SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2650
Efficient and Secure Communication In Vehicular AD HOC Network
Aditya Kumar Rathore1, Raju Barskar2, Dr. Shikha Agarwal3
1PG Scholar, UIT-RGPV, Bhopal
2,3,Assistant Professor, Dept. Of CSE, UIT-RGPV, Bhopal, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Vehicular Ad hoc Networks (VANET) is a collection
of vehicles and each vehicle acts as wireless node or router.
These vehicles can communicate within 300 to 1000 meters of
each other and create a wider range of network. Vehicles in a
particular coverage area, it can exchange information
between them using radio communication. When a vehicle
falls out of coverage in one area can join in another vehicle's
coverage area. VANET allows a driver in one vehicle to
communicate with the drivers in the other vehicles within the
range of radio communication.
The characteristics of highly dynamic topology make the
design of the routing protocol a challenging one. Onhighways,
each vehicle moves at different speeds. In practice, the path
can be changed very often due to the change of the vehicle’s
speed, which leads to additional time and overhead in
discovering new routes. To solve this problem this research
proposed a Cluster based reliable routing (CRR) protocol. The
vehicles are clustered based on their velocity. A Cluster
Controller (CC) is elected based on transmitter heights and its
position. CC manages the request from all the members.
Key Words: Cluster based reliable routing, Cluster
Controller, RSU.
1.INTRODUCTION
Computer and communication has rapidly grown over the
past decade, making technology advanced in computer
networking. A computer network is a system of
communication between computers usingconnectors.These
connectors may be fixed or temporary and visible or
invisible. In the early days, communication between
calculation machines and computers was done by human
users. In 1940, teletype machine used to send instructions
between two systems located in different locations. In 1964,
a time sharing system was used for distributed usersoflarge
computer systems. In mid of 1970s, wireless networks have
become popular in the computing industry. There are
presently two variations of wireless networks available,that
is infrastructure networks and mobile wireless network.
Those networks with fixed and wired gateways is called
infrastructure. The bridges for these networks are knownas
base stations. Applications of this type of network are called
as Wireless Local Area Networks (WLANs). The second type
of mobilewireless network is the infrastructure less mobile
network, commonly known as an ad-hoc network. This
network has no fixed routers, all nodes are capable of
movement and can be connected dynamically inanarbitrary
manner. Nodes of ad-hoc networksfunctionasrouterswhich
discover and maintain routes to other node in the network.
In 2004, Mobile Ad-hoc Networks (MANET)canturnintothe
dream of getting connected while in driving a vehicle. Sucha
network is called VANET. VANET is a collection of vehicles
and each vehicle acts as a wireless vehicle or router. These
vehicles can communicate within 300to1000metersofeach
other vehicle and create a wider range of network. Vehicles
in one particular coverage area can exchange information
between them using radio communication. A vehicle that
falls out of coverage in one area can join in another vehicle's
coverage area. An Intelligent Transportation System (ITS)
provides an efficient communication between the vehicles.
VANET is also called Inter-Vehicle Communication (IVC) or
Vehicle to Vehicle communication (V2V). VANET allows a
driver in one vehicle to communicate to drivers in other
vehicles within the range of radio communication. If the
vehicles are out of range, they can communicate with each
other through multihop networking. Compared to mobile
vehicles, VANET has advantages in broader coverage, low
latency and no service charges. Many different applications
have already developed in the field of smart car, for an
accurate automatic control and at easy environment for
drivers. These applications are based primarily on the
exchange of information, which ensures the communication
between the vehicles. Currently many automobile
manufacturers, researchers are more interested in this V2V
communication, and are investigated in various research
projects.
2. Literature Survey
Dhanush yadavM et al.[1],in this day and age thequantityof
vehicles isexpanding step by step asa resultofwhichthereis
parcel of blockage on streets. And additionally number of
bundles coursing through a VANET systems are expanding.
There are part of calculations in the writing in particular
Shortest PathTree andMinimum Spanning Treewhich gives
a progression of steps which can enhance the parcel
conveyance proportion. However, algorithm suffers from
hops, delay and complexity. Hand-off hub is in charge of
correspondence between vehicleson2distinctareas/streets.
The choice of relay node will make utilization of Expected
Transmission which is a tedious procedure. Consequently a
calculation is required which can convey the bundles
speedier towards the goal before the vehicles changes to an
alternate area.
In this work we make utilization of DHSP calculation which
plays outthe course revelationinviewofdirectionalmapping
of goal hub which builds the exactness and diminishes the
deferral. MATLAB recreations of proposed steering
calculation have been performed to get the reenactment
comes about. The reproduction comes about demonstrate
that our proposed convention diminishes Parameters, for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2651
example, End to End Delay, Number of Hops, Energy
Consumption, and Routing. Overhead builds the throughput
are estimated for most limited way tree (SPT), Minimum
traversing tree (MST) and it is demonstrated that proposed
calculation is the best.
Dogan Yildiz et al. [2], Crossing point of hyperbolic bends
characterized when Time Difference of Arrival (TDOA) is
frequently utilized as a part of Wireless Sensor Networks
(WSNs) to evaluate the area of sensors. This paper proposes
another calculation of this compose. The hyperbolic
parametric condition and the pivot grid are utilized to
appraise the area of the objective hub and turn,
interpretation and crossing point activities are connected.
MATLAB reenactments on Uniform, Beta, Weibull and
Gamma appropriated systems demonstrated theideal mixes
of circulation, steady range and grapple rate.
Alexandros Ladas et al. [3], upgrade version of ChaMeLeon
(CML) routing protocol is proposed in this paper i.e.
Multipath ChaMeLeon (M-CML). To support emergency
communication, ChaMeLeon protocol is used which is a
Hybrid and adaptive protocol specially design for MANETs.
Multipath ChaMeLeon adopts the attributes of the proactive
Optimized Link State Protocol (OLSR) and extends it so as to
implement a multipath routing approach based on the
Expected Transmission Count (ETX). We use NS-3 simulator
tool to verifythe efficiency ofproposed protocol.Todecrease
the consequence of link unstabilities and to improve the
network performance with respect to scalability and
resiliency, the obtained results shows that Multipath
ChaMeLeon routing approach merged with intelligent link
metric such as the expected transmission count.
P. Fazio et al. [4], in a years ago, remote systems
administrationis winding up extremelyprominent inlightof
the fact that it can fulfill client asks for regarding Quality of
Service (QoS); when portability is available, maybe, hand-
over issues are pertinent when has change scope territories
amid their dynamic sessions. It is essential to relieve
portability impacts, utilizing a proper data transmission
administration approach. In our work, we propose two
coordinated plans: the first depends on Markov hypothesis
and is gone for the expectation of versatile hosts
developments (regarding future cells), while the second one
depends on measurable hypothesis and is gone for the
minimization of the squandered transfer speed utilized for
detached reservations. In this way, the proposed Pattern
Prediction and Passive Bandwidth Management Algorithm
(3P-BMA) isthe aftereffect of the combination ofthe Markov
indicator and the factual transfer speed administration
conspire.3P-BMA is totallyautonomousonthethoughtabout
innovation, versatility display and vehicular condition. We
couldn't care less if the scope is made by UMTS or WLAN
innovations, if has are people on foot or portable clients, and
so forth.
F. De Rango et al. [5], this papers exhibits a 2D reservation
conspire in WLAN condition. A two-dimensional remote
versatility display called smooth random mobility model
(SRMM) has been considered, on the grounds that it makes
the developmentof clients smoother andmorepracticalthan
surely understood in writing irregular portability models. A
general expectation strategy construct both with respect to
the examination of cell stay time and on the course
probabilities of deliver and pass out occasions of portable
hubs from remote cells is delineated.
F. De Rango et al. [6], this paper introduces a novel call
admission control (CAC) calculation in view of the
measurable multiplexing of VBR activity. The proposed
calculation is called measurable multiplexing in view of
discrete transmission capacity levels of GOP rate (SMDB) on
the grounds that the arrangement depends on the
discretisation of the GOP rate in an arrangement of transfer
speed levels and on the time attributes of discrete data
transmission levels ofMPEG sources. SMDBiscontrastedand
another factual CAC in view of the ordinary/lognormal
circulation of the GOP rate (SMND).
Park S. Y. et al. [7], Least Cost Forwarding Algorithm (MCFA)
is another steering convention for Wireless Sensor Network
that adventures the way that the heading of directing is
constantly known and it is towards the settled outside Base
Station.The sensorhubs require nothave a special IDorthey
don'thave to keep up steering tables. Everysensorhubkeeps
up the minimum cost gauge from itself so as to achieve the
Base Station. At whatever point a sensor hub has parcels to
forward to the Base Station, it communicatestoitsneighbors.
After a hub gets the bundle, it checks on the off chance that it
is on the minimum cost course between the source sensor
hub and the Base Station. On the off chance that it is in this
way, the accepting hub rebroadcasts the bundle to its
neighbors.
Osama Ennasr et al. [8],LEACH isone of the principalvarious
leveled group baseddirectingmethodologyforremotesensor
connect with static sensor hubs and static Base Station. The
whole sensor field is intelligently isolated into groups and
roughly 5% of the aggregate conveyed sensor hubs go about
as the bunch head. The bunch head hubs are chosen with a
likelihood in view of the measure of vitality left in the hubs.
The group head does information endless supply of
information from its bunch individuals and evacuatesexcess
in the detected information lastly advances the amassed
information towards the Base Station. This spares part of
vitality by limiting the volume of information to be
transmitted.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2652
3. Survey Report
Table 1. Survey Report
Author Title University Objective
MDhanush yadav M
and Flory Francis
Delay and Hop sensitive
routing protocol for
VANET’s.
Ramaiah institute of
technology, Banglore
They proposed DHSP algorithm
which conduct the route discovery
which can improve the accuracy and
reduce the delay.
D. Yildiz, S. Karagol
and O. Ozgonenel
A Hyperbolic Location
Algorithm for Various
Distributions of a Wireless
Sensor Networks, Smart
Grid and Cities Congress
and Fair (ICSG)
Ondokus Mayus
University, Turkey
In this paper, rotation matrix and
hyperbolic parametric equation are
used to evaluate the location of
node.
Nikolaous P, W.
Nuwan, P. Christos
and L. Alexander
Multipath Routing
Approach to Enhance
Resiliency and Scalability
in Ad-hoc Networks, Ad-
hoc and Sensor
Networking Symposium.
Kingstone University
London, UK
This paper mainly covers M-CML
protocol. It also provide the
description of optimized link state
protocol.
F. Peppino, T. Mauro,
M. Salvatore
A distributed handover
management and pattern
prediction algorithm for
wireless networks with
mobile hosts
University of Calabria,
Italy
Pattern prediction and passive
bandwidth management algorithm
is proposed in this paper to decrease
the call dropping/blocking
probabilities and system utilization.
Rango De F., F.
Peppino, M. Salvatore
Mobility Prediction and
Resource Reservation in
WLAN Networks under a
2D Mobility Models
University of Calabria,
Italy
This paper mainly focus on
comparing the MIP, SRMM and
MSRVP.
Rango De F., F.
Peppino, M. Salvatore
Call admission control
with statistical
multiplexing for aggregate
MPEG traffic in a DVB-RCS
satellite network
University of Calabria,
Italy
This paper introduced call
admission control (CAC) algorithm
for MPEG traffic sources.
Ghaboosi, N., &
Haghighat, A. T.
Tabu search based
algorithms for bandwidth-
delay-constrained least-
cost multicast routing
Islamic Azad
University, Iran
On novel move, bandwidth delay
constraints minimum cost multicast
tree which is based on TS algorithm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2653
4. CLUSTER BASED RELIABLE ROUTING
VANET is an autonomous and self-sorting wireless
communicationnetwork, where vehicles includethemselves
as a server and additionally a client for sharing data. VANET
is highly dynamic in nature. One of the basic issues in the
designing of the scalable routing algorithm is frequent path
interruptions caused by vehicles portability.Existingrouting
protocol,generally intended forMANET isn't appropriatefor
the unique attributes of VANET. Numerous intriguing
enhancements can be gotten by modifying these routing
conventions to mirror the powerfully changing topology of
VANET. Protocols in VANET are ordered into the
accompanying classes, topology baseddirectingconventions,
position based steering conventions, broadcasting
conventions and bunch based directing conventions.
Topology based steering conventions utilize the connection
data for directing the bundles. Position based directing
conventions utilize the geographic situating data to choose
the course from the sender to goal. Broadcasting is used to
share information like traffic details, weather condition and
emergency information to allthe vehicles. New broadcasting
protocols are proposed and discussed in the previous two
chapters. Figure 1 shows the normal view while figure 2
shows cluster in graph view. Cluster based routing is
grouping the vehicle using criteria like location, speed and
directionof the vehicles. In this thesis speed based clustering
is done and reliable routing is then identified. Cluster is a
group of vehicles that identifies themselves to be a part of
cluster and one of the vehicles acts as a head of the group.
The vehicle which called Cluster Controller (CC) will control
all the communication among the members. Clustering
provides stable connection among the vehiclesintheVANET.
Fig -1: Cluster in Normal View
Fig-2: Cluster in Graph View
5. METHODOLOGY
VANET is a class of temporary networks, where the
connection between the vehicles is very shortly
disconnected. The vehicle movements and density of the
network causes frequent changes in the network topology.
Hence, security issues in VANET become very challengeable.
Vehicles should have the ability to ensure that messages are
not corrupted by other vehicles and the malicious vehicles
and false messages must be detected and removed from
VANET. Each vehicle can broadcast and authenticate
whether the incoming message isfrom a validentity.RSUare
regularly collecting the information aboutthevehicleintheir
transmission range. There are two types of attackers in
VANET like Selfish Vehicle and Malicious Vehicle. Selfish
vehicle may give false information for selfish reasons. They
wish to use their lanes with maximum comfort and they do
not want to share with other vehicles. They can send
message like “there is a traffic jam“ to vehicles behind it.The
vehicles that trust this message will choose anotherroute,so
that the selfish driver can have the clear lane to reach its
destination.The drivers in malicious vehicle are more
harmful and could bring more danger to other drivers. They
may change the message and purposely give the wrong
information and cheat the system to obtain more resources
like bandwidth. In the worst case, malicious attackers
attempt to damage the network by cheating the RSU. These
attackers can damage the network in the following ways.
5.1 Message Integrity
If the attacker modifies the safety-related messages with
incorrect information against the original event, leads the
driver to take wrong decision and consequently cause
serious accidents.
5.2 False Position Information
A position plays a vital role in VANET. Routing and
broadcasting techniques identifies the next hop sender
based on its position. If the attacker transmits false
information about their position will decreases the
performance of transmission techniques.
5.3 Denial Of Service
Network availability is most important requirement in
VANET for the reliable communication. Denial of Services is
the dangerous attacks in vehicular network. When the
malicious attacker tries to jamming the communication
medium, network is no more available to other neighbor
vehicles. The aim of this attacker is to prevent the
authenticate user to access the network.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2654
6. CONCLUSION
Broadcasting road safety information among vehicles avoid
accidents and improve road safety is the main motivation in
the development of VANET. It is a promising technology to
allow the vehicles to communicate among them. VANET has
unique characteristics like change in topology due to
vehicle’s fast movements, network disconnections and
limited bandwidth. Also to achieve secure communicationis
difficult due to the movement of different kinds of travellers
on the road. The main objective of this research istodevelop
efficient protocol in VANET for secure and efficient message
broadcasting. VANET consists of collection of vehicles
moving on the road. Each vehicle is connected through ad-
hoc infrastructure with smaller coverage area. Every
emergency message is broadcast to all the vehicles through
multi-hop broadcasting. This research proposedamulti-hop
broadcasting protocol. It also cluster the vehicles based on
velocity and find out reliable routes between them. It also
extends to provide security by identifying false position and
false information attacks.
REFERENCES
[1] MDhanush yadav M and Flory Francis, "Delay and Hop
sensitive routing protocol for VANETs", 2017 second IEEE
International Conference On Recent Trends in Electronics
Information and Communication Technology(RTEICT),May
19-20, 2017.
[2] D. Yildiz, S. Karagol and O. Ozgonenel, “A Hyperbolic
Location Algorithm for Various Distributions of a Wireless
Sensor Networks, Smart Grid and Cities Congress and Fair
(ICSG), Fifth International Istanbul, PP. No. 451-459, IEEE
2016.
[3] A. Ladas, N. Pavlatos, Nuwan Weerasinghe and C. Politis,
“Multipath Routing Approach to Enhance Resiliency and
Scalability in Ad-hoc Networks, Ad-hoc and Sensor
Networking Symposium”, PP. No. 01-06, IEEE 2016.
[4] P. Fazio, M. Tropea, S. Marano, “A distributed hand-over
management and pattern prediction algorithm for wireless
networks with mobile hosts,” 9th International Wireless
Communications and MobileComputingConference,IWCMC,
pp. 294-298, IEEE 2013.
[5] Rango De F., F. Peppino, M. Salvatore, “Mobility
Prediction and Resource Reservation in WLAN Networks
under a 2D Mobility Models,” 63rd Vehicular Technology
Conference (VTC Fall), PP. No. 783-789, IEEE 2006.
[6] F. De Rango, M. Tropea, P. Fazio, S. Marano, “Call
admission control with statistical multiplexing foraggregate
MPEG traffic in a DVB-RCS satellite network,” GLOBECOM –
IEEE Global Telecommunications Conference, pp. 3231-
3236, IEEE 2005.
[7] F. De Rango, M. Tropea, P. Fazio, S. Marano, “Call
admission control for aggregate MPEG-2 traffic over
multimedia geo-satellite networks,” IEEE Transactions on
Broadcasting, vol. 54, No. 3, pp. 612-622, 2008.
[8] X. Fu, S. Henning, A. Bader, D. Hogrefe, “NSIS: a new
extensible IP signaling protocolsuite,”IEEECommunications
Magazine, vol. 43, No. 10, PP. No. 45-53, 2005.
[9] Ghaboosi, N., & Haghighat, A. T., “Tabu search based
algorithms for bandwidth-delay-constrained least-cost
multicast routing”, Telecommunication Systems, Vol.34,No.
3, PP. No. 147–166, IEEE 2007.
[10] Semchedine, F., Bouallouche-Medjkoune, L., Bennacer,
L., Aber, N., & Aı¨ssani, D., “Routing protocol based on Tabu
search for wireless sensor networks. Wireless Personal
Communications”, Vol. 67, No. 2, PP. No. 105–112, IEEE
2012.
[11] El Rhazi, A., & Pierre, S., “A Tabu search algorithm for
cluster building in wireless sensor networks. Mobile
Computing, IEEE Transactions on, Vol. 8, No. 4, PP. No. 433–
444, 2009.
[12] Heinzelman, W. R., Chandrakasan, A., & Balakrishnan,H,
“Energy-efficient communication protocol for wireless
microsensor networks”, In System sciences, 2000.
Proceedings of the 33rd annual Hawaii international
conference, PP. No. 01-06, IEEE 2000.
[13] N. Priyantha, H. Balakrishnan, E. Demaine, and S. Teller.
Anchor-freedistributed localization in sensor networks.
Technical Report TR-892,MIT LCS, Apr. 2003.
[14] S. R. Drake, K. Dogancay, "Geolocationbytimedifference
of arrivalusing hyperbolic asymptotes", in Proc. IEEE
InternationalConference on Acoustics, Speech, and Signal
Processing, vol. 2, pp.361 – 364, 2004.
[15] Heinzelman, W. R., Chandrakasan, A., & Balakrishnan,H,
“Energy-efficient communication protocol for wireless
microsensor networks”, In System sciences, 2000.
Proceedings of the 33rd annual Hawaii international
conference, PP. No. 01-06, IEEE 2000.

Weitere ähnliche Inhalte

Was ist angesagt?

ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
IJCNCJournal
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
IJCNCJournal
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
Cemal Ardil
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
ijsrd.com
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
IJCNCJournal
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
ijasuc
 

Was ist angesagt? (19)

A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
 
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
 
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsEvaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
 
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYSTUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
 
Study of vanet routing protocols for end to end delay
Study of vanet routing protocols for end to end delayStudy of vanet routing protocols for end to end delay
Study of vanet routing protocols for end to end delay
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
L011138596
L011138596L011138596
L011138596
 

Ähnlich wie IRJET- Efficient and Secure Communication In Vehicular AD HOC Network

Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
IJET - International Journal of Engineering and Techniques
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET Journal
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Editor IJCATR
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET Journal
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
pijans
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
IAEME Publication
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
IAEME Publication
 

Ähnlich wie IRJET- Efficient and Secure Communication In Vehicular AD HOC Network (20)

eaodv
eaodveaodv
eaodv
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
 
A044030110
A044030110A044030110
A044030110
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
 
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Kürzlich hochgeladen (20)

HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

IRJET- Efficient and Secure Communication In Vehicular AD HOC Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2650 Efficient and Secure Communication In Vehicular AD HOC Network Aditya Kumar Rathore1, Raju Barskar2, Dr. Shikha Agarwal3 1PG Scholar, UIT-RGPV, Bhopal 2,3,Assistant Professor, Dept. Of CSE, UIT-RGPV, Bhopal, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Vehicular Ad hoc Networks (VANET) is a collection of vehicles and each vehicle acts as wireless node or router. These vehicles can communicate within 300 to 1000 meters of each other and create a wider range of network. Vehicles in a particular coverage area, it can exchange information between them using radio communication. When a vehicle falls out of coverage in one area can join in another vehicle's coverage area. VANET allows a driver in one vehicle to communicate with the drivers in the other vehicles within the range of radio communication. The characteristics of highly dynamic topology make the design of the routing protocol a challenging one. Onhighways, each vehicle moves at different speeds. In practice, the path can be changed very often due to the change of the vehicle’s speed, which leads to additional time and overhead in discovering new routes. To solve this problem this research proposed a Cluster based reliable routing (CRR) protocol. The vehicles are clustered based on their velocity. A Cluster Controller (CC) is elected based on transmitter heights and its position. CC manages the request from all the members. Key Words: Cluster based reliable routing, Cluster Controller, RSU. 1.INTRODUCTION Computer and communication has rapidly grown over the past decade, making technology advanced in computer networking. A computer network is a system of communication between computers usingconnectors.These connectors may be fixed or temporary and visible or invisible. In the early days, communication between calculation machines and computers was done by human users. In 1940, teletype machine used to send instructions between two systems located in different locations. In 1964, a time sharing system was used for distributed usersoflarge computer systems. In mid of 1970s, wireless networks have become popular in the computing industry. There are presently two variations of wireless networks available,that is infrastructure networks and mobile wireless network. Those networks with fixed and wired gateways is called infrastructure. The bridges for these networks are knownas base stations. Applications of this type of network are called as Wireless Local Area Networks (WLANs). The second type of mobilewireless network is the infrastructure less mobile network, commonly known as an ad-hoc network. This network has no fixed routers, all nodes are capable of movement and can be connected dynamically inanarbitrary manner. Nodes of ad-hoc networksfunctionasrouterswhich discover and maintain routes to other node in the network. In 2004, Mobile Ad-hoc Networks (MANET)canturnintothe dream of getting connected while in driving a vehicle. Sucha network is called VANET. VANET is a collection of vehicles and each vehicle acts as a wireless vehicle or router. These vehicles can communicate within 300to1000metersofeach other vehicle and create a wider range of network. Vehicles in one particular coverage area can exchange information between them using radio communication. A vehicle that falls out of coverage in one area can join in another vehicle's coverage area. An Intelligent Transportation System (ITS) provides an efficient communication between the vehicles. VANET is also called Inter-Vehicle Communication (IVC) or Vehicle to Vehicle communication (V2V). VANET allows a driver in one vehicle to communicate to drivers in other vehicles within the range of radio communication. If the vehicles are out of range, they can communicate with each other through multihop networking. Compared to mobile vehicles, VANET has advantages in broader coverage, low latency and no service charges. Many different applications have already developed in the field of smart car, for an accurate automatic control and at easy environment for drivers. These applications are based primarily on the exchange of information, which ensures the communication between the vehicles. Currently many automobile manufacturers, researchers are more interested in this V2V communication, and are investigated in various research projects. 2. Literature Survey Dhanush yadavM et al.[1],in this day and age thequantityof vehicles isexpanding step by step asa resultofwhichthereis parcel of blockage on streets. And additionally number of bundles coursing through a VANET systems are expanding. There are part of calculations in the writing in particular Shortest PathTree andMinimum Spanning Treewhich gives a progression of steps which can enhance the parcel conveyance proportion. However, algorithm suffers from hops, delay and complexity. Hand-off hub is in charge of correspondence between vehicleson2distinctareas/streets. The choice of relay node will make utilization of Expected Transmission which is a tedious procedure. Consequently a calculation is required which can convey the bundles speedier towards the goal before the vehicles changes to an alternate area. In this work we make utilization of DHSP calculation which plays outthe course revelationinviewofdirectionalmapping of goal hub which builds the exactness and diminishes the deferral. MATLAB recreations of proposed steering calculation have been performed to get the reenactment comes about. The reproduction comes about demonstrate that our proposed convention diminishes Parameters, for
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2651 example, End to End Delay, Number of Hops, Energy Consumption, and Routing. Overhead builds the throughput are estimated for most limited way tree (SPT), Minimum traversing tree (MST) and it is demonstrated that proposed calculation is the best. Dogan Yildiz et al. [2], Crossing point of hyperbolic bends characterized when Time Difference of Arrival (TDOA) is frequently utilized as a part of Wireless Sensor Networks (WSNs) to evaluate the area of sensors. This paper proposes another calculation of this compose. The hyperbolic parametric condition and the pivot grid are utilized to appraise the area of the objective hub and turn, interpretation and crossing point activities are connected. MATLAB reenactments on Uniform, Beta, Weibull and Gamma appropriated systems demonstrated theideal mixes of circulation, steady range and grapple rate. Alexandros Ladas et al. [3], upgrade version of ChaMeLeon (CML) routing protocol is proposed in this paper i.e. Multipath ChaMeLeon (M-CML). To support emergency communication, ChaMeLeon protocol is used which is a Hybrid and adaptive protocol specially design for MANETs. Multipath ChaMeLeon adopts the attributes of the proactive Optimized Link State Protocol (OLSR) and extends it so as to implement a multipath routing approach based on the Expected Transmission Count (ETX). We use NS-3 simulator tool to verifythe efficiency ofproposed protocol.Todecrease the consequence of link unstabilities and to improve the network performance with respect to scalability and resiliency, the obtained results shows that Multipath ChaMeLeon routing approach merged with intelligent link metric such as the expected transmission count. P. Fazio et al. [4], in a years ago, remote systems administrationis winding up extremelyprominent inlightof the fact that it can fulfill client asks for regarding Quality of Service (QoS); when portability is available, maybe, hand- over issues are pertinent when has change scope territories amid their dynamic sessions. It is essential to relieve portability impacts, utilizing a proper data transmission administration approach. In our work, we propose two coordinated plans: the first depends on Markov hypothesis and is gone for the expectation of versatile hosts developments (regarding future cells), while the second one depends on measurable hypothesis and is gone for the minimization of the squandered transfer speed utilized for detached reservations. In this way, the proposed Pattern Prediction and Passive Bandwidth Management Algorithm (3P-BMA) isthe aftereffect of the combination ofthe Markov indicator and the factual transfer speed administration conspire.3P-BMA is totallyautonomousonthethoughtabout innovation, versatility display and vehicular condition. We couldn't care less if the scope is made by UMTS or WLAN innovations, if has are people on foot or portable clients, and so forth. F. De Rango et al. [5], this papers exhibits a 2D reservation conspire in WLAN condition. A two-dimensional remote versatility display called smooth random mobility model (SRMM) has been considered, on the grounds that it makes the developmentof clients smoother andmorepracticalthan surely understood in writing irregular portability models. A general expectation strategy construct both with respect to the examination of cell stay time and on the course probabilities of deliver and pass out occasions of portable hubs from remote cells is delineated. F. De Rango et al. [6], this paper introduces a novel call admission control (CAC) calculation in view of the measurable multiplexing of VBR activity. The proposed calculation is called measurable multiplexing in view of discrete transmission capacity levels of GOP rate (SMDB) on the grounds that the arrangement depends on the discretisation of the GOP rate in an arrangement of transfer speed levels and on the time attributes of discrete data transmission levels ofMPEG sources. SMDBiscontrastedand another factual CAC in view of the ordinary/lognormal circulation of the GOP rate (SMND). Park S. Y. et al. [7], Least Cost Forwarding Algorithm (MCFA) is another steering convention for Wireless Sensor Network that adventures the way that the heading of directing is constantly known and it is towards the settled outside Base Station.The sensorhubs require nothave a special IDorthey don'thave to keep up steering tables. Everysensorhubkeeps up the minimum cost gauge from itself so as to achieve the Base Station. At whatever point a sensor hub has parcels to forward to the Base Station, it communicatestoitsneighbors. After a hub gets the bundle, it checks on the off chance that it is on the minimum cost course between the source sensor hub and the Base Station. On the off chance that it is in this way, the accepting hub rebroadcasts the bundle to its neighbors. Osama Ennasr et al. [8],LEACH isone of the principalvarious leveled group baseddirectingmethodologyforremotesensor connect with static sensor hubs and static Base Station. The whole sensor field is intelligently isolated into groups and roughly 5% of the aggregate conveyed sensor hubs go about as the bunch head. The bunch head hubs are chosen with a likelihood in view of the measure of vitality left in the hubs. The group head does information endless supply of information from its bunch individuals and evacuatesexcess in the detected information lastly advances the amassed information towards the Base Station. This spares part of vitality by limiting the volume of information to be transmitted.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2652 3. Survey Report Table 1. Survey Report Author Title University Objective MDhanush yadav M and Flory Francis Delay and Hop sensitive routing protocol for VANET’s. Ramaiah institute of technology, Banglore They proposed DHSP algorithm which conduct the route discovery which can improve the accuracy and reduce the delay. D. Yildiz, S. Karagol and O. Ozgonenel A Hyperbolic Location Algorithm for Various Distributions of a Wireless Sensor Networks, Smart Grid and Cities Congress and Fair (ICSG) Ondokus Mayus University, Turkey In this paper, rotation matrix and hyperbolic parametric equation are used to evaluate the location of node. Nikolaous P, W. Nuwan, P. Christos and L. Alexander Multipath Routing Approach to Enhance Resiliency and Scalability in Ad-hoc Networks, Ad- hoc and Sensor Networking Symposium. Kingstone University London, UK This paper mainly covers M-CML protocol. It also provide the description of optimized link state protocol. F. Peppino, T. Mauro, M. Salvatore A distributed handover management and pattern prediction algorithm for wireless networks with mobile hosts University of Calabria, Italy Pattern prediction and passive bandwidth management algorithm is proposed in this paper to decrease the call dropping/blocking probabilities and system utilization. Rango De F., F. Peppino, M. Salvatore Mobility Prediction and Resource Reservation in WLAN Networks under a 2D Mobility Models University of Calabria, Italy This paper mainly focus on comparing the MIP, SRMM and MSRVP. Rango De F., F. Peppino, M. Salvatore Call admission control with statistical multiplexing for aggregate MPEG traffic in a DVB-RCS satellite network University of Calabria, Italy This paper introduced call admission control (CAC) algorithm for MPEG traffic sources. Ghaboosi, N., & Haghighat, A. T. Tabu search based algorithms for bandwidth- delay-constrained least- cost multicast routing Islamic Azad University, Iran On novel move, bandwidth delay constraints minimum cost multicast tree which is based on TS algorithm.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2653 4. CLUSTER BASED RELIABLE ROUTING VANET is an autonomous and self-sorting wireless communicationnetwork, where vehicles includethemselves as a server and additionally a client for sharing data. VANET is highly dynamic in nature. One of the basic issues in the designing of the scalable routing algorithm is frequent path interruptions caused by vehicles portability.Existingrouting protocol,generally intended forMANET isn't appropriatefor the unique attributes of VANET. Numerous intriguing enhancements can be gotten by modifying these routing conventions to mirror the powerfully changing topology of VANET. Protocols in VANET are ordered into the accompanying classes, topology baseddirectingconventions, position based steering conventions, broadcasting conventions and bunch based directing conventions. Topology based steering conventions utilize the connection data for directing the bundles. Position based directing conventions utilize the geographic situating data to choose the course from the sender to goal. Broadcasting is used to share information like traffic details, weather condition and emergency information to allthe vehicles. New broadcasting protocols are proposed and discussed in the previous two chapters. Figure 1 shows the normal view while figure 2 shows cluster in graph view. Cluster based routing is grouping the vehicle using criteria like location, speed and directionof the vehicles. In this thesis speed based clustering is done and reliable routing is then identified. Cluster is a group of vehicles that identifies themselves to be a part of cluster and one of the vehicles acts as a head of the group. The vehicle which called Cluster Controller (CC) will control all the communication among the members. Clustering provides stable connection among the vehiclesintheVANET. Fig -1: Cluster in Normal View Fig-2: Cluster in Graph View 5. METHODOLOGY VANET is a class of temporary networks, where the connection between the vehicles is very shortly disconnected. The vehicle movements and density of the network causes frequent changes in the network topology. Hence, security issues in VANET become very challengeable. Vehicles should have the ability to ensure that messages are not corrupted by other vehicles and the malicious vehicles and false messages must be detected and removed from VANET. Each vehicle can broadcast and authenticate whether the incoming message isfrom a validentity.RSUare regularly collecting the information aboutthevehicleintheir transmission range. There are two types of attackers in VANET like Selfish Vehicle and Malicious Vehicle. Selfish vehicle may give false information for selfish reasons. They wish to use their lanes with maximum comfort and they do not want to share with other vehicles. They can send message like “there is a traffic jam“ to vehicles behind it.The vehicles that trust this message will choose anotherroute,so that the selfish driver can have the clear lane to reach its destination.The drivers in malicious vehicle are more harmful and could bring more danger to other drivers. They may change the message and purposely give the wrong information and cheat the system to obtain more resources like bandwidth. In the worst case, malicious attackers attempt to damage the network by cheating the RSU. These attackers can damage the network in the following ways. 5.1 Message Integrity If the attacker modifies the safety-related messages with incorrect information against the original event, leads the driver to take wrong decision and consequently cause serious accidents. 5.2 False Position Information A position plays a vital role in VANET. Routing and broadcasting techniques identifies the next hop sender based on its position. If the attacker transmits false information about their position will decreases the performance of transmission techniques. 5.3 Denial Of Service Network availability is most important requirement in VANET for the reliable communication. Denial of Services is the dangerous attacks in vehicular network. When the malicious attacker tries to jamming the communication medium, network is no more available to other neighbor vehicles. The aim of this attacker is to prevent the authenticate user to access the network.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June -2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2654 6. CONCLUSION Broadcasting road safety information among vehicles avoid accidents and improve road safety is the main motivation in the development of VANET. It is a promising technology to allow the vehicles to communicate among them. VANET has unique characteristics like change in topology due to vehicle’s fast movements, network disconnections and limited bandwidth. Also to achieve secure communicationis difficult due to the movement of different kinds of travellers on the road. The main objective of this research istodevelop efficient protocol in VANET for secure and efficient message broadcasting. VANET consists of collection of vehicles moving on the road. Each vehicle is connected through ad- hoc infrastructure with smaller coverage area. Every emergency message is broadcast to all the vehicles through multi-hop broadcasting. This research proposedamulti-hop broadcasting protocol. It also cluster the vehicles based on velocity and find out reliable routes between them. It also extends to provide security by identifying false position and false information attacks. REFERENCES [1] MDhanush yadav M and Flory Francis, "Delay and Hop sensitive routing protocol for VANETs", 2017 second IEEE International Conference On Recent Trends in Electronics Information and Communication Technology(RTEICT),May 19-20, 2017. [2] D. Yildiz, S. Karagol and O. Ozgonenel, “A Hyperbolic Location Algorithm for Various Distributions of a Wireless Sensor Networks, Smart Grid and Cities Congress and Fair (ICSG), Fifth International Istanbul, PP. No. 451-459, IEEE 2016. [3] A. Ladas, N. Pavlatos, Nuwan Weerasinghe and C. Politis, “Multipath Routing Approach to Enhance Resiliency and Scalability in Ad-hoc Networks, Ad-hoc and Sensor Networking Symposium”, PP. No. 01-06, IEEE 2016. [4] P. Fazio, M. Tropea, S. Marano, “A distributed hand-over management and pattern prediction algorithm for wireless networks with mobile hosts,” 9th International Wireless Communications and MobileComputingConference,IWCMC, pp. 294-298, IEEE 2013. [5] Rango De F., F. Peppino, M. Salvatore, “Mobility Prediction and Resource Reservation in WLAN Networks under a 2D Mobility Models,” 63rd Vehicular Technology Conference (VTC Fall), PP. No. 783-789, IEEE 2006. [6] F. De Rango, M. Tropea, P. Fazio, S. Marano, “Call admission control with statistical multiplexing foraggregate MPEG traffic in a DVB-RCS satellite network,” GLOBECOM – IEEE Global Telecommunications Conference, pp. 3231- 3236, IEEE 2005. [7] F. De Rango, M. Tropea, P. Fazio, S. Marano, “Call admission control for aggregate MPEG-2 traffic over multimedia geo-satellite networks,” IEEE Transactions on Broadcasting, vol. 54, No. 3, pp. 612-622, 2008. [8] X. Fu, S. Henning, A. Bader, D. Hogrefe, “NSIS: a new extensible IP signaling protocolsuite,”IEEECommunications Magazine, vol. 43, No. 10, PP. No. 45-53, 2005. [9] Ghaboosi, N., & Haghighat, A. T., “Tabu search based algorithms for bandwidth-delay-constrained least-cost multicast routing”, Telecommunication Systems, Vol.34,No. 3, PP. No. 147–166, IEEE 2007. [10] Semchedine, F., Bouallouche-Medjkoune, L., Bennacer, L., Aber, N., & Aı¨ssani, D., “Routing protocol based on Tabu search for wireless sensor networks. Wireless Personal Communications”, Vol. 67, No. 2, PP. No. 105–112, IEEE 2012. [11] El Rhazi, A., & Pierre, S., “A Tabu search algorithm for cluster building in wireless sensor networks. Mobile Computing, IEEE Transactions on, Vol. 8, No. 4, PP. No. 433– 444, 2009. [12] Heinzelman, W. R., Chandrakasan, A., & Balakrishnan,H, “Energy-efficient communication protocol for wireless microsensor networks”, In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference, PP. No. 01-06, IEEE 2000. [13] N. Priyantha, H. Balakrishnan, E. Demaine, and S. Teller. Anchor-freedistributed localization in sensor networks. Technical Report TR-892,MIT LCS, Apr. 2003. [14] S. R. Drake, K. Dogancay, "Geolocationbytimedifference of arrivalusing hyperbolic asymptotes", in Proc. IEEE InternationalConference on Acoustics, Speech, and Signal Processing, vol. 2, pp.361 – 364, 2004. [15] Heinzelman, W. R., Chandrakasan, A., & Balakrishnan,H, “Energy-efficient communication protocol for wireless microsensor networks”, In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference, PP. No. 01-06, IEEE 2000.