Current Issue : July - September Volume : 2017 Issue Number : 3 Articles : 6 Articles
Analysing shortest path for real time traffic environment is crucial with dynamic updating. VANET technology can be used for\nanalysing traffic but generates a huge amount of data to be exchanged, which demands more processing power and resources.\nIn this paper, a new histogram-based route guidance algorithm (HBA) has been proposed based on light weight processing. The\nproposed algorithm enables selecting the shortest path between any source and destination using the histogram models, which\ncapture the higher order distribution function of the number vehicles in every lane. Furthermore, the histogram model is used to\nestimate the traffic delays at intersections and roundabouts.Thedata entity collection through sensors used for histogrammodelling\nis presented in detail.The experimental results show that the proposed algorithm provides a good prediction of road traffic status\nand a better solution for the congestion problem in the urban areas....
In Vehicular Ad Hoc Networks (VANETs) used in the road transportation sector, privacy risks may arise because vehicles could\nbe tracked on the basis of the information transmitted by the Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I)\ncommunications implemented with the Dedicated Short Range Communications (DSRC) standards operating at 5.9GHz. Various\ntechniques have been proposed in the literature to mitigate these privacy risks including the use of pseudonym schemes, but they\nare mostly focused on data anonymization at the network and application layer. At the physical layer, the capability to accurately\nidentify and fingerprint wireless devices through their radio frequency (RF) emissions has been demonstrated in the literature. This\ncapability may generate a privacy threat because vehicles can be tracked using the RF emissions of their DSRC devices. This paper\ninvestigates the privacy risks related to RF fingerprinting to determine if privacy breaches are feasible in practice. In particular, this\npaper analyzes the tracking accuracy in challenging RF environments with high attenuation and fading....
Weather is a state of atmosphere which tells about degree which is not same everywhere it may be hot or cold, clear or cloudy, wet or dry, calm or stormy. Extreme weather such as deadly heat waves, devastating flood, intense precipitation, drought, heavy rains and flooding are more frequent likewise climate has warmed and changed so certain types of natural limits are more frequent and more intense. VANET is emerging and advance technology for wireless communication which include security, privacy, routing, connectivity and quality of services. During flood people suffer with no transportation, improper drinking water, roads were flooded, ATM’s were down in city, flights were cancelled which brings massive problem to people both as economically and environmentally. By combing weather report and VANET technology, broadcasting historical emergency weather situation message to vehicle by detecting, modeling, predicting dangerous situation on urban road....
Direct vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications have been popularly considered for safe\ndriving of manned or unmanned vehicles. The V2I communication is better than the V2V communication for propagating\nsafety messages at critical regions like intersections where the safety messages must be delivered to surround vehicles with low\nlatency and loss, since transmitters as infrastructure can have line of sight to the receiver vehicles and control wireless medium\naccess in a centralized manner unlike V2V. Long-Term Evolution (LTE) cellular networks are rapidly deployed in the world with\nexplosively increasing mobile traffic. As many automobile manufacturers choose LTE on-board devices for telematics, the LTE\nsystem can be utilized also for safety purposes instead of 802.11p/WAVE based roadside units (RSUs). Previous literatures have\nstudied mostly current LTE systemanalysis in aspect of theoretical network capacity and end-to-end delay to investigate feasibility of\nV2I communication. In this paper, we propose new enhancement of a current LTE system specified by 3rd-Generation Partnership\nProject (3GPP) LTE standards while addressing major delay challenges. From simulation, we confirm that our three key solutions\ncan reduce end-to-end delay effectively in the LTE system to satisfy requirements of safety message delivery....
Given the popularity of vehicular Ad hoc networks (VANETs) in traffic management, a new challenging issue comes into traffic\nsafety, that is, security of the networks, especially when the adversary breaks defence. Sybil attack, for example, is a potential security\nthreat through forging several identities to carry out attacks in VANETs. At this point, the paper proposed a solution named\nDMON that is a Sybil attack detection method with obfuscated neighbor relationship of Road Side Units (RSUs). DMON presents\na ring signature based identification scheme and replaces vehicles� identities with their trajectory for the purpose of anonymity.\nFurthermore, the neighbor relationship of RSUs is obfuscated to achieve privacy preserving of locations.The proposed scheme has\nbeen formally proved in the views of security and performance. Simulation has also been implemented to validate the scheme, in\nwhich the findings reveal the lower computational overhead and higher detection rate comparing with other related solutions....
We present a small-scale fading analysis of the vehicular-to-vehicular (V2V) propagation channel at 5.9GHz when both the\ntransmitter (Tx) and the receiver (Rx) vehicles are inside a tunnel and are driving in the same direction.This analysis is based on\nchannel measurements carried out at different tunnels under real road traffic conditions. The Rice distribution has been adopted to\nfit the empirical cumulative distribution function (CDF). A comparison of the ...
Loading....