3,171 research outputs found
Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness or Obliviousness?
With the current host-based Internet architecture, networking faces
limitations in dynamic scenarios, due mostly to host mobility. The ICN paradigm
mitigates such problems by releasing the need to have an end-to-end transport
session established during the life time of the data transfer. Moreover, the
ICN concept solves the mismatch between the Internet architecture and the way
users would like to use it: currently a user needs to know the topological
location of the hosts involved in the communication when he/she just wants to
get the data, independently of its location. Most of the research efforts aim
to come up with a stable ICN architecture in fixed networks, with few examples
in ad-hoc and vehicular networks. However, the Internet is becoming more
pervasive with powerful personal mobile devices that allow users to form
dynamic networks in which content may be exchanged at all times and with low
cost. Such pervasive wireless networks suffer with different levels of
disruption given user mobility, physical obstacles, lack of cooperation,
intermittent connectivity, among others. This paper discusses the combination
of content knowledge (e.g., type and interested parties) and social awareness
within opportunistic networking as to drive the deployment of ICN solutions in
disruptive networking scenarios. With this goal in mind, we go over few
examples of social-aware content-based opportunistic networking proposals that
consider social awareness to allow content dissemination independently of the
level of network disruption. To show how much content knowledge can improve
social-based solutions, we illustrate by means of simulation some
content-oblivious/oriented proposals in scenarios based on synthetic mobility
patterns and real human traces.Comment: 7 pages, 6 figure
On the Potential of Generic Modeling for VANET Data Aggregation Protocols
In-network data aggregation is a promising communication mechanism to reduce bandwidth requirements of applications in vehicular ad-hoc networks (VANETs). Many aggregation schemes have been proposed, often with varying features. Most aggregation schemes are tailored to specific application scenarios and for specific aggregation operations. Comparative evaluation of different aggregation schemes is therefore difficult. An application centric view of aggregation does also not tap into the potential of cross application aggregation. Generic modeling may help to unlock this potential. We outline a generic modeling approach to enable improved comparability of aggregation schemes and facilitate joint optimization for different applications of aggregation schemes for VANETs. This work outlines the requirements and general concept of a generic modeling approach and identifies open challenges
Spatio-Temporal Motifs for Optimized Vehicle-to-Vehicle (V2V) Communications
Caching popular contents in vehicle-to-vehicle (V2V) communication networks
is expected to play an important role in road traffic management, the
realization of intelligent transportation systems (ITSs), and the delivery of
multimedia content across vehicles. However, for effective caching, the network
must dynamically choose the optimal set of cars that will cache popular content
and disseminate it in the entire network. However, most of the existing prior
art on V2V caching is restricted to cache placement that is solely based on
location and user demands and does not account for the large-scale
spatio-temporal variations in V2V communication networks. In contrast, in this
paper, a novel spatio-temporal caching strategy is proposed based on the notion
of temporal graph motifs that can capture spatio-temporal communication
patterns in V2V networks. It is shown that, by identifying such V2V motifs, the
network can find sub-optimal content placement strategies for effective content
dissemination across a vehicular network. Simulation results using real traces
from the city of Cologne show that the proposed approach can increase the
average data rate by for different network scenarios
A topology-oblivious routing protocol for NDN-VANETs
Vehicular Ad Hoc Networks (VANETs) are characterized by intermittent
connectivity, which leads to failures of end-to-end paths between nodes. Named
Data Networking (NDN) is a network paradigm that deals with such problems,
since information is forwarded based on content and not on the location of the
hosts. In this work, we propose an enhanced routing protocol of our previous
topology-oblivious Multihop, Multipath, and Multichannel NDN for VANETs
(MMM-VNDN) routing strategy that exploits several paths to achieve more
efficient content retrieval. Our new enhanced protocol, i mproved MMM-VNDN
(iMMM-VNDN), creates paths between a requester node and a provider by
broadcasting Interest messages. When a provider responds with a Data message to
a broadcast Interest message, we create unicast routes between nodes, by using
the MAC address(es) as the distinct address(es) of each node. iMMM-VNDN
extracts and thus creates routes based on the MAC addresses from the strategy
layer of an NDN node. Simulation results show that our routing strategy
performs better than other state of the art strategies in terms of Interest
Satisfaction Rate, while keeping the latency and jitter of messages low
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as Man-in-the-Middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate and trusted content within the network. In this paper, we propose a novel trust model, namely, Man-in-the-middle Attack Resistance trust model IN connEcted vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multi-dimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data is then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the bench-marked trust model. Simulation results show that for a network containing 35% MiTM attackers, MARINE outperforms the state of the art trust model by 15%, 18%, and 17% improvements in precision, recall and F-score, respectively.N/A
Requirement analysis for building practical accident warning systems based on vehicular ad-hoc networks
An Accident Warning System (AWS) is a safety application that provides collision avoidance notifications for next generation vehicles whilst Vehicular Ad-hoc Networks (VANETs) provide the communication functionality to exchange these notifi- cations. Despite much previous research, there is little agreement on the requirements for accident warning systems. In order to build a practical warning system, it is important to ascertain the system requirements, information to be exchanged, and protocols needed for communication between vehicles. This paper presents a practical model of an accident warning system by stipulating the requirements in a realistic manner and thoroughly reviewing previous proposals with a view to identify gaps in this area
Persistent Localized Broadcasting in VANETs
We present a communication protocol, called LINGER, for persistent dissemination of delay-tolerant information to vehicular users, within a geographical area of interest. The goal of LINGER is to dispatch and confine information in localized areas of a mobile network with minimal protocol overhead and without requiring knowledge of the vehicles' routes or destinations. LINGER does not require roadside infrastructure support: it selects mobile nodes in a distributed, cooperative way and lets them act as "information bearers", providing uninterrupted information availability within a desired region. We analyze the performance of our dissemination mechanism through extensive simulations, in complex vehicular scenarios with realistic node mobility. The results demonstrate that LINGER represents a viable, appealing alternative to infrastructure-based solutions, as it can successfully drive the information toward a region of interest from a far away source and keep it local with negligible overhead. We show the effectiveness of such an approach in the support of localized broadcasting, in terms of both percentage of informed vehicles and information delivery delay, and we compare its performance to that of a dedicated, state-of-the-art protoco
- …