scholarly journals Real-Time Performance Evaluation of IEEE 802.11p EDCA Mechanism for IoV in a Highway Environment

2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Hong Li ◽  
Qiong Wu ◽  
Jing Fan ◽  
Qiang Fan ◽  
Bo Chang ◽  
...  

With the development of 5G, the Internet of Vehicles (IoV) evolves to be one important component of the Internet of Things (IoT), where vehicles and public infrastructure communicate with each other through a IEEE 802.11p EDCA mechanism to support four access categories (ACs) to access a channel. Due to the mobility of the vehicles, the network topology is time varying and thus incurs a dynamic network performance. There are many works on the stationary performance of 802.11p EDCA and some on real-time performance, but existing work does not consider real-time performance under extreme highway scenario. In this paper, we consider four ACs defined in the 802.11p EDCA mechanism to evaluate the limit of the real-time network performance in an extreme highway scenario, i.e., all vehicles keep the minimum safety distance between each other. The performance of the model has been demonstrated through simulations. It is found that some ACs can meet real-time requirements while others cannot in the extreme scenario.

2021 ◽  
Vol 46 (1) ◽  
pp. 33-36
Author(s):  
Julie Dugdale ◽  
Mahyar T. Moghaddam ◽  
Henry Muccini

The increasing natural and man-induced disasters such as res, earthquakes, oods, hurricanes, overcrowding, or pandemic viruses endanger human lives. Hence, designing infrastructures to handle those possible crises has become an ever-increasing need. The Internet of Things (IoT) has changed our approach to safety systems by connecting sensors and providing real-time data to managers, rescuers, and endangered people. IoT systems can monitor and react to progressive disasters, people's movements and their behavioral patterns. The community faces challenges in using IoT for crises management: i) how to take advantage of technological advancements and deal with IoT resources installation issues? ii) what environmental contexts should be considered while designing IoT-based emergency handling systems? iii) how should system design comply with various levels of real-time requirements? This paper reports on the results of the First International Workshop on Internet of Things for Emergency Management (IoT4Emergency 2020), which speci cally focuses on challenges and envisioned solutions in using smart connected systems to handle disasters.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 545
Author(s):  
Risabh Mishra ◽  
M Safa ◽  
Aditya Anand

Recent advances in wireless communication technologies and automobile industry have triggered a significant research interest in the field of Internet of Vehicles over the past few years.The advanced period of the Internet of Things is guiding the development of conventional Vehicular Networks to the Internet of Vehicles.In the days of Internet connectivity there is need to be in safe and problem-free environment.The Internet of Vehicles (IoV) is normally a mixing of three networks: an inter-vehicleNetwork, an intra-vehicle network, and a vehicle to vehicle network.Based on  idea of three networks combining into one, we define  Internet of Vehicles as a large-scale distributed system to wireless communication and information exchange between vehicle2X (X: vehicle, road, human and internet).It is a combined   network for supporting intelligent traffic management, intelligent dynamic information service, and intelligent vehicle control, representation of an application of the Internet of Things (IoT) technology for intelligent transportation system (ITS).  


2022 ◽  
pp. 69-87
Author(s):  
Vijay Prakash ◽  
Lalit Garg ◽  
Jack Azzopardi ◽  
Thomas Camilleri

Since the early 1990s, there has been a lot of enthusiasm for using high-speed connectivity to develop local community links through education, employment possibilities, fostering community events, and enhancing overall sociability within a local region. 5G is the 5th iteration of a broadband network operating on cellular systems. 5G is not only for mobile phones, but it is also the foundation for virtual reality (VR); the internet of things (IoT); and autonomous transport, immersive services, and public infrastructure; and connecting many electronic devices to the internet. In this chapter, first, the authors have discussed the evolution of 1G network to 6G networks by focussing on its potential impact on the quality of life. Further, 5G applications in IoT, autonomous transport, immersive services, and public infrastructure have been discussed. Then the chapter discusses popular advantages, limitations in the current technologies, implementations, and future perspective.


2020 ◽  
pp. 1260-1284
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.


Sign in / Sign up

Export Citation Format

Share Document