scholarly journals An Intersection Signal Control Mechanism Assisted by Vehicular Ad Hoc Networks

Electronics ◽  
2019 ◽  
Vol 8 (12) ◽  
pp. 1402 ◽  
Author(s):  
Zhen Cai ◽  
Zizhen Deng ◽  
Jinglei Li ◽  
Jinghan Zhang ◽  
Mangui Liang

The urban intersection signal decision-making in traditional control methods are mostly based on the vehicle information within an intersection area. The far vehicles that have not reached the intersection area are not taken into account, which results in incomplete information and even incorrectness in decision-making. This paper presents an intersection signal control mechanism assisted by far vehicle information. Using the aid of real-time information collection for far vehicles through vehicular ad hoc networks (VANETs), we can consider them together and calculate the accumulative waiting time for each intersection traffic flow at a future moment to make the optimal signal decision. Simulation results show that, under three different traffic flow environments—same even traffic flows, same uneven traffic flows, and different traffic flows—the two proposed implementation schemes based on the mechanism (fixed phase and period timing improvement scheme, and dynamic phase and period control scheme) show good performances, in which the average waiting time and the ratio of long-waiting vehicles are both less than the results of the traditional signal timing scheme. Especially, in the second scheme, the waiting time was reduced by an average of 38.6% and the ratio of long-waiting vehicles was reduced by an average of 7.67%.

Due to tremendous increase of vehicles in number leads to excessive congestion of vehicles at intersection of roads. It causing inconvenience to emergency vehicles like Ambulance and Fire brigade etc, ultimately which is the cost of human life To avoid this, Emergency Vehicles will have to give high priority to overcome from the congestion. Vehicular Ad-Hoc Networks (VANETs) is a network which is used to create a temporary communication among the vehicles. In this paper, priority based vehicle movement system is proposed to give high priority to emergency vehicles and establishing communication among the vehicles through VANET. Due to this high priority, there is no necessity to wait for the emergency vehicles at the traffic signals to get the green signal while communicating with traffic controller. In this paper, SUMO simulator is used for experimental analysis. The result indicates that the proposed methodology reduces the waiting time when compared to the existing system.


2013 ◽  
Vol 62 (4) ◽  
pp. 1459-1471 ◽  
Author(s):  
Kartik Pandit ◽  
Dipak Ghosal ◽  
H. Michael Zhang ◽  
Chen-Nee Chuah

Vehicular without any preparation arrange (VANETs) being stretched out to depict kept up for traffic control systems, stay away from misfortune oriented_ information relations, stopping and information correspondence in remote structure structures. Protection and security are generally two _concerns in vehicular _ad hoc systems. Dreadfully, _VANET have absolute best _privacy safeguarding ways to deal with oversee fragile Sybil assaults, where a malignant client can be familiar and indicate with be different vehicles. VANETs by making hallucination organized traffic deter. So that in this paper, we propose and develop Hash based Co-operative and Cryptographic Approach to handle Sybil attacks. This approach consists statistical approach to identify and verify vehicle information (id, ip address and where it is from and other details) and develop HMAC (Hash based Message Authentication Codes) encryption approach to detect Sybil attacks from forgery oriented attack sequences. Finally based on US map data available in VANET basic security web site, we generate different simulations to evaluate efficiency and feasibility of proposed approach. Our schema supports Sybil attacks detection without any support of outside positioning environment. Our experimental results show efficient result communication over detection of Sybil attacks in wireless network communication.


2017 ◽  
Vol 13 (1) ◽  
pp. 155014771668382
Author(s):  
Xiufeng Wang ◽  
Mingcheng Qu ◽  
Gang Cui ◽  
Moshe Yan ◽  
Nwe Nwe Htay Win ◽  
...  

Road-based directional broadcast protocols are proposed in the literatures to offset efficiency of message dissemination of traditional broadcast protocol in urban vehicular ad hoc networks. However, these protocols cannot provide enough reliability and efficiency for vehicles’ misclassification at intersection or on straight road. Therefore, we present regular-hexagon-equilateral-triangle area grouping–based broadcast protocol for urban vehicular ad hoc networks. The area covered by relay node is averagely divided using regular-hexagon-equilateral-triangle, and vehicles are grouped according to the area that they reside. The algorithm for constructing regular-hexagon-equilateral-triangle is proposed. We adopt same vehicles’ grouping method at intersection and on straight road, and no neighbor list is maintained to identify road intersection. We design waiting time formula to calculate time for node forwarding message. It is ruled that node with waiting time dropping to zero first is defined as the relay node, and this relay node transmits message. So there is only one relay node which forwards message in each group. It also rules in regular-hexagon-equilateral-triangle area grouping–based broadcast protocol that each relay node forwards the same message only once, therefore, it limits redundant message retransmission. Using the vehicles’ grouping method and selection strategy of relay node as mentioned above, the proposed protocol enables message to be transmitted in different directions along different roads at the same time. Simulation indicates that our protocol has a better performance


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Qing Ren ◽  
Feng Tian ◽  
Xiangyi Lu ◽  
Yumeng Shen ◽  
Zhenqiang Wu ◽  
...  

In the cloud-based vehicular ad-hoc network (VANET), massive vehicle information is stored on the cloud, and a large amount of data query, calculation, monitoring, and management are carried out at all times. The secure spatial query methods in VANET allow authorized users to convert the original spatial query to encrypted spatial query, which is called query token and will be processed in ciphertext mode by the service provider. Thus, the service provider learns which encrypted records are returned as the result of a query, which is defined as the access pattern. Since only the correct query results that match the query tokens are returned, the service provider can observe which encrypted data are accessed and returned to the client when a query is launched clearly, and it leads to the leakage of data access pattern. In this paper, a reconstruction attack scheme is proposed, which utilizes the access patterns in the secure query processes, and then it reconstructs the index of outsourced spatial data that are collected from the vehicles. The proposed scheme proves the security threats in the VANET. Extensive experiments on real-world datasets demonstrate that our attack scheme can achieve quite a high reconstruction rate.


2020 ◽  
Vol 39 (6) ◽  
pp. 8357-8364
Author(s):  
Thompson Stephan ◽  
Ananthnarayan Rajappa ◽  
K.S. Sendhil Kumar ◽  
Shivang Gupta ◽  
Achyut Shankar ◽  
...  

Vehicular Ad Hoc Networks (VANETs) is the most growing research area in wireless communication and has been gaining significant attention over recent years due to its role in designing intelligent transportation systems. Wireless multi-hop forwarding in VANETs is challenging since the data has to be relayed as soon as possible through the intermediate vehicles from the source to destination. This paper proposes a modified fuzzy-based greedy routing protocol (MFGR) which is an enhanced version of fuzzy logic-based greedy routing protocol (FLGR). Our proposed protocol applies fuzzy logic for the selection of the next greedy forwarder to forward the data reliably towards the destination. Five parameters, namely distance, direction, speed, position, and trust have been used to evaluate the node’s stability using fuzzy logic. The simulation results demonstrate that the proposed MFGR scheme can achieve the best performance in terms of the highest packet delivery ratio (PDR) and minimizes the average number of hops among all protocols.


Sign in / Sign up

Export Citation Format

Share Document