Master of Informatics
scholar.ppu.edu/handle/123456789/44
2024-03-28T18:52:45ZA Scalable Cluster Position-Based Routing Protocol for VANET
scholar.ppu.edu/handle/123456789/8831
A Scalable Cluster Position-Based Routing Protocol for VANET
Qasrawi, Hiba
Due to the rapid development of wireless communication technology and the growing demand
for services, it is expected that the emergence of Vehicular Ad hoc Networks (VANET)s would
enable a variety of applications such as driver assistance, traffic efficiency, and road safety.
Frequent changes that occur in the network often leads to major challenges in VANET, such as
dynamic topology changes, shortest routing paths and also scalability due to the high dynamic
topology where the number of vehicles on the road increases and decreases rapidly. One of the
best solutions for such challenges is to divide the network into clusters and then choose a Cluster
Head (CH) in each cluster to ensure appropriate message transmission in the VANET. In order
to resolve the network scalability issue and accommodate additional applications in VANETs,
efficient clustering methods are suggested. Because only the CH communicates with the Road
Side Units (RSU) and delivers relevant messages, there is a potential reduction in the
communication overhead between RSUs and other VANET components. However, clustering
algorithms are necessary to ensure the stability of the cluster because of the dynamic nature of
VANETs' network topology. The selection of CH is a crucial step in the clustering process.
In order to improve cluster stability and data transmission efficiency, this thesis proposes a
Clustering technique based on Ad hoc On-Demand Distance Vector routing protocol (AODVC) for VANETs that is cluster position-based. It also implements Vehicle-to-Vehicle (V2V)
and CH-to-RSU communication. We also provided an approach for choosing a suitable vehicle
to serve as the CH. The distance the vehicle is from the cluster boundary and its average speed
are considered when choosing the CH.
Our proposed protocol is implemented using the OMNeT++ 5.5.1 simulator, the simulation
results show that the suggested technique enhances some important metrics such as packet
delivery fraction, the number of control packets transmitted for each delivered data packets,
average path length, and average route latency when compared with the standard AODV in
terms of node mobility speed, node density, number of clusters, and network sizes. Where the
simulation results show that the AODV-C protocol outperforms AODV in terms of reliability
by around 12% for increasing vehicle speed, 23% for increasing vehicle number, 10% for
increasing network size and local traffic, and 20% for increasing cluster number. In addition,
improved latency by 10% for increasing vehicle speed, 13% for increasing vehicle number, 10%
for expanding network size, 11% for increasing local traffic, and 12% for increasing cluster
number.
The proposed protocol guarantees scalability by having a good packet delivery fraction and low
control packets transmitted for each delivered data packets even when the network size increase
and the number of vehicles along with their speeds increase too.
XIV
Keywords: Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs),
clustering.
CD, no of pages 78, informatics 4/2022, 31164
2022-12-01T00:00:00ZQuality of Service Position based Routing Protocol for Wireless Body Area Networks
scholar.ppu.edu/handle/123456789/8762
Quality of Service Position based Routing Protocol for Wireless Body Area Networks
Hashlamoun, Lubna
Wireless Body Area Networks (WBAN)s are gaining popularity, as real-time diagnosis and
electronic therapy of patients are two key components driving the healthcare field. In addition to
the digital technologies involved in this diagnosis, such as the Internet of Things (IoT). The
importance of this network appeared during the COVID-19 pandemic, in which patients can
treated remotely when the risk of infection spread is high. Besides "traditional" applications such
as military, and sports training. Routing in WBAN networks remains a key issue since without
properly functioning routing protocols. Unfortunately, routing may also be one of the most difficult
areas to protect patients in critical situations. This is due to the high probability of delay and link
failure, since the nature of the human body movement and thus changing the location of the
network parts. With the wide spread of WBANs, the need for quality of serving their routing
protocols emerges as a very important issue that is not easy to tackle. Many of the demands of
network Quality of Service (QoS) conflict with the demands of mobility nodes in the network due
to the nature of the body movement (e.g., low power consumption and low processing load). The
concept and structure of WBAN make them highly prone to network failure several techniques
that consume more energy, increase delay, and decrease the reliability of data. Our research has
focused on the reliability and latency of services provided by static or mobile nodes. Our newly
proposed protocol is a hybrid QoS Position-based Routing protocol (QPR) tries to save network
bandwidth and nodes memory in WBANs that introducing a classification of data priority and
nodes mobility (QPR). QPR classifies the type of data sensed as critical or normal. When data is
critical and nodes are static, data directly transmitted to the sink to guarantee low latency.
Additionally, it tries to improve network reliability by employing a multipath strategy when the
data is critical and the nodes are mobile. The performance of QPR has compared to two other
existing routing protocols: we chose the Ad hoc On-demand Distance Vector Routing (AODV),
because the researchers used it as a benchmark in research. Another protocol we chose the
Multipath Rings Routing (MPRR), because is a new protocol that gives good performance in
addition the implementation code is available in our simulator. After studying the previous
protocols, we conclude that AODV provides an efficient route in normal traffic without
consideration of a dynamic change of position of the node. However, it fails when the data is
critical with mobility occurs. The MPRR achieves a reasonable level of mobility, but it needs high
overhead and the need for extra delay. This comparison has been conducting using the
OMNeT++/Castalia simulator. Simulation results showed that the QPR protocol improves
reliability by around 54% and around 19% latency compared with AODV. In addition, improves
reliability by around 19%, and around 17% latency compared with MPRR, considering high nodes
mobility, a large number of nodes and a large percentage of critical data sent between these nodes.
CD, no of pages 86, informatics 3/2022
2022-08-01T00:00:00ZSemi-Automated Classification of Arabic User Requirements into Functional and Non-Functional Requirements using NLP Tools
scholar.ppu.edu/handle/123456789/8730
Semi-Automated Classification of Arabic User Requirements into Functional and Non-Functional Requirements using NLP Tools
Shehadeh, Karmel
Requirement engineering plays a very important role in the software development life cycle. The success or failure of a software project depends prominently on the requirement engineering phase. Requirement documents commonly have two types of requirements, one is Functional Requirements, which
defines the features of the system-to-be, and the other is Non-Functional Requirements, which defines the quality attributes of the system features and
development environment. They are predominantly documented in natural
language. A lot of human effort is required for manual classification, which
is a challenging and delicate task. Software requirements classification process has been improved in recent years by classification requirements using
automated or semi-automated methods for the same purpose of Automated
Software Engineering which helps developers to deliver quality software that
meets users’ expectations completely with saving time and cost.
In this thesis, we presented a new Semi-Automated classification approach of
Arabic functional and non-functional requirements using a natural language
processing tools, namely CAMeL Tools. We proposed a set of heuristics
based on basic constructs of Arabic sentences in order to extract information
from software requirements written in Arabic to classify the requirements
vi
CD, no of pages 90,31153, informatics 2/2022
2022-08-01T00:00:00ZExploring and Adapting AES Algorithm for Optimal Use as a Lightweight IoT Crypto Algorithm
scholar.ppu.edu/handle/123456789/8635
Exploring and Adapting AES Algorithm for Optimal Use as a Lightweight IoT Crypto Algorithm
AbuJoodeh, Mohammed
Cyber and Information security are among the most critical challenges facing nowadays
technologies, especially with the discrepancy in devices' capabilities that have increased with the
emergence of the Internet of Things (IoT) devices. The main problem in IoT security is how to
find lightweight cryptosystems that are suitable for devices with limited capabilities. In this thesis,
a comprehensive literature survey that discusses the most prominent encryption algorithms used
in device security in general and IoT devices in specific has been conducted. Many studies related
to this field have been discussed to identify the most important requirements of lightweight
encryption systems to be compatible with variances in IoT devices. Also, we explored the results
of security and performance of the AES algorithm by changing it’s core parameters and functions
including the MixColumns and the number of rounds. In case of changing MixColumns, the results
showed the security has been adversely affected. While changing in the number of rounds provides
a promising result to improve the algorithm performance while keeping an acceptable security
level which makes it more adaptable to IoT devices. In general, the results showed that running
three rounds of standard AES maintains the same level of security practically under specific criteria
with a 386% improvement in performance indicators. Accordingly, we proposed a New
Lightweight AES (NLW-AES) which maintain the standard AES-MixColumns with three rounds
of AES. Finally, we tested both the Standard AES and the New Lightweight AES on Raspberry
Pi as an IoT model which provide compatible results with the explored scenarios.
Keywords: IoT Security, Networks, Cryptography, AES, Lightweight cryptography.
CD, no of pages 139 , 31117, informatics 1/2022
2022-06-01T00:00:00Z