Spelling suggestions: "subject:"vehicular Ad coc betworks"" "subject:"vehicular Ad coc conetworks""
31 |
Online ad hoc distributed traffic simulation with optimistic executionSuh, Wonho 03 July 2012 (has links)
As roadside and in-vehicle sensors are deployed under the Connected Vehicle Research program (formerly known as Vehicle Infrastructure Integration initiative and Intellidrive), an increasing variety of traffic data is becoming available in real time. This real time traffic data is shared among vehicles and between vehicles and traffic management centers through wireless communication. This course of events creates an opportunity for mobile computing and online traffic simulations.
However, online traffic simulations require faster than real time running speed with high simulation resolution, since the purpose of the simulations is to provide immediate future traffic forecast based on real time traffic data. However, simulating at high resolution is often too computationally intensive to process a large scale network on a single processor in real time. To mitigate this limitation an online ad hoc distributed simulation with optimistic execution is proposed in this study.
The objective of this study is to develop an online traffic simulation system based on an ad hoc distributed simulation with optimistic execution. In this system, data collection, processing, and simulations are performed in a distributed fashion. Each individual simulator models the current traffic conditions of its local vicinity focusing only on its area of interest, without modeling other less relevant areas. Collectively, a central server coordinates the overall simulations with an optimistic execution technique and provides a predictive model of traffic conditions in large areas by combining simulations geographically spread over large areas. This distributed approach increases computing capacity of the entire system and speed of execution. The proposed model manages the distributed network, synchronizes the predictions among simulators, and resolves simulation output conflicts. Proper feedback allows each simulator to have accurate input data and eventually produce predictions close to reality. Such a system could provide both more up-to-date and robust predictions than that offered by centralized simulations within a single transportation management center. As these systems evolve, the online traffic predictions can be used in surface transportation management and travelers will benefit from more accurate and reliable traffic forecast.
|
32 |
Scheduling and QoS enhancement in wireless vehicular ad-hoc networks.Miao, Lusheng. January 2014 (has links)
D. Tech. Electrical Engineering. / Discusses the protocol design in VANETs is very challenging due to their low latency and high data rate requirements in a high mobility environment. Hence, the central metrics of QoS such as throughput, reliability and delays are critical to the design of protocol in VANETs. Therefore, this project focuses on the scheduling and QoS enhancement algorithms. The QoS analytical model and multi-channel MAC protocol were completed; this was significant for the development of the VANETs.The anticipated benefits of this study may be described as: 1. The duty cycle adaptive MAC protocol could improve the QoS of VANET in the situation where the OBU is equipped with only one transceiver. 2. The results obtained from this model is significant for the designing and evaluation of the vehicular network. 3. Due to the characteristics of VANETs, the requirements of high throughput and low latency are critical in VANETs. An efficient multi-channel MAC protocol is a vital requirement in order to offer efficient, fair and stable channel access using the limited channel resources.
|
33 |
Granting privacy and authentication in mobile ad hoc networks.Balmahoon, Reevana. 22 May 2013 (has links)
The topic of the research is granting privacy and authentication in Mobile Ad Hoc Networks (MANETs) that are under the authority of a certificate authority (CA) that is often not available. Privacy is implemented in the form of an anonymous identity or pseudonym, and ideally has no link to the real identity. Authentication and privacy are conflicting tenets of security as the former ensures a user's identity is always known and certified and the latter hides a user's identity.
The goal was to determine if it is possible for a node to produce pseudonyms for itself that would carry the authority of the CA while being traceable by the CA, and would be completely anonymous.
The first part of the dissertation places Vehicular Ad Hoc Networks (VANETs) into context, as this is the application of MANETs considered. This is followed by a detailed survey and analysis of the privacy aspects of VANETs. Thereafter, the solution is proposed, documented and analysed. Lastly, the dissertation is concluded and the contributions made are listed.
The solution implements a novel approach for making proxies readily available to vehicles, and does indeed incorporate privacy and authentication in VANETs such that the pseudonyms produced are always authentic and traceable. / Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, Durban, 2012.
|
34 |
Adaptive QoS control of DSRC vehicle networks for collaborative vehicle safety applicationsGuan, Wenyang January 2013 (has links)
Road traffic safety has been a subject of worldwide concern. Dedicated short range communications (DSRC) is widely regarded as a promising enabling technology for collaborative safety applications (CSA), which can provide robust communication and affordable performance to build large scale CSA system. The main focus of this thesis is to develop solutions for DSRC QoS control in order to provide robust QoS support for CSA. The first design objective is to ensure robust and reliable message delivery services for safety applications from the DSRC networks. As the spectrum resources allocated to DSRC network are expected to be shared by both safety and non-safety applications, the second design objective is to make QoS control schemes bandwidth-efficient in order to leave as much as possible bandwidth for non-safety applications. The first part of the thesis investigates QoS control in infrastructure based DSRC networks, where roadside access points (AP) are available to control QoS control at road intersections. After analyse DSRC network capabilities on QoS provisioning without congestion control, we propose a two-phases adaptive QoS control method for DSRC vehicle networks. In the first phase an offline simulation based approach is used to and out the best possible system configurations (e.g. message rate and transmit power) with given numbers of vehicles and QoS requirements. It is noted that with different utility functions the values of optimal parameters proposed by the two phases centralized QoS control scheme will be different. The conclusions obtained with the proposed scheme are dependent on the chosen utility functions. But the proposed two phases centralized QoS control scheme is general and is applicable to different utility functions. In the second phase, these configurations are used online by roadside AP adaptively according to dynamic traffic loads. The second part of the thesis is focused on distributed QoS control for DSRC networks. A framework of collaborative QoS control is proposed, following which we utilize the local channel busy time as the indicator of network congestion and adaptively adjust safety message rate by a modified additive increase and multiplicative decrease (AIMD) method in a distributed way. Numerical results demonstrate the effectiveness of the proposed QoS control schemes.
|
35 |
<b>SECURE AUTHENTICATION AND PRIVACY-PRESERVING TECHNIQUES IN VEHICULAR AD-HOC NETWORKS</b>Aala Oqab Alsalem (17075812) 28 April 2024 (has links)
<p dir="ltr">VANET is formed by vehicles, road units, infrastructure components, and various con- nected objects.It aims mainly to ensure public safety and traffic control. New emerging applications include value-added and user-oriented services. While this technological ad- vancement promises ubiquitous deployment of the VANET, security and privacy challenges must be addressed. Thence, vehicle authentication is a vital process to detect malicious users and prevent them from harming legitimate communications. Hover, the authentication pro- cess uses sensitive information to check the vehicle’s identity. Sharing this information will harm vehicle privacy. In this thesis, we aim to deal with this issues:</p><ul><li>How can we ensure vehicle authentication and avoid sensitive and identity information leaks simultaneously?</li><li>When nodes are asked to provide identity proof, how can we ensure that the shared information is only used by an authorized entity?</li><li>Can we define an effective scheme to distinguish between legitimate and malicious network nodes?This dissertation aims to address the preservation of vehicle private information used within the authentication mechanism in VANET communications.The VANET characteristics are thoroughly presented and analyzed. Security require- ments and challenges are identified. Additionally, we review the proposed authentication techniques and the most well-known security attacks while focusing on the privacy preser- vation need and its challenges.To fulfill, the privacy preservation requirements, we proposed a new solution called Active Bundle AUthentication Solution based on SDN for Vehicular Networks (ABAUS). We intro- duce the Software Defined Networks (SDN) as an authentication infrastructure to guarantee the authenticity of each participant. Furthermore, we enhance the preservation of sensitive data by the use of an active data Bundle (ADB) as a self-protecting security mechanism. It ensures data protection throughout the whole data life cycle. ABAUS defines a dedicated registration protocol to verify and validate the different members of the network.</li></ul><p dir="ltr">first solution focused on legitimate vehicle identification and sensitive data pro- tection. A second scheme is designed to recognize and eliminate malicious users called BEhaviour-based REPutation scheme for privacy preservation in VANET using blockchain technology (BEREP). Dedicated public blockchains are used by a central trust authority to register vehicles and store their behavior evaluation and a trust scoring system allows nodes to evaluate the behavior of their communicators and detect malicious infiltrated users.</p><p dir="ltr">By enhancing sensitive data preservation during the authentication process and detect- ing malicious attempts, our proposed work helps to tackle serious challenges in VANET communications.</p>
|
36 |
The effect of awareness at the medium access control layer of vehicular ad-hoc networksBooysen, Marthinus J. 12 1900 (has links)
Thesis (PhD)-- Stellenbosch University, 2013. / ENGLISH ABSTRACT: The hidden terminal problem, coupled with high node mobility apparent in vehicular
networks, present challenges to e cient communication between vehicles at the Medium
Access Control (MAC) layer. Both of these challenges are fundamentally problems of lack
of awareness, and manifest most prominently in the broadcasting of safety messages in
infrastructure-free vehicle-to-vehicle communications.
The design of existing contention-free and contention-based MAC approaches generally
assumes that nodes that are in range of one another can take steps to coordinate
communications at the MAC layer to overcome the hidden terminal problem and node
mobility. Unicasting with the existing MAC standard, IEEE 802.11p, implicitly assumes
an awareness range of twice the transmission range (a 1-hop awareness range) at most,
since handshaking is used. For broadcasting, the assumption implies an awareness range
that is at most equal to the transmission range, since only carrier sensing is used. Existing
alternative contention-free approaches make the same assumption, with some protocols
explicitly using a 1-hop awareness range to avoid packet collisions. This dissertation challenges
the convention of assuming that a 1-hop awareness range is su cient for networks
with high mobility, such as VANETs.
In this dissertation, the impact of awareness range and management of the awareness
information on MAC performance is researched. The impact of the number of slots that
is required to support the awareness range is also evaluated.
Three contention-free MAC protocols are introduced to support the research. The
rst is an improved version of an existing MAC method, which is used to demonstrate the
e ects on performance of changes to awareness management. The second MAC uses three
competing processes to manage awareness information. The second MAC is designed for
a con gurable awareness range and con gurable number of slots, and is used to evaluate
the e ects of awareness range and number of slots on MAC performance. The third MAC
is random access based and is used to evaluate the impact on performance of removing
awareness completely. An analytical model is developed to support the simulated results.
The simulation results demonstrate that awareness range, awareness information management,
and number of slots used are key design parameters that signi cantly impact
on MAC performance. The results further show that optimal awareness-related design
parameters exist for given scenarios.
Finally, the proposed contention-free and random access MAC methods are simulated
and performance compared with IEEE 802.11p. All three outperform the contentionbased
standard IEEE 802.11p. / AFRIKAANSE OPSOMMING: Die versteekte-nodus-probleem, gekoppel met die hoë vlakke van nodusbeweging teenwoordig
in voertuignetwerke, bied uitdagings vir doeltre ende kommunikasie tussen voertuie
in die medium-toegangbeheer- (MAC) vlak. Beide van hierdie probleme spruit uit
beperkte bewustheid, en manifesteer veral in die uitsaai van veiligheidsboodskappe in
infrastruktuurvrye voertuig-na-voertuig-kommunikasie.
Die ontwerp van bestaande wedywerende en nie-wedywerende MAC benaderings neem
aan dat nodusse wat binne bereik van mekaar is, stappe kan neem om kommunikasie op
die MAC-vlak te koördineer, ten einde probleme met versteekte nodusse en mobiliteit te
oorkom. Vir punt-tot-puntkommunikasie met IEEE 802.11p, impliseer dié aanname 'n bewustheidstrekking
van hoogstens twee keer die radiobereik (1-hop bewustheidstrekking),
aangesien bladskud gebruik word. In die geval van uitsaai, impliseer die aanname 'n bewustheidstrekking
hoogstens gelyk is aan die radiobereik, aangesien slegs draeropsporing
gebruik word. Nie-wedywerende metodes maak dieselfde aanname, met sommiges wat
eksplisiet 1-hop-bewustheidstrekking gebruik om pakkieverliese te voorkom. Hierdie verhandeling
wys dat hierdie aanname nie geld vir netwerke met hoë mobiliteit nie, soos wat
die geval is vir VANET.
In hierdie verhandeling word die impak van bewustheidstrekking en bestuur van die
bewustheidsinligting in die MAC-vlak ondersoek. Die impak van die aantal tydgleuwe
wat nodig is om die bewustheidstrekking te ondersteun word ook ondersoek.
Drie nie-wedywerende metodes word bekendgestel om die navorsing te ondersteun.
Die eerste is 'n verbeterde weergawe van 'n bestaande MAC, wat gebruik word om die
e ekte van bewustheidsbestuur op MAC-werkverrigting te beoordeel. Die tweede MAC is
ontwerp om veranderbare bewustheidstrekking en hoeveelheid tydgleuwe te ondersteun,
en word gebruik om die e ekte van bewustheidstrekking en hoeveelheid tydgleuwe op
MAC werkverrigting aan te beoordeel. Die derde MAC is ewetoeganklik (onbewus van
omliggende nodusse) en word gebruik om die impak van die verwydering van bewustheid
op werkverrigting te ondersoek. 'n Analitiese model is ontwikkel om die simulasieresultate
te ondersteun.
Die simulasieresultate dui aan dat bewustheidstrekking, bestuur van bewustheidsinligting,
en hoeveelheid tydsgleuwe sleutel-ontwerpsveranderlikes is wat 'n beduidende impak
het op MAC werkverrigting. Die resultate wys verder dat optimale ontwerpsveranderlikes,
in terme van bewustheid, bestaan vir gegewe scenario's.
Laastens, word die nie-wedywerende en ewetoeganklike MAC-metodes wat gesimuleer
word se werkverrigting vergelyk met IEEE 802.11p. Al drie MAC metodes vaar beter as
die wedywerende standaard, IEEE 802.11p.
|
37 |
SIMULATION-BASED PERFORMANCE COMPARISONS OF GEOCAST ROUTING PROTOCOLSHequn, Zhang, Rui, Wang January 2014 (has links)
Intelligent Transportation System (ITS) is the main research domain for making road transport safer and more comfortable. For the sake of increasing the benefits of ITS, projects about Inter-Vehicle Communication (IVC) system have been proposed to make communications among vehicles possible, to exchange traffic information and avoid accidents. In order to create communication network among vehicles or between vehicles and infrastructure, Vehicular Ad hoc Networks (VANETs) has been proposed. Many applications in VANETs need to send messages to vehicles within a specific geographic region. This behavior is called geocast and this specific geographic region is called the Zone of Relevance (ZOR). Some routing protocols which are related to Geocast have been proposed in literature for VANETs. So it is significant to evaluate and compare the performance of these known Geocast routing protocols. In this thesis, categories of the routing protocols, as well as communication forwarding schemes are introduced. The routing protocols in VANETs are also summarized and compared. In order to evaluate the performance of these protocols, the evaluation methods are proposed and then a Geocast routing simulator is designed and used to simulate the Geocast network environment and several Geocast routing protocols.
|
38 |
Protocole de routage basé sur des passerelles mobiles pour un accès Internet dans les réseaux véhiculairesBa, Amadou Adama 04 1900 (has links)
La rapide progression des technologies sans fil au cours de ces dernières années a vu
naître de nouveaux systèmes de communication dont les réseaux véhiculaires. Ces réseaux
visent à intégrer les nouvelles technologies de l’information et de la communication dans le
domaine automobile en vue d’améliorer la sécurité et le confort sur le réseau routier. Offrir un accès Internet aux véhicules et à leurs occupants peut sans doute aider à anticiper
certains dangers sur la route tout en rendant plus agréables les déplacements à bord des véhicules. Le déploiement de ce service nécessite que des messages soient échangés entre les véhicules. Le routage constitue un élément crucial dans un réseau, car définissant la façon dont les différentes entités échangent des messages. Le routage dans les VANETS constitue un grand défi car ces derniers sont caractérisés par une forte mobilité entraînant une topologie très dynamique.
Des protocoles ont été proposés pour étendre Internet aux réseaux véhiculaires. Toutefois,
la plupart d’entre eux nécessitent un coût élevé de messages de contrôle pour
l’établissement et le maintien des communications. Ceci a pour conséquence la saturation de la bande passante entrainant ainsi une baisse de performance du réseau.
Nous proposons dans ce mémoire, un protocole de routage qui s’appuie sur des
passerelles mobiles pour étendre Internet aux réseaux véhiculaires. Le protocole prend en compte la mobilité des véhicules et la charge du réseau pour l’établissement et le maintien des routes. / The fast progression of wireless technologies has motivated the emergence of new communications system called VANETS (Vehicular Adhoc Networks). VANETS enable
vehicles on the roadway to communicate with each other and with road infrastructure using
wireless capabilities. The applications of VANETS include improving safety and comfort
on the road. For example, by providing Internet to vehicles, traveling can be safer and more comfortable. To provide Internet connectivity, messages need to be exchanged between the vehicles. However, it is hard to design an efficient routing protocol for connecting vehicles to Internet with a reasonable cost due to high mobility in VANETS.
Although, several existing routing protocols have been proposed in the open literature to
extend Internet to VANETS, they generate considerable overhead. This leads to unfairly
consumption of bandwidth decreasing network performance.
We design a routing protocol to connect vehicles to Internet through mobile gateways
with the objective to make efficient use of the network bandwidth. Indeed, the protocol
significantly reduces the communication overhead required to establish and maintain the routes relying on the mobility of the gateways and the network’s load.
|
39 |
Fusion distribuée de données échangées dans un réseau de véhicules / Distributed data fusion in VANETSEl Zoghby, Nicole 19 February 2014 (has links)
Cette thèse porte sur l'étude des techniques de fusion de données réparties et incertaines au sein d’un réseau de véhicules pour gérer la confiance dans les autres véhicules ou dans les données reçues. L'algorithme de fusion distribuée proposé est basé sur les fonctions de croyance et est appliqué par chaque nœud à la réception des messages. In se base sur la gestion d'une connaissance directe, locale à chaque nœud et d'une connaissance distribuée diffusée dans le réseau. Cette dernière résulte de la fusion des messages par un opérateur adapté prenant en compte les cycles éventuels et limitant l'effet de "data incest". Chaque nœud peut être autonome pour estimer la confiance mais la coopération entre les véhicules permet d'améliorer et de rendre plus robuste cette estimation. L'algorithme peut être adapté au cas d'étude en considérant un ou plusieurs éléments d'observation et en prenant en compte l'obsolescence des données. Lorsqu'il y a plusieurs éléments d'observation, se pose le problème de l'association de données nécessaire avant l'étape de combinaison. Un nouvel algorithme d'association a été formalisé dans le cadre des fonctions de croyance. Il a été démontré que ce problème est équivalent à un problème d'affectation linéaire, qui peut être résolu en temps polynomial. Cette solution est à la fois optimale et beaucoup plus efficace que d'autres approches développées dans ce formalisme. La gestion de la confiance dans les nœuds et dans les données échangées ont été illustrées par la mise en œuvre de deux applications : la détection de faux nœuds dans une attaque Sybil et la gestion de la confiance dans les cartes dynamiques pour la perception augmentée. / This thesis focuses on the study of fusion techniques for distributed and uncertain data in a vehicle network in order to manage the confidence in other vehicles or in received data. The proposed distributed fusion algorithm is based on belief functions and is applied by each node when it receives messages. It is based on the management of direct knowledge, local for each node, and the management of a distributed knowledge broadcasted over the network. The distributed knowledge is the result of the fusion of messages by a suitable operator taking into account the possible cycles and limiting the effect of "data incest". Each node can be autonomous to estimate confidence but cooperation between vehicles can improve and make more robust this estimation. The algorithm can be adapted to the case of study by considering one or more elements of observation and taking into account the data obsolescence. When there are multiple elements of observation, the data association is necessary before the combination step. A new association algorithm was formalized in the framework of belief functions.It has been shown that this problem is equivalent to a linear assignment problem which can be solved in polynomial time. This solution is both optimal and more effective than other approaches developed in this formalism. The confidence management in the nodes and in the received data were illustrated by the implementation of two applications : the detection of false nodes in a Sybil attack and the distributed dynamic maps for enhanced perception
|
40 |
Smart Broadcast Protocol Design For Vehicular Ad hoc NetworksUnknown Date (has links)
Multi-hop broadcast is one of the main approaches to disseminate data in
VANET. Therefore, it is important to design a reliable multi-hop broadcast protocol,
which satis es both reachability and bandwidth consumption requirements.
In a dense network, where vehicles are very close to each other, the number of
vehicles needed to rebroadcast the message should be small enough to avoid a broad-
cast storm, but large enough to meet the reachability requirement. If the network
is sparse, a higher number of vehicles is needed to retransmit to provide a higher
reachability level. So, it is obvious that there is a tradeo between reachability and
bandwidth consumption.
In this work, considering the above mentioned challenges, we design a number
of smart broadcast protocols and evaluate their performance in various network den-
sity scenarios. We use fuzzy logic technique to determine the quali cation of vehicles
to be forwarders, resulting in reachability enhancement. Then we design a band-
width e cient fuzzy logic-assisted broadcast protocol which aggressively suppresses
the number of retransmissions. We also propose an intelligent hybrid protocol adapts
to local network density. In order to avoid packet collisions and enhance reachability, we design a cross layer statistical broadcast protocol, in which the contention window
size is adjusted based on the local density information.
We look into the multi-hop broadcast problem with an environment based
on game theory. In this scenario, vehicles are players and their strategy is either
to volunteer and rebroadcast the received message or defect and wait for others to
rebroadcast. We introduce a volunteer dilemma game inspired broadcast scheme to
estimate the probability of forwarding for the set of potential forwarding vehicles. In
this scheme we also introduce a fuzzy logic-based contention window size adjustment
system.
Finally, based on the estimated spatial distribution of vehicles, we design a
transmission range adaptive scheme with a fuzzy logic-assisted contention window
size system, in which a bloom lter method is used to mitigate overhead.
Extensive experimental work is obtained using simulation tools to evaluate the
performance of the proposed schemes. The results con rm the relative advantages of
the proposed protocols for di erent density scenarios. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2017. / FAU Electronic Theses and Dissertations Collection
|
Page generated in 0.3644 seconds