scholarly journals Would Current Ad-Hoc Routing Protocols be Adequate for the Internet of Vehicles? A Comparative Study

2018 ◽  
Vol 5 (5) ◽  
pp. 3683-3691 ◽  
Author(s):  
Armir Bujari ◽  
Ombretta Gaggi ◽  
Claudio Enrico Palazzi ◽  
Daniele Ronzani
Author(s):  
Shradha Tembhare ◽  
Abhishek Mishra

Internet of Vehicles (IoV) is viewed as a developing worldview for associated vehicles to trade their data with different vehicles utilizing vehicle-to-vehicle (V2V) correspondences by framing a vehicular ad-hoc systems (VANETs), with roadside units utilizing vehicle-to-roadside (V2R) interchanges. Performance of this smart ITS mainly owes to the design of efficient routing protocols in VANETs. Distinct features of VANETs like unsteady connectivity, high mobility and partitioning of the network have made routing of the information in VANETs difficult and challenging, hence dictating the development of efficient routing protocols. The computation of the best route measures the performance of communication whereas routing protocols takes care of communication & routing of the data. Provision of smart communication, necessitates the analysis of routing protocols in VANET. Accordingly in this paper, reviewed various types of existing routing protocols and security approaches in VANET are discussed.


2007 ◽  
Vol 30 (11-12) ◽  
pp. 2478-2496 ◽  
Author(s):  
Ha Duyen Trung ◽  
Watit Benjapolakul ◽  
Phan Minh Duc

2022 ◽  
Vol 14 (1) ◽  
pp. 28
Author(s):  
Yelena Trofimova ◽  
Pavel Tvrdík

In wireless ad hoc networks, security and communication challenges are frequently addressed by deploying a trust mechanism. A number of approaches for evaluating trust of ad hoc network nodes have been proposed, including the one that uses neural networks. We proposed to use packet delivery ratios as input to the neural network. In this article, we present a new method, called TARA (Trust-Aware Reactive Ad Hoc routing), to incorporate node trusts into reactive ad hoc routing protocols. The novelty of the TARA method is that it does not require changes to the routing protocol itself. Instead, it influences the routing choice from outside by delaying the route request messages of untrusted nodes. The performance of the method was evaluated on the use case of sensor nodes sending data to a sink node. The experiments showed that the method improves the packet delivery ratio in the network by about 70%. Performance analysis of the TARA method provided recommendations for its application in a particular ad hoc network.


Sign in / Sign up

Export Citation Format

Share Document