562 research outputs found

    Heterogeneous Dynamic Spectrum Access in Cognitive Radio enabled Vehicular Networks Using Network Softwarization

    Get PDF
    Dynamic spectrum access (DSA) in cognitive radio networks (CRNs) is regarded as an emerging technology to solve the spectrum scarcity problem created by static spectrum allocation. In DSA, unlicensed users access idle channels opportunistically, without creating any harmful interference to licensed users. This method will also help to incorporate billions of wireless devices for different applications such as Internet-of-Things, cyber-physical systems, smart grids, etc. Vehicular networks for intelligent transportation cyber-physical systems is emerging concept to improve transportation security and reliability. IEEE 802.11p standard comprising of 7 channels is dedicated for vehicular communications. These channels could be highly congested and may not be able to provide reliable communications in urban areas. Thus, vehicular networks are expected to utilize heterogeneous wireless channels for reliable communications. In this thesis, real-time opportunistic spectrum access in cloud based cognitive radio network (ROAR) architecture is used for energy efficiency and dynamic spectrum access in vehicular networks where geolocation of vehicles is used to find idle channels. Furthermore, a three step mechanism to detect geolocation falsification attacks is presented. Performance is evaluated using simulation results

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    State-of-the-art authentication and verification schemes in VANETs:A survey

    Get PDF
    Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile Ad-Hoc Networks (MANETs), are wireless networks formed around moving vehicles, enabling communication between vehicles, roadside infrastructure, and servers. With the rise of autonomous and connected vehicles, security concerns surrounding VANETs have grown. VANETs still face challenges related to privacy with full-scale deployment due to a lack of user trust. Critical factors shaping VANETs include their dynamic topology and high mobility characteristics. Authentication protocols emerge as the cornerstone of enabling the secure transmission of entities within a VANET. Despite concerted efforts, there remains a need to incorporate verification approaches for refining authentication protocols. Formal verification constitutes a mathematical approach enabling developers to validate protocols and rectify design errors with precision. Therefore, this review focuses on authentication protocols as a pivotal element for securing entity transmission within VANETs. It presents a comparative analysis of existing protocols, identifies research gaps, and introduces a novel framework that incorporates formal verification and threat modeling. The review considers key factors influencing security, sheds light on ongoing challenges, and emphasises the significance of user trust. The proposed framework not only enhances VANET security but also contributes to the growing field of formal verification in the automotive domain. As the outcomes of this study, several research gaps, challenges, and future research directions are identified. These insights would offer valuable guidance for researchers to establish secure authentication communication within VANETs

    Machine learning and blockchain technologies for cybersecurity in connected vehicles

    Get PDF
    Future connected and autonomous vehicles (CAVs) must be secured againstcyberattacks for their everyday functions on the road so that safety of passengersand vehicles can be ensured. This article presents a holistic review of cybersecurityattacks on sensors and threats regardingmulti-modal sensor fusion. A compre-hensive review of cyberattacks on intra-vehicle and inter-vehicle communicationsis presented afterward. Besides the analysis of conventional cybersecurity threatsand countermeasures for CAV systems,a detailed review of modern machinelearning, federated learning, and blockchain approach is also conducted to safe-guard CAVs. Machine learning and data mining-aided intrusion detection systemsand other countermeasures dealing with these challenges are elaborated at theend of the related section. In the last section, research challenges and future direc-tions are identified

    A Comprehensive Survey on Networking over TV White Spaces

    Full text link
    The 2008 Federal Communication Commission (FCC) ruling in the United States opened up new opportunities for unlicensed operation in the TV white space spectrum. Networking protocols over the TV white spaces promise to subdue the shortcomings of existing short-range multi-hop wireless architectures and protocols by offering more availability, wider bandwidth, and longer-range communication. The TV white space protocols are the enabling technologies for sensing and monitoring, Internet-of-Things (IoT), wireless broadband access, real-time, smart and connected community, and smart utility applications. In this paper, we perform a retrospective review of the protocols that have been built over the last decade and also the new challenges and the directions for future work. To the best of our knowledge, this is the first comprehensive survey to present and compare existing networking protocols over the TV white spaces.Comment: 19 page

    Secure Cloud Controlled Software Defined Radio Network For Bandwidth Allocation

    Get PDF
    The purpose of this research is to investigate the impact of mobility of wireless devices for opportunistic spectrum access and communications using National Instrument Universal Software Radio Peripherals devices. The overall system utilizes software defined radio networks for frequency allocation, cloud connectivity to maintain up-to-date information, and moving target defense as a security mechanism. Each USRP device sends its geolocation to query the spectrum database for idle channels. The cloud cluster was designed for complex data storage and allocation using a smart load balancer to offer ultra-security to users. This project also explores the advantages of data protection and security through moving target defense. To achieve this, the system would use an array of antennas to split the data into different parts and transmit them across separate antennas. This research provides the design to each of the mentioned projects for the implementation of a fully developed system

    From MANET to people-centric networking: Milestones and open research challenges

    Get PDF
    In this paper, we discuss the state of the art of (mobile) multi-hop ad hoc networking with the aim to present the current status of the research activities and identify the consolidated research areas, with limited research opportunities, and the hot and emerging research areas for which further research is required. We start by briefly discussing the MANET paradigm, and why the research on MANET protocols is now a cold research topic. Then we analyze the active research areas. Specifically, after discussing the wireless-network technologies, we analyze four successful ad hoc networking paradigms, mesh networks, opportunistic networks, vehicular networks, and sensor networks that emerged from the MANET world. We also present an emerging research direction in the multi-hop ad hoc networking field: people centric networking, triggered by the increasing penetration of the smartphones in everyday life, which is generating a people-centric revolution in computing and communications
    • …
    corecore