• Title/Summary/Keyword: vehicular Networks

Search Result 222, Processing Time 0.026 seconds

A Handover Protocol for the IEEE WAVE-based Wireless Networks (IEEE WAVE 기반의 무선 네트워크를 위한 핸드오버 프로토콜)

  • Choi, Jung-Wook;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.1
    • /
    • pp.76-83
    • /
    • 2011
  • The IEEE WAVE-based communication systems do not provide handover services since most of the application layer messages of a small amount containing text data that are related to safe driving. Multimedia data service such as web pages and CCTV video clips, however, require a seamless handover for continuation of a session via multiple RSUs. In this paper, we propose a new proactive handover protocol based on IEEE WAVE. According to the proposed handover protocol, the OBU notifies the old RSU of its departure from the coverage such that the old RSU forwards to the new RSU the data heading towards the OBU to be cached for the further delivery upon its entry into the new RSU's coverage. The simulation results are presented which shows the performance of the proposed protocol in terms of throughput, delivery ratio and handover delay.

A Vehicle-to-Vehicle Communication Protocol Scheme for Forwarding Emergency Information in Intelligent Cars Transportation Systems (지능형 차량 전송시스템에서 긴급정보 전송을 위한 Vehicle-to-Vehicle 통신 프로토콜)

  • Kim, Kyung-Jun;Cha, Byung-Rae;Kim, Chul-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.2
    • /
    • pp.70-80
    • /
    • 2007
  • Inter-vehicular communication suffers from a variety of the problem on the road, resulting in large delay in propagating emergency warning. An energy depletion as well as a transmission delay may induced by traffic accident. A transmission delay are caused by direct contention from nodes that can hear each other or indirect contention from nodes that can not hear each other, but simultaneously transmit to the same destination. A variety of works have been researched to solve the transmission delay and energy consumption problem in intelligent cars transportation systems. We consider a vehicle-to-vehicle communication protocol for disseminating an emergency information that include end-to-end and energy efficient transmission. In this paper, we propose A vehicle-to-vehicle communication protocol scheme for dissemination emergency information in intelligent cars communication based on IEEE 802.15.3 wireless personal area networks. Results from a simulation study reveal that our scheme can achieves low latency in delivering emergency warnings, and efficiency in consuming energy in stressful road scenarios.

  • PDF

Performance Modelling of Adaptive VANET with Enhanced Priority Scheme

  • Lim, Joanne Mun-Yee;Chang, YoongChoon;Alias, MohamadYusoff;Loo, Jonathan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1337-1358
    • /
    • 2015
  • In this paper, we present an analytical and simulated study on the performance of adaptive vehicular ad hoc networks (VANET) priority based on Transmission Distance Reliability Range (TDRR) and data type. VANET topology changes rapidly due to its inherent nature of high mobility nodes and unpredictable environments. Therefore, nodes in VANET must be able to adapt to the ever changing environment and optimize parameters to enhance performance. However, there is a lack of adaptability in the current VANET scheme. Existing VANET IEEE802.11p's Enhanced Distributed Channel Access; EDCA assigns priority solely based on data type. In this paper, we propose a new priority scheme which utilizes Markov model to perform TDRR prediction and assign priorities based on the proposed Markov TDRR Prediction with Enhanced Priority VANET Scheme (MarPVS). Subsequently, we performed an analytical study on MarPVS performance modeling. In particular, considering five different priority levels defined in MarPVS, we derived the probability of successful transmission, the number of low priority messages in back off process and concurrent low priority transmission. Finally, the results are used to derive the average transmission delay for data types defined in MarPVS. Numerical results are provided along with simulation results which confirm the accuracy of the proposed analysis. Simulation results demonstrate that the proposed MarPVS results in lower transmission latency and higher packet success rate in comparison with the default IEEE802.11p scheme and greedy scheduler scheme.

Modification of Extended Version of IEEE 802.11 in ns-2 and Performance Analysis with Error Rate Using Computer Simulation (ns-2에서 IEEE 802.11 확장 모듈의 오류 수정과 Error Rate를 적용한 시뮬레이션 및 성능분석)

  • Jung, Jin-Uk;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2008-2015
    • /
    • 2010
  • Ns-2 is a proven simulator which is widely utilized to evaluate the performance of wired and wireless network. Ns-2.33 version introduced the extended version including the modules which the core functions of existing 802.11 PHY and MAC layer are implemented. However, if the error rate, one of most important parameters to evaluate a performance of wireless network, is applied to the extended version, the simulation is ceased with several fatal errors. Furthermore, a packet error is detected and discarded on MAC layer in the traditional protocol architecture, but there is the problem which can't identify information about a packet with error by processing packet error on PHY layer in this version. In this paper, we modify the extended version to resolve the above mentioned problems. And also we perform ns-2 simulation using the modified version on the IEEE 802.11p based vehicular ad-hoc networks, and then analyze effects of error rate.

Handling Of Sensitive Data With The Use Of 3G In Vehicular Ad-Hoc Networks

  • Mallick, Manish;Shakya, Subarna;Shrestha, Surendra;Shrestha, Bhanu;Cho, Seongsoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.49-54
    • /
    • 2016
  • Data delivery is very challenging in VANETs because of its unique characteristics, such as fast topology change, frequent disruptions, and rare contact opportunities. This paper tries to explore the scope of 3G-assisted data delivery in a VANET within a budget constraint of 3G traffic. It is started from the simple S_Random (Srand) and finally reached the 3GSDD, i.e., the proposed algorithm. The performance evaluation of different algorithms is done through the two metrics delivery ratio and average delay. A third function utility is created to reflect the above two metrics and is used to find out the best algorithm. A packet can either be delivered via multihop transmissions in the VANET or via 3G. The main challenge is to decide which set of packets should be selected for 3G transmissions and when to deliver them via 3G. The aim is to select and send those packets through 3G that are most sensitive and requiring immediate attention. Through appropriate communication mechanism, these sensitive information are delivered via VANET for 3G transmissions. This way the sensitive information which could not be transmitted through normal VANET will certainly find its destination through 3G transmission unconditionally and with top priority. The delivery ratio of the packets can also be maximized by this system.

Cryptanalysis of an Identity-Based Message Authentication Scheme in VANETs (신원기반의 차량통신망 메시지 인증 스킴에 대한 안전성 분석)

  • Ryu, Eun-Kyung;Lee, Sung-Woon;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.167-172
    • /
    • 2013
  • In a paper recently published in the International Journal of Parallel, Emergent and Distributed Systems, Biswas et al. proposed a VANET message authentication scheme which uses an identity-based proxy signature mechanism as an underlying primitive. The authors claimed that their scheme supports various security features including the security of proxy-key, the security against message forgery and the security against replay attack, with non-repudiation and resistance to proxy-key compromise. Here, we show how an active attacker, who has no knowledge of an original message sender's private key, can compute the proxy-signature key of the corresponding message sender, meaning that the scheme is completely insecure. We also suggest an enhanced version of the protocol capable of solving such serious security holes.

An Analysis of the Radio Interference in Wireless Vehicular Networks based on IEEE802.11b(WLAN) (IEEE802.11b(WLAN)기반의 차량 무선통신환경에서 전파간섭분석)

  • Lee, Myungsub;Park, Changhyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.117-125
    • /
    • 2012
  • Recently, there has been a fast paradigm shift in the automotive market from the traditional machine-oriented technology into the technology for vehicle informatics and electronics. In particular, telematics market is accelerating the development of technologies for vehicle informatics through the close cooperation between the vehicle makers and mobile communication companies. However, there may be the degradation of the quality of service by the interference since the telematics uses the wireless communication infrastructure for the base station-to-vehicle communication and the vehicle-to-vehicle communication. This paper presents an analysis device to easily analyze the interference by the wireless communication in the vehicle wireless network environment. Using the analysis results by the presented device, this paper shows that the link quality can be improved through the simulation and the experiment in real environment both.

Reliability Verification of Secured V2X Communication for Cooperative Automated Driving (자율협력주행을 위한 V2X 보안통신의 신뢰성 검증)

  • Jung, Han-gyun;Lim, Ki-taeg;Shin, Dae-kyo;Yoon, Sang-hun;Jin, Seong-keun;Jang, Soo-hyun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.391-399
    • /
    • 2018
  • V2X communication is a technology in which a vehicle exchanges information with various entities such as other vehicles, infrastructure, networks, pedestrians, etc. through a wired or wireless network. Recently, V2X communication technology has been steadily developed and recently it has played an important role in autonomous cooperation driving technology combined with autonomous vehicle technology. Autonomous vehicles can utilize the external information received via V2X communication to extend the recognition range of existing sensors and to support more safe and natural autonomous driving. In order to operate these autonomous cooperative vehicles on public roads, the security and reliability of autonomous V2X communication should be verified in advance. In this paper, we present test scenarios and test procedures of secure V2X communication for cooperative automated driving and present verification results.

An Efficient Optimization Technique for Node Clustering in VANETs Using Gray Wolf Optimization

  • Khan, Muhammad Fahad;Aadil, Farhan;Maqsood, Muazzam;Khan, Salabat;Bukhari, Bilal Haider
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4228-4247
    • /
    • 2018
  • Many methods have been developed for the vehicles to create clusters in vehicular ad hoc networks (VANETs). Usually, nodes are vehicles in the VANETs, and they are dynamic in nature. Clusters of vehicles are made for making the communication between the network nodes. Cluster Heads (CHs) are selected in each cluster for managing the whole cluster. This CH maintains the communication in the same cluster and with outside the other cluster. The lifetime of the cluster should be longer for increasing the performance of the network. Meanwhile, lesser the CH's in the network also lead to efficient communication in the VANETs. In this paper, a novel algorithm for clustering which is based on the social behavior of Gray Wolf Optimization (GWO) for VANET named as Intelligent Clustering using Gray Wolf Optimization (ICGWO) is proposed. This clustering based algorithm provides the optimized solution for smooth and robust communication in the VANETs. The key parameters of proposed algorithm are grid size, load balance factor (LBF), the speed of the nodes, directions and transmission range. The ICGWO is compared with the well-known meta-heuristics, Multi-Objective Particle Swarm Optimization (MOPSO) and Comprehensive Learning Particle Swarm Optimization (CLPSO) for clustering in VANETs. Experiments are performed by varying the key parameters of the ICGWO, for measuring the effectiveness of the proposed algorithm. These parameters include grid sizes, transmission ranges, and a number of nodes. The effectiveness of the proposed algorithm is evaluated in terms of optimization of number of cluster with respect to transmission range, grid size and number of nodes. ICGWO selects the 10% of the nodes as CHs where as CLPSO and MOPSO selects the 13% and 14% respectively.

Design of cellular, satellite, and integrated systems for 5G and beyond

  • Kim, Junhyeong;Casati, Guido;Cassiau, Nicolas;Pietrabissa, Antonio;Giuseppi, Alessandro;Yan, Dong;Strinati, Emilio Calvanese;Thary, Marjorie;He, Danping;Guan, Ke;Chung, Heesang;Kim, Ilgyu
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.669-685
    • /
    • 2020
  • 5G AgiLe and fLexible integration of SaTellite And cellulaR (5G-ALLSTAR) is a Korea-Europe (KR-EU) collaborative project for developing multi-connectivity (MC) technologies that integrate cellular and satellite networks to provide seamless, reliable, and ubiquitous broadband communication services and improve service continuity for 5G and beyond. The main scope of this project entails the prototype development of a millimeter-wave 5G New Radio (NR)-based cellular system, an investigation of the feasibility of an NR-based satellite system and its integration with cellular systems, and a study of spectrum sharing and interference management techniques for MC. This article reviews recent research activities and presents preliminary results and a plan for the proof of concept (PoC) of three representative use cases (UCs) and one joint KR-EU UC. The feasibility of each UC and superiority of the developed technologies will be validated with key performance indicators using corresponding PoC platforms. The final achievements of the project are expected to eventually contribute to the technical evolution of 5G, which will pave the road for next-generation communications.