91 research outputs found

    Dissimilarity metric based on local neighboring information and genetic programming for data dissemination in vehicular ad hoc networks (VANETs)

    Get PDF
    This paper presents a novel dissimilarity metric based on local neighboring information and a genetic programming approach for efficient data dissemination in Vehicular Ad Hoc Networks (VANETs). The primary aim of the dissimilarity metric is to replace the Euclidean distance in probabilistic data dissemination schemes, which use the relative Euclidean distance among vehicles to determine the retransmission probability. The novel dissimilarity metric is obtained by applying a metaheuristic genetic programming approach, which provides a formula that maximizes the Pearson Correlation Coefficient between the novel dissimilarity metric and the Euclidean metric in several representative VANET scenarios. Findings show that the obtained dissimilarity metric correlates with the Euclidean distance up to 8.9% better than classical dissimilarity metrics. Moreover, the obtained dissimilarity metric is evaluated when used in well-known data dissemination schemes, such as p-persistence, polynomial and irresponsible algorithm. The obtained dissimilarity metric achieves significant improvements in terms of reachability in comparison with the classical dissimilarity metrics and the Euclidean metric-based schemes in the studied VANET urban scenarios

    Reliable and enhanced cooperative cross-layer medium access control scheme for vehicular communication

    Get PDF
    In an unreliable cluster-based, broadcast vehicular network setting, we investigate the transmission reliability and throughput performance of random network coding (RNC) as a function of the percentage of packet generation rate and transmit power to noise ratio. In the paper, a novel scheme called reliable and efficient cooperative cross-layer MAC (RECMAC) is proposed. The proposed scheme consists of a source vehicle broadcasting packets to a set of receivers (i.e. one-to-many) over independent broadcast erasure channels. The source vehicle performs RNC on N packets and broadcasts the encoded message to a set of receivers. In each hop, several vehicles form a cluster and cooperatively transmit the encoded or re-encoded packet. The combination of RNC, cluster based, and cooperative communications enables RECMAC to optimally minimize data redundancy, which means less overhead, and improve reliability as opposed to coding-based solutions. Theoretical analyses and simulation results show that under the same conditions RECMAC scheme can achieve improved performance in terms of transmission reliability and throughput

    Detecting Non-Line of Sight to Prevent Accidents in Vehicular Ad hoc Networks

    Get PDF
    There are still many challenges in the field of VANETs that encouraged researchers to conduct further investigation in this field to meet these challenges. The issue pertaining to routing protocols such as delivering the warning messages to the vehicles facing Non-Line of Sight (NLOS) situations without causing the storm problem and channel contention, is regarded as a serious dilemma which is required to be tackled in VANET, especially in congested environments. This requires the designing of an efficient mechanism of routing protocol that can broadcast the warning messages from the emergency vehicles to the vehicles under NLOS, reducing the overhead and increasing the packet delivery ratio with a reduced time delay and channel utilisation. The main aim of this work is to develop the novel routing protocol for a high-density environment in VANET through utilisation of its high mobility features, aid of the sensors such as Global Positioning System (GPS) and Navigation System (NS). In this work, the cooperative approach has been used to develop the routing protocol called the Co-operative Volunteer Protocol (CVP), which uses volunteer vehicles to disseminate the warning message from the source to the target vehicle under NLOS issue; this also increases the packet delivery ratio, detection of NLOS and resolution of NLOS by delivering the warning message successfully to the vehicle under NLOS, thereby causing a direct impact on the reduction of collisions between vehicles in normal mode and emergency mode on the road near intersections or on highways. The cooperative approach adopted for warning message dissemination reduced the rebroadcast rate of messages, thereby decreasing significantly the storm issue and the channel contention. A novel architecture has been developed by utilising the concept of a Context-Aware System (CAS), which clarifies the OBU components and their interaction with each other in order to collect data and take the decisions based on the sensed circumstances. The proposed architecture has been divided into three main phases: sensing, processing and acting. The results obtained from the validation of the proposed CVP protocol using the simulator EstiNet under specific conditions and parameters showed that performance of the proposed protocol is better than that of the GRANT protocol with regard to several metrics such as packet delivery ratio, neighbourhood awareness, channel utilisation, overhead and latency. It is also successfully shown that the proposed CVP could detect the NLOS situation and solves it effectively and efficiently for both the intersection scenario in urban areas and the highway scenario

    An Optimized Node Selection Routing Protocol for Vehicular Ad-hoc Networks – A Hybrid Model

    Get PDF
    Vehicular Ad-hoc networks (VANETs) are a subset of Mobile Ad-hoc Networks made by vehicles communicating among themselves on roadways. The Routing protocols implemented for MANETs such as Ad-hoc on Demand Distance Vector Routing Protocol (AODV), Dynamic Source Routing (DSR), and Destination Sequence Distance Vector Routing Protocol (DSDV) are not suitable for VANET due to high Mobility. Trusted routing in VANET is a challenging task due to highly dynamic network topology and openness of wireless architecture. To avoid a frequent communication link failure, to reduce the communication overhead and to provide a trusted routing among the vehicular nodes for achieving high packet transmission, we implemented an Optimized Node Selection Routing protocol (ONSRP) of VANET based on Trust. In our proposed work, we implemented an enhanced routing protocol which prevents the network from communication link failure frequently. The testing results stated that the ONSRP routing have a high performance measures than the above mentioned existing routing protocols

    VANSec Attack Resistant VANETs Security Algorithm in terms of Trust Computation Error and Normalized Routing Overhead

    Get PDF
    open access articleVANET is an application and subclass of MANETs, a quickly maturing, promising, and emerging technology these days. VANETs establish communication among vehicles (V2V) and roadside infrastructure (V2I). As vehicles move with high speed, hence environment and topology change with time. There is no optimum routing protocol which ensures full-pledge on-time delivery of data to destination nodes, and an absolutely optimum scheme design for flawless packet exchange is still a challenging task. In VANETs, accurate and on-time delivery of fundamental safety alert messages (FSAMs) is highly important to withstand against maliciously inserted security threats affectively. In this paper, we have presented a new security-aware routing technique called VANSec. The presented scheme is more immune and resistive against different kinds of attacks and thwarts malicious node penetration attempts to the entire network. It is basically based on trust management approach. The aim of the scheme is to identify malicious data and false nodes. The simulation results of VANSec are compared with already existing techniques called trust and LT in terms of trust computation error (TCE), end-to-end delay (EED), average link duration (ALD), and normalized routing overhead (NRO). In terms of TCE, VANSec is 11.6% and 7.3% efficient than LT and trust, respectively, while from EED comparison we found VANSec to be 57.6% more efficient than trust and 5.2% more efficient than LT. Similarly, in terms of ALD, VANSec provides 29.7% and 7.8% more stable link duration than trust and LT do, respectively, and in terms of NRO, VANSec protocol has 27.5% and 14% lesser load than that of trust and LT, respectively

    A Survey on platoon-based vehicular cyber-physical systems

    Get PDF
    Vehicles on the road with some common interests can cooperatively form a platoon-based driving pattern, in which a vehicle follows another one and maintains a small and nearly constant distance to the preceding vehicle. It has been proved that, compared to driving individually, such a platoon-based driving pattern can significantly improve the road capacity and energy efficiency. Moreover, with the emerging vehicular adhoc network (VANET), the performance of platoon in terms of road capacity, safety and energy efficiency, etc., can be further improved. On the other hand, the physical dynamics of vehicles inside the platoon can also affect the performance of VANET. Such a complex system can be considered as a platoon-based vehicular cyber-physical system (VCPS), which has attracted significant attention recently. In this paper, we present a comprehensive survey on platoon-based VCPS. We first review the related work of platoon-based VCPS. We then introduce two elementary techniques involved in platoon-based VCPS: the vehicular networking architecture and standards, and traffic dynamics, respectively. We further discuss the fundamental issues in platoon-based VCPS, including vehicle platooning/clustering, cooperative adaptive cruise control (CACC), platoon-based vehicular communications, etc., and all of which are characterized by the tight coupled relationship between traffic dynamics and VANET behaviors. Since system verification is critical to VCPS development, we also give an overview of VCPS simulation tools. Finally, we share our view on some open issues that may lead to new research directions

    A Jamming Attacks Detection Approach Based on CNN based Quantum Leap Method for Wireless Sensor Network

    Get PDF
    The wireless sensor network is the most significant largest communication device. WSN has been interfacing with various wireless applications. Because the wireless application needs faster communication and less interruption, the main problem of jamming attacks on wireless networks is that jamming attack detection using various machine learning methods has been used. The reasons for jamming detection may be user behaviour-based and network traffic and energy consumption. The previous machine learning system could not present the jamming attack detection accuracy because the feature selection model of Chi-Squared didn’t perform well for jamming attack detections which determined takes a large dataset to be classified to find the high accuracy for jamming attack detection. To resolve this problem, propose a CNN-based quantum leap method that detects high accuracy for jamming attack detections the WSN-DS dataset collected by the Kaggle repository. Pre-processing using the Z-score Normalization technique will be applied, performing data deviations and assessments from the dataset, and collecting data and checking or evaluating data. Fisher’s Score is used to select the optimal feature of a jamming attack. Finally, the proposed CNN-based quantum leap is used to classify the jamming attacks. The CNN-based quantum leap simulation shows the output for jamming attacks with high precision, high detection, and low false alarm detection

    Minimum node degree of k-connected vehicular ad hoc networks in highway scenarios

    Get PDF
    A vehicular ad hoc network (VANET) is a specific type of mobile ad hoc networks (MANETs); it can provide direct or multi-hop vehicle-to-vehicle (V2V), vehicle-to-roadside (V2R), vehicle-to-pedestrian (V2P), and vehicle-to-internet (V2I)communications based on the pre-existing road layouts. The emerging and promising VANET technologies have drawn tremendous attention from the government, academics, and industry over the past few years and have been increasingly available for a large number of cutting edge applications that can be classified into road safety, traffic efficiency, and infotainment categories. Due to the unique characteristics of VANETs, such as high mobility with an organized but constrained pattern, and diverse radio propagation conditions, the conventional researches dedicated for general MANETs cannot be directly applied to VANETs. This paper presents an analytical framework to investigate the minimum node degree of k-connected VANETs, with a homogeneous range assignment in highway scenarios. We simulate the mobility patterns with realistic vehicular traces, model the network topology as a two-path fading geometric random graph, and conduct extensive experiments on the derived analytical results. Through a combination of mathematical modeling and simulations, we derive a probabilistic bound for the minimum node degree of a homogeneous vehicular ad hoc network in highway scenarios. The analytical framework is useful in the study of connectivity and estimation of performance in one-dimensional vehicular ad hoc networks

    From MANET to people-centric networking: Milestones and open research challenges

    Get PDF
    In this paper, we discuss the state of the art of (mobile) multi-hop ad hoc networking with the aim to present the current status of the research activities and identify the consolidated research areas, with limited research opportunities, and the hot and emerging research areas for which further research is required. We start by briefly discussing the MANET paradigm, and why the research on MANET protocols is now a cold research topic. Then we analyze the active research areas. Specifically, after discussing the wireless-network technologies, we analyze four successful ad hoc networking paradigms, mesh networks, opportunistic networks, vehicular networks, and sensor networks that emerged from the MANET world. We also present an emerging research direction in the multi-hop ad hoc networking field: people centric networking, triggered by the increasing penetration of the smartphones in everyday life, which is generating a people-centric revolution in computing and communications
    corecore