SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Poster Paper
Proc. of Int. Conf. on Advances in Communication, Network, and Computing 2013

Challenging Issues in VANET Network and its Routing
Algorithms-An Analysis
Vishal Sharma1, Harsukhpreet Singh2, and Shashi Kant3
1

Shaheed Bhagat Singh State Technical Campus /ECE, Ferozepur, India
2
College of Engineering & Management/ECE, Kapurthala , India
3
Shaheed Bhagat Singh State Technical Campus /ECE, Ferozepur, India
Email: 1 er_vishusharma@yahoo.com,2 harsukhpreet@gmail.com
Abstract—Vehicular Ad hoc Network (VANET), a rapidly
deployed wireless network, is a subclass of mobile ad hoc
networks (MANET) that uses multi-hop routing to provide
network connectivity among vehicles (V2V) or vehicle to roadside equipments (V2R). VANETs have received increasing
research attention in recent years because of its vast
applications like safety, comfort and entertainment. Variations
with time in network topology impose new challenges for
routing protocols in such networks as traditional routing
protocols are not suitable for VANETs. This work is an attempt
to figure out the challenges in VANET comprehensively in
conjunction with the recommended routing protocols by
comparing the existing routing protocols with respect to
existing challenges.
Index Terms— Ad hoc Network, MANET, VANET, Routing
Protocols.

I. INTRODUCTION

ad hoc network to provide the required information [3].

Fig. 1. Different Scenarios of VANET network (a) V2V
Transmission, (b) V2R Transmission, and (c) Routing-based V2V
Transmission

Vehicle to roadside communication (V2R) uses 63 GHz
band, which provides a high bandwidth link between vehicle
and roadside beacons, providing higher data rate to be
maintained in heavy traffic beacon in every kilometer or less.
V2R vehicular networks provide on-demand or real-time video
and high-speed internet access. In V2R, multi-hop routing is
used, where an individual message is distributed in multihop fashion until the message is not reached to its destination
vehicle. Generally, multi-hop multicasting or broadcasting is
used VANETs to transmit information within a few hops.
Vehicles launch broadcasting messages periodically at regular
intervals in native broadcasting. After receiving the message,
the vehicle ignores the message if it comes from the vehicle
behind it. If the message proceeds from the vehicle in front,
receiving vehicle further broadcast its own message to the
vehicles behind it. Native broadcasting method generated
the large number of broadcast messages, resulting in large
bandwidth consumption, therefore increase the collision
between messages, which further decreases the delivery rate
and increases delivery time [4]. To avoid this, an inherent
acknowledgment by generation of messages and transfer
strategy intelligent broadcast with implicit recognition has
been introduced. This helps in improving the system
performance by reducing the number of messages which are
introduced into the squad for these vehicles during a
disastrous event [5].

Because of growing demand for higher capacity and
higher data rates to accommodate data-intensive multimedia
coupled with real-time services, wireless networks such as
sensor networks, ad hoc mobile networks, cellular networks
and satellite networks have experienced a explosive growth
over the past few years. In ad hoc network, the mobile node,
act as router exchange the information without any fixed base
station. The mobile nodes steer dynamically to form their
own network. Mobile Ad-hoc Network (MANET) represents
a system of wireless mobile-nodes that can self-organize into
uninformed and short-term network topologies without
restraint and with dynamism, allowing devices to
communicate without any pre-existing communication
architecture [1]. MANETs have wide spread applications such
as the battlefield for military purposes and other natural
disaster situations. Intelligent transportation system (ITS)
has been designed to improve safety and efficiency of such
transportation systems along with to enable new mobile
services [2]. The inter-vehicle communication consists of both
vehicle-to-vehicle (V2V) and vehicle-to-roadside
communication (V2R) as shown in figure 1 is known as
VANET communication. In VANET, each vehicle takes the
role of the sender, receiver, and routers to transmit information
for automotive or transportation agency network. This
information is used by the vehicles to ensure a safe and freeII. CHALLENGING ISSUES IN VANET NETWORK
flow of traffic. For communication taking place between veDue to self-organizing and adaptive nature of VANETs, a
hicles and roadside unit (RSUs), vehicles must be equipped
numerous challenges emerge to degrade its performance. In
with any radio interface which allows short-range wireless
48
© 2013 ACEEE
DOI: 03.LSCS.2013.1.515
Poster Paper
Proc. of Int. Conf. on Advances in Communication, Network, and Computing 2013
VANETs, the routers are free to stir and organize themselves
randomly. This leads to regular route changes, network
partitions, and possibly packet losses due to hasty and
unpredictable variations in network topology. Moreover, each
participating node may be equipped with different radio
devices having unreliable transmission and receiving
capabilities, and possibly operate on a different frequency
bands. As a result, the probability of asymmetric links
increases [6-8].
Hidden terminal problem is another challenging issue in
VANETs as such networks works without RTS/ CTS
exchange. It is not practical to get confirmation from all nodes
that they have received a broadcast message. Without the
ACK message, sender does not broadcast way to determine
the successful reception of successful transmission by its
neighbors. So, in VANET, different approaches like flooding,
probabilistic broadcasting, cluster-based broadcasting, and
location-based broadcasting can be used to message
broadcast to every node. Each vehicle rebroadcasts the
message in flooding/ blind flooding, whenever it receives
messages for the first time. However, a large number of such
redundant messages leading to contention and unnecessary
collisions cause the “broadcast storm problem”. When each
node rebroadcast a message, it is to be expected that
neighboring nodes have already received the transmission,
which leads to flooding algorithm to create a large number of
redundant messages. So, all nodes struggle to relay messages
about the same time and hence, there will be a significant
amount of nodes competing for access to the wireless
channel [9].
QoS routing strategies are aimed at ensuring reliable
routes between nodes and try to reduce the time required to
restore the broken link. QoS of a route can be seriously
affected by a factor such as node positioning, node velocity,
the distance between nodes and delays between the links.
QoS is achieved by resource allocation efficiently, but this
cannot be achieved in VANET, as such network’s topology
changes swiftly with time. As most of the real time applications
such as video conferencing and VoIP require faster response,
any few milliseconds delay for these applications will make
message meaningless and may be devastating [10-11]. LDMSTREAM ensures QoS by identifying redundant nodes of
the source to prevent the transmission of duplicate
information and thus improves the delay of messages [4]. In
view of the road- and vehicular-security, each message must
be certified its origin and control-level permissions. This is
done by assigning each message of a source-vehicle with its
private key, together with the certificate. When another
vehicle receives this message, it checks key used to sign the
message and once that is done, it checks the message. To
eliminate the vulnerability of confidentiality, a set of unsigned
keys are changed frequently depending on the speed of
movement. It means these assigned keys are used just for
one time and expire after usage. ELP (Electronic license plate)
is another alternative to be installed at the factory for each
new car. It will provide the vehicle an identification number
to identify the vehicle at any place, with RFID technology of
© 2013 ACEEE
DOI: 03.LSCS.2013.1.515

the ELP [12]. The connections between nodes can be a very
short-lived, and possibly will not happen again, and probable
makes a connection with other vehicles, because each vehicle
has high mobility and may go in the opposite direction [1314]. The conditions become more severe with the increase of
the traffic volume without changing the system components
and protocols results in degradation of performance of
VANET. So, a secure mobility with network scalability is a
hard challenge in such networks.
Some of the other problems associated with VANETs are
the fluctuations in received signal strength, high channelload, and high mobility using different types of messages
such as broadcast messages, event driven messages, and
the problem associated with bidirectional links.More realistic
models need to be developed to model communication
protocols properly [15]. Also, fair sharing of available
bandwidth in VANETs becomes a real challenge in present
time due to a huge amount of intranet and internet applications.
There are two types of safety messages used in VANETs.
Firstly, periodic messages alert other vehicles in the area of
the vehicles state and secondly, emergency warnings used
to trigger by a non-safe driving condition. When the number
of nodes sending periodic broadcasts is too large due to
high traffic volume, the emergency warning messages take a
greater amount of time to be received as bandwidth availability
is less in wireless networks [16].
III. ROUTING ALGORITHMS IN VANET NETWORK
Generally, sense and uphold the optimal route to send
data packets via intermediate nodes is the main motive of a
routing algorithm. In VANETs, due to the dynamic nature of
mobile nodes, searching and saving routes is a complex task.
In view of the fact that VANETs used special routing protocols
originally implemented for MANETs. The addresses and
topology-based routing protocols require a unique address
for each participating node. This means that a mechanism is
desired that can be used to assign unique addresses for
vehicles, but these protocols do not guarantee to avoid
duplicate allocation addresses in the network. Thus, the
current algorithms used in MANETs are not appropriate in
case of VANETs. Specific VANETs issues such as network
topology, mobility model, traffic volume, rapid changes, and
the width of the road make use of these conventional routing
protocols insufficiently unequivocal.
Most of the routing protocols follow two different
approaches to design the inherent ad-hoc networks that are
table driven routing and source initiated on-demand routing
approaches. The table-driven routing, also known as
proactive routing protocols maintain the routing information,
connecting each node to all other nodes participating in the
network. These protocols allow each node to have a clear
and consistent view network topology by distributing the
periodic updates [17-18]. The benefit of proactive routing
protocol is that there is no route discovery since the
destination route kept in the background, but the lack of this
protocol is that it provides a low latency in real time, which
49
Poster Paper
Proc. of Int. Conf. on Advances in Communication, Network, and Computing 2013
leads to maintaining unused data paths,results in reduction
in available bandwidth. Some of the existing table driven
protocols are DSDV, GSR, WRP and ZRP. On Demand or
Reactive protocols such as DSR, AODV and TORA invokes
the route discovery process at the time of a transmission
process. The route remains convincing until the route is no
longer desirable. Such algorithms are best suited for MANETs
but not for VANETs.
Various position-based and geographical protocols are
also demonstrated for VANET networks. The position-based
routing requires information about the physical location of all
the nodes within a VANET. One of the best known position
based routing is GPSR (Greedy perimeter stateless routing),
which operates on the principle of a combination of greedy
forwarding and face routing. On performance comparison with
topology-based routing in urban- and highway- traffic
scenarios, position-based routing has been identified as
advanced routing paradigm for VANETs and works best in
open space scenario with uniformly distributed nodes [1920]. In city conditions, GPSR suffers from many problems such
as non-availability of direct links between the nodes due to
obstacles such as buildings and trees. This results in routing
performance degradation due to longer paths, and leading to
higher delay.
To overcome these problems, greedy routing is proposed
such as GPCR (Greedy perimeter coordinator routing) in which
greedy algorithm simply follow in the nodes. The routing
decision is taken in case of crossing streets and shows a
higher delivery rate in comparison with GPSR with a large
number of hops and a slight increase in latency. However,
these models are not able to work effectively in VANETs with
high-rise buildings and the uneven concentration of roads. In
VANET, another position based routing technique i.e. STAR,
which uses a map with street names, as well as decide on the
route at junctions. It uses statistically or dynamically rated
maps to evaluate the traffic circumstances and make out ways
to the junctions with a high connectivity for packet delivery.
STAR also uses a new, more suitable local recovery strategy
package to provide better performance compared to the GSR
and GPCR in city networks [21].
In Geographical routing protocols, each node can
determine its location as well as destination location. With
this information, a message can be sent to the destination
without knowing the network topology or the discovery of
the route. There are different routing approaches, for example,
a single path, multipath, and floods on the basis of their
algorithms. In single-channel strategy, greedy forwarding is
trying to bring the message closer to its destination at each
step, using only local information. Thus, each node sends a
message to a neighbor that is most appropriate from a local
point of view. The most suitable neighbor may be someone
who minimizes the distance to the destination at each step.
Greedy forwarding can lead to a dead end, where there are no
neighbors closer to the destination. Then, face routing helps
to recover from this situation and find a path to another node
where greedy forwarding can be resumed [22].
© 2013 ACEEE
DOI: 03.LSCS.2013.1. 515

CONCLUSIONS
In this paper, it has been observed that in implementation
of VANETs, the designers have to take care of a number
challenging issues like fast route variations, hasty and
unpredictable variations in network topology, hidden
terminals, broadcast storm problem, confidentiality, a secure
mobility, network scalability, and high mobility. To combat
with these issues, researchers have recommended a numbers
of routing algorithms depending upon different scenarios. It
has been concluded that a position based- and geographicalprotocols are best suited protocols over table driven- and
reactive- routing algorithms. GPCR, a position based routing
showed a higher delivery rate in comparison with GPSR with
a large average number of hops. In case of uneven
concentration of vehicles on the roads, another position
based routing technique i.e. STAR routing is preferred, to
provide better performance compared to GSR and GPCR.
Further, Geographical routing is recommended as it provides
transmission independent of network topology and is also
capable of handling dead end situation.
REFERENCES
[1] C. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and
Systems,” Englewood Cliff, Press: Prentice Hall, 2002.
[2] A. Behin, “New System in Intelligent Transport System by
using Knowledge Grid,” Proceedings of Journal of Academic
and Applied Studies, vol. 2, Issue 3, pp. 15-24, 2012.
[3] A. Stampoulis, Z.Chai, “A survey of security in vehicular
networks,” Project CPSC, 2007, pp. 1-16, 2007.
[4] S. Zeadally, R. Hunt,Y. Chen, A. Irwin, “Vehicular Ad hoc
network (VANET): Status, Results and Challenges,” Springer
Science, Business Media, LLC 2010, Telecommunication syst.
DOI 10.1007/s11235-010-9400-5.
[5] S. Biswas, R. Tatchikou, F. Dion, “Vehicle-to-Vehicle Wireless
Communication Protocol for Enhancing Highway Traffic
Safety,” Proceedings of IEEE Communication Magazine, vol.
44, Issue 1, pp. 74-82, 2006.
[6] T. Camp, J. Boleng, V. Davies, “A Survey of Mobility Models
for Ad Hoc Network Research,” Wireless Communication &
Mobile Computing (WCMC): vol. 2, Issue 5, pp. 483-502,
2002.
[7] E. B. Royer, “Multi-level Hierarchies for Scalable Ad Hoc
Routing,” Wireless Networking (WINET), vol. 9, Issue 5, pp.
461-478, 2003.
[8] IETF MANET Working Group, “Mobile Ad Hoc Networks
(MANET),” Working Group charter available: http://
www.ietf.org/html.charters/manet-charter.html.
[9] M. Mohammad, “A Brief Summary on the Main Aspects and
Challenges of Vehicular Ad-Hoc Networks (VANETs),”
Internet-draft, available at http://paginas.fe.up.pt/~maptele/
students-workshop-map-tele-2010/papers/15.pdf.
[10] R. Maxim, P. Papadimitratos, J. Hubaux, “Securing Vehicular
Networks,” Proceeding of IEEE Wireless Communications
Magazine, Special Issue on Inter-Vehicular Communications,
vol. 13, pp.8-15, 2006.
[11] B. Parno and A. Perrig, “Challenges in Securing Vehicular
Networks,” Proceedings of the 4th Workshop on Hot Toics in
Networks (HotNets-IV) Association for Computing
Machinery, Inc., 2005.
[12] G.Samara, A.H. Wafaa, R. Sures, “Security Issue and Challenges

50
Poster Paper
Proc. of Int. Conf. on Advances in Communication, Network, and Computing 2013

[13]

[14]

[15]

[16]

[17]

of Vehicular Adhoc Networks (VANET),” 4th IEEE
International Conference on New Trends in Information Science
and Service Science (NISS), pp. 393-398, 2010.
Karnadi, F.K., Zhi Hai Mo, Kun-chan Lan, “Rapid Generation
of Realistic Mobility Models for VANET”, Proceeding of
Wireless communication and Networking Conference
(WCNC),IEEE, pp. 2506-2511, 2007.
Kamini, R. Kumar, “VANET Parameters and application: A
Review,” Proceedings of Global Journal of Computer Science
and Technology, vol. 10, Issue 7, pp.72-77, 2010.
M. Torrent-Moreno, M. Killat, H. Hartenstein, “The
Challenges of Robust Inter-Vehicle Communications,”
Proceedings of IEEE 62nd Conference on Vehicular Technology
(VTC), vol. 1, pp. 319-323, 2005.
M. Torrent Monero, P. Santi, and H. Hartenstein, “Fair Sharing
of Bandwidth in VANETs,” Proceedings of the 2nd ACM
International Workshop on Vehicular Ad Hoc Networks, pp.
49-58, 2005.
R. Kumar, M. Dave, “A Comparative Study of Various Routing
Protocols in VANET,” Proceedings of International Journals

© 2013 ACEEE
DOI: 03.LSCS.2013.1.515

of Computer Science Issues, vol. 8, Issues 4, 2011.
[18] Y. Xue & K. Nahrstedt, “Providing Fault –Tolerant Ad Hoc
Routing Service in Adversarial Environments,” Proceeding of
Wireless Personal Communication, vol. 29, Issue 3-4, pp. 367388, 2004.
[19] G. Liu, B.-S. Lee, B.-C. Seet, C.H. Foh, K.J. Wong, and K.-K.
Lee, “A routing Strategy for Metropolis Vehicular
Communications,” In International Conference on Information
Networking (ICOIN), pp. 134–143, 2004.
[20] H. Fubler, M. Mauve, H. Hartenstein, M. Kasemann, D.
Vollmer, “Location Based Routing for Vehicular Ad-Hoc
Networks,” Mobile Computing and Communications Review
(MC2R), vol. 7, Issue 1, pp. 47-49, 2003.
[21] Fan Li & Yu Wang, “Routing in Vehicular Ad Hoc Networks:
A Survey,” Proceeding of IEEE Vehicular Technology Magazine,
vol. 2, Issue 2, pp.12-22, 2007.
[22] Y. Kumar, P. Kumar, A. Kadian, “A Survey on Routing
Mechanism and Techniques in Vehicle to Vehicle
Communication (VANET),” International Journal of Computer
Science & Engineering Survey (IJCSES) vol. 2, Issue 1, pp.
135-143, 2011.

51

Contenu connexe

Tendances

Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation designProf Ansari
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communicationNitish Tanwar
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communicationsSaikiran Guduri
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement Dr.Irshad Ahmed Sumra
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPTMeghaj Mallick
 
(Paper) A Method for Sharing Traffic Jam Information using Inter-Vehicle Comm...
(Paper) A Method for Sharing Traffic Jam Information using Inter-Vehicle Comm...(Paper) A Method for Sharing Traffic Jam Information using Inter-Vehicle Comm...
(Paper) A Method for Sharing Traffic Jam Information using Inter-Vehicle Comm...Naoki Shibata
 
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES ijasuc
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONRK CONSULTANCY SERVICES
 
A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks IOSR Journals
 
V2V communications
V2V communicationsV2V communications
V2V communicationsSai Avinash
 
IRJET- Automatic Vehicle Monitoring System based on Wireless Sensor Network
IRJET-  	  Automatic Vehicle Monitoring System based on Wireless Sensor NetworkIRJET-  	  Automatic Vehicle Monitoring System based on Wireless Sensor Network
IRJET- Automatic Vehicle Monitoring System based on Wireless Sensor NetworkIRJET Journal
 
Vehicle to Vehicle Communication using Bluetooth and GPS.
Vehicle to Vehicle Communication using Bluetooth and GPS.Vehicle to Vehicle Communication using Bluetooth and GPS.
Vehicle to Vehicle Communication using Bluetooth and GPS.Mayur Wadekar
 

Tendances (20)

Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation design
 
VANET
VANETVANET
VANET
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Ivc sem doc
Ivc sem docIvc sem doc
Ivc sem doc
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communication
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communications
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
(Paper) A Method for Sharing Traffic Jam Information using Inter-Vehicle Comm...
(Paper) A Method for Sharing Traffic Jam Information using Inter-Vehicle Comm...(Paper) A Method for Sharing Traffic Jam Information using Inter-Vehicle Comm...
(Paper) A Method for Sharing Traffic Jam Information using Inter-Vehicle Comm...
 
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
 
A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks
 
V2V communications
V2V communicationsV2V communications
V2V communications
 
IRJET- Automatic Vehicle Monitoring System based on Wireless Sensor Network
IRJET-  	  Automatic Vehicle Monitoring System based on Wireless Sensor NetworkIRJET-  	  Automatic Vehicle Monitoring System based on Wireless Sensor Network
IRJET- Automatic Vehicle Monitoring System based on Wireless Sensor Network
 
Vehicle to Vehicle Communication using Bluetooth and GPS.
Vehicle to Vehicle Communication using Bluetooth and GPS.Vehicle to Vehicle Communication using Bluetooth and GPS.
Vehicle to Vehicle Communication using Bluetooth and GPS.
 

En vedette

VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsabhijit parmar
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETAnkit Singh
 

En vedette (9)

VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
Final_Vanet
Final_VanetFinal_Vanet
Final_Vanet
 
Vanet routing
Vanet routingVanet routing
Vanet routing
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETs
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANET
 

Similaire à Challenging Issues in VANET Network and its Routing Algorithms-An Analysis

Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networksDaisyWatson5
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksIRJET Journal
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018IJMER
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
 
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSINTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
 
Multicast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksMulticast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksTELKOMNIKA JOURNAL
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETpaperpublications3
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsIJCSIS Research Publications
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
VANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsVANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsIOSR Journals
 

Similaire à Challenging Issues in VANET Network and its Routing Algorithms-An Analysis (20)

Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networks
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSINTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Multicast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksMulticast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
VANET Clustering Survey
VANET Clustering SurveyVANET Clustering Survey
VANET Clustering Survey
 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANET
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
VANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation ToolsVANET: Routing Protocols, Security Issues and Simulation Tools
VANET: Routing Protocols, Security Issues and Simulation Tools
 

Plus de idescitation (20)

65 113-121
65 113-12165 113-121
65 113-121
 
69 122-128
69 122-12869 122-128
69 122-128
 
71 338-347
71 338-34771 338-347
71 338-347
 
72 129-135
72 129-13572 129-135
72 129-135
 
74 136-143
74 136-14374 136-143
74 136-143
 
80 152-157
80 152-15780 152-157
80 152-157
 
82 348-355
82 348-35582 348-355
82 348-355
 
84 11-21
84 11-2184 11-21
84 11-21
 
62 328-337
62 328-33762 328-337
62 328-337
 
46 102-112
46 102-11246 102-112
46 102-112
 
47 292-298
47 292-29847 292-298
47 292-298
 
49 299-305
49 299-30549 299-305
49 299-305
 
57 306-311
57 306-31157 306-311
57 306-311
 
60 312-318
60 312-31860 312-318
60 312-318
 
5 1-10
5 1-105 1-10
5 1-10
 
11 69-81
11 69-8111 69-81
11 69-81
 
14 284-291
14 284-29114 284-291
14 284-291
 
15 82-87
15 82-8715 82-87
15 82-87
 
29 88-96
29 88-9629 88-96
29 88-96
 
43 97-101
43 97-10143 97-101
43 97-101
 

Dernier

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Dernier (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 

Challenging Issues in VANET Network and its Routing Algorithms-An Analysis

  • 1. Poster Paper Proc. of Int. Conf. on Advances in Communication, Network, and Computing 2013 Challenging Issues in VANET Network and its Routing Algorithms-An Analysis Vishal Sharma1, Harsukhpreet Singh2, and Shashi Kant3 1 Shaheed Bhagat Singh State Technical Campus /ECE, Ferozepur, India 2 College of Engineering & Management/ECE, Kapurthala , India 3 Shaheed Bhagat Singh State Technical Campus /ECE, Ferozepur, India Email: 1 er_vishusharma@yahoo.com,2 harsukhpreet@gmail.com Abstract—Vehicular Ad hoc Network (VANET), a rapidly deployed wireless network, is a subclass of mobile ad hoc networks (MANET) that uses multi-hop routing to provide network connectivity among vehicles (V2V) or vehicle to roadside equipments (V2R). VANETs have received increasing research attention in recent years because of its vast applications like safety, comfort and entertainment. Variations with time in network topology impose new challenges for routing protocols in such networks as traditional routing protocols are not suitable for VANETs. This work is an attempt to figure out the challenges in VANET comprehensively in conjunction with the recommended routing protocols by comparing the existing routing protocols with respect to existing challenges. Index Terms— Ad hoc Network, MANET, VANET, Routing Protocols. I. INTRODUCTION ad hoc network to provide the required information [3]. Fig. 1. Different Scenarios of VANET network (a) V2V Transmission, (b) V2R Transmission, and (c) Routing-based V2V Transmission Vehicle to roadside communication (V2R) uses 63 GHz band, which provides a high bandwidth link between vehicle and roadside beacons, providing higher data rate to be maintained in heavy traffic beacon in every kilometer or less. V2R vehicular networks provide on-demand or real-time video and high-speed internet access. In V2R, multi-hop routing is used, where an individual message is distributed in multihop fashion until the message is not reached to its destination vehicle. Generally, multi-hop multicasting or broadcasting is used VANETs to transmit information within a few hops. Vehicles launch broadcasting messages periodically at regular intervals in native broadcasting. After receiving the message, the vehicle ignores the message if it comes from the vehicle behind it. If the message proceeds from the vehicle in front, receiving vehicle further broadcast its own message to the vehicles behind it. Native broadcasting method generated the large number of broadcast messages, resulting in large bandwidth consumption, therefore increase the collision between messages, which further decreases the delivery rate and increases delivery time [4]. To avoid this, an inherent acknowledgment by generation of messages and transfer strategy intelligent broadcast with implicit recognition has been introduced. This helps in improving the system performance by reducing the number of messages which are introduced into the squad for these vehicles during a disastrous event [5]. Because of growing demand for higher capacity and higher data rates to accommodate data-intensive multimedia coupled with real-time services, wireless networks such as sensor networks, ad hoc mobile networks, cellular networks and satellite networks have experienced a explosive growth over the past few years. In ad hoc network, the mobile node, act as router exchange the information without any fixed base station. The mobile nodes steer dynamically to form their own network. Mobile Ad-hoc Network (MANET) represents a system of wireless mobile-nodes that can self-organize into uninformed and short-term network topologies without restraint and with dynamism, allowing devices to communicate without any pre-existing communication architecture [1]. MANETs have wide spread applications such as the battlefield for military purposes and other natural disaster situations. Intelligent transportation system (ITS) has been designed to improve safety and efficiency of such transportation systems along with to enable new mobile services [2]. The inter-vehicle communication consists of both vehicle-to-vehicle (V2V) and vehicle-to-roadside communication (V2R) as shown in figure 1 is known as VANET communication. In VANET, each vehicle takes the role of the sender, receiver, and routers to transmit information for automotive or transportation agency network. This information is used by the vehicles to ensure a safe and freeII. CHALLENGING ISSUES IN VANET NETWORK flow of traffic. For communication taking place between veDue to self-organizing and adaptive nature of VANETs, a hicles and roadside unit (RSUs), vehicles must be equipped numerous challenges emerge to degrade its performance. In with any radio interface which allows short-range wireless 48 © 2013 ACEEE DOI: 03.LSCS.2013.1.515
  • 2. Poster Paper Proc. of Int. Conf. on Advances in Communication, Network, and Computing 2013 VANETs, the routers are free to stir and organize themselves randomly. This leads to regular route changes, network partitions, and possibly packet losses due to hasty and unpredictable variations in network topology. Moreover, each participating node may be equipped with different radio devices having unreliable transmission and receiving capabilities, and possibly operate on a different frequency bands. As a result, the probability of asymmetric links increases [6-8]. Hidden terminal problem is another challenging issue in VANETs as such networks works without RTS/ CTS exchange. It is not practical to get confirmation from all nodes that they have received a broadcast message. Without the ACK message, sender does not broadcast way to determine the successful reception of successful transmission by its neighbors. So, in VANET, different approaches like flooding, probabilistic broadcasting, cluster-based broadcasting, and location-based broadcasting can be used to message broadcast to every node. Each vehicle rebroadcasts the message in flooding/ blind flooding, whenever it receives messages for the first time. However, a large number of such redundant messages leading to contention and unnecessary collisions cause the “broadcast storm problem”. When each node rebroadcast a message, it is to be expected that neighboring nodes have already received the transmission, which leads to flooding algorithm to create a large number of redundant messages. So, all nodes struggle to relay messages about the same time and hence, there will be a significant amount of nodes competing for access to the wireless channel [9]. QoS routing strategies are aimed at ensuring reliable routes between nodes and try to reduce the time required to restore the broken link. QoS of a route can be seriously affected by a factor such as node positioning, node velocity, the distance between nodes and delays between the links. QoS is achieved by resource allocation efficiently, but this cannot be achieved in VANET, as such network’s topology changes swiftly with time. As most of the real time applications such as video conferencing and VoIP require faster response, any few milliseconds delay for these applications will make message meaningless and may be devastating [10-11]. LDMSTREAM ensures QoS by identifying redundant nodes of the source to prevent the transmission of duplicate information and thus improves the delay of messages [4]. In view of the road- and vehicular-security, each message must be certified its origin and control-level permissions. This is done by assigning each message of a source-vehicle with its private key, together with the certificate. When another vehicle receives this message, it checks key used to sign the message and once that is done, it checks the message. To eliminate the vulnerability of confidentiality, a set of unsigned keys are changed frequently depending on the speed of movement. It means these assigned keys are used just for one time and expire after usage. ELP (Electronic license plate) is another alternative to be installed at the factory for each new car. It will provide the vehicle an identification number to identify the vehicle at any place, with RFID technology of © 2013 ACEEE DOI: 03.LSCS.2013.1.515 the ELP [12]. The connections between nodes can be a very short-lived, and possibly will not happen again, and probable makes a connection with other vehicles, because each vehicle has high mobility and may go in the opposite direction [1314]. The conditions become more severe with the increase of the traffic volume without changing the system components and protocols results in degradation of performance of VANET. So, a secure mobility with network scalability is a hard challenge in such networks. Some of the other problems associated with VANETs are the fluctuations in received signal strength, high channelload, and high mobility using different types of messages such as broadcast messages, event driven messages, and the problem associated with bidirectional links.More realistic models need to be developed to model communication protocols properly [15]. Also, fair sharing of available bandwidth in VANETs becomes a real challenge in present time due to a huge amount of intranet and internet applications. There are two types of safety messages used in VANETs. Firstly, periodic messages alert other vehicles in the area of the vehicles state and secondly, emergency warnings used to trigger by a non-safe driving condition. When the number of nodes sending periodic broadcasts is too large due to high traffic volume, the emergency warning messages take a greater amount of time to be received as bandwidth availability is less in wireless networks [16]. III. ROUTING ALGORITHMS IN VANET NETWORK Generally, sense and uphold the optimal route to send data packets via intermediate nodes is the main motive of a routing algorithm. In VANETs, due to the dynamic nature of mobile nodes, searching and saving routes is a complex task. In view of the fact that VANETs used special routing protocols originally implemented for MANETs. The addresses and topology-based routing protocols require a unique address for each participating node. This means that a mechanism is desired that can be used to assign unique addresses for vehicles, but these protocols do not guarantee to avoid duplicate allocation addresses in the network. Thus, the current algorithms used in MANETs are not appropriate in case of VANETs. Specific VANETs issues such as network topology, mobility model, traffic volume, rapid changes, and the width of the road make use of these conventional routing protocols insufficiently unequivocal. Most of the routing protocols follow two different approaches to design the inherent ad-hoc networks that are table driven routing and source initiated on-demand routing approaches. The table-driven routing, also known as proactive routing protocols maintain the routing information, connecting each node to all other nodes participating in the network. These protocols allow each node to have a clear and consistent view network topology by distributing the periodic updates [17-18]. The benefit of proactive routing protocol is that there is no route discovery since the destination route kept in the background, but the lack of this protocol is that it provides a low latency in real time, which 49
  • 3. Poster Paper Proc. of Int. Conf. on Advances in Communication, Network, and Computing 2013 leads to maintaining unused data paths,results in reduction in available bandwidth. Some of the existing table driven protocols are DSDV, GSR, WRP and ZRP. On Demand or Reactive protocols such as DSR, AODV and TORA invokes the route discovery process at the time of a transmission process. The route remains convincing until the route is no longer desirable. Such algorithms are best suited for MANETs but not for VANETs. Various position-based and geographical protocols are also demonstrated for VANET networks. The position-based routing requires information about the physical location of all the nodes within a VANET. One of the best known position based routing is GPSR (Greedy perimeter stateless routing), which operates on the principle of a combination of greedy forwarding and face routing. On performance comparison with topology-based routing in urban- and highway- traffic scenarios, position-based routing has been identified as advanced routing paradigm for VANETs and works best in open space scenario with uniformly distributed nodes [1920]. In city conditions, GPSR suffers from many problems such as non-availability of direct links between the nodes due to obstacles such as buildings and trees. This results in routing performance degradation due to longer paths, and leading to higher delay. To overcome these problems, greedy routing is proposed such as GPCR (Greedy perimeter coordinator routing) in which greedy algorithm simply follow in the nodes. The routing decision is taken in case of crossing streets and shows a higher delivery rate in comparison with GPSR with a large number of hops and a slight increase in latency. However, these models are not able to work effectively in VANETs with high-rise buildings and the uneven concentration of roads. In VANET, another position based routing technique i.e. STAR, which uses a map with street names, as well as decide on the route at junctions. It uses statistically or dynamically rated maps to evaluate the traffic circumstances and make out ways to the junctions with a high connectivity for packet delivery. STAR also uses a new, more suitable local recovery strategy package to provide better performance compared to the GSR and GPCR in city networks [21]. In Geographical routing protocols, each node can determine its location as well as destination location. With this information, a message can be sent to the destination without knowing the network topology or the discovery of the route. There are different routing approaches, for example, a single path, multipath, and floods on the basis of their algorithms. In single-channel strategy, greedy forwarding is trying to bring the message closer to its destination at each step, using only local information. Thus, each node sends a message to a neighbor that is most appropriate from a local point of view. The most suitable neighbor may be someone who minimizes the distance to the destination at each step. Greedy forwarding can lead to a dead end, where there are no neighbors closer to the destination. Then, face routing helps to recover from this situation and find a path to another node where greedy forwarding can be resumed [22]. © 2013 ACEEE DOI: 03.LSCS.2013.1. 515 CONCLUSIONS In this paper, it has been observed that in implementation of VANETs, the designers have to take care of a number challenging issues like fast route variations, hasty and unpredictable variations in network topology, hidden terminals, broadcast storm problem, confidentiality, a secure mobility, network scalability, and high mobility. To combat with these issues, researchers have recommended a numbers of routing algorithms depending upon different scenarios. It has been concluded that a position based- and geographicalprotocols are best suited protocols over table driven- and reactive- routing algorithms. GPCR, a position based routing showed a higher delivery rate in comparison with GPSR with a large average number of hops. In case of uneven concentration of vehicles on the roads, another position based routing technique i.e. STAR routing is preferred, to provide better performance compared to GSR and GPCR. Further, Geographical routing is recommended as it provides transmission independent of network topology and is also capable of handling dead end situation. REFERENCES [1] C. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems,” Englewood Cliff, Press: Prentice Hall, 2002. [2] A. Behin, “New System in Intelligent Transport System by using Knowledge Grid,” Proceedings of Journal of Academic and Applied Studies, vol. 2, Issue 3, pp. 15-24, 2012. [3] A. Stampoulis, Z.Chai, “A survey of security in vehicular networks,” Project CPSC, 2007, pp. 1-16, 2007. [4] S. Zeadally, R. Hunt,Y. Chen, A. Irwin, “Vehicular Ad hoc network (VANET): Status, Results and Challenges,” Springer Science, Business Media, LLC 2010, Telecommunication syst. DOI 10.1007/s11235-010-9400-5. [5] S. Biswas, R. Tatchikou, F. Dion, “Vehicle-to-Vehicle Wireless Communication Protocol for Enhancing Highway Traffic Safety,” Proceedings of IEEE Communication Magazine, vol. 44, Issue 1, pp. 74-82, 2006. [6] T. Camp, J. Boleng, V. Davies, “A Survey of Mobility Models for Ad Hoc Network Research,” Wireless Communication & Mobile Computing (WCMC): vol. 2, Issue 5, pp. 483-502, 2002. [7] E. B. Royer, “Multi-level Hierarchies for Scalable Ad Hoc Routing,” Wireless Networking (WINET), vol. 9, Issue 5, pp. 461-478, 2003. [8] IETF MANET Working Group, “Mobile Ad Hoc Networks (MANET),” Working Group charter available: http:// www.ietf.org/html.charters/manet-charter.html. [9] M. Mohammad, “A Brief Summary on the Main Aspects and Challenges of Vehicular Ad-Hoc Networks (VANETs),” Internet-draft, available at http://paginas.fe.up.pt/~maptele/ students-workshop-map-tele-2010/papers/15.pdf. [10] R. Maxim, P. Papadimitratos, J. Hubaux, “Securing Vehicular Networks,” Proceeding of IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, vol. 13, pp.8-15, 2006. [11] B. Parno and A. Perrig, “Challenges in Securing Vehicular Networks,” Proceedings of the 4th Workshop on Hot Toics in Networks (HotNets-IV) Association for Computing Machinery, Inc., 2005. [12] G.Samara, A.H. Wafaa, R. Sures, “Security Issue and Challenges 50
  • 4. Poster Paper Proc. of Int. Conf. on Advances in Communication, Network, and Computing 2013 [13] [14] [15] [16] [17] of Vehicular Adhoc Networks (VANET),” 4th IEEE International Conference on New Trends in Information Science and Service Science (NISS), pp. 393-398, 2010. Karnadi, F.K., Zhi Hai Mo, Kun-chan Lan, “Rapid Generation of Realistic Mobility Models for VANET”, Proceeding of Wireless communication and Networking Conference (WCNC),IEEE, pp. 2506-2511, 2007. Kamini, R. Kumar, “VANET Parameters and application: A Review,” Proceedings of Global Journal of Computer Science and Technology, vol. 10, Issue 7, pp.72-77, 2010. M. Torrent-Moreno, M. Killat, H. Hartenstein, “The Challenges of Robust Inter-Vehicle Communications,” Proceedings of IEEE 62nd Conference on Vehicular Technology (VTC), vol. 1, pp. 319-323, 2005. M. Torrent Monero, P. Santi, and H. Hartenstein, “Fair Sharing of Bandwidth in VANETs,” Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks, pp. 49-58, 2005. R. Kumar, M. Dave, “A Comparative Study of Various Routing Protocols in VANET,” Proceedings of International Journals © 2013 ACEEE DOI: 03.LSCS.2013.1.515 of Computer Science Issues, vol. 8, Issues 4, 2011. [18] Y. Xue & K. Nahrstedt, “Providing Fault –Tolerant Ad Hoc Routing Service in Adversarial Environments,” Proceeding of Wireless Personal Communication, vol. 29, Issue 3-4, pp. 367388, 2004. [19] G. Liu, B.-S. Lee, B.-C. Seet, C.H. Foh, K.J. Wong, and K.-K. Lee, “A routing Strategy for Metropolis Vehicular Communications,” In International Conference on Information Networking (ICOIN), pp. 134–143, 2004. [20] H. Fubler, M. Mauve, H. Hartenstein, M. Kasemann, D. Vollmer, “Location Based Routing for Vehicular Ad-Hoc Networks,” Mobile Computing and Communications Review (MC2R), vol. 7, Issue 1, pp. 47-49, 2003. [21] Fan Li & Yu Wang, “Routing in Vehicular Ad Hoc Networks: A Survey,” Proceeding of IEEE Vehicular Technology Magazine, vol. 2, Issue 2, pp.12-22, 2007. [22] Y. Kumar, P. Kumar, A. Kadian, “A Survey on Routing Mechanism and Techniques in Vehicle to Vehicle Communication (VANET),” International Journal of Computer Science & Engineering Survey (IJCSES) vol. 2, Issue 1, pp. 135-143, 2011. 51