108 research outputs found

    Survey on Congestion Detection and Control in Connected Vehicles

    Full text link
    The dynamic nature of vehicular ad hoc network (VANET) induced by frequent topology changes and node mobility, imposes critical challenges for vehicular communications. Aggravated by the high volume of information dissemination among vehicles over limited bandwidth, the topological dynamics of VANET causes congestion in the communication channel, which is the primary cause of problems such as message drop, delay, and degraded quality of service. To mitigate these problems, congestion detection, and control techniques are needed to be incorporated in a vehicular network. Congestion control approaches can be either open-loop or closed loop based on pre-congestion or post congestion strategies. We present a general architecture of vehicular communication in urban and highway environment as well as a state-of-the-art survey of recent congestion detection and control techniques. We also identify the drawbacks of existing approaches and classify them according to different hierarchical schemes. Through an extensive literature review, we recommend solution approaches and future directions for handling congestion in vehicular communications

    GSTR: Secure Multi-hop Message Dissemination in Connected Vehicles using Social Trust Model

    Full text link
    The emergence of connected vehicles paradigm has made secure communication a key concern amongst the connected vehicles. Communication between the vehicles and Road Side Units (RSUs) is critical to disseminate message among the vehicles. We focus on secure message transmission in connected vehicles using multi_hop social networks environment to deliver the message with varying trustworthiness. We proposed a Geographic Social Trust Routing (GSTR) approach; messages are propagated using multiple hops and by considering the various available users in the vehicular network. GSTR is proposed in an application perspective with an assumption that the users are socially connected. The users are selected based on trustworthiness as defined by social connectivity. The route to send a message is calculated based on the highest trust level of each node by using the nodes social network connections along the path in the network. GSTR determines the shortest route using the trusted nodes along the route for message dissemination. GSTR is made delay tolerant by introducing message storage in the cloud if a trustworthy node is unavailable to deliver the message. We compared the proposed approach with Geographic and Traffic Load based Routing (GTLR), Greedy Perimeter Stateless Routing (GPSR), Trust-based GPSR (T_GPSR). The performance results obtained show that GSTR ensures efficient resource utilization, lower packet losses at high vehicle densities

    Performance Evaluation of Proposed Secured Minimum Delay Routing Protocol (SMDRP) in Vehicular Adhoc Network

    Get PDF
    In the present day research of vehicular Adhoc networks, the design of an efficient routing protocol providing high speed communications is a technical challenge for researchers in this area of study. A protocol that is secured, stable and reliable is an important aspect for the vehicular as hoc networks. The present day existing routing protocols designed for vehicular communications are not providing the required quality of service in VANETS and still research is going on for providing the full-fledged support for intra and inter vehicular communications. In our research we proposed a protocol called as Secured Minimum Delay Routing Protocol (SMDRP) by utilizing the clustering technique and location information using GPS. For the network performance we evaluated the different network parameters with protocols such as GPSR, CAGFP and GRUV using NS3 a network analyzing simulator. The simulation results show that SMDRP showed cost effective in terms of packet delivery ratio, throughput and end to end delay

    A Survey on Long-Range Wide-Area Network Technology Optimizations

    Get PDF
    Long-Range Wide-Area Network (LoRaWAN) enables flexible long-range service communications with low power consumption which is suitable for many IoT applications. The densification of LoRaWAN, which is needed to meet a wide range of IoT networking requirements, poses further challenges. For instance, the deployment of gateways and IoT devices are widely deployed in urban areas, which leads to interference caused by concurrent transmissions on the same channel. In this context, it is crucial to understand aspects such as the coexistence of IoT devices and applications, resource allocation, Media Access Control (MAC) layer, network planning, and mobility support, that directly affect LoRaWAN’s performance.We present a systematic review of state-of-the-art works for LoRaWAN optimization solutions for IoT networking operations. We focus on five aspects that directly affect the performance of LoRaWAN. These specific aspects are directly associated with the challenges of densification of LoRaWAN. Based on the literature analysis, we present a taxonomy covering five aspects related to LoRaWAN optimizations for efficient IoT networks. Finally, we identify key research challenges and open issues in LoRaWAN optimizations for IoT networking operations that must be further studied in the future

    Energy-efficient vertical handover parameters, classification and solutions over wireless heterogeneous networks: a comprehensive survey

    Get PDF
    In the last few decades, the popularity of wireless networks has been growing dramatically for both home and business networking. Nowadays, smart mobile devices equipped with various wireless networking interfaces are used to access the Internet, communicate, socialize and handle short or long-term businesses. As these devices rely on their limited batteries, energy-efficiency has become one of the major issues in both academia and industry. Due to terminal mobility, the variety of radio access technologies and the necessity of connecting to the Internet anytime and anywhere, energy-efficient handover process within the wireless heterogeneous networks has sparked remarkable attention in recent years. In this context, this paper first addresses the impact of specific information (local, network-assisted, QoS-related, user preferences, etc.) received remotely or locally on the energy efficiency as well as the impact of vertical handover phases, and methods. It presents energy-centric state-of-the-art vertical handover approaches and their impact on energy efficiency. The paper also discusses the recommendations on possible energy gains at different stages of the vertical handover process

    An Energy Aware Cost Recovery Approach for Virtual Machine Migration

    Get PDF
    Datacenters provide an IT backbone for today's business and economy, and are the principal electricity consumers for Cloud computing. Various studies suggest that approximately 30% of the running servers in US datacenters are idle and the others are under-utilized, making it possible to save energy and money by using Virtual Machine (VM) consolidation to reduce the number of hosts in use. However, consolidation involves migrations that can be expensive in terms of energy consumption, and sometimes it will be more energy efficient not to consolidate. This paper investigates how migration decisions can be made such that the energy costs involved with the migration are recovered, as only when costs of migration have been recovered will energy start to be saved. We demonstrate through a number of experiments, using the Google workload traces for 12,583 hosts and 1,083,309 tasks, how different VM allocation heuristics, combined with different approaches to migration, will impact on energy effciency. We suggest, using reasonable assumptions for datacenter setup, that a combination of energy-aware ll-up VM allocation and energy-aware migration, and migration only for relatively long running VMs, provides for optimal energy efficiency

    Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies

    Get PDF
    [[abstract]]Over the last few years, we have witnessed a growing interest in Cyber Physical Systems (CPSs) that rely on a strong synergy between computational and physical components. CPSs are expected to have a tremendous impact on many critical sectors (such as energy, manufacturing, healthcare, transportation, aerospace, etc) of the economy. CPSs have the ability to transform the way human-to-human, human-toobject, and object-to-object interactions take place in the physical and virtual worlds. The increasing pervasiveness of Wireless Sensor Networking (WSN) technologies in many applications make them an important component of emerging CPS designs. We present some of the most important design requirements of CPS architectures. We discuss key sensor network characteristics that can be leveraged in CPS designs. In addition, we also review a few well-known CPS application domains that depend on WSNs in their design architectures and implementations. Finally, we present some of the challenges that still need to be addressed to enable seamless integration of WSN with CPS designs.[[incitationindex]]SCI[[booktype]]紙
    corecore