scholarly journals State of the Art Routing Protocols in VANETs: A Review

2018 ◽  
Vol 130 ◽  
pp. 689-694 ◽  
Author(s):  
Ishtiaq Wahid ◽  
Ataul Aziz Ikram ◽  
Masood Ahmad ◽  
Sajjad Ali ◽  
Arshad Ali
2021 ◽  
Vol 10 (1) ◽  
pp. 45-52
Author(s):  
S. Neelambike ◽  
C. Amith Shekhar ◽  
B. H. Rekha ◽  
Bhavana S. Patil

Being ad-hoc in design, VA NET is a form of networks generated by the idea of building up a network of cars for a specific needs or circumstance. In addition to the benefits, VANET poses a large number of challenges such as providing QoS, high bandwidth and connectivity, and vehicle and individual privacy security. Each report discusses VANET 's state-of-the-art, explaining the relevant problems. We address in depth network design, signal modelling and propagation mechanisms m, usability modeling, routing protocols and network security. The paper's key results are that an effective and stable VANET satisfies all architecture criteria such as QoS, minimal latency, low BER and high PDR. At the end of the paper are addressed several primary work areas and challenges at VANET.


2018 ◽  
Vol 14 (2) ◽  
pp. 131-137
Author(s):  
Lanny Sitanayah

Wireless Sensor Networks (WSNs) are subject to failures. Even though reliable routing protocols for WSNs exist and are well-understood, the physical network topology must ensure that alternate routes with an acceptable length to the sinksare in fact available when failures occur. This requires a sensor network deployment to be planned with an objective of ensuring some measure of robustness in the topology, so that when failures do occur the protocols can continue to offer reliable delivery. To ensure that sensor nodes have sufficient paths, it may be necessary to add a number of additional relay nodes, which do not sense, but only forward data from other nodes. In this paper, we review a range of existing algorithms to deploy relay nodes for fault tolerance. We classify the state-of-the-art relay placement algorithms based on routing structures, connectivity requirements, deployment locations, and fault-tolerant requirements.


Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 709 ◽  
Author(s):  
Abdul Mateen ◽  
Muhammad Awais ◽  
Nadeem Javaid ◽  
Farruh Ishmanov ◽  
Muhammad Afzal ◽  
...  

Underwater Wireless Sensor Networks (UWSNs) are promising and emerging frameworks having a wide range of applications. The underwater sensor deployment is beneficial; however, some factors limit the performance of the network, i.e., less reliability, high end-to-end delay and maximum energy dissipation. The provisioning of the aforementioned factors has become a challenging task for the research community. In UWSNs, battery consumption is inevitable and has a direct impact on the performance of the network. Most of the time energy dissipates due to the creation of void holes and imbalanced network deployment. In this work, two routing protocols are proposed to avoid the void hole and extra energy dissipation problems which, due to which lifespan of the network increases. To show the efficacy of the proposed routing schemes, they are compared with the state of the art protocols. Simulation results show that the proposed schemes outperform the counterparts.


Author(s):  
Tarek S. Sobh

Aim:: This work evaluates existing secure ant colony protocols of MANETs such as ASHFIK, AAMRP, and MANHSI with each other. Here, each node in the proposed ad hoc network protocols is known with a trust value. Each trust value represents the corresponding security level and a node with a higher trust value is authorized to monitor and lead as a core node its neighboring nodes. Background:: Trusted critical MANET is a secure wireless network that is used in different critical applications. Military battlefields are an example of these applications that force on people a number of needed things including robustness and reliable performance within high mobility situations and constraints (e.g. hostile attacks, cost, and battery limits). Objectives:: In this work, the extremely important similarity between the features of critical MANETs and the core-based routing protocols that are based-on ant colonies. Methods:: The metrics used in this evaluation are the availability, reliability, packet delivery ratio, and total overheads, while the performance is serious and stubborn because of the mobility of node, senders' number, and size of a multicast group. Results:: The results of the simulation show that ASHFIK provides better availability, reliability, Packet Delivery Ratio (PDR), and lower total overheads. In addition, the results show that ASHFIK remains consistent performance with a different group size of the network. It means a trusted and scalable network of ant colony core-based routing protocols. Conclusion:: here are existing different mobile ad hoc networks based-on ant colonies. According to our comparative study and state-of-the-art, the ASHFIK protocol can be used as a good routing protocol for critical MANETs that are based-on ant colonies.


2018 ◽  
Vol 3 (10) ◽  
pp. 154385
Author(s):  
Inam Ullah Khan ◽  
Ijaz Mansoor Qureshi ◽  
Syed Bilal Hussain Shah ◽  
Muhammad Hamza Akhlaq ◽  
Alamgir Safi ◽  
...  

Author(s):  
Lakshman Narayana Vejendla ◽  
Alapati Naresh ◽  
Peda Gopi Arepalli

Internet of things can be simply referred to as internet of entirety, which is the network of things enclosed with software, sensors, electronics that allows them to gather and transmit the data. Because of the various and progressively malevolent assaults on PC systems and frameworks, current security apparatuses are frequently insufficient to determine the issues identified with unlawful clients, unwavering quality, and to give vigorous system security. Late research has demonstrated that in spite of the fact that system security has built up, a significant worry about an expansion in illicit interruptions is as yet happening. Addressing security on every occasion or in every place is a really important and sensitive matter for many users, businesses, governments, and enterprises. In this research work, the authors propose a secret IoT architecture for routing in a network. It aims to locate the malicious users in an IoT routing protocols. The proposed mechanism is compared with the state-of-the-art work and compared results show the proposed work performs well.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 4054 ◽  
Author(s):  
José Saiáns-Vázquez ◽  
Esteban Ordóñez-Morales ◽  
Martín López-Nores ◽  
Yolanda Blanco-Fernández ◽  
Jack Bravo-Torres ◽  
...  

The advent of the autonomous car is paving the road to the realization of ideas that will help optimize traffic flows, increase safety and reduce fuel consumption, among other advantages. We present one proposal to bring together Virtual Traffics Lights (VTLs) and platooning in urban scenarios, leaning on vehicle-to-vehicle (V2V) communication protocols that turn intersections into virtual containers of data. Newly-introduced protocols for the combined management of VTLs and platoons are validated by simulation, comparing a range of routing protocols for the vehicular networks with the baseline given by common deployments of traditional traffic lights ruled by state-of-the-art policies. The simulation results show that the combination of VTLs and platoons can achieve significant reductions in travel times and fuel consumption, provided that proper algorithms are used to handle the V2V communications.


Sign in / Sign up

Export Citation Format

Share Document