576 research outputs found
A predefined channel coefficients library for vehicle-to-vehicle communications
It is noticeable that most of VANETs communications tests are assessed through simulation. In a majority of simulation results, the physical layer is often affected by an apparent lack of realism. Therefore, vehicular channel model has become a critical issue in the field of intelligent transport systems (ITS). To overcome the lack of realism problem, a more robust channel model is needed to reflect the reality. This paper provides an open access, predefined channel coefficients library. The library is based on 2x2 and 4x4 Multiple – Input – Multiple – Output (MIMO) systems in V2V communications, using a spatial channel model extended SCME which will help to reduce the overall simulation time. In addition, it provides a more realistic channel model for V2V communications; considering: over ranges of speeds, distances, multipath signals, sub-path signals, different angle of arrivals, different angle departures, no line of sight and line of sight. An intensive evaluation process has taken place to validate the library and acceptance results are produced. Having an open access predefined library, enables the researcher at relevant communities to test and evaluate several complicated vehicular communications scenarios in a wider manners with less time and efforts
Efficient medium access control protocol for vehicular ad-hoc networks
Intelligent transportation systems (ITS) have enjoyed a tremendous growth in the last decade and the advancement in communication technologies has played a big role behind the success of ITS. Inter-vehicle communication (IVC) is a critical requirement for ITS and due to the nature of communication, vehicular ad-hoc network technology (VANET) is the most suitable communication technology for inter-vehicle communications. In Practice, however, VANET poses some extreme challenges including dropping out of connections as the moving vehicle moves out of the coverage range, joining of new nodes moving at high speeds, dynamic change in topology and connectivity, time variability of signal strength, throughput and time delay. One of the most challenging issues facing vehicular networks lies in the design of efficient resource management schemes, due to the mobile nature of nodes, delay constraints for safety applications and interference. The main application of VANET in ITS lies in the exchange of safety messages between nodes. Moreover, as the wireless access in vehicular environment (WAVE) moves closer to reality, management of these networks is of increasing concern for ITS designers and other stakeholder groups. As such, management of resources plays a significant role in VANET and ITS. For resource management in VANET, a medium access control protocol is used, which makes sure that limited resources are distributed efficiently. In this thesis, an efficient Multichannel Cognitive MAC (MCM) is developed, which assesses the quality of channel prior to transmission. MCM employs dynamic channel allocation and negotiation algorithms to achieve a significant improvement in channel utilisation, system reliability, and delay constraints while simultaneously addressing Quality of Service. Moreover, modified access priority parameters and safety message acknowledgments will be used to improve the reliability of safety messages. The proposed protocols are implemented using network simulation tools. Extensive experiments demonstrated a faster and more efficient reception of safety messages compared to existing VANET technologies. Finally, improvements in delay and packet delivery ratios are presented
Recommended from our members
Inter Vehicle Distance based connectivity aware routing in vehicular adhoc networks
Connectivity in vehicular traffic environment has witnessed significant attention due to the direct impact on the performance of most of the traffic safety applications of intelligent transport system. Various parameters such as density, speed, direction, link quality and inter vehicle distance (IVD) have been utilized for measuring connectivity. IVD has greater impact on connectivity and controls the impact of other parameters. Usage of real time IVD for measuring connectivity has not received sufficient attention in VANETs. This paper proposes IVD based connectivity aware routing (Ivd-CAR) for enhancing connectivity aware data dissemination. IVD calculation is robust and can effectively handle instantaneous GPS failure. Two localization techniques; namely, cooperative localization and Geometry based Localization are developed. Standard deviation of real time IVDs of a forwarding path is derived. Distribution of IVDs of a forwarding path is employed for estimating connectivity. Segment vehicle based next hop vehicle selection is utilized for incorporating network load, link quality and direction into consideration while selecting forwarding path. Simulations are carried out in ns2 to evaluate the performance of Ivd-CAR in realistic traffic environment. Comparative analysis of simulation results attests the superiority of Ivd-CAR to the state-of-the-art techniques: CSR and A-CAR
Comparative Analysis of Secure Routing Protocol with Malicious Node Attack in VANET Using CBR/UDP Traffic: A Review
One of biggest challenges to implement adhoc network is its dynamic topology and security issue. There are possibilities of active and passive attack in network to alter the authentic data or to steal the data. There are various types of passive attacks which are very dangerous for effective communication. Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. In reference work black hole attack used in network communication using AODV protocol. There are many problems in VANET and specifically security issues. Besides this need a security algorithm which helps to secure our privacy so that unauthorized person cannot access data
Computational Intelligence Inspired Data Delivery for Vehicle-to-Roadside Communications
We propose a vehicle-to-roadside communication protocol based on distributed clustering where a coalitional game approach is used to stimulate the vehicles to join a cluster, and a fuzzy logic algorithm is employed to generate stable clusters by considering multiple metrics of vehicle velocity, moving pattern, and signal qualities between vehicles. A reinforcement learning algorithm with game theory based reward allocation is employed to guide each vehicle to select the route that can maximize the whole network performance. The protocol is integrated with a multi-hop data delivery virtualization scheme that works on the top of the transport layer and provides high performance for multi-hop end-to-end data transmissions. We conduct realistic computer simulations to show the performance advantage of the protocol over other approaches
Intrusion Detection System for Platooning Connected Autonomous Vehicles
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors’ knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks
Implementation of GPSR Routing Protocol in VANET for Analyzing Black Hole Attack Using CBR/UDP Traffic Pattern With Security Algorithm
In implementing VANET security is one of biggest challenges due to dynamic topology. There are possibilities of active and passive attack in network to alter the authentic data. With pace of time tremendous development occurred in the field of VANET. Security is one of biggest challenges which need to handle effectively in adhoc network. In VANET nodes are mobiles and therefore they continuously change their respective location therefore due to dynamic topology, network becomes prone to attack. With advancement in technology in parallel unethical activity also take place which try to access the data illegally to fetch personnel profit. There are various types of attack possibilities in adhoc network but generally attacks are categorized into active attack and passive attack. Our research article based upon black hole attack which is very common to the networks. In this attack a malicious node with high priority number is deployed in between other nodes and malicious node acquire this data instead of destination node and also send an acknowledgement to source node that data received by destination node successfully. In this research paper proposed work executed by GPSR protocol and performance analysis of the black hole attack in Vehicular Ad Hoc Network is tested. The networking parameters of GPSR routing protocol are better than existed protocol in term of end to end delay, packet loss, energy consumption. Further implemented research work can be extended in better way with help of IoT, M2M and artificial intelligence for various network configurations with security algorithm
Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects
© 2013 IEEE. Internet of Things is smartly changing various existing research areas into new themes, including smart health, smart home, smart industry, and smart transport. Relying on the basis of 'smart transport,' Internet of Vehicles (IoV) is evolving as a new theme of research and development from vehicular ad hoc networks (VANETs). This paper presents a comprehensive framework of IoV with emphasis on layered architecture, protocol stack, network model, challenges, and future aspects. Specifically, following the background on the evolution of VANETs and motivation on IoV an overview of IoV is presented as the heterogeneous vehicular networks. The IoV includes five types of vehicular communications, namely, vehicle-to-vehicle, vehicle-to-roadside, vehicle-to-infrastructure of cellular networks, vehicle-to-personal devices, and vehicle-to-sensors. A five layered architecture of IoV is proposed considering functionalities and representations of each layer. A protocol stack for the layered architecture is structured considering management, operational, and security planes. A network model of IoV is proposed based on the three network elements, including cloud, connection, and client. The benefits of the design and development of IoV are highlighted by performing a qualitative comparison between IoV and VANETs. Finally, the challenges ahead for realizing IoV are discussed and future aspects of IoV are envisioned
Robust Analysis for AODV Protocol in Vehicular Adhoc Network under Black Hole Attack in NS 2
Security is one of biggest challenges in implementing adhoc network like VANET and MANET and it is due to changing behavior of topology of adhoc network. There are possibilities of various attacks like active and passive attack in network to change the real data or to steal the data. There are diverse types of passive attacks which are very dangerous for communication. Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. In our base work black hole attack used in network communication using AODV protocol. As we know there are many issues in VANET and specially security issues. Therefore in our research work we proposed a new protocol which is known as GPSR which has superior result as compared to base work in term of end to end delay, energy consumption, packet delivery ratio, throughput and overhead. Besides this a security algorithm also implemented so that unauthorized person cannot access the authenti
- …