A novel simulation of bellman-dymo protocol in vanet’s ad-hoc network

  • Authors

    • L Pavithra
    • V Sivakumar
    • S Anuja
    https://doi.org/10.14419/ijet.v7i2.33.14206

    Received date: June 17, 2018

    Accepted date: June 17, 2018

    Published date: June 8, 2018

  • VANET, BDYMO, Ad-hoc Network, Routing.
  • Abstract

    Vehicular Ad-hoc Networks (VANET’s) is the recent technology to facilitate the study of simulators. The mobility model and physical layer are the issues in the simulator which impact the output greatly. The simulations of the routing algorithm in the VANET’s are still the major problem. The comparison between the routing protocols is addressed by only some few works. In order to overcome these issues and problems we made a comparison between the hybrids, reactive, geographic routing and pro-active routing protocols by using a simulation platform by integrating the mobility and the physical layer models. It also performs a comparison between the multi-path routing protocols with Ad-hoc network which allows adapting the faster performance. By using the BDYMO protocol in the VANET communication, the overhead in the network is minimized and the performance is improved.

  • References

    1. 1.V. Lakshmi Praba, “Isolating Malicious Vehicles and Avoiding Collision between Vehicles in VANET,” International conference on Communication and Signal Processing on IEEE, 3-5 April 2013, pp. 811-815.
    2. W. Li, A. Tizghadam, and A. Leon-Garcia, “Robust clustering for connected vehicles using local network criticality,” in Proc. IEEE Int. Conf. Commun. (ICC), Ottawa, ON, Canada, 2012, pp. 7157–7161.
    3. F. Chiti, R. Fantacci, and G. Rigazzi, “A mobility driven joint clus-tering and relay selection for IEEE 802.11p/WAVE vehicular net-works,” in Proc. IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, 2014, pp. 348–353.
    4. 4.H.K Choi, I.H Kim, J.C Yoo, “Secure and Efficient Protocol for Vehicular Ad hoc Network with Privacy Preservation”, EURASIP Journal on Wireless Communications and Networking”, 2011.
    5. S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, H. Zedan, "A comprehensive survey on vehicular ad hoc network", J. Netw. Com-put. Appl., vol. 37, pp. 380-392, Jan. 2014.
    6. U. Rajput, F. Abbas, J. Wang, H. Eun, H. Oh, "CACPPA: A cloud-assisted conditional privacy preserving authentication protocol for VANET", Proc. 16th IEEE/ACM Int. Symp. Cluster Cloud Grid Comput. (CCGrid), pp. 434-442, May 2016.
    7. Y.Sun, R.Lu,X. Lin, X.Shen, J.Su,” An Efficient Pseudonymous Authentication Scheme with strong Privacy Preservation for Vehic-ular Communications” IEEE Transactions on Vehicular Technolo-gy,2010.
    8. U. Rajput, F. Abbas, J. Wang, H. Eun, H. Oh, "CACPPA: A cloud-assisted conditional privacy preserving authentication protocol for VANET", Proc. 16th IEEE/ACM Int. Symp. Cluster Cloud Grid Comput. (CCGrid), pp. 434-442, May 2016.
    9. J. Li, H. Lu, M. Guizani, "ACPN: A novel authentication frame-work with conditional privacy-preservation and non-repudiation for VANETs", IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 4, pp. 938-948, Apr. 2015.
    10. L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, B. Qin, "Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response", IEEE Trans. Comput., vol. 65, no. 8, pp. 2562-2574, Aug. 2016.
    11. Z.M.Shen , J.P Thomas, ”Security and QoS Self-Optimization in Mobile Ad-Hoc Networks” IEEE Transactions on Mobile Compu-ting, vol 7, Issue 9, pp 1138 – 1151,Sep 2008.
    12. A. Ahizoune, A. Hafid, and R. B. Ali, “A contention-free broadcast protocol for periodic safety messages in vehicular ad-hoc net-works,” in Proc. IEEE 35th Conf. Local Comput. Netw. (LCN), Denver, CO, USA, Oct. 2010, pp. 48–55.
    13. C.Perkins, E. Belding-Royer, S.Das, “Ad hoc On-Demand Distance Vector(AODV) routing”, RFC 3561,July 2003.
    14. L.A. Maglaras “A novel distributed intrusion detection system for vehicular ad hoc networks” International Journal of Advanced Computer Science and Applications(IJACSA), 6 (4) (2015), pp. 101-106.
    15. S.Xu, y.Mu and W. Susilo,”Authenticated AODV Routing Proto-col Using One-Time Signature and Transitive signature Schemes”, Journal of Networks, Vol 1 No. 1, pp 47 – 53, May 2006.
    16. R. Chai, B. Yang, L. Li, X. Sun, Q. Chen, "Clustering-based data transmission algorithms for VANET", Proc. Int. Conf. Wireless Commun. Signal Process., pp. 1-6, Oct. 2013.
    17. Z. Y. Rawashdeh, S. M. Mahmud, "A novel algorithm to form sta-ble clusters in vehicular ad hoc networks on highways", EURASIP J. Wireless Commun. Netw., vol. 2012, pp. 15, Dec. 2012.
    18. 18.Sivakumar, V. & Rekha, “Node scheduling problem in underwa-ter acoustic sensor network using genetic algorithm ” D. Pers Ubiq-uit Comput (2018). https://doi.org/10.1007/s00779-018-1136-3.
    19. Sivakumar V, Rekha D (2018) Underwater acoustic sensor node scheduling using an evolutionary memetic algorithm. Res J Tele-commun Inf Technol 1:88–94.
  • Downloads

  • How to Cite

    Pavithra, L., Sivakumar, V., & Anuja, S. (2018). A novel simulation of bellman-dymo protocol in vanet’s ad-hoc network. International Journal of Engineering and Technology, 7(2.33), 441-444. https://doi.org/10.14419/ijet.v7i2.33.14206