{"id":117335,"date":"2018-03-11T10:46:47","date_gmt":"2018-03-11T10:46:47","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/contribuciones-a-la-eficiencia-en-el-encaminamiento-y-la-recogida-de-informacion-en-las-redes-vehiculares\/"},"modified":"2018-03-11T10:46:47","modified_gmt":"2018-03-11T10:46:47","slug":"contribuciones-a-la-eficiencia-en-el-encaminamiento-y-la-recogida-de-informacion-en-las-redes-vehiculares","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/radiocomunicaciones\/contribuciones-a-la-eficiencia-en-el-encaminamiento-y-la-recogida-de-informacion-en-las-redes-vehiculares\/","title":{"rendered":"Contribuciones a la eficiencia en el encaminamiento y la recogida de informaci\u00f3n en las redes vehiculares."},"content":{"rendered":"<h2>Tesis doctoral de <strong> Juan  Antonio Martinez Navarro <\/strong><\/h2>\n<p>Contribuciones a la eficiencia en el encaminamiento y la recogida de informaci\u00f3n en las redes vehiculares  el gran n\u00famero de accidentes causados en nuestras carreteras es una de las grandes preocupaciones que tienen nuestras as autoridades p\u00fablicas de tr\u00e1fico. Una de las tecnolog\u00edas emergentes que puede asistir en la conducci\u00f3n y que puede ayudar por tanto a reducir dichos accidentes es el de las redes vehiculares (vanets). \u00e9stas consisten b\u00e1sicamente en equipar a los veh\u00edculos con dispositivos de red inal\u00e1mbricos que les permite comunicarse entre ellos tan pronto entran dentro del rango de alcance.   en este sentido, el objetivo de esta tesis es el de proporcionar un avance en el estado del arte en el contexto de las vanets. Concretamente: en el encaminamiento:  \tanalizar y comprender las limitaciones en el encaminamiento en las vanets.  \tdise\u00f1ar un protocolo de encaminamiento mejorado.  \timplantar y evaluar el rendimiento de los protocolos de encaminamiento. en la seguridad:  \testudiar y analizar las diferentes amenazas y ataques presentes en las vanets.  \tanalizar las vulnerabilidades de los protocolos de encaminamiento respecto a estos ataques.  \tdesarrollar un mecanismo para reforzar el encaminamiento en entornos hostiles.  \testudiar los diferentes mecanismos de autenticaci\u00f3n para el acceso a la infraestructura.  \tanalizar las principales desventajas del proceso de autenticaci\u00f3n y proporcionar una soluci\u00f3n para hacer m\u00e1s liviano el proceso de autenticaci\u00f3n. por \u00faltimo, en el contexto de la recogida de informaci\u00f3n:  \tanalizar los protocolos de recogida de informaci\u00f3n actuales.  \tdise\u00f1ar un protocolo mejorado que reduzca el n\u00famero y tama\u00f1o de los mensajes transmitidos comprimiendo su contenido.  para ello se ha empleado la siguiente metodolog\u00eda: 1.\tAnalizar el estado del arte de las tecnolog\u00edas involucradas adquiriendo una definici\u00f3n precisa del problema a resolver. 2.\tAveriguar los fallos de dise\u00f1o y desventajas de la tecnolog\u00eda existente. 3.\tDefinir una nueva propuesta mejorada. 4.\tPor \u00faltimo se eval\u00faa esta propuesta compar\u00e1ndola con las soluciones existentes en la literatura para asegurar su buen comportamiento y obtener de este modo el beneficio obtenido por el uso de esta nueva soluci\u00f3n. la informaci\u00f3n obtenida en cada uno estos pasos puede retroalimentar la informaci\u00f3n obtenida haci\u00e9ndonos volver a pasos anteriores y ayud\u00e1ndonos a encontrar una soluci\u00f3n mejor.  a continuaci\u00f3n enumeramos los principales resultados obtenidos en el desarrollo de esta tesis.  \u00c2\u00a2\tbeacon-less routing algorithm for vehicular environments (brave). Protocolo de encaminamiento escalable y confiable que utiliza un esquema oportunista para seleccionar el siguiente nodo intermedio a reenviar un mensaje hacia un destino. La evaluaci\u00f3n de dicho protocolo mediante simulaciones ha arrojado un incremento en la tasa de env\u00edo de paquetes obteniendo casi un 90% incluso en escenarios dispersos. \u00c2\u00a2\ts-brave. Una propuesta para securizar el anterior protocolo y reforzar la tasa de env\u00edo de paquetes en entornos hostiles con nodos maliciosos. Entre otras aportaciones cabe destacar el uso de un mecanismo de intercambio de certificados as\u00ed como el uso de los nodos de guarda para vigilar la correcta transmisi\u00f3n de los paquetes a lo largo de la red. Hemos evaluado el rendimiento de esta propuesta y hemos obtenido un incremento en la tasa de env\u00edo de paquetes llegando a obtener hasta un 80%.  \u00c2\u00a2\thyb-brave. Hemos extendido brave para poder aprovechar las ventajas de la conexi\u00f3n a una red de infraestructura. Gracias a los diferentes elementos de conexi\u00f3n a dicha red hemos podido enriquecer el mecanismo de la toma de decisiones de encaminamiento. Reduciendo dr\u00e1sticamente el retardo en las transmisiones de paquetes.  \u00c2\u00a2\tuna propuesta eficiente para el control de acceso en vanet conectadas a la infraestructura. El protocolo propuesto se centra en reducir el tiempo que se tarda en obtener una autenticaci\u00f3n exitosa por parte de un veh\u00edculo cuando accede a un servicio de internet. Para ello proponemos el uso de un esquema de pre-autenticaci\u00f3n cuyo beneficio ha sido probado gracias a las simulaciones realizadas obteniendo una mejora de mas de un 50% con respecto a un esquema de autenticaci\u00f3n tradicional.  \u00c2\u00a2\tcompressed sensing based vehicular data harvesting (cs-vdh). Un protocolo de recogida de informaci\u00f3n en redes de sensores vehiculares (vsns). Este protocolo utiliza una t\u00e9cnica de compresi\u00f3n que pr\u00e1cticamente no incrementa el tama\u00f1o del mensaje enviado a pesar de a\u00f1adir nueva informaci\u00f3n y que es capaz de obtener una reconstrucci\u00f3n muy precisa de los valores originales como se ha podido verificar en las simulaciones realizadas.    contributions to the efficiency in routing and information harvesting for vehicular networks  the high number accidents happened in our roads is one of the greatest concerns that has our public traffic authorities. One of the emergent technologies that can assists drivers, and therefore can help in the decrease of such accidents is that of vehicular ad-hoc networks (vanets). They roughly consists of a series of vehicles equipped with wireless network interfaces which allow them to communicate with each other as they enter inside their radio range.  in this sense, the objective of this thesis is that of providing advance to the state of the art in the vanets context. Concretely: regarding routing in vanet we aim at:  \tanalysing and comprehending the limitations of routing in vanets.   \tdesigning an improved routing protocol.  \t?Implanting and evaluating the performance of routing protocols. regarding the security issue:  \tstudy and analyse the different security threats and attacks presents in vanets.  \tanalyse the vulnerabilities that routing protocols have against these attacks.   \tdevelop a mechanism to strengthen routing when malicious users are present.  \tstudy the different authentication mechanisms used when nodes access to the infrastructure network or to certain services.  \tanalyse the main drawbacks of this process and provide a solution which alleviate them. finally, regarding the gathering protocols:  \tanalysing the current gathering protocols.  \tdesigning an improved routing protocol able to reduce the amount of transmitted messages as well as their size by compressing the carried information. to do so, we have employed the following methodology: 1.\tAnalyse the state of the art of the involved technologies acquiring a precise definition of the problem to be addressed. 2.\tObtaining the main drawbacks and flaws of the existing technology. 3.\tDefine a new improvement proposal. 4.\tFinally, the new proposal is evaluated comparing it with existing solutions in the literature to validate it and measure the obtained benefit. the information obtained in each of these steps can also provide feedback making us to go back to previous steps helping us to tune the proposed solution.     next we enumerate the main results obtained in the development of this thesis.  \u00c2\u00a2\tbeacon-less routing algorithm for vehicular environments (brave). Very reliable and scalable routing protocol that uses an opportunistic approach to forward packets using intermediate nodes. By means of a simulation-based study, our approach shows up to 90% of high packet delivery ratio even in sparse scenarios.  \u00c2\u00a2\ts-brave. A routing proposal aimed at securing and reinforcing the packet delivery ratio under hostile scenarios with malicious nodes. Among the contributions it is worth highlighting the use of a certificate exchange mechanism as well as the use of guard nodes to watch the correct forwarding of the messages along the network. We evaluated the performance of this proposal by means of simulations and this technique increases the packet delivery ratio up to 80% in presence of attackers or malicious users. \u00c2\u00a2\t hyb-brave. We extended brave so as to take advantage of the connection to an infrastructure network. Our proposal takes advantage of rsus and aps deployed as well as other wireless interfaces to enrich the routing decision strategy. Our simulations proved the advantage of a hybrid network by increasing the delivery ratio and drastically decreasing the average delay per packet. \u00c2\u00a2\ta protocol to make the authentication process more agile against gateways. It uses a mechanism called pre-authentication by which a node already authenticated with a gateway uses it to start a new authentication process. The difference with the traditional scheme is that now the node uses the current gateway to start the authentication with the new one. This way, when a node changes from its current gateway to the new one, it will not waste its time in the authentication process making the most of it to communicate with the infrastructure network.  \u00c2\u00a2\tcompressed sensing based vehicular data harvesting (cs-vdh). A harvesting protocol used in vsns. This protocol uses an emergent compression technique developed in the field of the theory of information called compressed sensing (cs) whose main advantage is the possibil- ity to compress information adding new elements to it without hardly increase the size of the compressed information and also permitting an accurate reconstruction of the information. Our simulations prove this benefit reducing the control overhead in up to 2000 messages, providing also a compression of even 4.5 elements to 1 with an accurate reconstruction of the information.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Contribuciones a la eficiencia en el encaminamiento y la recogida de informaci\u00f3n en las redes vehiculares.<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Contribuciones a la eficiencia en el encaminamiento y la recogida de informaci\u00f3n en las redes vehiculares. <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Juan  Antonio Martinez Navarro <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Murcia<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 27\/03\/2015<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Pedro Miguel Ruiz Mart\u00ednez<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Juan  Carlos Cano escrib\u00e1 <\/li>\n<li>teresa Olivares montes (vocal)<\/li>\n<li>ivan Lequerica roca (vocal)<\/li>\n<li>Juan  Antonio S\u00e1nchez laguna (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Juan Antonio Martinez Navarro Contribuciones a la eficiencia en el encaminamiento y la recogida de informaci\u00f3n en [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[13880,8235,2488],"tags":[231252,231251,123284,62141,62368,65541],"class_list":["post-117335","post","type-post","status-publish","format-standard","hentry","category-informatica","category-murcia","category-radiocomunicaciones","tag-ivan-lequerica-roca","tag-juan-antonio-Martinez-navarro","tag-juan-antonio-sanchez-laguna","tag-juan-carlos-cano-escriba","tag-pedro-miguel-ruiz-Martinez","tag-teresa-olivares-montes"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/117335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=117335"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/117335\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=117335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=117335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=117335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}