90 research outputs found

    Performance analysis of communication model on position based routing protocol: Review analysis

    Get PDF
    Research on the Vanet system has its own challenges and obstacles with the communication system between nodes being the main issue. Four categories in the Vanet system topology, namely position based routing protocols, broadcast based routing protocols, cluster based routing protocols and multicast/geocast routing protocols, have fundamental differences, especially in the concept of sending data and information between nodes. For this reason, in this study, the selection of standardization and integration of data delivery between nodes is of particular relevance. The ability to send data properly in busy and fast traffic conditions is another challenge. For this, there are many variables that must be considered to improve communication between nodes

    Integrating Drones and Wireless Power Transfer into Beyond 5G Networks

    Get PDF
    As fifth generation (5G) standards have been established and 5G commercial products are just around the corner, both academia and industry have started to look at requirements for beyond 5G networks. Network flexibility and long battery life are among the key requirements for beyond 5G wireless communication systems. These critical requirements, which have not been sufficiently addressed in the previous generations, are the focus of this thesis. The first half of this thesis explores two important use cases of drones to provide flexible communication networks. First, the performance of a cellular network with underlay drone cell for temporary events inside a stadium is studied. Using stochastic geometry, a general analytical framework is proposed to analyze the uplink and the downlink coverage probabilities for both the aerial and the terrestrial systems. Our results show that for urban environment and dense urban environment, the drone is best deployed at a low height (e.g., 200 m or lower), regardless of the distance between the center of the stadium and the terrestrial base station. However, for suburban environment and high-rise urban environment, the best drone altitude varies. Second, the performance of emergency information dissemination in public safety scenarios using drone is studied. A drone-assisted multihop multicast device-to-device (D2D) network is considered, where an emergency alert message broadcasted by a drone at the first time slot is multicasted by the D2D users that have successfully received the message through multihop. The impact of different system parameters on the link and the network performance is investigated. Our results demonstrate that a higher drone altitude provides better link and network coverage probabilities and lower mean local delay. Under practical setups, the cell edge user located 2 km from the ground projection of the drone has a link coverage probability around 90% after 5 time slots and a mean local delay of 2.32 time slots with a drone height as low as 200 m. The second half of this thesis investigates wireless power transfer networks. Specifically, the use of power beacons in a millimeter wave wireless ad hoc network is considered, where transmitters adopt the harvest-then-transmit protocol. First, the characteristic of the aggregate received power from power beacons is analyzed and the lognormal distribution is found to provide the best complementary cumulative distribution function approximation compared to other distributions considered in the literature. Then, a tractable model with discrete transmit power for each transmitter is proposed to compute the channel coverage probability and the total coverage probability. Our results show that our model provides a good accuracy and reveal the impact of different system parameters on the total coverage probability. Our results also illustrate that under practical setups, for power beacon transmit power of 50 dBm and transmitters with maximum transmit power between 20 - 40 dBm, which are safe for human exposure, the total coverage probability is around 90%. Thus, it is feasible and safe to power transmitters in a millimeter wave ad hoc network using power beacons

    Opportunistic Spectrum Utilization for Vehicular Communication Networks

    Get PDF
    Recently, vehicular networks (VANETs), has become the key technology of the next-generation intelligent transportation systems (ITS). By incorporating wireless communication and networking capabilities into automobiles, information can be efficiently and reliably disseminated among vehicles, road side units, and infrastructure, which enables a number of novel applications enhancing the road safety and providing the drivers/passengers with an information-rich environment. With the development of mobile Internet, people want to enjoy the Internet access in vehicles just as anywhere else. This fact, along with the soaring number of connected vehicles and the emerging data-craving applications and services, has led to a problem of spectrum scarcity, as the current spectrum bands for VANETs are difficult to accommodate the increasing mobile data demands. In this thesis, we aim to solve this problem by utilizing extra spectrum bands, which are not originally allocated for vehicular communications. In this case, the spectrum usage is based on an opportunistic manner, where the spectrum is not available if the primary system is active, or the vehicle is outside the service coverage due to the high mobility. We will analyze the features of such opportunistic spectrum, and design efficient protocols to utilize the spectrum for VANETs. Firstly, the application of cognitive radio technologies in VANETs, termed CR-VANETs, is proposed and analyzed. In CR-VANETs, the channel availability is severely affected by the street patterns and the mobility features of vehicles. Therefore, we theoretically analyze the channel availability in urban scenario, and obtain its statistics. Based on the knowledge of channel availability, an efficient channel access scheme for CR-VANETs is then designed and evaluated. Secondly, using WiFi to deliver mobile data, named WiFi offloading, is employed to deliver the mobile data on the road, in order to relieve the burden of the cellular networks, and provide vehicular users with a cost-effective data pipe. Using queueing theory, we analyze the offloading performance with respect to the vehicle mobility model and the users' QoS preferences. Thirdly, we employ device-to-device (D2D) communications in VANETs to further improve the spectrum efficiency. In a vehicular D2D (V-D2D) underlaying cellular network, proximate vehicles can directly communicate with each other with a relatively small transmit power, rather than traversing the base station. Therefore, many current transmissions can co-exist on one spectrum resource block. By utilizing the spatial diversity, the spectrum utilization is greatly enhanced. We study the performance of the V-D2D underlaying cellular network, considering the vehicle mobility and the street pattern. We also investigate the impact of the preference of D2D/cellular mode on the interference and network throughput, and obtain the theoretical results. In summary, the analysis and schemes developed in this thesis are useful to understand the future VANETs with heterogeneous access technologies, and provide important guidelines for designing and deploying such networks

    A comprehensive survey of V2X cybersecurity mechanisms and future research paths

    Get PDF
    Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the ”Ministerio de Asuntos Económicos y Transformacion Digital” and the European Union-NextGenerationEU in the frameworks of the ”Plan de Recuperación, Transformación y Resiliencia” and of the ”Mecanismo de Recuperación y Resiliencia” under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version
    corecore