scholarly journals FL-ASB: A Fuzzy Logic Based Adaptive-period Single-hop Broadcast Protocol

2018 ◽  
Vol 14 (5) ◽  
pp. 155014771877848
Author(s):  
Bin Pan ◽  
Hao Wu ◽  
Jin Wang

In vehicular ad hoc networks, vehicle-to-vehicle–based broadcast can fast disseminate safety messages between vehicles within the whole network and hence expand drivers perception vision, which will reduce the accident probability and ensure the transportation reliability. As for fixed-period single-hop broadcast protocol, disseminating safety messages frequently can cause excessive network load. However, increasing period purely does not guarantee the real-time performance. In addition, exiting adaptive-period single-hop broadcast protocols also have limitations without considering synthetically various impact factors. Thus, how to design a single-hop broadcast protocol that can dynamically adjust the broadcast period according to the actual road condition is a pressing issue. A Fuzzy Logic Based Adaptive-period Single-hop Broadcast Protocol in vehicular ad hoc networks is designed in this article, which provides a new solution for the dissemination of period safety messages. In this article, the impact of various factors (such as the number of one-hop neighbor nodes, vehicle speed, received signal strength index, and visibility) on the single-hop broadcast period has been analyzed. In view of each impact factor, we design corresponding membership function and fuzzy rules according to the specific scenarios and parameters. It realizes the adaptive changes of period safety messages broadcast period through the simulation of the proposed fuzzy logic inference system. Finally, we verify the performance of the Fuzzy Logic Based Adaptive-period Single-hop Broadcast Protocol in a bidirectional four-lane highway scenario. Simulation results show that the proposed Fuzzy Logic Based Adaptive-period Single-hop Broadcast Protocol has obvious advantages in terms of network load ratio, average one-hop delay, and delivery ratio.

2011 ◽  
Vol 219-220 ◽  
pp. 351-357 ◽  
Author(s):  
Jin Song Gui ◽  
Zhi Gang Chen ◽  
Xiao Heng Deng

In vehicular ad hoc networks, uncooperative behaviors will impact the reliability of comfort applications, as well as drivers’ decisions, and even invoke serious traffic accidents. In this paper, we propose a novel game incentive scheme to stimulate cooperation among vehicle nodes, consider selfish nodes’ expectations to future payoff and their long-term desires for profit, and show analytically the three incentive-compatible conditions under which selfish nodes will be deterred from cheating by the subsequent punishments. We also discuss the impact on selfish nodes’ behavior, which is caused by their willingness for future collaboration, the parameter values of punishment mechanism and the variation of network load. Simulation results show that, the increase of network load and the deterioration of node’s future profit expectation will motivate nodes toward self-interested action, but our scheme can neutralize this tendency by the careful configuration of punishment parameters, and have favorable incentive effect.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6092
Author(s):  
Zhonghui Pei ◽  
Xiaojun Wang ◽  
Zhen Lei ◽  
Hongjiang Zheng ◽  
Luyao Du ◽  
...  

Beacon messages and emergency messages in vehicular ad hoc networks (VANETs) require a lower delay and higher reliability. The optimal MAC protocol can effectively reduce data collision in VANETs communication, thus minimizing delay and improving reliability. In this paper, we propose a Q-learning MAC protocol based on detecting the number of two-hop neighbors. The number of two-hop neighbors in highway scenarios is calculated with very little overhead using the beacon messages and neighbor locations to reduce the impact of hidden nodes. Vehicle nodes are regarded as agents, using Q-learning and beacon messages to train the near-optimal contention window value of the MAC layer under different vehicle densities to reduce the collision probability of beacon messages. Furthermore, based on the contention window value after training, a multi-hop broadcast protocol combined with contention window adjustment for emergency messages in highway scenarios is proposed to reduce forwarding delay and improve forwarding reliability. We use the trained contention window value and the state information of neighboring vehicles to assign an appropriate forwarding waiting time to the forwarding node. Simulation experiments are conducted to evaluate the proposed MAC protocol and multi-hop broadcast protocol and compare them with other related protocols. The results show that our proposed protocols outperform the other related protocols on several different evaluation metrics.


2020 ◽  
Vol 39 (6) ◽  
pp. 8357-8364
Author(s):  
Thompson Stephan ◽  
Ananthnarayan Rajappa ◽  
K.S. Sendhil Kumar ◽  
Shivang Gupta ◽  
Achyut Shankar ◽  
...  

Vehicular Ad Hoc Networks (VANETs) is the most growing research area in wireless communication and has been gaining significant attention over recent years due to its role in designing intelligent transportation systems. Wireless multi-hop forwarding in VANETs is challenging since the data has to be relayed as soon as possible through the intermediate vehicles from the source to destination. This paper proposes a modified fuzzy-based greedy routing protocol (MFGR) which is an enhanced version of fuzzy logic-based greedy routing protocol (FLGR). Our proposed protocol applies fuzzy logic for the selection of the next greedy forwarder to forward the data reliably towards the destination. Five parameters, namely distance, direction, speed, position, and trust have been used to evaluate the node’s stability using fuzzy logic. The simulation results demonstrate that the proposed MFGR scheme can achieve the best performance in terms of the highest packet delivery ratio (PDR) and minimizes the average number of hops among all protocols.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3571 ◽  
Author(s):  
Antonio Guillen-Perez ◽  
Maria-Dolores Cano

The advent of flying ad hoc networks (FANETs) has opened an opportunity to create new added-value services. Even though it is clear that these networks share common features with its predecessors, e.g., with mobile ad hoc networks and with vehicular ad hoc networks, there are several unique characteristics that make FANETs different. These distinctive features impose a series of guidelines to be considered for its successful deployment. Particularly, the use of FANETs for telecommunication services presents demanding challenges in terms of quality of service, energy efficiency, scalability, and adaptability. The proper use of models in research activities will undoubtedly assist to solve those challenges. Therefore, in this paper, we review mobility, positioning, and propagation models proposed for FANETs in the related scientific literature. A common limitation that affects these three topics is the lack of studies evaluating the influence that the unmanned aerial vehicles (UAV) may have in the on-board/embedded communication devices, usually just assuming isotropic or omnidirectional radiation patterns. For this reason, we also investigate in this work the radiation pattern of an 802.11 n/ac (WiFi) device embedded in a UAV working on both the 2.4 and 5 GHz bands. Our findings show that the impact of the UAV is not negligible, representing up to a 10 dB drop for some angles of the communication links.


2014 ◽  
Vol E97.B (5) ◽  
pp. 960-966
Author(s):  
Ajmal KHAN ◽  
Jae-Choong NAM ◽  
You-Ze CHO

Author(s):  
Mannat Jot Singh Aneja ◽  
Tarunpreet Bhatia ◽  
Gaurav Sharma ◽  
Gulshan Shrivastava

This chapter describes how Vehicular Ad hoc Networks (VANETs) are classes of ad hoc networks that provides communication among various vehicles and roadside units. VANETs being decentralized are susceptible to many security attacks. A flooding attack is one of the major security threats to the VANET environment. This chapter proposes a hybrid Intrusion Detection System which improves accuracy and other performance metrics using Artificial Neural Networks as a classification engine and a genetic algorithm as an optimization engine for feature subset selection. These performance metrics have been calculated in two scenarios, namely misuse and anomaly. Various performance metrics are calculated and compared with other researchers' work. The results obtained indicate a high accuracy and precision and negligible false alarm rate. These performance metrics are used to evaluate the intrusion system and compare with other existing algorithms. The classifier works well for multiple malicious nodes. Apart from machine learning techniques, the effect of the network parameters like throughput and packet delivery ratio is observed.


Author(s):  
Mohamed Aissa ◽  
Badia Bouhdid ◽  
Adel Ben Mnaouer ◽  
Abdelfettah Belghith ◽  
Saad AlAhmadi

Sign in / Sign up

Export Citation Format

Share Document