278 research outputs found

    Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks

    Get PDF
    Mobile Ad hoc NETwork (MANET) is a type of wireless network consisting of a set of self-configured mobile hosts that can communicate with each other using wireless links without the assistance of any fixed infrastructure. This has made possible to create a distributed mobile computing application and has also brought several new challenges in distributed algorithm design. Checkpointing is a well explored fault tolerance technique for the wired and cellular mobile networks. However, it is not directly applicable to MANET due to its dynamic topology, limited availability of stable storage, partitioning and the absence of fixed infrastructure. In this paper, we propose an adaptive, coordinated and non-blocking checkpointing algorithm to provide fault tolerance in cluster based MANET, where only minimum number of mobile hosts in the cluster should take checkpoints. The performance analysis and simulation results show that the proposed scheme performs well compared to works related

    A Framework for Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks

    Get PDF
    Traffic management centers (TMCs) need high-quality data regarding the status of roadways for monitoring and delivering up-to-date traffic conditions to the traveling public. Currently this data is measured at static points on the roadway using technologies that have significant maintenance requirements. To obtain an accurate picture of traffic on any road section at any time requires a real-time probe of vehicles traveling in that section. We envision a near-term future where network communication devices are commonly included in new vehicles. These devices will allow vehicles to form vehicular networks allowing communication among themselves, other vehicles, and roadside units (RSUs) to improve driver safety, provide enhanced monitoring to TMCs, and deliver real-time traffic conditions to drivers. In this dissertation, we contribute and develop a framework for dynamic trafficmonitoring (DTMon) using vehicular networks. We introduce RSUs called task organizers (TOs) that can communicate with equipped vehicles and with a TMC. These TOs can be programmed by the TMC to task vehicles with performing traffic measurements over various sections of the roadway. Measurement points for TOs, or virtual strips, can be changed dynamically, placed anywhere within several kilometers of the TO, and used to measure wide areas of the roadway network. This is a vast improvement over current technology. We analyze the ability of a TO, or multiple TOs, to monitor high-quality traffic datain various traffic conditions (e.g., free flow traffic, transient flow traffic, traffic with congestion, etc.). We show that DTMon can accurately monitor speed and travel times in both free-flow and traffic with transient congestion. For some types of data, the percentage of equipped vehicles, or the market penetration rate, affects the quality of data gathered. Thus, we investigate methods for mitigating the effects of low penetration rate as well as low traffic density on data quality using DTMon. This includes studying the deployment of multiple TOs in a region and the use of oncoming traffic to help bridge gaps in connectivity. We show that DTMon can have a large impact on traffic monitoring. Traffic engineers can take advantage of the programmability of TOs, giving them the ability to measure traffic at any point within several km of a TO. Most real-time traffic maps measure traffic at midpoint of roads between interchanges and the use of this framework would allow for virtual strips to be placed at various locations in between interchanges, providing fine-grained measurements to TMCs. In addition, the measurement points can be adjusted as traffic conditions change. An important application of this is end-of-queue management. Traffic engineers are very interested in deliver timely information to drivers approaching congestion endpoints to improve safety. We show the ability of DTMon in detecting the end of the queue during congestion

    Experimenting with commodity 802.11 hardware: overview and future directions

    Get PDF
    The huge adoption of 802.11 technologies has triggered a vast amount of experimentally-driven research works. These works range from performance analysis to protocol enhancements, including the proposal of novel applications and services. Due to the affordability of the technology, this experimental research is typically based on commercial off-the-shelf (COTS) devices, and, given the rate at which 802.11 releases new standards (which are adopted into new, affordable devices), the field is likely to continue to produce results. In this paper, we review and categorise the most prevalent works carried out with 802.11 COTS devices over the past 15 years, to present a timely snapshot of the areas that have attracted the most attention so far, through a taxonomy that distinguishes between performance studies, enhancements, services, and methodology. In this way, we provide a quick overview of the results achieved by the research community that enables prospective authors to identify potential areas of new research, some of which are discussed after the presentation of the survey.This work has been partly supported by the European Community through the CROWD project (FP7-ICT-318115) and by the Madrid Regional Government through the TIGRE5-CM program (S2013/ICE-2919).Publicad

    Clustering algorithms to further enhance predictable situational data in vehicular ad-hoc networks

    Get PDF
    The modern world is constantly in a state of technological revolution. Everyday some new technological idea, invention, or threat emerges. With modern computer software and hardware advancements, we have the emergence of more internet-enabled devices - or, Internet of Things (IoT) devices. We can now create large networks with any device to gather real-time information about an environment. In conjunction, modern car companies across the board have a push from public demand for a fully-autonomous car. In order to accomplish autonomy safely and effectively, Vehicular Ad-Hoc Networks (VANETs) must be established for a local group of cars and their environment to ensure all correct and relevant information is communicated throughout the network. The data collected in a VANET can be passed to machine learning models in order to predict possible conditions and detect anomalies. This thesis explores different ways of clustering local groups of vehicles along with machine learning algorithms to predict where vehicles are likely to be and detect false or impossible information

    HyTasker:Hybrid Task Allocation in Mobile Crowd Sensing

    Get PDF
    Task allocation is a major challenge in Mobile Crowd Sensing (MCS). While previous task allocation approaches follow either the opportunistic or participatory mode, this paper proposes to integrate these two complementary modes in a two-phased hybrid framework called HyTasker. In the offline phase, a group of workers (called opportunistic workers ) are selected, and they complete MCS tasks during their daily routines (i.e., opportunistic mode). In the online phase, we assign another set of workers (called participatory workers ) and require them to move specifically to perform tasks that are not completed by the opportunistic workers (i.e., participatory mode). Instead of considering these two phases separately, HyTasker jointly optimizes them with a total incentive budget constraint. In particular, when selecting opportunistic workers in the offline phase of HyTasker, we propose a novel algorithm that simultaneously considers the predicted task assignment for the participatory workers, in which the density and mobility of participatory workers are taken into account. Experiments on two real-world mobility datasets demonstrate that HyTasker outperforms other methods with more completed tasks under the same budget constraint

    Hardware Assisted Solutions for Automobile Security

    Get PDF
    In the past couple of decades, many in-vehicle features have been invented and deployed in order to make modern vehicles which not only safer and more reliable but also connected, smarter, and intelligent. Meanwhile, vehicular ad-hoc networks (VANETs) are proposed to provide communications between vehicles and road-side stations as the foundation of the intelligent transportation system to provide efficient and safe transportation. To support these updated functions, a large amount of electronic equipment has been integrated into the car system. Although these add-on functions around vehicles offer great help in driving assistance, they inevitably introduced new security vulnerabilities that threaten the safety of the on-board drivers, passengers and pedestrians. This has been demonstrated by many well-documented attacks either on the in-vehicle bus system or on the wireless vehicular network communications. In this dissertation, we design and implement several hardware-oriented solutions to the arousing security issues on vehicles. More specifically, we focus on three important and representative problems: (1) how to secure the in-vehicle Controller Area Network (CAN), (2) how to secure the communication between vehicle and outside, and (3) how to establish trust on VANETs. Current approaches based on cryptographic algorithms to secure CAN bus violate the strict timing and limited resource constraints for CAN communications. We thus emphasize on the alternate solution of intrusion detection system (IDS) in this dissertation. We explore monitoring the changes of CAN message content or the physical delay of its transmission to detect on the CAN bus. We first propose a new entropy-based IDS following the observation that all the known CAN message injection attacks need to alter the CAN identifier bit. Thus, analyzing the entropy changes of such bits can be an effective way to detect those attacks. Next, we develop a delay-based IDS to protect the CAN network by identifying the location of the compromised Electronic Control Unit (ECU) from the transmission delay difference to two terminals connected to the CAN bus. We demonstrate that both approaches can protect the integrity of the messages on CAN bus leading to a further improve the security and safety of autonomous vehicles. In the second part of this dissertation, we consider Plug-and-Secure, an industrial practice on key management for automotive CAN networks. It has been proven to be information theoretically secure. However, we discover side-channel attacks based on the physical properties of the CAN bus that can leak almost the entire secret key bits. We analyze the fundamental characteristics that lead to such attacks and propose techniques to minimize information leakage at the hardware level. Next, we extend our study from in-vehicle secure CAN communication to the communication between vehicle and outside world. We take the example of the popular GPS spoofing attack and show how we can use the rich information from CAN bus to build a cross-validation system to detect such attacks. Our approach is based on the belief that the local driving data from the in-vehicle network can be authenticated and thus trusted by secure CAN networks mechanisms. Such data can be used to cross-validate the GPS signals from the satellite which are vulnerable to spoofing attacks. We conduct driving tests on real roads to show that our proposed approach can defend both GPS spoofing attacks and location-based attacks on the VANETs. Finally, we propose a blockchain based Anonymous Reputation System (BARS) to establish a privacy-preserving trust model for VANETs. The certificate and revocation transparency is implemented efficiently with the proofs of presence and absence based on the extended blockchain technology. To prevent the broadcast of forged messages, a reputation evaluation algorithm is presented relying on both direct historical interactions of that vehicle and indirect opinions from the other vehicles. This dissertation features solutions to vehicle security problems based on hardware or physical characteristics, instead of cryptographic algorithms. We believe that given the critical timing requirement on vehicular systems and their very limited resource (such as the bandwidth on CAN bus), this will be a very promising direction to secure vehicles and vehicular network

    MANAGING THE EFFECTS OF WIRELESS SENSORS ON VEHICLE AD HOC NETWORK (VANET) SAFETY

    Get PDF
    This paper proposes to conduct research on the vehicular ad hoc networks (VANET) area of Intelligent Transportation Systems (ITS) with a focus on investigating safety methods that will significantly reduce passenger vehicle collisions which ultimately will help to save lives and reduce property losses. Key areas of this ITS research will include highway infrastructure or wireless sensor networks (WSN) to the cloud (web service) and the cloud (web service) to highway infrastructure or wireless sensor network (WSN). In turn, the cloud (web service) will communicate with passenger vehicles as components of a highway infrastructure (WSN) to vehicle (I2V) systems and a vehicle to highway infrastructure (V2I) systems. In turn, the cloud (web service) will communicate with passenger vehicles as components of a vehicle to highway infrastructure (V2I) system and a highway infrastructure to vehicle (I2V) system. Active circuit emulation will be used as an analysis tool for this research. The cloud web service in this case, will be a database that will be connected through an IEEE802.11 broadband (Wi-Fi) gateway via a border router or a network capable application processor (NCAP) to hardware and software wireless sensor networks or a simulated wireless network. The highway infrastructure portion of this design will be the IEEE1451 standard-based wireless sensor network called wireless transducer interface modules (WTIM). These WTIMs will be responsible for disseminating information from their multitude of sensors to vehicles and/or to the cloud via NCAP routers

    Performance analysis of 4G wireless networks using system level simulator

    Get PDF
    Doutoramento em Engenharia ElectrotécnicaIn the last decade, mobile wireless communications have witnessed an explosive growth in the user’s penetration rate and their widespread deployment around the globe. In particular, a research topic of particular relevance in telecommunications nowadays is related to the design and implementation of mobile communication systems of 4th generation (4G). 4G networks will be characterized by the support of multiple radio access technologies in a core network fully compliant with the Internet Protocol (all IP paradigms). Such networks will sustain the stringent quality of service (QoS) requirements and the expected high data rates from the type of multimedia applications (i.e. YouTube and Skype) to be available in the near future. Therefore, 4G wireless communications system will be of paramount importance on the development of the information society in the near future. As 4G wireless services will continue to increase, this will put more and more pressure on the spectrum availability. There is a worldwide recognition that methods of spectrum managements have reached their limit and are no longer optimal, therefore new paradigms must be sought. Studies show that most of the assigned spectrum is under-utilized, thus the problem in most cases is inefficient spectrum management rather spectrum shortage. There are currently trends towards a more liberalized approach of spectrum management, which are tightly linked to what is commonly termed as Cognitive Radio (CR). Furthermore, conventional deployment of 4G wireless systems (one BS in cell and mobile deploy around it) are known to have problems in providing fairness (users closer to the BS are more benefited relatively to the cell edge users) and in covering some zones affected by shadowing, therefore the use of relays has been proposed as a solution. To evaluate and analyse the performances of 4G wireless systems software tools are normally used. Software tools have become more and more mature in recent years and their need to provide a high level evaluation of proposed algorithms and protocols is now more important. The system level simulation (SLS) tools provide a fundamental and flexible way to test all the envisioned algorithms and protocols under realistic conditions, without the need to deal with the problems of live networks or reduced scope prototypes. Furthermore, the tools allow network designers a rapid collection of a wide range of performance metrics that are useful for the analysis and optimization of different algorithms. This dissertation proposes the design and implementation of conventional system level simulator (SLS), which afterwards enhances for the 4G wireless technologies namely cognitive Radios (IEEE802.22) and Relays (IEEE802.16j). SLS is then used for the analysis of proposed algorithms and protocols.FC

    Interference charecterisation, location and bandwidth estimation in emerging WiFi networks

    Get PDF
    Wireless LAN technology based on the IEEE 802.11 standard, commonly referred to as WiFi, has been hugely successful not only for the last hop access to the Internet in home, office and hotspot scenarios but also for realising wireless backhaul in mesh networks and for point -to -point long- distance wireless communication. This success can be mainly attributed to two reasons: low cost of 802.11 hardware from reaching economies of scale, and operation in the unlicensed bands of wireless spectrum.The popularity of WiFi, in particular for indoor wireless access at homes and offices, has led to significant amount of research effort looking at the performance issues arising from various factors, including interference, CSMA/CA based MAC protocol used by 802.11 devices, the impact of link and physical layer overheads on application performance, and spatio-temporal channel variations. These factors affect the performance of applications and services that run over WiFi networks. In this thesis, we experimentally investigate the effects of some of the above mentioned factors in the context of emerging WiFi network scenarios such as multi- interface indoor mesh networks, 802.11n -based WiFi networks and WiFi networks with virtual access points (VAPs). More specifically, this thesis comprises of four experimental characterisation studies: (i) measure prevalence and severity of co- channel interference in urban WiFi deployments; (ii) characterise interference in multi- interface indoor mesh networks; (iii) study the effect of spatio-temporal channel variations, VAPs and multi -band operation on WiFi fingerprinting based location estimation; and (iv) study the effects of newly introduced features in 802.11n like frame aggregation (FA) on available bandwidth estimation.With growing density of WiFi deployments especially in urban areas, co- channel interference becomes a major factor that adversely affects network performance. To characterise the nature of this phenomena at a city scale, we propose using a new measurement methodology called mobile crowdsensing. The idea is to leverage commodity smartphones and the natural mobility of people to characterise urban WiFi co- channel interference. Specifically, we report measurement results obtained for Edinburgh, a representative European city, on detecting the presence of deployed WiFi APs via the mobile crowdsensing approach. These show that few channels in 2.4GHz are heavily used and there is hardly any activity in the 5GHz band even though relatively it has a greater number of available channels. Spatial analysis of spectrum usage reveals that co- channel interference among nearby APs operating in the same channel can be a serious problem with around 10 APs contending with each other in many locations. We find that the characteristics of WiFi deployments at city -scale are similar to those of WiFi deployments in public spaces of different indoor environments. We validate our approach in comparison with wardriving, and also show that our findings generally match with previous studies based on other measurement approaches. As an application of the mobile crowdsensing based urban WiFi monitoring, we outline a cloud based WiFi router configuration service for better interference management with global awareness in urban areas.For mesh networks, the use of multiple radio interfaces is widely seen as a practical way to achieve high end -to -end network performance and better utilisation of available spectrum. However this gives rise to another type of interference (referred to as coexistence interference) due to co- location of multiple radio interfaces. We show that such interference can be so severe that it prevents concurrent successful operation of collocated interfaces even when they use channels from widely different frequency bands. We propose the use of antenna polarisation to mitigate such interference and experimentally study its benefits in both multi -band and single -band configurations. In particular, we show that using differently polarised antennas on a multi -radio platform can be a helpful counteracting mechanism for alleviating receiver blocking and adjacent channel interference phenomena that underlie multi -radio coexistence interference. We also validate observations about adjacent channel interference from previous studies via direct and microscopic observation of MAC behaviour.Location is an indispensable information for navigation and sensing applications. The rapidly growing adoption of smartphones has resulted in a plethora of mobile applications that rely on position information (e.g., shopping apps that use user position information to recommend products to users and help them to find what they want in the store). WiFi fingerprinting is a popular and well studied approach for indoor location estimation that leverages the existing WiFi infrastructure and works based on the difference in strengths of the received AP signals at different locations. However, understanding the impact of WiFi network deployment aspects such as multi -band APs and VAPs has not received much attention in the literature. We first examine the impact of various aspects underlying a WiFi fingerprinting system. Specifically, we investigate different definitions for fingerprinting and location estimation algorithms across different indoor environments ranging from a multi- storey office building to shopping centres of different sizes. Our results show that the fingerprint definition is as important as the choice of location estimation algorithm and there is no single combination of these two that works across all environments or even all floors of a given environment. We then consider the effect of WiFi frequency bands (e.g., 2.4GHz and 5GHz) and the presence of virtual access points (VAPs) on location accuracy with WiFi fingerprinting. Our results demonstrate that lower co- channel interference in the 5GHz band yields more accurate location estimation. We show that the inclusion of VAPs has a significant impact on the location accuracy of WiFi fingerprinting systems; we analyse the potential reasons to explain the findings.End -to -end available bandwidth estimation (ABE) has a wide range of uses, from adaptive application content delivery, transport-level transmission rate adaptation and admission control to traffic engineering and peer node selection in peer -to- peer /overlay networks [ 1, 2]. Given its importance, it has been received much research attention in both wired data networks and legacy WiFi networks (based on 802.11 a/b /g standards), resulting in different ABE techniques and tools proposed to optimise different criteria and suit different scenarios. However, effects of new MAC/PHY layer enhancements in new and next generation WiFi networks (based on 802.11n and 802.11ac standards) have not been studied yet. We experimentally find that among different new features like frame aggregation, channel bonding and MIMO modes (spacial division multiplexing), frame aggregation has the most harmful effect as it has direct effect on ABE by distorting the measurement probing traffic pattern commonly used to estimate available bandwidth. Frame aggregation is also specified in both 802.11n and 802.1 lac standards as a mandatory feature to be supported. We study the effect of enabling frame aggregation, for the first time, on the performance of the ABE using an indoor 802.11n wireless testbed. The analysis of results obtained using three tools - representing two main Probe Rate Model (PRM) and Probe Gap Model (PGM) based approaches for ABE - led us to come up with the two key principles of jumbo probes and having longer measurement probe train sizes to counter the effects of aggregating frames on the performance of ABE tools. Then, we develop a new tool, WBest+ that is aware of the underlying frame aggregation by incorporating these principles. The experimental evaluation of WBest+ shows more accurate ABE in the presence of frame aggregation.Overall, the contributions of this thesis fall in three categories - experimental characterisation, measurement techniques and mitigation/solution approaches for performance problems in emerging WiFi network scenarios. The influence of various factors mentioned above are all studied via experimental evaluation in a testbed or real - world setting. Specifically, co- existence interference characterisation and evaluation of available bandwidth techniques are done using indoor testbeds, whereas characterisation of urban WiFi networks and WiFi fingerprinting based location estimation are carried out in real environments. New measurement approaches are also introduced to aid better experimental evaluation or proposed as new measurement tools. These include mobile crowdsensing based WiFi monitoring; MAC/PHY layer monitoring of co- existence interference; and WBest+ tool for available bandwidth estimation. Finally, new mitigation approaches are proposed to address challenges and problems identified throughout the characterisation studies. These include: a proposal for crowd - based interference management in large scale uncoordinated WiFi networks; exploiting antenna polarisation diversity to remedy the effects of co- existence interference in multi -interface platforms; taking advantage of VAPs and multi -band operation for better location estimation; and introducing the jumbo frame concept and longer probe train sizes to improve performance of ABE tools in next generation WiFi networks
    corecore