52,691 research outputs found
Cognitive radio-enabled Internet of Vehicles (IoVs): a cooperative spectrum sensing and allocation for vehicular communication
Internet of Things (IoTs) era is expected to empower all aspects of Intelligent Transportation System (ITS) to improve transport safety and reduce road accidents. US Federal Communication Commission (FCC) officially allocated 75MHz spectrum in the 5.9GHz band to support vehicular communication which many studies have found insufficient. In this paper, we studied the application of Cognitive Radio (CR) technology to IoVs in order to increase the spectrum resource opportunities available for vehicular communication, especially when the officially allocated 75MHz spectrum in 5.9GHz band is not enough due to high demands as a result of increasing number of connected vehicles as already foreseen in the near era of IoTs. We proposed a novel CR Assisted Vehicular NETwork (CRAVNET) framework which empowers CR enabled vehicles to make opportunistic usage of licensed spectrum bands on the highways. We also developed a novel co-operative three-state spectrum sensing and allocation model which makes CR vehicular secondary units (SUs) aware of additional spectrum resources opportunities on their current and future positions and applies optimal sensing node allocation algorithm to guarantee timely acquisition of the available channels within a limited sensing time. The results of the theoretical analyses and simulation experiments have demonstrated that the proposed model can significantly improve the performance of a cooperative spectrum sensing and provide vehicles with additional spectrum opportunities without harmful interference against the Primary Users (PUs) activities
A Stochastic Hybrid Framework for Driver Behavior Modeling Based on Hierarchical Dirichlet Process
Scalability is one of the major issues for real-world Vehicle-to-Vehicle
network realization. To tackle this challenge, a stochastic hybrid modeling
framework based on a non-parametric Bayesian inference method, i.e.,
hierarchical Dirichlet process (HDP), is investigated in this paper. This
framework is able to jointly model driver/vehicle behavior through forecasting
the vehicle dynamical time-series. This modeling framework could be merged with
the notion of model-based information networking, which is recently proposed in
the vehicular literature, to overcome the scalability challenges in dense
vehicular networks via broadcasting the behavioral models instead of raw
information dissemination. This modeling approach has been applied on several
scenarios from the realistic Safety Pilot Model Deployment (SPMD) driving data
set and the results show a higher performance of this model in comparison with
the zero-hold method as the baseline.Comment: This is the accepted version of the paper in 2018 IEEE 88th Vehicular
Technology Conference (VTC2018-Fall) (references added, title and abstract
modified
Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion
Recent advances in wireless technologies have enabled many new applications
in Intelligent Transportation Systems (ITS) such as collision avoidance,
cooperative driving, congestion avoidance, and traffic optimization. Due to the
vulnerable nature of wireless communication against interference and
intentional jamming, ITS face new challenges to ensure the reliability and the
safety of the overall system. In this paper, we expose a class of stealthy
attacks -- Stuck in Traffic (SiT) attacks -- that aim to cause congestion by
exploiting how drivers make decisions based on smart traffic signs. An attacker
mounting a SiT attack solves a Markov Decision Process problem to find
optimal/suboptimal attack policies in which he/she interferes with a
well-chosen subset of signals that are based on the state of the system. We
apply Approximate Policy Iteration (API) algorithms to derive potent attack
policies. We evaluate their performance on a number of systems and compare them
to other attack policies including random, myopic and DoS attack policies. The
generated policies, albeit suboptimal, are shown to significantly outperform
other attack policies as they maximize the expected cumulative reward from the
standpoint of the attacker
- …