6,723 research outputs found

    Cognitive radio-enabled Internet of Vehicles (IoVs): a cooperative spectrum sensing and allocation for vehicular communication

    Get PDF
    Internet of Things (IoTs) era is expected to empower all aspects of Intelligent Transportation System (ITS) to improve transport safety and reduce road accidents. US Federal Communication Commission (FCC) officially allocated 75MHz spectrum in the 5.9GHz band to support vehicular communication which many studies have found insufficient. In this paper, we studied the application of Cognitive Radio (CR) technology to IoVs in order to increase the spectrum resource opportunities available for vehicular communication, especially when the officially allocated 75MHz spectrum in 5.9GHz band is not enough due to high demands as a result of increasing number of connected vehicles as already foreseen in the near era of IoTs. We proposed a novel CR Assisted Vehicular NETwork (CRAVNET) framework which empowers CR enabled vehicles to make opportunistic usage of licensed spectrum bands on the highways. We also developed a novel co-operative three-state spectrum sensing and allocation model which makes CR vehicular secondary units (SUs) aware of additional spectrum resources opportunities on their current and future positions and applies optimal sensing node allocation algorithm to guarantee timely acquisition of the available channels within a limited sensing time. The results of the theoretical analyses and simulation experiments have demonstrated that the proposed model can significantly improve the performance of a cooperative spectrum sensing and provide vehicles with additional spectrum opportunities without harmful interference against the Primary Users (PUs) activities

    Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected Vehicles

    Full text link
    Vehicular Ad-hoc Networks (VANET) enable efficient communication between vehicles with the aim of improving road safety. However, the growing number of vehicles in dense regions and obstacle shadowing regions like Manhattan and other downtown areas leads to frequent disconnection problems resulting in disrupted radio wave propagation between vehicles. To address this issue and to transmit critical messages between vehicles and drones deployed from service vehicles to overcome road incidents and obstacles, we proposed a hybrid technique based on fog computing called Hybrid-Vehfog to disseminate messages in obstacle shadowing regions, and multi-hop technique to disseminate messages in non-obstacle shadowing regions. Our proposed algorithm dynamically adapts to changes in an environment and benefits in efficiency with robust drone deployment capability as needed. Performance of Hybrid-Vehfog is carried out in Network Simulator (NS-2) and Simulation of Urban Mobility (SUMO) simulators. The results showed that Hybrid-Vehfog outperformed Cloud-assisted Message Downlink Dissemination Scheme (CMDS), Cross-Layer Broadcast Protocol (CLBP), PEer-to-Peer protocol for Allocated REsource (PrEPARE), Fog-Named Data Networking (NDN) with mobility, and flooding schemes at all vehicle densities and simulation times

    Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion

    Full text link
    Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization. Due to the vulnerable nature of wireless communication against interference and intentional jamming, ITS face new challenges to ensure the reliability and the safety of the overall system. In this paper, we expose a class of stealthy attacks -- Stuck in Traffic (SiT) attacks -- that aim to cause congestion by exploiting how drivers make decisions based on smart traffic signs. An attacker mounting a SiT attack solves a Markov Decision Process problem to find optimal/suboptimal attack policies in which he/she interferes with a well-chosen subset of signals that are based on the state of the system. We apply Approximate Policy Iteration (API) algorithms to derive potent attack policies. We evaluate their performance on a number of systems and compare them to other attack policies including random, myopic and DoS attack policies. The generated policies, albeit suboptimal, are shown to significantly outperform other attack policies as they maximize the expected cumulative reward from the standpoint of the attacker

    Computational Intelligence Inspired Data Delivery for Vehicle-to-Roadside Communications

    Get PDF
    We propose a vehicle-to-roadside communication protocol based on distributed clustering where a coalitional game approach is used to stimulate the vehicles to join a cluster, and a fuzzy logic algorithm is employed to generate stable clusters by considering multiple metrics of vehicle velocity, moving pattern, and signal qualities between vehicles. A reinforcement learning algorithm with game theory based reward allocation is employed to guide each vehicle to select the route that can maximize the whole network performance. The protocol is integrated with a multi-hop data delivery virtualization scheme that works on the top of the transport layer and provides high performance for multi-hop end-to-end data transmissions. We conduct realistic computer simulations to show the performance advantage of the protocol over other approaches

    Timely and reliable packets delivery over Internet of Vehicles (IoVs) for road accidents prevention: a cross-layer approach

    Get PDF
    With the envisioned era of Internet of Things (IoTs), all aspects of Intelligent Transportation Systems (ITS) will be connected to improve transport safety, relieve traffic congestion, reduce air pollution, enhance the comfort of transportation and significantly reduce road accidents. In IoVs, regular exchange of current position, direction, velocity, etc., enables mobile vehicles to predict an upcoming accident and alert the human drivers in time or proactively take precautionary actions to avoid the accident. The actualization of this concept requires the use of channel access protocols that can guarantee reliable and timely broadcast of safety messages. This paper investigates the application of network coding concept to increase content of every transmission and achieve improved broadcast reliability with less number of retransmission. In particular, we proposed Code Aided Retransmission-based Error Recovery (CARER) scheme, introduced an RTB/CTB handshake to overcome hidden node problem and reduce packets collision rate. In order to avoid broadcast storm problem associated with the use of RTB/CTB packet in a broadcast transmission, we developed a rebroadcasting metric used to successfully select a vehicle to rebroadcast the encoded message. The performance of CARER protocol is clearly shown with detailed theoretical analysis and further validated with simulation experiments
    corecore