Search results

1 – 10 of 205
Article
Publication date: 17 May 2023

Ishita Seth, Kalpna Guleria and Surya Narayan Panda

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…

25

Abstract

Purpose

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.

Design/methodology/approach

The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.

Findings

The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.

Originality/value

The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.

Article
Publication date: 3 January 2024

Miao Ye, Lin Qiang Huang, Xiao Li Wang, Yong Wang, Qiu Xiang Jiang and Hong Bing Qiu

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Abstract

Purpose

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Design/methodology/approach

First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between the root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to acquire global network state information in real time. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a network traffic state prediction mechanism is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time.

Findings

Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and open shortest path first (OSPF) routing methods.

Originality/value

Message transmission and message synchronization for multicontroller interdomain routing in SDN have long adaptation times and slow convergence speeds, coupled with the shortcomings of traditional interdomain routing methods, such as cumbersome configuration and inflexible acquisition of network state information. These drawbacks make it difficult to obtain global state information about the network, and the optimal routing decision cannot be made in real time, affecting network performance. This paper proposes a cross-domain intelligent SDN routing method based on a proposed MDRL method. First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to realize the real-time acquisition of global network state information. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a prediction mechanism for the network traffic state is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time. Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and OSPF routing methods.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 26 April 2022

Elham Kariri and Kusum Yadav

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing…

Abstract

Purpose

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.

Design/methodology/approach

A trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.

Findings

When compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.

Originality/value

Additionally, it reduces the amount of routing overhead and the average end-to-end delay.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 13 February 2024

Amer Jazairy, Emil Persson, Mazen Brho, Robin von Haartman and Per Hilletofth

This study presents a systematic literature review (SLR) of the interdisciplinary literature on drones in last-mile delivery (LMD) to extrapolate pertinent insights from and into…

Abstract

Purpose

This study presents a systematic literature review (SLR) of the interdisciplinary literature on drones in last-mile delivery (LMD) to extrapolate pertinent insights from and into the logistics management field.

Design/methodology/approach

Rooting their analytical categories in the LMD literature, the authors performed a deductive, theory refinement SLR on 307 interdisciplinary journal articles published during 2015–2022 to integrate this emergent phenomenon into the field.

Findings

The authors derived the potentials, challenges and solutions of drone deliveries in relation to 12 LMD criteria dispersed across four stakeholder groups: senders, receivers, regulators and societies. Relationships between these criteria were also identified.

Research limitations/implications

This review contributes to logistics management by offering a current, nuanced and multifaceted discussion of drones' potential to improve the LMD process together with the challenges and solutions involved.

Practical implications

The authors provide logistics managers with a holistic roadmap to help them make informed decisions about adopting drones in their delivery systems. Regulators and society members also gain insights into the prospects, requirements and repercussions of drone deliveries.

Originality/value

This is one of the first SLRs on drone applications in LMD from a logistics management perspective.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 3 July 2023

Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…

Abstract

Purpose

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.

Design/methodology/approach

The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.

Findings

The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.

Originality/value

According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 13 February 2024

Anastasia Romanova

The paper aims to provide an overview of the state-of-the-art of the event industry in the context of digitalization to understand how digital technologies change the event…

Abstract

Purpose

The paper aims to provide an overview of the state-of-the-art of the event industry in the context of digitalization to understand how digital technologies change the event industry and what research topics are the most promising for further exploration.

Design/methodology/approach

A bibliometric analysis of the existing body of knowledge on the topic was conducted and the results were visualized using CiteSpace 5.8.R3. A total of 1999 articles and proceeding papers from the Web of Science Core Collection published between 2007 and 2022 were selected for our analysis. Based on the articles and proceeding papers in the Web of Science Core Collection database, we selected a set of publications for our analysis. The data were obtained through specific keywords related to our research topic. The method involves a process of three main stages: data collection, data processing and the bibliometric analysis.

Findings

Co-citation analysis indicated that issues of crowd management and tracking human mobility during mass events are important for the event industry and that technologies such as the Internet of Things, special-purpose mobile applications and systems make it easier for an event organizer to handle the issues. The findings demonstrated a weak scientific collaboration between countries in the topic studied and shift of research hotspots to study of satisfaction, motivation and behavioral patterns of events attendees. Based on this analysis, three directions for future research were revealed.

Research limitations/implications

The results should be interpreted in light of our sample, because the analysis was conducted within our sample which has boundaries. We collected data from all categories in the Web of Science Core Collection database, but we considered only articles and proceeding papers as opposed to all possible types of scientific publications and other databases. In the study, we focused on detecting the state-of-the-art of the event industry in the context of digitalization overall. More specific topics that could be analyzed remain, for example, the dependency of digital technologies from the event type, etc.

Practical implications

This study reflects the state-of-the-art of the event industry in the context of digitalization. It provides researchers with key developmental trends in the event industry, which assists them in more deeply understanding the evolution of research hotspots in the field during last 15 years and defining future research agenda. The paper presents an overview of digital technologies used in various types of events and describes the issues and results related to the implementing digital technologies. The results obtained were extremely important, as they can be used by event managers and organizers to enhance customers’ experience during the events.

Originality/value

This study reflects the state-of-the-art of the event industry in the context of digitalization. This is the first attempt to make an overall analysis of scientific papers published in the Web of Science Core Collection on the topic studied without excluding any categories. The search procedure is transparent, and the results can be reproduced in other search fields using the same approach. Based on this analysis, three directions for future research were revealed including technological aspects of online event-based social networks, issues of crowd management and security at mass events and issues of attendees’ acceptance of novel digital technologies.

Details

EuroMed Journal of Business, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1450-2194

Keywords

Article
Publication date: 31 January 2024

Shan Wang, Ji-Ye Mao and Fang Wang

Digital innovation requires organizations to reconfigure their information technology infrastructure (ITI) to cultivate creativity and implement fast experimentation. This…

Abstract

Purpose

Digital innovation requires organizations to reconfigure their information technology infrastructure (ITI) to cultivate creativity and implement fast experimentation. This research inquiries into ITI generativity, an emerging concept demoting a critical ITI capability for organizational digital innovation. More specifically, it conceptualizes ITI generativity across two dimensions—namely, systems and applications infrastructure (SAI) generativity and data analytics infrastructure (DAI) generativity—and examines their respective social and technical antecedents and their impact on digital innovation.

Design/methodology/approach

This research formulates a theoretical model to investigate the social and technical antecedents along with innovation outcomes of ITI generativity. To test this model and its associated hypotheses, a survey was administered to IT professionals possessing knowledge of their organization's IT architecture and digital innovation performance. The dataset, comprising responses from 140 organizations, was analyzed using the partial least squares technique.

Findings

Results reveal that both dimensions of ITI generativity contribute to digital innovation performance, with the effect of DAI generativity being more pronounced. In addition, SAI and DAI generativities are driven by social and technical factors within an organization. More specifically, SAI generativity is positively associated with the usage of a digital application services platform and IT human resources, whereas DAI generativity is positively linked to the usage of a data analytics services platform, data analytics services usability and data analytics human resources.

Originality/value

This research contributes to the literature on digital innovation by introducing ITI generativity as a crucial ITI capability and deciphering its role in digital innovation. It also offers useful insights and guidance for practitioners on how to build ITIs to achieve better digital innovation performance.

Article
Publication date: 11 December 2023

Mario Henrique Callefi, Gilberto Miller Devós Ganga, Moacir Godinho Filho, Elias Ribeiro da Silva, Lauro Osiro and Vasco Reis

Road freight transportation companies need to take advantage of information and communication technologies to develop capabilities. This study proposes a framework to guide road…

Abstract

Purpose

Road freight transportation companies need to take advantage of information and communication technologies to develop capabilities. This study proposes a framework to guide road freight transportation companies to achieve data visibility in their operations by developing such capabilities. By proposing this framework, this research contributes to literature and practice, highlighting the capabilities and the respective supporting technologies for improved data visibility in road freight transportation.

Design/methodology/approach

A mixed-method approach is used to develop the framework, considering three methodological steps. In phase 1, the capabilities are identified in the literature and validated by experts. In phase 2, an empirical assessment of cause–effect relationships between capabilities is performed using a multiple case study and DEMATEL. Lastly, in phase 3, an analysis of the cause model and significant associations is conducted to enable the development of the framework. In addition, the proposed framework was validated by the experts interviewed.

Findings

The results provide a framework that explains the link between the technology-enabled data visibility capabilities in road freight transportation operations. In addition, a pathway was established that road freight transportation companies could follow to achieve data visibility in their operations by developing such capabilities.

Originality/value

This work develops the first framework that provides a path for data visibility in road freight transportation operations from adopting certain technologies. The insights are compelling for researchers and practitioners to optimize the decision-making process for adopting technologies and developing capabilities related to data visibility.

Details

Industrial Management & Data Systems, vol. 124 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

1 – 10 of 205