B-IoMV: Blockchain-based onion routing protocol for D2D communication in an IoMV environment beyond 5G

2021 ◽  
pp. 100401 ◽  
Author(s):  
Rajesh Gupta ◽  
Sudeep Tanwar ◽  
Neeraj Kumar
2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
BaoPing Yang ◽  
Kun Jiang

Repairing D2D communication routing buffer overflow in a cellular network is of great significance in improving communication quality and security. Due to the increase of user usage, the communication data are easy to exceed the boundary of the buffer, resulting in the reduction of covered data information. The traditional repair methods mainly repair through the characteristics of covered data information, ignoring the impact of network topology information transmission delay and packet loss during calculation, resulting in the problem of low communication security. A cellular network routing buffer overflow repair algorithm based on the homomorphic analysis of node residual energy is proposed; the cellular network D2D communication routing protocol is designed; the cellular network D2D communication protocol path index is determined; then, the cellular network D2D communication routing protocol is designed by analyzing node residual energy; and the cellular network D2D communication network routing optimization method based on AHP is designed. Big constructs the energy model of cellular network D2D communication network, solves and sets the routing optimization objective function, realizes the control of network routing, and repairs the buffer overflow. The experiment results show that the improved method can effectively reduce the packet loss rate of communication data, improve the anti-interference ability of the system, and ensure the security of network communication.


2021 ◽  
pp. 191-197
Author(s):  
Rana E. Ahmed ◽  

Device-to-Device (D2D) communication is designed to offload the traffic on the 5G core networks and backhaul links in an effort to deal with the high volume and variety of data traffic anticipated in 5G networks. D2D communications provide faster and energy-efficient access to the devices within a cell. However, efficient provision of D2D communication presents several challenges, including multi-hop routing to the devices that are not immediate neighbours to each other. Dynamic Source Routing (DSR) is a popular protocol commonly applied to Mobile Ad hoc Networks (MANET); however, its direct application in 5G D2D environment is not straightforward. In this paper, a new multi-hop routing protocol for D2D communications in 5G network is proposed. The protocol modifies the conventional DSR protocol and takes advantages of 5G cellular infrastructure to make routing decisions faster. The proposed protocol offers low overhead over the conventional DSR, in terms of the number of control messages exchanged in the D2D communication, thus saving time and energy for the devices during the route discovery process. Simulation results show that the proposed protocol also achieves better results in terms of D2D routing success probability.


2020 ◽  
Vol 39 (6) ◽  
pp. 8357-8364
Author(s):  
Thompson Stephan ◽  
Ananthnarayan Rajappa ◽  
K.S. Sendhil Kumar ◽  
Shivang Gupta ◽  
Achyut Shankar ◽  
...  

Vehicular Ad Hoc Networks (VANETs) is the most growing research area in wireless communication and has been gaining significant attention over recent years due to its role in designing intelligent transportation systems. Wireless multi-hop forwarding in VANETs is challenging since the data has to be relayed as soon as possible through the intermediate vehicles from the source to destination. This paper proposes a modified fuzzy-based greedy routing protocol (MFGR) which is an enhanced version of fuzzy logic-based greedy routing protocol (FLGR). Our proposed protocol applies fuzzy logic for the selection of the next greedy forwarder to forward the data reliably towards the destination. Five parameters, namely distance, direction, speed, position, and trust have been used to evaluate the node’s stability using fuzzy logic. The simulation results demonstrate that the proposed MFGR scheme can achieve the best performance in terms of the highest packet delivery ratio (PDR) and minimizes the average number of hops among all protocols.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Sign in / Sign up

Export Citation Format

Share Document