2,073 research outputs found

    Virtual Communication Stack: Towards Building Integrated Simulator of Mobile Ad Hoc Network-based Infrastructure for Disaster Response Scenarios

    Full text link
    Responses to disastrous events are a challenging problem, because of possible damages on communication infrastructures. For instance, after a natural disaster, infrastructures might be entirely destroyed. Different network paradigms were proposed in the literature in order to deploy adhoc network, and allow dealing with the lack of communications. However, all these solutions focus only on the performance of the network itself, without taking into account the specificities and heterogeneity of the components which use it. This comes from the difficulty to integrate models with different levels of abstraction. Consequently, verification and validation of adhoc protocols cannot guarantee that the different systems will work as expected in operational conditions. However, the DEVS theory provides some mechanisms to allow integration of models with different natures. This paper proposes an integrated simulation architecture based on DEVS which improves the accuracy of ad hoc infrastructure simulators in the case of disaster response scenarios.Comment: Preprint. Unpublishe

    Trustworthy applications for vehicular environments

    Get PDF
    The integration of ICT in vehicular environments enables new kinds of application and creates new technological challenges. Dynamic network topology, unreliable network links, and moving terminals make it hard to provide a convincing end user experience. This article introduces the concept of providing trustworthy applications through wireless networks in vehicular environments. A special emphasis will be on how to maintain end users privacy when providing personalized, contextaware services. Therefore, a service taxonomy, enabling middleware technologies, and service enablers are introduced

    Using Machine Learning for Handover Optimization in Vehicular Fog Computing

    Full text link
    Smart mobility management would be an important prerequisite for future fog computing systems. In this research, we propose a learning-based handover optimization for the Internet of Vehicles that would assist the smooth transition of device connections and offloaded tasks between fog nodes. To accomplish this, we make use of machine learning algorithms to learn from vehicle interactions with fog nodes. Our approach uses a three-layer feed-forward neural network to predict the correct fog node at a given location and time with 99.2 % accuracy on a test set. We also implement a dual stacked recurrent neural network (RNN) with long short-term memory (LSTM) cells capable of learning the latency, or cost, associated with these service requests. We create a simulation in JAMScript using a dataset of real-world vehicle movements to create a dataset to train these networks. We further propose the use of this predictive system in a smarter request routing mechanism to minimize the service interruption during handovers between fog nodes and to anticipate areas of low coverage through a series of experiments and test the models' performance on a test set

    An Innovative Technique to Avoid Traffic Jamming for VANET Using NS-2

    Get PDF
    A range of efficient control of vehicles has grown together with information and communication tools In scrupulous, with the appliance of wireless network for real world information offering, it has been feasible to create Vehicular Ad-hoc Network (VANET), an intellectual vehicle service for ease and protection, which does feasible crash accident detection and prevention, caution of hazardous aspects on road, traffic information offering, and other types of service offering. Nevertheless, the VANET service situation has physical and technical vulnerabilities sourced by the vehicular inside/outside communication based on wireless network. Thus, Vehicular protection has become known as a crucial aspect to avert malevolent threats and confidentiality defiance from vehicles, drivers, and traffic network. In this paper we proposed a scheme for discovering the routing mischief of an attacker aligned with traffic jamming. Now if the congestions take place in a particular section then in that case all vehicular nodes would produce the traffic jam indications known as Jamming declaration indications to their fellow vehicles and through that the vehicular node would modify their direction. Performances of outcomes are calculated on the basis of parameters: Packet Delivery Ratio, Routing Load and Throughput using Network Simulator (NS-2). Keywords: VANET (Vehicular Ad-hoc Network), Vehicle security, traffic jamming, Road Side Uni
    • …
    corecore