首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The use of unmanned aerial vehicles has significantly increased for forming an ad hoc network owing to their ability to perform in exciting environment such as armed attacks, border surveillance, disaster management, rescue operation, and transportation. Such types of ad hoc networks are popularly known as flying ad hoc networks (FANETs). The FANET nodes have 2 prominent characteristics—collaboration and cooperation. Trust plays an important role in predicting the behavior of such nodes. Researchers have proposed various methods (direct and indirect) for calculation of the trust value of a given node in ad hoc networks, especially in mobile ad hoc networks and vehicular ad hoc networks. The major characteristic that differentiates a FANET from other ad hoc networks is the velocity of the node; as a result, there are frequent losses in connection and topology change. Therefore, the existing methods of trust calculation are not efficient and effective. In this paper, a fuzzy‐based novel trust model has been proposed to handle the behavioral uncertainty of FANET nodes. Nodes are classified using a multicriteria fuzzy classification method based on node's behavior and performance in the fuzzy and complex environment. Quality of service and social parameter (recommendation) are considered for evaluating the trust value of each node to segregate the selfish and malicious nodes. With the node classification, FANET nodes are rewarded or punished to transform node behavior into a trust value. Compared with the existing trust techniques, the simulation results show that the proposed model has better adaptability, accuracy, and performance in FANETs.  相似文献   

2.
The word population is growing on a daily basis; consequently, the growth of commute and transport, developing efficient and intelligent transportation systems (ITS), has become one of the most popular requirements and the most significant attempts in modern urban areas containing large population. A key component of intelligent transportation systems is a vehicular ad hoc network. Devising internet‐based practical programs such as awareness of climatic conditions, geographical location, practical programs like on‐line payment services in the vehicular ad hoc network has led to safer driving, prevention of deadly accidents, transportation improvement, more welfare and convenience for passengers, and even offering more commercial opportunities. The special features of vehicular ad hoc network, such as intense activity, constantly‐changing topology, the vehicles' high speed, etc, will lead to challenges in gaining security. Therefore, providing vehicular ad hoc networks with security is of extreme importance in terms of users' anonymity, identification, and data privacy. In this paper, a security model is presented using a method based on evolutionary games. This method, in every vehicle, is applied as a node in the network while interacting with other vehicles; it aims at distinguishing some common attacks and defending against attackers. In this method, defending (honest) vehicles and attacking vehicles take part in an asymmetrical game; each vehicle aims at gaining the most utility and achieving its goals. The proposed method is simulated using various scenarios. The simulation results reveal that the proposed method is efficient and it reaches equilibrium and convergence at the end of the game in each scenario.  相似文献   

3.
In this paper, we use fuzzy Petri nets (FPNs) to propose a secure routing protocol in mobile ad hoc network. The proposed method is based on secure ad hoc on‐demand distance vector (SAODV), which is named FPN‐SAODV. In FPN‐SAODV routing protocol, for each packet delivery or firing each transition, a type of bidirectional node‐to‐node fuzzy security verification is conducted that can be carried out with five security threshold levels. This inference uses four fuzzy variables that have been selected to well represent the malicious behaviors of some public attacks in mobile ad hoc network. Furthermore, a through route security verification has been used for selecting the most secure route among each candidate path through source node to destination. Both of these verifications utilize FPN inherent features for their operation. For evaluation purpose, we used the metrics such as packet delivery ratio, end‐to‐end delay, average security level of the nodes, and percentage of true/false detector nodes. These metrics have been used for investigating the inner operation of FPN‐SAODV as determining the proper level of security threshold level in node‐to‐node security verification module. Also, these are used for comparison of FPN‐SAODV performance versus the original AODV. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

4.
Integration of vehicular ad hoc network and fixed IP network is important to provide Internet connection and mobile data service for vehicles. However, the unique characteristics of vehicular networks, such as linear topology and constrained movements of vehicles, are not considered in the conventional mobility management schemes. Using conventional schemes, unnecessary management messages are generated and the connections to roadside-installed base stations are not fully utilized. As the results, bandwidth is wasted and data delivery ratio is not maximized. In this paper, we propose a novel mobility management scheme to integrate vehicular ad hoc network and fixed IP networks more efficiently. The proposed scheme manages mobility of vehicles based on street layout as well as the distance between vehicles and base stations. Utilizing the unique characteristics of vehicular networks, the proposed scheme has substantially less mobility management overhead and higher data delivery ratio. The proposed scheme is simulated by SUMO (a vehicular traffic simulator) and QualNet (a data network simulator). The simulation results show that the proposed scheme reduced the mobility management overhead up to 63% and improved the data delivery ratio up to 90%.  相似文献   

5.

In vehicular ad-hoc network, vehicles are move very speedy thus their topology is changing frequently and intermittent connectivity occur often. The intermittent connectivity network (delay and disruption-tolerant network) resulting is end to end path is absent. In this intermittent network connectivity areas, during emergency event occurs, emergency rescue message (Example: Fire, Accident, etc.,) are sent to a rescue team is most necessary. Due to these constraints, general ad hoc protocol approaches is not suitable and, as a result, alternative protocol must be deliberated. This leads to the make a specific protocol mechanisms able to deliver both fast and trustworthiness in-order delivery emergency message needed. Thus we introduce the DFEMDR protocol, it follow the vehicular delay tolerant network (VDTN) common technique store carry-forward method and message replicas. This paper describes an efficient Delay tolerant Fast Emergency Message Dissemination Routing Protocol, called DFEMD routing protocol. This protocol enables in VDTN, the source node broadcast an emergency message to all available node in its communication range. The source node allocates a message replicas and message time to live to the neighbour nodes (forwarded node) based on that node has credence value. Credence value is calculated to all nodes based on two values; the first value is visited level estimation, it is calculated based on the number of nodes previously visited by the node. The second value is Destination Reaches Level Estimation (DLE); it is calculated based on the number of times the node successfully delivered the message to the destination. Finally, each node credence value is calculated, from this visited level and destination reaches level estimation values. Finally, the trust authority received emergency messages and evaluate the trustworthiness of message based on message reputation value or message confidence value.

  相似文献   

6.
With the rapid development of wireless technologies and the growing emphasis on vehicle safety, many vehicular ad hoc network applications have been extensively used. This study attempts to use vehicular ad hoc network technologies for autonomous driving to improve and reduce traffic congestion and vehicle waiting time. Therefore, this study proposes an adaptively intelligent routing system, which uses V2V communications to increase vehicle speed, allows vehicles to communicate with traffic control systems, arranges appropriate vehicle routes based on queuing theory, and uses traffic signals for information exchange. The timing of traffic signals is decided according to road traffic density. To decrease vehicle waiting time at intersections, every vehicle's speed is adjusted based on the distance between the vehicle and the traffic signals. In the simulation, automated vehicles and a more realistic car‐following model are taken into consideration and vehicle speeds are regulated based on speed limits and safe following distance on most roads. The simulation result reveals that our proposed adaptively intelligent routing system outperforms periodic system in average vehicle speed and average waiting time at both single and double cross intersections. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

7.
The arrival of cloud computing technology promises innovative solutions to the problems inherent in existing vehicular ad hoc network (VANET) networks. Because of the highly dynamic nature of these networks in crowded conditions, some network performance improvements are needed to anticipate and disseminate reliable traffic information. Although several approaches have been proposed for the dissemination of data in the vehicular clouds, these approaches rely on the dissemination of data from conventional clouds to vehicles, or vice versa. However, anticipating and delivering data, in a proactive way, based on query message or an event driven has not been defined so far by these approaches. Therefore, in this paper, a VANET‐Cloud layer is proposed for traffic management and network performance improvements during congested conditions. For the traffic management, the proposed layer integrates the benefits of the connected sensor network (CSN) to collect traffic data and the cloud infrastructure to provide on‐demand and automatic cloud services. In this work, traffic services use a data exchange mechanism to propagate the predicted data using a fuzzy aggregation technique. In the evaluation phase, simulation results demonstrate the effectiveness of the proposed VANET‐Cloud layer to dramatically improve traffic safety and network performance as compared with recent works.  相似文献   

8.
This paper proposes transmission power control for vehicular ad hoc network (VANET) using fuzzy system. Despite the potential advantages of VANET especially for safety and intelligent transportation system, some challenges are discovered during the implementation of VANET. Main challenges emerge because of the dynamic environment and high mobility of vehicle. Furthermore, the interference due to the shared‐spectrum usage can significantly decrease the quality of signal. Fuzzy system is implemented to control the transmission power based on the signal to interference and noise ratio (SINR) difference with the targeted value of the receiver vehicle and the interference inflicted by the transmitter vehicle. The algorithm of fuzzy power control for VANET is proposed, and the performance is evaluated through the simulations. The results of simulations show that the proposed algorithm can increase SINR of vehicles especially the vehicles with SINR value below the target. Thus, the average of SINR and the throughput of the system can be increased as well.  相似文献   

9.
Vehicular ad hoc networks are emerging as a promising approach to improve traffic safety and provide a wide range of wireless applications to drivers and passengers on the road. In order to perform reliable and trusted vehicular communications, one requirement is to ensure peer vehicle credibility by means of validating digital certificate attached to messages that are transmitted by other vehicles. However, in vehicular communication systems, certificate validation is more time consuming than in traditional networks because each vehicle receives a large number of messages in a short period. Another concern is the unsuccessful delivery of information between vehicles and other entities on the road due to their high mobility rate. For these reasons, we seek new solutions that will aid in speeding up the process of certificate validation. In this article, we propose a certificate revocation status validation scheme using the concept of clustering from data mining that can meet the aforementioned requirements. We employ the technique of k‐Means clustering to boost the efficiency of certificate validation, thereby enhancing the security of a vehicular ad hoc network. Additionally, a comprehensive security analysis for this scheme is presented; the analysis shows that this scheme can effectively improve the validation of certificates and thus increase the communication security in vehicular ad hoc networks. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

10.
When it comes to keeping the data routing robust and effective in vehicular ad hoc networks (VANETs), stable and durable connectivity constitutes the keystone to ensure successful point‐to‐point communication. Since VANETs can comprise all kinds of mobile vehicles moving and changing direction frequently, this may result in frequent link failures and network partitions. Moreover, when VANETs are deployed in a city environment, another problem arises, that is, the existing obstructions (eg, buildings, trees, and hoppers) preventing the line‐of‐sight between vehicles, thus degrading wireless transmissions. Therefore, it is more complicated to design a routing technique that adapts to frequent changes in the topology. In order to settle all these problems, in this work, we design a flooding scheme that automatically reacts at each topology variation while overcoming the present obstacles while exchanging data in ad hoc mode with drones that are commonly called unmanned aerial vehicles (UAVs). Also, the aim of this work is to explore well‐regulated routing paths providing a long lifetime connectivity based on the amount of traffic and the expiration time of each discovered path. A set of experiments is carried out using a simulation, and the outcomes are confronted with similar protocols based on a couple of metrics. The results clearly show that the assistance of UAVs to vehicles is capable of providing high delivery ratios and low delivery delays while efficiently extending the network connectivity.  相似文献   

11.
基于自组织映射神经网络的VANET组网算法   总被引:1,自引:0,他引:1  
吴怡  杨琼  吴庆祥  沈连丰  林潇 《通信学报》2011,32(12):136-145
研究了应用于汽车辅助驾驶、无人驾驶等智能交通领域的车辆组网方法,提出一种将自组织映射神经网络算法应用于车辆自组织网络进行车辆组网的算法,该算法根据车辆定时发出的消息中位置、行驶方向等信息对车辆按目的地、行驶方向的相似性进行组网,组网后的车辆主要接收并处理与之在同一个网络中的车辆的信息。理论分析和仿真结果表明,组网后的系统传输时延远低于未组网通信情况,吞吐量有显著提高。  相似文献   

12.
Vehicular ad hoc networks (VANETs) evolved by adopting the principles of mobile ad hoc networks. This network has been designed to deploy safety related application in vehicular node in the less chaotic environment in road scenarios. Vehicles exchange emergency messages through direct communication. In a practical situation, a direct communication between the vehicles is not possible, and it is prohibited by either static or dynamic obstacles. These obstacles prevent the direct communication between the vehicles and can craft a situation like non‐line of sight (NLOS). This NLOS becomes a perennial problem to the researchers as it creates localization and integrity issues which are considered to be important for road safety applications. Handling the moving obstacles is found to be a challenging one in the VANET environment as obstacles like truck are found to have similar characteristics of the vehicular nodes. This paper utilizes the merits of the meta‐heuristic approach and makes use of the improved gray wolf optimization algorithm for improving the localization and integrity services of the VANET by overcoming the NLOS conditions. The proposed methodology is found to have improved neighborhood awareness, reduced latency, improved emergency message delivery rate, and reduced mean square error rate.  相似文献   

13.
Malik  Nisha  Nanda  Priyadarsi  He  Xiangjian  Liu  Ren Ping 《Wireless Networks》2020,26(6):4207-4226
Wireless Networks - In vehicular ad hoc networks (VANET), effective trust establishment with authentication is an important requirement. Trust management among communicating vehicles is significant...  相似文献   

14.
In a vehicular ad‐hoc network (VANET), vehicles can play an essential role in monitoring areas of a smart city by transmitting data or multimedia content of environmental circumstances like disasters or road conditions. Multimedia content communication with quality of experience (QoE) guarantees is a challenging undertaking in an environment such as that of a VANET. Indeed, a VANET is characterized by numerous varying conditions, significantly impacting its topology, quality of communication channels, and paths with respect to bandwidth, loss, and delay. This paper introduces a link efficiency and quality of experience aware routing protocol (LEQRV) to improve video streaming provisioning in urban vehicular ad‐hoc networks. LEQRV uses an enhanced greedy forwarding‐based approach to create and maintain stable high quality routes for video streaming delivery. It improves the performance of the quality of experience by increasing the achieved QoE scores and reducing the forwarding end‐to‐end delay and frame loss.  相似文献   

15.
This paper presents a new trust evaluation scheme in an ad hoc network. To overcome the limited information about unfamiliar nodes and to reduce the required memory space, we propose a cluster‐based trust evaluation scheme, in which neighboring nodes form a cluster and select one node as a cluster head. The head issues a trust value certificate that can be referred to by its non‐neighbor nodes. In this way, an evaluation of an unfamiliar node's trust can be done very efficiently and precisely. In this paper, we present a trust evaluation metric using this scheme and some operations for forming and managing a cluster. An analysis of the proposed scheme over some security problems is also presented.  相似文献   

16.
A Vehicular Ad hoc Network is a type of wireless ad hoc network that facilitates ubiquitous connectivity between vehicles in the absence of fixed infrastructure. Source based geographical routing has been proven to perform well in unstable vehicular networks. However, these routing protocols leverage beacon messages to update the positional information of all direct neighbour nodes. As a result, high channel congestion or problems with outdated neighbour lists may occur. To this end, we propose a street-aware, Intelligent Beaconless (IB) geographical forwarding protocol based on modified 802.11 Request To Send (RTS)/ Clear To Send frames, for urban vehicular networks. That is, at the intersection, each candidate junction node leverage digital road maps as well as distance to destination, power signal strength of the RTS frame and direction routing metrics to determine if it should elect itself as a next relay node. For packet forwarding between Intersections, on the other hand, the candidate node considers the relative direction to the packet carrier node and power signal strength of the RTS frame as routing metrics to elect itself based on intelligently combined metrics. After designing the IB protocol, we implemented it and compared it with standard protocols. The simulation results show that the proposed protocol can improve average delay and successful packet delivery ratio in realistic wireless channel conditions and urban vehicular scenarios.  相似文献   

17.
The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc networks. In the proposed framework, trust is a measure of uncertainty with its value represented by entropy. We develop four Axioms that address the basic understanding of trust and the rules for trust propagation. Based on these axioms, we present two trust models: entropy-based model and probability-based model, which satisfy all the axioms. Techniques of trust establishment and trust update are presented to obtain trust values from observation. The proposed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc routing and malicious node detection. A distributed scheme is designed to acquire, maintain, and update trust records associated with the behaviors of nodes' forwarding packets and the behaviors of making recommendations about other nodes. Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.  相似文献   

18.
Wireless ad hoc networks are growing important because of their mobility, versatility, and ability to work with fewer infrastructures. The mobile ad hoc network is an autonomous system consisting of mobile nodes connected with wireless links. Establishing a path between two nodes is a complex task in wireless networks. It is still more complex in the wireless mobile ad hoc network because every node is no longer as an end node and an intermediate node. In this paper, it focuses on design of connectionless routing protocol for the wireless ad hoc networks based on the mobile agent concept. The proposed model tries to discover the best path taking into consideration some concerns like bandwidth, reliability, and congestion of the link. The proposed model has been simulated and tested under various wireless ad hoc network environments with the help of a different number of nodes. The results demonstrate that the proposed model is more feasible for providing reliable paths between the source and destination with the minimum control message packets over the network. It has delivered more number of packets to the destination over the network. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

19.
该文基于大尺度路径损耗无线传播模型将高速公路场景中的车用自组织网络(VANET)建模为几何随机图,提出了VANET有效组网面积的概念,分析说明了VANET的准线性拓扑特点,并基于交通流理论关于自由流条件下的车头时距分布,推导得出了无线传输范围内至少存在k个邻居的概率计算方法。实验结果表明:该文提出的概率描述思想是一种适合计算高速公路场景中车辆网络节点度的有效方法。  相似文献   

20.
Mobile ad hoc networks (MANETs) own a flexible framework with the absence of a server, where conventional security components fail to compensate the level of MANET security conditions since it is confined to a particular environment, its data transfer potential, and battery and memory constrains. MANET provides a well‐grounded path and an efficiency in communication, but the confidentiality of the trust parameters remains a great challenge since it may be overheard by the impostor. This demands the need of exchanging the encrypted mathematical values. The proposed machine learning security paradigm provides firm and trustworthy network in spite of establishment over additional network platform. The QoS is improved through support vector machine for denial‐of‐service attack. The node has to be clustered to accomplish its respective task. The clustering is done with the help of LEACH protocol, where cluster head and Cluster member are fixed to transfer the data in the network. Low Energy adaptive clustering heirarchy (LEACH) propagates energy to abstain from draining of battery and malignant network. A secure framework is built along with encryption and decoding to protect from denial‐of‐service attack. Acknowledgement‐based flooding attack has been focused with the help of support vector machine algorithm. The messages are encoded in from the source node and coded again during transmission phase to obtain the original message. Defending the traditional methodologies, the proposed work provides excellent QoS when compared and tested with other protocols. The results obtained ensure its efficiency when support vector machine technique is combined with encryption scheme.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号