首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Speed variation is one of the main challenges in deriving the connectivity related predictions in mobile ad-hoc networks, especially in vehicular ad hoc networks (VANETs). In such a dynamic network, a piece of information can be rapidly propagated through dedicated short-range communication, or can be carried by vehicles when multihop connectivity is unavailable. This paper proposes a novel analytical model that carefully computes the connectivity distance for a single direction of a free-flow highway. The proposed model adopts a time-varying vehicular speed assumption and mathematically models the mobility of vehicles inside connectivity. According to the dynamic movability scenario, a novel and accurate closed form formula is proposed for probability density function of connectivity. Moreover, using vehicular spatial distribution, joint Poisson distribution of vehicles in a multilane highway and tail probability of the expected number of vehicles inside single lane in a multilane highway are mathematically investigated. The accuracy of analytical results is verified by simulation. The concluded results provide helpful insights towards designing new applications and improving performance of existing applications on VANETs.  相似文献   

2.
Vehicular communication networking is a promising approach to facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this article we first review the current standardization process, which covers the methods of providing security services and preserving driver privacy for wireless access in vehicular environments (WAVE) applications. We then address two fundamental issues, certificate revocation and conditional privacy preservation, for making the standards practical. In addition, a suite of novel security mechanisms are introduced for achieving secure certificate revocation and conditional privacy preservation, which are considered among the most challenging design objectives in vehicular ad hoc networks.  相似文献   

3.
4.
The aim of this paper is to study the Aloha medium access (MAC) scheme in 1D, linear networks, which might be an appropriate assumption for vehicular ad hoc networks. We study performance metrics based on the signal over interference plus noise ratio assuming power-law mean path-loss and independent point-to-point fading. We derive closed formulas for the capture probability. We consider the presence or the absence of noise and we study performance with outage or with adaptive coding. We carry out the joint optimization of the density of packet progress (in bit-meters) both in the transmission probability and in the transmission range. We also compare the performance of slotted and non-slotted Aloha. We show that in contrast to planar networks the density of packet progress per unit of length does not increase with the network node density.  相似文献   

5.
Vehicular ad hoc networks aim at increasing passenger safety by exchanging warning messages between vehicles wirelessly. A main challenge is to resist to various malicious abuses and security attacks. However, any security mechanism comes with overhead. We analyze how the authentication algorithm ECDSA and the consensus mechanism impact the vehicular network performance and the braking distance. Processing and communication overheads, decision methods for consensus, are analyzed by analytical models and intensive simulations. We propose a formula to assess the total time overhead of the authentication. Results conclude that the authentication key size should be chosen carefully, and the decision method should be adapted to the context.  相似文献   

6.
《现代电子技术》2018,(4):164-168
有效地传输数据是提高车联网应用性能的关键。而动态的拓扑结构,给车联网的数据传输提出了挑战。为此,提出基于路径连通概率的车联网路由算法CPB。首先,依据高速公路场景,建立一维车辆移动模型,然后再计算链路的连通概率,最后,计算路径的连通概率,并选择连通概率最高的路径传输数据。仿真结果表明,提出的CPB算法能够有效地提高数据包传递率、端到端传输时延以及吞吐量性能。  相似文献   

7.
Wireless Networks - Maintaining durable connectivity during data forwarding in Vehicular Ad hoc Networks has witnessed significant attention in the past few decades with the aim of supporting most...  相似文献   

8.
The goal of the network mobility management is to effectively reduce the complexity of handoff procedure and keep mobile devices connecting to the Internet. When users are going to leave an old subnet and enter a new subnet, the handoff procedure is executed on the mobile device, and it may break off the real‐time service, such as VoIP or mobile TV, because of the mobility of mobile devices. Because a vehicle is moving so fast, it may cause the handoff and packet loss problems. Both of the problems will lower down the throughput of the network. To overcome these problems, we propose a novel network mobility protocol for vehicular ad hoc networks. In a highway, because every car is moving in a fixed direction at a high speed, a car adopting our protocol can acquire an IP address from the vehicular ad hoc network through the vehicle‐to‐vehicle communications. The vehicle can rely on the assistance of a front vehicle to execute the prehandoff procedure, or it may acquire a new IP address through multihop relays from the car on the lanes of the same or opposite direction and thus may reduce the handoff delay and maintain the connectivity to the Internet. Simulation results have shown that the proposed scheme is able to reduce both the handoff delay and packet loss rate. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

9.
Jinyuan  Yuguang   《Ad hoc Networks》2009,7(8):1515
Vehicular ad hoc network (VANET) can offer various services and benefits to VANET users and thus deserves deployment effort. Misusing such network could cause destructive consequences. It is therefore necessary to discourage misbehavior and defend VANET systems against it, in order to ensure correct and smooth operations of the network. In this paper, we review the techniques for handling misbehavior in VANETs, particularly where anonymous communications are desired to conserve user privacy since it adds more complexity to the defense against misbehavior. A new scheme is proposed to punish misbehaving users and can be employed in both inter-vehicle and vehicle-to-infrastructure anonymous communications. Our scheme leverages some threshold authentication technique that dynamically revokes a user’s credential, while providing the flexibility of whether to reveal the user’s identity and tolerating unintentional misbehavior such as hardware malfunctioning.  相似文献   

10.
车载自组网的现状与发展   总被引:22,自引:0,他引:22  
常促宇  向勇  史美林 《通信学报》2007,28(11):116-126
简要介绍了车载自组网的发展历史、特点和应用领域。使用分析和比较的方法,讨论各种无线通信技术用于车载自组网的优缺点,并针对车载自组网的应用及特性提出搭建车间通信系统的设计思想和突破方向。为了便于读者跟踪国外先进的研究成果,还介绍了一些在这一领域比较活跃的研究机构以及他们的主要工作。  相似文献   

11.
12.
High mobility of nodes in vehicular ad hoc networks (VANETs) may lead to frequent breakdowns of established routes in conventional routing algorithms commonly used in mobile ad hoc networks. To satisfy the high reliability and low delivery‐latency requirements for safety applications in VANETs, broadcasting becomes an essential operation for route establishment and repair. However, high node mobility causes constantly changing traffic and topology, which creates great challenges for broadcasting. Therefore, there is much interest in better understanding the properties of broadcasting in VANETs. In this paper we perform stochastic analysis of broadcasting delays in VANETs under three typical scenarios: freeway, sparse traffic and dense traffic, and utilize them to analyze the broadcasting delays in these scenarios. In the freeway scenario, the analytical equation of the expected delay in one connected group is given based on statistical analysis of real traffic data collected on freeways. In the sparse traffic scenario, the broadcasting delay in an n‐vehicle network is calculated by a finite Markov chain. In the dense traffic scenario, the collision problem is analyzed by different radio propagation models. The correctness of these theoretical analyses is confirmed by simulations. These results are useful to provide theoretical insights into the broadcasting delays in VANETs. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

13.
Broadcast storm mitigation techniques in vehicular ad hoc networks   总被引:9,自引:0,他引:9  
Several multihop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collisions at the link layer due to an excessive number of broadcast packets. While this is a well-known problem in mobile ad hoc wireless networks, only a few studies have addressed this issue in the VANET context, where mobile hosts move along the roads in a certain limited set of directions as opposed to randomly moving in arbitrary directions within a bounded area. Unlike other existing works, we quantify the impact of broadcast storms in VANETs in terms of message delay and packet loss rate in addition to conventional metrics such as message reachability and overhead. Given that VANET applications are currently confined to using the DSRC protocol at the data link layer, we propose three probabilistic and timer-based broadcast suppression techniques: weighted p-persistence, slotted 1-persistence, and slotted p-persistence schemes, to be used at the network layer. Our simulation results show that the proposed schemes can significantly reduce contention at the MAC layer by achieving up to 70 percent reduction in packet loss rate while keeping end-to-end delay at acceptable levels for most VANET applications.  相似文献   

14.
In vehicular ad hoc networks (VANETs), communication takes place between vehicles to vehicles, the vehicles to the road side units, and vice-versa. The basic purpose of these communications is to share and exchange tremendous amount of data and information. For efficient information sharing, a systematic and structured connection establishment algorithm is needed. In VANETs, each connected node of the network need to be assigned a unique address. Hence, an algorithm is needed for the proper assignment of unique address to all nodes in the network. This paper explains different types of IP address protocols in VANETs. We have also explained advantage and disadvantage of existing IP address allocation protocols in VANETs.  相似文献   

15.
Recently, Maria Azees et al proposed an “EAAP: efficient anonymous authentication with conditional privacy‐preserving scheme for Vehicular Ad Hoc Networks.” Their scheme is mainly to solve the problem of high computation time of anonymous certificate and signature authentication, as well as the tracking problem of malicious vehicles. However, some improvements are needed in the protection of anonymous identity and the effective tracking of malicious vehicles. In this paper, our scheme realizes mutual authentication between OBU and RSU, and the RSU is authenticated without using certificate. In order to prevent the anonymous identity of the vehicles from being monitored and tracked, we use the negotiated short‐time key to encrypt the anonymous identity in the vehicle certificates. In addition, our scheme uses a new tracking method for malicious vehicles. Then, we prove the scheme through BAN logic, and it has the properties of authentication, anonymity, unlinkability, privacy protection, and traceability. Finally, we compare the computation cost and communication cost with other schemes, and the scheme has been greatly improved.  相似文献   

16.
17.
A fuzzy logic approach to beaconing for vehicular ad hoc networks   总被引:2,自引:0,他引:2  
Vehicular Ad Hoc Network (VANET) is an emerging field of technology that allows vehicles to communicate together in the absence of fixed infrastructure. The basic premise of VANET is that in order for a vehicle detect other vehicles in the vicinity. This cognizance, awareness of other vehicles, can be achieved through beaconing. In the near future, many VANET applications will rely on beaconing to enhance information sharing. Further, the uneven distribution of vehicles, ranging from dense rush hour traffic to sparse late night volumes creates a pressing need for an adaptive beaconing rate control mechanism to enable a compromise between network load and precise awareness between vehicles. To this end, we propose an intelligent Adaptive Beaconing Rate (ABR) approach based on fuzzy logic to control the frequency of beaconing by taking traffic characteristics into consideration. The proposed ABR considers the percentage of vehicles traveling in the same direction, and status of vehicles as inputs of the fuzzy decision making system, in order to tune the beaconing rate according to the vehicular traffic characteristics. To achieve a fair comparison with fixed beaconing schemes, we have implemented ABR approach in JIST/SWANs. Our simulation shows that the proposed ABR approach is able to improve channel load due to beaconing, improve cooperative awareness between vehicles and reduce average packet delay in lossy/lossless urban vehicular scenarios.  相似文献   

18.
A vehicular ad hoc network (VANET) is a highly mobile wireless ad hoc network formed by vehicles equipped with communication facilities. Developing multihop communication in VANETs is a challenging problem because of rapidly changing network topology and frequent network disconnections. This paper investigates the network connectivity probability of one‐dimensional VANET in the presence of channel randomness. Network connectivity is one of the most important issues in VANETs, because the dissemination of time‐critical information requires, as a preliminary condition, the network to be fully connected. We present an analytical procedure for the computation of network connectivity probability, taking into account the underlying wireless channel. Three different fading models are considered for the connectivity analysis: Rayleigh, Rician, and Weibull. A distance‐dependent power law model is employed for the pathloss in a vehicle‐to‐vehicle channel. Furthermore, the speed of each vehicle on the highway is assumed to be a Gaussian distributed random variable. The analysis provides a general framework for investigating the dependence of various parameters such as vehicle arrival rate, vehicle density, vehicle speed, highway length, and various physical layer parameters such as transmit power, receive signal‐to‐noise ratio threshold, path loss exponent, and fading factors (Rician and Weibull) on VANET connectivity. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

19.
Telecommunication Systems - Recently, the increasing demand for low latency, the explosive growth in the volume of network traffic, the large and growing number of connected devices, and...  相似文献   

20.
In this paper, we consider a high-speed highway mobility scenario, where the available knowledge about the network’s topology is used to improve the routing path duration. The improvement is mainly due to the use of a topology control algorithm, which increases the path duration by decreasing the probability of path breaks. For network regions having an enough density of vehicles, the packets are preferentially routed over the oldest links created by the vehicles moving in the same direction. For smaller values of vehicles’ density, the routing preferentially uses the most recent links created in both moving directions. This choice is shown to increase the routing path duration.The topology control scheme here proposed can be easily integrated in the existing routing protocols: we describe how to integrate it in the Optimized Link-State Routing Protocol (OLSR).1 We compare the performance of our approach with other routing protocols for different values of vehicles’ density. The comparison includes end-to-end path delay, path availability and path length (in number of hops). Finally, we evaluate the path duration achieved with our approach, concluding that it exhibits a significant improvement over the most relevant topology and position-based routing protocols.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号