Have a personal or library account? Click to login
Using a Fuzzy-Bayesian Approach for Predicting the QoS in VANET Cover

Using a Fuzzy-Bayesian Approach for Predicting the QoS in VANET

Open Access
|Jan 2023

References

  1. [1] R. Bibi, Y. Saeed, A. Zeb, T. M. Ghazal, T. Rahman, R. A. Said, S. Abbas, M. Ahmad, and M. A. Khan, “Edge AI-based automated detection and classification of road anomalies in VANET using deep learning,” Computational Intelligence and Neuroscience, vol. 2021, Art. no. 6262194, Sep. 2021. https://doi.org/10.1155/2021/6262194849456434630550
  2. [2] M. Gayathri and C. Gomathy, “A deep survey on types of cyber attacks in VANET,” J Crit Rev, vol. 8, no. 1, pp. 1029–1039, 2021. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.jcreview.com/admin/Uploads/Files/61c07bf6658ea1.10579682.pdf
  3. [3] S. Lahdya and T. Mazri, “Security study of routing attacks in vehicular ad-hoc networks (autonomous car),” The International Archives of Photogrammetry, Remote Sensing and Spatial Information Sciences, vol. 46, pp. 349–353, 2021. https://doi.org/10.5194/isprs-archives-XLVI-4-W5-2021-349-2021
  4. [4] A. E. C. Mondragon, C. S. Lalwani, E. S. C. Mondragon, and C. E. C. Mondragon, “Facilitating multimodal logistics and enabling information systems connectivity through wireless vehicular networks,” International Journal of Production Economics, vol. 122, no. 1, pp. 229–240, Nov. 2009. https://doi.org/10.1016/j.ijpe.2009.05.023
  5. [5] J. I. Katuka and M. S. A. Latiff, “VANETs and its related issues: An extensive survey,” Journal of Theoretical & Applied Information Technology, vol. 66, no. 1, pp. 693–697, 2014.
  6. [6] P. Pandey, “Effect of selfish behavior on network performance in VANET,” in Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, Apr. 2015, pp. 693–697. https://doi.org/10.1109/CSNT.2015.63
  7. [7] S. Harrabi, I. B. Jaafar, and K. Ghedira, “Performance analysis of VANETs routing protocols,” Res. Square, Univ. Mannouba, Manouba, Tunisia, Tech. Rep., 2021.10.21203/rs.3.rs-487685/v1
  8. [8] E. Singh, “Mobility and scalability management issues in VANET,” Int J Adv Res Sci Eng, vol. 7, pp. 151–155, 2018.
  9. [9] A. Ahamed and H. Vakilzadian, “Issues and challenges in VANET routing protocols,” in Proc. IEEE Int. Conf. Electro/Inf. Technol. (EIT), Rochester, MI, USA, May 2018, pp. 723–728. https://doi.org/10.1109/EIT.2018.8500180
  10. [10] P. Mundhe, S. Verma, and S. Venkatesan, “A comprehensive survey on authentication and privacy-preserving schemes in VANETs,” Computer Science Review, vol. 41, Art. no. 100411, Aug. 2021. https://doi.org/10.1016/j.cosrev.2021.100411
  11. [11] J. Cui, D. Wu, J. Zhang, Y. Xu, and H. Zhong, “An efficient authentication scheme based on semi-trusted authority in VANETs,” IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2972–2986, Mar. 2019. https://doi.org/10.1109/TVT.2019.2896018
  12. [12] A. Quyoom, A. A. Mir, and A. Sarwar, “Security attacks and challenges of VANETs: a literature survey,” Journal of Multimedia Information System, vol. 7, no. 1, pp. 45–54, Mar. 2020. https://doi.org/10.33851/JMIS.2020.7.1.45
  13. [13] M. Arif, G. Wang, M. Z. A. Bhuiyan, T. Wang, and J. Chen, “A survey on security attacks in VANETs: Communication, applications and challenges,” Vehicular Communications, vol. 19, Art. no. 100179, Oct. 2019. https://doi.org/10.1016/j.vehcom.2019.100179
  14. [14] C. Sun, J. Liu, X. Xu, and J. Ma, “A privacy-preserving mutual authentication resisting dos attacks in VANETs,” IEEE Access, vol. 5, pp. 24012–24022, 2017. https://doi.org/10.1109/ACCESS.2017.2768499
  15. [15] I. A. Sumra, H. B. Hasbullah, and J.-l. B. AbManan, “Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey,” in Vehicular Ad-Hoc Networks for Smart Cities, vol. 306, A. Laouiti, A. Qayyum, M. S. Mohamad, Eds. Springer, Singapore, 2015, pp. 51–61. https://doi.org/10.1007/978-981-287-158-9_5
  16. [16] R. Kaur, T. P. Singh, and V. Khajuria, “Security issues in vehicular Adhoc network (VANET),” in 2018 2nd International conference on trends in Electronics and Informatics (ICOEI), Tirunelveli, India, May 2018, pp. 884–889. https://doi.org/10.1109/ICOEI.2018.8553852
  17. [17] M. Azees, P. Vijayakumar, and L. Jegatha Deborah, “Comprehensive survey on security services in vehicular ad-hoc networks,” IET Intelligent Transport Systems, vol. 10, no. 6, pp. 379–388, Aug. 2016. https://doi.org/10.1049/iet-its.2015.0072
  18. [18] M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Vehicular Communications, vol. 1, no. 2, pp. 53–66, Apr. 2014. https://doi.org/10.1016/j.vehcom.2014.05.001
  19. [19] J. Contreras-Castillo, S. Zeadally, and J. A. G Ibañez, “Solving vehicular ad hoc network challenges with big data solutions,” IET Networks, vol. 5, no. 4, pp. 81–84, Jul. 2016. https://doi.org/10.1049/iet-net.2016.0001
  20. [20] A. Mchergui, T. Moulahi, and S. Zeadally, “Survey on artificial intelligence (AI) techniques for vehicular ad-hoc networks (VANETs),” Vehicular Communications, vol. 34, Art. no. 100403, Apr. 2021. https://doi.org/10.1016/j.vehcom.2021.100403
  21. [21] R. Shrestha, R. Bajracharya, and S. Y. Nam, “Challenges of future VANET and cloud-based approaches,” Wireless Communications and Mobile Computing, vol. 2018, Art. no. 5603518, May 2018. https://doi.org/10.1155/2018/5603518
  22. [22] M. Pourkiani, S. Adabi, S. Jabbehdari, and A. Khademzadeh, “Improving QoS in VANETs: A survey,” Journal of Advances in Computer Engineering and Technology, vol. 3, no. 3, pp. 153–166, 2017.
  23. [23] M. Pourkiani, S. Jabbehdari, and A. Khademzadeh, “A novel protocol stack for improving QoS in vehicular networks,” International Journal of Computer Science and Information Security, vol. 14, no. 6, pp. 358–367, June 2016.
  24. [24] H. Fatemidokht and M. K. Rafsanjani, “QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks,” Journal of Systems and Software, vol. 165, Art. no. 110561, Jul. 2020. https://doi.org/10.1016/j.jss.2020.110561
  25. [25] A. Srivastava, S. Verma, N. Jhanjhi, M. Talib, A. Malhotra et al., “Analysis of quality of service in VANET,” IOP Conference Series: Materials Science and Engineering, vol. 993, no. 1, Art. no. 012061, 2020. https://doi.org/10.1088/1757-899X/993/1/012061
  26. [26] S. Tabar and A. Azadmanesh, “Quality of service in vehicular ad hoc networks,” in IAENG Transactions on Engineering Sciences: Special Issue for the International Association of Engineers Conferences 2016, World Scientific, 2018, pp. 388–401. https://doi.org/10.1142/9789813230774_0028
  27. [27] P. D. Dorge, S. S. Dorle, M. B. Chakole, and D. K. Thote, “Improvement of QoS in VANET with different mobility patterns,” in International Conference on Radar, Communication and Computing (ICRCC), Tiruvannamalai, India, Dec. 2012, pp. 206–209. https://doi.org/10.1109/ICRCC.2012.6450578
  28. [28] G. Parimala, S. Nageswararao, and K. LakshmiNadh, “Ddsrc: Algorithm for improving QoS in VANET,” International Journal of Recent Technology and Engineering (IJRTE), vol. 7, no. 6S5, pp. 1327–1331, Apr. 2019.
  29. [29] M. J. Sayadi, M. Fathy, and L. Mahaki, “Improving the quality of service in the VANET by detecting and removing unused messages,” International Journal of Information & Communication Technology Research, vol. 4, no. 3, pp. 107–112, 2012.
  30. [30] N. K. Kitson, A. C. Constantinou, Z. Guo, Y. Liu, and K. Chobtham, “A survey of Bayesian network structure learning,” arXiv preprint, arXiv:2109.11415, 2021. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://arxiv.org/ftp/arxiv/papers/2109/2109.11415.pdf
  31. [31] M. Scanagatta, A. Salmeron, and F. Stella, “A survey on Bayesian network structure learning from data,” Progress in Artificial Intelligence, vol. 8, no. 4, pp. 425–439, May 2019. https://doi.org/10.1007/s13748-019-00194-y
  32. [32] N. R. Siddiqui, K. A. Khaliq, and J. Pannek, “VANET security analysis on the basis of attacks in authentication,” in Dynamics in Logistics, Lecture Notes in Logistics, M. H. Kotzab and J. Pannek, Eds. Springer, 2017, pp. 491–502. https://doi.org/10.1007/978-3-319-45117-6_43
  33. [33] K. B. Kelarestaghi, M. Foruhandeh, K. Heaslip, and R. Gerdes, “Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures,” arXiv preprint, arXiv:1903.01541, 2019. chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://arxiv.org/ftp/arxiv/papers/1903/1903.01541.pdf
  34. [34] M. B. Mansour, C. Salama, H. K. Mohamed, and S. A. Hammad, “VANET security and privacy-an overview,” International Journal of Network Security & Its Applications (IJNSA), vol. 10, no. 2, Mar. 2018. https://doi.org/10.2139/ssrn.3290553
  35. [35] G.-U. Rehman, A. Ghani, S. Muhammad, M. Singh, and D. Singh, “Selfishness in vehicular delay-tolerant networks: A review,” Sensors, vol. 20, no. 10, Art. no. 3000, 2020. https://doi.org/10.3390/s20103000728550432466315
  36. [36] A. Reyes, C. Barrado, M. Lopez, and C. Excelente, “Vehicle density in VANET applications,” Journal of Ambient Intelligence and Smart Environments, vol. 6, no. 4, pp. 469–481, 2014. https://doi.org/10.3233/AIS-140271
  37. [37] A. V. Ostroukh and H. Elhadi, “Comparative study of routing protocols in vehicular ad-hoc networks (VANETs),” International Journal of Advanced Studies (iJAS), vol. 4, no. 2, pp. 9–14, 2014. https://doi.org/10.12731/2227-930X-2014-2-2
  38. [38] C. Tripp-Barba, M. A. Igartua, L. U. Aguiar, A. M. Mezher, A. Zaldívar-Colado, and I. Guerin-Lassous, “Available bandwidth estimation in GPSR for VANETs,” in Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, Nov. 2013, pp. 1–8. https://doi.org/10.1145/2512921.2516961
  39. [39] T. Takagi and M. Sugeno, “Fuzzy identification of systems and its applications to modeling and control,” IEEE transactions on systems, man, and cybernetics, vol. SMC-15, no. 1, pp. 116–132, Jan.-Feb. 1985. https://doi.org/10.1109/TSMC.1985.6313399
  40. [40] K. A. Hafeez, L. Zhao, Z. Liao, and B. N.-W. Ma, “The optimal radio propagation model in VANET,” in 2009 Fourth International Conference on Systems and Networks Communications. Porto, Portugal, Sep. 2009, pp. 6–11. https://doi.org/10.1109/ICSNC.2009.101
  41. [41] F. Li, W. Chen, and Y. Shui, “Study on connectivity probability of VANETs under adverse weather conditions at 5.9 Ghz,” IEEE Access, vol. 8, pp. 547–555, Dec. 2019. https://doi.org/10.1109/ACCESS.2019.2962089
  42. [42] M. C. Surugiu and I. N. Stancel, “Monitoring and warning system of a route based on roadside sensors in VANET,” Procedia Manufacturing, vol. 32, pp. 745–752, 2019. https://doi.org/10.1016/j.promfg.2019.02.281
  43. [43] S. Abdelhamid, H. S. Hassanein, and G. Takahara, “Vehicle as a resource (VaaR),” IEEE Network, vol. 29, no. 1, pp. 12–17, Jan. 2015. https://doi.org/10.1109/MNET.2015.7018198
  44. [44] N. Mohamed, S. Sahib, N. Suryana, and B. Hussin, “Understanding network congestion effects on performance-articles review,” Journal of Theoretical and Applied Information Technology, vol. 92, no. 2, Art. no. 311, 2016.
  45. [45] R. Chen, Z. Sheng, Z. Zhong, M. Ni, D. G. Michelson, and V. C. Leung, “Analysis on connectivity performance for vehicular ad hoc networks subjected to user behavior,” in 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). Dubrovnik, Croatia, Aug. 2015, pp. 26–31. https://doi.org/10.1109/IWCMC.2015.7288932
  46. [46] R. K. Aswed and M. A. Abdala, “End-to-end delay enhancement with aodv in VANET,” International Journal of Enhanced Research in Science, Technology & Engineering, vol. 3, no. 11, pp. 227–232, Nov. 2014,
  47. [47] S. Renooij, “Probability elicitation for belief networks: issues to consider,” The Knowledge Engineering Review, vol. 16, no. 3, pp. 255–269, Feb. 2001. https://doi.org/10.1017/S0269888901000145
  48. [48] H. Sattar, I. S. Bajwa, J. Muhammad, M. F. Mushtaq, R. Kazmi, M. Akram, M. Ashraf, U. Shafi et al., “Smart wound hydration monitoring using biosensors and fuzzy inference system,” Wireless Communications and Mobile Computing, vol. 2019, Art. no. 8059629, 2019. https://doi.org/10.1155/2019/8059629
  49. [49] M.-D. Pop, O. Prostean, T.-M. David, and G. Prostean, “Hybrid solution combining Kalman filtering with Takagi–Sugeno fuzzy inference system for online car-following model calibration,” Sensors, vol. 20, no. 19, Art. no. 5539, Sep. 2020. https://doi.org/10.3390/s20195539758267332992622
  50. [50] E. H. Mamdani and S. Assilian, “An experiment in linguistic synthesis with a fuzzy logic controller,” International Journal of Man-Machine Studies, vol. 7, no. 1, pp. 1–13, 1975. https://doi.org/10.1016/S0020-7373(75)80002-2
  51. [51] M. H. Rad and M. Abdolrazzagh-Nezhad, “Data cube clustering with improved DBSCAN based on fuzzy logic and genetic algorithm: Designing and improving data cube clustering,” Information Technology and Control, vol. 49, no. 1, pp. 127–143, Mar. 2020. https://doi.org/10.5755/j01.itc.49.1.23780
  52. [52] A. Omar, A. Aous, A. Ali, and S. S. Balasem, “Comparison between the effects of different types of membership functions on fuzzy logic controller performance,” International Journal of Emerging Engineering Research and Technology, vol. 76, pp. 76–83, 2015.
  53. [53] S. N. Mandal, J. P. Choudhury, and S. B. Chaudhuri, “In search of suitable fuzzy membership function in prediction of time series data,” International Journal of Computer Science Issues, vol. 9, no. 3, pp. 293–302, 2012.
  54. [54] K.-R. Liu, J.-Y. Kuo, K. Yeh, C.-W. Chen, H.-H. Liang, and Y.-H. Sun, “Using fuzzy logic to generate conditional probabilities in Bayesian belief networks: a case study of ecological assessment,” International Journal of Environmental Science and Technology, vol. 12, no. 3, pp. 871–884, Dec. 2015. https://doi.org/10.1007/s13762-013-0459-x
  55. [55] V. Zarikas, E. Papageorgiou, and P. Regner, “Bayesian network construction using a fuzzy rule based approach for medical decision support,” Expert Systems, vol. 32, no. 3, pp. 344–369, Jun. 2015. https://doi.org/10.1111/exsy.12089
  56. [56] O. E. Bouhadi, M. Azmani, A. Azmani, and M. A. el ftouh, “Using a fuzzy-Bayesian approach for predictive analysis of delivery delay risk,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 7, pp. 316–326, 2022. https://doi.org/10.14569/IJACSA.2022.0130740
DOI: https://doi.org/10.2478/acss-2022-0011 | Journal eISSN: 2255-8691 | Journal ISSN: 2255-8683
Language: English
Page range: 101 - 109
Published on: Jan 24, 2023
Published by: Riga Technical University
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2023 Hafida Khalfaoui, Abdellah Azmani, Abderrazak Farchane, Said Safi, published by Riga Technical University
This work is licensed under the Creative Commons Attribution 4.0 License.