Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Design and simulation of channel propagation model for vehicular Ad Hoc network under urban environment
LI Guisen, CHEN Ren, ZHU Shunzhi
Journal of Computer Applications    2016, 36 (10): 2680-2685.   DOI: 10.11772/j.issn.1001-9081.2016.10.2680
Abstract405)      PDF (887KB)(413)       Save
Since the channel propagation model for Vehicular Ad Hoc NETwork (VANET) is unrealistic in the urban environment, an propagation model considering the impact of obstacle was proposed. Firstly, using the position of the vehicle in the digital map, the propagation of the signal was classified into three types: Line Of Sight (LOS), Not Line Of Sight with one (NLOS-1) turn and prohibitive propagation. Secondly, the expression of the received signal power was introduced under the conditions of LOS and NLOS-1. Finally, the packet delivery ratio with Nakagami distribution was deduced. Theoretical analysis and simulation results show that the model can reflect an realistic propagation of the signal which is hindered by the obstacles at roadside, the reachability is decreased by 31.4 percentage points in light load and sparse network, while it is increased by 13.32 percentage points in heavy load and dense network. The rectilinear propagation effect of the high frequency 5.9 GHz signal was simulated by the proposed model, which provides a basis for the communication protocol design and the realistic simulation of VANET.
Reference | Related Articles | Metrics
Provable identity-based signcryption scheme
ZUO Liming, CHEN Renqun, GUO Hongli
Journal of Computer Applications    2015, 35 (3): 712-716.   DOI: 10.11772/j.issn.1001-9081.2015.03.712
Abstract706)      PDF (770KB)(456)       Save

Through the cryptanalysis of a signcryption scheme without bilinear pairing proposed by Gao et al. (GAO J, WU X, QIN Y. Secure certificateless signcryption scheme without bilinear pairing.Application Research of Computers,2014,31(4):1195-1198) recently, the scheme could not resist public-key substitute attacks. Then a new ID-based signcryption scheme without bilinear pairing was proposed and the proposed scheme was proved to be secure in the random oracle model under the first type attacker. Finally, a contrast analysis of efficiency was made between the new scheme and other schemes. Compared with other signcryption schemes, the new scheme uses only 3 Hash operations and 7 point multiplication operations, so it has higher computational efficiency.

Reference | Related Articles | Metrics