273 research outputs found

    Reliable Message Dissemination in Mobile Vehicular Networks

    Full text link
    Les réseaux véhiculaires accueillent une multitude d’applications d’info-divertissement et de sécurité. Les applications de sécurité visent à améliorer la sécurité sur les routes (éviter les accidents), tandis que les applications d’info-divertissement visent à améliorer l'expérience des passagers. Les applications de sécurité ont des exigences rigides en termes de délais et de fiabilité ; en effet, la diffusion des messages d’urgence (envoyés par un véhicule/émetteur) devrait être fiable et rapide. Notons que, pour diffuser des informations sur une zone de taille plus grande que celle couverte par la portée de transmission d’un émetteur, il est nécessaire d’utiliser un mécanisme de transmission multi-sauts. De nombreuses approches ont été proposées pour assurer la fiabilité et le délai des dites applications. Toutefois, ces méthodes présentent plusieurs lacunes. Cette thèse, nous proposons trois contributions. La première contribution aborde la question de la diffusion fiable des messages d’urgence. A cet égard, un nouveau schéma, appelé REMD, a été proposé. Ce schéma utilise la répétition de message pour offrir une fiabilité garantie, à chaque saut, tout en assurant un court délai. REMD calcule un nombre optimal de répétitions en se basant sur l’estimation de la qualité de réception de lien dans plusieurs locations (appelées cellules) à l’intérieur de la zone couverte par la portée de transmission de l’émetteur. REMD suppose que les qualités de réception de lien des cellules adjacentes sont indépendantes. Il sélectionne, également, un nombre de véhicules, appelés relais, qui coopèrent dans le contexte de la répétition du message d’urgence pour assurer la fiabilité en multi-sauts. La deuxième contribution, appelée BCRB, vise à améliorer REMD ; elle suppose que les qualités de réception de lien des cellules adjacentes sont dépendantes ce qui est, généralement, plus réaliste. BCRB utilise les réseaux Bayésiens pour modéliser les dépendances en vue d’estimer la qualité du lien de réception avec une meilleure précision. La troisième contribution, appelée RICS, offre un accès fiable à Internet. RICS propose un modèle d’optimisation, avec une résolution exacte optimale à l'aide d’une technique de réduction de la dimension spatiale, pour le déploiement des passerelles. Chaque passerelle utilise BCRB pour établir une communication fiable avec les véhicules.Vehicular networks aim to enable a plethora of safety and infotainment applications. Safety applications aim to preserve people's lives (e.g., by helping in avoiding crashes) while infotainment applications focus on enhancing the passengers’ experience. These applications, especially safety applications, have stringent requirements in terms of reliability and delay; indeed, dissemination of an emergency message (e.g., by a vehicle/sender involved in a crash) should be reliable while satisfying short delay requirements. Note, that multi-hop dissemination is needed to reach all vehicles, in the target area, that may be outside the transmission range of the sender. Several schemes have been proposed to provide reliability and short delay for vehicular applications. However, these schemes have several limitations. Thus, the design of new solutions, to meet the requirement of vehicular applications in terms of reliability while keeping low end-to-end delay, is required. In this thesis, we propose three schemes. The first scheme is a multi-hop reliable emergency message dissemination scheme, called REMD, which guarantees a predefined reliability , using message repetitions/retransmissions, while satisfying short delay requirements. It computes an optimal number of repetitions based on the estimation of link reception quality at different locations (called cells) in the transmission range of the sender; REMD assumes that link reception qualities of adjacent cells are independent. It also adequately selects a number of vehicles, called forwarders, that cooperate in repeating the emergency message with the objective to satisfy multi-hop reliability requirements. The second scheme, called BCRB, overcomes the shortcoming of REMD by assuming that link reception qualities of adjacent cells are dependent which is more realistic in real-life scenarios. BCRB makes use of Bayesian networks to model these dependencies; this allows for more accurate estimation of link reception qualities leading to better performance of BCRB. The third scheme, called RICS, provides internet access to vehicles by establishing multi-hop reliable paths to gateways. In RICS, the gateway placement is modeled as a k-center optimisation problem. A space dimension reduction technique is used to solve the problem in exact time. Each gateway makes use of BCRB to establish reliable communication paths to vehicles

    Bayesian approach for the spectrum sensing mimo-cognitive radio network with presence of the uncertainty

    Get PDF
    A cognitive radio technique has the ability to learn. This system not only can observe the surrounding environment, adapt to environmental conditions, but also efficiently use the radio spectrum. This technique allows the secondary users (SUs) to employ the primary users (PUs) spectrum during the band is not being utilized by the user. Cognitive radio has three main steps: sensing of the spectrum, deciding and acting. In the spectrum sensing technique, the channel occupancy is determined with a spectrum sensing approach to detect unused spectrum. In the decision process, sensing results are evaluated and the decision process is then obtained based on these results. In the final process which is called the acting process, the scholar determines how to adjust the parameters of transmission to achieve great performance for the cognitive radio network

    Reliable and secure low energy sensed spectrum communication for time critical cloud computing applications

    Get PDF
    Reliability and security of data transmission and access are of paramount importance to enhance the dependability of time critical remote monitoring systems (e.g. tele-monitoring patients, surveillance of smart grid components). Potential failures for data transmissions include wireless channel unavailability and delays due to the interruptions. Reliable data transmission demands seamless channel availability with minimum delays in spite of interruptions (e.g. fading, denial-of-service attacks). Secure data transmissions require sensed data to be transmitted over unreliable wireless channels with sucient security using suitable encryption techniques. The transmitted data are stored in secure cloud repositories. Potential failures for data access include unsuccessful user authentications due to mis-management of digital identities and insucient permissions to authorize situation specic data access requests. Reliable and secure data access requires robust user authentication and context-dependent authorization to fulll situation specic data utility needs in cloud repositories. The work herein seeks to enhance the dependability of time critical remote monitoring applications, by reducing these failure conditions which may degrade the reliability and security of data transmission or access. As a result of an extensive literature survey, in order to achieve the above said security and reliability, the following areas have been selected for further investigations. The enhancement of opportunistic transmissions in cognitive radio networks to provide greater channel availability as opposed to xed spectrum allocations in conventional wireless networks. Delay sensitive channel access methods to ensure seamless connectivity in spite of multiple interruptions in cognitive radio networks. Energy ecient encryption and route selection mechanisms to enhance both secure and reliable data transmissions. Trustworthy digital identity management in cloud platforms which can facilitate ecient user authentication to ensure reliable access to the sensed remote monitoring data. Context-aware authorizations to reliably handle the exible situation specic data access requests. Main contributions of this thesis include a novel trust metric to select non-malicious cooperative spectrum sensing users to reliably detect vacant channels, a reliable delaysensitive cognitive radio spectrum hand-o management method for seamless connectivity and an energy-aware physical unclonable function based encryption key size selection method for secure data transmission. Furthermore, a trust based identity provider selection method for user authentications and a reliable context-aware situation specic authorization method are developed for more reliable and secure date access in cloud repositories. In conclusion, these contributions can holistically contribute to mitigate the above mentioned failure conditions to achieve the intended dependability of the timecritical remote monitoring applications

    Application of information fusion to unreliable wireless sensor networks

    Get PDF
    Thesis is appropriated analyze to performance metric evaluation for decentralized distributed detection sensor network strategy. Performance metric investigated a typical wireless sensor network with respect to IEEE 802.15.4 standard. Distributed detection is considered with present of the fusion node as long as clustering and non-clustering sensor network. The clusters are organized uniform and non-uniform topology sensor networks with tree-based topologies and hierarchical multi-level fusion centers. Fusion centers are acting as head of cluster for decision making based on majority-like received signal strength (RSS) with comparison an optimized threshold with concerning to channel influence. FCs decisions will forward to Access point (AP). AP behaves similar as a fusion node with same channel affect but in next level of fusing. Decision error probability at Fusion node is taken into the account based on ideal and non-ideal channel with Channel State Information (CSI) impacts. Network average delay, Reliability, Packet failure, Energy consumption, Network aggregation throughput are considered as performance metric parameters versus packets generation rates and two 3,12 (dB) signal to noise ratio. An analytical Markov model IEEE 802.15.4 MAC layer is supposed which characterized the slotted CSMA/CA mechanism of beacon enable mode. Markov model drives the performance metric base on MAC and physical layer cross-layers method and Channel State Information specifications. We assumed the performance metric is evaluated with equation outcome from Markov model with mentioned topology with present of Fusion node. With this combination, a theoretical performance evaluation framework is proposed. Application of fuzzy fusion theory is considered in framework as well. Inference performed with fuzzification, rule evaluation, combination or aggregation of rules, and deffuzification based on most common methods of fuzzy logic Mamdani inference.The two inputs value are the distance of a sensor node from fusion center node (cluster head) and its available RSSI as singnal to noise ratio. Project figured out with simulations of Markov model with proposed framework. Results represent significant enhancement on performance of network and accuracy of received data to fusion nodes actions
    • …
    corecore