• Title/Summary/Keyword: Vehicular network

Search Result 295, Processing Time 0.027 seconds

Performance Evaluation for a Unicast Vehicular Delay Tolerant Routing Protocol Networks

  • Abdalla, Ahmed Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.167-174
    • /
    • 2022
  • Vehicular Ad hoc Networks are considered as special kind of Mobile Ad Hoc Networks. VANETs are a new emerging recently developed, advanced technology that allows a wide set of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). Delay Tolerant Networks (DTN) are networks that allow communication in the event of connection problems, such as delays, intermittent connections, high error rates, and so on. Moreover, these are used in areas that may not have end-to-end connectivity. The expansion from DTN to VANET resulted in Vehicle Delay Tolerant Networks (VDTN). In this approach, a vehicle stores and carries a message in its buffer, and when the opportunity arises, it forwards the message to another node. Carry-store-forward mechanisms, packets in VDTNs can be delivered to the destination without clear connection between the transmitter and the receiver. The primary goals of routing protocols in VDTNs is to maximize the probability of delivery ratio to the destination node, while minimizing the total end-to-end delay. DTNs are used in a variety of operating environments, including those that are subject to failures and interruptions, and those with high delay, such as vehicle ad hoc networks (VANETs). This paper discusses DTN routing protocols belonging to unicast delay tolerant position based. The comparison was implemented using the NS2 simulator. Simulation of the three DTN routing protocols GeOpps, GeoSpray, and MaxProp is recorded, and the results are presented.

Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City

  • AlEisa, Hussah N.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.139-144
    • /
    • 2022
  • The smart cities are evolving constantly and are responsible for the current transformation of cities and countries into a completely connected network of information and technology This interconnected network of a huge number of smart devices is capable of exchanging complex information and provides tremendous support including enhanced quality of life within urban locations. Unfortunately this set-up is vulnerable to security attacks and requires the widespread ubiquitous network to authorize access through privacy and thus offer security in order to ensure civilian participation in a country. The smart network should benefit the individuals of the country by developing potential strategies to protect the smart cities and their participating entities from the unauthorized attacks. Trustworthy data sharing strategies based on the utilization of advanced technology features via smart communication network could solve some issues of privacy and security. This paper presents the challenges and issues related to protection and highlights the important aspects of securing the smart cities and its components. It also presents the role of cloud security for building a secure smart city.

CMS: Application Layer Cooperative Congestion Control for Safety Messages in Vehicular Networks

  • Lee, Kyu-haeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1152-1167
    • /
    • 2018
  • In this paper, I propose an application layer cooperative congestion control scheme for safety message broadcast in vehicular networks, called CMS, that adaptively controls a vehicle's safety message rate and transmit timing based on the channel congestion state. Motivated by the fact that all vehicles should transmit and receive an application layer safety message in a periodic manner, I directly exploit the message itself as a means of estimating the channel congestion state. In particular, vehicles can determine wider network conditions by appending their local channel estimation result onto safety message transmissions and sharing them with each other. In result CMS realizes cooperative congestion control without any modification of the existing MAC protocol. I present extensive NS-3 simulation results which show that CMS outperforms conventional congestion control schemes in terms of the packet collision rate and throughput, especially in a high-density traffic environment.

Block Space-based Multipath Routing in Vehicular Ad-hoc Networks (VANET 환경에서의 공간 기반 다중경로 라우팅 방안에 관한)

  • Yim, Jinhyuk;Kim, Hoewon;Lee, Hyunkyu;Lee, Euisin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.106-107
    • /
    • 2016
  • Vehicular Adhoc Network는 accident warning, road condition message와 같은 도로상의 정보를 vehicle-to-vehicle 통신을 통해 주어진 목적지까지 얼마나 빠르고 정확하게 전송하는 것이 주요 이슈이다. 무선 센서 네트워크의 많은 타입들 중에서 VANET 환경에 적합한 source 기반의 라우팅 프로토콜은 불안정한 이동 네트워크의 역할을 충실히 수행할 수 있다. Source 라우팅 기법들을 연구하는데 road topology와 map 정보가 사용되며, 본문에서는 도로의 상황과, 라우팅이 직접 수행되는 영역을 부분으로 나누어 각 영역에 속한 이동 노드를 파악하여 다중 경로 라우팅 방안을 제시하여 error 발생과 link fail에 대한 신속한 대처를 수행한다.

Design and Implementation of Certificate Revocation List Acquisition Method for Security of Vehicular Communications

  • Kim, Hyun-Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7C
    • /
    • pp.584-591
    • /
    • 2012
  • Distributing a Certificate Revocation List (CRL) quickly to all vehicles in the system requires a very large number of road side units (RSUs) to be deployed. In reality, initial deployment stage of vehicle networks would be characterized by limited infrastructure as a result in very limited vehicle to infrastructure communication. However, every vehicle wants the most recent CRLs to protect itself from malicious users and malfunctioning equipments, as well as to increase the overall security of the vehicle networks. To address this challenge, we design and implement a nomadic device based CRL acquisition method using nomadic device's communication capability with cellular networks. When a vehicle could not directly communicate with nearby RSUs, the nomadic device acts as a security mediator to perform vehicle's security functions continuously through cellular networks. Therefore, even if RSUs are not deployed or sparsely deployed, vehicle's security threats could be minimized by receiving the most recent CRLs in a reasonable time.

VANET cloud computing architecture (VANET 클라우드 컴퓨팅 아키텍처)

  • Kim, TaeHyeong;Song, JooSeok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.142-145
    • /
    • 2014
  • 지금까지 교통사고 예방을 위한 도로 정보 등을 제공하기 위해 차량 간 통신 네트워크인 Vehicular Ad hoc NETwork (VANET)연구가 활발히 진행되어왔다. 그러나 각 자동차의 On board unit (OBU)의 계산 능력, 저장 공간 등을 효율적으로 사용하는 연구는 진행되어 오지 않았다. 2011년 Olariu et al. 가 cloud computing을 기존의 VANET에 적용하는 개념인 Autonomous Vehicular cloud[1]를 제시하면서 새로운 VANET 연구의 새로운 장을 열었다. 기존의 VANET연구는 지금까지의 각각의 자동차의 통신 성능을 높이는 것에 초점을 맞추었지만, 새로운 아이디어는 높아진 각 자동차의 능력을 효율적으로 이용하여, 유용하게 사용하는 것에 초점을 맞추었다. 이것은 Intelligent Transport System (ITS)의 구축에 한발 더 나아갈 수 있게 하였다. 그 이후 VANET cloud computing (VCC)에 관한 많은 연구들이 진행되었으나 보안적인 측면에서는 아직 연구가 미흡한 실정이다. 그래서 본 논문에서는 보안을 보완한 VCC 아키텍처를 제안한다.

Authentication Protocol for Inter-Vehicle Communication in Vehicular Ad Hoc Networks (VANET 상에서의 차량간 통신을 위한 인증 프로토콜)

  • Park, Young-Ho;Na, Jin-Han;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.81-85
    • /
    • 2009
  • In VANET, it is required one-way broadcast transmission because vehicles move at high speed and warning messages need to broadcast. our protocol employs digital signatures to authenticate nodes along the path. this prevents impersonation attacks and message modification attacks. our protocol also employs the node list to recognize intermediate nodes of the path. The node list, the time, and the nonce can prevent replay attacks.

Task offloading under deterministic demand for vehicular edge computing

  • Haotian Li ;Xujie Li ;Fei Shen
    • ETRI Journal
    • /
    • v.45 no.4
    • /
    • pp.627-635
    • /
    • 2023
  • In vehicular edge computing (VEC) networks, the rapid expansion of intelligent transportation and the corresponding enormous numbers of tasks bring stringent requirements on timely task offloading. However, many tasks typically appear within a short period rather than arriving simultaneously, which makes it difficult to realize effective and efficient resource scheduling. In addition, some key information about tasks could be learned due to the regular data collection and uploading processes of sensors, which may contribute to developing effective offloading strategies. Thus, in this paper, we propose a model that considers the deterministic demand of multiple tasks. It is possible to generate effective resource reservations or early preparation decisions in offloading strategies if some feature information of the deterministic demand can be obtained in advance. We formulate our scenario as a 0-1 programming problem to minimize the average delay of tasks and transform it into a convex form. Finally, we proposed an efficient optimal offloading algorithm that uses the interior point method. Simulation results demonstrate that the proposed algorithm has great advantages in optimizing offloading utility.

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.

A Study of Stable Route Decision Based on VANET Routing Protocol in Urban Environment (도심환경에서의 안정적 경로 설정을 위한 VANET 라우팅 프로토콜)

  • Ham, Woo-Hyung;Jang, Sang-Woo;Lee, Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.3
    • /
    • pp.70-80
    • /
    • 2012
  • In Vehicular Ad-hoc Network(VANET) which constructs networks without fixed infrastructure among vehicles, network topology is frequently changed due to high mobility. In case of urban model, communication disconnections caused by interruptions of communication propagation such as buildings and constructions could be often occurred. Therefore, in VANET environment a routing protocol to complement its characteristics is needed. This paper suggests an algorithm to improve the transmission performance at intersections by approaching of the distance-based broadcasting which utilizes the information of vehicle's position. By using relative velocity among vehicles, it makes the stability of route decision improved and reduces packet collisions through graded priorities in the intersection, and simultaneously improves the performance of data rate. It can be seen that the performance compared with previous algorithm is significantly improved when using the suggested algorithm in the urban traffic environment.