Masters Thesis: Connectivity and Security in V2V Ad Hoc Networks
VerifiedAdded on 2019/09/20
|23
|10308
|225
Thesis and Dissertation
AI Summary
This Masters thesis explores Vehicle-to-Vehicle (V2V) ad hoc networks, crucial for intelligent transport systems and driverless cars. The introduction outlines the problem statement and motivation, while Chapter 2 delves into V2V networks, emphasizing connectivity mechanisms and security challenges. The study investigates the IEEE 802.11p standard, channel limitations, and cognitive radio technologies such as beacons, geo-location databases, and spectrum sensing. It also discusses dynamic spectrum access (DSA) to address spectrum inadequacy and proposes a trust-based security model. The research considers the joint impact of secondary user mobility, primary user activity, and spectrum sensing range, providing insights into opportunistic communications in the Internet of Vehicles (IoV). The approach models the relative speed between primary and secondary users, spectrum sensing, and the dynamic access process. The thesis aims to improve vehicular safety systems and enhance the performance of V2V communication.

Masters Thesis
Abstract
1. Abstract:
2. Introduction: (5 pages) Including problem statement, motivation.
3. Chapter 4: in the end of the paper, including (1 page) future research and (3 pages)
conclusion.
Please, all linked and according to the paper.
2. INTRODUCTIONII. VEHICLE-TO-VEHICLE ADHOC NETWORK
The recent advances in ad hoc networks have allowed multiple implementation of architectures
for vehicular networks [1]. These architectures support different requirements, and satisfy
different constraints. When a notive is introduced to the concept of vehicular networks, all he can
think of is vehicles talking to each other. This concept is known as vehicle-to-vehicle (V2V) ad
hoc network, which will be the focus of this chapter.
V2V network allows the direct communication between vehicles without de- pending on a fixed
infrastructure support [2]. It is simply the wireless transmission of data between motor vehicles.
Abstract
1. Abstract:
2. Introduction: (5 pages) Including problem statement, motivation.
3. Chapter 4: in the end of the paper, including (1 page) future research and (3 pages)
conclusion.
Please, all linked and according to the paper.
2. INTRODUCTIONII. VEHICLE-TO-VEHICLE ADHOC NETWORK
The recent advances in ad hoc networks have allowed multiple implementation of architectures
for vehicular networks [1]. These architectures support different requirements, and satisfy
different constraints. When a notive is introduced to the concept of vehicular networks, all he can
think of is vehicles talking to each other. This concept is known as vehicle-to-vehicle (V2V) ad
hoc network, which will be the focus of this chapter.
V2V network allows the direct communication between vehicles without de- pending on a fixed
infrastructure support [2]. It is simply the wireless transmission of data between motor vehicles.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

The principal goal of V2V is to prevent accidents by allowing vehicles share speed data and
position data with one another over an ad hoc mesh network. V2V is expected to present a 360
degree level of awareness about the surrounding to a moving vehicle [3].
V2V is becoming an important part of the intelligent transport system of the United states. Data
from vehicle-to-vehicle communication is currently being used to improve traffic management
evident in traffic lights and signs. It is expected that this technology will become a mandatory
part of the transportation system, and immensely aid in the quest for driverless-cars all across
America. The major incentive of V2V is that the technology can increase the performance of
vehivle stafety systems and help save lives. It is expected that connected vehicle technolo- gies
will provide drivers with the tools to not only survive crashes, but to avoid it altogether [4].
Without the use of a trusted authority, implementing V2V raises questions about the
communication mechanism to ensure effective connectivity, as well as address- ing the inherent
security challenges in this form of communication. Discussion of V2V in this chapter will be in
terms of the connectivity mechanism and security measures. An approach to ensuring effective
and secured communication in V2V will be discussed.
A. Proposed approach
Dedicated for wireless vehicular communications is the IEEE 802.11p standard where 6 out of
the 7 available channels are used for actual communication and the last channel for control
messages [5]. However, with the overall goal of having all communicable cars on US roads,
these channels could be easily overwhelmed. Within a mile radius, there could be several cars
especially on busy roads in highly populous geographical region all expected to provide
transportation intelligence through V2V communication. This introduces a requirement for a
virtually unlimited available communication channel in vehicular communication [6]. The
timeliness constraint of V2V networks must also be factored as time- critical emergency
messages cannot be delayed.
Subsequently in this chapter, an evaluation of the various connectivity options available for V2V
is considered, with an approach considering the communication range, speed, tavel direction etc.
Also, a trust-based security model for V2V communication is proposed.
B. Connectivity
In the context of IoV, the time to takes to fully transit emergency messages can mean the
difference between life and death. However, messages may be delayed due to a limitation in the
position data with one another over an ad hoc mesh network. V2V is expected to present a 360
degree level of awareness about the surrounding to a moving vehicle [3].
V2V is becoming an important part of the intelligent transport system of the United states. Data
from vehicle-to-vehicle communication is currently being used to improve traffic management
evident in traffic lights and signs. It is expected that this technology will become a mandatory
part of the transportation system, and immensely aid in the quest for driverless-cars all across
America. The major incentive of V2V is that the technology can increase the performance of
vehivle stafety systems and help save lives. It is expected that connected vehicle technolo- gies
will provide drivers with the tools to not only survive crashes, but to avoid it altogether [4].
Without the use of a trusted authority, implementing V2V raises questions about the
communication mechanism to ensure effective connectivity, as well as address- ing the inherent
security challenges in this form of communication. Discussion of V2V in this chapter will be in
terms of the connectivity mechanism and security measures. An approach to ensuring effective
and secured communication in V2V will be discussed.
A. Proposed approach
Dedicated for wireless vehicular communications is the IEEE 802.11p standard where 6 out of
the 7 available channels are used for actual communication and the last channel for control
messages [5]. However, with the overall goal of having all communicable cars on US roads,
these channels could be easily overwhelmed. Within a mile radius, there could be several cars
especially on busy roads in highly populous geographical region all expected to provide
transportation intelligence through V2V communication. This introduces a requirement for a
virtually unlimited available communication channel in vehicular communication [6]. The
timeliness constraint of V2V networks must also be factored as time- critical emergency
messages cannot be delayed.
Subsequently in this chapter, an evaluation of the various connectivity options available for V2V
is considered, with an approach considering the communication range, speed, tavel direction etc.
Also, a trust-based security model for V2V communication is proposed.
B. Connectivity
In the context of IoV, the time to takes to fully transit emergency messages can mean the
difference between life and death. However, messages may be delayed due to a limitation in the

channel availability of the IEEE 802.11 channels, which are governed by the IEEE 802.11p
standard for wireless vehicular communications. IEEE 802.11 consists of seven channels in total.
One of these acts as the common control channel while the remaining six are employed for
vehicular communications [6]. As the popularity and prevalence of vehicles that can
communicate with one another wirelessly increases, there is a strong possibility that the IEEE
802.11 channel will become overwhelmed, and this could result in delays in messages and
scarcity in the radio spectrum [7], [8]. As such, cognitive radio technologies could represent a
viable solution by which it is possible to achieve the low latency inter-vehicle communications
require while also preventing spectrum scarcity [9]. Cognitive radio is a relatively new
technology that involves optimizing the spectrum by exploiting unutilized spectrum holes [10].
The cognitive radio network typically employs three different approaches to identify and exploit
unused channels: geo- location database, beacons, and spectrum sensing. Each of these methods
will be examined in more depth below:
Beacons utilize signals by proliferating signals across different channels with the objective of
detecting a free channel [11]. Beacons have been integrated in a range of different applications;
for example, [12], [13] , and [14]. One area in which beacons have been particularly useful
within the context of IoV is through the use of signals to detect the speed, direction, and position
of other vehicles within a network. Beacons are not without their downsides. One major issue
with the use of beacons to identify unexploited channels is that their use reduces the efficiency of
the spectrum because they rely on a high and adequate radio frequency. In addition, the signals
sent and received by beacons may suffer interference from alternative sources [15].
The geo-location database is a digital archive that obtains, processes, compiles, and proliferates
information about the spectrum band [16]. The CR system accesses the geolocation database
scheme, which contains data about the primary user systems, to identify vacant bands. When this
scheme is employed, there is no requirement for the CR users to perform spectrum sensing on
the bands; as such, in comparison to the other methods of identifying unused channels, the
overheads associated with using the geo-location database are relatively low [17]. Furthermore,
as this approach does not involve any sensing errors, it is easier to protect the primary users. To
employ this scheme effectively, there is a requirement to establish a stable connection between
the spectrum database and the CR users. As such, while it is relatively easy to employ this
scheme in a cellular CR system, it is more complex to employ it an ad-hoc situation because a
connection of this nature may not exist [8]. For this reason, it is unlikely that the geolocation
database scheme will find application in an ad-hoc CR environment.
Spectrum sensing is widely considered to represent a fundamental component of a cognitive
standard for wireless vehicular communications. IEEE 802.11 consists of seven channels in total.
One of these acts as the common control channel while the remaining six are employed for
vehicular communications [6]. As the popularity and prevalence of vehicles that can
communicate with one another wirelessly increases, there is a strong possibility that the IEEE
802.11 channel will become overwhelmed, and this could result in delays in messages and
scarcity in the radio spectrum [7], [8]. As such, cognitive radio technologies could represent a
viable solution by which it is possible to achieve the low latency inter-vehicle communications
require while also preventing spectrum scarcity [9]. Cognitive radio is a relatively new
technology that involves optimizing the spectrum by exploiting unutilized spectrum holes [10].
The cognitive radio network typically employs three different approaches to identify and exploit
unused channels: geo- location database, beacons, and spectrum sensing. Each of these methods
will be examined in more depth below:
Beacons utilize signals by proliferating signals across different channels with the objective of
detecting a free channel [11]. Beacons have been integrated in a range of different applications;
for example, [12], [13] , and [14]. One area in which beacons have been particularly useful
within the context of IoV is through the use of signals to detect the speed, direction, and position
of other vehicles within a network. Beacons are not without their downsides. One major issue
with the use of beacons to identify unexploited channels is that their use reduces the efficiency of
the spectrum because they rely on a high and adequate radio frequency. In addition, the signals
sent and received by beacons may suffer interference from alternative sources [15].
The geo-location database is a digital archive that obtains, processes, compiles, and proliferates
information about the spectrum band [16]. The CR system accesses the geolocation database
scheme, which contains data about the primary user systems, to identify vacant bands. When this
scheme is employed, there is no requirement for the CR users to perform spectrum sensing on
the bands; as such, in comparison to the other methods of identifying unused channels, the
overheads associated with using the geo-location database are relatively low [17]. Furthermore,
as this approach does not involve any sensing errors, it is easier to protect the primary users. To
employ this scheme effectively, there is a requirement to establish a stable connection between
the spectrum database and the CR users. As such, while it is relatively easy to employ this
scheme in a cellular CR system, it is more complex to employ it an ad-hoc situation because a
connection of this nature may not exist [8]. For this reason, it is unlikely that the geolocation
database scheme will find application in an ad-hoc CR environment.
Spectrum sensing is widely considered to represent a fundamental component of a cognitive
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

radio network [18]. It operates by sensing the various channels that are available. As previously
described, cognitive radio exploits the vacant spectrum as a means of serving a secondary user.
However, this can enhance the interface between those users who are licensed to use the
spectrum (the primary users) and those who are not (the secondary users) and ultimately
diminish the service that is available to the licensed user [19]. To avoid this issue, the use of
spectrum sensing can enrich spectrum utilization without reducing the parity of the service that is
available to licensed users [19]. In addition, secondary users can access the RF spectrum in an
ad-hoc manner to detect unused channels without undermining the quality of the service that is
available to the primary users. As such, the users of unlicensed vehicles need to use spectrum
sensing and evaluation to identify the idle band for opportunistic communications in IoV [20]. It
is worth employing mathematical approaches to examine the joint impacts of licensed and
unlicensed user activity on the performance of the spectrum sensing approach within the context
of opportunistic communications between vehicles that are fitted with wireless communication
and spectrum sensing functionality.
To prevent licensed users from suffering negative interference, secondary vehic- ular users can
employ spectrum sensing to verify whether licensed users are em- ploying their channels [21],
[22]. Within the context of cognitive IoV, vehicles are frequently traveling at high speeds across
various distances; as such, the network structure can rapidly change. Existing studies have been
based on the assumption that secondary users are stationary when they are in the process of
executing spectrum sensing, and PUs are assumed to be passive during ad-hoc transmissions by
secondary users of the network. Within the majority of existing literature user mobility has been
examined in non-cooperative spectrum sensing [23], cooperative spectrum sensing [24],
spectrum sensing in the presence of primary user mobility [25] and spectrum sensing using
random way point model for secondary users where primary users were motionless [26].
It is important to highlight that the contemporary sensing methods that are in use do not take into
consideration the cumulative impact of the vehicle speed, primary users mobility, and secondary
users sensing range while calculating the function of spectrum sensing in cognitive IoV where
the secondary users are traveling at a speed measured in miles per hour. The most significant
aspect of IoV is that the users travel in an identical direction or opposite directions in accordance
with the structure of the road [27]. Identifying the intersection between the protection range of
the primary user and the sensing range of the secondary user and the distance between the two
users (which is directly dependent on their relative speed) plays a critical role in determining
whether a primary user is within the sensing range. Furthermore, the dynamic spectrum access
for ad-hoc communication is also of significance from the perspective of anticipated
described, cognitive radio exploits the vacant spectrum as a means of serving a secondary user.
However, this can enhance the interface between those users who are licensed to use the
spectrum (the primary users) and those who are not (the secondary users) and ultimately
diminish the service that is available to the licensed user [19]. To avoid this issue, the use of
spectrum sensing can enrich spectrum utilization without reducing the parity of the service that is
available to licensed users [19]. In addition, secondary users can access the RF spectrum in an
ad-hoc manner to detect unused channels without undermining the quality of the service that is
available to the primary users. As such, the users of unlicensed vehicles need to use spectrum
sensing and evaluation to identify the idle band for opportunistic communications in IoV [20]. It
is worth employing mathematical approaches to examine the joint impacts of licensed and
unlicensed user activity on the performance of the spectrum sensing approach within the context
of opportunistic communications between vehicles that are fitted with wireless communication
and spectrum sensing functionality.
To prevent licensed users from suffering negative interference, secondary vehic- ular users can
employ spectrum sensing to verify whether licensed users are em- ploying their channels [21],
[22]. Within the context of cognitive IoV, vehicles are frequently traveling at high speeds across
various distances; as such, the network structure can rapidly change. Existing studies have been
based on the assumption that secondary users are stationary when they are in the process of
executing spectrum sensing, and PUs are assumed to be passive during ad-hoc transmissions by
secondary users of the network. Within the majority of existing literature user mobility has been
examined in non-cooperative spectrum sensing [23], cooperative spectrum sensing [24],
spectrum sensing in the presence of primary user mobility [25] and spectrum sensing using
random way point model for secondary users where primary users were motionless [26].
It is important to highlight that the contemporary sensing methods that are in use do not take into
consideration the cumulative impact of the vehicle speed, primary users mobility, and secondary
users sensing range while calculating the function of spectrum sensing in cognitive IoV where
the secondary users are traveling at a speed measured in miles per hour. The most significant
aspect of IoV is that the users travel in an identical direction or opposite directions in accordance
with the structure of the road [27]. Identifying the intersection between the protection range of
the primary user and the sensing range of the secondary user and the distance between the two
users (which is directly dependent on their relative speed) plays a critical role in determining
whether a primary user is within the sensing range. Furthermore, the dynamic spectrum access
for ad-hoc communication is also of significance from the perspective of anticipated
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

transmission time, realistic per-user rate, and the anticipated transmission count.
Dynamic spectrum access (DSA) represents a viable method of solving the spec- trum
inadequacy issues outlined above [6]. This novel area of study forecasts the evolution of CR
networks to enhance spectrum efficiency [28]. The licensed user indisputably has the priority on
the spectrum band and, as such, takes precedence over any unlicensed user that accesses the
spectrum band. DSA, which is also referred to as opportunistic spectrum access involves
constraining the SUs such that they can only opportunistically access the spectrum holes. In the
case of the interweave DSA model, secondary users employ the cognitive radio to detect the
proximate spectrum environment before an idle spectrum band is selected and the CR is switched
to that band to transmit a message [29]. DSA and CR have attracted significant attention from
researchers in recent years due to the potential of these technologies to significantly enhance the
efficiency of spectrum utilization.
THE APPROACH
Every conventional vehicular network consists of a collection of licensed primary spectrum users
and unlicensed (secondary) vehicular users as shown in Fig. 1. In this approach, communication
between vehicles is leveraged on the dynamic spec- trum access to radio frequency channels.
The secondary user is considered to have a sensing range s, and primary users with a protection
radii r. These constraints allows the consideration of the joint impact of secondary user mobility
and primary user activity to avoid harmful interference during the dynamic spectrum access
process.
It is assumed that the primary user protection range is shorter than the sensing range of the
spectrum sensor such that r < s. To determine the relative speed between a primary user and a
secondary user in this approach, it is assumed that the primary user is stationary while the
secondary user is mobile. Thus, this relative speed is determined by the speed of the secondary
user (vehicle). In reality, when a vehicular user is moving towards a primary user, the overlap
time is greater than when the vehicle is moving away from the primary user. Considering that a
vehicle could be moving closer or away from a primary user, the distance between them is
established as a function of the geographical distance between them, direction of travel, sensing
range of vehicular user, primay user’s protection range and the relative speed.
For a secondary user to opportunistically establish communication via a channel, the primary
user activity for a particular location and time must be checked. This activity is known as
spectrum sensing. The activities of a primary user in the channel is represented by ON and OFF
states [30]. The secpndary user detects the activity of the primary user by noise being present in
the channel. The signal received by a mobile secondary user rs(t) can be represented as a
Dynamic spectrum access (DSA) represents a viable method of solving the spec- trum
inadequacy issues outlined above [6]. This novel area of study forecasts the evolution of CR
networks to enhance spectrum efficiency [28]. The licensed user indisputably has the priority on
the spectrum band and, as such, takes precedence over any unlicensed user that accesses the
spectrum band. DSA, which is also referred to as opportunistic spectrum access involves
constraining the SUs such that they can only opportunistically access the spectrum holes. In the
case of the interweave DSA model, secondary users employ the cognitive radio to detect the
proximate spectrum environment before an idle spectrum band is selected and the CR is switched
to that band to transmit a message [29]. DSA and CR have attracted significant attention from
researchers in recent years due to the potential of these technologies to significantly enhance the
efficiency of spectrum utilization.
THE APPROACH
Every conventional vehicular network consists of a collection of licensed primary spectrum users
and unlicensed (secondary) vehicular users as shown in Fig. 1. In this approach, communication
between vehicles is leveraged on the dynamic spec- trum access to radio frequency channels.
The secondary user is considered to have a sensing range s, and primary users with a protection
radii r. These constraints allows the consideration of the joint impact of secondary user mobility
and primary user activity to avoid harmful interference during the dynamic spectrum access
process.
It is assumed that the primary user protection range is shorter than the sensing range of the
spectrum sensor such that r < s. To determine the relative speed between a primary user and a
secondary user in this approach, it is assumed that the primary user is stationary while the
secondary user is mobile. Thus, this relative speed is determined by the speed of the secondary
user (vehicle). In reality, when a vehicular user is moving towards a primary user, the overlap
time is greater than when the vehicle is moving away from the primary user. Considering that a
vehicle could be moving closer or away from a primary user, the distance between them is
established as a function of the geographical distance between them, direction of travel, sensing
range of vehicular user, primay user’s protection range and the relative speed.
For a secondary user to opportunistically establish communication via a channel, the primary
user activity for a particular location and time must be checked. This activity is known as
spectrum sensing. The activities of a primary user in the channel is represented by ON and OFF
states [30]. The secpndary user detects the activity of the primary user by noise being present in
the channel. The signal received by a mobile secondary user rs(t) can be represented as a

function of two hypotheses as in (1). H0 represents the presence of only noise in the channel, and
H1 indicating the presence of a primary user.
It is important that a misdetection of primary user activity is reduced as it can cause harmful
interference. In this vein, it can be said that reducing the misdetection probability is more
important than reducing false alarm (false positive) as this does not lead to harmful interference
with primary users. An evaluation of the effect of primary user activity and secondary user
mobility defined in terms of probability of misdetection of spectrum opportunities and expected
overlapping time between static primary user and mobile secondary user is conducted. The
following propositions are made based on Definition 1 and Definition 2 to formally analyze
event A and event B.
Proposition 1: For a separation distance D between a secondary user and primary user, the
condition for the primary user being inside the sensing range of secondary user is r < D S. The
probability for the event B Pr(B)i.e. the probability that the primary user is inside the sensing
range of secondary user and the secondary user detects that the primary user is present in a given
channel, is given as:
Proposition 2: The probability of misdetection that depends on sensing range of vehicular user,
protection range of primary user, velocity of vehicular user and energy detection threshold is
expressed as….
Proposition 3: The expected overlap time duration between static primary user
and mobile secondary user is…
Evaluation
To evaluate the approach discussed so far, simulations are conducted with numerical results
obtained used to substantiate the formal descriptions given. It is important to note that the
secondary user is assumed to be mobile, while the primary user is static in all the simulations. It
is further assumed that access points and base stations are primary users, each with its protective
range. Secondary users are not expected to use channels actively used by primary users in ithe
primary user’s protective range.
To understand the effect of the sensing range on the probability of event B, a plot of the variation
of Pr(B) vs the sensing range for a given primary user with a protective range r = 110 meter is
done. It is oberved that Pr(B) increases with increased sensing range as shown in Fig. 2.
H1 indicating the presence of a primary user.
It is important that a misdetection of primary user activity is reduced as it can cause harmful
interference. In this vein, it can be said that reducing the misdetection probability is more
important than reducing false alarm (false positive) as this does not lead to harmful interference
with primary users. An evaluation of the effect of primary user activity and secondary user
mobility defined in terms of probability of misdetection of spectrum opportunities and expected
overlapping time between static primary user and mobile secondary user is conducted. The
following propositions are made based on Definition 1 and Definition 2 to formally analyze
event A and event B.
Proposition 1: For a separation distance D between a secondary user and primary user, the
condition for the primary user being inside the sensing range of secondary user is r < D S. The
probability for the event B Pr(B)i.e. the probability that the primary user is inside the sensing
range of secondary user and the secondary user detects that the primary user is present in a given
channel, is given as:
Proposition 2: The probability of misdetection that depends on sensing range of vehicular user,
protection range of primary user, velocity of vehicular user and energy detection threshold is
expressed as….
Proposition 3: The expected overlap time duration between static primary user
and mobile secondary user is…
Evaluation
To evaluate the approach discussed so far, simulations are conducted with numerical results
obtained used to substantiate the formal descriptions given. It is important to note that the
secondary user is assumed to be mobile, while the primary user is static in all the simulations. It
is further assumed that access points and base stations are primary users, each with its protective
range. Secondary users are not expected to use channels actively used by primary users in ithe
primary user’s protective range.
To understand the effect of the sensing range on the probability of event B, a plot of the variation
of Pr(B) vs the sensing range for a given primary user with a protective range r = 110 meter is
done. It is oberved that Pr(B) increases with increased sensing range as shown in Fig. 2.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

It is important to evaluate the variation of the probability of miss-detection Pr(miss) relative to
the sped of the secondary user. For this, the primary user’s
protection range r is set to 100 meter, the initial separation distance between the primary user and
secondary user D = 200 meter, and secondary user’s sensing ranges from 0 to 1000 in multiples
of 250 meter. The probability of primary user being ON, PU(OFF!ON) is varied from 0.30 to
0.60 to 0.90 to see how primary user’s OFF ! ON activity impacts the performance of mis-
detection. In Fig. 3, it is observed that the probability Pr(miss) decreased when sensing range of
secondary user increased for a given P U(OF F !ON ) value. However, for an increased speed of
mobile secondary user with a given PU(OFF!ON) value, the probability of mis-detection
increased. The significance of this is that at a higher speed, the probability of miss-detection
becomes higher as a result of the primary user being quickly out of the sensing range of the
secondary user. it is also observed that the probability of mis-detection increased by
approximately 10% for each case of primary user being active during sensing period (and idle in
the previous) increasing from 0 to 0.9 in multiples of 0.3, coupled with the speed of the
secondary user exceeding 40km/hr as shown in Fig. 3. The reason for this being that the primary
user is expected to be idle (following being idle in the previous round), but is active resulting in a
higher mis-detection probability for a given sensing range.
To visualize the relationship between the probability of misdetection and the velocity of
secondary user with different values of PU(ON!ON), a plot is derived as shown in Fig. 4. It is
observed that the probability of misdetection increases with an increase in PU(ON!ON) when
varied from 0.3 to 0.6 to 0.9. For PU(ON!ON) greater than PU(OFF!ON), the probability of mis-
detection decreases as evident in Fig. 4. It is also observed that with P U(OF F !ON ) greater than
or equal to PU(ON!ON), mis-detection probability increases as shown in Fig. 3 and Fig. 4.
A plot of the variation of expected overlapping duration per epoch against the speed of the
secondary user as shown in Fig. 5 reveals that for higher sensing range, the primary user has a
higher possibility to fall into the secondary users sensing range for longer overlapping time
duration. This is evident in the visible decrease in the expected overlapping duration per epoch
with increasing speed of the secondary user for a given sensing range, and its increase with
increased sensing range of the mobile secondary user. In this configuration, the protection range
of the primary user is considered such that r = 110 meter. An initial separation distance between
the primary user and secondary user D = 200 meter, and secondary user’s sensing range s = 1000
meter. The secondary users sensing range was varied as s = 250, 500, 750 and 1000 meter.
the sped of the secondary user. For this, the primary user’s
protection range r is set to 100 meter, the initial separation distance between the primary user and
secondary user D = 200 meter, and secondary user’s sensing ranges from 0 to 1000 in multiples
of 250 meter. The probability of primary user being ON, PU(OFF!ON) is varied from 0.30 to
0.60 to 0.90 to see how primary user’s OFF ! ON activity impacts the performance of mis-
detection. In Fig. 3, it is observed that the probability Pr(miss) decreased when sensing range of
secondary user increased for a given P U(OF F !ON ) value. However, for an increased speed of
mobile secondary user with a given PU(OFF!ON) value, the probability of mis-detection
increased. The significance of this is that at a higher speed, the probability of miss-detection
becomes higher as a result of the primary user being quickly out of the sensing range of the
secondary user. it is also observed that the probability of mis-detection increased by
approximately 10% for each case of primary user being active during sensing period (and idle in
the previous) increasing from 0 to 0.9 in multiples of 0.3, coupled with the speed of the
secondary user exceeding 40km/hr as shown in Fig. 3. The reason for this being that the primary
user is expected to be idle (following being idle in the previous round), but is active resulting in a
higher mis-detection probability for a given sensing range.
To visualize the relationship between the probability of misdetection and the velocity of
secondary user with different values of PU(ON!ON), a plot is derived as shown in Fig. 4. It is
observed that the probability of misdetection increases with an increase in PU(ON!ON) when
varied from 0.3 to 0.6 to 0.9. For PU(ON!ON) greater than PU(OFF!ON), the probability of mis-
detection decreases as evident in Fig. 4. It is also observed that with P U(OF F !ON ) greater than
or equal to PU(ON!ON), mis-detection probability increases as shown in Fig. 3 and Fig. 4.
A plot of the variation of expected overlapping duration per epoch against the speed of the
secondary user as shown in Fig. 5 reveals that for higher sensing range, the primary user has a
higher possibility to fall into the secondary users sensing range for longer overlapping time
duration. This is evident in the visible decrease in the expected overlapping duration per epoch
with increasing speed of the secondary user for a given sensing range, and its increase with
increased sensing range of the mobile secondary user. In this configuration, the protection range
of the primary user is considered such that r = 110 meter. An initial separation distance between
the primary user and secondary user D = 200 meter, and secondary user’s sensing range s = 1000
meter. The secondary users sensing range was varied as s = 250, 500, 750 and 1000 meter.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

For the performance evaluation of dynamic spectrum access for opportunistic communication,
the variation of per-user data rate for vehicular users vs. the number of vehicular users is plotted
as shown in Fig. 6. The per-user data rate decreases when number of user in IoV increases
because of sharing of the same channel.
Also, the variation of expected transmission time vs the achievable data rate for given number of
vehicles and probability of transmission failure is plotted as shown in Fig. 8. It is observed that
expected transmission time decreases with an increasing achievable data rate for given number
of users and probability of failure. As shown in Fig. 8, expected transmission time is highest (or
lowest) when more (or less) vehicles are present and highest (or lowest) probability of
transmission failure.
Finally, a plot of the variation of expected transmission count against the proba- bility of
transmission failure is shown in Fig. 7. It is observed that when transmis- sion failure increases,
the expected transmission count increase exponentially and when failure probability pf is 1,
transmission count tends to infinity which means there will be no successful transmission of the
packet.
C. Security in V2V
In the previous subsection, an efficient dynamic spectrum access method was described for
communication between multiple vehicles in IoV. However, with every communication is a
threat of security and privacy. Despite the recent de- velopment in VANET, the issue of security
and privacy is still under-developed. Although it has to be agreed that this is a continues process
as threat space develops with new technology and increased understanding by adversaries, it is
important to have a framework in plae to be built upon for establishment of minimum security
standards.
In an information-sensitive domain like vehicular networks where every bit of information is
defining of life or death, it is important to ensure the trustworthiness of message received from
other vehicles without violating the their privacy nor with the use of a trusted authority. This is
important if the goal of VANET in reducing road accident and fuel consumption is to be
actualized.
In V2V networks, the absence of a roadside infratructure adds an extra level of complexity to
trust establishment. Messages between a source vehicle and another destination vehicle is routed
by intermediate vehicles in V2V. The question for any of such vehicle is to verify if the
information it has received is legitimate or not. Trust is historically known to be a factor baed on
the variation of per-user data rate for vehicular users vs. the number of vehicular users is plotted
as shown in Fig. 6. The per-user data rate decreases when number of user in IoV increases
because of sharing of the same channel.
Also, the variation of expected transmission time vs the achievable data rate for given number of
vehicles and probability of transmission failure is plotted as shown in Fig. 8. It is observed that
expected transmission time decreases with an increasing achievable data rate for given number
of users and probability of failure. As shown in Fig. 8, expected transmission time is highest (or
lowest) when more (or less) vehicles are present and highest (or lowest) probability of
transmission failure.
Finally, a plot of the variation of expected transmission count against the proba- bility of
transmission failure is shown in Fig. 7. It is observed that when transmis- sion failure increases,
the expected transmission count increase exponentially and when failure probability pf is 1,
transmission count tends to infinity which means there will be no successful transmission of the
packet.
C. Security in V2V
In the previous subsection, an efficient dynamic spectrum access method was described for
communication between multiple vehicles in IoV. However, with every communication is a
threat of security and privacy. Despite the recent de- velopment in VANET, the issue of security
and privacy is still under-developed. Although it has to be agreed that this is a continues process
as threat space develops with new technology and increased understanding by adversaries, it is
important to have a framework in plae to be built upon for establishment of minimum security
standards.
In an information-sensitive domain like vehicular networks where every bit of information is
defining of life or death, it is important to ensure the trustworthiness of message received from
other vehicles without violating the their privacy nor with the use of a trusted authority. This is
important if the goal of VANET in reducing road accident and fuel consumption is to be
actualized.
In V2V networks, the absence of a roadside infratructure adds an extra level of complexity to
trust establishment. Messages between a source vehicle and another destination vehicle is routed
by intermediate vehicles in V2V. The question for any of such vehicle is to verify if the
information it has received is legitimate or not. Trust is historically known to be a factor baed on

social interactions and has been introduced in information and communication technology (ICT)
during the last decade [38]. An often considered approach to V2V security is by using
cryptographic algorithms.
Each vehicle is required to receive messages sent to it in single or multiple hops with other
vehicles in the loop making this kind of communication susceptible. If a intermediate vehicle
chooses to alter a message, then the received message at the destination will be misleading.
Ensuring integrity and authenticity of such communication however must also safeguard the
private information of the vehicles and drivers alike as well as their travel path. Basic solutions
such as digital signature, symmetric and assymetric cryptography, and authentication protocols
have been used to address the security problem in V2V networks [39]. Such solutions however
do not cover the human-like psychological need of such fast- paced interactions.
In a bid to establish integrity of communication defined as a function of trust of vehicles in the
message delivery path, a probabilistic approach which observes the legitimacy of vehicles over a
period of time is a viable alternative. If a vehicle is not legitimate, it follows that message
received from such vehicle can be discarded. Such vehicle can then be warned about its
malicious activities [40].
Authentication of vehicles while preserving the privacy of vehicles has become a major
challenge in vehicular networks in general [41]. Hence, trust is an important factor in
establishing privacy and security in V2V networks. Recent research works focus on the usage of
pseudonyms and algorithms for changing them at reasonable intervals [42]. However,
establishing context-aware security and privacy mechanisms built on trust is an emerging area of
research. In the next subsection, a context-aware probabilistic trust measurement is discussed to
enforce security and privacy in V2V networks.
The approach
Considering a relay node i, the trust of i for instance can be defined as a function of the number
of packets that i successfully transmitted without modifying the message. This approach is
leveraged on the notion that a node acts the same way as it has done so far. Subsequent packets
have a probability of successful transmission equivalent to the evaluated trust value of the node.
It should be noted that due to the low contact time of vehicular nodes in a V2V network which is
a result of their high speed of mobility, trust evaluation even becomes difficult to evaluate.
A contextual approach that establishes trust of vehicular nodes using a proba- bilistic model is
proposed for V2V networks. In this approach, trust is assumed to be based on service
during the last decade [38]. An often considered approach to V2V security is by using
cryptographic algorithms.
Each vehicle is required to receive messages sent to it in single or multiple hops with other
vehicles in the loop making this kind of communication susceptible. If a intermediate vehicle
chooses to alter a message, then the received message at the destination will be misleading.
Ensuring integrity and authenticity of such communication however must also safeguard the
private information of the vehicles and drivers alike as well as their travel path. Basic solutions
such as digital signature, symmetric and assymetric cryptography, and authentication protocols
have been used to address the security problem in V2V networks [39]. Such solutions however
do not cover the human-like psychological need of such fast- paced interactions.
In a bid to establish integrity of communication defined as a function of trust of vehicles in the
message delivery path, a probabilistic approach which observes the legitimacy of vehicles over a
period of time is a viable alternative. If a vehicle is not legitimate, it follows that message
received from such vehicle can be discarded. Such vehicle can then be warned about its
malicious activities [40].
Authentication of vehicles while preserving the privacy of vehicles has become a major
challenge in vehicular networks in general [41]. Hence, trust is an important factor in
establishing privacy and security in V2V networks. Recent research works focus on the usage of
pseudonyms and algorithms for changing them at reasonable intervals [42]. However,
establishing context-aware security and privacy mechanisms built on trust is an emerging area of
research. In the next subsection, a context-aware probabilistic trust measurement is discussed to
enforce security and privacy in V2V networks.
The approach
Considering a relay node i, the trust of i for instance can be defined as a function of the number
of packets that i successfully transmitted without modifying the message. This approach is
leveraged on the notion that a node acts the same way as it has done so far. Subsequent packets
have a probability of successful transmission equivalent to the evaluated trust value of the node.
It should be noted that due to the low contact time of vehicular nodes in a V2V network which is
a result of their high speed of mobility, trust evaluation even becomes difficult to evaluate.
A contextual approach that establishes trust of vehicular nodes using a proba- bilistic model is
proposed for V2V networks. In this approach, trust is assumed to be based on service
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

requirements satisfying QoS, security, privacy etc. This is enforced by having multiple copies of
the same message from a source vehicle s to a destination vehicle d over different paths.
For a given path m, the overall trust value is defined as
Xk j=1
where Tj is the trust evaluation value of node j and k is the number of nodes in path m.
Algorithm 1 describes the process of identifying malicious paths.
The evaluation of the trust value of a vehicular node is based on its current and historical trust
values using the model in [43]. Due to the temporal nature of V2V networks and how fast
components change, the historical trust values is important for trust evaluation. The trust value of
a vehicular node i at any given period is given as follows
Ti =↵⇥(Tcur)i +(1 ↵)⇥(Tμ 1)i (38)
where the value of ↵ is such that 0 < ↵ < 1 and representing the weight given to the trust value
of the current period. The weight is used to determine the importance attached to either the
current trust value or historic trust values from previous periods. A period can be represented in
terms of seconds, minutes, or even hours.
To determine the current trust value of a vehicular node Tcur, a probabilistic approach is
employed. Consider that a message Mi is sent by a vehicle i…
until message is received from other paths return max(T Tm ) modification by any relay node
will mean that the message becomes Mi ± since a portion can be added or removed from the
message. However, this is difficult to determine due to noise introduced in communication.
Hence, we consider the probability that the introduction of noise up to a certain threshold does
not alter the message. The probability of the message being altered by noise is defined as
Pmsg = Pr( i < ̄ ) (39)
where i is the signal-to-noise ratio (SNR) of the message from vehicle i and ̄ is the SNR
threshold set for which noise alters the message.
In the trust evaluation period, the beta function is used to calculate the satisfac- tion value such
that
the same message from a source vehicle s to a destination vehicle d over different paths.
For a given path m, the overall trust value is defined as
Xk j=1
where Tj is the trust evaluation value of node j and k is the number of nodes in path m.
Algorithm 1 describes the process of identifying malicious paths.
The evaluation of the trust value of a vehicular node is based on its current and historical trust
values using the model in [43]. Due to the temporal nature of V2V networks and how fast
components change, the historical trust values is important for trust evaluation. The trust value of
a vehicular node i at any given period is given as follows
Ti =↵⇥(Tcur)i +(1 ↵)⇥(Tμ 1)i (38)
where the value of ↵ is such that 0 < ↵ < 1 and representing the weight given to the trust value
of the current period. The weight is used to determine the importance attached to either the
current trust value or historic trust values from previous periods. A period can be represented in
terms of seconds, minutes, or even hours.
To determine the current trust value of a vehicular node Tcur, a probabilistic approach is
employed. Consider that a message Mi is sent by a vehicle i…
until message is received from other paths return max(T Tm ) modification by any relay node
will mean that the message becomes Mi ± since a portion can be added or removed from the
message. However, this is difficult to determine due to noise introduced in communication.
Hence, we consider the probability that the introduction of noise up to a certain threshold does
not alter the message. The probability of the message being altered by noise is defined as
Pmsg = Pr( i < ̄ ) (39)
where i is the signal-to-noise ratio (SNR) of the message from vehicle i and ̄ is the SNR
threshold set for which noise alters the message.
In the trust evaluation period, the beta function is used to calculate the satisfac- tion value such
that
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Si = Nsuc + 1 (40) N suc+Nfail +2
where Nsuc and Nfail are the number of successful and failed interactions respec- tively by
vehicle i within the trust evaluation period. Subsequently, the trust value of the vehicle Ti is
defined as a function of its satisfaction value such that:
Ti =f(Si,Pi) (41)
Finally, as described in algorithm 1, the path with the maximum total trust value is selected such
that:
…..
where P is the set of paths for a message from a source vehicle to another destination vehicle.
To evaluate the proposed approach, the average level of trust of vehicles is estimated with
different SNR values. Blacklisted vehicles are considered to be malicious and assumed to change
the content of the message in transmission from a source to destination vehicle. The average trust
value of messages is plotted against different SNR values as shown in Fig. 9. It is observed that
the trust value increases as the SNR increases which indicates highest trust value for unchanged
message.
D. Conclusion
The importance of V2V network with respect to connectivity and security has been discussed so
far in this chapter. A study of the impact of secondary vehicular user mobility and primary user
activity has been conducted for dynamic spectrum access. Subsequently, a probabilistic approach
was formulated for trust calculation in maintaining integrity of vehicle-vehicle messaging
through intermediate vehicles. The performance of the proposed formal models are evaluated
using numerical results obtained from Monte Carlo simulations. It is found that the probability of
misdetection of primary user activity over a channel increases with increased vehicular speed
and decreasing expected overlapping time duration per epoch. Also, based on experiments
performed, the average trust value for vehicles increase with increasing SNR, with honest
vehicles showing much higher trust value than malicious vehicles.
III. CHAPTER 3: VEHICLE-TO-INFRASTRUCTURE ADHOC NETWORK
where Nsuc and Nfail are the number of successful and failed interactions respec- tively by
vehicle i within the trust evaluation period. Subsequently, the trust value of the vehicle Ti is
defined as a function of its satisfaction value such that:
Ti =f(Si,Pi) (41)
Finally, as described in algorithm 1, the path with the maximum total trust value is selected such
that:
…..
where P is the set of paths for a message from a source vehicle to another destination vehicle.
To evaluate the proposed approach, the average level of trust of vehicles is estimated with
different SNR values. Blacklisted vehicles are considered to be malicious and assumed to change
the content of the message in transmission from a source to destination vehicle. The average trust
value of messages is plotted against different SNR values as shown in Fig. 9. It is observed that
the trust value increases as the SNR increases which indicates highest trust value for unchanged
message.
D. Conclusion
The importance of V2V network with respect to connectivity and security has been discussed so
far in this chapter. A study of the impact of secondary vehicular user mobility and primary user
activity has been conducted for dynamic spectrum access. Subsequently, a probabilistic approach
was formulated for trust calculation in maintaining integrity of vehicle-vehicle messaging
through intermediate vehicles. The performance of the proposed formal models are evaluated
using numerical results obtained from Monte Carlo simulations. It is found that the probability of
misdetection of primary user activity over a channel increases with increased vehicular speed
and decreasing expected overlapping time duration per epoch. Also, based on experiments
performed, the average trust value for vehicles increase with increasing SNR, with honest
vehicles showing much higher trust value than malicious vehicles.
III. CHAPTER 3: VEHICLE-TO-INFRASTRUCTURE ADHOC NETWORK

The Vehicle to Infrastructure (V2I) communication is another mode of commu- nication in
vehicular networks. Similar to V2V networks, the goal is to enable roadside intelligence through
vehicles relaying messages about their context to ensure an effective transportation system and a
step closer to autonomous vehicles plying the roads in the nearest future. However in V2I,
vehicles are expected to communicate with road-side units/infrastructures. Unlike in V2V
architecture where a multi-hop method is used allowing for rapid transmission of data, V2I
reduces the implementation concerns of V2V by using a centrlized architecture involving
stationary road side infrastructure units.
As in V2V, vehicle to infrastructure interaction is based on wireless commu- nication
technologies. The V2I communication is also commonly referred to as V2X, and is a subject of
extensive research in the United States. Primarily, to mitigate motor vehicle accidents and enable
a number of safety and environmental benefits, critical safety and operational data are exchanged
between vehicles and highway infrastructure. V2I networks are incorporated with algorithms that
utilize the messages exchanged to provide intelligence in recognizing high-risk situations
proactively and perform specific actions such as traffic light signalling, driver alerts etc.
The principal components of a V2I architecture are the vehicle on-board unit (OBU), the
roadside unit (RSU) and the communication channel. A typical ar- chitecture is shown in Fig. 10.
The OBUs are the part of the vehicles that forms the V2I network. Usually, OBUs are equipped
with a GPS system, an application processor and a radio transceiver. Also, OBUs are equipped
with (limited) storage capbility to save snapshots of data, with older data being overwritten by
the most- recent. Other vehicle data are also gathered by the OBU for transmission to the RSU.
RSUs are often dedicated equipments placed at strategic locations to provide the interface for
vehicles within their range. They could be mounted at interchangesm intersections , or any other
location. The RSU consists of a radio transceier, an application processor, a GPS unit, and an
interface through which it is connected to the V2I network. The interface of the RSU allows it to
be able to send/receive private data to/from OBUs. RSUs are equipped with prioritization
frameworks to manage the available bandwidth for V2I communication. For instance, vehicle-to-
vehicle safety messages will have the highest priority, with entertainment messages having the
lowest priority.
Fig. 10. A typical vehicle-to-infrastructure architecture []
In subsequent subsections, a description of an effective communication mecha- nism for V2I
vehicular networks. Similar to V2V networks, the goal is to enable roadside intelligence through
vehicles relaying messages about their context to ensure an effective transportation system and a
step closer to autonomous vehicles plying the roads in the nearest future. However in V2I,
vehicles are expected to communicate with road-side units/infrastructures. Unlike in V2V
architecture where a multi-hop method is used allowing for rapid transmission of data, V2I
reduces the implementation concerns of V2V by using a centrlized architecture involving
stationary road side infrastructure units.
As in V2V, vehicle to infrastructure interaction is based on wireless commu- nication
technologies. The V2I communication is also commonly referred to as V2X, and is a subject of
extensive research in the United States. Primarily, to mitigate motor vehicle accidents and enable
a number of safety and environmental benefits, critical safety and operational data are exchanged
between vehicles and highway infrastructure. V2I networks are incorporated with algorithms that
utilize the messages exchanged to provide intelligence in recognizing high-risk situations
proactively and perform specific actions such as traffic light signalling, driver alerts etc.
The principal components of a V2I architecture are the vehicle on-board unit (OBU), the
roadside unit (RSU) and the communication channel. A typical ar- chitecture is shown in Fig. 10.
The OBUs are the part of the vehicles that forms the V2I network. Usually, OBUs are equipped
with a GPS system, an application processor and a radio transceiver. Also, OBUs are equipped
with (limited) storage capbility to save snapshots of data, with older data being overwritten by
the most- recent. Other vehicle data are also gathered by the OBU for transmission to the RSU.
RSUs are often dedicated equipments placed at strategic locations to provide the interface for
vehicles within their range. They could be mounted at interchangesm intersections , or any other
location. The RSU consists of a radio transceier, an application processor, a GPS unit, and an
interface through which it is connected to the V2I network. The interface of the RSU allows it to
be able to send/receive private data to/from OBUs. RSUs are equipped with prioritization
frameworks to manage the available bandwidth for V2I communication. For instance, vehicle-to-
vehicle safety messages will have the highest priority, with entertainment messages having the
lowest priority.
Fig. 10. A typical vehicle-to-infrastructure architecture []
In subsequent subsections, a description of an effective communication mecha- nism for V2I
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 23
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.