Search results for "vanet"

showing 10 items of 19 documents

Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks

2016

Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…

020203 distributed computingVehicular ad hoc networkLocation privacyWireless ad hoc networkComputer sciencebusiness.industry[SPI] Engineering Sciences [physics]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPseudonyms distribution.020206 networking & telecommunications02 engineering and technologyPseudonymNetwork simulationIdentifier[SPI]Engineering Sciences [physics]Pseudonyms distribution0202 electrical engineering electronic engineering information engineeringSecurityComputingMilieux_COMPUTERSANDSOCIETYGeneral Earth and Planetary SciencesDistribution methodVANETsbusinessGeneral Environmental ScienceComputer network
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct

ADM : A Density And Priority Levels Aware Protocol For Broadcasting In Vehicular Ad-Hoc Networks

2014

The broadcasting communication mode is widely used in Vehicular Ad~hoc Networks (VANETs). It is used for sending emergency messages, road-traffic information or to help routing protocols to determine routes. This communication mode is known to be hard to achieve efficiently since it depends on the network density. Indeed, broadcasting methods may cause network congestion if they are not well designed. This paper introduces a novel Autonomic Dissemination Method (ADM) which delivers messages in accordance with given message classes and network density levels. The proposed approach is based on two steps: an offline optimization process and an online adaptation to the network characteristics. …

Density evaluationOptimizationVANET[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI][ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Broadcasting protocolAutonomic computingMessage priority level
researchProduct

Performance of LoRa for Bike-Sharing Systems

2019

Today bike sharing systems are becoming popular in many cities as short-distance transit vehicles. More than 18 million bicycles are available worldwide for public use and one of the main problems that afflicts such sharing systems is the loss of bikes, which can be stolen or simply left in unknown locations. Thus, many bikes are docked or tracked using GPS and costly cellular connections. In this paper, we consider the emerging Long Range (LoRa) technology for use in bike sharing systems. LoRa exploits free ISM bands and has been conceived for low power and low data rate applications. Additionally, LoRa is characterized by large cells and heterogeneous application domains, which may lead t…

ExploitSettore ING-INF/03 - Telecomunicazionibusiness.industryComputer science020209 energy020208 electrical & electronic engineeringAutomotive industry02 engineering and technologyScalabilityLow data rate0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemBike sharingbusinessInternet of ThingsLoRa LoRaWAN Low Power Wide Area Net-works (LPWAN) Automotive Vehicular Network (VANET) bikebike-sharing tracker IoTComputer network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

Na przedpolach Kamieńca Podolskiego. Zdławienie konfederacji barskiej na Podolu w świetle raportów Jana de Witte

2018

W artykule przedstawiona została sytuacja strategiczna twierdzy Kamieniec Podolski w okresie od zimy 1768 r. do zimy 1769 r., gdy na Podolu trwała konfederacja barska. Komendant twierdzy Józef de Witte dokładał wszelkich starań, aby utrzymać twierdzę, a przede wszystkim stanowiących jej garnizon żołnierzy w jak najlepszej kondycji, a przy tym dochować wierności królowi Stanisławowi Augustowi. Z zachowanych w Archiwum Narodowym w Krakowie raportów J. Witte do króla, Komisji Wojskowej oraz wysokich urzędników i dowódców wojska koronnego wynika, że w pełni mu się to udało. Raporty Wittego są przy tym cennym źródłem do zbadania procesu zdławienia przez wojska rosyjskie konfederacji barskiej na …

Kamieniec PodolskiOkopy Świętej TrójcyZhvanetsŻwaniecPodoliaJan de Wittekonfederacja barskaFranciszek PułaskiBar ConfederationKamianets-PodilskyiKazimierz PułaskiPodoleStudia z Dziejów Polskiej Historiografii Wojskowej
researchProduct

Priority Levels Based Multi-hop Broadcasting Method for Vehicular Ad hoc Networks

2015

International audience; This paper deals with broadcasting problem in vehicular ad hoc networks (VANETs). This communication mode is commonly used for sending safety messages and traffic information. However, designing an efficient broadcasting protocol is hard to achieve since it has to take into account some parameters related to the network environment, for example, the network density, in order to avoid causing radio interferences. In this paper, we propose a novel Autonomic Dissemination Method (ADM) which delivers messages in accordance with given priority and density levels. The proposed approach is based on two steps: an offline optimization process and an adaptation to the network …

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesOptimizationVANETWireless ad hoc networkbusiness.industryComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Autonomic computingQuality of ServiceMessage priority levelAutonomic computingHop (networking)Computer Science - Networking and Internet ArchitectureDensity evaluation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Electrical and Electronic EngineeringbusinessComputer networkBroadcast
researchProduct

Optimization of Data Harvesters Deployment in an Urban Areas for an Emergency Scenario

2013

International audience; Since its appearance in the VANETs research community, data collection where vehicles have to explore an area and collect various local data, brings various issues and challenges. Some architectures were proposed to meet data collection requirements. They can be classified into two categories: Decentralized and Centralized self-organizing where different components and techniques are used depending on the application type. In this paper, we treat time-constrained applications in the context of search and rescue missions. For this reason, we propose a centralized architecture where a central unit plans and manages a set of vehicles namely harvesters to get a clear ove…

OptimizationMathematical optimizationVANETOperations researchComputer scienceHeuristic (computer science)[SPI] Engineering Sciences [physics]Search and Rescue050801 communication & media studies02 engineering and technologyTopology[SPI]Engineering Sciences [physics]0508 media and communications11. Sustainability0202 electrical engineering electronic engineering information engineeringHeuristic algorithmsLocal search (optimization)Greedy algorithmMetaheuristicHarvestersGreedy randomized adaptive search procedureIncremental heuristic searchbusiness.industryData Collection05 social sciencesVehicles020206 networking & telecommunicationsRoadsEmergencyBeam searchbusinessBismuthVariable neighborhood search
researchProduct

Modeling Efficient and Effective Communications in VANET through Population Protocols

2021

Vehicular Ad-hoc NETworks (VANETs) enable a countless set of next-generation applications thanks to the technological progress of the last decades. These applications rely on the assumption that a simple network of vehicles can be extended with more complex and powerful network infrastructure, in which several Road Side Units (RSUs) are employed to achieve application-specific goals. However, this assumption is not always satisfied as in many real-world scenarios it is unfeasible to have a conspicuous deployment of RSUs, due to both economic and environmental constraints. With the aim to overcome this limitation, in this paper we investigate how the only Vehicle-to-Vehicle (V2V) communicati…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionieducation.field_of_studypopulation protocols VANET Vehicle-to-Vehicle communicationsVehicular ad hoc networkSIMPLE (military communications protocol)Event (computing)Computer scienceDistributed computingPopulationPopulation protocolSchema (genetic algorithms)Software deploymentSynchronization (computer science)education2021 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

VLPZ: The Vehicular Location Privacy Zone

2016

International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…

StandardizationComputer scienceWireless ad hoc networkSecurity.02 engineering and technologyPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringVANETsGeneral Environmental ScienceLocation privacybiologybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020302 automobile design & engineering020206 networking & telecommunicationsPseudonym ChangingTollMetric (mathematics)biology.proteinKey (cryptography)SecurityGeneral Earth and Planetary SciencesComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerAnonymityComputer network
researchProduct