scispace - formally typeset
Search or ask a question

Showing papers by "Wan Haslina Hassan published in 2015"


Journal ArticleDOI
TL;DR: The main challenges and requirements for trust in VANETs are revealed and future research within this scope is revealed to increase quality of data in transportation.
Abstract: The basis of vehicular ad hoc networks (VANETs) is the exchange of data between entities, and making a decision on received data/event is usually based on information provided by other entities. Many researchers utilize the concept of trust to assess the trustworthiness of the received data. Nevertheless, the lack of a review to sum up the best available research on specific questions on trust management in vehicular ad hoc networks is sensible. This paper presents a systematic literature review to provide comprehensive and unbiased information about various current trust conceptions, proposals, problems, and solutions in VANETs to increase quality of data in transportation. For the purpose of the writing of this paper, a total of 111 articles related to the trust model in VANETs published between 2005 and 2014 were extracted from the most relevant scientific sources (IEEE Computer Society, ACM Digital Library, Springer Link, Science Direct, and Wiley Online Library). Finally, ten articles were eventually analyzed due to several reasons such as relevancy and comprehensiveness of discussion presented in the articles. Using the systematic method of review, this paper succeeds to reveal the main challenges and requirements for trust in VANETs and future research within this scope.

98 citations


Journal ArticleDOI
TL;DR: It is found that the deployment of crosslayer architecture as a handover trigger and then performs handover accordingly with multi-path transmission can reduce packet losses around the handover.
Abstract: Background/Objectives: Heterogeneous wireless networks are converging towards an all-IP network as part of the socalled next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we prepare a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. Methods/Statistical Analysis: To offer a systematic comparison, we categorize these vertical handover mechanisms based on TCP/IP layers. Subsequently, we evaluate several vertical handover decision-making mechanisms in the literature and compare them according to their advantages and limitations. Results/Findings: The paper compares the algorithms based on the network selection methods, flexibility and complexity of the technologies used. We find that the deployment of crosslayer architecture as a handover trigger and then performs handover accordingly with multi-path transmission can reduce packet losses around the handover. Conclusion/Application: The cross layer design approach seems to be a best solution for attaining seamless service continuity in order to facilitate seamless connectivity.

18 citations


Journal ArticleDOI
TL;DR: Simulation results indicate that using CF-PSO algorithm can decrease the number of unnecessary handovers and prevent the “Ping-Pong” effect, and it is demonstrated that the multiobjective particle swarm optimization based method finds an optimal network selection in a heterogeneous wireless environment.
Abstract: The vertical handover mechanism is an essential issue in the heterogeneous wireless environments where selection of an efficient network that provides seamless connectivity involves complex scenarios. This study uses two modules that utilize the particle swarm optimization (PSO) algorithm to predict and make an intelligent vertical handover decision. In this paper, we predict the received signal strength indicator parameter using the curve fitting based particle swarm optimization (CF-PSO) and the RBF neural networks. The results of the proposed methodology compare the predictive capabilities in terms of coefficient determination (R2) and mean square error (MSE) based on the validation dataset. The results show that the effect of the model based on the CF-PSO is better than that of the model based on the RBF neural network in predicting the received signal strength indicator situation. In addition, we present a novel network selection algorithm to select the best candidate access point among the various access technologies based on the PSO. Simulation results indicate that using CF-PSO algorithm can decrease the number of unnecessary handovers and prevent the “Ping-Pong” effect. Moreover, it is demonstrated that the multiobjective particle swarm optimization based method finds an optimal network selection in a heterogeneous wireless environment.

14 citations


Journal Article
TL;DR: The simulation results obviously demonstrate that the RACARP protocol can significantly achieve better performance in terms of average throughput, packet loss, average end-toend delay, and average jitter as compared to the recently proposed D2CARP protocol in identical scenarios.
Abstract: Cognitive Radio (CR) is a new paradigm which offers a viable solution to deal with the spectrum shortage problem and enhances the spectrum utilization in wireless communication systems. In Cognitive Radio Ad Hoc Networks (CRAHNs), data routing is one of the most challenging tasks due to varying link-quality, frequent topology changes and intermittent connectivity caused by the activities of Primary Users (PUs). This paper proposes a robustness aware routing protocol for CRAHNs, referred to the Robustness Aware Cognitive Ad-hoc Routing Protocol (RACARP), with an aim to provide robust transmission path and offer fast route recovery in presence of PU activities during data delivery. The Expected Path Delay (EPD) routing metric used in the protocol for path decision is also introduced. The protocol avoids creating a transmission path that uses PU’s channel in PU regions in order to counteract the impact of PU activity. Moreover, for the purpose of fast route recovery, the multi-path multi-channel routes are given by utilizing the joint path and spectrum diversity in routing. The performance evaluations are conducted through simulations using NS-2 simulator. The simulation results obviously demonstrate that the RACARP protocol can significantly achieve better performance in terms of average throughput, packet loss, average end-toend delay, and average jitter as compared to the recently proposed D2CARP protocol in identical scenarios.

9 citations


Journal ArticleDOI
11 Jan 2015
TL;DR: Different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6 and the existing authentication approaches can be analyzed based on these criteria to find security issues.
Abstract: Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.

9 citations


Journal Article
TL;DR: A review of gateway selection schemes with a single selection criterion or weighted multiple criteria showing the differences, the features, the challenges and the drawbacks of each of them is done.
Abstract: The wide use of the internet-based applications bring many challenges to the researchers to guarantee the continuity of the connections needed by the mobile hosts and provide reliable Internet access for them. One of proposed solutions by Internet Engineering Task Force (IETF) is to connect the local, multi-hop, and infrastructure-less Mobile Ad hoc Network (MANET) with Internet structure. This connection is done through multi-interface devices known as Internet Gateways. Many issues are related to this connection like gateway discovery, hand off, address auto-configuration and selecting the optimum gateway when multiple gateways exist. Many studies were done proposing gateway selection schemes with a single selection criterion or weighted multiple criteria. In this research, a review of some of these schemes is done showing the differences, the features, the challenges and the drawbacks of each of them.

5 citations


Book ChapterDOI
01 Jan 2015
TL;DR: A robust on-demand routing protocol for CRAHNs, referred to the Robustness Aware Cognitive Ad-hoc Routing Protocol (RACARP), is proposed with an aim to provide robust paths for data delivery and the EPD routing metric used for path decision is introduced and applied in the protocol.
Abstract: Cognitive Radio (CR) technology has been introduced to solve the problems of spectrum underutilization and spectrum scarcity caused by improper spectrum management policies. In Cognitive Radio Ad Hoc Networks (CRAHNs), which operate without centralized infrastructure support, data routing encounters various challenges including frequent topology changes, heterogeneous spectrum availability, and intermittent connectivity caused by the activities of Primary Users (PUs). In this paper, a robust on-demand routing protocol for CRAHNs, referred to the Robustness Aware Cognitive Ad-hoc Routing Protocol (RACARP), is proposed with an aim to provide robust paths for data delivery. The Expected Path Delay (EPD) routing metric used for path decision is introduced and applied in the protocol. The metric takes account of the link delay and the effect of packet loss on wireless links. Furthermore, the protocol avoids creating a transmission path that uses PU’s channel in PU regions in order to counteract the impact of PU activities which can simply cause communication interruptions. The protocol also jointly exploits path and spectrum diversity in routing process in order to provide multi-path and multi-channel routes for the purpose of fast route recovery. The performance evaluation is conducted through simulation using NS-2 simulator. The simulation results prove that the RACARP protocol achieves better performance in terms of average throughput and average end-to-end delay as compared to the Dual Diversity Cognitive Ad-hoc Routing Protocol (D2CARP).

4 citations


Book ChapterDOI
TL;DR: It is shown that accessibility, privacy, security, quality, usability, users knowledge and disposition to trust were found to have significant influence on customer trust.
Abstract: The use of the Internet has increased dramatically over recent years and is now regarded as the best channel for distribution of products and services of various types of businesses, such as internet banking services. This paper extends an area of information systems research into a financial services context by looking into the element of trust in Internet banking. As more financial institutions are currently seeking ways to boost Internet banking adoption rates, trust is also being examined as a significant issue in the relationship. This can be attributed to the fact that bank customers are concerned about the security involved in processing such sensitive material as financial information. Moreover, significant factors of trust are involved and these include: accessibility, privacy, security, quality, usability, users knowledge and disposition to trust. These can all have an impact on customer trust in adopting internet banking. Based on previous models with aforementioned variables that are theoretically justified as having an influence on trust, a relevant research model was developed to test eight (8) hypothesized paths among the study variables. These include, namely: accessibility, privacy, security, quality, usability, users knowledge, disposition to trust, trust, as well as the rate of internet banking adoption. Data was collected by survey questionnaires from a sample of 150 internet banking users. The Smart PLS tool was used for data analysis. The results of the data analysis generally support the model, as well as all of the proposed hypotheses. In summary, the results of this research have shown that accessibility, privacy, security, quality, usability, users knowledge and disposition to trust were found to have significant influence on customer trust. Trust, in turn, was found to be an important factor in fostering a positive attitude toward adopting the services. Several implications for both research and practice have emerged and are discussed later in this study.

2 citations


Proceedings ArticleDOI
01 Nov 2015
TL;DR: A Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture and results show that the proposed algorithm converges and outperforms a source based tree algorithm.
Abstract: Mobility considerations in multicast algorithm design usually focus issues of mobile receivers while few researches emphasize on mobile multicast sources issues. However, mobility of source is a critical issue causing global tree disruption. Furthermore, major research challenges in the delivery of group applications over Wireless Mesh Networks (WMN) comprise delivery of large volume data, incurring large bandwidth and delay. This is in addition to multicast source mobility issues and interfering nature of scarce wireless resources. Mobile multicast scenarios emerge in group-based distribution of information such as obtains in the health sector, disaster recovery operation, remote bus, train control and video surveillance. The mobile multicast problem in this paper is formulated as a bandwidth and delay constrained minimum tree cost problem which is proved to be computationally intensive. Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. The proposed algorithm is implemented using MATLAB and the evaluation considers analytic and simulation techniques for convergence, scalability and multicast tree stability under source movement. Simulation results show that the proposed algorithm converges and outperforms a source based tree algorithm.

2 citations


Book ChapterDOI
01 Jan 2015
TL;DR: The Fault-Tolerant Cognitive Ad hoc Routing Protocol (FTCARP) is proposed to provide fast and efficient route recovery in presence of path failures during data delivery in CRAHNs to achieve better performance in terms of average throughput and average end-to-end delay.
Abstract: Cognitive Radio (CR) has been proposed as a promising technology to solve the problem of radio spectrum shortage and spectrum underutilization. In Cognitive Radio Ad Hoc Networks (CRAHNs), which operate without centralized infrastructure support, the data routing is one of the most important issues to be taken into account and requires more studies. Moreover, in such networks, a path failure can easily occur during data transmission caused by an activity of licensed users, node mobility, node fault, or link degradation. Also, the network performance is severely degraded due to a large number of path failures. In this paper, the Fault-Tolerant Cognitive Ad hoc Routing Protocol (FTCARP) is proposed to provide fast and efficient route recovery in presence of path failures during data delivery in CRAHNs. In FTCARP, a backup path is immediately utilized in case a failure occurs over a primary transmission route in order to transfer the next coming data packets without severe service disruption. The protocol uses different route recovery mechanism to handle different cause of a path failure. The performance evaluation is conducted through simulation using NS-2 simulator. The protocol performance is benchmarked against the Dual Diversity Cognitive Ad hoc Routing Protocol (D2CARP). The simulation results prove that the FTCARP protocol achieves better performance in terms of average throughput and average end-to-end delay as compared to the D2CARP protocol.

1 citations


Journal Article
TL;DR: In this article, the authors proposed a Shared Prefix-based Flow mobility scheme in multihomed NEMO (SPF-NEMO) which is based on PMIPv6 to reduce registration delay during inter mobility handoff as well.
Abstract: With the growing development of Different Access Technology Type (DATT), a serving Mobile Router (MR) is capable to connect with multiple interfaces concurrently during handoff among DATT. Correspondingly, a shared prefixbased based flow movement in multihomed Network Mobility (NEMO) can be achieved in order to transfer real time application flows among the most appropriate Access Technology Type (ATT) dynamically to provide better Quality of Service (QoS) for real time scenarios in NEMO. Although Multiple Care of Address (MCOA) registration between serving MR along with its Home Agent (HA) can overcomes some of the multihoming issues for NEMO, but still required a dynamic flow redirection mechanism leads to signaling overhead issues to support mobility management in NEMO. The aim of this paper is to propose a Shared Prefix-based Flow mobility scheme in multihomed NEMO (SPF-NEMO) which is based on PMIPv6 to reduce registration delay during inter mobility handoff as well. Moreover, numerical framework is formulated to evaluate the outcomes of the SPF-NEMO scheme. Through the performance analysis with results, it is confirmed that SPF-NEMO provides better solution related to extra registration delay during handoff among DATT.

Journal ArticleDOI
TL;DR: Simulation results prove that the D2CARP protocol performance is significantly affected in the networks with high number of PUs and mobility rate, leading to high path failure rate and severe service outages.
Abstract: Cognitive Radio (CR) technology has been introduced to solve the problems of spectrum underutilization and spectrum scarcity caused by improper spectrum management policies. The main concept of Cognitive Radio Ad Hoc Network (CRAHN) is that, in a wireless ad hoc network, the unlicensed users (or Secondary Users (SUs)) are allowed to access the temporally unused licensed spectrum bands for data communications without harmful interference to the licensed users (or Primary Users (PUs)). In CRAHNs, the mobile SUs communicate with each other without the use of any centralized network infrastructure. Routing in CRAHNs is an important task and faces various challenges including PU interference, frequent network topology changes, energy constraint, volatile bandwidth and fragile connectivity. In this study, an attempt is made to evaluate the performance of the Dual Diversity Cognitive Ad-hoc Routing Protocol (D2CARP) in CRAHNs under critical conditions, i.e., high node mobility rate and number of PUs. The D2CARP protocol is a joint path and spectrum diversity based routing protocol for CRAHNs. The performance evaluation is conducted through simulation using NS-2 simulator. The performance metrics to be considered include average throughput, percentage of packet loss, average end-to-end delay and average jitter. The simulation results prove that the protocol performance is significantly affected in the networks with high number of PUs and mobility rate, leading to high path failure rate and severe service outages.

Book ChapterDOI
01 Jan 2015
TL;DR: In this paper, a numerical framework is developed to study the total handoff cost of macro mobility scheme in NEMO (MM-NEMO), and the numerical results confirm that MM-nemO scheme outperforms the standard NEMo BSP related to total handover delay cost (51 % less than that of nEMO-BSP) regardless of increasing the number of MRs and cell residence time.
Abstract: Signaling overhead is a significant issue for mobile network due to increase traffic load with packet loss and delay during frequent movement of Mobile Router (MR) from one subnet to another in Network Mobility Basic Support protocol (NEMO BSP). Accordingly, advance preparation mechanism (i.e. Fast Hierarchical Mobile IPv6) works very well as a node mobility solution in order to solve these matters. Yet, combining this host-based protocol for macro mobility handoff in NEMO environment is a challenging issue as both MR and its Mobile Network Nodes (MNNs) must be taken into consideration. In this paper, a numerical framework is developed to study the total handoff cost of Macro Mobility scheme in NEMO (MM-NEMO). The numerical results confirms that MM-NEMO scheme outperforms the standard NEMO BSP related to total handoff delay cost (51 % less than that of NEMO-BSP) regardless of increasing the number of MRs as well as cell residence time.

Journal ArticleDOI
TL;DR: The obtained results show that the proposed scheme outperforms the standard NEMO BSP in terms of packets loss rate and the probability of dropping BU and takes the advantage of DiffServ to enhance QoS in the network mobility.
Abstract: Network mobility basic support protocol (RFC 3963) is a novel thought for handling a bunch of nodes within a moving vehicular area. Namely, this protocol upholds continuous internet connectivity to nodes by establishing a bi-directional tunnel between Mobile Router (MR) and Home Agent (HA), when the MR of a mobile network changes its point of attachment. The bi-directional tunnel is set up as soon as the mobile router sends a successful Binding Update (BU) to its HA in order to inform the home agent about its current point of attachment. All traffic flow between the nodes in the mobile network and correspondent node must pass through the HA. This leads to sub-optimal routing that can surely disrupt and deteriorate all communications to and from the Mobile Network Nodes (MNN). Even the overheads can be further amplified if mobile networks are nested which is unacceptable for real-time applications that require certain Quality of Service (QoS) restrictions. Therefore, this study endeavors to propose a new scheme that bypasses the HA to cater optimal path and take the advantage of DiffServ to enhance QoS in the network mobility. The performance of the proposed scheme has been evaluated by using Network Simulator (NS-2). Subsequently, it benchmarked with the standard NEMO BSP that was proposed by Internet Engineering Task Force (IETF). The obtained results show that the proposed scheme outperforms the standard NEMO BSP in terms of packets loss rate and the probability of dropping BU.