A novel simulation of bellman-dymo protocol in vanet’s ad-hoc network

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Vehicular Ad-hoc Networks (VANET’s) is the recent technology to facilitate the study of simulators. The mobility model and physical layer are the issues in the simulator which impact the output greatly. The simulations of the routing algorithm in the VANET’s are still the major problem. The comparison between the routing protocols is addressed by only some few works. In order to overcome these issues and problems we made a comparison between the hybrids, reactive, geographic routing and pro-active routing protocols by using a simulation platform by integrating the mobility and the physical layer models. It also performs a comparison between the multi-path routing protocols with Ad-hoc network which allows adapting the faster performance. By using the BDYMO protocol in the VANET communication, the overhead in the network is minimized and the performance is improved.

     

     


  • Keywords


    VANET; BDYMO; Ad-hoc Network; Routing.

  • References


      [1] 1.V. Lakshmi Praba, “Isolating Malicious Vehicles and Avoiding Collision between Vehicles in VANET,” International conference on Communication and Signal Processing on IEEE, 3-5 April 2013, pp. 811-815.

      [2] W. Li, A. Tizghadam, and A. Leon-Garcia, “Robust clustering for connected vehicles using local network criticality,” in Proc. IEEE Int. Conf. Commun. (ICC), Ottawa, ON, Canada, 2012, pp. 7157–7161.

      [3] F. Chiti, R. Fantacci, and G. Rigazzi, “A mobility driven joint clustering and relay selection for IEEE 802.11p/WAVE vehicular networks,” in Proc. IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, 2014, pp. 348–353.

      [4] 4.H.K Choi, I.H Kim, J.C Yoo, “Secure and Efficient Protocol for Vehicular Ad hoc Network with Privacy Preservation”, EURASIP Journal on Wireless Communications and Networking”, 2011.

      [5] S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, H. Zedan, "A comprehensive survey on vehicular ad hoc network", J. Netw. Comput. Appl., vol. 37, pp. 380-392, Jan. 2014.

      [6] U. Rajput, F. Abbas, J. Wang, H. Eun, H. Oh, "CACPPA: A cloud-assisted conditional privacy preserving authentication protocol for VANET", Proc. 16th IEEE/ACM Int. Symp. Cluster Cloud Grid Comput. (CCGrid), pp. 434-442, May 2016.

      [7] Y.Sun, R.Lu,X. Lin, X.Shen, J.Su,” An Efficient Pseudonymous Authentication Scheme with strong Privacy Preservation for Vehicular Communications” IEEE Transactions on Vehicular Technology,2010.

      [8] U. Rajput, F. Abbas, J. Wang, H. Eun, H. Oh, "CACPPA: A cloud-assisted conditional privacy preserving authentication protocol for VANET", Proc. 16th IEEE/ACM Int. Symp. Cluster Cloud Grid Comput. (CCGrid), pp. 434-442, May 2016.

      [9] J. Li, H. Lu, M. Guizani, "ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs", IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 4, pp. 938-948, Apr. 2015.

      [10] L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, B. Qin, "Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response", IEEE Trans. Comput., vol. 65, no. 8, pp. 2562-2574, Aug. 2016.

      [11] Z.M.Shen , J.P Thomas, ”Security and QoS Self-Optimization in Mobile Ad-Hoc Networks” IEEE Transactions on Mobile Computing, vol 7, Issue 9, pp 1138 – 1151,Sep 2008.

      [12] A. Ahizoune, A. Hafid, and R. B. Ali, “A contention-free broadcast protocol for periodic safety messages in vehicular ad-hoc networks,” in Proc. IEEE 35th Conf. Local Comput. Netw. (LCN), Denver, CO, USA, Oct. 2010, pp. 48–55.

      [13] C.Perkins, E. Belding-Royer, S.Das, “Ad hoc On-Demand Distance Vector(AODV) routing”, RFC 3561,July 2003.

      [14] L.A. Maglaras “A novel distributed intrusion detection system for vehicular ad hoc networks” International Journal of Advanced Computer Science and Applications(IJACSA), 6 (4) (2015), pp. 101-106.

      [15] S.Xu, y.Mu and W. Susilo,”Authenticated AODV Routing Protocol Using One-Time Signature and Transitive signature Schemes”, Journal of Networks, Vol 1 No. 1, pp 47 – 53, May 2006.

      [16] R. Chai, B. Yang, L. Li, X. Sun, Q. Chen, "Clustering-based data transmission algorithms for VANET", Proc. Int. Conf. Wireless Commun. Signal Process., pp. 1-6, Oct. 2013.

      [17] Z. Y. Rawashdeh, S. M. Mahmud, "A novel algorithm to form stable clusters in vehicular ad hoc networks on highways", EURASIP J. Wireless Commun. Netw., vol. 2012, pp. 15, Dec. 2012.

      [18] 18.Sivakumar, V. & Rekha, “Node scheduling problem in underwater acoustic sensor network using genetic algorithm ” D. Pers Ubiquit Comput (2018). https://doi.org/10.1007/s00779-018-1136-3.

      [19] Sivakumar V, Rekha D (2018) Underwater acoustic sensor node scheduling using an evolutionary memetic algorithm. Res J Telecommun Inf Technol 1:88–94.


 

View

Download

Article ID: 14206
 
DOI: 10.14419/ijet.v7i2.33.14206




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.