4.8 Article

Quality of Service Aware Routing Protocol in Software-Defined Internet of Vehicles

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 6, Issue 2, Pages 2817-2828

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2018.2875482

Keywords

Laying chicken algorithm (LCA); quality of service; routing algorithm; software-defined Internet of Vehicles (SDIoV)

Funding

  1. National Natural Science Foundation of China [61672349]
  2. National Key Research and Development Program [2016YFE0100600]
  3. China 973 Project [2014CB340303]
  4. U.S. National Science Foundation [CNS-1658972, HRD-1828811, CNS-1650831]

Ask authors/readers for more resources

Software-defined Internet of Vehicles (SDIoV) has emerged as a promising field of study as it could overcome the shortcomings of traditional vehicular networks, such as offering efficient data transmission and traffic shaping in different vehicular scenarios to satisfy all the requirements of applications on the fly. Although routing solutions are lightly addressed for SDIoV, there are many limitations of routing protocols unaddressed in such environment. More precisely, shortest path routing algorithms are mostly focused in the state of the arts. This paper presents quality of service aware routing algorithm that forwards packets toward the most reliable and connected path to the destination. Particularly, candidate routes should satisfy metrics, such as signal to interference and noise ratio (SINR) constraint and have the highest probability of connectivity. To address these issues, we have formulated a discrete optimization problem to favor the best route among candidate paths and proposed the modified laying chicken algorithm (LCA) that results better results than the traditional approaches. We have mathematically analyzed the probability of connectivity along with the SINR metric. Moreover, a multiscore function based on traffic density and greediness factor is proposed to make intelligent decision at the intersections. Simulation results are used to validate the superiority of the proposed routing approach over the existing solutions.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Theory & Methods

A Comprehensive Survey on Imputation of Missing Data in Internet of Things

Deepak Adhikari, Wei Jiang, Jinyu Zhan, Zhiyuan He, Danda B. Rawat, Uwe Aickelin, Hadi A. Khorshidi

Summary: The Internet of Things (IoT) relies on smart sensors, communication technologies, and Internet protocols to enable various applications. However, dealing with missing data in IoT datasets poses challenges for collecting and generating information. This survey provides a comprehensive overview of research on imputation techniques for handling incomplete data in IoT. It discusses strategies, assumptions, computing platforms, and application areas for imputation. The survey aims to promote the use of known imputation techniques and stimulate further research in this field.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Information Systems

Trustworthy and Efficient Routing Algorithm for IoT-FinTech Applications Using Nonlinear Levy Brownian Generalized Normal Distribution Optimization

Ali Safaa Sadiq, Amin Abdollahi Dehkordi, Seyedali Mirjalili, Jingwei Too, Prashant Pillai

Summary: This article focuses on developing a new trustworthy and efficient routing mechanism for routing data traffic over IoT-FinTech mobile networks. A new nonlinear Levy Brownian generalized normal distribution optimization (NLBGNDO) algorithm is proposed to solve the problem of finding an optimal path from source to destination sensor nodes. The proposed mechanism maintains wise and efficient decisions over the selection period in comparison with other methods.

IEEE INTERNET OF THINGS JOURNAL (2023)

Editorial Material Computer Science, Hardware & Architecture

Deep reinforcement learning for next-generation IoT networks

Sahil Garg, Jia Hu, Giancarlo Fortino, Laurence T. Yang, Mohsen Guizani, Xianjun Deng, Danda B. Rawat

COMPUTER NETWORKS (2023)

Editorial Material Engineering, Civil

Guest Editorial Security, Reliability, and Safety in IoT-Enabled Maritime Transportation Systems

Ali Kashif Bashir, Danda B. Rawat, Jun Wu, Muhammad Ali Imran

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Editorial Material Computer Science, Information Systems

Guest Editorial Advanced Wearable Sensors for Smart Monitoring and Disease Prediction

Varun G. Menon, Mainak Adhikari, Jude Hemanth, Danda. B. Rawat

Summary: The papers in this special issue discuss advanced wearable sensor technologies for monitoring and predicting diseases. Seamless integration of these sensors with smart healthcare infrastructure enables remote monitoring of patients' health parameters. Advanced sensor technologies allow for various smart healthcare applications such as diagnosing patients, forecasting health symptoms, predicting and analyzing diseases, and ontology-based recommendation. The advancement in wearable sensors, communication technologies, and AI-enabled algorithms contribute to efficient analysis and disease prediction.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Review Computer Science, Interdisciplinary Applications

Proactive Self-Healing Approaches in Mobile Edge Computing: A Systematic Literature Review

Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, Mohammed Adam Taheir, Omprakash Kaiwartya

Summary: The widespread use of technology has created a need for more advanced communication infrastructure, leading to the emergence of multi-access edge computing (MEC) as a solution. This paper focuses on proactive self-healing approaches in MEC environments and conducts a systematic literature review to identify and synthesize related studies. The review results highlight edge resource management methods, self-healing methods, and challenges in MEC, such as task offloading decisions, resource allocation, and security issues.

COMPUTERS (2023)

Article Engineering, Civil

GTSM--Graph-Transient Security Model for Intelligent Transportation System Information Exchange

Gunasekaran Manogaran, Reham Alsabet, Aashma Uprety, Danda B. Rawat

Summary: This article proposes a Graph-Transient Security Method (GTSM) to improve the cybersecurity features of Intelligent Transportation Systems (ITS). The method uses a trusted graph model to identify reliable infrastructure and neighboring units in communication, which helps enhance the network's security.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

Improved Multiresolution Neural Network for Mobility-Aware Security and Content Caching for Internet of Vehicles

Sunitha Safavat, Danda B. Rawat

Summary: In this article, a novel improved multinomial recurrent neural network (MRNN) classifier and Caesar combined key-based elliptic curve cryptography (2CK-ECC) algorithm are proposed to predict the vehicular mobility, security, and content caching for the Internet of Vehicles (IoV). Through steps including vehicle registration, login and authentication, mobility prediction, vehicle clustering, relay vehicle (RV) selection, data chunking and saving in cache memory, and secure data transmission using the 2CK-ECC algorithm, the proposed technique demonstrates better performance than existing baseline approaches.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Interdisciplinary Applications

An Improved Dandelion Optimizer Algorithm for Spam Detection: Next-Generation Email Filtering System

Mohammad Tubishat, Feras Al-Obeidat, Ali Safaa Sadiq, Seyedali Mirjalili

Summary: This paper introduces a novel approach to spam email detection by enhancing the Dandelion Optimizer algorithm. The authors propose a new local search algorithm and a reduction equation to improve the algorithm's performance in high-dimensional problems. They evaluate the improved algorithm using the Spam base dataset and compare it to other popular algorithms, showing superior performance in various metrics. The paper highlights the significant advancement made in the Improved DO algorithm and its potential for solving high-dimensional optimization problems.

COMPUTERS (2023)

Article Engineering, Civil

PGA-Net: Polynomial Global Attention Network With Mean Curvature Loss for Lane Detection

Qiankun Li, Xianwang Yu, Junxin Chen, Ben-Guo He, Wei Wang, Danda B. Rawat, Zhihan Lyu

Summary: In this work, a Polynomial Global Attention Network (PGA-Net) is proposed for lane detection, which can mine global road information and predict lane shape parameter formulas simultaneously. The lane shape is modeled using a cubic polynomial function, and the transformer-based DETR model is used to introduce context information for better regression of lane parameters. The method achieves state-of-the-art performance on popular benchmarks (TuSimple and LLAMAS) and a challenging benchmark (CULane), while also demonstrating accelerated speed and lightweight model size.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Recent Advances in Cybersecurity and Fraud Detection in Financial Services: A Survey

Aakriti Bajracharya, Barron Harvey, Danda B. Rawat

Summary: Cybersecurity issues have been receiving continuous attention from financial institutions and regulatory bodies, with cyberattacks escalating after the pandemic. Despite strong layered defenses, adversaries are determined to exploit new vulnerabilities, resulting in significant losses for the financial service industry. This paper analyzes the current state of cybersecurity risks and provides an extensive overview of evolving cybersecurity and fraud detection practices. It reviews new challenges in effective cybersecurity measures and financial fraud detection, and proposes potential directions for intelligent solutions against cyberattacks.

2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Energy-Efficient Resource Scheduling Using X-CNN and CD-SBO for SDN based MEC Enabled IoV

Sunitha Safavat, Danda B. Rawat

Summary: In this paper, an effective vehicle scheduling method centered on CD-SBO and X-CNN is proposed to leverage the computation abilities of vehicles' cache memory in vehicular networks. The method clusters vehicles using the KLD-KMA model, balances vehicle requests using the CD-SBO algorithm, transfers optimized requests to the cloud server through the gateway and SDN, extracts features from decomposed data and schedules vehicles using X-CNN classifier, and efficiently forwards results to targeted vehicles.

2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Performance Evaluation of Vehicular Wireless Communications in Terahertz Bands

Salomon Satche, Danda B. Rawat

Summary: In this paper, a method is proposed to determine the link performance of vehicle mobility and antenna orientation in the THz band. The Von Mises-Fisher method is used to find the PDF of vehicle movement, treating it as a 3-D oriented random walk, and the Cauchy PDF is used to find the joint distribution of diffusion coefficient and number of turns during the random walk. These PDFs are useful in analyzing two specific performances of the vehicular network link at the vehicle behavioral level. The performances are analyzed as a function of speeds and compared to existing approaches, providing improved trigger points for beam hand-off.

2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC (2023)

Review Computer Science, Information Systems

A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications

Abbas M. Al-Ghaili, Saraswathy Shamini Gunasekaran, Norziana Jamil, Zaid Abdi Alkareem Alyasseri, Naif Mohammed Al-Hada, Zul-Azri Bin Ibrahim, Asmidar Abu Bakar, Hairoladenan Kasim, Eghbal Hosseini, Ridha Omar, Rafiziana Md. Kasmani, Rina Azlin Razali

Summary: This article aims to survey and review recently published papers and research studies that use image processing techniques to enhance security and privacy in IoT applications. It provides insights on the role of image processing in improving the security of IoT applications and highlights the techniques applied for this purpose.

IEEE ACCESS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Intrusion Detection Systems Using Support Vector Machines on the KDDCUP'99 and NSL-KDD Datasets: A Comprehensive Survey

Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou

Summary: This research provides a comprehensive survey of intrusion detection techniques that utilize Support Vector Machines (SVMs) algorithms as classifiers. The study focuses on evaluations performed on the widely used KDDCUP'99 and NSL-KDD datasets and includes summaries of each method, as well as critical reviews highlighting their performance measures, strengths, and limitations.

INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 2 (2023)

No Data Available