Information Sharing in Vehicular AdHoc Network
Keywords:
VANETs, Broadcast, 802.11e, MaliciousAbstract
Relevance Technique broadcast the useful information and removes the redundant data. 802.11e protocol implementation has certain flaws and is not suitable for VANETs scenarios. Main issue in 802.11e protocol is internal sorting of packets, no priority mechanism within the queues and often lower priority traffic get more medium than high priority traffic. In this paper, the mathematical model of relevance scheme is enhanced so that it can consider the network control in real scenario by considering the impact of malicious node in network. Problems of 802.11e protocol can be resolved by making virtual queue at application level. We analyze the comparison of simple virtual queue with the over all impact of virtual queue and mathematical model. Similarly we compare the mathematical model with over all impact of virtual queue and modified mathematical model using NS-2 simulator.References
Y.Wu, L. Yang, G.Wu, J. Guo, An Improved Coded Repetition Scheme for Safety Messaging in VANETs, IEEE, 2009. http://dx.doi.org/10.1109/wicom.2009.5301828
R. K. Shrestha, S. Moh, I. Chung, D. Choi, Vertex-Based Multihop Vehicle-to-Infrastructure Routing for Vehicular Ad Hoc Networks, IEEE, Proceedings of the 43rd Hawaii International Conference on System Sciences 2010.
H. Kumar, , R.K Singla,., S. Malhotra Issues and Trends in AutoConfiguration of IP Address in MANET, International Journal of Computers Communications and Control, Volume:3, Supplement: Suppl. S, pp. 353-357, 2008.
M. A Rajan, M. G Chandra, L. C. Reddy, P. Hiremath, Concepts of Graph Theory Relevant to Ad-hoc Networks, International Journal of Computers Communications and Control, Volume:3, Supplement: Suppl. S, pp. 465-469, 2008.
J. Sun, C. Zhang, Y. Zhang, Y. Fang, An Identity-Based Security System For User Privacy in Vehicular Ad Hoc Networks, IEEE Transactions On Parallel And Distributed Systems, 2010
S. Dietzel, E. Schoch, B. Konings, M. Weber, Resilient Secure Aggregation for Vehicular Networks, IEEE Network, vol 24 pp 26-31,2010 http://dx.doi.org/10.1109/MNET.2010.5395780
I. Jang, W. Choi, H. Lim, A Forwarding Protocol with Relay Acknowledgement for Vehicular Ad-Hoc Networks, IEEE 2008.
H. L. Nguyen, U. T. Nguyen, Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks, International Conference on Mobile Communications and Learning Technologies, IEEE, 2006.
S. Mao, S. Lin, S. S. Panwar, Y. Wang, E. Celebi, Video Transport Over Ad Hoc Networks: Multistream Coding With Multipath Transport, IEEE Journal on Selected areas in Communications, vol. 21, no. 10, December 2003
B. R. Moyers, J. P. Dunning, R. C. Marchany, J. G. Tront, Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices, Proceedings of the 43rd Hawaii International Conference on System Sciences , 2010. http://dx.doi.org/10.1109/hicss.2010.170
K.A. Bakar, B. S. Doherty, Evaluation of the Recorded State Mechanism for Protecting Agent Integrity Against Malicious Hosts, International Journal of Computers Communications and Control, Vol.3, No.1, pp. 60-68, 2008
M. Raya, J-P. Hubaux. The security of vehicular ad hoc networks. In Workshop on Security in Ad hoc and Sensor Networks (SASN), 2005. http://dx.doi.org/10.1145/1102219.1102223
M. Raya, P. Papadimitratos,J.-P. Hubaux, Securing Vehicular Communications, In IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, October 2006.
K. Sha S. Wang, W. Shi, RD4: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs, IEEE Transactions On Vehicular Technology, vol. 59, no. 3, March 2010.
T. Kosch, C. J. Adler, S. Eichler, C. Schroth, M. Strassberger, The scalability problem of vehicular ad hoc networks and how to solve it, IEEE Wireless Communications, October 2006. http://dx.doi.org/10.1109/WC-M.2006.250354
C. Adler, S. Eichler, T. Kosch, C. Schroth, M. Strassberger, Self-organized and Context- Adaptive Information Diffusion in Vehicular Ad Hoc Networks, 3rd International Symposium on Wireless Communication Systems, 2006. http://dx.doi.org/10.1109/iswcs.2006.4362309
S. Eichler, C. Schroth, T. Kosch, M. Strassberger, Strategies for context-adaptive message dissemination in vehicular ad hoc networks, Second International Workshop on Vehicle-to- Vehicle Communications, July 2006.
C. Schroth, R. Eigner, S. Eichler, M. Strassberger, A Framework for Network Utility Maximization in VANETs, ACM International Conference on Mobile Computing and Networking, USA September 29, 2006. http://dx.doi.org/10.1145/1161064.1161079
A. Rahim, M. Yasin, I. Ahmad, Z. S. Khan, M. Sher, Relevance Based Approach with Virtual Queue Using 802.11e protocol for Vehicular Adhoc Networks, 2nd International conference on Computer, Control and Communication, Karachi, 14 Feb 2009.
A. Rahim, F. B. Muhaya, Z. S. Khan, M.A. Ansari, M. Sher, Enhance Relevance based approach for Network Control Relevance, Accepted in Infomatica Journal ISSN: 0350-5596.
Network Simulator, ns2 http://www.isi.edu/nsnam /ns
R. Baumann, F. Legendre, P. Sommer, Generic Mobility Simulation Framework (GMSF), ACM MobilityModels'08, Hong Kong SAR, China, May 26, 2008
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.