Improving performance and data transmission security in VANETs

被引:12
作者
Zhang, SuYu [1 ]
Lagutkina, Margarita [2 ]
Akpinar, Kevser Ovaz [3 ]
Akpinar, Mustafa [4 ]
机构
[1] Wenzhou Polytech, Dept Informat Technol, Wenzhou, Zhejiang, Peoples R China
[2] RUDN Univ, Peoples Friendship Univ Russia, Dept Foreign Languages, Moscow, Russia
[3] Sakarya Univ, Dept Comp Engn, Esentepe Campus, TR-54187 Sakarya, Turkey
[4] Sakarya Univ, Dept Software Engn, Esentepe Campus, TR-54187 Sakarya, Turkey
关键词
Vehicular ad hoc networks; Big data; Support Vector Machine; Machine learning; 5G;
D O I
10.1016/j.comcom.2021.09.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article proposes a new approach to achieve fast and reliable transfer of data and uses machine learning techniques for data processing to improve the performance and data transmission security of the vehicular network. The proposed approach is the combination of 5G cellular network and alternative data transmission channels. The data collection experiment took place within different areas of the city of Berlin over a 3-month time period and involved the use of 5G technologies. The study carried out the analysis and classification of big data with the help of position-based routing protocols and the Support Vector Machine algorithms. The said techniques were employed to detect non-line-of-sight (NLoS) conditions in real time, which ensure the secure transmission of data without the loss or degradation of network performance. The novelty of the work is that it tackles various traffic scenarios (the extent of road congestion can affect the quality of big data transmission) and offers a way to improve big data transfer using the Support Vector Machine technology. The study results show that the proposed approach is effective enough with big data and can be employed to improve the performance of urban VANET networks and data transmission security. The study results can be useful in developing high-performance 5G-VANET applications to improve traffic safety in urban vehicular environments.
引用
收藏
页码:126 / 133
页数:8
相关论文
共 41 条
[1]  
Akpinar KO, 2020, 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), P79, DOI [10.1109/UBMK50275.2020.9219391, 10.1109/ubmk50275.2020.9219391]
[2]   Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection [J].
Akpinar, Kevser Ovaz ;
Ozcelik, Ibrahim .
IEEE ACCESS, 2019, 7 :184365-184374
[3]  
Akyol F.B., 2020, Sakarya University Journal of Computer and Information Sciences, V3, P98, DOI 10.35377/saucis.03.02. 722670
[4]   IoT transaction processing through cooperative concurrency control on fog-cloud computing environment [J].
Al-Qerem, Ahmad ;
Alauthman, Mohammad ;
Almomani, Ammar ;
Gupta, B. B. .
SOFT COMPUTING, 2020, 24 (08) :5695-5711
[5]  
Aslan M., 2020, Sak. Univ. J. Comput. Inf. Sci, DOI [10.35377/saucis.03.03.811480, DOI 10.35377/SAUCIS.03.03.811480]
[6]  
Bulat P. V., 2016, Math. Educ., V11, P2949
[7]  
Chu F, 2005, STUD FUZZ SOFT COMP, V177, P343
[8]   SDN Enabled 5G-VANET: Adaptive Vehicle Clustering and Beamformed Transmission for Aggregated Traffic [J].
Duan, Xiaoyu ;
Liu, Yanan ;
Wang, Xianbin .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (07) :120-127
[9]  
Dutta C., 2019, INT J COMPUT ENG TEC, V10, P110
[10]   Blockchain-based authentication and authorization for smart city applications [J].
Esposito, Christian ;
Ficco, Massimo ;
Gupta, Brij Bhooshan .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (02)