Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks - Advances in Systems Analysis, Software Engineering, and High Performance Computing
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 11)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799827641, 9781799827665

Author(s):  
Pramod Kumar Goyal ◽  
Pawan Singh

In a heterogeneous wireless network (HWN) environment, performing an efficient vertical handoff requires the efficient qualitative evaluation of all stakeholders like wireless networks (WN) and mobile users (MU) and mutual selection of best WN-MU. In the literature, most of the work deals with both these requirements jointly in the techniques proposed by them for the vertical handoffs (VHO) in HWNs, leaving very little scope to manipulate the above requirements independently. This may result in inefficient vertical handoffs. Hence, this chapter proposed a generalized two-stage two players, iterative non-cooperative game model. This model presents a modular framework that separates the quantitative evaluation of WNs and MUs (at Stage 1) from the game formulation and solution (at Stage 2) for mutual selection of best WN-MU pair for VHO. The simulation results show a substantial reduction in the number of vertical handoffs with the proposed game theory-based two-stage model as compared to a single-stage non-game theory method like multiple attribute decision making.


Author(s):  
Pawan Singh ◽  
Suhel Ahmad Khan ◽  
Pramod Kumar Goyal

VANET is a subclass of MANET that makes the dream of intelligent transportation systems come true. As per the report of the Ministry of Road Transport and Highways, India, 1.5 million people were killed in road accidents in 2015. To reduce casualty and provide some kind of comfort during the journey, India must also implement VANETs. Applicability of VANET in Indian roads must be tested before implementation in reality. In this chapter, the real maps of Connaught Place, New Delhi from Open Street maps websites is considered. The SUMO for traffic and flow modeling is used. Many scenarios have been used to reflect real Indian road conditions to measure the performance of AODV, DSDV, and DSR routing protocols. The CBR traffic is used for the dissemination of emergency messages in urban vehicular traffic scenarios. The throughput, packet delivery ratio, and end-to-end delay are considered for performance analysis through the NS-2.35 network simulator.


Author(s):  
Indrani Das ◽  
Sanjoy Das

Geocasting is a subset of conventional multicasting problem. Geocasting means to deliver a message or data to a specific geographical area. Routing refers to the activities necessary to route a message in its travel from source to the destination node. The routing of a message is very important and relatively difficult problems in the context of Ad-hoc Networks because nodes are moving very fast, network load or traffic patterns, and topology of the network is dynamical changes with time. In this chapter, different geocast routing mechanisms used in both Mobile Ad-hoc Networks and Vehicular Ad-hoc Networks. The authors have shown a strong and in-depth analysis of the strengths and weaknesses of each protocol. For delivering geocast message, both the source and destination nodes use location information. The nodes determine their locations by using the Global Positioning System (GPS). They have presented a comprehensive comparative analysis of existing geocast routing protocols and proposed future direction in designing a new routing protocol addressing the problem.


Author(s):  
Anamika Chauhan ◽  
Kapil Sharma ◽  
Alka Aggarwal

With the ever-escalating amount of vehicular traffic activity on the roads, the efficient management of traffic and safety of the drivers and passengers is of paramount gravity. Vehicular ad-hoc networks (VANETs) have emerged as the systems where vehicles would be perceptive of the locality and can supply the driver with required inputs to take necessary actions to alleviate the various issues. The system is designed to detect and identify essential traffic events and inform all concerned entities and take appropriate action. The characteristics of VANET are the topology is highly mobile, depends on city infrastructure, and the high speed of vehicles. These challenges result in frequent disruption of connections, long delays in delivering the messages. The challenges are overcome through the vehicular delay-tolerant network (VDTN) routing protocols are used that can facilitate communication under these network challenges. In this chapter, the authors evaluate the effect of the node density and message sizes on the performance of the various VDTN routing protocols.


Author(s):  
Pooja Singh

There are a lot of prospects of the vehicular network, including the artificial neural networks incorporating a wireless sensor network. Its number comes after the mobile communication network and the internet. The network is characterized by more through measure and sense and exhibits more comfortable operability and intelligence. A wireless sensor network can be simply defined as “a network of wireless devices using sensors to monitors and recording the physical conditions of the environment and organizing the collected data at a central location.” WSNs measure environmental conditions like temperature, sound, pollution levels, humidity, wind speed and direction, pressure, etc. Thus, wireless sensor networks are widely used for fulfilling the essential needs of environmental sensing applications. These applications show the broad ranges in precision agriculture, monitoring of the vehicle, and video surveillance.


Author(s):  
Ram S. Raw ◽  
Manish Kumar ◽  
Nanahay Singh

Vehicular adhoc networks (VANETs) and software-defined networking (SDN) are the key enablers of 5G technology in developing intelligent vehicle networks and applications for the next generation. In recent years, many studies have been concentrated on SDN and VANET incorporation, and many researchers worked at various architecture-related issues along with the advantages of software-defined VANET services and features to adapt them. This chapter discusses the current state of the art of SD-VANET with the directions of future research work. This chapter presents a theoretical approach of architectures of software-defined VANET for its networking infrastructure design, functionalities, benefits, and challenges of future generation networks.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

In today's world, cloud computing and e-commerce are complementary to each other in terms of their vast effectiveness. E-commerce allows the business to move and grow on the internet without having or buying any physical space. Cloud computing helps e-commerce by securing the investment of IT infrastructure. That is the only reason why most of the organizations are moving their business towards cloud computing. Many organizations are getting much more benefit from the usage of cloud computing. But before adopting this, they must understand its trade-off also. In this chapter, the authors present the requirements of e-commerce organizations for adoption of cloud computing, benefit after the adoption of cloud computing in the e-commerce business, and what difficulties e-commerce organizations feel after the usage of this technology.


Author(s):  
Kavita Pandey ◽  
Akshansh Narula ◽  
Dhiraj Pandey ◽  
Ram Shringar Raw

To make an optimal movement of vehicles and to reduce the accident rate, the government has installed traffic lights at almost every intersection. Traffic lights are intended to decrease congestion. However, the dynamic nature of traffic movement causes congestion always. This congestion leads to increased waiting times for every vehicle. In this chapter, two machine learning-based approaches used to improve in the congested traffic environment. The first part of the work is Deep-Learning based traffic signaling, which identifies the congestion on all sides of the intersection with the help of image processing techniques. By analyzing the congestion, the algorithm proposes dynamic green-light times rather than the traditional fixed lighting system. In the second part, a Q-learning-based approach has been suggested in which an agent decides the state of the traffic light based on a cumulative reward. Further, these algorithms have been tested on different traffic simulated environments using SUMO, and detailed analysis has been carried out.


Author(s):  
Sanjeev Kumar ◽  
Jyotsna Sharma ◽  
Arvind Kumar

Wireless sensor nodes generally operate using energy from source line batteries, which need to be replaced or recharge from time to time. The connection of electromagnetic energy to DC energy, which is called radiofrequency (RF) energy harvesting, is one of the best techniques to act as an energy source for this equipment. An ambient amount of RF energy is present in our environment radiated from numerous sources so that it can act as a much predictable source of energy as compared to other techniques of energy harvesting. This system eliminates the periodic replacement of energy batteries for these sensor nodes. Despite the enormous RF energy present in the environment, the power per unit area is quite low. Hence, the major barrier is to increase the output of the rectifier circuit, even though the power density is low.


Author(s):  
Suhel Ahmad Khan ◽  
Waris Khan ◽  
Dhirendra Pandey

Security threats evaluation accepts a pivotal part in network security management. In this chapter, the author has depicted the significant measures and parameters with respect to huge industry/organizational prerequisites for building up a secure network. The existing fuzzy model is a combination of fuzzy techniques and expert's opinions. The work aims to manage network security risks during D2D data communication through the network to optimize security assurance. The idea is to provide a means of security risk assessment during D2D data communication through the network. Security risks are those that prevent the accomplishment of the objectives specified by developers as well as organizations. The basic idea of the proposed work is to identify and prioritize the security risks methods, which is used to find the problems and fix them only to minimize cost, rework, and time. The work examines the effect of multi-criteria decision analysis methods for security risk assessment.


Sign in / Sign up

Export Citation Format

Share Document