Cloud and IoT-Based Vehicular Ad Hoc Networks

Cloud and IoT-Based Vehicular Ad Hoc Networks
Автор книги: id книги: 2053488     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 21733,5 руб.     (212,36$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Автомобили и ПДД Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119761822 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Optimizing the traffic management operations is a big challenge due to massive global increase in vehicles numbers, traffic congestion and road accidents. This book describes the state-of-the-art of the recent developments of Internet of Things (IoT) and cloud computing-based concepts have been introduced to improve Vehicular Ad-Hoc Networks (VANET) with advanced cellular networks such as 5G networks and vehicular cloud concepts. 5G cellular networks provide consistent, faster and more reliable connections within the vehicular mobile nodes. By 2030, 5G networks will deliver the virtual reality content in VANET which will support vehicle navigation with real time communications capabilities, improving road safety and enhance passenger comfort.

Оглавление

Группа авторов. Cloud and IoT-Based Vehicular Ad Hoc Networks

Table of Contents

List of Illustrations

List of Tables

Guide

Pages

Cloud and IoT-Based Vehicular Ad Hoc Networks

Preface

Acknowledgment

1. IoT in 5th Generation Wireless Communication

1.1 Introduction

1.2 Internet of Things With Wireless Communication

1.2.1 Modules Used for the Communication Protocol

1.2.1.1 Wi-Fi Modules for the Connectivity in Less Range

1.2.1.2 Wi-Fi Modules for Connectivity in Long Range

1.2.2 The Relation Between the Different Internet of Things Protocol

1.2.2.1 Effect of Distinction Among Node and Transmission Power

1.3 Internet of Things in 5G Mobile Computing

1.3.1 Practical Aspects of Integrating the Internet of Things With 5G Technologies

1.3.2 The Working of the 5G for the People and Its Generalization

1.3.3 5G Deployment Snapshot

1.3.4 Architecture of Internet of Things With 5G

1.4 Internet of Things and 5G Integration With Artificial Intelligence

1.4.1 Opportunity in the Future

1.4.2 Challenges Arising. 1.4.2.1 The Management of IoT Devices Might Become Additional Efficient

1.4.2.2 5G Protocol Flaws Might Cause Security Flaws

1.4.2.3 5G Could Amend the Styles of Attacks Folks With IoT Devices

1.5 A Genetic Algorithm for 5G Technologies With Internet of Things

1.5.1 System Model

1.5.2 The Planned Algorithm

1.6 Conclusion & Future Work

References

2. Internet of Things-Based Service Discovery for the 5G-VANET Milieu

2.1 VANET

2.2 5G

2.2.1 Why is 5G Used in VANET?

2.3 Service Discovery

2.4 Service Discovery in 5G-VANET Milieu

2.4.1 Service Discovery Methods

2.4.2 A Framework of Service Discovery in the 5G-VANET Milieu

2.5 Service Discovery Architecture for 5G-VANET Milieu

2.5.1 Vehicle User Side Discovery

2.5.2 Service Provider Side Discovery

2.5.3 Service Instance

2.5.4 Service Registry

2.6 Performance Evaluation Metrics for Service

2.7 The Advantage of Service Discovery in the 5G-VANET Milieu

2.8 The Disadvantage of Service Discovery in the 5G-VANET Milieu

2.9 Future Enhancement and Research Directions

2.10 Conclusions

References

3. IoT-Based Intelligent Transportation System for Safety

3.1 Introduction

3.2 Elements of ITS

3.3 Role of ITS in Safety

3.4 Sensor Technologies

3.4.1 Implanted Vehicle Sensor Applications

3.5 Classification of Vehicle Communication Systems

3.5.1 V2V Communication Access Technologies

3.6 IoT in Vehicles

3.7 Embedded Controllers

3.8 ITS Challenges and Opportunities

References

4. Cloud and IoT-Based Vehicular Ad Hoc Networks (VANET)

4.1 Introduction to VANET

4.2 Vehicle-Vehicle Communication (V2V)

4.3 Vehicle–Infrastructure Communication (V2I)

4.4 Vehicle–Broadband Cloud Communication (V2B)

4.5 Characteristics of VANET

4.6 Prime Applications

4.7 State-of-the-Art Technologies. 4.7.1 DSRC/WAVE

4.7.2 4G-LTE

4.8 VANET Challenges

4.9 Video Streaming Broadcasting

4.9.1 Video Streaming Mechanisms

4.9.2 Video Streaming Classes Over VANET

References

5. Interleavers-Centric Conflict Management Solution for 5G Vehicular and Cellular-IoT Communications

5.1 Introduction

5.2 Background

5.2.1 Vehicular Communication

5.2.2 IoT Communication

5.3 Device Identity Conflict Issue

5.4 Related Work

5.5 Interleavers-Centric Conflict Management (ICM)

5.5.1 The Essence of Conflict Resolution

5.5.2 The Motivation

5.5.3 ICM: An Approach for Conflict Resolution

5.5.3.1 Advantages of ICM

5.5.3.2 Recommended Interleavers for ICM

5.6 Signaling Procedures for Enabling ICM

5.6.1 Signaling Between CIoT UE and Cellular or CIoT RAN

5.6.2 Signaling Trilogy for CIoT Communications

5.6.3 Signaling for V2I Communications

5.6.4 Signaling for gNB-Initiated Software Upgrade

5.7 Conclusion

References

6. Modeling of VANET for Future Generation Transportation System Through Edge/Fog/Cloud Computing Powered by 6G

6.1 Introduction

6.2 Related Works

6.3 Proposed System Overview

6.3.1 Driver Monitoring System

6.3.2 Edge/Fog/Cloud Computing

6.3.3 Software Defined Networking (SDN) Along With VANET

6.3.4 Integration of VANET With 5G Networks

6.3.5 IoT with 6G Networks

6.4 Modeling of Proposed System

6.5 Results and Discussion

6.6 Conclusion

References

7. Integrating IoT and Cloud Computing for Wireless Sensor Network Applications

7.1 Introduction

7.1.1 IoT Architecture

7.1.2 Cloud Front End and Back End Architecture

7.1.3 Wireless Sensor Network

7.1.4 IoT Cloud and WSN Architecture

7.1.5 Research Motive

7.2 Challenges and Opportunities

7.2.1 Challenges IoT Cloud Faces

7.2.2 Opportunities IoT Cloud Offers

7.3 Case Study

7.3.1 Case 1 Improved Pollution Monitoring System for Automobiles Using Cloud-Based Wireless Sensor Networks

7.3.2 Case 2 Hybrid Electric Vehicle

7.4 Conclusion

References

8. Comparative Study on Security and Privacy Issues in VANETs

8.1 Introduction

8.2 Characteristics of VANETs

8.2.1 VANETs Features

8.2.2 Challenges in VANET

8.2.3 Mitigating Features

8.3 Literature Survey

8.4 Authentication Requirements in VANETs Communications

8.4.1 Security Model for VANETs’ Communication

8.4.2 VANET Security Services

8.4.3 Security Recommendation

8.4.4 Comparative Analysis

8.5 Conclusion

References

9. Software Defined Network Horizons and Embracing its Security Challenges: From Theory to Practice

9.1 Introduction

9.2 Background and Literature Survey

9.3 Objective and Scope of the Chapter

9.4 SDN Architecture Overviews

9.5 Open Flow

9.6 SDN Security Architecture

9.7 Techniques to Mitigate SDN Security Threats

9.7.1 Performance Metrics

9.7.2 Performance Tests

9.7.3 Data Hiding-Based Geo Location Authentication Protocol

9.7.4 Identity Access Management (IAM) Extended Policies

9.7.5 Extended Identity-Based Cryptography

9.8 Future Research Directions

9.9 Conclusions

References

10. Bio-Inspired Routing in VANET

10.1 Introduction

10.2 Geography-Based Routing

10.3 Topology-Based Routing

10.3.1 Drawbacks

10.3.2 Literature Review

10.4 Biological Computing

10.5 Elephant Herding Optimization Algorithm

10.6 Research Methodology. 10.6.1 Clan Operator

10.6.2 Separating Operator

10.6.3 Simulation Results

10.7 Conclusion

References

11. Distributed Key Generation for Secure Communications Between Different Actors in Service Oriented Highly Dense VANET

11.1 Introduction

11.2 Hierarchical Clustering

11.3 Layer-Wise Key Generation

11.4 Implementation

11.5 Randomness Test

11.6 Brute Force Attack Analysis

11.7 Conclusion

References

12. Challenges, Benefits and Issues: Future Emerging VANETs and Cloud Approaches

12.1 Introduction

12.2 VANET Background

12.3 VANET Communication Standards

12.4 VANET Applications

12.4.1 Safety Applications

12.4.2 Non-Safety Applications

12.5 VANET Sensing Technologies

12.5.1 Sensing Technology

12.5.2 Positioning Technologies

12.5.3 Vision Technologies

12.5.4 Vehicular Networks

12.6 Trust in Ad Hoc Networks

12.6.1 Cryptographic Approaches

12.6.2 Recommendation-Based Approaches

12.6.3 Fuzzy Logic-Based Approaches

12.6.4 Game Theory-Based Approaches

12.6.5 Infrastructure-Based Approaches

12.6.6 Road- and Consensus-Based Advances

12.6.7 Blockchain-Based Approaches

12.6.8 Machine Learning Base Trust Management in Vehicular Networks

12.6.9 Trust in Cellular-Based (5G) VANET

12.6.10 Software-Defined VANET (SDVANET)

12.6.11 Trust in Vehicular Social Networks (VSN)

12.6.12 Future Challenges in VANET Trust Technique

12.7 Software-Defined Network (SDN) in VANET

12.7.1 Literature Work on SDVN

12.7.2 Advantages

12.7.3 Challenge

12.8 Clustering Approaches: Issues

12.9 Up-and-Coming Technologies for Potential VANET. 12.9.1 Edge Cloud Computing

12.9.1.1 Fog Computing

12.9.1.1.1 Fog Computing for Future VANETs

12.9.1.2 Mobile Edge Computing (MEC)

12.9.1.3 Cloudlets

12.10 Challenges, Open Issues and Future Work of VANETs. 12.10.1 Challenges of VANET

12.10.2 Open Issues in VANET Development

12.10.3 Future Research Work

12.11 Conclusion

References

13. Role of Machine Learning for Ad Hoc Networks

13.1 Introduction

13.2 Literature Survey

13.3 Machine Learning Computing

13.3.1 Reinforcement Learning

13.3.2 Q-Learning/Transfer Learning

13.3.3 Fuzzy Logic

13.3.4 Logistic Regression

13.4 Methodology

13.4.1 Rate Estimation Algorithm

13.4.2 Route Selection Algorithm

13.4.3 Algorithm for Congestion Free Route (Congestion Algorithm)

13.5 Simulation Results

13.6 Conclusions

References

14. Smart Automotive System With CV2X-Based Ad Hoc Communication

14.1 Introduction

14.2 Realization of Smart Vehicle

14.3 Analysis of NXP Smart Vehicle Architecture

14.4 Smart Vehicle Proof of Concept (POC) 14.4.1 ECE, SMIT Adaptation of 3GPP 5G Standard for 5G-Enabled Smart Vehicle

14.4.2 Emulation of Smart Vehicle at ECE, SMIT LAB. 14.4.2.1 Emulation of V2I (Vehicle to Infrastructure) 5G URLLC Communication Between i) One Intelligent Roadside Unit (RSU), ii) One Smart Vehicle (SV)

14.4.2.2 Emulation of V2V (Vehicle to Vehicle) 5G URLLC Communication Between Two Smart Vehicles i) One Smart Vehicle (SV1), ii) Another Smart Vehicle (SV2)

14.5 Smart Vehicle Trials

14.6 System Comparison

14.7 Summary and Conclusion

Acknowledgement

References

15. QoS Enhancement in MANET

15.1 Introduction

15.2 Priority Aware Mechanism (PAM)

15.3 Power Aware Mechanism

15.4 Hybrid Mechanism

15.5 Simulation Results and Discussion

15.6 Performance Comparison

15.7 Conclusion

References

16. Simulating a Smart Car Routing Model (Implementing MFR Framework) in Smart Cities

16.1 Introduction

16.2 Background

16.3 Literature Review

16.4 Methodology

16.4.1 System Framework

16.5 Discussion and a Future Direction

16.5.1 Case Study

16.5.2 Fog-Simulator

16.5.3 MOA-Simulator

16.5.4 CloudSim-Simulator

16.6 Conclusions

References

17. Potentials of Network-Based Unmanned Aerial Vehicles

17.1 Introduction

17.2 Applications of UAVs

17.3 Advantages of UAVs

17.4 UAV Communication System

17.5 Types of Communication

17.6 Wireless Sensor Network (WSN) System

17.7 The Swarm Approach

17.7.1 Infrastructure-Based Swarm Architecture

17.7.2 FANET-Based Swarm Architecture

17.8 Market Potential of UAVs

17.9 Conclusion

References

Index

About the Editors

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Scrivener Publishing 100 Cummings Center, Suite 541J Beverly, MA 01915-6106

.....

Figure 1.12 The energy consumption ratio in cellular networks [10].

The system model assumes that we tend to reflect occupying the world of Km for 5G/LTE networks as the hoopla continues to grow concerning the 5G network, some folks forget it’s not excellent. The lesson learned here is that it shouldn’t anticipated that the 5G network is foolproof regarding security. The inclusion chance inside the space around the area with a limit is a littler sum than the SINR (Signal to Interference Noise Ratio). The SINR is determined by exploiting it, any place the MHA gain, the transmission power, and talk about with the obstruction and clamor, severally. Consider the following equation

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Cloud and IoT-Based Vehicular Ad Hoc Networks
Подняться наверх