaluation of various routing protocols for DTN with different buffer management policies, giving insight into the impact of these policies on DTN routing protocol performance has been conducted. The empirical study gave insight into the strengths and limitations of the existing protocols thus enabling the selection of the benchmark protocols utilized in evaluating a new Enhanced Message Replication Technique (EMRT) proposed in this thesis. The main contribution of this thesis is the design, implementation, and evaluation of a novel EMRT that dynamically adjusts the number of message replicas based on a node's ability to quickly disseminate the message and maximize the delivery ratio. EMRT is evaluated using three different quota protocols: Spray&Wait, Encounter Based Routing (EBR), and Destination Based Routing Protocol (DBRP). Simulation results show that applying EMRT to these protocols improves the delivery ratio while reducing overhead ratio and latency average. For example, when combined with Spray&Wait, EBR, and DBRP, the delivery probability is improved by 13%, 8%, and 10%, respectively, while the latency average is reduced by 51%, 14%, and 13%, respectively

    Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks

    Get PDF
    This book presents collective works published in the recent Special Issue (SI) entitled "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks”. These works expose the readership to the latest solutions and techniques for MANETs and VANETs. They cover interesting topics such as power-aware optimization solutions for MANETs, data dissemination in VANETs, adaptive multi-hop broadcast schemes for VANETs, multi-metric routing protocols for VANETs, and incentive mechanisms to encourage the distribution of information in VANETs. The book demonstrates pioneering work in these fields, investigates novel solutions and methods, and discusses future trends in these field

    Trust-based energy efficient routing protocol for wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) consist of a number of distributed sensor nodes that are connected within a specified area. Generally, WSN is used for monitoring purposes and can be applied in many fields including health, environmental and habitat monitoring, weather forecasting, home automation, and in the military. Similar, to traditional wired networks, WSNs require security measures to ensure a trustworthy environment for communication. However, due to deployment scenarios nodes are exposed to physical capture and inclusion of malicious node led to internal network attacks hence providing the reliable delivery of data and trustworthy communication environment is a real challenge. Also, malicious nodes intentionally dropping data packets, spreading false reporting, and degrading the network performance. Trust based security solutions are regarded as a significant measure to improve the sensor network security, integrity, and identification of malicious nodes. Another extremely important issue for WSNs is energy conversation and efficiency, as energy sources and battery capacity are often limited, meaning that the implementation of efficient, reliable data delivery is an equally important consideration that is made more challenging due to the unpredictable behaviour of sensor nodes. Thus, this research aims to develop a trust and energy efficient routing protocol that ensures a trustworthy environment for communication and reliable delivery of data. Firstly, a Belief based Trust Evaluation Scheme (BTES) is proposed that identifies malicious nodes and maintains a trustworthy environment among sensor nodes while reducing the impact of false reporting. Secondly, a State based Energy Calculation Scheme (SECS) is proposed which periodically evaluates node energy levels, leading to increased network lifetime. Finally, as an integrated outcome of these two schemes, a Trust and Energy Efficient Path Selection (TEEPS) protocol has been proposed. The proposed protocol is benchmarked with A Trust-based Neighbour selection system using activation function (AF-TNS), and with A Novel Trust of dynamic optimization (Trust-Doe). The experimental results show that the proposed protocol performs better as compared to existing schemes in terms of throughput (by 40.14%), packet delivery ratio (by 28.91%), and end-to-end delay (by 41.86%). In conclusion, the proposed routing protocol able to identify malicious nodes provides a trustworthy environment and improves network energy efficiency and lifetime
    corecore