Search results for "Vehicular ad hoc network"

showing 10 items of 41 documents

Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks

2016

Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…

020203 distributed computingVehicular ad hoc networkLocation privacyWireless ad hoc networkComputer sciencebusiness.industry[SPI] Engineering Sciences [physics]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPseudonyms distribution.020206 networking & telecommunications02 engineering and technologyPseudonymNetwork simulationIdentifier[SPI]Engineering Sciences [physics]Pseudonyms distribution0202 electrical engineering electronic engineering information engineeringSecurityComputingMilieux_COMPUTERSANDSOCIETYGeneral Earth and Planetary SciencesDistribution methodVANETsbusinessGeneral Environmental ScienceComputer network
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct

A distributed detection and prevention scheme from malicious nodes in vehicular networks

2016

Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…

AuthenticationVehicular ad hoc networkComputer Networks and CommunicationsComputer sciencebusiness.industryNode (networking)020206 networking & telecommunications02 engineering and technologyKalman filterCertificateComputer securitycomputer.software_genreSoftware deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringRouting (electronic design automation)businesscomputerInformation exchangeComputer networkInternational Journal of Communication Systems
researchProduct

dSDiVN: A Distributed Software-Defined Networking Architecture for Infrastructure-Less Vehicular Networks

2017

In the last few years, the emerging network architecture paradigm of Software-Defined Networking (SDN), has become one of the most important technology to manage large scale networks such as Vehicular Ad-hoc Networks (VANETs). Recently, several works have shown interest in the use of SDN paradigm in VANETs. SDN brings flexibility, scalability and management facility to current VANETs. However, almost all of proposed Software-Defined VANET (SDVN) architectures are infrastructure-based. This paper will focus on how to enable SDN in infrastructure-less vehicular environments. For this aim, we propose a novel distributed SDN-based architecture for uncovered infrastructure-less vehicular scenari…

Delay-tolerant networkingFlexibility (engineering)Network architectureVehicular ad hoc networkbusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineering02 engineering and technology0203 mechanical engineeringScalability0202 electrical engineering electronic engineering information engineeringArchitecturebusinessSoftware-defined networkingComputer networkActive networking
researchProduct

An Optimized Roadside Units (RSU) Placement for Delay-Sensitive Applications in Vehicular Networks

2015

International audience; Over the last few years, a lot of applications have been developed for Vehicular Ad Hoc NETworks (VANETs) to exchange information between vehicles. However, VANET is basically a Delay Tolerant Network (DTN) characterized by intermittent connectivity, long delays and message losses especially in low density regions [1]. Thus, VANET requires the use of an infrastructure such as Roadside Units (RSUs) that permits to enhance the network connectivity. Nevertheless, due to their deployment cost, RSUs need to be optimally deployed. Hence, the main objective of this work is to provide an optimized RSUs placement for delay-sensitive applications in vehicular networks that imp…

Delay-tolerant networkingOptimization problemVehicular ad hoc networkmodelCovering location optimizationComputer sciencebusiness.industryWireless ad hoc networkDistributed computingcoveragedeployment cost[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsframeworkGenetic algorithmgenetic algorithm[ SPI ] Engineering Sciences [physics]real-time applicationsbusinessDijkstra's algorithmComputer networkdelay constraints
researchProduct

Evaluating the Performance of Real Time Videoconferencing in Ad Hoc Networks Through Emulation

2008

The validation of new video protocols and applications for mobile ad hoc networks in a real environment is an important task. In this work we present Castadiva, a test-bed architecture that allows validating software solutions for ad hoc networks using low-cost, off-the-shelf devices and open source software. We use this tool to test a videocall using the OLSR protocol in different scenarios, varying the number of hops between the caller and the receiver. The results obtained in this paper show that, for an ad hoc network with a large number of hops, the quality of videocalls suffers a significant degradation even in the absence of mobility.

EmulationAd hoc testingVehicular ad hoc networkAdaptive quality of service multi-hop routingWireless ad hoc networkbusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile ad hoc networkAd hoc wireless distribution serviceOptimized Link State Routing ProtocolbusinessComputer network2008 22nd Workshop on Principles of Advanced and Distributed Simulation
researchProduct

Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology

2017

International audience; Advances in wireless communications and microelectronics have spearheaded the development of unmanned aerial vehicles (UAVs), which can be used to augment a ground network composed of sensors and/or vehicles in order to increase coverage, enhance the end-to-end delay, and improve data processing. While UAV-aided networks can potentially find applications in many areas, a number of issues, particularly security, have not been readily addressed. The intrusion detection system is the most commonly used technique to detect attackers. In this paper, we focus on addressing two main issues within the context of intrusion detection and attacker ejection in UAV-aided networks…

EngineeringAnomaly-based intrusion detection systemintrusion detection system (IDS)Context (language use)02 engineering and technologyIntrusion detection systemComputer securitycomputer.software_genreBayesian game[ SPI.GCIV.IT ] Engineering Sciences [physics]/Civil Engineering/Infrastructures de transportUtility[ SPI.NRJ ] Engineering Sciences [physics]/Electric power0202 electrical engineering electronic engineering information engineering[ SPI.GCIV ] Engineering Sciences [physics]/Civil Engineering[ SPI ] Engineering Sciences [physics]Overhead (computing)Network performanceunmanned aerial vehicles (UAVs)Ad HocBayesian gameVehicular ad hoc networkbusiness.industryMechanical EngineeringNode (networking)020206 networking & telecommunicationsComputer Science Applications[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsEfficientAutomotive Engineeringintrusion ejection system (IES)020201 artificial intelligence & image processingVehicular NetworksWireless Sensor NetworksbusinesscomputerComputer network
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

A New Approach for the Reliability of Vehicular Ad Hoc Networks

2018

Vehicular ad hoc networks (VANET), a subset of Mobile Ad hoc Networks (MANETs), is a wireless communication technology applied to transportation, referring to a set of smart vehicles used on the road. These vehicles provide communication services among one another (V2V) or with Road Side Infrastructure (V2I). The main benefits of VANET are enhancing road safety, reducing energy use and emissions, and giving information services. Reliability is one of the most critical issues related to VANET since the information transmitted is distributed in an open access environment. We focused in this paper, on the reliability of VANET as a function of reliable hardware and their functionality taking in…

Fault tree analysisVehicular ad hoc networkWireless ad hoc networkComputer sciencebusiness.industryProbabilistic logicWirelessReliability block diagramMobile ad hoc networkbusinessReliability (statistics)Reliability engineeringSSRN Electronic Journal
researchProduct

Towards a layer-less network architecture — A case from Wireless Sensor Networks

2011

Ad hoc and Wireless Sensor Networks (WSNs) form a challenging domain for existing network protocols and paradigms to fit into. The traditional models conceived for wired networking and adapted for wireless and mobile environments provide an inefficient and ungraceful outcome when exercised against highly dynamic and highly mobile nature of ad hoc wireless sensor networks. Efforts are being made to tweak existing (and sometimes create from scratch) principles and models that can provide a concrete framework for such newer paradigms. The momentum of the traditional layered architecture carried over from the wired networks to infrastructure based wireless networks pushes the same approaches as…

Key distribution in wireless sensor networksVehicular ad hoc networkWireless ad hoc networkComputer sciencebusiness.industryWireless networkDistributed computingMobile wireless sensor networkMobile ad hoc networkAd hoc wireless distribution servicebusinessWireless sensor networkComputer network2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct