Search results for "vanet"
showing 10 items of 19 documents
Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks
2016
Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…
A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization
2017
Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…
ADM : A Density And Priority Levels Aware Protocol For Broadcasting In Vehicular Ad-Hoc Networks
2014
The broadcasting communication mode is widely used in Vehicular Ad~hoc Networks (VANETs). It is used for sending emergency messages, road-traffic information or to help routing protocols to determine routes. This communication mode is known to be hard to achieve efficiently since it depends on the network density. Indeed, broadcasting methods may cause network congestion if they are not well designed. This paper introduces a novel Autonomic Dissemination Method (ADM) which delivers messages in accordance with given message classes and network density levels. The proposed approach is based on two steps: an offline optimization process and an online adaptation to the network characteristics. …
Performance of LoRa for Bike-Sharing Systems
2019
Today bike sharing systems are becoming popular in many cities as short-distance transit vehicles. More than 18 million bicycles are available worldwide for public use and one of the main problems that afflicts such sharing systems is the loss of bikes, which can be stolen or simply left in unknown locations. Thus, many bikes are docked or tracked using GPS and costly cellular connections. In this paper, we consider the emerging Long Range (LoRa) technology for use in bike sharing systems. LoRa exploits free ISM bands and has been conceived for low power and low data rate applications. Additionally, LoRa is characterized by large cells and heterogeneous application domains, which may lead t…
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
2017
International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…
Na przedpolach Kamieńca Podolskiego. Zdławienie konfederacji barskiej na Podolu w świetle raportów Jana de Witte
2018
W artykule przedstawiona została sytuacja strategiczna twierdzy Kamieniec Podolski w okresie od zimy 1768 r. do zimy 1769 r., gdy na Podolu trwała konfederacja barska. Komendant twierdzy Józef de Witte dokładał wszelkich starań, aby utrzymać twierdzę, a przede wszystkim stanowiących jej garnizon żołnierzy w jak najlepszej kondycji, a przy tym dochować wierności królowi Stanisławowi Augustowi. Z zachowanych w Archiwum Narodowym w Krakowie raportów J. Witte do króla, Komisji Wojskowej oraz wysokich urzędników i dowódców wojska koronnego wynika, że w pełni mu się to udało. Raporty Wittego są przy tym cennym źródłem do zbadania procesu zdławienia przez wojska rosyjskie konfederacji barskiej na …
Priority Levels Based Multi-hop Broadcasting Method for Vehicular Ad hoc Networks
2015
International audience; This paper deals with broadcasting problem in vehicular ad hoc networks (VANETs). This communication mode is commonly used for sending safety messages and traffic information. However, designing an efficient broadcasting protocol is hard to achieve since it has to take into account some parameters related to the network environment, for example, the network density, in order to avoid causing radio interferences. In this paper, we propose a novel Autonomic Dissemination Method (ADM) which delivers messages in accordance with given priority and density levels. The proposed approach is based on two steps: an offline optimization process and an adaptation to the network …
Optimization of Data Harvesters Deployment in an Urban Areas for an Emergency Scenario
2013
International audience; Since its appearance in the VANETs research community, data collection where vehicles have to explore an area and collect various local data, brings various issues and challenges. Some architectures were proposed to meet data collection requirements. They can be classified into two categories: Decentralized and Centralized self-organizing where different components and techniques are used depending on the application type. In this paper, we treat time-constrained applications in the context of search and rescue missions. For this reason, we propose a centralized architecture where a central unit plans and manages a set of vehicles namely harvesters to get a clear ove…
Modeling Efficient and Effective Communications in VANET through Population Protocols
2021
Vehicular Ad-hoc NETworks (VANETs) enable a countless set of next-generation applications thanks to the technological progress of the last decades. These applications rely on the assumption that a simple network of vehicles can be extended with more complex and powerful network infrastructure, in which several Road Side Units (RSUs) are employed to achieve application-specific goals. However, this assumption is not always satisfied as in many real-world scenarios it is unfeasible to have a conspicuous deployment of RSUs, due to both economic and environmental constraints. With the aim to overcome this limitation, in this paper we investigate how the only Vehicle-to-Vehicle (V2V) communicati…
VLPZ: The Vehicular Location Privacy Zone
2016
International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…