Results: 2
(searched for: doi:10.1080/17489725.2022.2151658)
Applied Sciences, Volume 13; https://doi.org/10.3390/app13074591
Abstract:
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of denial of service attack that are challenging to deal with, since they conform to protocol norms while impairing network performance, particularly in terms of communication overhead and reliability. Numerous existing approaches have developed new techniques with which to identify and prevent these attacks; however, no approach has been capable of facing all three types of Jellyfish attacks, which include reordering attacks, delay variance attacks, and periodic drop attacks. In this work, we design a new protocol that analyzes the behavior of every node in a network and selects the trusted routes for data transmission to their intended destination by calculating different Honesty metrics. The OMNET++ simulator was used to evaluate the overall performance of the proposed protocol. Various evaluation metrics, such as the packet delivery ratio, end-to-end delay, and throughput, are considered and compared with other existing approaches.
Electronics, Volume 12; https://doi.org/10.3390/electronics12040818
Abstract:
In the last decade, with the arrival of the 5G communication technology and the increasing numbers of vehicles being connected to the internet, conventional vehicle ad-hoc networks (VANETs) are evolving towards the internet of vehicles (IoV), which makes the co-existence of IEEE 802.11p and 5G-based technologies very important for the design of a heterogeneous IoV system that takes advantage of both. The IEEE 802.11p standard is still the best candidate to support direct communications for safety critical services. In fact, both the ETSI ITS-G5 and the IEEE 1609 standard families adopt the IEEE 802.11p standard as a medium access control (MAC) mechanism, and they require vehicles to exchange periodic awareness messages to avoid dangerous situations. When the density of vehicles increases, the MAC layer will suffer from radio channel congestion problems, and this may affect the various VANET applications, especially safety applications. Therefore, the decentralized congestion control (DCC) mechanism has been specified by ETSI to mitigate the channel congestion; this was achieved by adapting the transmission parameters, such as the transmit power and data-rate. However, many research studies have demonstrated limitations and a low performance of DCC, especially when the channel load is extremely high. To deal with this, in this paper, we investigate a new promising technique, called the transmission timing control (TTC), to control the channel load for periodic cooperative awareness. It consists of spreading the transmissions over time in order to avoid contention on the transmission channel. The objective of the paper is to propose an analytical study to calculate the probability of successful transmission using TTC. The demonstrated results show the efficiency of our timing control-enabled scheme to deal with the channel load on top of different conditions.