Search results for "Vehicular ad hoc network"
showing 10 items of 41 documents
Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks
2016
Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…
A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization
2017
Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…
A distributed detection and prevention scheme from malicious nodes in vehicular networks
2016
Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…
dSDiVN: A Distributed Software-Defined Networking Architecture for Infrastructure-Less Vehicular Networks
2017
In the last few years, the emerging network architecture paradigm of Software-Defined Networking (SDN), has become one of the most important technology to manage large scale networks such as Vehicular Ad-hoc Networks (VANETs). Recently, several works have shown interest in the use of SDN paradigm in VANETs. SDN brings flexibility, scalability and management facility to current VANETs. However, almost all of proposed Software-Defined VANET (SDVN) architectures are infrastructure-based. This paper will focus on how to enable SDN in infrastructure-less vehicular environments. For this aim, we propose a novel distributed SDN-based architecture for uncovered infrastructure-less vehicular scenari…
An Optimized Roadside Units (RSU) Placement for Delay-Sensitive Applications in Vehicular Networks
2015
International audience; Over the last few years, a lot of applications have been developed for Vehicular Ad Hoc NETworks (VANETs) to exchange information between vehicles. However, VANET is basically a Delay Tolerant Network (DTN) characterized by intermittent connectivity, long delays and message losses especially in low density regions [1]. Thus, VANET requires the use of an infrastructure such as Roadside Units (RSUs) that permits to enhance the network connectivity. Nevertheless, due to their deployment cost, RSUs need to be optimally deployed. Hence, the main objective of this work is to provide an optimized RSUs placement for delay-sensitive applications in vehicular networks that imp…
Evaluating the Performance of Real Time Videoconferencing in Ad Hoc Networks Through Emulation
2008
The validation of new video protocols and applications for mobile ad hoc networks in a real environment is an important task. In this work we present Castadiva, a test-bed architecture that allows validating software solutions for ad hoc networks using low-cost, off-the-shelf devices and open source software. We use this tool to test a videocall using the OLSR protocol in different scenarios, varying the number of hops between the caller and the receiver. The results obtained in this paper show that, for an ad hoc network with a large number of hops, the quality of videocalls suffers a significant degradation even in the absence of mobility.
Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology
2017
International audience; Advances in wireless communications and microelectronics have spearheaded the development of unmanned aerial vehicles (UAVs), which can be used to augment a ground network composed of sensors and/or vehicles in order to increase coverage, enhance the end-to-end delay, and improve data processing. While UAV-aided networks can potentially find applications in many areas, a number of issues, particularly security, have not been readily addressed. The intrusion detection system is the most commonly used technique to detect attackers. In this paper, we focus on addressing two main issues within the context of intrusion detection and attacker ejection in UAV-aided networks…
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
2017
International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…
A New Approach for the Reliability of Vehicular Ad Hoc Networks
2018
Vehicular ad hoc networks (VANET), a subset of Mobile Ad hoc Networks (MANETs), is a wireless communication technology applied to transportation, referring to a set of smart vehicles used on the road. These vehicles provide communication services among one another (V2V) or with Road Side Infrastructure (V2I). The main benefits of VANET are enhancing road safety, reducing energy use and emissions, and giving information services. Reliability is one of the most critical issues related to VANET since the information transmitted is distributed in an open access environment. We focused in this paper, on the reliability of VANET as a function of reliable hardware and their functionality taking in…
Towards a layer-less network architecture — A case from Wireless Sensor Networks
2011
Ad hoc and Wireless Sensor Networks (WSNs) form a challenging domain for existing network protocols and paradigms to fit into. The traditional models conceived for wired networking and adapted for wireless and mobile environments provide an inefficient and ungraceful outcome when exercised against highly dynamic and highly mobile nature of ad hoc wireless sensor networks. Efforts are being made to tweak existing (and sometimes create from scratch) principles and models that can provide a concrete framework for such newer paradigms. The momentum of the traditional layered architecture carried over from the wired networks to infrastructure based wireless networks pushes the same approaches as…