Uneingeschränkter Zugang

Using a Fuzzy-Bayesian Approach for Predicting the QoS in VANET


Zitieren

[1] R. Bibi, Y. Saeed, A. Zeb, T. M. Ghazal, T. Rahman, R. A. Said, S. Abbas, M. Ahmad, and M. A. Khan, “Edge AI-based automated detection and classification of road anomalies in VANET using deep learning,” Computational Intelligence and Neuroscience, vol. 2021, Art. no. 6262194, Sep. 2021. https://doi.org/10.1155/2021/6262194849456434630550 Search in Google Scholar

[2] M. Gayathri and C. Gomathy, “A deep survey on types of cyber attacks in VANET,” J Crit Rev, vol. 8, no. 1, pp. 1029–1039, 2021. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.jcreview.com/admin/Uploads/Files/61c07bf6658ea1.10579682.pdf Search in Google Scholar

[3] S. Lahdya and T. Mazri, “Security study of routing attacks in vehicular ad-hoc networks (autonomous car),” The International Archives of Photogrammetry, Remote Sensing and Spatial Information Sciences, vol. 46, pp. 349–353, 2021. https://doi.org/10.5194/isprs-archives-XLVI-4-W5-2021-349-2021 Search in Google Scholar

[4] A. E. C. Mondragon, C. S. Lalwani, E. S. C. Mondragon, and C. E. C. Mondragon, “Facilitating multimodal logistics and enabling information systems connectivity through wireless vehicular networks,” International Journal of Production Economics, vol. 122, no. 1, pp. 229–240, Nov. 2009. https://doi.org/10.1016/j.ijpe.2009.05.023 Search in Google Scholar

[5] J. I. Katuka and M. S. A. Latiff, “VANETs and its related issues: An extensive survey,” Journal of Theoretical & Applied Information Technology, vol. 66, no. 1, pp. 693–697, 2014. Search in Google Scholar

[6] P. Pandey, “Effect of selfish behavior on network performance in VANET,” in Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, Apr. 2015, pp. 693–697. https://doi.org/10.1109/CSNT.2015.63 Search in Google Scholar

[7] S. Harrabi, I. B. Jaafar, and K. Ghedira, “Performance analysis of VANETs routing protocols,” Res. Square, Univ. Mannouba, Manouba, Tunisia, Tech. Rep., 2021.10.21203/rs.3.rs-487685/v1 Search in Google Scholar

[8] E. Singh, “Mobility and scalability management issues in VANET,” Int J Adv Res Sci Eng, vol. 7, pp. 151–155, 2018. Search in Google Scholar

[9] A. Ahamed and H. Vakilzadian, “Issues and challenges in VANET routing protocols,” in Proc. IEEE Int. Conf. Electro/Inf. Technol. (EIT), Rochester, MI, USA, May 2018, pp. 723–728. https://doi.org/10.1109/EIT.2018.8500180 Search in Google Scholar

[10] P. Mundhe, S. Verma, and S. Venkatesan, “A comprehensive survey on authentication and privacy-preserving schemes in VANETs,” Computer Science Review, vol. 41, Art. no. 100411, Aug. 2021. https://doi.org/10.1016/j.cosrev.2021.100411 Search in Google Scholar

[11] J. Cui, D. Wu, J. Zhang, Y. Xu, and H. Zhong, “An efficient authentication scheme based on semi-trusted authority in VANETs,” IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2972–2986, Mar. 2019. https://doi.org/10.1109/TVT.2019.2896018 Search in Google Scholar

[12] A. Quyoom, A. A. Mir, and A. Sarwar, “Security attacks and challenges of VANETs: a literature survey,” Journal of Multimedia Information System, vol. 7, no. 1, pp. 45–54, Mar. 2020. https://doi.org/10.33851/JMIS.2020.7.1.45 Search in Google Scholar

[13] M. Arif, G. Wang, M. Z. A. Bhuiyan, T. Wang, and J. Chen, “A survey on security attacks in VANETs: Communication, applications and challenges,” Vehicular Communications, vol. 19, Art. no. 100179, Oct. 2019. https://doi.org/10.1016/j.vehcom.2019.100179 Search in Google Scholar

[14] C. Sun, J. Liu, X. Xu, and J. Ma, “A privacy-preserving mutual authentication resisting dos attacks in VANETs,” IEEE Access, vol. 5, pp. 24012–24022, 2017. https://doi.org/10.1109/ACCESS.2017.2768499 Search in Google Scholar

[15] I. A. Sumra, H. B. Hasbullah, and J.-l. B. AbManan, “Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey,” in Vehicular Ad-Hoc Networks for Smart Cities, vol. 306, A. Laouiti, A. Qayyum, M. S. Mohamad, Eds. Springer, Singapore, 2015, pp. 51–61. https://doi.org/10.1007/978-981-287-158-9_5 Search in Google Scholar

[16] R. Kaur, T. P. Singh, and V. Khajuria, “Security issues in vehicular Adhoc network (VANET),” in 2018 2nd International conference on trends in Electronics and Informatics (ICOEI), Tirunelveli, India, May 2018, pp. 884–889. https://doi.org/10.1109/ICOEI.2018.8553852 Search in Google Scholar

[17] M. Azees, P. Vijayakumar, and L. Jegatha Deborah, “Comprehensive survey on security services in vehicular ad-hoc networks,” IET Intelligent Transport Systems, vol. 10, no. 6, pp. 379–388, Aug. 2016. https://doi.org/10.1049/iet-its.2015.0072 Search in Google Scholar

[18] M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Vehicular Communications, vol. 1, no. 2, pp. 53–66, Apr. 2014. https://doi.org/10.1016/j.vehcom.2014.05.001 Search in Google Scholar

[19] J. Contreras-Castillo, S. Zeadally, and J. A. G Ibañez, “Solving vehicular ad hoc network challenges with big data solutions,” IET Networks, vol. 5, no. 4, pp. 81–84, Jul. 2016. https://doi.org/10.1049/iet-net.2016.0001 Search in Google Scholar

[20] A. Mchergui, T. Moulahi, and S. Zeadally, “Survey on artificial intelligence (AI) techniques for vehicular ad-hoc networks (VANETs),” Vehicular Communications, vol. 34, Art. no. 100403, Apr. 2021. https://doi.org/10.1016/j.vehcom.2021.100403 Search in Google Scholar

[21] R. Shrestha, R. Bajracharya, and S. Y. Nam, “Challenges of future VANET and cloud-based approaches,” Wireless Communications and Mobile Computing, vol. 2018, Art. no. 5603518, May 2018. https://doi.org/10.1155/2018/5603518 Search in Google Scholar

[22] M. Pourkiani, S. Adabi, S. Jabbehdari, and A. Khademzadeh, “Improving QoS in VANETs: A survey,” Journal of Advances in Computer Engineering and Technology, vol. 3, no. 3, pp. 153–166, 2017. Search in Google Scholar

[23] M. Pourkiani, S. Jabbehdari, and A. Khademzadeh, “A novel protocol stack for improving QoS in vehicular networks,” International Journal of Computer Science and Information Security, vol. 14, no. 6, pp. 358–367, June 2016. Search in Google Scholar

[24] H. Fatemidokht and M. K. Rafsanjani, “QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks,” Journal of Systems and Software, vol. 165, Art. no. 110561, Jul. 2020. https://doi.org/10.1016/j.jss.2020.110561 Search in Google Scholar

[25] A. Srivastava, S. Verma, N. Jhanjhi, M. Talib, A. Malhotra et al., “Analysis of quality of service in VANET,” IOP Conference Series: Materials Science and Engineering, vol. 993, no. 1, Art. no. 012061, 2020. https://doi.org/10.1088/1757-899X/993/1/012061 Search in Google Scholar

[26] S. Tabar and A. Azadmanesh, “Quality of service in vehicular ad hoc networks,” in IAENG Transactions on Engineering Sciences: Special Issue for the International Association of Engineers Conferences 2016, World Scientific, 2018, pp. 388–401. https://doi.org/10.1142/9789813230774_0028 Search in Google Scholar

[27] P. D. Dorge, S. S. Dorle, M. B. Chakole, and D. K. Thote, “Improvement of QoS in VANET with different mobility patterns,” in International Conference on Radar, Communication and Computing (ICRCC), Tiruvannamalai, India, Dec. 2012, pp. 206–209. https://doi.org/10.1109/ICRCC.2012.6450578 Search in Google Scholar

[28] G. Parimala, S. Nageswararao, and K. LakshmiNadh, “Ddsrc: Algorithm for improving QoS in VANET,” International Journal of Recent Technology and Engineering (IJRTE), vol. 7, no. 6S5, pp. 1327–1331, Apr. 2019. Search in Google Scholar

[29] M. J. Sayadi, M. Fathy, and L. Mahaki, “Improving the quality of service in the VANET by detecting and removing unused messages,” International Journal of Information & Communication Technology Research, vol. 4, no. 3, pp. 107–112, 2012. Search in Google Scholar

[30] N. K. Kitson, A. C. Constantinou, Z. Guo, Y. Liu, and K. Chobtham, “A survey of Bayesian network structure learning,” arXiv preprint, arXiv:2109.11415, 2021. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://arxiv.org/ftp/arxiv/papers/2109/2109.11415.pdf Search in Google Scholar

[31] M. Scanagatta, A. Salmeron, and F. Stella, “A survey on Bayesian network structure learning from data,” Progress in Artificial Intelligence, vol. 8, no. 4, pp. 425–439, May 2019. https://doi.org/10.1007/s13748-019-00194-y Search in Google Scholar

[32] N. R. Siddiqui, K. A. Khaliq, and J. Pannek, “VANET security analysis on the basis of attacks in authentication,” in Dynamics in Logistics, Lecture Notes in Logistics, M. H. Kotzab and J. Pannek, Eds. Springer, 2017, pp. 491–502. https://doi.org/10.1007/978-3-319-45117-6_43 Search in Google Scholar

[33] K. B. Kelarestaghi, M. Foruhandeh, K. Heaslip, and R. Gerdes, “Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures,” arXiv preprint, arXiv:1903.01541, 2019. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://arxiv.org/ftp/arxiv/papers/1903/1903.01541.pdf Search in Google Scholar

[34] M. B. Mansour, C. Salama, H. K. Mohamed, and S. A. Hammad, “VANET security and privacy-an overview,” International Journal of Network Security & Its Applications (IJNSA), vol. 10, no. 2, Mar. 2018. https://doi.org/10.2139/ssrn.3290553 Search in Google Scholar

[35] G.-U. Rehman, A. Ghani, S. Muhammad, M. Singh, and D. Singh, “Selfishness in vehicular delay-tolerant networks: A review,” Sensors, vol. 20, no. 10, Art. no. 3000, 2020. https://doi.org/10.3390/s20103000728550432466315 Search in Google Scholar

[36] A. Reyes, C. Barrado, M. Lopez, and C. Excelente, “Vehicle density in VANET applications,” Journal of Ambient Intelligence and Smart Environments, vol. 6, no. 4, pp. 469–481, 2014. https://doi.org/10.3233/AIS-140271 Search in Google Scholar

[37] A. V. Ostroukh and H. Elhadi, “Comparative study of routing protocols in vehicular ad-hoc networks (VANETs),” International Journal of Advanced Studies (iJAS), vol. 4, no. 2, pp. 9–14, 2014. https://doi.org/10.12731/2227-930X-2014-2-2 Search in Google Scholar

[38] C. Tripp-Barba, M. A. Igartua, L. U. Aguiar, A. M. Mezher, A. Zaldívar-Colado, and I. Guerin-Lassous, “Available bandwidth estimation in GPSR for VANETs,” in Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, Nov. 2013, pp. 1–8. https://doi.org/10.1145/2512921.2516961 Search in Google Scholar

[39] T. Takagi and M. Sugeno, “Fuzzy identification of systems and its applications to modeling and control,” IEEE transactions on systems, man, and cybernetics, vol. SMC-15, no. 1, pp. 116–132, Jan.-Feb. 1985. https://doi.org/10.1109/TSMC.1985.6313399 Search in Google Scholar

[40] K. A. Hafeez, L. Zhao, Z. Liao, and B. N.-W. Ma, “The optimal radio propagation model in VANET,” in 2009 Fourth International Conference on Systems and Networks Communications. Porto, Portugal, Sep. 2009, pp. 6–11. https://doi.org/10.1109/ICSNC.2009.101 Search in Google Scholar

[41] F. Li, W. Chen, and Y. Shui, “Study on connectivity probability of VANETs under adverse weather conditions at 5.9 Ghz,” IEEE Access, vol. 8, pp. 547–555, Dec. 2019. https://doi.org/10.1109/ACCESS.2019.2962089 Search in Google Scholar

[42] M. C. Surugiu and I. N. Stancel, “Monitoring and warning system of a route based on roadside sensors in VANET,” Procedia Manufacturing, vol. 32, pp. 745–752, 2019. https://doi.org/10.1016/j.promfg.2019.02.281 Search in Google Scholar

[43] S. Abdelhamid, H. S. Hassanein, and G. Takahara, “Vehicle as a resource (VaaR),” IEEE Network, vol. 29, no. 1, pp. 12–17, Jan. 2015. https://doi.org/10.1109/MNET.2015.7018198 Search in Google Scholar

[44] N. Mohamed, S. Sahib, N. Suryana, and B. Hussin, “Understanding network congestion effects on performance-articles review,” Journal of Theoretical and Applied Information Technology, vol. 92, no. 2, Art. no. 311, 2016. Search in Google Scholar

[45] R. Chen, Z. Sheng, Z. Zhong, M. Ni, D. G. Michelson, and V. C. Leung, “Analysis on connectivity performance for vehicular ad hoc networks subjected to user behavior,” in 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). Dubrovnik, Croatia, Aug. 2015, pp. 26–31. https://doi.org/10.1109/IWCMC.2015.7288932 Search in Google Scholar

[46] R. K. Aswed and M. A. Abdala, “End-to-end delay enhancement with aodv in VANET,” International Journal of Enhanced Research in Science, Technology & Engineering, vol. 3, no. 11, pp. 227–232, Nov. 2014, Search in Google Scholar

[47] S. Renooij, “Probability elicitation for belief networks: issues to consider,” The Knowledge Engineering Review, vol. 16, no. 3, pp. 255–269, Feb. 2001. https://doi.org/10.1017/S0269888901000145 Search in Google Scholar

[48] H. Sattar, I. S. Bajwa, J. Muhammad, M. F. Mushtaq, R. Kazmi, M. Akram, M. Ashraf, U. Shafi et al., “Smart wound hydration monitoring using biosensors and fuzzy inference system,” Wireless Communications and Mobile Computing, vol. 2019, Art. no. 8059629, 2019. https://doi.org/10.1155/2019/8059629 Search in Google Scholar

[49] M.-D. Pop, O. Prostean, T.-M. David, and G. Prostean, “Hybrid solution combining Kalman filtering with Takagi–Sugeno fuzzy inference system for online car-following model calibration,” Sensors, vol. 20, no. 19, Art. no. 5539, Sep. 2020. https://doi.org/10.3390/s20195539758267332992622 Search in Google Scholar

[50] E. H. Mamdani and S. Assilian, “An experiment in linguistic synthesis with a fuzzy logic controller,” International Journal of Man-Machine Studies, vol. 7, no. 1, pp. 1–13, 1975. https://doi.org/10.1016/S0020-7373(75)80002-2 Search in Google Scholar

[51] M. H. Rad and M. Abdolrazzagh-Nezhad, “Data cube clustering with improved DBSCAN based on fuzzy logic and genetic algorithm: Designing and improving data cube clustering,” Information Technology and Control, vol. 49, no. 1, pp. 127–143, Mar. 2020. https://doi.org/10.5755/j01.itc.49.1.23780 Search in Google Scholar

[52] A. Omar, A. Aous, A. Ali, and S. S. Balasem, “Comparison between the effects of different types of membership functions on fuzzy logic controller performance,” International Journal of Emerging Engineering Research and Technology, vol. 76, pp. 76–83, 2015. Search in Google Scholar

[53] S. N. Mandal, J. P. Choudhury, and S. B. Chaudhuri, “In search of suitable fuzzy membership function in prediction of time series data,” International Journal of Computer Science Issues, vol. 9, no. 3, pp. 293–302, 2012. Search in Google Scholar

[54] K.-R. Liu, J.-Y. Kuo, K. Yeh, C.-W. Chen, H.-H. Liang, and Y.-H. Sun, “Using fuzzy logic to generate conditional probabilities in Bayesian belief networks: a case study of ecological assessment,” International Journal of Environmental Science and Technology, vol. 12, no. 3, pp. 871–884, Dec. 2015. https://doi.org/10.1007/s13762-013-0459-x Search in Google Scholar

[55] V. Zarikas, E. Papageorgiou, and P. Regner, “Bayesian network construction using a fuzzy rule based approach for medical decision support,” Expert Systems, vol. 32, no. 3, pp. 344–369, Jun. 2015. https://doi.org/10.1111/exsy.12089 Search in Google Scholar

[56] O. E. Bouhadi, M. Azmani, A. Azmani, and M. A. el ftouh, “Using a fuzzy-Bayesian approach for predictive analysis of delivery delay risk,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 7, pp. 316–326, 2022. https://doi.org/10.14569/IJACSA.2022.0130740 Search in Google Scholar

eISSN:
2255-8691
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
2 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Künstliche Intelligenz, Informationstechnik, Projektmanagement, Softwareentwicklung