Contextual Risk-based Decision Modeling for Vehicular Networks

Full Text (PDF, 509KB), PP.1-9

Views: 0 Downloads: 0

Author(s)

Vijey Thayananthan 1,* Riaz Ahmed Shaikh 1

1. Computer Science Department, King Abdulaziz University, Jeddah, Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.09.01

Received: 1 Jan. 2016 / Revised: 11 Mar. 2016 / Accepted: 2 Jun. 2016 / Published: 8 Sep. 2016

Index Terms

Decision Method, Risk Management, Vehicle context, Vehicular Networks

Abstract

A vehicular ad hoc network (VANET) is the emerging technology that allows the drivers to keep the road safety throughout the journey. In VANETs, vehicles can collaborate with each other by exchanging the messages. When these messages are incorrect, drivers will have to face many serious problems which include traffic congestion and minor to fatal road accidents. Therefore, drivers need a method which provides the correct decision using risk analysis calculated from the vehicle context. For this purpose, we propose a new contextual risk-based decision methodology for vehicular networks. This methodology can be used to provide robust and reliable decisions.

Cite This Paper

Vijey Thayananthan, Riaz Ahmed Shaikh, "Contextual Risk-based Decision Modeling for Vehicular Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.9, pp.1-9, 2016. DOI:10.5815/ijcnis.2016.09.01

Reference

[1]Wei, Y. C., and Chen, Y. M., “Adaptive Decision Making for Improving Trust Establishment in VANET”, in Proc. 16th Asia-Pacific Network Operation and Management Symposium, Taiwan, Sep 2014, pp. 1-4.
[2]Shaikh, R. A., and Alzahrani, A. S., “Intrusion-aware trust model for vehicular ad hoc networks”, Security and Communication Networks, vol. 7 (11), pp. 1652–1669, 2014.
[3]Cohen, R., Zhang, J., Finnson, J., Tran, T., and Minhas, U. F., “A Trust-Based Framework for Vehicular Travel with Non-Binary Reports and Its Validation via an Extensive Simulation Testbed”, Journal of Trust Management, vol. 1(1), pp. 1-31, 2014.
[4]De Fuentes, J. M., González-Manzano, L., González-Tablas, A. I., and Blasco, J., “Security models in Vehicular ad-hoc networks: A survey”, IETE Technical Review, 31(1), pp. 47-64, 2014.
[5]Stoneburner G, Goguen A, Feringa A., “Risk management guide for information technology systems”, Tech. Rep. SP 800e30. NIST; July 2002.
[6]Fitzgerald, E., and Landfeldt, B., “On Road Network Utility Based on Risk-Aware Link Choice”, in proc. 16th Int. IEEE Conf. on Intelligent Transportation Systems-(ITSC), pp. 991-997, 2013.
[7]Fitzgerald, E., and Landfeldt, B., “Increasing Road Traffic Throughput through Dynamic Traffic Accident Risk Mitigation”, Journal of Transportation Technologies, vol. 5, pp. 223-239, 2015.
[8]Boban, M., and Vinhoza, T. T.V., “Modeling and simulation of vehicular networks: Towards realistic and efficient models”, INTECH Open Access Publisher, 2011.
[9]García-Costa, C., Tomás-Gabarrón, J.B., Egea-López, E. and García-Haro, J., "Speeding Up the Evaluation of a Mathematical Model for VANETs Using OpenMP", Simulation and Modeling Methodologies, Technologies and Applications. Springer Berlin Heidelberg, pp. 23-37, 2013.
[10]Boban, M., Vinhoza, T. T. V., Barros, J., Ferreira, M. and Tonguz, O. K., “The impact of Vehicles as Obstacles in Vehicular Ad Hoc Networks”, IEEE Journal on Selected Areas in Communications 29(1), pp. 15–28, 2011.
[11]Moalla, R., Labiod, H., Lonc, B., and Simoni, N., “Risk Analysis Study of ITS Communication Architecture”, in proc. 3rd Int. Conf. on the Network of the Future, 2012.
[12]Vijey T., Alzahrani, A., and Qureshi, M. S., "Risk prediction system based on MIMO system for vehicle users", Life Science Journal, Vol. 10(4), pp. 3055-3061, 2013.
[13]Kristie, Y., Lee, J.D., and Regan, M.A., eds. Driver Distraction: Theory, Effects, and Mitigation. CRC Press, 2008.
[14]McKnight, A. James, and A. Scott McKnight. "The effect of cellular phone use upon driver attention." Accident Analysis and Prevention 25(3), pp. 259-265, 1993.
[15]Minhas U, Zhang J, Tran T, and Cohen R., “Towards expanded trust management for agents in vehicular ad-hoc networks”, Int. Journal of Computational Intelligence: Theory and Practice, 5(1), pp. 3–15, 2010.
[16]Moharrum M.A, and Al-Daraiseh A. A., “Toward Secure Vehicular Ad-hoc Networks: A Survey”, IETE Technical Review, vol. 29(1), pp. 80-89, 2012.
[17]Huang, Z., Ruj, S., Cavenaghi, M., and Nayak, A., "Limitations of Trust Management Schemes in VANET and Countermeasures", in proc. IEEE 22nd Int. Sym. on personal, indoor and mobile radio communications, pp. 1228-1232, 2011.
[18]Liu, H., Yang, L., Ding, S., and Shi, Y. “Logical Connectivity Prediction Models for VANET based on Nonlinear Regression and ELM: An Example of the AODV Protocol”, International Journal of Future Generation Communication and Networking, vol. 7(6), pp. 217-230, 2014.
[19]Ho, I. W. H., Leung, K. K., and Polak, J. W. “Stochastic Model and Connectivity Dynamics for VANETs in Signalized Road Systems”, IEEE/ACM Trans. on Networking, vol. 19(1), pp. 195-208, 2011.
[20]Dang, V. C., Kubo, M., Sato, H., Yamaguchi, A., and Namatame, A., “A Simple Braking Model for Detecting Incidents Locations by Smartphones”, in proc. 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), pp. 1-5, 2014.
[21]Zhao, G., and Wu, C. “Mathematical Modeling of Driver Speed Control With Individual Differences”, IEEE Trans. on Systems, Man., & Cybernetics: Systems, vol. 43(5), pp. 1091-1104, 2013.
[22]Dhar, S., Datta, S., Bera, R.N. and Ray, A. “Fast Vertical Handover Algorithm for Vehicular Communication: A
Holistic Approach”, International Journal of Computer Network and Information Security, 4(3), pp.8-15, 2012.
[23]Darus, M.Y. and Bakar, K.A. “Formal verification of congestion control algorithm in VANETs”, International Journal of Computer Network and Information Security, 5(4), pp.1-7, 2013.
[24]Joe, M.M., Shaji, R.S. and Kumar, K.A.”Establishing inter vehicle wireless communication in vanet and preventing it from hackers”, International Journal of Computer Network and Information Security, 5(8), pp.55-61, 2013.