Search results for "Ad Hoc"
showing 10 items of 116 documents
Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks
2016
Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…
Methodology and trends for an intelligent transport system in developing countries
2018
Abstract Increasingly, the technologies that are used in telecommunications contribute to improve intelligent transport systems. These technologies are systems that offer several concepts like vehicular ad hoc networks, which allow reduction of traffic accidents, traffic congestion and consequently increase road safety and the comfort of road users. Developing countries in general and those of sub-Sahara in particular do not have telecommunication infrastructures, even road infrastructures for the implementation of an intelligent transport system. Moreover, with the serious increase in vehicles in these countries, the problem of traffic regulation arise especially in the inter-urban context…
EDITORIAL
2014
Two ways to metaphor comprehension in comparison: towards a bidimensional account of metaphor comprehension - poster
In this paper we will discuss the role of literal meaning and mental imagery in metaphor comprehension, showing their link and the problematic nature of these notions in pragmatics (Wilson & Carston 2019). We will try to overcome these problems by putting in dialogue the typology of metaphors offered by Carston (2010, 2018), based on the parameter of literal meaning, and the typology offered by Green (2017) based on the parameter of mental imagery. Carston (2018) recognizes the existence of two kinds of metaphors: (1) local metaphors such as “Giulio is a professor” in which a single lexical item - PROFESSOR - is modulated pragmatically; (2) metaphors such as “The yellow fog that rubs it…
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
Utility-based resource allocations in multi-hop wireless networks
2011
It is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. Since ad-hoc networks based on multihop packet deliveries are becoming more and more common in different application and networking scenarios, different medium access control extensions are currently considered for improving the channel utilization efficiency. In this paper, we propose a simple approach based on preallocating temporal slots in which different sets of nodes are allowed to contend for the channel access, which can significantly improve CSMA performance with limited signaling …
A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization
2017
Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…
A distributed detection and prevention scheme from malicious nodes in vehicular networks
2016
Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…
Multimode WSN: Improving Robustness, Fault Tolerance and Performance of Randomly Deployed Wireless Sensor Network
2010
This paper proposes an advanced, robust and flexible solution that applies the (revised) concept of Always Best Connected (ABC) Network, typical of multimode modern mobile devices, to Wireless Sensor Network. Hostile environments and unpredictable conditions (e.g. interferences) can negatively affect communication range, potentially increasing the number of unconnected nodes in random deployments. Multimode Wireless Sensor Network (MM-WSN) is provided with an adaptive mechanism for environmental condition evaluation and with the ability of self-configuring itself for optimal networking independence of detected conditions. Proposed solution is based on advanced smart nodes provided with mult…
Corte edu e Corte costituzionale tra operazioni di bilanciamento e precedente vincolante. Spunti teorico-generali e ricadute penalistiche (pt.II)
2019
Questo articolo è suddiviso in tre parti e si occupa delle interazioni complesse che si instaurano tra bilanciamenti di competenza della Corte edu e bilanciamenti di competenza della Corte costituzionale sul terreno dei conflitti tra diritti convenzionali e interessi costituzionalmente rilevanti tutelati dal sistema penale nazionale. La prima parte dell’articolo si concentra su un primo possibile modello di bilanciamento riscontrabile nella prassi applicativa del giudice sovranazionale, e cioè il bilanciamento ad hoc (o “caso per caso”); e arriva alla conclusione per cui, in questa prima famiglia di strategie decisionali, la Corte europea, rompendo la c.d. “connessione necessaria diritti/in…