Skip to main content
Top

2017 | Book

Future Intelligent Vehicular Technologies

First International Conference, Future 5V 2016, Porto, Portugal, September 15, 2016, Revised Selected Papers

insite
SEARCH

About this book

This book constitutes the refereed proceedings of the First International Conference on Future Intelligent Vehicular Technologies, Future 5V 2016, held in Porto, Portugal, in September 2016.
Future 5V presents vehicular networks and communications and also hosted the “Internet of Things (IoT) meets Big Data and Cloud Computing Workshop”. The 21 revised full papers presented were reviewed and selected from 38 submissions. The papers cover all aspects of intelligent vehicular communications including security and applications.

Table of Contents

Frontmatter
Retraction Note to: Ready Mealy, Moore & Markov Mathematical Modeling Machines for Big Data
Hafiz Tahir Furqan, Ahmad Abdul Wahab, Sultan Sadiq, Pir Amad Ali Shah

Intelligent Vehicular Communication

Frontmatter
Enforcing Replica Determinism in the Road Side Units of Fault-Tolerant Vehicular Networks
Abstract
This paper presents a strategy to enforce replica determinism in the road-side units (RSUs) of wireless vehicular networks. An active replication scheme is used to enhance fault-tolerant behaviour in these RSU nodes, which are responsible for handling channel access and admission control policies in real-time vehicular communications protocols. The proposed solution guarantees consistency among all RSU replicas, by introducing a dedicated link shared exclusively by these units, allowing them to implement an atomic commit protocol of the packets received through the wireless medium. This strategy also has the advantage of reducing packet loss, since only one replica needs to successfully decode the packet in order for it to become available to the RSU group of replicas. It should be noticed however that this method increases the total delay of packet delivery to the upper layers of the communications protocol, so its impact on the real-time properties of the network needs to be further evaluated.
João Almeida, Joaquim Ferreira, Arnaldo S. R. Oliveira, Paulo Pedreiras, José Fonseca
A Deterministic MAC Protocol for Infrastructure to Vehicle Communications in Motorways
Abstract
The current wireless standards devised for vehicle communications are not designed for hard real-time restrictions. In certain scenarios, such as motorways where a high density of vehicles travelling at high speed is common, the Medium Access Layer (MAC) of the existing standards is not deterministic and does not guarantee an upper bound for the delay of communications. This article discusses several proposals to address this issue and presents a deterministic MAC protocol for infrastructure to vehicle communications: the vehicular flexible time triggered protocol.
Tiago Meireles, Joaquim Ferreira, José Fonseca
A Proposal for an Improved Distributed MAC Protocol for Vehicular Networks
Abstract
Vehicular Ad-hoc Networks (VANETs) have a significant potential to enable new applications in the vehicular domain, some of which addressing traffic safety. In these networks, the Medium Access Control (MAC) plays an important role in providing an efficient communication channel. Currently, there are two protocols for ITS, proposed in the USA (IEEE WAVE) and in Europe (ETSI ITS-G5). Both cases use the PHY and MAC of IEEE 802.11p, the latter being fully distributed and based on CSMA/CA, thus still prone to collisions. This has led to recent proposals for TDMA-based overlay protocols to prevent collisions but leading to complex synchronization and scalability limitations. In this paper we propose enhancing IEEE 802.11p with an overlay protocol based on Reconfigurable and Adaptive TDMA. We specifically target multiple concurrent applications such as multiple platoons. Our proposal separates between the application level, with its own TDMA round and slots allocated to engaged nodes, e.g., a platoon, and the global level that manages multiple TDMA rounds in a mutually agnostic manner, thus, dynamic and scalable. We believe this is the first applications-oriented MAC protocol proposed for VANETS and we discuss its deployment and potential advantages in two typical uses cases, namely platooning and smart intersections.
Aqsa Aslam, Luis Almeida, Joaquim Ferreira
Adaptive Contention Window Design to Minimize Synchronous Collisions in 802.11p Networks
Abstract
The vehicular ad hoc network (VANET) capable of wireless communication will enhance traffic safety and efficiency. The IEEE 802.11p standards for wireless communication in the US and Europe use a single shared channel for the periodic broadcast of safety messages. Coupled with the short contention window and inflexibility in window size adaptation, the synchronous collisions of periodic messages are inevitable in a large scale intelligent transportation system (ITS). To this end, we propose an adaptive contention window design to reduce synchronous collisions of periodic messages. The proposed design replaces the aggressive window selection behaviour in the post transmit phase of IEEE 802.11p with a weighted window selection approach after a successful transmission. The design relies on the local channel state information to vary contention window size. Moreover, in high density networks, the design gives prioritized channel access to vehicles experiencing dropped beacons. The proposed design can be readily incorporated into the IEEE 802.11p standard. The discrete-event simulations show that synchronous collisions can be reduced significantly to achieve higher message reception rates as compared to the IEEE 802.11p standard.
Syed Adeel Ali Shah, Ejaz Ahmed, Iftikhar Ahmad, Rafidah MD Noor
Model Driven Architecture for Decentralized Software Defined VANETs
Abstract
Vehicular Adhoc Networks (VANETs) are considered as a breakthrough technology in providing robust Vehicular communication that guarantees Road safety and offer interactive set of applications. VANET faces certain orchestration and management challenges. Recently, the notion of Centralization of VANET is gaining importance. In this regard SDN (Software defined Network) is integrated with VANET to achieve management goals. SDN renders existing VANET architecture to provide centralized control. Yet for Large-scale VANET, SDN approach does not outperform due to SPOF (single point of failure) in SDN. We have proposed decentralized architectural solution that scales out overall network intelligence into respective local controllers that result in unprecedented elasticity and resource availability. To make this approach operational no standard Architectural approach yet exists. An emerging Model Driven Architecture approach is used that simplifies VANET development using abstract models. It only subdues VANET rigidity but also comply with SDN principals. This system is implemented in VEINS framework. Results demonstrate its efficacy for large scale VANET.
Afza Kazmi, Muazzam A. Khan, Faisal Bashir, Nazar A. Saqib, Muhammad Alam, Masoom Alam
Data Rate Adaptation Strategy to Avoid Packet Loss in MANETs
Abstract
Due to mobile and dynamic nature of MANETs, congestion avoidance and control is a challenging issue. Congestion mainly occurs due to the phenomena where data arrival rate is higher than the transmission rate of data packets at a particular node. Congestion results in high packet drop ratio, increased delays and wastage of network resources. In this paper, we propose data rate adaptation technique to avoid packet loss. Proposed technique is based on the analysis of queue length of the forwarding nodes, number of source nodes forwarding data through a particular forwarding node, and rate of link changes. In the proposed strategy, queue length of forwarding nodes is communicated periodically to the neighbor nodes. Keeping in view the queue length of forwarding node, the sending node adapts its sending data rate to avoid congestion and to ensure reliable data communication. Results show that proposed strategy improves network performance as compared to the static data rate adaptation strategy in terms of packet delivery ratio upto \(15\%\) and reduces packet loss due to interface queue overflow upto \(14\%\), respectively.
Muhammad Saleem Khan, Mohammad Hossein Anisi, Saira Waris, Ihsan Ali, Majid I. Khan

Security and Applications of Vehicular Communication

Frontmatter
Low-Cost Vehicle Driver Assistance System for Fatigue and Distraction Detection
Abstract
In recent years, the automotive industry is equipping vehicles with sophisticated, and often, expensive systems for driving assistance. However, this vehicular technology is more focused on facilitating the driving and not in monitoring the driver. This paper presents a low-cost vehicle driver assistance system for monitoring the drivers activity that intends to prevent an accident. The system consists of 4 sensors that monitor physical parameters and driver position. From these values, the system generates a series of acoustic signals to alert the vehicle driver and avoiding an accident. Finally the system is tested to verify its proper operation.
Sandra Sendra, Laura Garcia, Jose M. Jimenez, Jaime Lloret
Implementation of Security Services for Vehicular Communications
Abstract
Over the last years, there has been a considerable development in the field of vehicular communications (VC) so as to satisfy the requirements of Intelligent Transportation Systems (ITS). Standards such as IEEE 802.11p and ETSI ITS-G5 enable the so called Vehicular Ad-Hoc Networks (VANETs). Vehicles can exploit VANETs to exchange information, such as alerts and awareness information, so as to improve road safety. However, due to the expected popularity of ITS, VANETs could be prone to attacks by malicious sources. To prevent this, security standards, such as IEEE 1609.2, are being developed for ITS. In this work, an implementation of the required cryptographic algorithms and protocols for the transmission of secure messages according to the IEEE 1609.2 standard is presented. The implemented security protocols are then integrated into an existing WAVE-based system and tested in a real scenario to evaluate the performance impact on safety-related communications, in particular, the overhead that is caused by the process to sign/verify a digital message.
Daniel Duarte, Luis Silva, Bruno Fernandes, Muhammad Alam, Joaquim Ferreira
Performance Evaluation of SIMO Techniques in IEEE 802.11p
Abstract
In this paper, we evaluate the performance of spatial diversity techniques in the scope of vehicular communications, using a IEEE 802.11p multi-antenna flexible and modular implementation. The analysis is based on the well-known Selection Combining (SC) and Equal Gain Combining (EGC) algorithms. The results obtained indicate that employing these techniques improves the system’s resilience against the fast fading multipath effect that characterizes dynamic wireless channels. The measurements performed reveal that up to 32% more frames can be decoded when compared to a single antenna system within a Non Line of Sight (NLOS) scenario. We also examine the influence of the modulation type used on the performance of the diversity combining scheme.
Nelson Cardoso, Muhammad Alam, João Almeida, Joaquim Ferreira, Arnaldo S. R. Oliveira
Wireless Power Transfer for Energy-Efficient Electric Vehicles
Abstract
This paper presents the wireless power transfer (WPT) technology based on inductive coupling and the design challenges of a hybrid energy harvester (EH) circuit as a promising solution to promote the energy efficiency of the electric vehicles (EVs). The design methodologies of ultra-low power electronic module based on low leakage conditioning and processing device are details based on nanoscale transistor technology so that the WPT and hybrid EH can be implemented for self-powered devices in EVs.
Wael Dghais, Muhammad Alam
AutoDrop: Automatic DDoS Detection and Its Mitigation with Combination of OpenFlow and sFlow
Abstract
World is emerging into global village with the support of internet connectivity. With the help of this connectivity, it also made everyone subject of being compromised. Many organizations’ confidential data and numerous online services become victim of cyber-attacks. Different researches and innovations have been made for making network secure but commercial routers limit them to deploy custom security algorithms in real network. Recently, researchers succeed to innovate a novel protocol OpenFlow in Software Defined Networks. Taking advantage of this innovation we utilized OpenFlow to analyze real-time traffic, detect DDoS attack and mitigate attack. In this paper, we proposed a methodology to automatically detect different type of DDoS attacks within few seconds of occurrence using sampling techniques for continuous monitoring site-wide traffic and block attacking source with the help of OpenFlow protocol.
Faisal Shahzad, Muazzam A. Khan, Shoab A. Khan, Saad Rehman, Monis Akhlaq
The Role of Vehicular Cloud Computing in Road Traffic Management: A Survey
Abstract
The vehicular cloud computing (VCC) is an emerging technology that changed the vehicular communication and underlying traffic management applications. The underutilized resources of vehicles can be shared with other vehicles over the VANET to manage the road traffic more efficiently. The cloud computing and its capability of integrating and sharing resources, plays potential role in the development of traffic management systems (TMSs). This paper reviews the VCC based traffic management solutions to analyze the role of VCC in road traffic management. Particularly, an analysis of VANET based and VCC based TMSs is presented. To explore, the VANET infrastructure and services, a comparison of VCC based TMSs is provided. A taxonomy of vehicular clouds is presented, in order to identify and differentiate the type of vehicular cloud’s integration. Potential future challenges and their solutions in respect of emerging technologies are also discussed. The VCC is envision to play an important role in further development of intelligence transportation system.
Iftikhar Ahmad, Rafidah MD Noor, Ihsan Ali, Muhammad Ahsan Qureshi

Workshop on Internet of Things (IoT) meets Big Data and Cloud Computing

Frontmatter
Architecture Proposal for MCloud IoT
Abstract
The world is now heading towards an era shaped by things that able to act and interact through Internet. Despite of many IoT devices suffer from limitations regarding to storage, processing capability, and communication, IoT plays a major role providing a new set of applications and services. Cloud computing provides a supplement solution for IoT limitation. Integration of IoT and Cloud Computing is considered a new direction that both scientist and business are seeking for bringing new applications and benefits to existing applications and services. Moreover, the fast development of mobile devices produces powerful devices that are able to play many roles, creating better IoT scenarios. In this paper; we propose a new MCloud IoT architecture that works on an IoT environment, which is composed by mobile devices such as smart phones, tablets, and smart sensors. MCloud IoT architecture is designed to deliver the applications and services demanded by end users. Moreover, we have included a layered communication model for devices’ communication. In our design we have taken into account the system performance and to provide QoS. We also analyze the benefits of our design. This new architecture provides a revolutionary vision that meets the future expectations of cloud systems.
Zeinab Y. A. Mohamed, Dalia M. Elsir, Majda O. Elbasheer, Jaime Lloret
CoAP-Based Request-Response Interaction Model for the Internet of Things
Abstract
The Internet of Things (IoT) is a broad vision that incorporate real-wold devices from everyday life. These objects coordinate with each other to share the information gathered from phenomena of interest. IoT is a broad term and has attain popularity with the integration of Cloud Computing and Big Data. The partnership among these technologies is revolutionizing the world in which we live and interact with different devices. On the down side, there are lot of speculations and forecasts about the scale of IoT products expected to be available in the market. Most of the products are vendor-specific and as such are not interoperable. They lack a unified standard and are not compatible with each other. Another major issue with these products is the lack of secured features. Albeit, IoT devices are resource-rich, however, they are not capable to communicate in absence of embedded sensor nodes. The presence of resource-constrained sensors in the core of each IoT device make it resource-starving and as such require extremely lightweight but secured algorithms to combat various attacks and malevolent entities from spreading their malicious data. In this paper we aim to propose an extremely lightweight mutual handshaking algorithm for authentication. The proposed scheme verifies the identity of each participating device because establishing communication. Our scheme is based on client-server interaction model using Constrained Application Protocol (CoAP). A 4-byte header, extremely lightweight parsing complexity and JSON based payload encryption make it a lightweight scheme for IoT objects. The proposed scheme can be used as an alternative to DTLS schemes, the one common nowadays for IoT objects.
Fazlullah Khan, Izaz ur Rahman, Mukhtaj Khan, Nadeem Iqbal, Muhammad Alam
Performance Analysis of Vehicular Adhoc Network Using Different Highway Traffic Scenarios in Cloud Computing
Abstract
Vehicular Ad-hoc Networks (VANETs) combine intelligent vehicles on highways aim to solve many transportation problems. The performance of VANETs is affected by many parameters due to highly dynamic structure. We assessed the performance of VANETs over different highway’s scenarios and investigated that under which circumstances the performance will be better and vice versa. We adopted our experiments in infrastructure environment, where the road side units (RSUs) are connected with cloud server. The RSU periodically gathers spatial-temporal information and upload it to cloud, which could help the drivers to predict the status of road before journey. The experiments carried on two types of highway’s scenarios: varying vehicles densities and simulation time. The simulation result shows that selected performance metrics (throughput, E2E delay and packet loss) greatly affect in both scenarios. The simulation time within the interval 200 to 500 is an optimal choice during simulation experiments. The throughput and packet loss increases with increase in vehicle density. The end-to-end delay has an inverse relation with vehicle density. The highway scenarios are generated by SUMO and the actual simulation is done by NS2.
Nigar Fida, Fazlullah Khan, Mian Ahmad Jan, Zahid Khan
Secure and Safe Surveillance System Using Sensors Networks - Internet of Things
Abstract
Sensor network is a network of autonomous devices that consist of sensors which are spatially distributed to sense the physical environment for certain parameters like temperature, humidity and pollution etc. There are various applications of sensor network, like volcanic eruption, inventory tracking system, military surveillance, homes and industrial automation and automobiles. Different sensors use for specific purpose such as temperature sensor, humidity sensor, light sensor, ultrasonic and multimedia sensor, and all these sensors are used for their own task. In this system, we use ultrasonic sensor for defense and security purpose. The ultrasonic sensor constantly transmits ultrasonic sound (Transmitter) which on striking with an obstacle bounces back and that bounced wave is also received by sensor (Receiver) and from this reflection the distance between sensor and obstacle is calculated. So when a person come close to dangerous area like electric field, river side and explosive material, the system will detect the person and will sound an alarm to inform the authorities. The proposed scheme is implemented and the generated results validates its functionalities.
Fazlullah Khan, Mukhtaj Khan, Zafar Iqbal, Izaz ur Rahman, Muhammad Alam
Challenges and Opportunities in Big Data and Cloud Computing
Abstract
In this paper we have discussed the approaches and complexity of big data analytics issues in the perspective of cloud computing. Big data and cloud computing are novel methods of distributing computational resources. Currently big data and cloud computing has engrossed romantic behavior, which needs handling huge quantity of data quickly and securely. In the modern era the size of data is dramatically increasing due to cloud computing technology, which poses various challenges with the variety, security, and size of data. Cloud computing is the newest and the main kind of distributed computing systems and it wraps most of their features. It has already been broadly employed for its huge merits and its capability to handle large amount of data like workflows and big data applications. We have identified some gaps in technology, its challenges, limitation, and applications of big data and cloud computing from theoretical perspective. Moreover, this paper give recommendations to the researchers on future direction sand suggests different solutions to the challenges and limitations.
Hassan Sohail, Zeenia Zameer, Hafiz Farhan Ahmed, Usama Iqbal, Pir Amad Ali Shah
Applications and Challenges Faced by Internet of Things - A Survey
Abstract
The Internet of Things (IoT) is a concept which expands the extent of internet by integrating a physical object to discover them into contributing bodies. This novel idea allows a physical gadget to embody itself in the digital world. There are a bunch of conjectures and opportunistic future of the IoT devices. However, most of them are vendor specific and requires a cohesive standard, which delivers their flawless assimilation and interoperable operations. Another key issue is the need of highly secure features in these devices and their equivalent products. Majority of these devices are resource constrained and not able to sustain computationally intricate and resource overwhelming secure algorithms. In this paper, we present a survey of various applications which have been made possible by IoT. Furthermore, the challenges faced by these networks.
Pir Amad Ali Shah, Masood Habib, Taimur Sajjad, Muhammad Umar, Muhammad Babar
Cloud Computing Development Life Cycle Model (CCDLC)
Abstract
Cloud Computing is getting reputation as the standard approach for designing and organizing software applications over the internet, especially for distributed and e-commerce applications. In recent times, Cloud Computing has emerged as a new opportunity that how software and other resources can be provided to the consumers as a service. However, applying the existing traditional software engineering life cycle models to cloud computing, we identify some inadequacies like they do not concentrate on engineering activities, they lack the fundamental description of cloud services using traditional requirement engineering process, they do not deal with proper modeling, and they suffer from good development and testing processes. We propose a cloud computing life cycle model (CCDLC) for development of cloud to deal with the mentioned deficiencies faced in the existing traditional life cycle models.
Muhammad Babar, Ata ur Rahman, Fahim Arif
Effective Use of Search Functionality in Pakistan E-Government Websites
Abstract
The modern era of technology makes technology an integrated part of our lives. The information and communication technology ICTs and information technology has diverse impacts on the human lives both in positive and negative aspects. The modern emerging trends in the technology and their impact on the human race encourage researchers to develop new enhanced techniques. The researchers proposed the concept of e-government to use the information technology and information and communication technology (ICT) and web-services to encourage the involvement of different stakeholders in the development and enhancement of government procedures. The electronic government directorate of Pakistan under the supervision of Ministry of Information approves an e-government plan. This paper provides an insight into the importance of search functionality in the e-government websites of Pakistan. A survey is conducted to evaluate the importance of search functionality and effective use of search functionality to improve the effectiveness, efficiency and satisfaction of the websites.
Mutahira Naseem Tahir, Fahim Arif
Ready Mealy, Moore & Markov Mathematical Modeling Machines for Big Data
Abstract
In this paper we have given a new idea of bringing automation to the Big data. This paper basically focused on the three core topics in automaton for Big data. Automation machines are used in today world to automate certain applied sciences ideas, into computational models. Mealy, Moore & Markov Probabilistic Modeling are one of those used to accomplish the said task. In particular we have focused on transducer and features in MATLAB and implication of system General Knowledge are focused in this paper.
Hafiz Tahir Furqan, Ahmad Abdul Wahab, Sultan Sadiq, Pir Amad Ali Shah
Education and Socio Economic Factors Impact on Earning for Pakistan - A Bigdata Analysis
Abstract
This paper give an insight on effect of education and socio economic factors on education on earning for Pakistan using data mining technique Regression tree and classification tree (CART). Labor force survey data used in this paper. Variables used as predictors in the study are Education, Gender, Status, Training, and Occupation, Location of working, Training, Experience, Age and Type of industry, where monthly income is used as an independent variable. In case of classification income is divided in Quintiles, which is used as a dependent variable for classification variable. Type of industry, education, age and occupation are found significant variables in both classification and regression tree. Regression trees shows that instead of education type of industry is the most important variable and sex and education are the least important variables. Classification tree also shows that Type of industry is the most significant variable which effects the earning of an individual, then age and occupation of an individual come and education is the least important variable where the rest of predictors play no role in earning of an individual.
Neelam Younas, Zahid Asghar, Muhammad Qayyum, Fazlullah Khan
Backmatter
Metadata
Title
Future Intelligent Vehicular Technologies
Editors
Prof. Joaquim Ferreira
Dr. Muhammad Alam
Copyright Year
2017
Electronic ISBN
978-3-319-51207-5
Print ISBN
978-3-319-51206-8
DOI
https://doi.org/10.1007/978-3-319-51207-5

Premium Partner