Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE

Size: px
Start display at page:

Download "Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE"

Transcription

1 IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 02 July 2015 ISSN (online): Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE Mrs. Dhakshu Sivan Department of Computer Science and Engineering NCERC, University of Calicut Thrissur, India Mrs. Jini K.M. Department of Computer Science and Engineering NCERC, University of Calicut Thrissur, India Abstract A navigation system which utilizes the online information gathered from the VANET to guide the drivers to desired destinations in a continuous and real time manner. Vanet based secure and privacy preserving navigation scheme (VSPN) helps to find a better route and also it satisfies all privacy and security requirements. For improving the energy efficiency of individual nodes in VSPN, Long Term Evolution (LTE) technique is introduced. LTE will help to achieve better data rates and content distribution delay can be minimized. This paper aims at describing the analysis and evaluation of VSPN navigation schemes and its enhancement using LTE. Keywords: Navigation, On Board Unit (OBU), Road Side Unit (RSU), Vehicular Adhoc Network (VANET), Long Term Evolution (LTE) I. INTRODUCTION Vehicular adhoc network (VANET) is emerging as a new promising field in wireless technology which aims to deploy vehicle to vehicle communication as well as vehicle to infrastructure communication. Many countries use this technology for efficient traffic management. It forms a core part of intelligent transportation system (ITS). In VANET system, each vehicle is equipped with an onboard unit (OBU), which is responsible for all communication and computation tasks. There are certain roadside units (RSU), which are the wireless infrastructures that are deployed on the roadside. Also, there is a trusted authority and underlying servers which are responsible for security related issues between the vehicle and the RSU unit. The OBUs and RSUs communicate over the wireless channel using the Dedicated Short Range Communications (DSRC) protocol while the RSUs, TA, and the application servers communicate using a wired structure (fixed internet).before entering the network, each vehicle has to register with the authority and preloaded sign in keys and credentials are obtained offline from authority. For ensuring security, filtering of messages is essential. One of the main applications of VANET is to broadcast the information collected from the vehicles which includes vehicles speed, turning direction, road condition, traffic accident information etc. This information will be passed to nearby vehicles and RSU units periodically such that other vehicles can change their travelling route whenever needed. Vanet can also be interpreted as a sensor network. One of the main challenge in the area of Vanet is that how to utilize the collected information for various applications. Fig. 1: Structure of Vanet Earlier, a hardcopy of atlas is used for finding a route from source to destination. But it is a tedious approach. Global positioning system (GPS)[1] system is introduced. By receiving GPS signals, device can determine its current location and finds All rights reserved by 196

2 the geographically shortest route to destination based on local map database. Here the real time road conditions are not considered while performing navigation. Then Traffic message channel (TMC)[2] is introduced.tmc uses an FM radio system to broadcast real time information. But it has its own limitations. Only special conditions are recorded and general fluency of vehicles cannot be obtained. So the requirement persists for an efficient navigation system. The rapid increase of vehicular traffic and congestion on the highways began hampering the safe and efficient movement of traffic. Vanet based secure and privacy preserving navigation (VSPN)[3] scheme utilizes online information collected from the RSU and helps to find the route to the destination. A driver can issue a query (e.g. road conditions along the roads to his destination) to a nearby RSU; this system will automatically collect the required information from the appropriate RSUs. The gathering process is done in a real-time and distributed manner. This system requires security and privacy requirements which includes sender authentication (to ensure that sender is the valid subscriber) and conditional identity privacy preserving (to ensure that a driver s travelling route cannot be traced by any third party except the trusted authority). And there are additional security and privacy requirements. Conditional identity privacy preserving implies that only the trusted authority is capable of knowing the real identity of a vehicle. Similar to other networks, security issues are common in Vanet. Here vehicle to vehicle authentication, vehicle to RSU authentication and RSU to TA authentication should be ensured. Privacy protection is essential as the vehicles onboard unit frequently communicate with RSU. One of the solutions to ensure privacy is by using pseudo identity for different RSU. Also different authentication mechanisms can be used. So that messages between the vehicles and RSUs cannot be linked and travelling route can be protected. Based on the pseudo identity, real identity of vehicle can be obtained from TA. Long Term Evolution (LTE) technique can be implemented with VSPN, hence the efficiency of individual node can be improved and high data rates can be achieved. LTE uses multiple input multiple output(mimo) antenna technology which is a similar technology that is used in IEEE n wireless local area network(wlan) standard. The higher signal to noise ratio at the receiver provides improved coverage and throughput, especially in dense urban areas. In this paper, analysis and evaluation of various navigation schemes are done. Related work is included in section 2. System Model is given in section 3. Section 4 describes the working of VSPN scheme. STE technique is done in section 5, Simulation results in section 6 and Conclusion in section 7. II. RELATED WORKS A similar navigation scheme is SPARK [4]. It is a navigation scheme which helps to find a vacant space in a parking lot. For providing parking convenience for the drivers, a parking guidance system consisting of dynamically updated guide signs has been created to properly guide drivers to park their vehicle in the free space. Earlier sensors were deployed at large parking lots, which was costly, inaccurate and had functionality problems. With the help of Vanet, vehicles communicate with each other and also with RSU from which real time information are collected. Hence this scheme ensures reliable and effective parking. This scheme covers a small parking area whereas the VSPN scheme covers a large city. SPARK scheme is controlled by three RSU whereas the VSPN scheme contains more number of RSU, as it covers the whole city. Providing security to VSPN is also a tedious task. In SPARK, due to limited number of RSU, security guards can monitor the whole system but this is not possible with VSPN.SPARK system could not solve the problem mentioned in this paper. In Vanet, all the vehicles will be moving so that its topology changes rapidly. Hence security issues are common. The Identity based batch verification scheme (IBV)[5] protocol was proposed for vehicle-to-rsu communications. Using three pairing operations, the RSU can verify a large number of signatures as a batch. Each vehicle is equipped with a tamperproof device, in which all the secret keys will be preloaded. If one device is compromised, them the whole system will be compromised. Its privacy requirement is not satisfied as its real identity can be traced by anyone. Anti-traceability attack and impersonation attack are likely to occur. Also this protocol is not suitable for Vehicle to vehicle communication. Another protocol called RSU-Aided Message Authentication Scheme (RAISE) [6] is proposed. It is a software based protocol. With the help of RSU, each vehicle is allowed to verify the signature of nearby vehicles. Here the RSU verifies the signatures one after the other. Hence each RSU need to verify thousands of signatures within a short interval of time. This causes heavy message overhead. Privacy preserving querying is based on the idea of anonymous credential [7][8]. The system allows a user to obtain a credential from one organization and later show the possession of the credential to another organization while the transactions at the two organizations are not linkable. In different applications, the idea of anonymous credential has been adopted. A group signature based communication scheme is proposed [9]. In conventional digital signature scheme, vehicles need to store an extensive number of public/private key pairs, and keys must be changed frequently. Secure distribution of keys, key management, and storage are extremely troublesome in this kind of plan. This novel group signature based security scheme which relies on tamper resistance devices (requiring password access) for preventing adversarial attacks on vehicular networks. This scheme achieves authenticity, data integrity, anonymity, and accountability. A single group public key is used to verify the signature. Security and privacy are key issues. The signature of any vehicle can be verified by the same group key but the actual signer can only be traced by a trusted party. Though privacy can be preserved, these schemes are rather complicated and may not be practical. All rights reserved by 197

3 III. SYSTEM MODEL We have discussed that a vehicular adhoc network consists of on-board units installed on vehicles, road-side units along the roads, and a trusted authority. A. Assumptions The following are some assumptions: 1) TA is trusted, as the real identity of vehicles should be known only by the TA. All the other vehicles and RSU are forbidden from knowing the real identity of the vehicle. All the cryptographic functions of key generation are done. Generation and management of anonymous credential should be trusted and is done by TA. Also, the real identity of vehicle is known only by TA. Redundant TAs is developed for avoiding a single point of failure. 2) RSUs are not trusted and inquisitive. Since they are set along roadside, they can be effortlessly bargained. Likewise they are interested about drivers' protection for example, route inquiries. There should be a fixed communication between RSUs and TA. 3) Public key infrastructure (PKI) is used for initial vehicle authentication. Each vehicle Vi has a conventional public key CPKi and a conventional private key CSKi and is given a TA-signed certificate.ta and RSU uses an identity based public key infrastructure. Public key is known by everyone. Also any RSU R i broadcasts its public key which is the same as its real identity RRID i periodically to vehicles that are travelling within the RSU-Vehicle Communications (RVC) range of it. The validity of RRID i can be ensured using a certificate issued by the TA. 4) Our VSPN scheme is assumed to have more number of navigation queries. Each RSU consist of a local database which stores current road conditions and important landmarks and also the directions and distance to nearby RSUs. 5) Each vehicle is equipped with a tamper proof device, in which all cryptographic functions are done. TA will send current time to all RSUs and RSUs will sent it to vehicles. B. Security Requirements The following are various needed security requirements: 1) Message Integrity and authentication: All vehicles and RSUs which sent out messages should be properly authenticated. 2) Identity privacy preserving: Real identity of vehicle should not be known to other vehicles and RSU units otherwise there is a possibility of hacking messages. 3) Traceability: Real identity of the vehicle should be known only to TA. 4) Confidentiality: Navigation query raised by the driver and also the query results should be kept confidential from third party. 5) Unlinkability: Real identity of vehicle should not be linked with query, even though RSUs and TA communicate. IV. VSPN-WORKING Vanet based secure and privacy preserving navigation (VSPN) utilizes the collected data to provide navigation services [3]. This scheme is based on the idea of anonymous credential. Based on the requirements of the driver, query is raised. System will search for the route with minimum travelling delay. TA will generate navigation credential. This will be refreshed periodically so that the security can be ensured. Summarization of the fundamental steps in VSPN working is shown below: 1) At first TA will setup parameters and generate anonymous credential. TA will generate a master secret key, s and it will be broadcasted to all RSU. Conventional public key and private key is used for master key re-encryption. 2) Vehicle V i login to the network using the username and password provided by TA. A master key request is passed to nearby RSU, Rc. 3) Vehicles tamperproof device will request for a navigation credential from RSU,Rj. 4) After verifying vehicle V i identity, RSU Rj send an anonymous credential to vehicles tamperproof device. 5) Vi s tamper-proof device will request for a navigation request from RSU, R k. As there are more number of requests, it will cause delay in processing the navigation query. 6) 6. Query generated by the vehicle, V i is propagated along the RSU network. RSU, R k initiates the route searching process till the query reaches the destination. RSU will check whether the destination is within the communication area. If it is, then the query will be passed to nearby RSU which are closer to destination. 7) A navigation reply message will be constructed by RSU, R d which will be passed along the reverse direction. The message contains the hop information which includes signatures, road condition and average speed of vehicles. 8) Up on receiving the reply message from RSU R k, the vehicle tamperproof device verifies the messages in the forward direction, till it reaches the destination. 9) Each RSU is provided with a navigation session number by which navigation path can be determined. 10) By using Vi s pseudo identity and master secret key, s TA can reveal Vi s real identity for billing purposes. All rights reserved by 198

4 Fig. 2: VSPN Steps Advantages of VSPN scheme is that, information provided by RSUs can properly authenticated before the route is being used and route blocking can be reduced. Navigation queries and results are protected from eavesdroppers. No one including TA can link up query and its identity. Also, it will satisfy all security requirements. One of the disadvantages is that, the existing method will search for all nodes and request of all nodes other than RSU area; it will take more time and more energy for request and data transmission. Also, data advertisement cannot guarantee the delivery of data. V. LTE TECHNIQUE AND WORKING LTE, an abbreviation for Long Term Evolution is a standard for wireless communication and is used for high speed data transmission. This 4G wireless broadband technology is developed by the Third Generation Partnership Project (3GPP). LTE provides significantly increased peak data rates, with the potential for 100 Mbps downstream and 30 Mbps upstream, reduced latency, scalable bandwidth capacity, and backwards compatibility with existing GSM and UMTS technology. LTE will support mixed data, voice, video and messaging traffic. Fig 3: Working of LTE In network Formation, vehicles form clusters. Vehicles in the range of an LTE base station(bs), should communicate a content of common interest (files, maps, live video from disaster area, etc.) to the vehicles, which can communicate with each other using IEEE p on the short range(sr). LTE communication is considered on the long range (LR) links. In LTE, the available spectrum is divided into resource blocks (RB) consisting of 12 adjacent subcarriers, allocated in a 0.5 ms time slot. Here unicasting and multicasting is done. Base station will unicast the message to the selected vehicle and by means of multicasting, message will be passed to nearby vehicles. Vehicles receive the messages on LTE and transmit on the SR p links. Hence content distribution delay can be minimized. The content distribution time is computed as the sum of the time needed to receive the content on the LR and the time needed to multicast it on the SR. For clustering, an hierarchical clustering algorithm, LEACH is used. Nodes calculate the participation standards of candidate Cluster Head (CH), and then nodes choose All rights reserved by 199

5 the best CH according to the ratio between the node s residual energy and the distance to the sink node. By means of unicasting, the messages will be passed to the cluster head. Vehicles take turn in transmitting a certain message. The message contains information about the transmitting vehicle (its ID, IP address, etc.), its channel state information (CSI) on the LR and a pilot sequence on the SR so that the other vehicles estimate their SR CSI with the transmitting vehicle. Unicasting and multicasting are implemented in each vehicle independently. To implement optimized collaborative content distribution, signaling information needs to be exchanged between the vehicles themselves, and between the vehicles and the BS. VI. SIMULATION RESULTS In this section, LTE technique and VSPN scheme is evaluated. Simulation results show that the content distribution delay can be minimized. Graph is plot with number of connections along X-axis and delay along Y-axis. Fig 4.1 illustrates the same. Fig. 4.1: Number of connections versus Delay LTE technique will help to reduce routing overhead. Graph is plot with number of connections along X-axis and routing overhead along Y-axis.Fig 4.2 clearly shows that the LTE technique dominates the existing VSPN scheme. Fig. 4.2: Number of connections versus Routing overhead Simulation result of LTE integrated architecture is given in Fig 4.3. Here all the parameters are computed and the results are evaluated. From results, it is clear that the energy efficiency of the whole network can be improved by means of LTE technique. All rights reserved by 200

6 VII. CONCLUSION Vanet based secure and privacy preserving navigation (VSPN) scheme help to find a better navigation path using the real time information collected from RSU. It will satisfy all security and privacy requirements. But there is no provision to improve the lifetime of the individual node. In many applications, the node closer to the sink are overburdened with huge traffic load as the data from the entire region are forwarded through them to reach to the destination. For long range communication, Long term evolution (LTE) technique is introduced. With the help of LTE, co-operative delay-sensitive content distribution in public safety vehicular ad hoc networks was investigated and high data rates can be achieved. Simulation results shows that the best performance was achieved when the base station unicasts the content to a selected vehicle on the long range, and that vehicle multicasts the data to other vehicles within its cooperating cluster. By means of LTE, throughput can be improved and delay can be minimized. Also, packet delivery ratio and data packet received can also be improved. REFERENCES [1] Global Positioning System Standard Positioning Service Signal Specification. Navtech GPS Supply, [2] TrafficMessageChannel (TMC), Available at the link: [3] T.W. Chim, S.M. Yiu, Lucas C.K. Hui and Victor O.K. Li, VSPN: VANET-Based Secure and Privacy-Preserving Navigation, IEEE TRANSACTIONS ON COMPUTERS, Vol. 63, No. 2, February 2014 [4] R. Lu, X. Lin, H. Zhu, and X. Shen, SPARK: A New VANET BasedSmart Parking Scheme for Large Parking Lots, Proc. IEEEINFOCOM 09, pp , Apr [5] C. Zhang, R. Lu, X. Lin, P.H. Ho, and X. Shen, An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks, Proc. IEEE INFOCOM 08, pp , Apr [6] C. Zhang, X. Lin, R. Lu, and P.H. Ho, RAISE: An Efficient RSU Aided Message Authentication Scheme in Vehicular Communication Networks, Proc. IEEE Int l Conf. Comm. (ICC 08), pp , May [7] E. Aimeur, H. Hage, and F. S. M. Onana Anonymous Credentials for Privacy-Preserving E-learning, In Proceedings of the IEEE MCETECH 08, pages 70 80, July [8] Z. Chen and L. Xu, Anti-Collusion Anonymous Credentials Scheme, In Proceedings of the IEEE CIT 06, pages , September [9] A. Wasef and X. Shen, PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks, In Proceedings of the IEEE ICC 08, pages , May All rights reserved by 201

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,

More information

MLAS: Multiple level authentication scheme for VANETs

MLAS: Multiple level authentication scheme for VANETs Title MLAS: Multiple level authentication scheme for VANETs Author(s) Chim, TW; Yiu, SM; Hui, LCK; Li, VOK Citation The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of

More information

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com

More information

Overview of Challenges in VANET

Overview of Challenges in VANET Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because

More information

A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu

A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu Outline Introduction to Vehicular Networks Motivation

More information

An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs

An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology, Chennai rakeshkumarer@gmail.com,

More information

International Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 3, May - Jun 2016

International Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 3, May - Jun 2016 RESEARCH ARTICLE OPEN ACCESS Proxy Based Batch Authentication Scheme for Vehicular Ad Hoc Network Godavari H. Kudlikar [1], Sunita S. Barve [2] Department of Computer Science and Engineering Savitribai

More information

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1

More information

Enhancing Security on Vehicular Adhoc Networks using EMAP-HMAC

Enhancing Security on Vehicular Adhoc Networks using EMAP-HMAC www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Page No.: 704-711 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Enhancing Security on Vehicular

More information

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE and IEEE802.p for vehicular networking: a performance evaluation LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

Analyzing Routing Protocols Performance in VANET Using p and g

Analyzing Routing Protocols Performance in VANET Using p and g Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University

More information

Short-term Linkable Group Signatures with Categorized Batch Verification

Short-term Linkable Group Signatures with Categorized Batch Verification Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Protection Against DDOS Using Secure Code Propagation In The VANETs

Protection Against DDOS Using Secure Code Propagation In The VANETs Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

Enhanced Management of Certificate Caching and Revocation Lists in VANET

Enhanced Management of Certificate Caching and Revocation Lists in VANET Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

Introduction to VANET

Introduction to VANET VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,

More information

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

Mobile-Gateway Routing for Vehicular Networks 1

Mobile-Gateway Routing for Vehicular Networks 1 Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Keywords VANET, Routing protocols, AODV, DSR, DSDV.

Keywords VANET, Routing protocols, AODV, DSR, DSDV. Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study

More information

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Reliable and Efficient flooding Algorithm for Broadcasting in VANET Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU

Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 1, January 2015 Message Authentication Scheme for Vehicular Ad-Hoc Wireless

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 831 Performance Analysis of Reactive and Proactive Routing Protocols for Vehicular Adhoc Network Ms. Monika

More information

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Uttara Vyas 1, Prof. Kamlesh Chopra 2, Prof. Prashant Lakkadwala 3 1 Computer Science and Engineering,Acropolis Technical

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN: Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

Reliable Routing In VANET Using Cross Layer Approach

Reliable Routing In VANET Using Cross Layer Approach Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,

More information

An Efficient Data Transmission in VANET Using Clustering Method

An Efficient Data Transmission in VANET Using Clustering Method INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission

More information

HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks

HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks D.Thriveni 1, G.T.Prasanna Kumari 2 1 M.Tech Student, S.V.Engineering College for Women, Tirupati, India 2 Associate Professor, Dept.

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Sybil Attack Detection in Mobile Adhoc Network

Sybil Attack Detection in Mobile Adhoc Network Sybil Attack Detection in Mobile Adhoc Network 469 1 Yamini D. Malkhede, 2 Purnima Selokar 1 Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, Maharashtra, India

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

PMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks

PMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks PMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks J.Sahana, PG Scholar Department of Computer Science and Engineering Sree Sowdambika College of Engineering Aruppukottai,

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,

More information

DESIGN AND DEVELOPMENT OF A WIRELESS SENSOR MODEL FOR VEHICULAR AREA NETWORKS

DESIGN AND DEVELOPMENT OF A WIRELESS SENSOR MODEL FOR VEHICULAR AREA NETWORKS DESIGN AND DEVELOPMENT OF A WIRELESS SENSOR MODEL FOR VEHICULAR AREA NETWORKS Umesh P, G.Varaprasad Department of Computer Science and Engineering, B.M.S. College of Engineering, Bangalore 5600 19, India.

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-issn: 2394-0050, P-ISSN: 2394-0042.Volume 2, Issue 1. (Mar. - Apr. 2015), PP 01-05 www.iosrjournals.org Detection and Removal of Blackhole Attack

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Privacy in VANET using Shared Key Management

Privacy in VANET using Shared Key Management Privacy in VANET using Shared Key Management Jessy Paul 1, Elizabeth Saju 2, Mercy Joseph Poweth 3 Professor, Dept. of Civil Engineering, MACE, Kothamangalam, Kerala, India P.G Student, Dept. of Computer

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

Security of vehicular communications. Vehicular communication (VC) systems

Security of vehicular communications. Vehicular communication (VC) systems Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use Connected Car Dr. Sania Irwin Head of Systems & Applications May 27, 2015 1 Nokia Solutions and Networks 2014 For internal use Agenda Introduction Industry Landscape Industry Architecture & Implications

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Improving Energy and Efficiency in cluster based VANETs through AODV Protocol

Improving Energy and Efficiency in cluster based VANETs through AODV Protocol Improving Energy and Efficiency in cluster based VANETs through AODV Protocol Prerana Deshmukh PG Department of Computer Science and Engineering, J.D.College of Engineering & Managment, RTMNU, Maharashtra,

More information

ISSN Vol.03,Issue.36 November-2014, Pages:

ISSN Vol.03,Issue.36 November-2014, Pages: ISSN 2319-8885 Vol.03,Issue.36 November-2014, Pages:7151-7157 www.ijsetr.com Implementation of Expedite Message Authentication Protocol for Vehicular Ad-Hoc Networks SHAIK PATTA ABDUL KHAYUM 1, C. MD GULZAR

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

SURVEY OF VEHICLE AD-HOC NETWORK

SURVEY OF VEHICLE AD-HOC NETWORK SURVEY OF VEHICLE AD-HOC NETWORK DEESHA G. DEOTALE 1 & UMA NAGARAJ 2 1,2 Department of Computer Engineering M.A.E Alandi (D) Pune India E-mail : disha.deotale21@gmail.com & umanagaraj67.@gmail.com Abstract

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

A Review on Vehicular Ad-Hoc Network

A Review on Vehicular Ad-Hoc Network A Review on Vehicular Ad-Hoc Network Arshdeep Kaur 1, Shilpa Sharma 2 M.Tech Student, Dept. of Computer Science Engineering, Lovely Professional University, Phagwara, Punjab, India 1 Assistant Professor,

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

A Surveying on Road Safety Using Vehicular Communication Networks

A Surveying on Road Safety Using Vehicular Communication Networks Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 A Surveying on Road Safety Using Vehicular Communication Networks Padmavathi K Asst. Professor, Department

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

A Priority based Congestion Prevention Technique for Vehicular Ad-Hoc Networks

A Priority based Congestion Prevention Technique for Vehicular Ad-Hoc Networks Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Priority based Congestion Prevention Technique for Vehicular Ad-Hoc

More information

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks Yi Liu1,2,3 Jie Ling 1 Qianhong Wu4,6 Bo Qin5 Presented By Khaled Rabieh Introduction & Problem Statement In traffic monitoring

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

All Rights Reserved 2017 IJARCET

All Rights Reserved 2017 IJARCET END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

International Journal of Computer & Organization Trends Volume 5 Issue 1 Jan to Feb 2015

International Journal of Computer & Organization Trends Volume 5 Issue 1 Jan to Feb 2015 Introducing Autonomous Car Methodology in WSN Promita Maitra 1, Sohini Nandi 2, Ipsita Saha 3, Poojarini Mitra 4, Sayani Chandra 5 1 Student, Dept. of Computer Science and Engineering, Gurunanak Institute

More information

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS Information Management and Business Review Vol. 6, No. 3, pp. 115-120, Jun 2014 (ISSN 2220-3796) Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS * Kashif Naseer Qureshi, Abdul Hanan Abdullah

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Proxy Signature-based RSU Message Broadcasting in VANETs

Proxy Signature-based RSU Message Broadcasting in VANETs Proxy Signature-based RSU Message Broadcasting in VANETs Subir Biswas Dept. of Computer Science University of Manitoba Winnipeg MB, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Dept. of Computer

More information

Methods to Resolve Traffic Jams using VANET

Methods to Resolve Traffic Jams using VANET Methods to Resolve Traffic Jams using VANET Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab Abstract - In this paper we have proposed a method to avoid

More information