共查询到20条相似文献,搜索用时 17 毫秒
1.
车载自组网中的分布式TDMA方法没有利用节点的空闲TDMA时隙,未能充分利用无线信道资源,基于此,提出了一种利用空闲TDMA时隙的MAC层数据重发方法,当节点发送数据失败时,附近节点利用空闲的TDMA时隙重新发送传输失败的数据。理论分析和仿真结果表明,所提方法显著提高了分布式TDMA方法的数据发送成功概率和网络吞吐量。此外,通过仿真比较所提方法与IEEE802.11p的性能,结果表明,由于以确定的方式访问信道,所提方法能够及时稳定地传输车载自组网中的实时安全信息。 相似文献
2.
Syed Adeel Ali Shah Ejaz Ahmed Muhammad Ahsan Qureshi Sadeeq Jan Rafidah MD Noor 《International Journal of Communication Systems》2019,32(13)
In safety‐critical scenarios, reliable reception of beacons transmitted by a subject vehicle is critical to avoid vehicle collision. According to the employed contention window sizes in IEEE 802.11p, beacons are transmitted with a small contention window size. As a result, multiple vehicles contend for the shared channel access by selecting the same back‐off slot. This is a perfect recipe for synchronous collisions wherein reliable beacon delivery cannot be guaranteed for any vehicle. We consider the problem of selecting the back‐off slots from the current contention window to provide reliable delivery of beacons transmitted by a subject vehicle to its neighbors. Given a safety scenario, we propose a Pseudo‐Random Number Generator (PRNG)‐inspired back‐off selection (PBS) technique. The proposed technique works on the hypothesis that synchronous collisions of beacons transmitted by a subject vehicle can be reduced if all its neighbors select different back‐off slots (ie, not the back‐off slot selected by the subject vehicle). The discrete‐event simulations demonstrate that PBS can increase the overall message reception from a subject vehicle, in comparison with the uniform random probability back‐off selection in IEEE 802.11p. 相似文献
3.
Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANETs are not only used to enhance the road safety and reduce the traffic accidents earlier but also conducted more researches in network value‐added service. As a result, the security requirements of vehicle communication are given more attention. In order to prevent the security threat of VANETs, the security requirements, such as the message integrity, availability, and confidentiality are needed to be guaranteed further. Therefore, a secured and efficient verification scheme for VANETs is proposed to satisfy these requirements and reduce the computational cost by combining the asymmetric and symmetric cryptology, certificate, digital signature, and session key update mechanism. In addition, our proposed scheme can resist malicious attacks or prevent illegal users' access via security and performance analysis. In summary, the proposed scheme is proved to achieve the requirements of resist known attacks, non‐repudiation, authentication, availability, integrity, and confidentiality. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
4.
Reliability and timeliness are two critical requirements of vehicle safety‐related communication services in VANETs. In this paper, we develop an analytical model to analyze the packet reception rate and end‐to‐end delay of emergency message delivery operation in a VANET environment when multihop broadcast communications are used. The model is applied to derive closed‐form expressions of the end‐to‐end delay of two popular multihop message propagation methods, that is, the farthest‐distance method and the counter‐based method. Extensive simulations are conducted to validate the correctness of the theoretic results and compare the performance of the two message propagation methods. Observations are provided for the design of efficient and robust emergency message propagation methods for vehicular wireless communication networks. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
5.
Chien‐Min Wu Ting‐Chao Hou Maw‐Lin Leou Yi‐Ching Liaw Ming‐Chieh Chan 《International Journal of Communication Systems》2010,23(12):1632-1650
The performance of backoff scheme plays an important role in designing efficient Medium Access Protocols for ad hoc networks. In this paper, we propose an adaptive backoff scheme and evaluate the performance of the proposed scheme for ad hoc networks. The backoff mechanism devised by us grants a node access to the channel based on its probability of collision for a transmitted frame in comparison to the nodes in the two‐hop contention area. We use both an analytical model and simulation experiments to evaluate the performance of our adaptive backoff mechanism in an ad hoc network. The results show that our protocol exhibits a significant improvement in power saving, end‐to‐end goodput, packet delivery ratio, and hop‐put, compared with the existing IEEE 802.11 DCF. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
6.
Chia‐Ho Ou 《International Journal of Communication Systems》2014,27(1):135-150
Vehicular Ad Hoc Networks (VANETs), designed to ensure the safety and comfort of passengers via the exchange of information amongst nearby vehicles or between the vehicles and Roadside Units (RSUs), have attracted particular attention. However, the success of many VANET applications depends on their ability to estimate the vehicle position with a high degree of precision, and thus, many vehicle localization schemes have been proposed. Many of these schemes are based on vehicle‐mounted Global Positioning System (GPS) receivers. However, the GPS signals are easily disturbed or obstructed. Although this problem can be resolved by vehicle‐to‐vehicle communication schemes, such schemes are effective only in VANETs with a high traffic density. Accordingly, this paper presents a VANET localization scheme in which each vehicle estimates its location on the basis of beacon messages broadcast periodically by pairs of RSUs deployed on either side of the road. In addition, three enhancements to the proposed scheme are presented for the RSU deployment, RSU beacon collisions, and RSU failures. Overall, the ns‐2 simulation results show that the localization scheme achieves a lower localization error than existing solutions on the basis of vehicle‐to‐vehicle communications and is robust toward changes in the traffic density and the vehicle speed. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
7.
8.
Konstantinos Katsaros Mehrdad Dianati Zhili Sun Rahim Tafazolli 《Wireless Communications and Mobile Computing》2016,16(8):895-911
This paper presents a comprehensive study of the performance of routing protocols in distributed vehicular networks. We propose a novel and efficient routing protocol, namely cross‐layer, weighted, position‐based routing, which considers link quality, mobility and utilisation of nodes in a cross layer manner to make effective position‐based forwarding decisions. An analytic hierarchy process approach is utilised to combine multiple decision criteria into a single weighting function and to perform a comparative evaluation of the effects of aforementioned criteria on forwarding decisions. Comprehensive simulations are performed in realistic representative urban scenarios with synthetic and real traffic. Insights on the effect of different communication and mobility parameters are obtained. The results demonstrate that the proposed protocol outperforms existing routing protocols for vehicular ad hoc networks, including European Telecommunications Standards Institute (ETSI's) proposed greedy routing protocol, greedy traffic aware routing protocol and advanced greedy forwarding in terms of combined packet delivery ratio, end‐to‐end delay and overhead. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
9.
文章提出一种基于AODV HELLO机制的移动自组网与Internet互联方案。该方案直接在AODV HELLO分组中包含网关信息以及相邻节点列表.从而在无需引入额外控制分组的前提下进行网关发现并同时避免了在路由计算中引入单向链路。结合使用高效的半隧道转发机制,使得互联性能得到显著提升而开销合理,基于NS2的仿真结果显示了其有效性。 相似文献
10.
Yuh‐Shyan Chen Chih‐Shun Hsu Yi‐Ting Jiang 《Wireless Communications and Mobile Computing》2015,15(11):1577-1588
In vehicular ad hoc networks, vehicles may use a routing protocol to inform emergent events, for example, car accidents or traffic jams. Hence, many of the researchers are focused on minimizing the end‐to‐end delay of the routing protocol. However, some applications, for example, email or ftp, are not time critical, and radio spectrum is a limited resource. Hence, delay‐bounded routing protocol, whose goal is to deliver messages to the destination within user‐defined delay and minimize the usage of radio, has become an important issue. The delay‐bounded routing protocols deliver message to the destination by the hybrid of data muling (carried by the vehicle) and forwarding (transmitted through radio). When the available time is enough, the message will be delivered by muling; otherwise, it will be delivered by forwarding. However, in an urban area, there are many traffic lights, which may greatly affect the performance of the delay‐bounded routing protocols. Existing works do not consider the effect of traffic lights, and hence, it may adopt an improper delivery strategy and thus wastes much available time. To improve previous works, we propose a novel delay‐bounded routing protocol, which has considered the effect of traffic lights. Whenever a vehicle passes an intersection, it will gather the information of the traffic light and traffic load of the next road section, and thus, it can make a more accurate prediction and adopt a more proper strategy to deliver message. Simulation results show that the proposed protocol can make a better usage of the available time and uses less radio resource to deliver the message in time. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
11.
一种提高802.11无线Ad Hoc网络公平性的新机制-FFMA 总被引:1,自引:0,他引:1
实现多个数据流对无线信道的公平共享是802.11无线Ad Hoc网络中的一个重要议题,但802.11DCF机制在无线Ad Hoc网络中存在严重的公平性问题,甚至有可能出现单个节点或数据流独占信道而其他节点和数据流处于\"饥饿\"状态的情况.论文提出了一种新颖的保证数据流间公平性的MAC层接入机制FFMA(Flow rate-based Fair Medium Access),通过公平调度和公平竞争的方式,FFMA能够在数据流间公平地分配信道带宽资源.仿真结果表明,在无线Ad Hoc网络中,FFMA可以在保证信道吞吐量的前提下取得远优于802.11 DCF的数据流间的公平性. 相似文献
12.
IEEE802.11移动自组织网络节点竞争窗口长度的概率分布 总被引:2,自引:1,他引:1
在基于IEEE 802.11的移动自组织网络中,MAC(Medium Access Control)层提供了DCF(Distributed Coordinate Function)以控制节点对无线信道的争用.DCF包括了BEB (Binary Exponential Backoff)算法.该文对BEB的重要参数——竞争窗口CW(Contention Window)进行研究,通过随机建模,导出了竞争窗口长度的概率分布,并进行数值分析.研究结果可应用于IEEE 802.11移动自组织网络. 相似文献
13.
While authentication is a necessary requirement to provide security in vehicular ad hoc networks, user's personal information such as identity and location must be kept private. The reliance on road side units or centralized trusted authority nodes to provide security services is critical because both are vulnerable, thus cannot be accessed by all users, which mean security absence. In this paper, we introduce a self‐organized secure framework, deployed in vehicular ad hoc networks. The proposed framework solution is designed not only to provide an effective, integrated security and privacy‐preserving mechanism but also to retain the availability of all security services even if there are no road side units at all and/or the trusted authority node is compromised. A decentralized tier‐based security framework that depends on both trusted authority and some fully trusted nodes cooperated to distribute security services is presented. Our approach combines the useful features of both Shamir secret sharing with a trust‐based technique to ensure continuity of achieving all security services. Mathematical analysis of security issues that the proposed framework achieves as well as the availability of offering security services is provided. Proposed framework examination was done to show the performance in terms of storage, computation complexity, and communication overhead as well as its resilience against various types of attacks. Comparisons with different types of security schemes showed that the protocol developed gave better results in most comparison parameters while being unique ensuring continuity of security services delivery. 相似文献
14.
15.
16.
Cooperative diversity is proposed to combat the detrimental effects of channel fading. In this paper, we investigate the effectiveness of cooperative diversity in interference limited ad hoc networks. The negative effects due to relay blocking on the network throughput are investigated. We show that the relay blocking problem is mainly dependent on the relay selection criterion. To overcome this problem, we propose a new cooperative diversity technique based on a modified IEEE 802.11 Medium Access Control (MAC) protocol. The throughput performance of the proposed MAC protocol is analyzed using a random structured network where nodes are assumed to be equipped with multiple antennas. In our simulations, we consider both single‐ and multiple‐relay scenarios over fading channels. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
17.
Lin Li Yanheng Liu Jian Wang Tao Wu Peng Zhou 《International Journal of Communication Systems》2018,31(1)
Vehicular Ad‐hoc Networks (VANETs) that are characterized by frequently changed topology, worse signal noise ratio, and non‐negligible Doppler effect introduce new non‐trivial challenges to Quality‐of‐Service (QoS) provisioning. The methodology of cross‐layer optimization aims to jointly optimize the working behaviors over different layers to achieve a better network performance, eg, throughput and transmission latency. This paper presents a novel cross‐layer optimization method based on Partially Observed Markov Games (POMG) to improve optimization decision against the inaccurate observed context caused by high‐speed movement, sensor errors, and other unavoidable reasons. POMG extends Markov Decision Process (MDP) and Partially Observed Markov Decision Process (POMDP) to dynamically adjust the concerned actions (eg, transmission range, contention window, and bit rate) according to the observed traffic density and thus can improve optimization performance at several aspects, eg,, throughput, channel utilization, delay, and total number of neighbor nodes. The extensive simulations show that POMG could harvest a high entire gain compared with the traditional fixed policy and the other cross‐layer optimization schemes. 相似文献
18.
Behrouz Pourghebleh Nima Jafari Navimipour 《International Journal of Communication Systems》2019,32(5)
Recently, the fast growth of communication technology has led to the design and implementation of different types of networks in different environments. One of these remarkable networks is vehicular ad hoc network (VANET). The ubiquitous connectivity among vehicles is possible through VANET in the absence of fixed infrastructure. Moreover, it provides safety and comfort to people sitting in the vehicles. In this regard, collecting information from vehicles that are moved constantly is an essential challenge. To develop an efficient method for data collection in the VANET, some parameters must be considered such as data aggregation, latency, packet delivery ratio, packet loss, scalability, security, transmission overhead, and vehicle density. Since data collection has a significant importance in the VANET, the aim of this study is to investigate the existing methods and describe the types of important issues and challenging problems that can be addressed in data collection in the VANET. The data collection techniques are investigated in four primary groups, namely, topology‐based, cluster‐based, geocast‐based, and fog‐based. Also, the mentioned parameters are important to compare all of the presented techniques. 相似文献
19.
Hai Jiang Ping Wang H. Vincent Poor Weihua Zhuang 《Wireless Communications and Mobile Computing》2010,10(4):547-558
Future mobile ad hoc networks are expected to support voice traffic. The requirement for small delay and jitter of voice traffic poses a significant challenge for medium access control (MAC) in such networks. User mobility presents unique difficulties in this context due to the associated dynamic path attenuation. In this paper, a MAC scheme for mobile ad hoc networks supporting voice traffic is proposed. With the aid of a low‐power probe prior to DATA transmissions, resource reservation is achieved in a distributed manner, thus leading to small packet transmission delay and jitter. The proposed scheme can automatically adapt to dynamic path attenuation in a mobile environment. Statistical multiplexing of on/off voice traffic can also be achieved by partial resource reservation for off voice flows. Simulation results demonstrate the effectiveness of the proposed scheme. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
20.
针对DSR路由协议因节点频繁移动,路由发现和路由维护过程频繁发生,导致数据传输的时延增加和丢包率增加的问题.在DSR路由协议基础上,提出一种带有分组的DSR路由协议(GDSR).该协议通过K-medoids聚类算法合理地选择组头,使得分组路由协议更加适合车载自组网的多变的拓扑结构.仿真结果表明,带有分组的GDSR路由协议能够降低数据传输的端到端的时延和丢包率. 相似文献