A STUDY ON CURRENT TRENDS IN VEHICULAR AD HOC NETWORKS

Similar documents
Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

3. Evaluation of Selected Tree and Mesh based Routing Protocols

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

CHAPTER 5. Simulation Tools. be reconfigured and experimented with, usually this is impossible and too expensive or

Introduction to Mobile Ad hoc Networks (MANETs)

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

International Journal of Information Movement. Website: ISSN: (online) Pages

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Aanchal Walia #1, Pushparaj Pal *2

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

Performance Evaluation of MANET through NS2 Simulation

Multicast over Vehicle Ad Hoc Networks

Executive Overview. D1.3.2-VanetMobiSim/Ns-2: A VANET simulator for CARLINK

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Routing Protocols in MANETs

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Evaluation of Mobility Models For Vehicular Ad-Hoc Network Simulations Atulya Mahajan, Niranjan Potnis, Kartik Gopalan, and An-I A.

Link-Based Wormhole Detection in Wireless Sensor Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

A Survey - Energy Efficient Routing Protocols in MANET

Detecting and Correcting Malicious Data in VANETs

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Defenses against Wormhole Attack

Methods to Resolve Traffic Jams using VANET

Switched Network Latency Problems Solved

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

SUMMERY, CONCLUSIONS AND FUTURE WORK

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

SIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2

Analyzing Routing Protocols Performance in VANET Using p and g

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Introduction to VANET

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

AODV-PA: AODV with Path Accumulation

Computation of Multiple Node Disjoint Paths

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Power aware Multi-path Routing Protocol for MANETS

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Mobile-Gateway Routing for Vehicular Networks 1

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Reliable Routing In VANET Using Cross Layer Approach

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Arvind Krishnamurthy Fall 2003

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks

Wireless Network Security Spring 2014

ASurveyonTopologybasedReactiveRoutingProtocolsinVanets

Lecture (08, 09) Routing in Switched Networks

Evaluation of Information Dissemination Characteristics in a PTS VANET

A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS

A Survey of Vehicular Ad hoc Networks Routing Protocols

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET

A Review on Vehicular Ad-Hoc Network

E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks

High Throughput in MANET Using relay algorithm and rebroadcast probability

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

Routing in Variable Topology Networks

A COMPARISON STUDY OF DSDV AND SEAD WIRELESS AD HOC NETWORK ROUTING PROTOCOLS

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

Cache Timeout Strategies for on-demand Routing in MANETs

PIONEER RESEARCH & DEVELOPMENT GROUP

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Analysis of Routing Protocols over VANET

Performance Evaluation of VoIP over VANET

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

[Shilpa R et al., 3(6): June, 2016] ISSN Impact Factor 2.675

Simulations of VANET Scenarios with OPNET and SUMO

VERGILIUS: A Scenario Generator for VANET

Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET

Sybil Attack Detection and Prevention Using AODV in VANET

Transcription:

953 A STUDY ON CURRENT TRENDS IN VEHICULAR AD HOC NETWORKS K.Prasuna 1, Chilakalapudi Meher Babu 2,K.Ram Kumar 3 1 Asst.Professor, Vijaya Institute of Technology for Women, Enikepadu, INDIA. 2 Ph.D., Scholar, Computer Science & Engg Dept, R.T.M. Nagpur University, Nagpur, India. 3 Asst.Professor, Lingayas Institute of Management and Technology, Enikepadu, INDIA Abstract In vehicular ad hoc networks (VANET), it is possible to locate and track a vehicle based on its transmissions, This type of tracking leads to threats on the location privacy of the vehicle s user. Based on these observations, during the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a growing attention from both academia and industry, due to the amount and importance of the related applications, ranging from road safety to traffic control, up to mobile entertainment. Vehicular Ad-hoc Networks (VANETs) are selforganized networks built up from moving vehicles, and are part of the broader class of Mobile Ad-hoc Networks (MANETs). Because of their peculiar characteristics, VANETs require the definition of specific networking techniques, whose feasibility and performance are usually tested by means of simulation of vehicular traffic. Keywords: traffic & travel information systems, vehicular networks, GPS, wireless technology 1. Introduction Communication in vehicular environments becomes more and more important for the future development in the automotive domain. Vehicular Ad-hoc Networks (VANETs) represent a rapidly emerging, particularly challenging class of Mobile Ad Hoc Networks (MANETs). VANETs are distributed; self organizing communication networks built up from traveling vehicles there have been intensive studies that investigate the problem of information exchange within a wireless multi-hop network. Nevertheless, the high mobility of VANET makes it excessively difficult to perform efficient information exchange in the highly dynamic network. The traditional routing approaches put heavy efforts to maintain an end-to-end connection between communicating nodes or construct an in-network structure to organize the information storage and dissemination. They suffer from the frequent network alternations in the urban VANET environment. Even those frameworks specifically designed for general mobile networks inevitably bring huge network burden for maintaining the ordered structures on top of the unordered network, leading to poor efficiency. Those approaches, like Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector (AODV) routing, or recently proposed Weak State Routing (WSR), largely rely on flooded status information across the entire network for establishing the routes or discovering the resources. The cost of end to-end communication significantly increases due to the node mobility and path dynamics. When dealing with vehicular mobility modeling, we distinguish between macro-mobility and micro-mobility descriptions.

954 For macro-mobility, we intend all the macroscopic aspects which influence vehicular traffic: the road topology, constraining cars movement, the per-road characterization defining speed limits, number of lanes, overtaking and safety rules over each street of the aforementioned topology, or the traffic signs description establishing the intersections crossing rules. Micro-mobility instead refers to the drivers individual behavior, when interacting with other drivers or with the road infrastructure: traveling speed in different traffic conditions; acceleration, deceleration and overtaking criteria, behavior in presence of road intersections and traffic signs, general driving attitude related to driver s age or mood, etc. It would be desirable for a trustworthy VANETs simulation that both macro-mobility and micro-mobility descriptions be jointly considered in modeling vehicular movements. Indeed, many nonspecific mobility models employed in VANETs simulations ignore these guidelines, and thus fail to reproduce peculiar aspects of Vehicular motion, such as car acceleration and deceleration in presence of nearby vehicles, queuing at road intersections, clustering caused by semaphores, vehicular congestion and traffic jams. 2.1. Macro-mobility Features When considering macro-mobility we not only take into account the road topology, but also the road structure (unidirectional or bidirectional, single- or multi-lane), the road characteristics (speed limits, vehicle-class based restrictions) and the presence of traffic signs (stop signs, traffic lights, etc.). 2.1.1. Road topology definition The selection of the road topology is a key factor to obtain realistic results when simulating vehicular movements. Indeed, the length of the streets, the frequency of intersections, the density of buildings can greatly affect important mobility metrics such as the minimum, maximum and average speed of cars, or their density over the simulated map. The level of detail of the maps in the TIGER database is not as high as that provided by the GDF standard, but this database is open and contains digital descriptions of wide urban and rural areas of all districts of the United States. 4. Clustered Voronoi graph: the road topology is randomly generated by creating a Voronoi tessellation on a set of non-uniformly distributed points. This approach is similar to that proposed in, but we also consider the presence of areas with different road densities which we refer to as clusters. 2.1.2. Vehicular movement patterns selection Vehicular traffic schemes in urban scenarios are far from being random. Indeed, cars tend to move between points of interests, which are often common to many drivers and can change in time (e.g., offices may be strong attraction points, but mainly during the first part of the morning). Two choices are given for the trip generation module. The first is a random trip, as the start and stop points of movement patterns are randomly selected among the vertices of the graph representing the road 1. User-defined graph: the road topology is specified by listing the vertices of the graph and their interconnecting edges. 2. GDF map: the road topology is imported from a Geographical Data File (GDF). Unfortunately, most GDF file libraries are not freely accessible. 3. TIGER map: the road topology is extracted from a map obtained from the TIGER database.

955 topology. The second is an activity sequences generation, in which a set of start and stop points are explicitly provided in the road topology description, and cars are forced to move among them. Independently from the trip generation method employed, the path computation, i.e. the selection of the best sequence of edges to reach the selected destination, can be performed in three ways. The first method selects the shortest path to destination, running a Dijkstra s algorithm with edges cost inversely proportional to their length. The second method does not only considers the length of the path, but also the traffic congestion level, by weighting the cost of traversing an edge also on the number of cars traveling on it, thus modeling the real world tendency of drivers to avoid crowded paths. The combination of trip generation and path computation methods offers a wide range of possibilities, when the definition of vehicular movement paths is a factor of interest in the mobility simulation. 2.2. Micro-Mobility Features The concept of vehicular micro-mobility includes all aspects related to an individual car s speed and acceleration modeling. The micro-mobility description plays the main role in the generation of realistic vehicular movements, as it is responsible for effects such as smooth speed variation, cars queues, traffic jams and over takings. Three broad classes of micro-mobility models, featuring an increasing degree of detail, can be identified depending on whether the individual speed of vehicles is computed i) in a deterministic way, ii) as a function of nearby vehicles behavior in a single lane scenario, or iii) as a function of nearby vehicles behavior in a multi-flow interaction (i.e., urban) scenario. The Graph-Based Mobility Model (GBMM), the Constant Speed Motion (CSM) and the Smooth Motion Model (SMM) fall into the first category, as the speed of each vehicle is determined on the basis of the local state of each car and any external effect is ignored. They all constrain a random movement of nodes on a graph, possibly including pauses at intersections (CSM) or smooth speed changes when reaching or leaving a destination (SSM). The movement is random in a sense that vehicles select one destination and move towards it along a shortest-length path, ignoring (and thus possibly overlapping) other vehicles during the motion. While these models may work for isolated cars, they fail to reproduce realistic movements of groups of vehicles. The Fluid Traffic Model (FTM) and Intelligent Driver Model (IDM) are instead part of the second class, as they account for the presence of nearby vehicles when calculating the speed of a car. These models describe car mobility on single lanes, but do not consider the case in which multiple vehicular flows have to interact, as in presence of intersections. The FTM describes the speed as a monotonically decreasing function of the vehicular density, forcing a lower bound on speed when the traffic congestion reaches a critical state. 3. Properties of the Design The advantages of our design lie in several aspects: 1. Guaranteed delivery. By leveraging the global map information, as long as the query message finishes traveling on all roads associated with the CDS, it is guaranteed to meet all information required in spite of the dynamics in the network. 2. Low traffic generation. Due to the sparse property of the dominating set, we only select a small percentage of roads over the entire network for query dissemination. Compared with the epidemic-like or random search schemes, the transmission cost of our approach is much lower.

956 3. Bounded Search latency. Different from random search schemes, the search latency of this scheme is bounded by the time to reach the farthest road which is close to that of flooding the network. 4. Minimized control overhead. We do not need to maintain any internal routing structures or other state information to guide the query. Meanwhile, the information dissemination is strictly limited on the local road segment. Thus the control overhead is minimized compared with traditional approaches. 4. Query Forwarding Once a vehicle node receives a query, it firstly checks whether or not there are corresponding data within its local storage. It then forwards this query to its neighbor nodes. If the vehicle receives the query from the same road, it forwards the query in the same direction as the query goes. If the vehicle receives the query from another road, it forwards the query to all its neighbors in both directions along the road. When the vehicle is to the road intersection, it also forwards the query to vehicles on the other road. Algorithm 1 Direct Forwarding 1: Receive query q; 2: Visit information on local road for q; 3: Visit information on neighbor vehicle s road; 4: If q is received from another road do 5: Forward q to two random neighbors on both directions; 6: end if 7: If q is received from the same road do 8: Forward q to one random neighbor on the same direction as when receiving it; 9: end if 10: Forward q to all neighbors on other roads By comparing and observe a perfect match between the vehicle density and the performance of our scheme. Indeed, the network connectivity severely affects the query delivery over the network. When the network becomes highly sparse, the VANET degrades into a disruptive network. In such a case the network might be separated into different parts where the queries cannot be guaranteed to deliver to all vehicles by instant forwarding. In order to deal with this problem, we propose a cache and forwarding scheme. The vehicles cache the received queries and rebroadcast the query as they have chances to meet new neighbors. Algorithm 2 Cache and Forwarding 1: Receive query q; 2: while new neighbors are discovered do 3: Visit information on local road for q; 4: for all neighbor vehicles v i do 5: if v i has not received q do 6: Visit information on v i s road; 7: if road of v i belongs to CDS group do 8: Forward q to v i ; 9: end if 10: end if 11: end for 12: end while 5. Robustness of the Protocol In previous sections, we assume perfect road map updating at all vehicles and the road map is regarded as a pre-knowledge in each vehicle. In practice, inconsistent road maps across different vehicles may affect the efficiency of the query process and lead to query failures to access information from some road segments. Therefore, we need additional communication cost to keep the updated road map in each vehicle. Since the road networks are relatively stable, the road map updating process is not frequent and thus the additional communication overhead brought by road map updating is negligible. In the future work, we will try to find efficient approaches for road map updating and thus to reduce the communication cost.

957 6. VANET Security and Privacy Security and privacy issues in VANET have just begun to attract attention from both academic and corporate research. VANET security such as Electronic License Plates (ELPs) that are unique cryptographically verifiable numbers equivalent to traditional license plates, and location verification based on verifiable multilateration as an approach to address liability requirements of VANET. 7. Privacy Enhancement for Mobile Networks To protect users from location privacy threats, there are several location privacy in WLAN. Their approach is based on adjusting the resolution of location along spatial and temporal dimensions, and assumes that nodes provide their location. However, all of these works assume that the wireless nodes have unrestricted and independent mobility, hence, not considering the unique constraints of VANET. 8. CONCLUSION We have proposed a general approach to detecting and correcting errors that have been maliciously introduced into data in a VANET. The approach relies on using sensor data, collected by nodes in the VANET, shared with immediate neighbors, and propagated to a neighboring region. The sensor data provides redundant information, allowing each individual node to process the sensor data and detect or remove malicious information. Individual nodes use a model of the VANET to check the validity of the sensor data, and when inconsistencies arise, an adversarial model is used to search for explanations of the errors, ranking explanations using a parsimony approach, and using the best explanation (or explanations) to correct the consequences of the attack. The VANET model, adversarial model, and the parsimony algorithm all depend on the nature of the sensor data. Two examples illustrate the variety of possibilities and the effectiveness of the approach. [2] D. Balfanz, D. K. Smetters, P. Stewart and H. C. Wong. Talking to Strangers: Authentication in Ad Hoc Wireless Networks. In the Proceedings of the network and distributed system security symposium (NDSS), 2002. [3] S. Brands and D. Chaum. Distance-Bounding Protocols. In Theory and Application of Cryptographic Techniques, pp. 344{359, 1993. [4] D. Denning and P. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security. In Computer Fraud and Security, February 1996. [5] J. Douceur. The Sybil Attack. In the Proceedings of the1st International Peer To Peer Systems Workshop (IPTPS 2002), March 2002. [6] L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. In Proceedings of the network and distributed system security symposium (NDSS), 2004. [7] Y. Hu, A. Perrig and D. Johnson. Efficient security Mechanisms for Routing Protocols. In the Proceedings of the network and distributed system security symposium (NDSS), 2003. [8] Y. Hu, A. Perrig and D. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In INFOCOM 2003. REFERENCES [1] S. Bhargava and D. P. Agrawal. Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks. In the Proceedings of the 2001 IEEE Vehicular Technology Conference.