Information Sharing in Vehicular AdHoc Network

Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya, Muhammad Sher, Muhammad Khurram Khan

Abstract


Relevance Technique broadcast the useful information and removes the redundant data. 802.11e protocol implementation has certain flaws and is not suitable for VANETs scenarios. Main issue in 802.11e protocol is internal sorting of packets, no priority mechanism within the queues and often lower priority traffic get more medium than high priority traffic. In this paper, the mathematical model of relevance scheme is enhanced so that it can consider the network control in real scenario by considering the impact of malicious node in network. Problems of 802.11e protocol can be resolved by making virtual queue at application level. We analyze the comparison of simple virtual queue with the over all impact of virtual queue and mathematical model. Similarly we compare the mathematical model with over all impact of virtual queue and modified mathematical model using NS-2 simulator.

Keywords


VANETs, Broadcast, 802.11e, Malicious

Full Text:

PDF

References


Y.Wu, L. Yang, G.Wu, J. Guo, An Improved Coded Repetition Scheme for Safety Messaging in VANETs, IEEE, 2009.
http://dx.doi.org/10.1109/wicom.2009.5301828

R. K. Shrestha, S. Moh, I. Chung, D. Choi, Vertex-Based Multihop Vehicle-to-Infrastructure Routing for Vehicular Ad Hoc Networks, IEEE, Proceedings of the 43rd Hawaii International Conference on System Sciences 2010.

H. Kumar, , R.K Singla,., S. Malhotra Issues and Trends in AutoConfiguration of IP Address in MANET, International Journal of Computers Communications and Control, Volume:3, Supplement: Suppl. S, pp. 353-357, 2008.

M. A Rajan, M. G Chandra, L. C. Reddy, P. Hiremath, Concepts of Graph Theory Relevant to Ad-hoc Networks, International Journal of Computers Communications and Control, Volume:3, Supplement: Suppl. S, pp. 465-469, 2008.

J. Sun, C. Zhang, Y. Zhang, Y. Fang, An Identity-Based Security System For User Privacy in Vehicular Ad Hoc Networks, IEEE Transactions On Parallel And Distributed Systems, 2010

S. Dietzel, E. Schoch, B. Konings, M. Weber, Resilient Secure Aggregation for Vehicular Networks, IEEE Network, vol 24 pp 26-31,2010
http://dx.doi.org/10.1109/MNET.2010.5395780

I. Jang, W. Choi, H. Lim, A Forwarding Protocol with Relay Acknowledgement for Vehicular Ad-Hoc Networks, IEEE 2008.

H. L. Nguyen, U. T. Nguyen, Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks, International Conference on Mobile Communications and Learning Technologies, IEEE, 2006.

S. Mao, S. Lin, S. S. Panwar, Y. Wang, E. Celebi, Video Transport Over Ad Hoc Networks: Multistream Coding With Multipath Transport, IEEE Journal on Selected areas in Communications, vol. 21, no. 10, December 2003

B. R. Moyers, J. P. Dunning, R. C. Marchany, J. G. Tront, Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices, Proceedings of the 43rd Hawaii International Conference on System Sciences , 2010.
http://dx.doi.org/10.1109/hicss.2010.170

K.A. Bakar, B. S. Doherty, Evaluation of the Recorded State Mechanism for Protecting Agent Integrity Against Malicious Hosts, International Journal of Computers Communications and Control, Vol.3, No.1, pp. 60-68, 2008

M. Raya, J-P. Hubaux. The security of vehicular ad hoc networks. In Workshop on Security in Ad hoc and Sensor Networks (SASN), 2005.
http://dx.doi.org/10.1145/1102219.1102223

M. Raya, P. Papadimitratos,J.-P. Hubaux, Securing Vehicular Communications, In IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, October 2006.

K. Sha S. Wang, W. Shi, RD4: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs, IEEE Transactions On Vehicular Technology, vol. 59, no. 3, March 2010.

T. Kosch, C. J. Adler, S. Eichler, C. Schroth, M. Strassberger, The scalability problem of vehicular ad hoc networks and how to solve it, IEEE Wireless Communications, October 2006.
http://dx.doi.org/10.1109/WC-M.2006.250354

C. Adler, S. Eichler, T. Kosch, C. Schroth, M. Strassberger, Self-organized and Context- Adaptive Information Diffusion in Vehicular Ad Hoc Networks, 3rd International Symposium on Wireless Communication Systems, 2006.
http://dx.doi.org/10.1109/iswcs.2006.4362309

S. Eichler, C. Schroth, T. Kosch, M. Strassberger, Strategies for context-adaptive message dissemination in vehicular ad hoc networks, Second International Workshop on Vehicle-to- Vehicle Communications, July 2006.

C. Schroth, R. Eigner, S. Eichler, M. Strassberger, A Framework for Network Utility Maximization in VANETs, ACM International Conference on Mobile Computing and Networking, USA September 29, 2006.
http://dx.doi.org/10.1145/1161064.1161079

A. Rahim, M. Yasin, I. Ahmad, Z. S. Khan, M. Sher, Relevance Based Approach with Virtual Queue Using 802.11e protocol for Vehicular Adhoc Networks, 2nd International conference on Computer, Control and Communication, Karachi, 14 Feb 2009.

A. Rahim, F. B. Muhaya, Z. S. Khan, M.A. Ansari, M. Sher, Enhance Relevance based approach for Network Control Relevance, Accepted in Infomatica Journal ISSN: 0350-5596.

Network Simulator, ns2 http://www.isi.edu/nsnam /ns

R. Baumann, F. Legendre, P. Sommer, Generic Mobility Simulation Framework (GMSF), ACM MobilityModels'08, Hong Kong SAR, China, May 26, 2008




DOI: https://doi.org/10.15837/ijccc.2010.5.2252



Copyright (c) 2017 Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya, Muhammad Sher, Muhammad Khurram Khan

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

CC-BY-NC  License for Website User

Articles published in IJCCC user license are protected by copyright.

Users can access, download, copy, translate the IJCCC articles for non-commercial purposes provided that users, but cannot redistribute, display or adapt:

  • Cite the article using an appropriate bibliographic citation: author(s), article title, journal, volume, issue, page numbers, year of publication, DOI, and the link to the definitive published version on IJCCC website;
  • Maintain the integrity of the IJCCC article;
  • Retain the copyright notices and links to these terms and conditions so it is clear to other users what can and what cannot be done with the  article;
  • Ensure that, for any content in the IJCCC article that is identified as belonging to a third party, any re-use complies with the copyright policies of that third party;
  • Any translations must prominently display the statement: "This is an unofficial translation of an article that appeared in IJCCC. Agora University  has not endorsed this translation."

This is a non commercial license where the use of published articles for commercial purposes is forbiden. 

Commercial purposes include: 

  • Copying or downloading IJCCC articles, or linking to such postings, for further redistribution, sale or licensing, for a fee;
  • Copying, downloading or posting by a site or service that incorporates advertising with such content;
  • The inclusion or incorporation of article content in other works or services (other than normal quotations with an appropriate citation) that is then available for sale or licensing, for a fee;
  • Use of IJCCC articles or article content (other than normal quotations with appropriate citation) by for-profit organizations for promotional purposes, whether for a fee or otherwise;
  • Use for the purposes of monetary reward by means of sale, resale, license, loan, transfer or other form of commercial exploitation;

    The licensor cannot revoke these freedoms as long as you follow the license terms.

[End of CC-BY-NC  License for Website User]


INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (IJCCC), With Emphasis on the Integration of Three Technologies (C & C & C),  ISSN 1841-9836.

IJCCC was founded in 2006,  at Agora University, by  Ioan DZITAC (Editor-in-Chief),  Florin Gheorghe FILIP (Editor-in-Chief), and  Misu-Jan MANOLESCU (Managing Editor).

Ethics: This journal is a member of, and subscribes to the principles of, the Committee on Publication Ethics (COPE).

Ioan  DZITAC (Editor-in-Chief) at COPE European Seminar, Bruxelles, 2015:

IJCCC is covered/indexed/abstracted in Science Citation Index Expanded (since vol.1(S),  2006); JCR2018: IF=1.585..

IJCCC is indexed in Scopus from 2008 (CiteScore2018 = 1.56):

Nomination by Elsevier for Journal Excellence Award Romania 2015 (SNIP2014 = 1.029): Elsevier/ Scopus

IJCCC was nominated by Elsevier for Journal Excellence Award - "Scopus Awards Romania 2015" (SNIP2014 = 1.029).

IJCCC is in Top 3 of 157 Romanian journals indexed by Scopus (in all fields) and No.1 in Computer Science field by Elsevier/ Scopus.

 

 Impact Factor in JCR2018 (Clarivate Analytics/SCI Expanded/ISI Web of Science): IF=1.585 (Q3). Scopus: CiteScore2018=1.56 (Q2);

SCImago Journal & Country Rank

Editors-in-Chief: Ioan DZITAC & Florin Gheorghe FILIP.