855 research outputs found
Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks
Secure routing protocols are proposed for the vehicular ad hoc networks. The protocolsintegrate the security authentication process with the Location-Aided Routing (LAR) protocol to supportWi-Fi Direct communications between the vehicles. The methods are robust against various security threats.The security authentication process adopts a modified Diffie-Hellman key agreement protocol. The Diffie-Hellman protocol is used with a short authentication string (SAS)-based key agreement over Wi-Fi Directout-of-band communication channels. It protects the communication from any man-in-the-middle securitythreats. In particular, the security process is integrated into two LAR routing schemes, i.e., the request-zoneLAR scheme and the distance-based LAR scheme.We conduct extensive simulations with different networkparameters such as the vehicular node density, the number of the malicious nodes, and the speed of thenodes. Simulation results show that the proposed routing protocols provide superior performance in securedata delivery and average total packet delay. Also, the secure distance-based LAR protocol outperforms thesecure request-zone LAR protocol
Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges
Cloud Computing in VANETs (CC-V) has been investigated into two major themes of research including Vehicular Cloud Computing (VCC) and Vehicle using Cloud (VuC). VCC is the realization of autonomous cloud among vehicles to share their abundant resources. VuC is the efficient usage of conventional cloud by on-road vehicles via a reliable Internet connection. Recently, number of advancements have been made to address the issues and challenges in VCC and VuC. This paper qualitatively reviews CC-V with the emphasis on layered architecture, network component, taxonomy, and future challenges. Specifically, a four-layered architecture for CC-V is proposed including perception, co-ordination, artificial intelligence and smart application layers. Three network component of CC-V namely, vehicle, connection and computation are explored with their cooperative roles. A taxonomy for CC-V is presented considering major themes of research in the area including design of architecture, data dissemination, security, and applications. Related literature on each theme are critically investigated with comparative assessment of recent advances. Finally, some open research challenges are identified as future issues. The challenges are the outcome of the critical and qualitative assessment of literature on CC-V
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks
Future wireless networks have a substantial potential in terms of supporting
a broad range of complex compelling applications both in military and civilian
fields, where the users are able to enjoy high-rate, low-latency, low-cost and
reliable information services. Achieving this ambitious goal requires new radio
techniques for adaptive learning and intelligent decision making because of the
complex heterogeneous nature of the network structures and wireless services.
Machine learning (ML) algorithms have great success in supporting big data
analytics, efficient parameter estimation and interactive decision making.
Hence, in this article, we review the thirty-year history of ML by elaborating
on supervised learning, unsupervised learning, reinforcement learning and deep
learning. Furthermore, we investigate their employment in the compelling
applications of wireless networks, including heterogeneous networks (HetNets),
cognitive radios (CR), Internet of things (IoT), machine to machine networks
(M2M), and so on. This article aims for assisting the readers in clarifying the
motivation and methodology of the various ML algorithms, so as to invoke them
for hitherto unexplored services as well as scenarios of future wireless
networks.Comment: 46 pages, 22 fig
Recommended from our members
ePRIVO: an enhanced PRIvacy-preserVing opportunistic routing protocol for vehicular delay-tolerant networks
This article proposes an enhanced PRIvacy preserVing Opportunistic routing protocol (ePRIVO) for Vehicular Delay-Tolerant Networks (VDTN). ePRIVO models a VDTN as a time-varying neighboring graph where edges correspond to neighboring relationship between pairs of vehicles. It addresses the problem of vehicles taking routing decision meanwhile keeping their information private, i.e, vehicles compute their similarity and/or compare their routing metrics in a private manner using the Paillier homomorphic encryption scheme.
The effectiveness of ePRIVO is supported through extensive simulations with synthetic mobility models and a real mobility trace. Simulation results show that ePRIVO presents on average very low cryptographic costs in most scenarios. Additionally, ePRIVO presents on average gains of approximately 29% and 238% in terms of delivery ratio for the real and synthetic scenarios considered compared to other privacy-preserving routing protocols
A Recent Connected Vehicle - IoT Automotive Application Based on Communication Technology
Realizing the full potential of vehicle communications depends in large part on the infrastructure of vehicular networks. As more cars are connected to the Internet and one another, new technological advancements are being driven by a multidisciplinary approach. As transportation networks become more complicated, academic, and automotive researchers collaborate to offer their thoughts and answers. They also imagine various applications to enhance mobility and the driving experience. Due to the requirement for low latency, faster throughput, and increased reliability, wireless access technologies and an appropriate (potentially dedicated) infrastructure present substantial hurdles to communication systems. This article provides a comprehensive overview of the wireless access technologies, deployment, and connected car infrastructures that enable vehicular connectivity. The challenges, issues, services, and maintenance of connected vehicles that rely on infrastructure-based vehicular communications are also identified in this paper
Communication and Control in Collaborative UAVs: Recent Advances and Future Trends
The recent progress in unmanned aerial vehicles (UAV) technology has
significantly advanced UAV-based applications for military, civil, and
commercial domains. Nevertheless, the challenges of establishing high-speed
communication links, flexible control strategies, and developing efficient
collaborative decision-making algorithms for a swarm of UAVs limit their
autonomy, robustness, and reliability. Thus, a growing focus has been witnessed
on collaborative communication to allow a swarm of UAVs to coordinate and
communicate autonomously for the cooperative completion of tasks in a short
time with improved efficiency and reliability. This work presents a
comprehensive review of collaborative communication in a multi-UAV system. We
thoroughly discuss the characteristics of intelligent UAVs and their
communication and control requirements for autonomous collaboration and
coordination. Moreover, we review various UAV collaboration tasks, summarize
the applications of UAV swarm networks for dense urban environments and present
the use case scenarios to highlight the current developments of UAV-based
applications in various domains. Finally, we identify several exciting future
research direction that needs attention for advancing the research in
collaborative UAVs
- …