scispace - formally typeset
Search or ask a question

Showing papers on "Wireless ad hoc network published in 2016"


Journal ArticleDOI
TL;DR: This article provides an overview of signal processing challenges in mmWave wireless systems, with an emphasis on those faced by using MIMO communication at higher carrier frequencies.
Abstract: Communication at millimeter wave (mmWave) frequencies is defining a new era of wireless communication. The mmWave band offers higher bandwidth communication channels versus those presently used in commercial wireless systems. The applications of mmWave are immense: wireless local and personal area networks in the unlicensed band, 5G cellular systems, not to mention vehicular area networks, ad hoc networks, and wearables. Signal processing is critical for enabling the next generation of mmWave communication. Due to the use of large antenna arrays at the transmitter and receiver, combined with radio frequency and mixed signal power constraints, new multiple-input multiple-output (MIMO) communication signal processing techniques are needed. Because of the wide bandwidths, low complexity transceiver algorithms become important. There are opportunities to exploit techniques like compressed sensing for channel estimation and beamforming. This article provides an overview of signal processing challenges in mmWave wireless systems, with an emphasis on those faced by using MIMO communication at higher carrier frequencies.

2,380 citations


Journal ArticleDOI
TL;DR: This paper surveys the work done toward all of the outstanding issues, relating to this new class of networks, so as to spur further research in these areas.
Abstract: Unmanned aerial vehicles (UAVs) have enormous potential in the public and civil domains. These are particularly useful in applications, where human lives would otherwise be endangered. Multi-UAV systems can collaboratively complete missions more efficiently and economically as compared to single UAV systems. However, there are many issues to be resolved before effective use of UAVs can be made to provide stable and reliable context-specific networks. Much of the work carried out in the areas of mobile ad hoc networks (MANETs), and vehicular ad hoc networks (VANETs) does not address the unique characteristics of the UAV networks. UAV networks may vary from slow dynamic to dynamic and have intermittent links and fluid topology. While it is believed that ad hoc mesh network would be most suitable for UAV networks yet the architecture of multi-UAV networks has been an understudied area. Software defined networking (SDN) could facilitate flexible deployment and management of new services and help reduce cost, increase security and availability in networks. Routing demands of UAV networks go beyond the needs of MANETS and VANETS. Protocols are required that would adapt to high mobility, dynamic topology, intermittent links, power constraints, and changing link quality. UAVs may fail and the network may get partitioned making delay and disruption tolerance an important design consideration. Limited life of the node and dynamicity of the network lead to the requirement of seamless handovers, where researchers are looking at the work done in the areas of MANETs and VANETs, but the jury is still out. As energy supply on UAVs is limited, protocols in various layers should contribute toward greening of the network. This paper surveys the work done toward all of these outstanding issues, relating to this new class of networks, so as to spur further research in these areas.

1,636 citations


Journal ArticleDOI
TL;DR: This paper proposes long-term evolution (LTE)-V as a systematic and integrated V2X solution based on time-division LTE (TD-LTE) 4G based on centralized architecture with native features of TD-Lte, which optimizes radio resource management for better supporting V2I.
Abstract: Diverse applications in vehicular network present specific requirements and challenges on wireless access technology. Although considered as the first standard, IEEE 802.11p shows the obvious drawbacks and is still in the field-trial stage. In this paper, we propose long-term evolution (LTE)-V as a systematic and integrated V2X solution based on time-division LTE (TD-LTE) 4G. LTE-V includes two modes: 1) LTE-V-direct and 2) LTE-V-cell. Comparing to IEEE 802.11p, LTE-V-direct is a new decentralized architecture which modifies TD-LTE physical layer and try to keep commonality as possible to provide short range direct communication, low latency, and high reliability improvements. By leveraging the centralized architecture with native features of TD-LTE, LTE-V-cell optimizes radio resource management for better supporting V2I. LTE-V-direct and LTE-V-cell coordinate with each other to provide an integrated V2X solution. Performance simulations based on sufficient scenarios and the prototype system with typical cases are presented. Finally, future works of LTE-V are envisioned.

386 citations


Journal ArticleDOI
01 Jul 2016
TL;DR: This work surveys VANETs focusing on their communication and application challenges, and discusses the protocol stack of this type of network, and provides a qualitative comparison between most common protocols in the literature.
Abstract: VANETs have emerged as an exciting research and application area. Increasingly vehicles are being equipped with embedded sensors, processing and wireless communication capabilities. This has opened a myriad of possibilities for powerful and potential life-changing applications on safety, efficiency, comfort, public collaboration and participation, while they are on the road. Although, considered as a special case of a Mobile Ad Hoc Network, the high but constrained mobility of vehicles bring new challenges to data communication and application design in VANETs. This is due to their highly dynamic and intermittent connected topology and different application's QoS requirements. In this work, we survey VANETs focusing on their communication and application challenges. In particular, we discuss the protocol stack of this type of network, and provide a qualitative comparison between most common protocols in the literature. We then present a detailed discussion of different categories of VANET applications. Finally, we discuss open research problems to encourage the design of new VANET solutions.

362 citations


Journal ArticleDOI
TL;DR: An attack-resistant trust management scheme (ART) is proposed for VANets that is able to detect and cope with malicious attacks and also evaluate the trustworthiness of both data and mobile nodes in VANETs.
Abstract: Vehicular ad hoc networks (VANETs) have the potential to transform the way people travel through the creation of a safe interoperable wireless communications network that includes cars, buses, traffic signals, cell phones, and other devices. However, VANETs are vulnerable to security threats due to increasing reliance on communication, computing, and control technologies. The unique security and privacy challenges posed by VANETs include integrity (data trust), confidentiality, nonrepudiation, access control, real-time operational constraints/demands, availability, and privacy protection. The trustworthiness of VANETs could be improved by addressing holistically both data trust, which is defined as the assessment of whether or not and to what extent the reported traffic data are trustworthy, and node trust, which is defined as how trustworthy the nodes in VANETs are. In this paper, an attack-resistant trust management scheme (ART) is proposed for VANETs that is able to detect and cope with malicious attacks and also evaluate the trustworthiness of both data and mobile nodes in VANETs. Specially, data trust is evaluated based on the data sensed and collected from multiple vehicles; node trust is assessed in two dimensions, i.e., functional trust and recommendation trust, which indicate how likely a node can fulfill its functionality and how trustworthy the recommendations from a node for other nodes will be, respectively. The effectiveness and efficiency of the proposed ART scheme is validated through extensive experiments. The proposed trust management theme is applicable to a wide range of VANET applications to improve traffic safety, mobility, and environmental protection with enhanced trustworthiness.

326 citations


Journal ArticleDOI
TL;DR: The proposed model and solution represent the first known vehicular ad hoc network (VANET) implementation of software defined network (SDN) concept and prove that CDS is NP-hard by constructing a polynomial-time reduction from the Maximum Weighted Independent Set (MWIS) problem.
Abstract: This paper presents the first study on scheduling for cooperative data dissemination in a hybrid infrastructure-to-vehicle (I2V) and vehicle-to-vehicle (V2V) communication environment. We formulate the novel problem of cooperative data scheduling (CDS). Each vehicle informs the road-side unit (RSU) the list of its current neighboring vehicles and the identifiers of the retrieved and newly requested data. The RSU then selects sender and receiver vehicles and corresponding data for V2V communication, while it simultaneously broadcasts a data item to vehicles that are instructed to tune into the I2V channel. The goal is to maximize the number of vehicles that retrieve their requested data. We prove that CDS is NP-hard by constructing a polynomial-time reduction from the Maximum Weighted Independent Set (MWIS) problem. Scheduling decisions are made by transforming CDS to MWIS and using a greedy method to approximately solve MWIS. We build a simulation model based on realistic traffic and communication characteristics and demonstrate the superiority and scalability of the proposed solution. The proposed model and solution, which are based on the centralized scheduler at the RSU, represent the first known vehicular ad hoc network (VANET) implementation of software defined network (SDN) concept.

262 citations


Journal ArticleDOI
TL;DR: A dual authentication scheme to provide a high level of security in the vehicle side to effectively prevent the unauthorized vehicles entering into the VANET and a dual group key management scheme to efficiently distribute a group key to a group of users and to update such group keys during the users' join and leave operations are presented.
Abstract: Vehicular ad hoc networks (VANETs) are an important communication paradigm in modern-day mobile computing for exchanging live messages regarding traffic congestion, weather conditions, road conditions, and targeted location-based advertisements to improve the driving comfort. In such environments, security and intelligent decision making are two important challenges needed to be addressed. In this paper, a trusted authority (TA) is designed to provide a variety of online premium services to customers through VANETs. Therefore, it is important to maintain the confidentiality and authentication of messages exchanged between the TA and the VANET nodes. Hence, we address the security problem by focusing on the scenario where the TA classifies the users into primary, secondary, and unauthorized users. In this paper, first, we present a dual authentication scheme to provide a high level of security in the vehicle side to effectively prevent the unauthorized vehicles entering into the VANET. Second, we propose a dual group key management scheme to efficiently distribute a group key to a group of users and to update such group keys during the users' join and leave operations. The major advantage of the proposed dual key management is that adding/revoking users in the VANET group can be performed in a computationally efficient manner by updating a small amount of information. The results of the proposed dual authentication and key management scheme are computationally efficient compared with all other existing schemes discussed in literature, and the results are promising.

244 citations


Journal ArticleDOI
TL;DR: In this paper, the authors compare two routing algorithms for ad hoc networks: optimized link-state routing (OLSR) and predictive OLSR (P-OLSR), which takes advantage of the Global Positioning System (GPS) information available on board.
Abstract: This paper reports experimental results on self-organizing wireless networks carried by small flying robots. Flying ad hoc networks (FANETs) composed of small unmanned aerial vehicles (UAVs) are flexible, inexpensive, and fast to deploy. This makes them a very attractive technology for many civilian and military applications. Due to the high mobility of the nodes, maintaining a communication link between the UAVs is a challenging task. The topology of these networks is more dynamic than that of typical mobile ad hoc networks (MANETs) and of typical vehicle ad hoc networks. As a consequence, the existing routing protocols designed for MANETs partly fail in tracking network topology changes. In this paper, we compare two different routing algorithms for ad hoc networks: optimized link-state routing (OLSR) and predictive OLSR (P-OLSR). The latter is an OLSR extension that we designed for FANETs; it takes advantage of the Global Positioning System (GPS) information available on board. To the best of our knowledge, P-OLSR is currently the only FANET-specific routing technique that has an available Linux implementation. We present results obtained by both media-access-control (MAC) layer emulations and real-world experiments. In the experiments, we used a testbed composed of two autonomous fixed-wing UAVs and a node on the ground. Our experiments evaluate the link performance and the communication range, as well as the routing performance. Our emulation and experimental results show that P-OLSR significantly outperforms OLSR in routing in the presence of frequent network topology changes.

242 citations


Journal ArticleDOI
TL;DR: A stochastic geometry approach is used to characterize the one-way and two-way signal-to-interference ratio distribution of a mmWave ad hoc network with directional antennas, random blockages, and ALOHA channel access and shows that a fundamental limitation of an ad hocnetwork, interference, may still be an issue.
Abstract: Ad hoc networks provide an on-demand, infrastructure-free means to communicate between soldiers in war zones, aid workers in disaster areas, or consumers in device-to-device (D2D) applications. Unfortunately, ad hoc networks are limited by interference due to nearby transmissions. Millimeter-wave (mmWave) devices offer several potential advantages for ad hoc networks, including reduced interference due to directional antennas and building blockages, not to mention huge bandwidth channels for large data rates. This paper uses a stochastic geometry approach to characterize the one-way and two-way signal-to-interference ratio distribution of a mmWave ad hoc network with directional antennas, random blockages, and ALOHA channel access. The interference-to-noise ratio shows that a fundamental limitation of an ad hoc network, interference, may still be an issue. The performance of mmWave ad hoc networks is bounded by the transmission capacity and area spectral efficiency. The results show that mmWave networks can support much higher densities and larger spectral efficiencies, even in the presence of blockage, compared with lower frequency communication for certain link distances. Due to the increased bandwidth, the rate coverage of mmWave can be much greater than lower frequency devices.

211 citations


Journal ArticleDOI
11 Jan 2016-Sensors
TL;DR: This paper proposes a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion and addresses the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV.
Abstract: The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction.

206 citations


Journal ArticleDOI
TL;DR: An analytic model is proposed to estimate the entire network lifetime from network initialization until it is completely disabled, and determine the boundary of energy hole in a data-gathering WSN.
Abstract: Network lifetime is a crucial performance metric to evaluate data-gathering wireless sensor networks (WSNs) where battery-powered sensor nodes periodically sense the environment and forward collected samples to a sink node. In this paper, we propose an analytic model to estimate the entire network lifetime from network initialization until it is completely disabled, and determine the boundary of energy hole in a data-gathering WSN. Specifically, we theoretically estimate the traffic load, energy consumption, and lifetime of sensor nodes during the entire network lifetime. Furthermore, we investigate the temporal and spatial evolution of energy hole and apply our analytical results to WSN routing in order to balance the energy consumption and improve the network lifetime. Extensive simulation results are provided to demonstrate the validity of the proposed analytic model in estimating the network lifetime and energy hole evolution process.

Journal ArticleDOI
TL;DR: It is shown that increasing the number of channels may result in an increase of outage probability in the D2D-enabled cellular network, and a unified framework is provided to analyze the downlink outage probabilities in a multichannel environment with Rayleigh fading.
Abstract: In this paper, we study the outage probability of device-to-device (D2D)-communication-enabled cellular networks from a general threshold-based perspective. Specifically, a mobile user equipment (UE) transmits in D2D mode if the received signal strength (RSS) from the nearest base station (BS) is less than a specified threshold $\beta \ge 0$ ; otherwise, it connects to the nearest BS and transmits in cellular mode. The RSS-threshold-based setting is general in the sense that by varying $\beta$ from $\beta = 0$ to $\beta = \infty$ , the network accordingly evolves from a traditional cellular network (including only cellular mode) toward a wireless ad hoc network (including only D2D mode). We provide a unified framework to analyze the downlink outage probability in a multichannel environment with Rayleigh fading, where the spatial distributions of BSs and UEs are well explicitly accounted for by utilizing stochastic geometry. We derive closed-form expressions for the outage probability of a generic UE and that in both cellular mode and D2D mode and quantify the performance gains in outage probability that can be obtained by allowing such RSS-threshold-based D2D communications. We show that increasing the number of channels, although able to support more cellular UEs, may result in an increase of outage probability in the D2D-enabled cellular network. The corresponding condition and reason are also identified by applying our framework.

Journal ArticleDOI
TL;DR: This research proposes an SDN-based architecture to enable rapid network innovation for vehicular communications and studies several cases to highlight the advantages of the architecture, such as adaptive protocol deployment and multiple tenants isolation.
Abstract: With the advances in telecommunications, more and more devices are connected to the Internet and getting smart. As a promising application scenario for carrier networks, vehicular communication has enabled many traffic-related applications. However, the heterogeneity of wireless infrastructures and the inflexibility in protocol deployment hinder the real world application of vehicular communications. SDN is promising to bridge the gaps through unified network abstraction and programmability. In this research, we propose an SDN-based architecture to enable rapid network innovation for vehicular communications. Under this architecture, heterogeneous wireless devices, including vehicles and roadside units, are abstracted as SDN switches with a unified interface. In addition, network resources such as bandwidth and spectrum can also be allocated and assigned by the logically centralized control plane, which provides a far more agile configuration capability. Besides, we also study several cases to highlight the advantages of the architecture, such as adaptive protocol deployment and multiple tenants isolation. Finally, the feasibility and effectiveness of the proposed architecture and cases are validated through traffic-trace-based simulation.

Journal ArticleDOI
TL;DR: Simulation results show that the proposed strategy significantly improves the delay, throughput, and packet loss ratio in comparison with other congestion control strategies using the proposed congestion control strategy.
Abstract: In an urban environment, intersections are critical locations in terms of road crashes and number of killed or injured people. Vehicular ad hoc networks (VANETs) can help reduce the traffic collisions at intersections by sending warning messages to the vehicles. However, the performance of VANETs should be enhanced to guarantee delivery of the messages, particularly safety messages to the destination. Data congestion control is an efficient way to decrease packet loss and delay and increase the reliability of VANETs. In this paper, a centralized and localized data congestion control strategy is proposed to control data congestion using roadside units (RSUs) at intersections. The proposed strategy consists of three units for detecting congestion, clustering messages, and controlling data congestion. In this strategy, the channel usage level is measured to detect data congestion in the channels. The messages are gathered, filtered, and then clustered by machine learning algorithms. $K$ - means algorithm clusters the messages based on message size, validity of messages, and type of messages. The data congestion control unit determines appropriate values of transmission range and rate, contention window size, and arbitration interframe spacing for each cluster. Finally, RSUs at the intersections send the determined communication parameters to the vehicles stopped before the red traffic lights to reduce communication collisions. Simulation results show that the proposed strategy significantly improves the delay, throughput, and packet loss ratio in comparison with other congestion control strategies using the proposed congestion control strategy.

Journal ArticleDOI
TL;DR: A prototype system (the Geocast Air Operations Framework, or GAOF) is described that addresses the safe operation of drones using novel network and software architectures.
Abstract: The safe operation of drones for commercial and public use presents communication and computational challenges. This article overviews these challenges and describes a prototype system (the Geocast Air Operations Framework, or GAOF) that addresses them using novel network and software architectures.

Proceedings ArticleDOI
12 Sep 2016
TL;DR: Combining Vehicle Ad-hoc Networks (VANETs) and Ethereum's blockchain-based application concepts enables transparent, self-managed and decentralized system which are self-regulating and in no need of a central managing authority.
Abstract: Combining Vehicle Ad-hoc Networks (VANETs) and Ethereum's blockchain-based application concepts enables transparent, self-managed and decentralized system which are self-regulating and in no need of a central managing authority.

Journal ArticleDOI
TL;DR: This paper provides an adversary-oriented survey of the existing trust models for VANETs, and shows when trust is preferable to cryptography, and the opposite, and points out some critical scenarios thatexisting trust models cannot handle.
Abstract: Cooperative Intelligent Transportation Systems, mainly represented by vehicular ad hoc networks (VANETs), are among the key components contributing to the Smart City and Smart World paradigms. Based on the continuous exchange of both periodic and event triggered messages, smart vehicles can enhance road safety, while also providing support for comfort applications. In addition to the different communication protocols, securing such communications and establishing a certain trustiness among vehicles are among the main challenges to address, since the presence of dishonest peers can lead to unwanted situations. To this end, existing security solutions are typically divided into two main categories, cryptography and trust, where trust appeared as a complement to cryptography on some specific adversary models and environments where the latter was not enough to mitigate all possible attacks. In this paper, we provide an adversary-oriented survey of the existing trust models for VANETs. We also show when trust is preferable to cryptography, and the opposite. In addition, we show how trust models are usually evaluated in VANET contexts, and finally, we point out some critical scenarios that existing trust models cannot handle, together with some possible solutions.

Journal ArticleDOI
TL;DR: The proposed application-layer IDS based on a cooperative information exchange mechanism is better for dynamic and fast-moving networks such as VANETs, as compared with other techniques available.
Abstract: In this paper, an intrusion detection system (IDS) for vehicular ad hoc networks (VANETs) is proposed and evaluated. The IDS is evaluated by simulation in the presence of rogue nodes (RNs) that can launch different attacks. The proposed IDS is capable of detecting a false information attack using statistical techniques effectively and can also detect other types of attacks. First, the theory and implementation of the VANET model that is used to train the IDS is discussed. Then, an extensive simulation and analysis of our model under different traffic conditions is conducted to identify the effects of these parameters in VANETs. In addition, the extensive data gathered in the simulations are presented using graphical and statistical techniques. Moreover, RNs are introduced in the network, and an algorithm is presented to detect these RNs. Finally, we evaluate our system and observe that the proposed application-layer IDS based on a cooperative information exchange mechanism is better for dynamic and fast-moving networks such as VANETs, as compared with other techniques available.

Journal ArticleDOI
TL;DR: Analysis and simulation results show that the proposed UMBP significantly improves the performance of multi-hop broadcast in terms of one-hop delay, message propagation speed, and message reception rate.
Abstract: In vehicular ad hoc networks (VANETs), multi-hop wireless broadcast has been considered a promising technology to support safety-related applications that have strict quality-of-service (QoS) requirements such as low latency, high reliability, scalability, etc. However, in the urban transportation environment, the efficiency of multi-hop broadcast is critically challenged by complex road structure, severe channel contention, message redundancy, etc. In this paper, we propose an urban multi-hop broadcast protocol (UMBP) to disseminate emergency messages. To lower emergency message transmission delay and reduce message redundancy, UMBP includes a novel forwarding node selection scheme that utilizes iterative partition, mini-slot, and black-burst to quickly select remote neighboring nodes, and a single forwarding node is successfully chosen by the asynchronous contention among them. Then, bidirectional broadcast, multi-directional broadcast, and directional broadcast are designed according to the positions of the emergency message senders. Specifically, at the first hop, bidirectional broadcast or multi-directional broadcast conducts the forwarding node selection scheme in different directions simultaneously, and a single forwarding node is successfully chosen in each direction. Then, directional broadcast is adopted at each hop in the message propagation direction until the emergency message reaches an intersection area where multi-directional broadcast is performed again, which finally enables the emergency message to cover the target area seamlessly. Analysis and simulation results show that the proposed UMBP significantly improves the performance of multi-hop broadcast in terms of one-hop delay, message propagation speed, and message reception rate.

Journal ArticleDOI
TL;DR: An overview on current research state, challenges, potentials of VANETs as well as the ways forward to achieving the long awaited ITS is provided.
Abstract: Recent advances in wireless communication technologies and auto-mobile industry have triggered a significant research interest in the field of vehicular ad-hoc networks (VANETs) over the past few years. A vehicular network consists of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications supported by wireless access technologies such as IEEE 802.11p. This innovation in wireless communication has been envisaged to improve road safety and motor traffic efficiency in near future through the development of intelligent transportation system (ITS). Hence, governments, auto-mobile industries and academia are heavily partnering through several ongoing research projects to establish standards for VANETs. The typical set of VANET application areas, such as vehicle collision warning and traffic information dissemination have made VANET an interesting field of mobile wireless communication. This paper provides an overview on current research state, challenges, potentials of VANETs as well as the ways forward to achieving the long awaited ITS.

Journal ArticleDOI
TL;DR: This paper builds a link model with a Wiener process to predict the probability of link availability, which considers the stable and unstable vehicle states according to the behavior of vehicles, and introduces a novel concept called the link correlation which represents the influence of different link combinations in network topology to transmit a packet with less network resource consumption and higher goodput.
Abstract: In urban vehicular ad hoc networks (VANETs), due to the high mobility and uneven distribution of vehicles, how to select an optimal relaying node in an intra-street and how to determine a street selection at the intersection are two challenging issues in designing an efficient routing protocol in complex urban environments. In this paper, we build a link model with a Wiener process to predict the probability of link availability, which considers the stable and unstable vehicle states according to the behavior of vehicles. We introduce a novel concept called the link correlation which represents the influence of different link combinations in network topology to transmit a packet with less network resource consumption and higher goodput. Based on this concept, we design an opportunistic routing metric called the expected transmission cost over a multi-hop path (ETCoP) implemented with our link model as the selection guidance of a relaying node in intra-streets. This metric can also provide assistance for the next street selection at an intersection. Finally, we propose a street-centric opportunistic routing protocol based on ETCoP for VANETs (SRPE). Simulation results show that our proposed SRPE outperforms the conventional protocols in terms of packet delivery ratio, average end-to-end delay, and network yield.

Journal ArticleDOI
TL;DR: FANETs eliminates the need for deployment of complex hardware in each UAV, and even if one of the UAV communication links breaks down; there is no link breakage with the base station due to the ad-hoc network between UAVs.
Abstract: With the world turning into a global village due to technological advancements, automation in all aspects of life is gaining momentum. Wireless technologies address the everincreasing demands of portable and flexible communications. Wireless ad-hoc networks, which allow communication between devices without the need for any central infrastructure, are gaining significance, particularly for monitoring and surveillance applications. A relatively new research area of ad-hoc networks is flying ad-hoc networks (FANETs), governing the autonomous movement of unmanned aerial vehicles (UAVs) [1]. In such networks multiple UAVs are allowed to communicate so that an ad-hoc network is established between them. All UAVs in the network carry UAV-to-UAV communication and only groups of UAVs interact with the ground station. This feature eliminates the need for deployment of complex hardware in each UAV. Moreover, even if one of the UAV communication links breaks down; there is no link breakage with the base station due to the ad-hoc network between UAVs.

Journal ArticleDOI
TL;DR: Simulation results show that the proposed methods can effectively reduce the network deployment cost and yet guarantee the given performance requirements, which is a key consideration in future applications of WPCNs.
Abstract: The applications of wireless power transfer technology to wireless communications can help build a wireless powered communication network (WPCN) with more reliable and sustainable power supply compared to the conventional battery-powered network. However, due to the fundamental differences in wireless information and power transmissions, many important aspects of conventional battery-powered wireless communication networks need to be redesigned for efficient operations of WPCNs. In this paper, we study the placement optimization of energy and information access points in WPCNs, where the wireless devices (WDs) harvest the radio frequency energy transferred by dedicated energy nodes (ENs) in the downlink, and use the harvested energy to transmit data to information access points (APs) in the uplink. In particular, we are interested in minimizing the network deployment cost with minimum number of ENs and APs by optimizing their locations, while satisfying the energy harvesting and communication performance requirements of the WDs. Specifically, we first study the minimum-cost placement problem when the ENs and APs are separately located, where an alternating optimization method is proposed to jointly optimize the locations of ENs and APs. Then, we study the placement optimization when each pair of EN and AP is colocated and integrated as a hybrid access point, and propose an efficient algorithm to solve this problem. Simulation results show that the proposed methods can effectively reduce the network deployment cost and yet guarantee the given performance requirements, which is a key consideration in future applications of WPCNs.

Journal ArticleDOI
TL;DR: A closed-form methodology for vehicular platoon control by introducing binary sequences as the basis of network access scheduling and modeling random packet dropouts as independent Bernoulli processes is derived.
Abstract: This paper is concerned with the problem of vehicular platoon control in vehicular ad hoc networks subject to capacity limitation and random packet dropouts. By introducing binary sequences as the basis of network access scheduling and modeling random packet dropouts as independent Bernoulli processes, we derive a closed-form methodology for vehicular platoon control. In particular, an interesting framework for network access scheduling and platoon control codesign is established based on a set of priority rules for network access control. The resulting platoon control and scheduling algorithm can resolve network access conflicts in vehicular ad hoc networks and guarantee string stability and zero steady-state spacing errors. The effectiveness of the method is demonstrated by numerical simulations and experiments with laboratory-scale Arduino cars.

Journal ArticleDOI
TL;DR: SCRP is a distributed routing protocol that computes E2ED for the entire routing path before sending data messages, and results show that SCRP outperforms some of the well-known protocols in literature.
Abstract: This paper addresses the issue of selecting routing paths with minimum end-to-end delay (E2ED) for nonsafety applications in urban vehicular ad hoc networks (VANETs). Most existing schemes aim at reducing E2ED via greedy-based techniques (i.e., shortest path, connectivity, or number of hops), which make them prone to the local maximum problem and to data congestion, leading to higher E2ED. As a solution, we propose SCRP, which is a distributed routing protocol that computes E2ED for the entire routing path before sending data messages. To do so, SCRP builds stable backbones on road segments and connects them at intersections via bridge nodes. These nodes assign weights to road segments based on the collected information of delay and connectivity. Routes with the lowest aggregated weights are selected to forward data packets. Simulation results show that SCRP outperforms some of the well-known protocols in literature.

Journal ArticleDOI
TL;DR: An optimizing strategy to balance the latency requirement and the cost on cellular networks is presented, in which vehicles are encouraged to send the SDN control requests through the cellular networks by rebating network bandwidth.
Abstract: The vehicle ad hoc network (VANET) is an emerging network technology that is expected to be cost-effective and adaptable, making it ideal to provide network connection service to drivers and passengers on today's roads. In the next generation of VANETs with fifth-generation (5G) networks, software-defined networking (SDN) technology will play a very important role in network management. However, for infotainment applications, high latency in VANET communication imposes a great challenge for network management, whereas direct communication through the cellular networks brings high cost. In this paper, we present an optimizing strategy to balance the latency requirement and the cost on cellular networks, in which we encourage vehicles to send the SDN control requests through the cellular networks by rebating network bandwidth. Furthermore, we model the interaction of the controller and vehicles as a two-stage Stackelberg game and analyze the game equilibrium. From the experimental results, the optimal rebating strategy provides smaller latency than other control plane structures.

Journal ArticleDOI
TL;DR: A multi-decision intelligent detection model called CEAP is proposed that complies with the highly mobile nature of VANET with increased detection rate and minimal overhead, and is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility.
Abstract: The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. Detecting such attacks has attracted several contributions in the past few years. Nonetheless, the applicability of the current detection mechanisms in the deployed vehicular networks is hindered by two main challenges imposed by the special characteristics of VANETs. The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. The second challenge is concerned with the limited resources of the vehicles especially in terms of storage space that restricts the vehicles’ capacity of storing a huge amount of observations and applying complex detection mechanisms. To tackle these challenges, we propose a multi-decision intelligent detection model called CEAP that complies with the highly mobile nature of VANET with increased detection rate and minimal overhead. The basic idea is to launch cooperative monitoring between vehicles to build a training dataset that is analyzed by the Support Vector Machine (SVM) learning technique in online and incremental fashions to classify the smart vehicles either cooperative or malicious. To adapt the proposed model to the high mobility, we design it on top of the VANET QoS-OLSR protocol, which is a clustering protocol that maintains the stability of the clusters and prolongs the network’s lifetime by considering the mobility metrics of vehicles during clusters formation. To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster–Shafer-based, and averaging-based detection techniques.

Journal ArticleDOI
TL;DR: This work proposes a highly efficient secure and privacy-preserving scheme based on identity-based aggregate signatures that enables hierarchical aggregation and batch verification, and significantly reduces the transmission/storage overhead of the vehicles and other parties.
Abstract: Existing secure and privacy-preserving schemes for vehicular communications in vehicular ad hoc networks face some challenges, e.g., reducing the dependence on ideal tamper-proof devices, building efficient member revocation mechanisms and avoiding computation and communication bottlenecks. To cope with those challenges, we propose a highly efficient secure and privacy-preserving scheme based on identity-based aggregate signatures. Our scheme enables hierarchical aggregation and batch verification. The individual identity-based signatures generated by different vehicles can be aggregated and verified in a batch. The aggregated signatures can be re-aggregated by a message collector (e.g., traffic management authority). With our hierarchical aggregation technique, we significantly reduce the transmission/storage overhead of the vehicles and other parties. Furthermore, existing batch verification based schemes in vehicular ad hoc networks require vehicles to wait for enough messages to perform a batch verification. In contrast, we assume that vehicles will generate messages (and the corresponding signatures) in certain time spans, so that vehicles only need to wait for a very short period before they can start the batch verification procedure. Simulation shows that a vehicle can verify the received messages with very low latency and fast response.

Journal ArticleDOI
TL;DR: A channel-aware reputation system with adaptive detection threshold (CRS-A) to detect selective forwarding attacks in WSNs and identify the compromised sensor nodes is proposed, while the attack-tolerant data forwarding scheme can significantly improve the data delivery ratio of the network.
Abstract: Wireless sensor networks (WSNs) are vulnerable to selective forwarding attacks that can maliciously drop a subset of forwarding packets to degrade network performance and jeopardize the information integrity. Meanwhile, due to the unstable wireless channel in WSNs, the packet loss rate during the communication of sensor nodes may be high and vary from time to time. It poses a great challenge to distinguish the malicious drop and normal packet loss. In this paper, we propose a channel-aware reputation system with adaptive detection threshold (CRS-A) to detect selective forwarding attacks in WSNs. The CRS-A evaluates the data forwarding behaviors of sensor nodes, according to the deviation of the monitored packet loss and the estimated normal loss. To optimize the detection accuracy of CRS-A, we theoretically derive the optimal threshold for forwarding evaluation, which is adaptive to the time-varied channel condition and the estimated attack probabilities of compromised nodes. Furthermore, an attack-tolerant data forwarding scheme is developed to collaborate with CRS-A for stimulating the forwarding cooperation of compromised nodes and improving the data delivery ratio of the network. Extensive simulation results demonstrate that CRS-A can accurately detect selective forwarding attacks and identify the compromised sensor nodes, while the attack-tolerant data forwarding scheme can significantly improve the data delivery ratio of the network.

Proceedings ArticleDOI
03 Mar 2016
TL;DR: This paper represents a literature survey on VANET with primary concern of the security issues and challenges with it.
Abstract: Vehicular Ad-hoc Network (VANET) is an infrastructure less network. It provides enhancement in safety related techniques and comfort while driving. It enables vehicles to share information regarding safety and traffic analysis. The scope of VANET application has increased with the recent advances in technology and development of smart cities across the world. VANET provide a self aware system that has major impact in enhancement of traffic services and in reducing road accidents. Information shared in this system is time sensitive and requires robust and quick forming network connections. VANET, being a wireless ad hoc network, serves this purpose completely but is prone to security attacks. Highly dynamic connections, sensitive information sharing and time sensitivity of this network, make it an eye-catching field for attackers. This paper represents a literature survey on VANET with primary concern of the security issues and challenges with it. Features of VANET, architecture, security requisites, attacker type and possible attacks in VANET are considered in this survey paper.