Search results

1 – 10 of 247
Article
Publication date: 27 September 2022

Souad El Houssaini, Mohammed-Alamine El Houssaini and Jamal El Kafi

In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly…

Abstract

Purpose

In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network.

Design/methodology/approach

This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (Sr) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model.

Findings

The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is Sr, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack.

Originality/value

According to the best of the authors’ knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 July 2020

Sengathir Janakiraman

An Improved Rank Criterion-based NLOS node Detection Mechanism (IRC-NLOS-DM) is proposed based on the benefits of a reputation model for effective localization of NLOS nodes…

Abstract

Purpose

An Improved Rank Criterion-based NLOS node Detection Mechanism (IRC-NLOS-DM) is proposed based on the benefits of a reputation model for effective localization of NLOS nodes during the dynamic exchange of emergency messages in critical situations.

Design/methodology/approach

This proposed IRC-NLOS-DM scheme derives the benefits of a reputation model that influentially localizes the NLOS nodes under dynamic exchange of emergency messages. This proposed IRC-NLOS-DM scheme is an attempt to resolve the issues with the routing protocols that aids in warning message delivery of vehicles that are facing NLOS situations with the influence of channel contention and broadcast storm. It is developed for increasing the warning packet delivery rate with minimized overhead, delay and channel utilization.

Findings

The simulation results of the proposed IRC-NLOS-DM scheme confirmed the excellence of the proposed IRC-NLOS-DM over the existing works investigated based on the channel utilization rate, neighborhood prediction rate and emergency message forwarding rate.

Practical implications

It is proposed for reliable warning message delivery in Vehicular Ad hoc Networks (VANETs) which is referred as the specialized category of mobile ad hoc network application that influences Intelligent Transportation Systems (ITS) and wireless communications. It is proposed for implementing vehicle safety applications for constructing a least cluttered and a secure environment on the road.

Originality/value

It is contributed as a significant mechanism for facilitating reliable dissemination of emergency messages between the vehicular nodes, which is essential in the critical environment to facilitate a risk-free environment. It also aids in creating a reliable environment for accurate localization of Non-Line of Sight (NLOS) nodes that intentionally introduces the issues of broadcasting storm and channel congestion during the process of emergency message exchanges.

Details

International Journal of Intelligent Unmanned Systems, vol. 9 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Open Access
Article
Publication date: 4 December 2018

Daxin Tian, Weiqiang Gong, Wenhao Liu, Xuting Duan, Yukai Zhu, Chao Liu and Xin Li

This paper aims to introduce vehicular network platform, routing and broadcasting methods and vehicular positioning enhancement technology, which are three aspects of the…

1705

Abstract

Purpose

This paper aims to introduce vehicular network platform, routing and broadcasting methods and vehicular positioning enhancement technology, which are three aspects of the applications of intelligent computing in vehicular networks. From this paper, the role of intelligent algorithm in the field of transportation and the vehicular networks can be understood.

Design/methodology/approach

In this paper, the authors introduce three different methods in three layers of vehicle networking, which are data cleaning based on machine learning, routing algorithm based on epidemic model and cooperative localization algorithm based on the connect vehicles.

Findings

In Section 2, a novel classification-based framework is proposed to efficiently assess the data quality and screen out the abnormal vehicles in database. In Section 3, the authors can find when traffic conditions varied from free flow to congestion, the number of message copies increased dramatically and the reachability also improved. The error of vehicle positioning is reduced by 35.39% based on the CV-IMM-EKF in Section 4. Finally, it can be concluded that the intelligent computing in the vehicle network system is effective, and it will improve the development of the car networking system.

Originality/value

This paper reviews the research of intelligent algorithms in three related areas of vehicle networking. In the field of vehicle networking, these research results are conducive to promoting data processing and algorithm optimization, and it may lay the foundation for the new methods.

Details

Journal of Intelligent and Connected Vehicles, vol. 1 no. 2
Type: Research Article
ISSN: 2399-9802

Keywords

Open Access
Article
Publication date: 30 July 2019

Zhizhou Wu, Yiming Zhang, Guishan Tan and Jia Hu

Traffic density is one of the most important parameters to consider in the traffic operation field. Owing to limited data sources, traditional methods cannot extract traffic…

1407

Abstract

Purpose

Traffic density is one of the most important parameters to consider in the traffic operation field. Owing to limited data sources, traditional methods cannot extract traffic density directly. In the vehicular ad hoc network (VANET) environment, the vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) interaction technologies create better conditions for collecting the whole time-space and refined traffic data, which provides a new approach to solving this problem.

Design/methodology/approach

On that basis, a real-time traffic density extraction method has been proposed, including lane density, segment density and network density. Meanwhile, using SUMO and OMNet++ as traffic simulator and network simulator, respectively, the Veins framework as middleware and the two-way coupling VANET simulation platform was constructed.

Findings

Based on the simulation platform, a simulated intersection in Shanghai was developed to investigate the adaptability of the model.

Originality/value

Most research studies use separate simulation methods, importing trace data obtained by using from the simulation software to the communication simulation software. In this paper, the tight coupling simulation method is applied. Using real-time data and history data, the research focuses on the establishment and validation of the traffic density extraction model.

Details

Journal of Intelligent and Connected Vehicles, vol. 2 no. 1
Type: Research Article
ISSN: 2399-9802

Keywords

Article
Publication date: 4 April 2019

Serkan Ayvaz and Salih Cemil Cetin

The purpose of this paper is to develop a model for autonomous cars to establish trusted parties by combining distributed ledgers and self-driving cars in the traffic to provide…

Abstract

Purpose

The purpose of this paper is to develop a model for autonomous cars to establish trusted parties by combining distributed ledgers and self-driving cars in the traffic to provide single version of the truth and thus build public trust.

Design/methodology/approach

The model, which the authors call Witness of Things, is based on keeping decision logs of autonomous vehicles in distributed ledgers through the use of vehicular networks and vehicle-to-vehicle/vehicle-to-infrastructure (or vice versa) communications. The model provides a single version of the truth and thus helps enable the autonomous vehicle industry, related organizations and governmental institutions to discover the true causes of road accidents and their consequences in investigations.

Findings

In this paper, the authors explored one of the potential effects of blockchain protocol on autonomous vehicles. The framework provides a solution for operating autonomous cars in an untrusted environment without needing a central authority. The model can also be generalized and applied to other intelligent unmanned systems.

Originality/value

This study proposes a blockchain protocol-based record-keeping model for autonomous cars to establish trusted parties in the traffic and protect single version of the truth.

Details

International Journal of Intelligent Unmanned Systems, vol. 7 no. 2
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 28 March 2018

Oussama Senouci, Zibouda Aliouat and Saad Harous

This paper is a review of a number routing protocols in the internet of vehicles (IoV). IoV emphasizes information interaction among humans, vehicles and a roadside unit (RSU)…

Abstract

Purpose

This paper is a review of a number routing protocols in the internet of vehicles (IoV). IoV emphasizes information interaction among humans, vehicles and a roadside unit (RSU), within which routing is one of the most important steps in IoV network.

Design/methodology/approach

In this paper, the authors have summarized different research data on routing protocols in the IoV. Several routing protocols for IoV have been proposed in the literature. Their classification is made according to some criteria such as topology-based, position-based, transmission strategy and network structure. This paper focuses on the transmission strategy criteria. There exist three types of protocols that are based on this strategy: unicast protocol, broadcast protocols and multicast protocols. This later type is classified into two subclasses: geocast and cluster-based protocols. The taxonomy of the transmission strategy is presented in this study. We discuss the advantages and disadvantages of each type with a general comparison between the five types.

Findings

The authors can deduce that many challenges are encountered when designing routing protocols for IoV.

Originality/value

A simple and well-explained presentation of the functioning of the IoV is provided with a comparison among each categories of protocols is well presented along with the advantages and disadvantages of each type. The authors examined the main problems encountered during the design of IoV routing protocol, such as the quick change of topology, the frequent disconnection, the big volume of data to be processed and stored in the IoV, and the problem of network fragmentation. This work explores, compares existing routing protocols in IoV and provides a critical analysis. For that, the authors extract the challenges and propose future perspectives for each categories of protocols.

Details

Sensor Review, vol. 39 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 6 November 2017

Sushil Kumar and Anil Kumar Verma

The purpose of this paper is to give an insight in to the routing protocols in Vehicular ad hoc Network (VANET). In this direction, for the efficient data dissemination in VANETs…

Abstract

Purpose

The purpose of this paper is to give an insight in to the routing protocols in Vehicular ad hoc Network (VANET). In this direction, for the efficient data dissemination in VANETs, a street-based forwarding protocol (SBFP) has been proposed.

Design/methodology/approach

The interferences among different street segments are considered and a unique street-based forwarding concept is introduced to reduce the local maximum problem. In this protocol, the greedy forwarding concept along with the broadcasting mechanism and suppression technique is implemented to minimize the overhead created in the regular beacons forwarding processes. QualNet simulator is used to implement and simulate SBFP. SUMO and MOVE tools are used to create the vehicle’s movement pattern and network topology.

Findings

The simulated results demonstrated improved packet delivery ratio (PDR) with a minimum average number of broadcast by each individual vehicle in the proposed SBFP than in its peer protocols.

Originality/value

This paper will be discussing a unique street-based forwarding technique exploring the advantages of global positioning system to obtain the location of vehicles and streets. This technique results in higher PDR and reduced network overhead.

Details

International Journal of Pervasive Computing and Communications, vol. 13 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 18 March 2021

Ravi Kumar D.N.S. and Barani S.

The purpose of this paper is to introduce a new data dissemination model in order to improve the performance of transmission in VANET. It proposes a protocol named Epidemic and…

Abstract

Purpose

The purpose of this paper is to introduce a new data dissemination model in order to improve the performance of transmission in VANET. It proposes a protocol named Epidemic and Transmission-Segment-based Geographic Routing (ETSGR) and outlining the issues due to high mobility of nodes and uncertain physical topologies in the network. The proposed ETSGR is mainly used to analyze the vehicle state, direction, distance, traffic density and link quality of the network.

Design/methodology/approach

This research work based on ETSGR protocol mainly uses epidemic algorithm in order to find the vehicle state based on susceptible, infected and recovered (SIR) model. Furthermore, the vehicle position and finding the head node in the network is utilized using the transmission segment protocol based on geographic routing and analyses each node to form the segments and find the destination to transmit the data in timely manner.

Findings

The paper provides the enhancement of the performance based on some metrics such as end-to-end delay that obtained 0.62%, data throughput as 32.3%, packet delivery ratio as 67% and one-hop communication as 13%. The proposed ETSGR protocol analyzes the state of the vehicle correctly and each node segmented to transmit the data with the timely manner and obtaining reliable performance even with high mobility of nodes in the network.

Research limitations/implications

The proposed ETSGR protocol may have some limitation when considering the timing which should improve even in increasing many number of vehicles and different road segments.

Practical implications

This paper includes some suggestions for the practical deployment of the approach in which a real-time traffic analysis can be evaluated for taking prior actions during an emergency situation and proper dissemination of data in timely manner can help utilize the guidance of proper planning of roads.

Originality/value

This research fulfills an enhanced protocol to improve the performance of data dissemination.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 14 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 10 October 2016

Abdelaziz Amara Korba, Mehdi Nafaa and Salim Ghanemi

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and…

Abstract

Purpose

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and collaborative routing in such networks makes them vulnerable to various security attacks. This paper aims to design and implement a new efficient intrusion detection and prevention framework, called EIDPF, a host-based framework suitable for mobile ad hoc network’s characteristics such as high node’s mobility, resource-constraints and rapid topology change. EIDPF aims to protect an AODV-based network against routing attacks that could target such network.

Design/methodology/approach

This detection and prevention framework is composed of three complementary modules: a specification-based intrusion detection system to detect attacks violating the protocol specification, a load balancer to prevent fast-forwarding attacks such as wormhole and rushing and adaptive response mechanism to isolate malicious node from the network.

Findings

A key advantage of the proposed framework is its capacity to efficiently avoid fast-forwarding attacks and its real-time detection of both known and unknown attacks violating specification. The simulation results show that EIDPF exhibits a high detection rate, low false positive rate and no extra communication overhead compared to other protection mechanisms.

Originality/value

It is a new intrusion detection and prevention framework to protect ad hoc network against routing attacks. A key strength of the proposed framework is its ability to guarantee a real-time detection of known and unknown attacks that violate the protocol specification, and avoiding wormhole and rushing attacks by providing a load balancing route discovery.

Details

Information & Computer Security, vol. 24 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 20 November 2009

Daniel Kraft, Marc Bechler, Hans‐Joachim Hof, Frank Pählke and Lars Wolf

Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes…

Abstract

Purpose

Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues.

Design/methodology/approach

In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network‐signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates.

Findings

The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log‐on times, availability, and communication overhead.

Originality/value

The paper introduces a cluster‐based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 247