Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV

2021 ◽  
Vol 14 (1) ◽  
pp. 12
Author(s):  
Mazen Alowish ◽  
Yoshiaki Shiraishi ◽  
Masami Mohri ◽  
Masakatu Morii

The Internet of connected vehicles (IoCV) has made people more comfortable and safer while driving vehicles. This technology has made it possible to reduce road casualties; however, increased traffic and uncertainties in environments seem to be limitations to improving the safety of environments. In this paper, driver behavior is analyzed to provide personalized assistance and to alert surrounding vehicles in case of emergencies. The processes involved in this research are as follows. (i) Initially, the vehicles in an environment are clustered to reduce the complexity in analyzing a large number of vehicles. Multi-criterion-based hierarchical correlation clustering (MCB-HCC) is performed to dynamically cluster vehicles. Vehicular motion is detected by edge-assisted road side units (E-RSUs) by using an attention-based residual neural network (AttResNet). (ii) Driver behavior is analyzed based on the physiological parameters of drivers, vehicle on-board parameters, and environmental parameters, and driver behavior is classified into different classes by implementing a refined asynchronous advantage actor critic (RA3C) algorithm for assistance generation. (iii) If the driver’s current state is found to be an emergency state, an alert message is disseminated to the surrounding vehicles in that area and to the neighboring areas based on traffic flow by using jelly fish search optimization (JSO). If a neighboring area does not have a fog node, a virtual fog node is deployed by executing a constraint-based quantum entropy function to disseminate alert messages at ultra-low latency. (iv) Personalized assistance is provided to the driver based on behavior analysis to assist the driver by using a multi-attribute utility model, thereby preventing road accidents. The proposed driver behavior analysis and personalized assistance model are experimented on with the Network Simulator 3.26 tool, and performance was evaluated in terms of prediction error, number of alerts, number of risk maneuvers, accuracy, latency, energy consumption, false alarm rate, safety score, and alert-message dissemination efficiency.

SIMULATION ◽  
2017 ◽  
Vol 93 (5) ◽  
pp. 409-426 ◽  
Author(s):  
Jerome A Arokkiam ◽  
Pedro Alvarez ◽  
Xiuchao Wu ◽  
Kenneth N Brown ◽  
Cormac J Sreenan ◽  
...  

10-gigabit-capable Passive Optical Network (XG-PON), one of the latest standards of optical access networks, is regarded as one of the key technologies for future Internet access networks. This paper presents the design and evaluation of our XG-PON module for the ns-3 network simulator. This module is designed and implemented with the aim to provide a standards-compliant, configurable, and extensible module that can simulate XG-PON with reasonable speed and support a wide range of research topics. These include analyzing and improving the performance of XG-PON, studying the interactions between XG-PON and the upper-layer protocols, and investigating its integration with various wireless networks. In this paper, we discuss its design principles, describe the implementation details, and present an extensive evaluation on both functionality and performance.


Author(s):  
Shifana Begum ◽  
Megha M Gamskar ◽  
Prakrithi Mogasale

MANET supports communication without any wired medium and with layered architecture. It does not uses any infrastructure support. Present alternative to the layered architecture is cross layer design approaches and the interaction between the layers is supported. The security of CLPC (Cross Layer Design Approach for Power control) routing protocol will be discussed in this paper. The transmission power and finding the effective route between source and destination can be improved by CLPC. The reliable path between the source and destination can be determined by RSS from the physical layer, but it is vulnerable to the DOS attacks. Here we propose a Secure cross layer power control protocol SCLPC to placate the attacks on CLPC. The SCLPC protocol provides better results and performance.


2021 ◽  
Vol 12 ◽  
Author(s):  
Oren Musicant ◽  
Haneen Farah ◽  
David Shinar ◽  
Christian Collet

Author(s):  
Paul F. Schikora ◽  
Michael R. Godfrey ◽  
Brian D. Neureuther

Managing customer service is critical for both nonprofit and for-profit dial-up modem Internet service providers. When system operators face excess demand, they can either add capacity or adapt their management techniques to deal with their limited resources—this article considers the latter. We examine system configuration options and the resultant effects on customer service levels in a simulated dial-up modem pool operation. Specifically, we look at a single pool operation and examine the effects of imposing time limits in a seriously overloaded system. We analyze the results on several key customer service measures. The results show that imposing these limits will have a distinct, nonlinear impact on these measures. Customer productivity and actual system load are shown to have major impacts on the performance measures. Interactions between several system and environmental parameters are also discussed.


SIMULATION ◽  
2020 ◽  
Vol 96 (12) ◽  
pp. 939-956 ◽  
Author(s):  
Anisa Allahdadi ◽  
Ricardo Morla ◽  
Jaime S Cardoso

Despite the growing popularity of 802.11 wireless networks, users often suffer from connectivity problems and performance issues due to unstable radio conditions and dynamic user behavior, among other reasons. Anomaly detection and distinction are in the thick of major challenges that network managers encounter. The difficulty of monitoring broad and complex Wireless Local Area Networks, that often requires heavy instrumentation of the user devices, makes anomaly detection analysis even harder. In this paper we exploit 802.11 access point usage data and propose an anomaly detection technique based on Hidden Markov Model (HMM) and Universal Background Model (UBM) on data that is inexpensive to obtain. We then generate a number of network anomalous scenarios in OMNeT++/INET network simulator and compare the detection outcomes with those in baseline approaches—RawData and Principal Component Analysis. The experimental results show the superiority of HMM and HMM-UBM models in detection precision and sensitivity.


Sign in / Sign up

Export Citation Format

Share Document