首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANETs are not only used to enhance the road safety and reduce the traffic accidents earlier but also conducted more researches in network value‐added service. As a result, the security requirements of vehicle communication are given more attention. In order to prevent the security threat of VANETs, the security requirements, such as the message integrity, availability, and confidentiality are needed to be guaranteed further. Therefore, a secured and efficient verification scheme for VANETs is proposed to satisfy these requirements and reduce the computational cost by combining the asymmetric and symmetric cryptology, certificate, digital signature, and session key update mechanism. In addition, our proposed scheme can resist malicious attacks or prevent illegal users' access via security and performance analysis. In summary, the proposed scheme is proved to achieve the requirements of resist known attacks, non‐repudiation, authentication, availability, integrity, and confidentiality. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

2.
In safety‐critical scenarios, reliable reception of beacons transmitted by a subject vehicle is critical to avoid vehicle collision. According to the employed contention window sizes in IEEE 802.11p, beacons are transmitted with a small contention window size. As a result, multiple vehicles contend for the shared channel access by selecting the same back‐off slot. This is a perfect recipe for synchronous collisions wherein reliable beacon delivery cannot be guaranteed for any vehicle. We consider the problem of selecting the back‐off slots from the current contention window to provide reliable delivery of beacons transmitted by a subject vehicle to its neighbors. Given a safety scenario, we propose a Pseudo‐Random Number Generator (PRNG)‐inspired back‐off selection (PBS) technique. The proposed technique works on the hypothesis that synchronous collisions of beacons transmitted by a subject vehicle can be reduced if all its neighbors select different back‐off slots (ie, not the back‐off slot selected by the subject vehicle). The discrete‐event simulations demonstrate that PBS can increase the overall message reception from a subject vehicle, in comparison with the uniform random probability back‐off selection in IEEE 802.11p.  相似文献   

3.
Reliability and timeliness are two critical requirements of vehicle safety‐related communication services in VANETs. In this paper, we develop an analytical model to analyze the packet reception rate and end‐to‐end delay of emergency message delivery operation in a VANET environment when multihop broadcast communications are used. The model is applied to derive closed‐form expressions of the end‐to‐end delay of two popular multihop message propagation methods, that is, the farthest‐distance method and the counter‐based method. Extensive simulations are conducted to validate the correctness of the theoretic results and compare the performance of the two message propagation methods. Observations are provided for the design of efficient and robust emergency message propagation methods for vehicular wireless communication networks. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

4.
Vehicular Ad‐hoc Networks (VANETs) that are characterized by frequently changed topology, worse signal noise ratio, and non‐negligible Doppler effect introduce new non‐trivial challenges to Quality‐of‐Service (QoS) provisioning. The methodology of cross‐layer optimization aims to jointly optimize the working behaviors over different layers to achieve a better network performance, eg, throughput and transmission latency. This paper presents a novel cross‐layer optimization method based on Partially Observed Markov Games (POMG) to improve optimization decision against the inaccurate observed context caused by high‐speed movement, sensor errors, and other unavoidable reasons. POMG extends Markov Decision Process (MDP) and Partially Observed Markov Decision Process (POMDP) to dynamically adjust the concerned actions (eg, transmission range, contention window, and bit rate) according to the observed traffic density and thus can improve optimization performance at several aspects, eg,, throughput, channel utilization, delay, and total number of neighbor nodes. The extensive simulations show that POMG could harvest a high entire gain compared with the traditional fixed policy and the other cross‐layer optimization schemes.  相似文献   

5.
Vehicular ad hoc networks (VANETs) are emergent concepts in terms of infrastructure‐less communication. The data dissemination is usually done using broadcast schemes. Data broadcast in VANETs is a challenging issue due to the high mobility vehicles and the varying density. On one hand, these vehicles have to share and disseminate the safety‐critical information, in real time, to other intended vehicles. On the other hand, the existing broadcast solutions do not succeed, till now, to fulfill VANETs requirements especially in terms of performance and QoS. In this paper, we propose a new QoS‐aware broadcast method in order to face VANETs communications challenges. We choose to adapt a concept originally devoted to mobile ad hoc networks (MANETs) and join it to other specific VANET techniques to introduce a new broadcasting protocol in the aim of optimizing QoS fulfilment. The proposed solution is fundamentally based on enhanced kinetic strategy assisted with fuzzy logic for QoS‐aware multipoint relay (MPR). The protocol efficiency is eventually tested through an experimental study and compared with existing methods. The results prove the over‐performance of the proposed solution.  相似文献   

6.
In IEEE 802.11ad millimeter wave wireless LANs, the directional multi‐giga bit stations (DMGSTAs) use contention‐based access periods (CBAPs) and scheduled service periods (SPs) for medium access. The STAs carrying non‐QoS traffic use CBAPs, while SPs are allocated for STAs carrying high QoS applications. During CBAP, the STAs use enhanced distributed channel access (EDCA) scheme. Further, 802.11ad advocates dynamic allocation of SP for guaranteed data transmission based on a centralized polling scheme. The standard advocates that the coverage area around the access point can be divided into several sectors, and the total CBAP shall be divided among the sectors on a time sharing basis. The STAs residing within a sector simultaneously contend during the CBAP fraction of that sector. However, such STAs have to defer their transmission attempts and wait for the designated CBAP fraction of the succeeding beacon interval (BI), if the residual time in the current CBAP fraction is not sufficient for a frame transmission. This leads to very high delay and reduced throughput. The objective of this paper is to propose an efficient hybrid medium access control scheme, where the deferred STAs during CBAP are scheduled again by utilizing the unallocated slots in the SP of the same BI. We describe an analytical model for the throughput and the average frame delay, under the proposed scheme, and compare the performance against the legacy scheme, where the STAs use CBAP alone for channel access. The analytical and simulation results establish that the proposed scheme significantly improves the throughput and reduces the average frame delay.  相似文献   

7.
The hidden‐terminal problem significantly degrades the performance of IEEE 802.11 DCF. Many previous works have investigated its influence on the throughput of CSMA‐based medium access control (MAC) protocols, especially IEEE 802.11 DCF. In this paper, we introduce a new Jamming problem for IEEE 802.11‐based mobile ad hoc networks, which is caused by hidden terminals. An analytical model is established for this problem. Based on this model, an adaptive DCF (ADCF), is designed to solve the jamming problem through adaptively adjusting the minimum contention window of hidden terminals. Simulation results effectively demonstrate that the proposed A‐DCF can avoid the jamming and in turn greatly improve channel utilization and throughput. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

8.
The basic philosophy of personal communication services is to provide user‐to‐user, location independent communication services. The emerging group communication wireless applications, such as multipoint data dissemination and multiparty conferencing tools have made the design and development of efficient multicast techniques in mobile ad‐hoc networking environments a necessity and not just a desire. Multicast protocols in mobile ad‐hoc networks have been an area of active research for the past couple of years. This paper summarizes the activities and recent advances in this work‐in‐progress area by identifying the main issues and challenges that multicast protocols are facing in mobile ad‐hoc networking environments, and by surveying several existing multicasting protocols. This article presents a classification of the current multicast protocols, discusses the functionality of the individual existing protocols, and provides a qualitative comparison of their characteristics according to several distinct features and performance parameters. Furthermore, since many of the additional issues and constraints associated with the mobile ad‐hoc networks are due, to a large extent, to the attribute of user mobility, we also present an overview of research and development efforts in the area of group mobility modeling in mobile ad‐hoc networks. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   

9.
Recent advances in intelligent transportation systems enable a broad range of potential applications that significantly improve the vehicle and road safety and facilitate the efficient dissemination of information among the vehicles. To assist the vehicle traffic, message broadcasting is a widely adopted technique for road safety. But efficient message broadcasting is a significant issue, especially in a high network density due to the broadcast storm problem. To solve this issue, several methods are proposed to eliminate the redundant transmission of safety packets. However, they lack in restricting the broadcasting region of safety messages, and the transmissions of safety packets outside the dangerous region, and force the vehicles to unnecessary detours. This paper proposes an adaptive multimode routing protocol, network condition, and application‐based data adaptive intelligent message routing in vehicular network (NetCLEVER) that supports 2 modes of operation such as message broadcasting and intelligent routing. In message broadcasting mode, the NetCLEVER decides the dangerous region of the network by considering the changes of neighbor vehicles velocity, instead of current vehicle velocity, because a vehicle decision in velocity is interdependent with the preceding vehicles. In intelligent routing mode, the NetCLEVER exploits the cuckoo search optimization in routing by taking into account multiple routing factors such as the road topology of intersections and traffic signals and their impact on link stability, which improves the reliability of routing packets significantly. The performance evaluation illustrates that the proposed NetCLEVER improves reliable wireless communication as well as road safety in vehicular ad hoc networks.  相似文献   

10.
The use of directional antennas in mobile ad hoc networks (MANETs) has shown to offer large throughput gains relative to omnidirectional antennas. When used in ad hoc networks, directional medium‐access‐control (DMAC) protocols usually require all nodes, or part of nodes, to be aware of their exact locations. This location information is typically provided using a global positioning system (GPS). Although GPS systems are designed to be as nearly accurate as possible, there are still estimation errors that can cause a relatively large deviation from the actual GPS receiver position. In this paper, we investigate the effect of inaccurate node position estimation on the throughput of these protocols. Our results clearly indicate that the advantages of DMAC protocols diminish if the available position information is not accurate enough. As an alternative, we propose an efficient DMAC protocol that utilizes signal parameter estimation via the rotational invariance technique (ESPRIT) for direction‐of‐arrival (DOA) estimation; alleviating the need for GPS and, hence, avoiding the degrading associated with typical GPS position estimation errors. Moreover, unlike GPS‐based protocols, our protocol is suitable for both outdoor and indoor applications. Under different operating conditions and channel models, our simulation results show the throughput improvement achieved using the proposed protocol relative to the IEEE 802.11. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

11.
This paper presents an energy efficient medium access control (MAC) protocol for delay‐sensitive data transmission over wireless sensor network. In general, energy consumption and delay depend on channel monitoring interval (CMI) and data sensing period at each sensor node. Based on this fact, we propose a new preamble structure to effectively advertise CMI and avoid the overhearing problem. In order to pursue an effective tradeoff between energy consumption and delay, we also develop a CMI determining algorithm that searches for a sub‐optimal solution with a low computational complexity in a distributive way. Finally, experimental results are provided to compare the proposed MAC protocol with existing sensor MAC protocols. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

12.
This paper presents a QoS (quality of service) aware routing and power control algorithm consuming low transmission power for multimedia service over mobile ad hoc network. Generally, multimedia services need stringent QoS over the network. However, it is not easy to guarantee the QoS over mobile ad hoc network since its network resources are very limited and time‐varying. Furthermore, only a limited amount of power is available at mobile nodes, which makes the problem more challenging. We propose an effective routing and power control algorithm for multimedia services that satisfies end‐to‐end delay constraint with low transmission power consumption. The proposed algorithm supports the required bandwidth by controlling each link channel quality over route in a tolerable range. In addition, a simple but effective route maintenance mechanism is implemented to avoid link failures that may significantly degrade streaming video quality. Finally, performance comparison with existing algorithms is presented in respect to traditional routing performance metrics, and an achievable video quality comparison is provided to demonstrate the superiority of the proposed algorithm for multimedia services over mobile ad hoc network. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

13.
In this paper, an analytical model is proposed to calculate the network throughput of dedicated control channel protocols that are designed to schedule multiple packets to be transmitted on different data channels simultaneously. Based on the analytical model, a scheme by tuning the initial contention window size is proposed to maximize the network throughput. We also present a novel multi‐channel MAC protocol for single‐hop scenario. Simulation results show that the proposed model is capable of modeling the behaviors of dedicated control channel protocols accurately. Furthermore, the proposed scheme can reduce the cost of collisions and enhance the network throughput up to 22% for 1 kB packet size and 80 nodes. Compared with other dedicated control channel protocols, the proposed protocol can schedule more control packets and use multiple channels more efficiently. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

14.
Capacity region and minimum energy function for a variety of delay‐tolerant mobile unicast ad hoc networks are studied by using a cell‐partitioned model. First, theorems about analytical expressions of network capacity and upper bound of minimum energy function are proposed and proved. Algorithm aiming at maximizing capacity and minimizing energy cost is presented and analyzed by Lyapunov drift method. Second, these two theorems are applied to several types of ad hoc networks. Expressions of network capacity and minimum energy function are obtained. Third, capacity property of a type of hybrid ad hoc networks is analyzed in detail. Relationship among limitation of capacity, node density, and coverage of base stations are investigated. Numerical analysis and simulation are carried out. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

15.
Recently, intelligent transportation systems (ITS) is becoming an important research topic. One goal of ITS is to exchange information among vehicles in a timely and efficient manner. In the ITS research community, inter‐vehicle communications (IVC) is considered a way that may be able to achieve this goal. An information network built on the top of vehicles using IVC can be viewed as a type of mobile ad hoc networks (MANETs). In the past, several unicast routing protocols for MANET have been proposed. However, most of them are designed for general MANETs rather than for IVC networks. In this paper, we first used more realistic vehicle mobility traces generated by a microscopic traffic simulator (VISSIM) to understand the characteristics of routing paths in an IVC network. Based on the insights gained from the derived path characteristics, we designed and implemented an intelligent flooding‐based routing protocol for small‐scale IVC networks. Via several field trials conducted on highways, we compared the performance of ad hoc on‐demand distance vector (AODV) and our protocol. Our experimental results show that (1) our protocol outperforms AODV greatly in IVC networks and (2) our protocol can provide text, image, audio, and video services for small‐scale IVC networks (e.g., a platoon) quite well. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

16.
This paper investigates the performances of various adaptive algorithms for space diversity combining in time division multiple access (TDMA) digital cellular mobile radio systems. Two linear adaptive algorithms are investigated, the least mean square (LMS) and the square root Kalman (SRK) algorithm. These algorithms are based on the minimization of the mean‐square error. However, the optimal performance can only be obtained using algorithms satisfying the minimum bit error rate (BER) criterion. This criterion can be satisfied using non‐linear signal processing techniques such as artificial neural networks. An artificial neural network combiner model is developed, based on the recurrent neural network (RNN) structure, trained using the real‐time recurrent learning (RTRL) algorithm. It is shown that, for channels characterized by Rician fading, the artificial neural network combiners based on the RNN structure are able to provide significant improvements in the BER performance in comparison with the linear techniques. In particular, improvements are evident in time‐varying channels dominated by inter‐symbol interference. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   

17.
In ad hoc wireless networks, most data are delivered by multi‐hop routing (hop by hop). This approach may cause long delay and a high routing overhead regardless of which routing protocol is used. To mitigate this inherent characteristic, this work presents a novel ad hoc network structure that adopts dual‐card‐mode, self‐organization with specific IP naming and channel assignment to form a hierarchical star graph ad hoc network (HSG‐ad hoc). This network not only expedites data transmission but also eliminates the route discovery procedure during data transmission. Therefore, the overall network reliability and stability are significantly improved. Simulation results show that the proposed approach achieves substantial improvements over DSDV, AODV, and DSR in terms of average end‐to‐end delay, throughput, and packet delivery ratio. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

18.
Topology control plays an important role in the design of wireless ad hoc and sensor networks and has demonstrated its high capability in constructing networks with desirable characteristics such as sparser connectivity, lower transmission power, and smaller node degree. However, the enforcement of a topology control algorithm in a network may degrade the energy‐draining balancing capability of the network and thus reduce the network operational lifetime. For this reason, it is important to take into account energy efficiency in the design of a topology control algorithm in order to achieve prolonged network lifetime. In this paper, we propose a localized energy‐efficient topology control algorithm for wireless ad hoc and sensor networks with power control capability in network nodes. To achieve prolonged network lifetime, we introduce a concept called energy criticality avoidance and propose an energy criticality avoidance strategy in topology control and energy‐efficient routing. Through theoretical analysis and simulation results, we prove that the proposed topology control algorithm can maintain the global network connectivity with low complexity and can significantly prolong the lifetime of a multi‐hop wireless network as compared with existing topology control algorithms with little additional protocol overhead. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

19.
Topology control is an efficient strategy for improving the performance of wireless ad hoc and sensor networks by building network topologies with desirable features. In this process, location information of nodes can be used to improve the performance of a topology control algorithm and also ease its operations. Many location‐based topology control algorithms have been proposed. In this paper, we propose two location‐assisted grid‐based topology control (GBP) algorithms. The design objective of our algorithm is to effectively reduce the number of active nodes required to keep global network connectivity. In grid‐based topology control, a network is divided into equally spaced squares (called grids). We accordingly design cross‐sectional topology control algorithm and diagonal topology control algorithm based on different network parameter settings. The key idea is to build near‐minimal connected dominating set for the network at the grid level. Analytical and simulation results demonstrate that our designed algorithms outperform existing work. Furthermore, the diagonal algorithm outperforms the cross‐sectional algorithm. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

20.
Providing quality‐of‐service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralised coordination, and the unreliable nature of the wireless channel. QoS‐aware routing (QAR) and admission control (AC) protocols comprise two of the most important components of a system attempting to provide QoS guarantees in the face of the above‐mentioned difficulties. This paper presents a comparative study, utilising a realistic shadow fading channel, of the performance of several state‐of‐the‐art amalgamated QAR‐AC protocols, which are designed for providing throughput guarantees to applications. The advantages and drawbacks of their particular features are highlighted. For an environment where link quality varies rapidly, the results of the study highlight the ineffectiveness of previously‐proposed methods of relying merely on the success of route discovery to perform AC, of relying on the exceeding of the MAC layer retransmission count for link failure detection, of existing congestion detection schemes and of careful re‐admission of data sessions rather than fast re‐routing after shadowing‐induced link failures. Based on the lessons learnt, design guidelines for future QAR and AC protocols operating in a mobile shadow‐fading‐afflicted environment are presented. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号