87 research outputs found
Soft-Defined Heterogeneous Vehicular Network: Architecture and Challenges
Heterogeneous Vehicular NETworks (HetVNETs) can meet various
quality-of-service (QoS) requirements for intelligent transport system (ITS)
services by integrating different access networks coherently. However, the
current network architecture for HetVNET cannot efficiently deal with the
increasing demands of rapidly changing network landscape. Thanks to the
centralization and flexibility of the cloud radio access network (Cloud-RAN),
soft-defined networking (SDN) can conveniently be applied to support the
dynamic nature of future HetVNET functions and various applications while
reducing the operating costs. In this paper, we first propose the multi-layer
Cloud RAN architecture for implementing the new network, where the multi-domain
resources can be exploited as needed for vehicle users. Then, the high-level
design of soft-defined HetVNET is presented in detail. Finally, we briefly
discuss key challenges and solutions for this new network, corroborating its
feasibility in the emerging fifth-generation (5G) era
Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges
Cloud Computing in VANETs (CC-V) has been investigated into two major themes of research including Vehicular Cloud Computing (VCC) and Vehicle using Cloud (VuC). VCC is the realization of autonomous cloud among vehicles to share their abundant resources. VuC is the efficient usage of conventional cloud by on-road vehicles via a reliable Internet connection. Recently, number of advancements have been made to address the issues and challenges in VCC and VuC. This paper qualitatively reviews CC-V with the emphasis on layered architecture, network component, taxonomy, and future challenges. Specifically, a four-layered architecture for CC-V is proposed including perception, co-ordination, artificial intelligence and smart application layers. Three network component of CC-V namely, vehicle, connection and computation are explored with their cooperative roles. A taxonomy for CC-V is presented considering major themes of research in the area including design of architecture, data dissemination, security, and applications. Related literature on each theme are critically investigated with comparative assessment of recent advances. Finally, some open research challenges are identified as future issues. The challenges are the outcome of the critical and qualitative assessment of literature on CC-V
Performance of management solutions and cooperation approaches for vehicular delay-tolerant networks
A wide range of daily-life applications supported by vehicular networks attracted the interest,
not only from the research community, but also from governments and the automotive
industry. For example, they can be used to enable services that assist drivers on the roads (e.g.,
road safety, traffic monitoring), to spread commercial and entertainment contents (e.g., publicity),
or to enable communications on remote or rural regions where it is not possible to have
a common network infrastructure. Nonetheless, the unique properties of vehicular networks
raise several challenges that greatly impact the deployment of these networks.
Most of the challenges faced by vehicular networks arise from the highly dynamic network
topology, which leads to short and sporadic contact opportunities, disruption, variable
node density, and intermittent connectivity. This situation makes data dissemination an interesting
research topic within the vehicular networking area, which is addressed by this study.
The work described along this thesis is motivated by the need to propose new solutions to deal
with data dissemination problems in vehicular networking focusing on vehicular delay-tolerant
networks (VDTNs).
To guarantee the success of data dissemination in vehicular networks scenarios it is important
to ensure that network nodes cooperate with each other. However, it is not possible
to ensure a fully cooperative scenario. This situation makes vehicular networks suitable to the
presence of selfish and misbehavior nodes, which may result in a significant decrease of the
overall network performance. Thus, cooperative nodes may suffer from the overwhelming load
of services from other nodes, which comprises their performance.
Trying to solve some of these problems, this thesis presents several proposals and studies
on the impact of cooperation, monitoring, and management strategies on the network performance
of the VDTN architecture. The main goal of these proposals is to enhance the network
performance. In particular, cooperation and management approaches are exploited to improve
and optimize the use of network resources. It is demonstrated the performance gains attainable
in a VDTN through both types of approaches, not only in terms of bundle delivery probability,
but also in terms of wasted resources.
The results and achievements observed on this research work are intended to contribute
to the advance of the state-of-the-art on methods and strategies for overcome the challenges
that arise from the unique characteristics and conceptual design of vehicular networks.O vasto número de aplicações e cenários suportados pelas redes veiculares faz com que
estas atraiam o interesse não só da comunidade científica, mas também dos governos e da indústria
automóvel. A título de exemplo, estas podem ser usadas para a implementação de serviços
e aplicações que podem ajudar os condutores dos veículos a tomar decisões nas estradas, para
a disseminação de conteúdos publicitários, ou ainda, para permitir que existam comunicações
em zonas rurais ou remotas onde não é possível ter uma infraestrutura de rede convencional.
Contudo, as propriedades únicas das redes veiculares fazem com que seja necessário ultrapassar
um conjunto de desafios que têm grande impacto na sua aplicabilidade.
A maioria dos desafios que as redes veiculares enfrentam advêm da grande mobilidade dos
veículos e da topologia de rede que está em constante mutação. Esta situação faz com que este
tipo de rede seja suscetível de disrupção, que as oportunidades de contacto sejam escassas e de
curta duração, e que a ligação seja intermitente. Fruto destas adversidades, a disseminação dos
dados torna-se um tópico de investigação bastante promissor na área das redes veiculares e por
esta mesma razão é abordada neste trabalho de investigação. O trabalho descrito nesta tese é
motivado pela necessidade de propor novas abordagens para lidar com os problemas inerentes
à disseminação dos dados em ambientes veiculares.
Para garantir o sucesso da disseminação dos dados em ambientes veiculares é importante
que este tipo de redes garanta a cooperação entre os nós da rede. Contudo, neste tipo de ambientes
não é possível garantir um cenário totalmente cooperativo. Este cenário faz com que
as redes veiculares sejam suscetíveis à presença de nós não cooperativos que comprometem
seriamente o desempenho global da rede. Por outro lado, os nós cooperativos podem ver o seu
desempenho comprometido por causa da sobrecarga de serviços que poderão suportar.
Para tentar resolver alguns destes problemas, esta tese apresenta várias propostas e estudos
sobre o impacto de estratégias de cooperação, monitorização e gestão de rede no desempenho
das redes veiculares com ligações intermitentes (Vehicular Delay-Tolerant Networks
- VDTNs). O objetivo das propostas apresentadas nesta tese é melhorar o desempenho global
da rede. Em particular, as estratégias de cooperação e gestão de rede são exploradas para
melhorar e optimizar o uso dos recursos da rede. Ficou demonstrado que o uso deste tipo de
estratégias e metodologias contribui para um aumento significativo do desempenho da rede,
não só em termos de agregados de pacotes (“bundles”) entregues, mas também na diminuição
do volume de recursos desperdiçados.
Os resultados observados neste trabalho procuram contribuir para o avanço do estado
da arte em métodos e estratégias que visam ultrapassar alguns dos desafios que advêm das
propriedades e desenho conceptual das redes veiculares
SECURITY, PRIVACY AND APPLICATIONS IN VEHICULAR AD HOC NETWORKS
With wireless vehicular communications, Vehicular Ad Hoc Networks (VANETs) enable numerous applications to enhance traffic safety, traffic efficiency, and driving experience. However, VANETs also impose severe security and privacy challenges which need to be thoroughly investigated. In this dissertation, we enhance the security, privacy, and applications of VANETs, by 1) designing application-driven security and privacy solutions for VANETs, and 2) designing appealing VANET applications with proper security and privacy assurance.
First, the security and privacy challenges of VANETs with most application significance are identified and thoroughly investigated. With both theoretical novelty and realistic considerations, these security and privacy schemes are especially appealing to VANETs. Specifically, multi-hop communications in VANETs suffer from packet dropping, packet tampering, and communication failures which have not been satisfyingly tackled in literature. Thus, a lightweight reliable and faithful data packet relaying framework (LEAPER) is proposed to ensure reliable and trustworthy multi-hop communications by enhancing the cooperation of neighboring nodes. Message verification, including both content and signature verification, generally is computation-extensive and incurs severe scalability issues to each node. The resource-aware message verification (RAMV) scheme is proposed to ensure resource-aware, secure, and application-friendly message verification in VANETs.
On the other hand, to make VANETs acceptable to the privacy-sensitive users, the identity and location privacy of each node should be properly protected. To this end, a joint privacy and reputation assurance (JPRA) scheme is proposed to synergistically support privacy protection and reputation management by reconciling their inherent conflicting requirements. Besides, the privacy implications of short-time certificates are thoroughly investigated in a short-time certificates-based privacy protection (STCP2) scheme, to make privacy protection in VANETs feasible with short-time certificates.
Secondly, three novel solutions, namely VANET-based ambient ad dissemination (VAAD), general-purpose automatic survey (GPAS), and VehicleView, are proposed to support the appealing value-added applications based on VANETs. These solutions all follow practical application models, and an incentive-centered architecture is proposed for each solution to balance the conflicting requirements of the involved entities. Besides, the critical security and privacy challenges of these applications are investigated and addressed with novel solutions. Thus, with proper security and privacy assurance, these solutions show great application significance and economic potentials to VANETs.
Thus, by enhancing the security, privacy, and applications of VANETs, this dissertation fills the gap between the existing theoretic research and the realistic implementation of VANETs, facilitating the realistic deployment of VANETs
Recommended from our members
Blockchain based secure message dissemination in vehicular networks
Vehicular ad-hoc networks (VANETs) are one of the key elements in Intelligent Transportation System (ITS) to enable information exchange among vehicles and Roadside Units (RSUs) via vehicle-to-vehicle (V2V) and vehicle-to- nfrastructure (V2I) communications. With continuously increasing number of vehicles on road, there are numerous security and privacy challenges associated with VANETs. Communication among vehicles is needed to be secure and bandwidth efficient. Also, the messages exchanged between vehicles must be authentic so as to maintain a trusted network in a privacy-preserving manner. Furthermore, a sustainable economic model is required to incentivise honest and cooperative vehicles. Traditional security and privacy solutions in centralised networks are not applicable to VANETs due to its distributed nature, heterogeneity, high mobility and low latency requirements. Meanwhile, the new development of blockchain has been attracting significant interests due to its key features including consensus to evaluate message credibility and immutable storage in distributed ledger, which provides an alternative solution to the security and privacy challenges in VANETs.
This thesis aims to present blockchain solutions for the security and privacy of VANETs meeting the stringent requirements of low latency and bandwidth-efficient message dissemination. VANETs are simulated in OMNeT++ to validate the proposed solutions. Specifically, two novel blockchain consensus algorithms have been developed for message authentication and relay selection in presence of malicious vehicles. The first employs a voting based message validation and relay selection, which reduces the failure rate in message validation by 11% as compared to reputation based consensus. The second utilises federated learning supported by blockchain as a better privacy-preserving solution, which is 65.2% faster than the first voting based solution. Both approaches include blockchain-based incentive mechanisms and game theory analysis to observe strategic behaviour of honest and malicious vehicles. To further study the privacy aspect of vehicular networks, the integration of blockchain with physical layer security is also theoretically analysed in Vehicle-to-Everything (V2X) communications scenarios. The integration results in 8.2 Mbps increased goodput as compared to the blockchain solution alone.
In essence, our research work shows that blockchain can offer better control and security, as compared to centralised solutions, if properly adjusted according to the application and network requirements. Thus, the proposed solutions can provide guidelines for practically feasible application of blockchain in vehicular networks
Secured and Cooperative Publish/Subscribe Scheme in Autonomous Vehicular Networks
In order to save computing power yet enhance safety, there is a strong
intention for autonomous vehicles (AVs) in future to drive collaboratively by
sharing sensory data and computing results among neighbors. However, the
intense collaborative computing and data transmissions among unknown others
will inevitably introduce severe security concerns. Aiming at addressing
security concerns in future AVs, in this paper, we develop SPAD, a secured
framework to forbid free-riders and {promote trustworthy data dissemination} in
collaborative autonomous driving. Specifically, we first introduce a
publish/subscribe framework for inter-vehicle data transmissions{. To defend
against free-riding attacks,} we formulate the interactions between publisher
AVs and subscriber AVs as a vehicular publish/subscribe game, {and incentivize
AVs to deliver high-quality data by analyzing the Stackelberg equilibrium of
the game. We also design a reputation evaluation mechanism in the game} to
identify malicious AVs {in disseminating fake information}. {Furthermore, for}
lack of sufficient knowledge on parameters of {the} network model and user cost
model {in dynamic game scenarios}, a two-tier reinforcement learning based
algorithm with hotbooting is developed to obtain the optimal {strategies of
subscriber AVs and publisher AVs with free-rider prevention}. Extensive
simulations are conducted, and the results validate that our SPAD can
effectively {prevent free-riders and enhance the dependability of disseminated
contents,} compared with conventional schemes
A comprehensive survey of V2X cybersecurity mechanisms and future research paths
Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the ”Ministerio de Asuntos Económicos y Transformacion Digital” and the European Union-NextGenerationEU in the frameworks of the ”Plan de Recuperación, Transformación y Resiliencia” and of the ”Mecanismo de Recuperación y Resiliencia” under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version
Computing on the Edge of the Network
Um Systeme der fünften Generation zellularer Kommunikationsnetze (5G) zu ermöglichen, sind Energie effiziente Architekturen erforderlich, die eine zuverlässige Serviceplattform für die Bereitstellung von 5G-Diensten und darüber hinaus bieten können. Device Enhanced Edge Computing ist eine Ableitung des Multi-Access Edge Computing (MEC), das Rechen- und Speicherressourcen direkt auf den Endgeräten bereitstellt. Die Bedeutung dieses Konzepts wird durch die steigenden Anforderungen von rechenintensiven Anwendungen mit extrem niedriger Latenzzeit belegt, die den MEC-Server allein und den drahtlosen Kanal überfordern. Diese Dissertation stellt ein Berechnungs-Auslagerungsframework mit Berücksichtigung von Energie, Mobilität und Anreizen in einem gerätegestützten MEC-System mit mehreren Benutzern und mehreren Aufgaben vor, das die gegenseitige Abhängigkeit der Aufgaben sowie die Latenzanforderungen der Anwendungen berücksichtigt.To enable fifth generation cellular communication network (5G) systems, energy efficient architectures are required that can provide a reliable service platform for the delivery of 5G services and beyond. Device Enhanced Edge Computing is a derivative of Multi-Access Edge Computing (MEC), which provides computing and storage resources directly on the end devices. The importance of this concept is evidenced by the increasing demands of ultra-low latency computationally intensive applications that overwhelm the MEC server alone and the wireless channel. This dissertation presents a computational offloading framework considering energy, mobility and incentives in a multi-user, multi-task device-based MEC system that takes into account task interdependence and application latency requirements
- …