Closed User Group Automotive Communication Network Based on Addressing at Physical Layer

Author(s):  
Rajarshi Sanyal ◽  
Ernestina Cianca ◽  
Ramjee Prasad

Intelligent Vehicle communication is the keyword for the emerging vehicular technologies such as group cooperative driving, real time Engine Operating parameters (EOP) monitoring, collision warning, geo location based mobility applications, and classical voice and data conveyance. The technologies require extensive interaction between the peers which mostly use the framework of the state of the art cellular or radio trunking networks. This may vitiate the network performance due to the surge in mobility management messages originated by the devices plugged in the vehicles. The performance may be severely impacted due to the unique characteristics of vehicular networks e.g., high mobility. Due to the high proliferation of these Machine to Machine (M2M) and Machine to Application (M2A) devices in near future, the cell sizes will shrink, resulting in more signalling messages in the network. Considering classical voice communication services for typical car fleet implementations, the radio trunking networks have capacity constrains due to inability of frequency reuse and absence of mobility management techniques. The alternative is to seek out an access technology considering the fact that a more intelligent physical layer can be employed directly for addressing and mobility management. In this paper the authors address a Closed User Group network implementation for Vehicle to Vehicle/central office communication which can actuate voice and data communication without incorporating any application layer.

2016 ◽  
Vol 6 (2) ◽  
pp. 1-10
Author(s):  
Chaima Bensaid ◽  
Sofiane Boukli Hacene ◽  
Kamel Mohamed Faraoun

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.


Author(s):  
Komathy K.

Vehicular Ad Hoc Networks (VANET) is an emerging application of Intelligent Transport System, which is mainly to assist public safety applications such as collision avoidance between the vehicles or between vehicles and other obstacles such as pedestrians. At the same time, it challenges the data communication because of its high mobility, short link lifetime, and frequent network fragmentations. Existing spectrum standard for vehicular communication underutilizes the frequency bands in the sparsely used regions when the licensed users are not deploying them even at the peak hours of the road. Congestion or route stalling is unavoidable in vehicular networking and this builds an impression that there is always a shortage of spectrum. A solution would be to have a cognitive radio that can utilize the spectrum that is not heavily used so as to ease congestion in other areas. This chapter brings out the application of cognitive radios in vehicular environments, a new and relatively less explored area of research. This chapter looks into a few existing studies in the literature which have focused on spectrum sensing techniques, routing methodology, and security for cognitive radio vehicular networks. In addition, this chapter also discusses the impact of changes in the vehicular network on the radio propagation channel and in turn on the operation and performance of the cognitive radio vehicular network. Finally, future directions in research have highlighted the existing challenges in specific areas.


Author(s):  
T. Gaugel ◽  
L. Reichardt ◽  
J. Mittag ◽  
T. Zwick ◽  
H. Hartenstein

2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


Author(s):  
Budi Rahmadya

Ad Hoc Network Communication is mobile networks communications and have a high mobility for each of its nodes. This type of network communications is a temporary networkwith utilizing a WiFi network or Bluethoot as a medium of communications. In the entirenetwork, node moves with a speed varying and unpredictable direction. Packets data delivery from the source node to destination node by using an ad hoc network requires its owntechniques. In this research discussed the existing data communication technique inVehicular Ad Hoc Network (VANETs) Communications with attention: Broadcasting Time, Routing Protocol, Message Dissemination, Delay Tolerant Network Dissemination and / DTN.These techniques can increase the delivery ratio / sending data packets to the destination as well as a smaller delay time. In order to maintain the integrity of the data packets received bythe destination node, the authors have proposed a method of duplicate messages in thisresearch.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Junfeng Miao ◽  
Zhaoshun Wang ◽  
Xue Miao ◽  
Longyue Xing

When mobile network enters 5G era, 5G networks have a series of unparalleled advantages. Therefore, the application of 5G network technology in the Internet of Vehicles (IoV) can promote more intelligently vehicular networks and more efficiently vehicular information transmission. However, with the combination of 5G networks and vehicular networks technology, it requires safe and reliable authentication and low computation overhead. Therefore, it is a challenge to achieve such low latency, security, and high mobility. In this paper, we propose a secure and efficient lightweight authentication protocol for vehicle group. The scheme is based on the extended chaotic map to achieve authentication, and the Chinese remainder theorem distributes group keys. Scyther is used to verify the security of the scheme, and the verification results show that the security of the scheme can be guaranteed. In addition, through security analysis, the scheme can not only effectively resist various attacks but also guarantee security requirements such as anonymity and unlinkability. Finally, by performance analysis and comparison, our scheme has less computation and communication overhead.


2020 ◽  
Vol 17 (1) ◽  
pp. 51-70
Author(s):  
Jesús Calle-Cancho ◽  
José-Manuel Mendoza-Rubio ◽  
José-Luis González-Sánchez ◽  
David Cortés-Polo ◽  
Javier Carmona-Murillo

The number of mobile subscribers, as well as the data traffic generated by them, is increasing exponentially with the growth of wireless smart devices and the number of network services that they can support. This significant growth is pushing mobile network operators towards new solutions to improve their network performance and efficiency. Thus, the appearance of Software Defined Networking (SDN) can overcome the limitations of current deployments through decoupling the network control plane from the data plane, allowing higher flexibility and programmability to the network. In this context, the process of handling user mobility becomes an essential part of future mobile networks. Taking advantage of the benefits that SDN brings, in this article we present a novel mobility management solution. This proposal avoids the use of IP-IP tunnels and it adds the dynamic flow management capability provided by SDN. In order to analyse performance, an analytical model is developed to compare it with NB-DMM (Network-based DMM), one of the main DMM (Distributed Mobility Management) solutions. Additionally, performance is also evaluated with an experimental testbed. The results allow handover latency in real scenarios and numerical investigations to be measured, and also show that SR-DMM achieves better efficiency in terms of signaling and routing cost than NB-DMM solution.


Author(s):  
Abdul Rahim ◽  
Dr. V.A.Sankar Ponnapalli

With the advancements in Vehicular communication technologies in automobile engineering leads to enhancement of modern societies by utilizing Internet based data communication in a vehicular network to effectively avoid accidents and traffic congestions using Multi Input Multi Output (MIMO) cooperative relay technique for enhancing the aspects of performance by reduction of transmission energy consumption by taking the advantage of spatial and temporal diversity gain in a vehicular network as the conventional routing based on topology is merely not suitable over a dynamic vehicular network environment as GPS is used to identify effective route [4].In this paper we propose applications of cooperative communication techniques and their survey for identifying close relationship between forwarding and addressing techniques in a vehicular network and further we compare performance and energy consumption of cooperative techniques with the traditional multi-hop technique over Rayleigh channel using MQAM for optimization.


Sign in / Sign up

Export Citation Format

Share Document