A Survey on VANETs: Challenges and Solutions

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Vehicular Ad-hoc Network (VANET) is an advanced style and subcategory of a Mobile Ad hoc Network (MANET), the main objective of VANET's is to create an Intelligent Transport System (ITS), to reduce traffic congestion, accidents or assistance as gates to other networks such as the Internet. VANET is responsible for the communication between moving vehicles in a certain environment. A vehicle can communicate with another vehicle directly which is termed Vehicle to Vehicle (V2V) communication, or a vehicle can communicate to an infrastructure such as a Road Side Unit (RSU), identified as Vehicle-to-Infrastructure (V2I). VANET networks have now been established as reliable networks used by vehicles for communication on highways or urban environments. The goal of VANET is to help a group of vehicles to establish and maintain a network of communications between them without using any central base station. Along with benefits, there are a large number of challenges facing VANET.  In this research, we present a comprehensive review of the challenges facing these networks with some of the proposed solutions, Researchers will gain best understand of VANETs challenges and research trends from the study.

     

     

  • Keywords


    VANET, MANET, ITS, V2V, V2I.

  • References


      [1] Olariu S, Weigle MC. Vehicular networks: from theory to practice. 1st ed. Chapman&Hall/CRC; 2009.

      [2] Saif Al-Sultan, Moath M.Al-Doori, Ali H. Al-Bayatti and Hussien Zedan,“A comprehensive survey on vehicular Ad Hoc network”, Journal of Network and Computer Applications, Elsevier, vol. 37, pp.380-392, January 2013.

      [3] Marwa Altayeb and Imad Mahgoub “A Survey of Vehicular Ad hoc Networks Routing Protocols” International Journal of Innovation and Applied Studies, ISSR Journals, Vol. 3 No. 3, pp. 829-846, July 2013.

      [4] Mr. Bhagirath Patel, Ms. Khushbu Shah “A Survey on Vehicular Ad hoc Networks,” IOSR Journal of Computer Engineering (IOSR-JCE) Vol. 15, Issue 4, PP 34-42, (Nov. - Dec. 2013).

      [5] Moustafa H, Zhang Y. Vehicular networks: techniques, standards, and applications.CRC Press; 2009.

      [6] Jiang D, Taliwal V, Meier A, Holfelder W, Herrtwich R. Design of 5.9 Ghz dsrc-basedvehicular safety communication. IEEE Wireless Communications 2006;13(5):36–43 .

      [7] R. Thenmozhi , Yusuf H., “Survey on Collision Avoidance System in VANET”, INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH & DEVELOPMENT, Vol 3 Issue 4, 2014.

      [8] M. L. Sichitiu and M. Kihl, “Inter-Vehicle Communication Systems: A Survey,” IEEE Commun. Surveys Tutorials, vol. 10, no. 2, pp. 88–105, 2nd Quarter 2008.

      [9] C2C-CC, “Car to Car Communication Consortium Manifesto: Overview Overview of the C2C-CC System,” Car to Car Communication Consortium, Tech. Rep. Version 1.1, 2007.

      [10] ETSITR102638, Intelligent Transport System (ITS); Vehicular Communications; Basic Set of Applications; Definition, ETSI Std. ETSI ITS Specification TR 102 638 version 1.1.1, June 2009.

      [11] ITS JPO, “Vehicle safety applications,” US DOT IntelliDrive(sm) Project - ITS Joint Program Office, Tech. Rep., 2008.

      [12] SAFESPOT D8.4.4, “Use cases, functional specifications and safety margin applications for the SAFESPOT Project,” IST Safespot Project, Tech. Rep. Safespot IST-4-026963-IP deliverable D8.4.4, 2008, pp. 154.

      [13] PREDRIVE D4.1, “Detailed description of selected use cases and corresponding technical requirements,” IST PreDrive C2X project, Tech. Rep. PreDrive C2X deliverable D4.1, 2008.

      [14] VSC, “Final Report,” US DOT, Vehicle Safety Communications Project DOT HS 810 591, April 2006.

      [15] VSC-A, “Final Report,” US DOT, Vehicle Safety Communications Applications (VSC-A) Project DOT HS 810 073, 2009 January 2009.

      [16] M. Raya and P. Papadimitratos and J.-P. Hubaux, “Securing Vehicular Communications,” IEEE Wireless Communications, vol. 13, no. 5, pp. 8–15, October 2006.

      [17] L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network (Special Issue on Net Security), vol. 13, no. 6, 1999.

      [18] R. Baldessari, A. Festag, and J. Abeille, “NEMO meets VANET: A Deployability Analysis of Network Mobility in Vehicular Communication,” in 7th International Conference on ITS Telecommunications (ITST ’07). ITST ’07, 2007.

      [19] T. Imielinski and J. Navas, “GPS-Based Addressing and Routing,” IETF RFC 2009, pp. 1–27, November 1996.

      [20] J. Navas and T. Imielinski, “GeoCast Geographic Addressing Routing,” in Proc. ACM Mobicom. ACM, 1997, pp. 66–76.

      [21] J. Vare and J. Syrjarinne and K.-S. Virtanen, “Geographical positioning extension for IPv6,” in Proc. International Conference on Networking (ICN 2004). ICN 2004, 2004.

      [22] B. Haberman and D. Thaler, “Unicast-Prefix-based IPv6 Multicast Addresses,” IETF RFC 3306, August 2002.

      [23] A. Aijaz, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmuller, “Attacks on Inter Vehicle Communication Systems - an Analysis,” in 3rd International Workshop on Intelligent Transportation (WIT 2006). WIT 2006, 2006.

      [24] Website, “Network on Wheels,” http://www.network-on-wheels.de/about.html.

      [25] B. Schneier, “Attack trees: Modeling security threats,” Dr. Dobb’s Journal, December 1999.

      [26] T. Leinm¨uller and E. Schoch and C. Maih¨ofer, “Security Requirements and Solution Concepts in Vehicular Ad Hoc Networks,” in Proceedings of 4th Annual Conference on Wireless Ondemand Network Systems and Services. 2007.

      [27] M. Raya and J. P. Hubaux, “The Security of Vehicular Ad Hoc Network,” in Proc. 3rd ACM workshop on Security of ad hoc and sensor networks (SASN 2005). (ACM SASN 2005), 2005.

      [28] M. Raya and J.-P. Hubaux, “The Security of Vehicular Ad Hoc Network,” Special Issue on Security of Ad Hoc and Sensor Networks, vol. 15, pp. 39–68, 2007.

      [29] M. Gerlach and A. Festag and T. Leinm¨uller and G. Goldacker and and C. Harsch, “Security Architecture for Vehicular Communication,” in Proc. Fourth Workshop on Intelligent Transportation Systems (WIT). WIT 2007, 2007, Germany.

      [30] P. Papadimitratos and L. Buttyan and T. Holczer and E. Schoch and J. Freudiger and M. Raya and Z. Ma and F. Kargl and A. Kung and J.-P. Hubaux, “Secure Vehicular Communications: Design and Architecture,” IEEE Commun. Mag., vol. 46, no. Issue 11, November 2008.

      [31] D. Schellekens, B. Wyseur, and B. Preneel, “Remote Attestation on Legacy Operating Systems With Trusted Platform Modules,” in Proc. First International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 2007). REM 2007, 2007, pp. 1–13.

      [32] P. Golle, D. Greene, and J. Staddon, “Detecting and Correcting Malicious Data in VANETs,” in Proc. First ACM Workshop on Vehicular Ad Hoc Networks (VANET ’04). ACM, 2004.

      [33] J.-P Hubaux and M. Raya and P. Papadimitratos and V. Gligor, “On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks,” in Proc. IEEE Infocom 2008, 2008.

      [34] Jose Maria de Fuentes, Lorena Gonzalez Manzano, Ana Isabel Gonzalez-Tablas and Jorge Blasco “Security Models in Vehicular Ad-hoc Networks: A Survey” IETE Technical Review, Taylor & Francis, Volume 31, Issue 1, pages 47-64, 20 May 2014.

      [35] Venkatesh, A.Indra and R Murali “Routing Protocols for Vehicular Adhoc Networks (VANETs): A Review”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 5, No. 1, January 2014.

      [36] Shilpi Dhankhar and Shilpy Agrawal, "VANETs: A Survey on Routing Protocols and Issues," International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), vol. 3, no. 6, pp. 13427-13435, 2014.

      [37] Moumena Chaqfeh, Abderrahmane Lakas, and Imad Jawhar, "A survey on data dissemination in vehicular ad hoc networks," Vehicular Communications, Elsevier, vol. 1, no. 4, pp. 214-225, October 2014.

      [38] Hassan Hadi Saleh, “Increasing Security for Cloud Computing By Steganography in Image Edges”, Al-Mustansiriyah Journal of Science, Vol. 27, No 4, 2016, pp.83 -87.

      [39] Hassan Hadi Saleh, Soukaena Hassan, “CRITICAL AND IMPORTANT FACTORS RELATED WITH ENHANCING WIRELESS OMMUNICATION USING MIMO TECHNOLOGY”, Diyala Journal of Engineering Sciences, Vol. 08, No. 01, March 2015.

      [40] K. Sha, Y. Xi, W. Shi, L. Schwiebert, and T. Zhang, “Adaptive Privacy-Preserving Authentication in Vehicular Networks,” in Proc. First International on Communications and Networking in China (ChinaCom ’06). ChinaCom ’06, October 2006.

      [41] Y. Xi, K.-W. Sha, W.-Sg Shi, L. Schwiebert and T. Zhang, “Probabilistic adaptive anonymous authentication in vehicular networks,” Journal of Computer Science and Technology (JCST 2008), vol. 23, no. 6, pp. 916–928, November 2008.

      [42] J.- P. Hubaux and S. Capkun and J. Luo, “The Security and Privacy of Smart Vehicles,” IEEE Security & Privacy, vol. 2, no. 3, 2004

      [43] N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” in Proc. 2nd ACM workshop on Wireless security (WiSe 2003). ACM WiSe 2003, 2003.

      [44] A. Vora and M. Nesterenko, “Secure location verification using radio,” in Proc. 8th International Conference Principles of Distributed Systems. OPODIS, 2004, pp.369–383.

      [45] T. Leinm¨uller and E. Schoch and F. Kargl, “Position Verification Approaches for Vehicular AdHoc Networks,” IEEE Wireless Commun., vol. 13, no. 5, pp. 16–21, 2006.

      [46] E. Schoch and F. Kargl and T. Leinm¨uller, “Improved Security in Geographic Ad Hoc Routing through Autonomous Position Verification,,” in Proc. ACM Workshop on Vehicular Ad Hoc Networks (VANET). ACM VANET ’06, 2006.

      [47] J.-H. Song and V. W. S. Wong and V. C.M. Leung, “A framework of secure location service for position-based ad hoc routing,” in Proc. 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, 2004, pp. 99–106.

      [48] Hassan Hadi Salih, “IMPLEMENTATION of ELECTRONIC SYSTEM PARTICULARLY to CANDIDATES APPLYING for ADMISSION to PEASS COLLEGES”, International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 5, Issue. 6, June 2016, pp.61–70.

      [49] J. Zhao and G. Cao, “VADD: vehicle-assisted data delivery in vehicular ad hoc networks,” IEEETrans. Veh. Technol. (TVT 2008), vol. 57, no. 3, pp. 1910–1922, 2008.

      [50] A. Skordylis and N. Trigoni, “Delay-bounded routing in vehicular adhoc networks,” in Proc. 9th ACM international symposium on Mobile ad hoc networking and computing, 2008, pp. 341–350.

      [51] B. Jarupan and E. Ekici, “PROMPT: A cross layer position-based communication protocol for delay-aware vehicular access networks,” Ad Hoc Neworks Journal Special Issue on Vehicular Networks, vol. 8, no. 5, pp. 489–505, July 2010.

      [52] V. Namboodiri and L. Gao, “Prediction-based routing for vehicular ad hoc networks,” IEEE Trans. Veh. Technol., vol. 56, no. 4, 2007

      [53] S. Biswas, R. Tatchikou, and F. Dion, “Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety,” IEEE Commun. Mag., vol. 44, no. 1, pp. 74–82, 2006.

      [54] C.E. Palazzi and S. Ferretti and M. Roccetti and G. Pau and M. Gerla, “How Do You Quickly Choreograph Inter-Vehicular Communications? A Fast Vehicle-to-Vehicle Multi-Hop Broadcast Algorithm, Explained,” in Proc. 4th IEEE Consumer Communications and Networking Conference. IEEE CCNC 2007, 2007, pp. 960–964.

      [55] Z. Niu, Q. N. W. Yao, and Y. Song, “Study on QoS Support in 802.11ebased Multi-hop Vehicular Wireless Ad Hoc Networks,” in Proceedings of 2007 IEEE International Conference on Networking, Sensing and Control. IEEE, 2007, pp. 705–710.

      [56] W. Yao, Q. Ni, Y. Song, and Z. Niu, “DeReQ: a QoS routing algorithm for multimedia communications in vehicular ad hoc networks,” in Proc. International Conference on Wireless Communications and Mobile Computing (WCMC 2007). IEEE, 2007, pp. 393–398.

      [57] T. Kwon, Y. Lee, H. Lee, N. Choi, and Y. Choi, “Macro-Level and Micro-Level Routing (MMR) for Urban Vehicular Ad Hoc Networks,” in Proc. IEEE Global Telecommunications Conference (GLOBECOM ’07). IEEE GLOBECOM ’07, 2007, pp. 715–719

      [58] K. Bilstrup, E. Uhlemann, E. Stroom, and U. Bilstrup, “On the Ability of the 802.11 p MAC Method and STDMA to Support Real-Time Vehicle-to-Vehicle Communication,” Journal on Wireless Communications and Networking, vol. 2009, pp. 1–13, January 2009.

      [59] C. Chigan, V. Oberoi, J. Li, “RPB-MACn: A relative position based collision-free mac nucleus for vehicular ad hoc networks,” in IEEE GLOBECOM 2006. IEEE GLOBECOM 2006, 2006.

      [60] K. A Redmill and M.P. Fitz and S. Nakabayashi and T. Ohyama and F. ¨Ozg¨uner and U. ¨Ozg¨uner and O. Takeshita and K. Tokuda and W. Zhu, “An incident warning system with dual frequency communications capability,” in Proc. IEEE Intelligent Vehicles Symposium, 2003. IEEE, June 2003, pp. 552–557.

      [61] M. Torrent-Moreno and P. Santi and H. Hartenstein, “Distributed Fair Transmit Power Assignment for Vehicular Ad Hoc Networks,” in Proc. the 3rd Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), vol. 2. IEEE SECON 2006, 2006, pp. 479–488.

      [62] V. Kawadia and P.R. Kumar, “Principles and protocols for power control in wireless ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 23, pp. 76–88, 2005.

      [63] L. Yang, J. Guo, and Y. Wu, “Channel Adaptive One Hop Broadcasting for VANETs,” in Proc. 11th International IEEE Conference on Intelligent Transportation Systems, 2008.

      [64] A. Kovacs, “Resource Sharing Principles for Vehicular Communications,” in Proc. IEEE GLOBECOM Autonet 2008 workshop, 2008, pp. 1–10.

      [65] R. Ramanathan and R. Rosales-Hain, “Topology control of multihop wireless networks using transmit power adjustment,” in Proc. IEEE Nineteenth Annual Joint journal of the IEEE Computer and Communications Societies, INFOCOM’00, vol. 2. IEEE INFOCOM ’00, 2000, pp. 404–413.

      [66] C. Chigan and J. Li, “A delay-bounded dynamic interactive power control algorithm for VANETs,” in IEEE International Conference on Communications, 2007. IEEE ICC ’07, 2007, pp. 5849–5855.

      [67] X. Yang and L. Liu and N.H. Vaidya and F. Zhao, “A vehicle-tovehicle communication protocol for cooperative collis+ion warning,” in Proc. 1st Annual Intl. Conf. Mobile and Ubiquitous Syst: Networking and Services, 2004, pp. 114–123.

      [68] Y. Zang, L. Stibor, X. Cheng, H.-J. Reumerman and A Paruzel and A. Barroso, “Congestion control in wireless networks for vehicular safety applications,” in Proc. 8th European Wireless Conference, 2007.

      [69] M. Torrent-Moreno, D. Jiang and H. Hartenstein, “Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks,” in Proc. 1st ACM international workshop on Vehicular ad hoc networks. ACM New York, NY, USA, 2004, pp. 10–18.

      [70] J. Peng and L. Cheng, “A distributed mac scheme for emergency message dissemination in vehicular ad hoc network,” IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3300–3308, 2007.

      [71] A. Hassan, M. El-Shehaly, and A. Abdel-Hamid, “Routing and reliable transport layer protocols interactions in MANETs,” in Proc. International Conference on Computer Engineering & Systems (ICCES ’07. ICCES ’07, 2007, pp. 359–364.

      [72] M. Bechler, S. Jaap, and L. Wolf, “An optimized tcp for internet access of vehicular ad hoc networks,” Lecture Notes in Computer Science, vol. 3462, pp. 869–880, 2005.

      [73] R. Schmilz, A. Leiggener, A. Festag, L. Eggert, and W. Effelsberg, “Analysis of path characteristics and transport protocol design in vehicular ad hoc networks,” in Proc. IEEE 63rd Vehicular Technology.

      [74] Muhammed Abaid Mahdi, Saad Talib Hasson , “A Contribution to the Role of the Wireless Sensors in the IoT Era”, Journal of Telecommunication, Electronic and Computer Engineering, University of Babylon, October 2017, e-ISSN: 2289-8131 Vol. 9 No. 2-11

      [75] S. T. Hasson and Z. Y. Hasan, "Roads clustering approach's in VANET models," 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Baghdad, 2017, pp.316-321. doi: 10.1109/NTICT.2017.7976140


 

View

Download

Article ID: 27987
 
DOI: 10.14419/ijet.v7i4.19.27987




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.