20 research outputs found

    Delay-based strategy for safety message dissemination in Vehicular Ad hoc NETworks: Slotted or continuous?

    Get PDF
    International audience—The diversity of applications' types in Vehicular Ad hoc NETworks (VANETs) has spawned a large variety of messages that need to be efficiently disseminated between connected vehicles. The most critical messages are those dedicated for safety applications such as road hazardous warning, signal violation warning, etc. The dissemination of this sort of messages is considered as a challenging task in mobile networks where the topology changes dynamically. Indeed, transmitted messages should achieve a high data reachability within a limited transmission delay and an acceptable overhead in a Vehicle to Vehicle (V2V) communication mode. In this work, we focus on a special type of data dissemination protocols based on the delay strategy. The purpose of this paper is to compare two basic distinguished techniques, namely the slotted technique and the continuous technique, and study in depth their impact on the data dissemination performance. A proper selection of the convenient technique according to the application's requirements is consequently deduced. For a faithful and rigorous study, simulations are performed by means of ns-3 simulator under a realistic VANET environment in terms of map layout, mobility pattern and radio model. Simulation results show that contrary to the theoretical reflection, slotted technique is approved as the most appropriate one for safety message dissemination. This technique achieves the same packet data ratio and redundancy ratio, compared to the continuous one, while reducing the data transmission delay

    A Redundancy based Protocol for Safety Message Dissemination in Vehicular Ad Hoc Networks

    Get PDF
    International audienceThe diversity of applications types in vehicular ad hoc networks (VANETs) has spawned a large variety of messages that need to be disseminated in vehicle to vehicle (V2V) communication mode. The most critical messages are those dedicated for safety applications such as accident warning, road hazardous warning, signal violation warning, etc. The dissemination of this sort of messages is a challenging task in VANETs since they should be efficiently transmitted i.e. by achieving high packet delivery within a certain time limit and an acceptable overhead. In this work, we propose a robust and an original data dissemination protocol called Redundancy-based Protocol (RBP). Contrary to most of the density based protocols, the protocol is beaconless. It takes into account the surrounding vehicle density during the broadcasting process through a specific metric, named “packet redundancy ratio”, calculated locally at each vehicle. Based on this metric, each vehicle is able to dynamically determine the probability of rebroadcast in order to mitigate the broadcast storm problem. The simulation results prove that the proposed protocol outperforms the slotted 1- persistence scheme in terms of packet drop ratio, and network load while still maintaining a low End-to-End delay and high packet reachability. This scheme is suitable for safety applications, as well as for further kinds of application by saving the network capacity consumption

    SEAD: A simple and efficient adaptive data dissemination protocol in vehicular ad-hoc networks

    Get PDF
    International audienceVehicular ad-hoc network (VANET) is becoming a promising technology for improving the efficiency and the safety of intelligent transportation systems by deploying a wide variety of applications. Smart vehicles are expected to continuously exchange a huge amount of data either through safety or non-safety messages dedicated for road safety or infotainment and passenger comfort applications, respectively. One of the main challenges posed by the study of VANET is the data dissemination design by which messages have to be efficiently disseminated in a high vehicular speed, intermittent connectivity, and highly dynamic topology. In particular, broadcast mechanism should guarantee fast and reliable data delivery within a limited wireless bandwidth in order to fit the real time applications’ requirements. In this work, we propose a simple and efficient adaptive data dissemination protocol called “SEAD”. On the one hand, the originality of this work lies in its simplicity and efficiency regardless the application’s type. Simplicity is achieved through a beaconless strategy adopted to take into account the surrounding vehicles’ density. Thanks to a metric locally measured, each vehicle is able to dynamically define an appropriate probability of rebroadcast to mitigate the broadcast storm problem. Efficiency is manifested by reducing excessive retransmitted messages and hence promoting the network capacity and the transmission delay. The simulation results show that the proposed protocol offers very low packet drop ratio and network load while still maintaining a low end-to-end delay and a high packet delivery. On the other hand, SEAD protocol presents a robust data dissemination mechanism which is suitable either for safety applications or for other kinds of application. This mechanism is able to adapt the protocol performance in terms of packet delivery ratio to the application’s requirements

    A Redundancy based Protocol for Safety Message Dissemination in Vehicular Ad Hoc Networks

    Get PDF
    International audienceThe diversity of applications types in vehicular ad hoc networks (VANETs) has spawned a large variety of messages that need to be disseminated in vehicle to vehicle (V2V) communication mode. The most critical messages are those dedicated for safety applications such as accident warning, road hazardous warning, signal violation warning, etc. The dissemination of this sort of messages is a challenging task in VANETs since they should be efficiently transmitted i.e. by achieving high packet delivery within a certain time limit and an acceptable overhead. In this work, we propose a robust and an original data dissemination protocol called Redundancy-based Protocol (RBP). Contrary to most of the density based protocols, the protocol is beaconless. It takes into account the surrounding vehicle density during the broadcasting process through a specific metric, named “packet redundancy ratio”, calculated locally at each vehicle. Based on this metric, each vehicle is able to dynamically determine the probability of rebroadcast in order to mitigate the broadcast storm problem. The simulation results prove that the proposed protocol outperforms the slotted 1- persistence scheme in terms of packet drop ratio, and network load while still maintaining a low End-to-End delay and high packet reachability. This scheme is suitable for safety applications, as well as for further kinds of application by saving the network capacity consumption

    Malware detection issues, future trends and challenges: a survey

    Get PDF
    This paper focuses on the challenges and issues of detecting malware in to-day's world where cyberattacks continue to grow in number and complexity. The paper reviews current trends and technologies in malware detection and the limitations of existing detection methods such as signature-based detection and heuristic analysis. The emergence of new types of malware, such as file-less malware, is also discussed, along with the need for real-time detection and response. The research methodology used in this paper is presented, which includes a literature review of recent papers on the topic, keyword searches, and analysis and representation methods used in each study. In this paper, the authors aim to address the key issues and challenges in detecting malware today, the current trends and technologies in malware detection, and the limitations of existing methods. They also explore emerging threats and trends in malware attacks and highlight future directions for research and development in the field. To achieve this, the authors use a research methodology that involves a literature review of recent papers related to the topic. They focus on detecting and analyzing methods, as well as representation and extraction methods used in each study. Finally, they classify the literature re-view, and through reading and criticism, highlight future trends and problems in the field of malware detection

    Social engineering in social network: a systematic literature review

    Get PDF
    Social engineering is hacking and manipulating people's minds to obtain access to networks and systems in order to acquire sensitive data. A social engineering attack happens when victims are unaware of the strategies utilised and how to avoid them. Although rapid developments in communication technology made communication between individuals easier and faster, on the other hand, individuals' personal and private information is likely to be available online via social networking or other services without adequate security measures to protect such sensitive data. Hackers can use social engineering to target them no matter the technology they use to protect themselves. The methods differ, and the goal is the same, which is to manipulate and deceive organisations, companies, and individuals to obtain sensitive and private in-formation that attackers can benefit from, perhaps to sell it on the dark web or steal the payment card information of victims. The current research presents the attack techniques used in social engineering, as well as ways for pre-venting social engineering assaults. The major purpose of this study is to systematically and impartially conduct a systematic review of previous research on current social engineering attacks and the methods used to reduce these attacks

    “New Alien Mediterranean Biodiversity Records” (November 2021)

    Get PDF
    This Collective Article includes records of 29 alien and cryptogenic species in the Mediterranean Sea, belonging to eight Phyla (Rhodophyta, Ochrophyta, Cnidaria, Annelida, Mollusca, Arthropoda, Echinodermata, and Chordata) and coming from 11 countries. Notes published here can be divided into three different categories: occupancy estimation for wide areas, new records for the Mediterranean Sea, and new records of species expanding within the Mediterranean Sea. The first category includes a visual survey held along the coastline of Peloponnese (Greece), which yielded records of 15 species. The second category includes the first Mediterranean records of the Coho salmon Oncorhynchus kisutch (Greece) and of the Arabian monocle bream Scolopsis ghanam (Tunisia). The third category includes new records for countries (Ganonema farinosum in Malta, Cassiopea andromeda in Libya, Cingulina isseli in Greece, Okenia picoensis in Italy, Callinectes sapidus in Slovenia, Charybdis cf. hellerii in Malta, Urocaridella pulchella in Cyprus, Ablennes hians and Aluterus monoceros in Lebanon, and Fistularia petimba in Greece and Lebanon), new records for MSFD areas or regional seas (Septifer cumingii in the Greek Ionian Sea and F. petimba in the Marmara Sea), and confirmation of old, doubtful, or spurious records/statements (Branchiomma luctuosum in Tunisia, Thalamita poissonii in the Saronikos Gulf, and Pterois miles in Albania). Noteworthy, the three new records of F. petimba suggest that it may soon spread further in the Mediterranean Sea, as already happened for its congeneric Fistularia commersonii. Distributional data reported here will help tracing colonization routes of alien species in the basin and may facilitate the development of mitigation measures

    QoS-Oriented High Dynamic Resource Allocation in Vehicular Communication Networks

    No full text
    Vehicular ad hoc networks (VANETs) are emerging as new research area and attracting an increasing attention from both industry and research communities. In this context, a dynamic resource allocation policy that maximizes the use of available resources and meets the quality of service (QoS) requirement of constraining applications is proposed. It is a combination of a fair packet scheduling policy and a new adaptive QoS oriented call admission control (CAC) scheme based on the vehicle density variation. This scheme decides whether the connection request is to be admitted into the system, while providing fair access and guaranteeing the desired throughput. The proposed algorithm showed good performance in testing in real world environment

    Gestion des ressources et qualité de service dans les réseaux mobiles multimédias

    No full text
    Dans les réseaux mobiles cellulaires, l'intégration des services multimédia sur l'interface radio pose un certain nombre de problèmes, dont le plus important est au niveau de la bande passante, plus limitée que celle offerte dans les réseaux filaires. La gestion de la ressource radio est donc de loin le problème critique de ces réseaux et l'optimisation de l'allocation de ressources s'avère cruciale pour pouvoir y intégrer le support haut débit. Cette thèse s'est donc proposée de développer de nouvelles politiques d'allocation de ressources dans le but de satisfaire les demandes croissantes des abonnées multimédia en termes de qualité de service (QoS), caractérisée par les seuils d'appréciation du service considéré. Ces protocoles, proposés pour des réseaux multiservices de types GPRS (General Packet Radio Service) et UMTS (Universal Mobile Telecommunication System), prennent en considération l'environnement de propagation et la mobilité des utilisateurs et leurs effets sur la QoS qui leur sont offerte.Pour ces deux types de réseaux, de nouvelles fonctions de contrôle d'admission de sessions (CAC) ont également été proposées. Leur rôle est de fournir un meilleur service aux appels acceptés, en limitant la quantité de trafic dans le réseau. Ces nouvelles fonctions tiennent compte des temps d'attente maximaux tolérés pour chaque classe de service et des interférences générées dans le système.En les comparant à certains protocoles de référence adaptés aux multiservices, nos algorithmes d'allocation de ressources proposés fournissent les meilleurs résultats.In mobile cellular networks, the integration of multimedia services over the radio interface prone to some problems. The most important is the bandwidth, more limited than in wireline networks. Radio resource management is by far the critical problem of these networks and the optimization of the resource allocation proves to be crucial to integrate the high bit rate support.This thesis intended to develop new resource allocation policies in order to satisfy the increasing demands of multimedia users in termsof quality of service (QoS), characterized by the appreciation thresholds of the considered application.These protocols, proposed for GPRS (General Packet Radio Service) and UMTS (Universal Mobile Telecommunication System) multiservices networks, take into account the propagation environment and the users' mobility and their effects on offered QoS.For these two types of networks, new Connection Admission Control (CAC) policies have been proposed. Their aims are to provide better QoS to the accepted sessions, while limiting the amount of traffic in the network. This new function takes into consideration both maximum packet waiting delay tolerated for every class of service and interferences generated in the system.Comparing them to some reference protocols adapted to multimedia, our proposed radio resource allocation algorithms provide the best results.ORSAY-PARIS 11-BU Sciences (914712101) / SudocSudocFranceF
    corecore