Architecture and Routing Protocols for Internet of Vehicles: A Review

2022 ◽  
Vol 40 (1/2/3) ◽  
pp. 1
Author(s):  
S. Vimal ◽  
Mohammad Shabaz ◽  
Gaurav Dhiman ◽  
Sparsh Sharma ◽  
Mohd. Naseem ◽  
...  
Author(s):  
Shradha Tembhare ◽  
Abhishek Mishra

Internet of Vehicles (IoV) is viewed as a developing worldview for associated vehicles to trade their data with different vehicles utilizing vehicle-to-vehicle (V2V) correspondences by framing a vehicular ad-hoc systems (VANETs), with roadside units utilizing vehicle-to-roadside (V2R) interchanges. Performance of this smart ITS mainly owes to the design of efficient routing protocols in VANETs. Distinct features of VANETs like unsteady connectivity, high mobility and partitioning of the network have made routing of the information in VANETs difficult and challenging, hence dictating the development of efficient routing protocols. The computation of the best route measures the performance of communication whereas routing protocols takes care of communication & routing of the data. Provision of smart communication, necessitates the analysis of routing protocols in VANET. Accordingly in this paper, reviewed various types of existing routing protocols and security approaches in VANET are discussed.


Sensor Review ◽  
2019 ◽  
Vol 39 (1) ◽  
pp. 58-70 ◽  
Author(s):  
Oussama Senouci ◽  
Zibouda Aliouat ◽  
Saad Harous

Purpose This paper is a review of a number routing protocols in the internet of vehicles (IoV). IoV emphasizes information interaction among humans, vehicles and a roadside unit (RSU), within which routing is one of the most important steps in IoV network. Design/methodology/approach In this paper, the authors have summarized different research data on routing protocols in the IoV. Several routing protocols for IoV have been proposed in the literature. Their classification is made according to some criteria such as topology-based, position-based, transmission strategy and network structure. This paper focuses on the transmission strategy criteria. There exist three types of protocols that are based on this strategy: unicast protocol, broadcast protocols and multicast protocols. This later type is classified into two subclasses: geocast and cluster-based protocols. The taxonomy of the transmission strategy is presented in this study. We discuss the advantages and disadvantages of each type with a general comparison between the five types. Findings The authors can deduce that many challenges are encountered when designing routing protocols for IoV. Originality/value A simple and well-explained presentation of the functioning of the IoV is provided with a comparison among each categories of protocols is well presented along with the advantages and disadvantages of each type. The authors examined the main problems encountered during the design of IoV routing protocol, such as the quick change of topology, the frequent disconnection, the big volume of data to be processed and stored in the IoV, and the problem of network fragmentation. This work explores, compares existing routing protocols in IoV and provides a critical analysis. For that, the authors extract the challenges and propose future perspectives for each categories of protocols.


2018 ◽  
Vol 5 (5) ◽  
pp. 3683-3691 ◽  
Author(s):  
Armir Bujari ◽  
Ombretta Gaggi ◽  
Claudio Enrico Palazzi ◽  
Daniele Ronzani

10.29007/c5kn ◽  
2018 ◽  
Author(s):  
Alessio Bonadio ◽  
Francesco Chiti ◽  
Romano Fantacci

In this paper, the novel Fog Communications and Computing paradigm is addressed by presenting an integrated system architecture, that is applied to achieve a full con- text awareness for vehicular networks and, consequently, to react on traffic anomalous conditions. In particular, we propose to adopt a specific co-designed approach involving Application and Networks Layers. For the latter one, as no infrastructure usually exists, effective routing protocols are needed to guarantee a certain level of reliability of the in- formation collected from individual vehicles. As a consequence, we investigated classical Epidemic Flooding based, Network Coding inspired and Chord protocols. Besides, we resort to Blockchain principle to design a distributed consensus sensing application. The system has been tested by resorting to OMNeT++ framework for its modularity, high fidelity and flexibility. Performance analysis has been conducted over realistic scenarios in terms of consensus making overhead, latency and scalability, pointing out the better trade-off allowing the overlay P2P network formation and the complete context awareness achieved by the vehicles community.


Author(s):  
Farhana Ajaz ◽  
Mohd. Naseem ◽  
Gulfam Ahamad ◽  
Qamar Rayees Khan ◽  
Sparsh Sharma ◽  
...  

Author(s):  
Chahrazed Ksouri ◽  
Imen Jemili ◽  
Mohamed Mosbah ◽  
Abdelfettah Belghith

Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Sign in / Sign up

Export Citation Format

Share Document