scholarly journals The Use of Bluetooth Standard for Communication Between Vehicles Under Traffic

2018 ◽  
Vol 45 (1) ◽  
pp. 67-82
Author(s):  
Zbigniew Kasprzyk ◽  
Mariusz Rychlicki

Abstract Bluetooth is a type of wireless communication used to transmit voice and data at high speeds using radio waves. It is a standard protocol for short-range radio communications between many different types of devices, including mobile phones, computers and other electronics [1]. The use of this type of data transmission standard for voice communications at close range in the vehicle is commonly known. The trend of integrating new services in vehicles increases rapidly and Bluetooth is one of the emerging communication technologies for realizing ad-hoc networks. The paper presents the possibility of using Bluetooth to build ad-hoc network suitable for the transmission of sound, in particular voice data using the modulation GSFK. We analyzed the features or problems that Bluetooth offers for transmitting audio data in an ad-hoc network. Some initial results of simulations and real-life tests give an impression of the performance and efficiency this standard for the transmission of voice data in an ad-hoc networks [2].

2018 ◽  
Vol 46 (1) ◽  
pp. 153-169
Author(s):  
Zbigniew Kasprzyk ◽  
Mariusz Rychlicki

Abstract Bluetooth is a type of wireless communication used to transmit voice and data at high speeds using radio waves. It is a standard protocol for short-range radio communications between many different types of devices, including mobile phones, computers and other electronics [1]. The trend of integrating new services in vehicles increases rapidly and Bluetooth is one of the emerging communication technologies for realizing ad-hoc networks. The paper presents the possibility of using Bluetooth to build ad-hoc network suitable for the transmission of sound, in particular voice data using the modulation GSFK. We analyzed the features or problems that Bluetooth offers for transmitting audio data in an ad-hoc network. Some initial results of simulations and real-life tests give an impression of the performance and efficiency this standard for the transmission of voice data in an ad-hoc networks [2].


Author(s):  
Bodhy Krishna .S

A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.


Transport ◽  
2008 ◽  
Vol 23 (4) ◽  
pp. 291-298 ◽  
Author(s):  
Saleh Yousefi ◽  
Mahmood Fathy

In the recent years, direct message exchange between vehicles in order to improve the safety of road traffic has been attracting lots of interest in both networking and road safety communities. While travelling on a road, vehicles form an ad hoc network called Vehicular Ad hoc NETwork (VANET) and deploy life safety applications. Evaluating the performance of these applications is primordial for realizing VANETs in real life. Current literature lacks efficient ways to evaluate the performance of safety applications and mostly leverages on classical networking metrics like delay, delivery rate etc. In this paper, we consider both networking and safety concerns simultaneously to come up with more efficient methods. In particular, we first point out the significance of fairness and coverage from safety viewpoint. Then, we introduce two new metrics called beaconing rate and effective range aiming at providing more facilities for safety performance evaluation in VANET s research. Furthermore, realizing special characteristics of safety applications while disseminating beacon messages, we study the way that beacon dissemination protocols affect the performance of safety applications. We then conduct extensive simulation study to show the usefulness of the introduced metrics and derive some insights on the feasibility of driver‐assistant safety applications. Our evaluation also shows that sending the aggregated status of neighbouring vehicles in addition to vehicle's own status, and instead, increasing beacon transmission interval may be invoked in order to assist safety applications in providing satisfactory services to drivers.


2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


2017 ◽  
Vol 28 (1) ◽  
pp. 31-46
Author(s):  
A.A. Adas A.A. Adas

This paper focuses on secure data communication between nodes in Ad-Hoc networks by employing IPSec (Internet Protocol Security). In wireless communication, Ad-Hoc network is a new paradigm since, which is used for highly sensitive and emergency operations. Ad-Hoc network is considered a number of mobile nodes that are connected through wireless interfaces and moves arbitrarily. Ensuring security is one of the main issues due to its infrastructure less solutions. This research aims for IPSec protocol that provides security for an Ad-Hoc networking in a various applications. IPSec incorporates security model, i.e. AES (Advanced Encryption Standard) into its framework. In this work, we consider the problem of incorporating security mechanisms to securing data communication for Ad-Hoc networks. We look at AODV routing protocol (Ad-Hoc On-Demand Distance Vector) in detail and it is used for secure routing. Simulation of IPSec protocol is simulated using NS-3 simulator. Results from NS-3 simulator is compared with AH, ESP, and AES in terms of Quality of Service parameters throughput, average processing time and average end-to-end delay.


2020 ◽  
Vol 9 (1) ◽  
pp. 2006-2010

A Mobile Ad-hoc network (MANET) is a network which forms a kind of self organized network without any pre-established infrastructure over radio links. Mobile Ad Hoc Networks (MANETs) are more effective in node –to- node communication. In current era of technology where most of the things are based on networks, MANETs are more suitable for wireless communication and data transfer medium due to the advent of 3G, 4G & 5G technologies. The primary objective of such an ad-hoc network routing protocol is to create appropriate and efficient route between a pair of nodes so that messages can be transmitted in a timely fashion. The dynamic design of this network makes routing protocols a prominent part in creating efficient routes between pairs of nodes The design of routes should be achieved with minimal overhead and bandwidth usage In last two decades many multicast routing protocols are designed and implemented. This paper focuses on some of the MANETs protocols and their characteristics along with their advantages and disadvantages.


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


2010 ◽  
pp. 1595-1613
Author(s):  
Fei Liu ◽  
Geert Heijenk

A very promising approach to discovering services and context information in ad-hoc networks is based on the use of Attenuated Bloom filters. In this paper we analyze the impact of changes in the connectivity of an ad-hoc network on this approach. We evaluate the performance of the discovery protocol while nodes appear, disappear, and move, through analytical and simulative analysis. The analytical results are shown to be accurate when node density is high. We show that an almost linear relation exists between the density of the network and the number of update messages to be exchanged. Further, in case of nodes moving, the number of messages exchanged does not increase with the speed of movement.


Author(s):  
Shahin Vakilinia ◽  
Mohammadhossein Alvandi ◽  
Mohammadreza Khalili Shoja ◽  
Iman Vakilinia

In this paper, Cross-layer design has been used to provide quality of service (QoS) and security at the same time for VOIP over the wireless ad-hoc network. In this paper the authors extend their previous work (i.e. Multi-path Multi-Channel Protocol Design for Secure QoS-Aware VOIP in Wireless Ad-Hoc Networks) by adding transport and application layers considerations. The goal of this paper is to support QoS and security of VOIP simultaneously. Simulation results shows that the proposed cross-layered protocol stack design significantly improve QoS parameters of the VOIP calls under the jamming or Denial-of-service attacks.


2011 ◽  
Vol 3 (1) ◽  
pp. 14-36 ◽  
Author(s):  
Antonis Michalas ◽  
Nikos Komninos ◽  
Neeli R. Prasad

This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks in such networks. The second part presents a multiplayer game that takes place between the nodes of an ad hoc network and based on fundamental principles of game theory. By combining computational problems with puzzles, improvement occurs in the efficiency and latency of the communicating nodes and resistance in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly.


Sign in / Sign up

Export Citation Format

Share Document