scholarly journals An Overview of Vehicular Communications

2019 ◽  
Vol 11 (2) ◽  
pp. 27 ◽  
Author(s):  
Fabio Arena ◽  
Giovanni Pau

The transport sector is commonly subordinate to several issues, such as traffic congestion and accidents. Despite this, in recent years, it is also evolving with regard to cooperation between vehicles. The fundamental objective of this trend is to increase road safety, attempting to anticipate the circumstances of potential danger. Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I) and Vehicle-to-Everything (V2X) technologies strive to give communication models that can be employed by vehicles in different application contexts. The resulting infrastructure is an ad-hoc mesh network whose nodes are not only vehicles but also all mobile devices equipped with wireless modules. The interaction between the multiple connected entities consists of information exchange through the adoption of suitable communication protocols. The main aim of the review carried out in this paper is to examine and assess the most relevant systems, applications, and communication protocols that will distinguish the future road infrastructures used by vehicles. The results of the investigation reveal the real benefits that technological cooperation can involve in road safety.

Symmetry ◽  
2021 ◽  
Vol 13 (3) ◽  
pp. 438
Author(s):  
Eduard Zadobrischi ◽  
Mihai Dimian

The potential of wireless technologies is significant in the area of the safety and efficiency of road transport and communications systems. The challenges and requirements imposed by end users and competent institutions demonstrate the need for viable solutions. A common protocol by which there could be vehicle-to-vehicle and vehicle-to-road communications is ideal for avoiding collisions and road accidents, all in a vehicular ad hoc network (VANET). Ways of transmitting warning messages simultaneously by vehicle-to-vehicle and vehicle-to-infrastructure communications by various multi-hop routings are set out. Approaches to how to improve communication reliability by achieving low latency are addressed through the multi-channel (MC) technique based on two non-overlaps for vehicle-to-vehicle (V2V) and vehicle-to-road (V2R) or road-to-vehicle (R2V) communications. The contributions of this paper offer an opportunity to use common communication adaptable protocols, depending on the context of the situation, coding techniques, scenarios, analysis of transfer rates, and reception of messages according to the type of protocol used. Communications between the road infrastructure and users through a relative communication protocol are highlighted and simulated in this manuscript. The results obtained by the proposed and simulated scenarios demonstrate that it is complementary and that the common node of V2V/V2R (R2V) communication protocols substantially improves the process of transmitting messages in low-latency conditions and is ideal for the development of road safety systems.


The recent developments in wireless communication technologies along with the costs of hardware allow both V2V and V2I communications for information exchange. Such a network is called Vehicular ad Hoc Network (VANET) which is very important for various road safety and non-safety related applications. However, Due to the wireless nature of communication in VANETs, it is also prone to various security attacks which are originally present in wireless networks. Hence to realize the highest potential of VANET, the network should be free from attackers, there by all the information exchanged in the network must be reliable should be originated from authenticated source. The system can be processed by the fuzzy logic method. It does not require any keys for data transmission. The system design is very efficient compared to other techniques. So the users prevent from road accident and traffic jam.


2013 ◽  
pp. 354-375
Author(s):  
Md. Imrul Hassan ◽  
Hai L. Vu ◽  
Taka Sakurai

It is envisaged that supporting vehicle-to-vehicle and vehicle-to-infrastructure communications with a Vehicular Ad-Hoc Network (VANET) can improve road safety and increase transportation efficiency. Among the candidate applications of VANETs, cooperative collision avoidance (CCA) has attracted considerable interest as it can significantly improve road safety. Due to the ad hoc nature of these highly dynamic networks, no central coordination or handshaking protocol can be assumed and safety applications must broadcast information of interest to many surrounding cars by sharing a single channel in a distributed manner. This gives rise to one of the key challenges in vehicle-to-vehicle communication systems, namely, the development of an efficient and reliable medium access control (MAC) protocol for CCA. In this chapter, we provide an overview of proposed MAC protocols for VANETs and describe current standardization activities. We then focus on the performance of the IEEE 802.11 carrier sense multiple access (CSMA) based MAC protocol that is being standardized by the IEEE standards body for VANET applications. In particular, we review prominent existing analytical models and study their advantages, disadvantages and their suitability for performance evaluation of the MAC protocol for VANETs. After a discussion of the shortcomings of these models, we develop a new analytical model in the second half of the chapter. Explicit expressions are derived for the mean and standard deviation of the packet delay, as well as for the packet delivery ratio (PDR) at the MAC layer in an unsaturated network formed by moving vehicles on a highway. We validate the analytical results using extensive simulations and show that good accuracy can be achieved with the proposed model for a range of topologies and traffic load conditions. More importantly, using the model, we show that hidden terminals can have a severe, detrimental impact on the PDR, which may compromise the reliability required for safety applications.


Author(s):  
Jie Zhang

An increasingly large number of cars are being equipped with GPS and Wi-Fi devices, forming vehicular ad-hoc networks (VANETs) and enabling vehicle to vehicle communication with the goal of providing increased passenger and road safety. However, dishonest peers (vehicles) in a VANET may send out false information to maximize their own utility. Given the dire consequences of acting on false information in this context, there is a serious need to establish trust among peers. This article first discusses the challenges for trust management caused by the important characteristics of VANET environments, and identifies desired properties that effective trust management should incorporate in order to address the challenges. The author then surveys and evaluates existing trust models in VANETs, and points out that none of the trust models has achieved all the properties. Finally, the author proposes some important future directions for research towards effective trust management for VANETs.


Symmetry ◽  
2020 ◽  
Vol 12 (7) ◽  
pp. 1172 ◽  
Author(s):  
Eduard Zadobrischi ◽  
Lucian-Mihai Cosovanu ◽  
Mihai Dimian

The massive increase in the number of vehicles has set a precedent in terms of congestion, being one of the important factors affecting the flow of traffic, but there are also effects on the world economy. The studies carried out so far try to highlight solutions that will streamline the traffic, as society revolves around transportation and its symmetry. Current research highlights that the increased density of vehicles could be remedied by dedicated short-range communications (DSRC) systems through communications of the type vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) or vehicle-to-everything (V2X). We can say that wireless communication technologies have the potential to significantly change the efficiency and road safety, thus improving the efficiency of transport systems. An important factor is to comply with the requirements imposed on the use of vehicle safety and transport applications. Therefore, this paper focuses on several simulations on the basis of symmetry models, implemented in practical cases in order to streamline vehicle density and reduce traffic congestion. The scenarios aim at both the communication of the vehicles with each other and their prioritization by the infrastructure, so we can have a report on the efficiency of the proposed models.


Webology ◽  
2021 ◽  
Vol 18 (02) ◽  
pp. 418-440
Author(s):  
Cynthia J. ◽  
J. Clement Sudhahar ◽  
Suguna M ◽  
Baskaran K.R ◽  
Senthil J ◽  
...  

Disaster management is management of tasks involving responses to emergencies and methods of devising recovery strategies from havocs caused by nature. It assumes paramount importance now as the human surrounding has enormously become unpredictable owing to natural or man-made disasters. Consequence of disaster can be reduced by broadcasting of disaster alert to a defined radius that could be affected by the disaster. The objective of disaster management is to ensure energy economical and reliable communication that is resilient to network topology changes within the area. Vehicular ad hoc network (VANET) is efficiently utilized to transfer the disaster alert information. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication is used for disseminating the disaster alert message. This study proposes an effective data acquisition from the disaster location, data dissemination to the neighbouring zones and disaster management using VANET technology.


10.29007/j6h1 ◽  
2020 ◽  
Author(s):  
Aakanksha Rastogi ◽  
Kendall Nygard

Autonomous vehicles or self-driving cars emerged with a promise to deliver a driving experience that is safe, secure, law-abiding, alleviates traffic congestion and reduces traffic accidents. These self-driving cars predominantly rely on wireless technology, vehicular ad-hoc networks (VANETs) and Vehicle to Vehicle (V2V) networks, Road Side Units (RSUs), Millimeter Wave radars, light detection and ranging (LiDAR), sensors and cameras, etc. Since these vehicles are so dexterous and equipped with such advanced driver assistance technological features, their dexterity invites threats, vulnerabilities and hacking attacks. This paper aims to understand and study the technology behind these self-driving cars and explore, identify and address popular threats, vulnerabilities and hacking attacks to which these cars are prone. This paper also establishes a relationship between these threats, trust and reliability. An analysis of the alert systems in self-driving cars is also presented.


Vehicular Communication is designed for enhancing road safety and support autonomous driving becoming very popular in the present scenario. The proposed system aims to design a suitable and secured system for overtaking on highways. The main problem faced while driving vehicle on highways is to overtake a larger vehicle on narrow roads, where the driver visibility is limited and it is very risky to overtake from right side as there is a high probability of colliding with the vehicles coming in opposite direction. The proposed system solves the problem by establishing ad-hoc connection in 5G environment with the vehicle to be overtaken. The system consists of a communication unit designed with a controller along with various options which are used to decide when the vehicle can safely overtake. In this way the driver can safely overtake the larger vehicles without any risk of road accidents. The proposed system uses fractal geometry to design the antenna which is used for the vehicle to vehicle communication at 5G frequencies up to 20GHz


Author(s):  
Muntadher Naeem Yasir ◽  
Muayad Sadik Croock

Newly, the cyber security of Vehicle Ad hoc Network (VANET) includes two practicable: Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), that have been considered due to importance. It has become possible to keep pace with the development in the world. The people safety is a priority in the development of technology in general and particular in of VANET for police vehicles. In this paper, we propose a software engineering based self-checking process to ensure the high redundancy of the generated keys. These keys are used in underlying cyber security system for VANET. The proposed self-checking process emploies a set of NIST tests including frequency, block and runs as a threshold for accepting the generated keys. The introduced cyber security system includes three levels: Firstly, the registration phase that asks vehicles to register in the system, in which the network excludes the unregistered ones. In this phase, the proposed software engineeringbased self-checking process is adopted. Secondly, the authentication phase that checks of the vehicles after the registration phase. Thirdly, the proposed system that is able to detect the DOS attack. The obtained results show the efficient performance of the proposed system in managing the security of the VANET network. The self-checking process increased the randomness of the generated keys, in which the security factor is increased.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 204
Author(s):  
Sukhpreet Kaur ◽  
Er Sharad

The vehicular adhoc network is the decentralized type of network in which vehicles can move from one location to another. In the network two type of communication is possible which are vehicle to vehicle and vehicle to infrastructure. In the vehicle to vehicle type of path establishment is the major issue of the network. In this research work, multicasting routing technique is proposed for the path establishment from source to destination. The proposed technique is implemented in NS2 and simulation results shows improvement in network delay for path establishment  


Sign in / Sign up

Export Citation Format

Share Document