A SECURE ALERT MESSAGING FOR VEHICULAR AD HOC NETWORKS
|
|
- MargaretMargaret Cameron
- 5 years ago
- Views:
Transcription
1 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) ISSN (Print) ISSN (Online) Volume 5, Issue 12, December (2014), pp IAEME: Journal Impact Factor (2014): (Calculated by GISI) IJCET I A E M E A SECURE ALERT MESSAGING FOR VEHICULAR AD HOC NETWORKS Shikha Saju, Smitha Suresh 1 M Tech Student, Computer Science and Engineering, Sree Narayana Gurukulam College of Engineering, India 2 Associate Professor, Computer Science and Engineering, Sree Narayana Gurukulam College of Engineering, India ABSTRACT Safety applications provided by Vehicular Ad Hoc Network is very crucial. The vehicles in the road form a network enabling the passengers with infotainment and security. Emergency messages can be disseminated in the VANET scenario for securing the lives of people by avoiding the situations like chain collisions. The main aim of such messages is to provide safety. So these messages should be genuine one and propagated to all the vehicles in the scenario without any delay. In this paper, clustering technique is used along with the trust relationship to disseminate emergency messages in the network to secure the vehicles from hazardous conditions. Keywords: Chain Collision, Cluster, Emergency Messaging, Intruder, Trust. 1. INTRODUCTION Vehicular ad hoc Network (VANET) is an emerging area with various applications. It is a subset of Mobile ad hoc Network (MANET) consisting of various moving nodes (vehicles) as its members. Vehicles in the network communicate with each other sharing different types of information. The vehicles move at varying speed depending on the nature of the drivers. Vehicles disseminate messages for entertainment and security. Various messages regarding the road conditions, weather, traffic etc can be propagated in the network. Emergency messages play an important role in VANET and hence must be disseminated with great care. The emergency messages are disseminated when critical situations are occurred in the road like accidents, emergency brake or any other hazards. These emergency messages are helpful for the drivers to take necessary steps for avoiding dangerous situations in the road or highway. Every vehicle in the VANET are provided with on board units (OBU) containing various sensors for sensing different network conditions. Since these sensors are of low cost, they can be deployed in the VANET scenario for providing more security for the vehicles in the network and for the lives of passengers in the vehicles. The different on board units communicates with each other sharing much relevant and crucial information helping the drivers to take necessary actions. The network consists of a large number of moving nodes with high speed sharing their information regularly without the help of any road side units (RSU). So the main requirement of the VANET is that safety related messages must be reached to all the member vehicles in the network without any delay. So a major concern should be given to the dissemination of emergency messages (Fig. 1) and the assurance of the reception by all the vehicles. Then only the application of security can be completely implemented in the network assuring lives of the passengers more secured. Along with the assurance of the reception in the messages, the factor of trust must also be considered. Trust relationship must be maintained in the network with all the vehicles and road side units. The main aim of trust management in VANETs is to increase the security, reliability of message or information dissemination, reduction of 1
2 traffic congestions and to ensure the safety of passengers in the network. The trust establishments in the scenario will help to detect any false or wrong information propagated among the members and also to find out the malicious or selfish users. These trustful messages will help the drivers to take appropriate actions during hazards or critical conditions in the road. The main aim in the deployment of vehicular ad hoc network is to enhance the security of vehicles in the road (network). So the trust relationships must be established and evaluated in the real scenario to take accurate decisions during the emergency situations in the highway. The model can manage different vehicles dynamically with the dynamic topology change of network ensuring the security. The untruthful or selfish nodes can be detected easily in the trust evaluation restricting such nodes from further communication inside the network. Thus trust establishment provides more security for the lives of passengers and vehicles in the network. In this paper, the vehicles in the VANET scenario are notified about the emergency event through clustering technique. Also the trust relationship is build to protect from the malicious vehicles. Here privacy of the user is assured with distributed trust establishment. The fake location and time stamp sent by the intruders are detected for more security of the network. The rest of the paper is organized as follows. Section 2 contains the related work. In Section 3, we present the details of our proposed trust management scheme with clustering method and Section 4 consists of the simulation results. Finally, Section 5 includes the conclusion and future work of the work. 2. RELATED WORK 2.1 ROUTING IN VANET Pei et al. [1] discussed about a table driven or proactive routing protocol in which the information regarding every nodes are collected from the neighbouring nodes. Routing table is maintained increasing the storage complexity with the increased network size. Only a partial information is routed for updating, reducing the routing overhead. Perkins et al. [2] discussed the reactive routing protocol which establishes the route on need. This routing protocol is having the sequence number of the destination and hence providing an up to date path to the destination. Excessive memory requirements are not needed and can be used in large scale networks. But the problem is that initial connection setup and communication requires more time. Extra bandwidth is also consumed due to periodic hello messages. Karp et al. [3] proposed greedy perimeter stateless routing which only selects the closest node in the final destination to send the messages. To forward the packet, the node has to remember only one hop neighbour location and these forwarding decisions are made dynamically. The protocol mainly uses the greedy forwarding and perimeter forwarding to disseminate the packets. The information regarding the destination node is never been updated in the packet header of the intermediate node. Santos [4] introduced the cluster based location routing to support the inter vehicle and intra vehicle communications. The clustering scheme used is location specific. The location of the node is very important when the cluster is formed. The route discovery time, end to end delay and number of retransmissions are evaluated. In the case of vehicle to roadside communication the average packet received reduces with the increase in the speed of vehicle. Also the end to end delay, route discovery time and maximum throughput varied very less with the speed of the vehicle. 2.2 TRUST MODELS IN VANET Riaz et al. [5] proposed a robust method to detect false location and time information. The malicious nodes are detected through their messages based on their trust value. The trust value for the genuine nodes will always be greater than the intruders. It achieves security and robustness against the intruders. The problem is that this method will work accurately only if the message is received from the intruder directly. Huang et al. [6] addresses limitations of information cascading and oversampling. This can be avoided by giving weights to the nodes. It means that the nodes who have observed the events are given weight 1 and the intermediary nodes with less weight. So the messages can be received made trustful and be used. Chen et al. [7] designed a framework to support the information sent by the neighbouring nodes and to effectively control the false or malicious information reception in the network. The quality of the message is evaluated in a distributed fashion. The malicious users are prevented from intruding into the network through clustering of the nodes. But the problem is that privacy and robustness are not given much importance in the work. Minhas et al. [8] introduced an approach for modelling trust in VANET environments to restrict the number of reports that are received from other agents. An aggregated feedback mechanism is used which depends on the reliability of the estimated experience-based trust of each other. The confidence value will be calculated and the maximum error rate for the aggregated feedback is noted. The higher rate of confidence states that the message can be trusted in the network. The trust model is aimed to be decentralized, location or time specific, event or task specific and able to support the system level security. The robustness is not all considered in the method which causes problem in the network. 2
3 Sushmita Ruj et al. [9] proposed method to detect the false alert messages and the misbehaving nodes in the network after observing the actions. Here each node has the ability to decide whether the information received is true or false. And this decision is mainly depending on the reliability of recent messages and new alerts with estimated vehicle positions. The method does not rely on any voting schemes and group associations. Along with the false alert message detection, the false location information can also be detected. Gurung et al. [10] proposed the trust model that directly evaluates the authenticity of the messages received from the vehicles. The content of the message is very important during the verification. The road side units or the central servers are not engaged in the checking of trustworthiness of the message. The message classification and information oriented trust model are the two main components of the framework. The two level clustering mechanisms are used to identify the conflict among the information obtained. The trustworthiness of the message received will be calculated in the next component. Merrihan et al. [11] presented a decentralized trust management and evaluation scheme for the different vehicles in the VANET scenario. A combined trust based scheme is used joining the role based and experience based trust. The node is assigned with a category level based on its trust value and the confidence measurement is done based on the degree of trustworthiness of a node s generated reports. A penalty system is introduced to monitor the intruders and trace their actions. It is an efficient message verification mechanism for vehicular communications. It only considers the trust opinions generated from the trusted nodes and discards from the non trusted ones. 3. A SECURE ALERT MESSAGING IN VANET Figure 1: Occurrence of Emergency Event Vehicular ad hoc networks use the safety related applications for providing the passengers safety. There has the chance to occur many hazards in the highway due to many reasons like over speeding or negligence of the driver. But the disastrous conditions are occurred when chain collisions [12] are happened. This condition can be restricted by notifying the vehicles in the highway about the event. The secure alert messaging in VANET scheme mainly alerts the vehicle about the event with trustful messages and avoids the chain collision. The messages are disseminated in the network with clustering technique and the trust values calculated will provide the authenticity of the received messages. 3.1 CLUSTER FORMATION The network can be clustered to disseminate the emergency message faster and securer. The clustering technique will avoid the redundancy of the messages in the network and the broadcast storm problem [13] caused due to the broadcasting method. In the clustering technique, the whole network is divided into clusters or grids and the cluster heads will be elected to transmit the message to the next clusters. These clusters are in charge for disseminating the emergency messages to all the vehicles in the network. So the cluster formation must be faster and dynamic one. The clusters which are formed far away are notified with the help of RSUs Formation of Grid The entire network of the VANET is partitioned into two-dimensional logical grid. The grid cell is a square having a size m*m. Each grid cell is given a grid id for identification. 3
4 Let the VANET scenario be represented by x and y coordinates in X and Y meters and initial length of the grid cell as m. So the two variables p and q can be defines as, (1) The number of grid cells can be found out by using the values obtained in equation (1) and (2), (2) The four corner coordinates must be calculated for the grid cells in the network, (3) The x and y values are calculated using the remainder value and quotient value theorems respectively. The grids are formed in the VANET and each grid cell is given an id to identify them The Midpoint of the Grid Cell is found The midpoint of the grid cell can be identified by using the mathematical equation for finding the midpoint. Here the grid size is known and hence the coordinates of the grid can be found out to obtain the midpoint of the cell. (4) (5) The values of x1, x2, y1 and y2 can be calculated using the following ways, Each node is identified by its grid id and node id. So no other unique names are required for identification. The midpoints are thus calculated Selection of Cluster Head The midpoint of the grid cell is known and the node which is closer to the midpoint is elected as the cluster head. The cluster head can have the ability to disseminate the emergency message to a larger number of vehicles. So the vehicle which lies middle position of the cluster is selected as the cluster head. 3.2 TRUST MANAGEMENT A trust based emergency messaging scheme is used in vehicular ad hoc networks to support trust models used to evaluate the authenticity of information shared among the peers in the network. The topology of aggregation is based on a cluster-based message routing mechanism. For each cluster, a cluster head is chosen randomly and this cluster head has the duty to disseminate the message to the nearby clusters. Trust opinions are aggregated when the message from the (6) (7) (8) (9) (10) 4
5 previous hop clusters and this message is passed on to the cluster members. The cluster head waits for the opinion of its cluster members after disseminating the emergency message in the cluster. Then it is relayed to the next clusters. Trust based message evaluation allows each peer to evaluate the trustworthiness of the message by also taking into account other peers trust opinions about the message and the peer-to-peer trust of these peers. This will help the vehicle to trust the neighboring vehicles. To implement message aggregation scheme a secure and efficient one is vital. One of the solutions to be used is to include signature along with each message sent. Along with the message signatures can be appended, it cannot be maliciously adapted devoid of being detected. Once messages are signed neighbors cannot deny that the messages are sent by them. The signature scheme helps in the authenticity of the received message to protect from non repudiation. The message relay control should be trust based one to sort out the false messages which utilize the insufficient resources such as channel bandwidth to support network scalability. The presence of intruder vehicles must be detected in the VANET, and reduce their node s weight in the network. Thus it controls the harmful situations in the network. Based on the parameters such as location of the message designer and the originality of the message that is the time at which the message was generated are used to detect the wicked messages. It is valuable to detect the trust on data-centric than on the entity-centric. To progress the efficiency of the trust based aggregation method, it will be useful to integrate improvements. Due to multifarious road settings only a division of trust opinions is obtainable for aggregation, thus the usefulness of the system should be calculated in the lack of some the trust opinions. The concentration of vehicles is another parameter for evaluating the aggregation system. Since nodes (vehicles) in VANET have high mobility, thus at some occasion the number of nodes may be very large in number or there may be a lesser amount of vehicles in the road. So the aggregation mechanism used must have the capability to deal with the concentration of vehicles and with data sparse. The emergency event can be detected by the vehicle in the network and the alert messages are propagated in the VANET. The trust relationship is build and the message received is checked for its validity. The malicious vehicles are detected and the false messages received are discarded. The messages from false location also with false timestamp are detected and these vehicles are restricted from injecting further false messages in the network. The functional block diagram is shown in Figure 2. First the VANET topology is created in the network with a number of nodes. Thus the highway is consisting of a number of vehicles moving in opposite directions. The vehicles in the network communicate with each other with periodic beacon messages to update their status. The beacon messages are shared to inform the speed, location etc. of the vehicles moving in the road (network). The occurrence of an emergency event in the highway is detected by the vehicle. Immediately cluster is formed in the road with a small number of vehicles with a cluster head. The cluster head is responsible for disseminating the emergency messages inside the cluster and to other clusters. The middle vehicle in the cluster is elected as the cluster head to propagate the message with more number of vehicles in the group. Then vehicle which receives the message validates the message. After checking the validity of the message, it is disseminated in the network or else it is dropped. Figure 2: Functional Block diagram 5
6 4. SIMULATION RESULTS For the evaluation purposes, the VANET topology was formed in Network Simulator version 2. The transmission range was set to 400m and the simulation carried out in 31 nodes. The main parameters used in NS2 are given in Table I. TABLE I. Channel Type Propagation Model MAC Antenna PARAMETERS USED IN NS2 Channel/Wireless Channel Propagation/Two ray Ground Mac/ Omni directional No. of nodes 31 Transmission range Initially the VANET topology is created in the network simulator with 31 nodes shown in Fig. 3. The vehicles are moving and they are periodically transmitting beacon messages with an interval of 10ms. 400m Figure 3: Initial VANET topology Any emergency event in the network can occur. The occurrence of emergency event in the road causes the dissemination of emergency messages. The clusters are created in the network dynamically to send the alert messages to all the vehicles in the network. These emergency messages are propagated among the clusters which are formed in the network immediately after the occurrence of the event. It is shown in the Fig. 4. Figure 4: Disssemination of Emergency messages through clusters 6
7 The messages received are checked by the vehicles and the false messages sent by the malicious nodes are rejected as shown in Fig. 5. The vehicle receiving the false message verifies the timestamp of the message received and the location of the sender. The false location and timestamp are checked by the receivers and the messages are discarded when they are found to be untrustful without forwarding to the other vehicles in the network. The rest of the cluster members are notified about the intruder in the network by the receiver. 5. CONCLUSION AND FUTURE WORK Figure 5: Discarding the false messages In Vehicular ad hoc Networks, the vehicles are in contact with each other. Each vehicle communicates in regular periods by sending beacon messages. The main difference between other ad hoc networks is that VANET topology changes frequently. Traffic accidents or other emergency situations can occur in the network and the members in the VANET scenario must be notified about the event. So such emergency messages must be reached to all the nodes (vehicles) without any delay. Also, the messages received must not be from an intruder. The authenticity of the messages must be proved to take necessary actions. Here grid based clustering technique is used for the emergency message dissemination. The clustering technique enables the reception of these emergency messages without much delay and the vehicles to take appropriate steps before the occurrence of a hazard. The trust for the messages is provided with the location and time closeness. The verification process verifies all the parameters and hence complete trust is provided. Thus the emergency messages are disseminated very fast without any delay using the clustering technique and the trust is build between the peers in the network. The method is not bulletproof to all types of attacks. So future works lies in establishing a network that is resistant to all types of attacks and protect the VANET from all types of intruders. REFERENCES [1] Pei G., Gerla M. and Chen, T.-W (2000), Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks, Proc. ICC 2000, New Orleans, LA, June [2] Perkins C., Belding-Royer E., Das S. (July 2003) Ad Hoc On-Demand Distance Vector (AODV) Routing. [3] Karp B. and Kung H. T. (2000), GPSR: Greedy Perimeter Stateless Routing for Wireless Networks in Mobile Computing and Networking, pages , [4] R. A. Santos Supporting Inter-Vehicular and Vehicle-Roadside Communications over a Cluster-Based Wireless Ad Hoc Routing Algorithm. [5] Riaz Ahmed Shaikh, Ahmed Saeed Alzahrani, Intrusion-aware trust model for vehicular ad hoc networks. Published in Wiley Online Library in Security and Communication Networks (Aug 2013). [6] Zhen Huang, Sushmitha Ruj, Marcos Cavenaghi, Amiya Nayak. Limitations of Trust Management Schemes in VANET and Countermeasures, In IEEE 22 nd International Symposium on Personal Indoor and Mobile Radio Communications (2011). [7] Jie Zhang, Chen Chen, Robin Cohen, Trust Modeling for message Relay Control action decision making in VANETs. Published in Securiy and Communication Networks, volume 6 (2013). 7
8 [8] Minhas U. F., Zhang J., Tran T., Cohen R. Intelligent Agents in Mobile Vehicular Ad Hoc Networks: Leverging Trust Modeling Based on Direct Incentives for Honesty. In proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Toronto, Canada, vol.2, pp (2010). [9] Sushmita Ruj, Macros A. Cavenaghi, Zhen Huang, Amiya Nayak and Ivan Stojmenovic. On Data-Centric Misbehavior Detection in VANETs. Published in Vehicular Technology Conference (VTC Fall), 2011 IEEE, 5-8(2011). [10] Sashi Gurung, Dan Lin, Anna Aquicciarini, and Elisa Bertino, Information- oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. Published in the 7 th International Conference on Network and System Security (2013). [11] Merrihan Monir, Ayman Abdel-Hamid and Mohammed Abd El Aziz. A Categorized Trust-Based Message Reporting Scheme for VANETs. Advances in Security of Information and Communication Networks in Computer and Information Science vol. 381, Springer Link (2013). [12] Q. Xu, R. Sengupta and D. Jiang, Design and Analysis of Highway safety Communication protocol in 5.9 GHz dedicated short range Communication Spectrum, IEEE Trans. Veh. Technol., vol. 57, no. 4, pp , [13] O. K. Tonguz, N. Wisitpongphan, J. S. Parikh, F. Bhai, P. Mudalige and V. K. Sadekar, On the broadcast storm problem in ad hoc Wireless Networks in Proceedings of International Conference on Broadband Comunications, Networks and Systems, 2006, pp [14] Dr.S.Rajalakshmi and S.T.Tharani, Signature Seeking Drive for Incentive Based Ad Dissemination in Vehicular Networks, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp , ISSN Print: , ISSN Online: [15] Mitul K. Patel, Study of Localization Techniques in Vehicular Ad-Hoc Networks, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 4, 2013, pp , ISSN Print: , ISSN Online:
Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network
Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,
More informationCOOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS
COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com
More informationSecure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationAanchal Walia #1, Pushparaj Pal *2
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationMitigating Malicious Activities by Providing New Acknowledgment Approach
Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India
More informationMitigating Superfluous Flooding of Control Packets MANET
Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:
More informationAnalyzing Routing Protocols Performance in VANET Using p and g
Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,
More informationReliable Routing In VANET Using Cross Layer Approach
Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationAn Efficient Data Transmission in VANET Using Clustering Method
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission
More informationOverview of Challenges in VANET
Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because
More informationThe Challenges of Robust Inter-Vehicle Communications
The Challenges of Robust Inter-Vehicle Communications IEEE VTC2005-Fall Marc Torrent-Moreno, Moritz Killat and Hannes Hartenstein DSN Research Group Institute of Telematics University of Karlsruhe Marc
More informationPerformance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks
, pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationEnergy Aware and Anonymous Location Based Efficient Routing Protocol
Energy Aware and Anonymous Location Based Efficient Routing Protocol N.Nivethitha 1, G.Balaji 2 1 PG student, 2 Asst.Professor Department of Electronics and Communication Engineering Angel College of Engineering
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationEnhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization
Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely
More informationEFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM
EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM D.Yamini 1, J. Jayavel 2 1 III-M.tech(IT), Department of Information technology,
More informationSybil Attack Detection and Prevention Using AODV in VANET
Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru
More informationMobile-Gateway Routing for Vehicular Networks 1
Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,
More informationPrevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing
Ashish Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 14, 51-55 Prevention of Black Hole Attack in Routing Algorithm of MANET Using Trust Based
More informationInternational Journal of Information Movement. Website: ISSN: (online) Pages
REVIEW: VANET ARCHITECTURES AND DESIGN Chetna Research Scholar Department Of Electronic & Communication Engg. Galaxy Global Group of Institutions, Dinarpur Saranjeet Singh Faculty Department of Electronic
More informationEradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data
Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using
More informationAn Efficient Message Protocol Using Multichannel with Clustering
An Efficient Message Protocol Using Multichannel with Clustering Jaejeong Lee 1 and Byoungchul Ahn 2* Dept. of Computer Engineering, Yeungnam University, Gyeongsan, Korea. *Corresponding author: Byoungchul
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationDetection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-issn: 2394-0050, P-ISSN: 2394-0042.Volume 2, Issue 1. (Mar. - Apr. 2015), PP 01-05 www.iosrjournals.org Detection and Removal of Blackhole Attack
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationCHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING
99 CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 5.1 INTRODUCTION Dynamic network topology and limited system resources characterize mobile ad hoc networking. Many routing protocols
More informationEffect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols
Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy
More informationA Priority based Congestion Prevention Technique for Vehicular Ad-Hoc Networks
Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Priority based Congestion Prevention Technique for Vehicular Ad-Hoc
More informationQos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol
Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationInternational Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:
Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The
More informationA Surveying on Road Safety Using Vehicular Communication Networks
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 A Surveying on Road Safety Using Vehicular Communication Networks Padmavathi K Asst. Professor, Department
More informationDetection of Vampire Attack in Wireless Adhoc
Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,
More informationKeywords: Adhoc Network, Vehicular Adhoc Network, VANET, position-based routing protocols. I. INTRODUCTION
ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com A Review: Position based Routing Protocols in VANET Rathod Kirit R 1st PhD Scholar, Rai University, Ahmedabad, Gujarat
More informationImproving Energy and Efficiency in cluster based VANETs through AODV Protocol
Improving Energy and Efficiency in cluster based VANETs through AODV Protocol Prerana Deshmukh PG Department of Computer Science and Engineering, J.D.College of Engineering & Managment, RTMNU, Maharashtra,
More informationMitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks
Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University
More informationSelfish Scheduler for Packet Scheduling Based on Packet Weighted Energy Drain Rate in Manets
Journal of Computer Science, 9 (1): 37-42, 2013 ISSN 1549-3636 2013 Lakshmi and Radha, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/jcssp.2013.37.42
More informationBeacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs
Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationSEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS
SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara
More informationCAODV Free Blackhole Attack in Ad Hoc Networks
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore CAODV Free Blackhole Attack in Ad Hoc Networks Watchara Saetang
More informationUnderstanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol
IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 7, 2013 ISSN (online): 2321-0613 Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol Stavan Karia
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationDESIGN AND DEVELOPMENT OF A WIRELESS SENSOR MODEL FOR VEHICULAR AREA NETWORKS
DESIGN AND DEVELOPMENT OF A WIRELESS SENSOR MODEL FOR VEHICULAR AREA NETWORKS Umesh P, G.Varaprasad Department of Computer Science and Engineering, B.M.S. College of Engineering, Bangalore 5600 19, India.
More informationPERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET
PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationVaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India
Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR
More informationA Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET
A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationProbabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS
, pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More informationCluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS
Cluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS M. A. Berlin Department of computer science and engineering R. M. D Engineering College
More informationMeasure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationEnhancement of VANET Communication Range using WiMAX and Wi-Fi: A Survey
International Journal of Urban Design for Ubiquitous Computing Vol.1, No.1, (2013), pp. 9-16 http://dx.doi.org/10.21742/ijuduc.2013.1.1.02 Enhancement of VANET Communication Range using WiMAX and Wi-Fi:
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationPerformance of New Broadcast Forwarding Criteria in MANET
Performance of New Broadcast Forwarding Criteria in MANET Lijuan Zhu 1, Bu-Sung Lee 1, Boon-Chong Seet 2, Kai-Juan Wong 3, Genping Liu 1, Shell-Ying Huang 1, and Keok-Kee Lee 1 1 Centre for Multimedia
More informationDynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet
African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationAn Algorithm for Dynamic SDN Controller in Data Centre Networks
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 04-08 www.iosrjen.org An Algorithm for Dynamic SDN Controller in Data Centre Networks Nirmala 1, Oliveruth 2, Varun 3 1
More informationPerformance Analysis of Aodv Protocol under Black Hole Attack
International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationA Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks
A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,
More informationOptimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol
More informationCLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,
More informationOn Reputation and Data-centric Misbehavior Detection Mechanisms for VANET
On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET by Zhen Huang Thesis submitted to the Faculty of Graduate and Postgraduate Studies In partial fulfillment of the requirements For
More informationWebpage: Volume 4, Issue VI, June 2016 ISSN
SECURE DYNAMIC SOURCE ROUTING IN MOBILE ADHOC NETWORKS Pooja Sharma 1, Seep Sethi 2 1 M.Tech (ECE), 2 Head of ECE Department Somany (PG) Institute of Technology & Management, Rewari Abstract: A mobile
More informationA Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks
International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2
More informationA Survey of Vehicular Ad hoc Networks Routing Protocols
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 3 July 2013, pp. 829-846 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ A Survey
More informationPerformance Evaluation of VoIP over VANET
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of VoIP over VANET Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com Publishing
More informationA Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014 ISSN
382 An Efficient Data Replication Method for Data Access Applications in Vehicular Ad-Hoc Networks Saranya S, II- M.Tech/CSE, PRIST University, Puducherry, India 605007, Mis.R.Backiyalakshmi, Assistant
More informationA Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile
More informationPerformance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi
More informationQoS Routing for Heterogeneous Mobile Ad Hoc Networks
QoS Routing for Heterogeneous Mobile Ad Hoc Networks Mohammed Abdul Waheed 1, Dr. K Karibasappa 2 1 Research Scholar, Singhania University, Pacheri Bari Dist. Jhunjhunu, Rajasthan, India. Mohdabdul.waheed@mission10x.com,
More informationThe Study of Routing Strategies in Vehicular Ad- Hoc Network to Enhance Security
The Study of Routing Strategies in Vehicular Ad- Hoc Network to Enhance Security Parveen Kumar Research Scholar, CMJ University, Shillong, Meghalaya (India) Abstract In VANET, or Intelligent Vehicular
More informationA New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 5 (June 2012), PP.12-17 www.ijerd.com A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationPerformance Evaluation in MANET by Using NCPR Scheme with Cluster Technique
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 7, July 2015, PP 22-31 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Performance Evaluation in MANET by Using NCPR
More informationPacket Routing using Optimal Flooding Protocol in Cluster based MANET
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya
More informationEfficient Working of Vehicular Ad-Hoc Network with Carry Forward Technique
Efficient Working of Vehicular Ad-Hoc Network with Carry Forward Technique Govind Sood 1, Dr. Tanu Preet Singh 2 ergovind.sood333@gmail.com, tanupreet.singh@gmail.com Abstract Vehicular Ad-Hoc network
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More information