Information Sharing in Vehicular AdHoc Network

  • Aneel Rahim 1. Prince Muqrin Chair for IT Security, King Saud University, Saudi Arabia 2. International Islamic University, Pakistan
  • Zeeshan Shafi Khan 1. Prince Muqrin Chair for IT Security, King Saud University, Saudi Arabia 2. International Islamic University, Pakistan
  • Fahad Bin Muhaya Prince Muqrin Chair for IT Security, King Saud University, Saudi Arabia
  • Muhammad Sher International Islamic University, Pakistan
  • Muhammad Khurram Khan Center of Excellence in Information Assurance, King Saud University, Saudi Arabia

Abstract

Relevance Technique broadcast the useful information and removes the redundant data. 802.11e protocol implementation has certain flaws and is not suitable for VANETs scenarios. Main issue in 802.11e protocol is internal sorting of packets, no priority mechanism within the queues and often lower priority traffic get more medium than high priority traffic. In this paper, the mathematical model of relevance scheme is enhanced so that it can consider the network control in real scenario by considering the impact of malicious node in network. Problems of 802.11e protocol can be resolved by making virtual queue at application level. We analyze the comparison of simple virtual queue with the over all impact of virtual queue and mathematical model. Similarly we compare the mathematical model with over all impact of virtual queue and modified mathematical model using NS-2 simulator.

References

[1] Y.Wu, L. Yang, G.Wu, J. Guo, An Improved Coded Repetition Scheme for Safety Messaging in VANETs, IEEE, 2009.
http://dx.doi.org/10.1109/wicom.2009.5301828

[2] R. K. Shrestha, S. Moh, I. Chung, D. Choi, Vertex-Based Multihop Vehicle-to-Infrastructure Routing for Vehicular Ad Hoc Networks, IEEE, Proceedings of the 43rd Hawaii International Conference on System Sciences 2010.

[3] H. Kumar, , R.K Singla,., S. Malhotra Issues and Trends in AutoConfiguration of IP Address in MANET, International Journal of Computers Communications and Control, Volume:3, Supplement: Suppl. S, pp. 353-357, 2008.

[4] M. A Rajan, M. G Chandra, L. C. Reddy, P. Hiremath, Concepts of Graph Theory Relevant to Ad-hoc Networks, International Journal of Computers Communications and Control, Volume:3, Supplement: Suppl. S, pp. 465-469, 2008.

[5] J. Sun, C. Zhang, Y. Zhang, Y. Fang, An Identity-Based Security System For User Privacy in Vehicular Ad Hoc Networks, IEEE Transactions On Parallel And Distributed Systems, 2010

[6] S. Dietzel, E. Schoch, B. Konings, M. Weber, Resilient Secure Aggregation for Vehicular Networks, IEEE Network, vol 24 pp 26-31,2010
http://dx.doi.org/10.1109/MNET.2010.5395780

[7] I. Jang, W. Choi, H. Lim, A Forwarding Protocol with Relay Acknowledgement for Vehicular Ad-Hoc Networks, IEEE 2008.

[8] H. L. Nguyen, U. T. Nguyen, Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks, International Conference on Mobile Communications and Learning Technologies, IEEE, 2006.

[9] S. Mao, S. Lin, S. S. Panwar, Y. Wang, E. Celebi, Video Transport Over Ad Hoc Networks: Multistream Coding With Multipath Transport, IEEE Journal on Selected areas in Communications, vol. 21, no. 10, December 2003

[10] B. R. Moyers, J. P. Dunning, R. C. Marchany, J. G. Tront, Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices, Proceedings of the 43rd Hawaii International Conference on System Sciences , 2010.
http://dx.doi.org/10.1109/hicss.2010.170

[11] K.A. Bakar, B. S. Doherty, Evaluation of the Recorded State Mechanism for Protecting Agent Integrity Against Malicious Hosts, International Journal of Computers Communications and Control, Vol.3, No.1, pp. 60-68, 2008

[12] M. Raya, J-P. Hubaux. The security of vehicular ad hoc networks. In Workshop on Security in Ad hoc and Sensor Networks (SASN), 2005.
http://dx.doi.org/10.1145/1102219.1102223

[13] M. Raya, P. Papadimitratos,J.-P. Hubaux, Securing Vehicular Communications, In IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, October 2006.

[14] K. Sha S. Wang, W. Shi, RD4: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs, IEEE Transactions On Vehicular Technology, vol. 59, no. 3, March 2010.

[15] T. Kosch, C. J. Adler, S. Eichler, C. Schroth, M. Strassberger, The scalability problem of vehicular ad hoc networks and how to solve it, IEEE Wireless Communications, October 2006.
http://dx.doi.org/10.1109/WC-M.2006.250354

[16] C. Adler, S. Eichler, T. Kosch, C. Schroth, M. Strassberger, Self-organized and Context- Adaptive Information Diffusion in Vehicular Ad Hoc Networks, 3rd International Symposium on Wireless Communication Systems, 2006.
http://dx.doi.org/10.1109/iswcs.2006.4362309

[17] S. Eichler, C. Schroth, T. Kosch, M. Strassberger, Strategies for context-adaptive message dissemination in vehicular ad hoc networks, Second International Workshop on Vehicle-to- Vehicle Communications, July 2006.

[18] C. Schroth, R. Eigner, S. Eichler, M. Strassberger, A Framework for Network Utility Maximization in VANETs, ACM International Conference on Mobile Computing and Networking, USA September 29, 2006.
http://dx.doi.org/10.1145/1161064.1161079

[19] A. Rahim, M. Yasin, I. Ahmad, Z. S. Khan, M. Sher, Relevance Based Approach with Virtual Queue Using 802.11e protocol for Vehicular Adhoc Networks, 2nd International conference on Computer, Control and Communication, Karachi, 14 Feb 2009.

[20] A. Rahim, F. B. Muhaya, Z. S. Khan, M.A. Ansari, M. Sher, Enhance Relevance based approach for Network Control Relevance, Accepted in Infomatica Journal ISSN: 0350-5596.

[21] Network Simulator, ns2 http://www.isi.edu/nsnam /ns

[22] R. Baumann, F. Legendre, P. Sommer, Generic Mobility Simulation Framework (GMSF), ACM MobilityModels'08, Hong Kong SAR, China, May 26, 2008
Published
2010-12-01
How to Cite
RAHIM, Aneel et al. Information Sharing in Vehicular AdHoc Network. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 5, n. 5, p. 892-899, dec. 2010. ISSN 1841-9844. Available at: <http://univagora.ro/jour/index.php/ijccc/article/view/2252>. Date accessed: 30 nov. 2021.

Keywords

VANETs, Broadcast, 802.11e, Malicious