SlideShare a Scribd company logo
1 of 6
Download to read offline
INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY
OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED
All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 12
VANET Clustering for Protected and Steady Network
Mukesh Bathre1
, Alok Sahelay2
___________________________________________________
Abstract— Vehicular on demand ad-hoc network
(VANET) is understood as a necessary issue of good
Transportation systems. The key advantage of VANET
communication is looked in dynamic protection systems, that
objective to improve security of travelers by exchanging
caution messages between vehicles. Alternative applications
and private services also are allowed so as to lower
management expenses and to market VANET exploitation.
To effectively established VANET, security is one amongst
key challenges that has got to be tackled. Another vital
concern is measurability could be a serious issue for a
network designer a way to maintain stable communication
and services in VANET. Extraordinarily dynamic
atmosphere of VANETs looks it troublesome. This paper
introduced an automatic reliability management method for
VANETs that uses machine learning to categories nodes as
malicious. Cluster creation is one effective method for the
measurability drawback. Here conjointly given associate
entropy-based WCA (EWCA) cluster maintained method
which may handle the steady of the automobile network.
_______________________________________________________
Index Terms— Vehicular ad hoc network, Monitoring,
Attackers, Stable clustering, Link expiration time.
_______________________________________________________
I. INTRODUCTION
Vehicular Ad-Hoc Networks (VANET) are becoming an
important technology for concerning latest computer world. It
can be help to get better the driving skill both in terms of
security and effectiveness. Figure 1 describes VANET, when
multi-hop communication is apply VANET allow a automobile
to communicate through other automobiles which are away of
radio transmission range. It as well enables vehicles to
correspond with roadside unit. VANET will to be expected be
a crucial part of upcoming Intelligent Transportation Systems
(ITS).
_______________________________________________
First Author: Mukesh Bathre, Assistant Professor, Department of Computer
Science & Engineering, Government College of Engineering, Keonjhar,
Odisha, India,mukesh.bathre@gmail.com
Second Author: Alok Sahelay, Dept. of Information Technology, Oriental
College of Technology, Bhopal, India,aloksahelay@gmail.com
__________________________________________________________
Fig. 1. Vehicular ad-hoc networks.
Presently, ITS relies greatly on communications
deployment. Electromagnetic sensors are set into road outside;
traffic cameras are set up at major junction; and Radio
Frequency Identification (RFID) readers are organize at main
road doorways. A usual method for gathering and give out
traffic information is as follows. First, traffic sample are
collected by road side sensors and send to local transportation
center. After statistics handing, traffic information can then be
distributes to a user’s communication unit via cellular
networks. This is an costly and ineffective mode of distribute
location-based information, mainly when the information of
concern is just a hardly hundred meters from the user’s
location. Because of its limited communication ability,
VANET might modify this paradigm, generating and
disseminating information very simple.
The develop and execution of Vehicular Ad Hoc Networks
(VANETs) stay representing an key research challenge, which,
if resolved, could show the way to the development of the after
that key breakthrough after the Internet and cellular network
technologies. Vehicles could participate the role of an allowing
structure for a number of vastly used apps (e.g., disaster
warning systems, traffic information control and prevention
systems, climate and weather conditions observing, etc.), as
well as enjoying ones (e.g., online entertainments, ad and
promotion, etc.). In addition, every vehicle, associates in a
peer-to-peer approach, can enhance the bandwidth resources
that are currently available, as well offering connectivity to
novel geographical regions. It shows importance of research on
VANETs has proliferated for the duration of these two
decades, dealing with all most important different phases that
engage their devise: communication protocol layers,
applications, and mobility/channel models.
The enough short quantity of vehicles allows with
communication lines that maintain VANET-based networking
has so distant prevented the run of any extensive trial, thus
primarily to a proliferation of simulative and logical studies.
Simulations, in particular, have been applied to check how
INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY
OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED
All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 13
function and protocols can perform when implemented on a
huge amount of vehicles, while determined to resemble as
closely as probable the actions and the situation that each solo
car would face in real word. So, complete simulative models
have been devising to replicate the expected movements of cars
on lanes, in addition to the behavior of wireless lines in
vehicular background. In essence, the common ground of the
great majority of the research that has been carried out in the
space of vehicular-based networking and applications is that of
finding ways of testing apps and protocols while reproducing,
as closely as possible in simulation, the situation that would be
found by a real VANET.
Now, although research efforts on VANETs continuously
work on increasing the stage of detail and accuracy of all
underlying simulation models, it is well understood that not
being able to test protocols and systems on reasonable size
vehicular networks represents an important handicap. Unlike
peer-to-peer or cellular networks, in fact, VANET technologies
that involve a large number of vehicles never find a way of
being deployed and tested. In literature it is possible to find a
number of works that try to fill this gap, by analyzing the
exchange of data for only a few hops between two or three
vehicles. However, a clear awareness emerges, from most of
these studies, of the inadequacy of the proposed experimental
scenarios, due to the use of a too limited number of vehicles
and devices.
II. RELATED WORK
In paper [1], author proposed a lightweight anonymous
method based on bilinear pairing to resolve the privacy
preserving problem of vehicular ad hoc network (VANET).
This scheme can protect drivers' privacy not only between
vehicles, but also among vehicles and road side units (RSUs).
Meanwhile, this scheme does not ask for vehicles to conduct
any bilinear pairing procedures, thus significantly ease the
computational complexity of vehicles. Authors demonstrate
this scheme through protection analysis and evaluate its
computational performance by simulations. The results show
that this work scheme performs well in providing secure
communications and anonymous authentication among RSUs
and vehicles.
Looking for a parking space in a overcrowded area or a
large parking lot and preventing auto theft are major anxiety to
this work everyday lives. In paper [2], authors propose a new
smart parking scheme for large parking lots through vehicular
communication. The proposed scheme can provide the drivers
with real-time parking navigation service, intelligent anti-theft
protection, and friendly parking information dissemination.
Performance analysis via extensive simulations demonstrates
its efficiency and practicality.
Vehicular ad-hoc network (VANET) is getting more
awareness lately because of its lots of essential applications in
transportation, to get better road protection, reduce traffic
jamming, to enable competent traffic management etc.
However, there are several technical problems to be addressed
for its effective exploitation. Steadiness in communication in
VANET is hard to accomplish due to quick network changes.
Restoration is ineffective while using conventional protocols
based on broadcast storm. In paper [3], authors propose a new
adaptive protocol to improve performance for on road safety
alert application in VANET. It can alleviate the broadcast
storm problem using adaptive wait-windows and adaptive
probability to transmit. Simulation shows that this work
proposed approach has better performances in terms of number
of collision, success rate, and delay, when compared with other
existing protocols.
In paper [4], a trustworthy and effective alarm message
broadcast routing is proposed for VANET. Distinct other
comparable routing algorithms, REAR are based on the actual
wireless channel in VANET. REAR utilizes a lesser amount of
broadcast packets to spread alarm message. According to the
theory model of wireless medium, it estimates the reception
possibility of alarm messages for nodes. The contention
scheme based on the reception probability is used to choose the
optimized relay. Two approaches for utilizing the receipt
probability and three functions for calculating contention delay
are discussed and analyzed. The simulation and theory analysis
are confirmed that REAR has a higher reliability and uses less
broadcast packets than the location-based algorithm.
Misbehavior detection schemes (MDSs) form an integral
part of misbehaving node eviction in vehicular ad hoc networks
(VANETs). A misbehaving node can send messages
corresponding to an event that either has not occurred (possibly
out of malicious intent), or incorrect information corresponding
to an actual event (for example, faulty sensor reading), or both,
causing applications to malfunction. While identifying the
presence of misbehavior, it is also imperative to extract the
root-cause of the observed misbehavior in order to properly
assess the misbehavior’s impact, which in turn determines the
action to be taken. This paper [5] uses the Post Crash
Notification (PCN) application to illustrate the basic
considerations and the key factors affecting the reliability
performance of such schemes. The basic cause-tree approach is
illustrated and used effectively to jointly achieve misbehavior
detection as well as identification of its root-cause. The
considerations regarding parameter tuning and impact of
mobility on the performance of the MDS are studied. The
performance of the proposed MDS is found to be not very
sensitive to slight errors in parameter estimation.
III. PROPOSED WORK
We present the proposed Enhanced vehicular clustering
based on weighted clustering algorithm (VWCA). EVWCA
consists of the clustering formation and clustering maintenance
phases. Before describing this work clustering algorithm in
detail, we make the following assumptions:
1) The network topology is static during the execution of
the clustering algorithm.
2) Each mobile node joins exactly one cluster-head.
INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY
OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED
All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 14
A. The new vehicular clustering based on weighted clustering
algorithm (VWCA)
1) Phase-I: Clustering Formation
Pr For effective cluster formation and remain cluster stable
during frequently change topology in highway this paper
proposed new VWCA more reliable algorithm. In clustering
techniques, clusters should be formed in such manner that it
not be very large or very small. In a very large cluster, traffic of
transmitted information from members to their cluster-head is
increased so cluster-head have lost of overheads, and then the
cluster-head could not deliver messages on efficient time limit.
If cluster formation is very small clusters may not be stable and
changed frequently in network because the re-affiliation of
network rose. In new VWCA, this work use two other
techniques to cluster creation and cluster maintain.
We propose to use disbelieve value, number of neighbors
based on dynamic transmission range and direction of vehicles
in weighted clustering. In addition, we use the entropy model
proposed in Liu et [9]. In order to select a trustier node as a
cluster-head, we consider the disbelieve value (Td) in VWCA.
The disbelieve value (Td) for vehicle V represents disbelieve
value of behavior of vehicle V when it forwards messages.
Each vehicle maintains two lists: one white list and one black
list. The white list of vehicle V, represented by WLV, includes
the list of neighbors of vehicle V that their Td values are lower
than the threshold values. Note that value of sis equal for all
vehicles inside the certain certificate authentication (CA) in
VANET. On the other hand, the black list of vehicle V,
denoted by BLV, consists of neighbors of vehicle V that their
Td values are higher than the threshold values. The black list
BLV is the copy of the main black list created by the relevant
CA. Each CA broadcasts its main black list periodically to all
cluster-heads which are placed inside its region and then each
cluster-head broadcasts the main black list to the vehicles
located inside its cluster.
Firstly, each vehicle announces itself as a cluster-head by
putting its own address and ID in a beacon to be broadcast.
After receiving beacons from its neighbors, each vehicle has
complete information from its current neighbors, and it can
make decision whether to change its current cluster status or
not. For this purpose, vehicles execute VWCA in order to
select their cluster-heads. The VWCA algorithm has five steps
to choose its required parameters as:
Step 1: Determining the neighborhood list for vehicles
Step 2: Determining the vehicles priority based on their
disbelieve values
Step 3: Determining the direction of vehicles
2) Phase-II: Clustering Maintenance Using Mobility
prediction
The mobility of nodes coupled with the transient nature of
wireless media often results in a highly dynamic network
topology. Due to mobility some nodes will detach from the
current cluster and attach itself to some other cluster. The
process of joining a new cluster is known as re-affiliation. If
the re-affiliation fails, the whole network will recall the cluster
head selection routine. One disadvantage of WCA is high re-
affiliation frequency. High frequency of re-affiliation will
increase the communication overhead. Thus, reducing the
amount of re-affiliation is necessary in ad hoc networks. To
prevent this we go for mobility prediction schemes. The
impact of mobility prediction schemes on the temporal stability
of the clusters obtained using a mobility-aware clustering
framework. We propose a simple framework for a mobility
prediction-based clustering to enhance the cluster stability.
One way to predict the mobility of nodes is using the Link
Expiration Time [6]. The impact of mobility prediction
schemes on the stability of the clusters obtained using a
mobility-aware clustering framework. Compute the Link
Expiration Time (LET) to predict the duration of a wireless
link between two nodes in the network. The approach assumes
that the direction and speed of motion of the mobile nodes does
not change during the prediction interval.
Link Expiration Time (LET)
The Link Expiration Time (LET) is a simple prediction
scheme that determines the duration of a wireless link between
two mobile nodes. Dynamic clustering in ad hoc networks has
also been extensively studied in the literature. Several
distributed clustering algorithms for MANETs have been
proposed. While some schemes try to balance the energy
consumption for mobile nodes, others aim to minimize the
clustering-related maintenance costs. Combined metrics based
clustering schemes take a number of metrics into account for
cluster configuration. The Weighted Clustering Algorithm
(WCA) [8] is one such scheme, where four parameters are
considered for the cluster head selection procedure, which are
representative of the degree, the sum of the distances to other
nodes in its radio distance, mobility, and battery power of the
mobile nodes. Here we propose an enhanced WCA which can
enhance the stability of the network. Such a scheme can be
tuned flexibly the parameters to suit to different scenarios. To
calculate the duration of link between two mobile nodes, we
assume that their location, speed and direction of movement
remain constant.
Here let:
• Location of node i and node j at time t be given by (xi ,
yi) and (xj ,yj).
• Vi and Vj be the speeds,
• θi and θj be the directions of the nodes i and j
respectively.
• If the transmission range of the nodes is r, then the link
expiration time Dt is given by the formula given below
Where
The LET gives an upper bound on the estimate of the
residence time of a node in a cluster. In the proposed clustering
framework, when LET-based prediction is used, a node is
INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY
OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED
All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 15
allowed to join a cluster only if the predicted LET of the link
between the node and the cluster head is greater than the
cluster‟s admission criteria Tj [6, 7]. For every node N that
detach from current cluster we check whether the node is a
Cluster Head (or) Cluster member.
1. If it is a Cluster Head then call for cluster head selection
within the particular cluster and form a new cluster.
2. If it is a Cluster member then calculate Link Expiration
Time with Cluster Head of each cluster and the node that re-
affiliates must be within transmission range of cluster head
where transmission range is fixed.
Check whether LET is greater than threshold value (Tj),
Here Tj is average of all LET, and if it is greater than the Node
is eligible to join the particular cluster which shares greater
LET.
B. The monitoring of malicious vehicles (MMV) algorithm
Considering the lack of coordinating unit in VANET,
vehicles should cooperate with each other in order to increase
security in the network. In order to verify behavior of vehicles
and detect abnormal behavior in the network, the following
algorithm (see Fig. 2) is proposed:
Step 1: Distributing cluster keys
Step 2: Allocating initial disbelieve value
Step 3: Determining threshold valueσ.
Step 4: Monitoring Algorithm.
a) NS-3 Simulation
1. Design Wi-Fi topology
2. Install MAC, IP and Application protocol on each
node.
3. Select VANET routing protocol (AODV) start
simulation
4. For each node i
a. do
b. RREQ start (in case of AODV)
c. Flooding of RREQ
d. Build routing table (AODV. route file)
i) Collect behaviors statistics such as No. of
packet transmitted, received, lost, delay
time, modified etc.
ii) Calculate PDR, PMR, PMIR
iii) Serialize into .xml or .csv file format
b) Behavior Classification
1. Input .xml/.csv data file Generated by NS-3
2. Extract PDR, PMR and PMIR using DOM
a. For each node i repeat
b. Input .xml onto DOM (Data Object Module)
c. Extract behavior from file.
Step 5: Determining abnormality of vehicles
Step 6: Modifying disbelieve value
Step 7: Updating black and white lists based on Td
Step 8: Repeating monitoring after increasing Td
2) Behavioral Data Collection
The behavioral data collection module is responsible for the
collection of node behaviors and formation of behavioral
dataset. In this paper, a node’s behavior is described in terms of
the ratio of the amount of this behavior over the total amount of
packets that the node has received, such as packet drop rate
(PDR), packet modification rate (PMR). An example training
dataset is shown in Table I. Here, we create a m-dimensional
feature vector for each node. In the example shown in Table I,
m = 3.
During the testing stage, the Behavioral Data Collection
module on each node first observes and records the behaviors
of their neighbors. It also receives and integrates node
behaviors reported by other nodes.
TABLE I. AN EXAMPLE OF THE TRAINING DATASET USED TO CLASSIFY
VANET NODES AS MALICIOUS OR NON- MALICIOUS.
Node ID PDR PMR
1 90% 10%
2 2% 0
3 30% 60%
4 5% 0
5 10% 0
· · · · · · · · ·
Fig. 2. Flowchart of the MMV algorithm
MMV Algorithm
Distributing cluster keys
Allocating initial distrust value
Determining threshold value σ
Monitoring
Determining abnormality of
vehicles using PDR
Modifying distrust Value
Isolate Malicious
Vehicles
INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY
OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED
All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 16
Fig. 3. Clustering Example
IV. PERFORMANCE EVALUATION AND ANALYSIS
In this section, we examine the performance of the SAT
scheme, and its performance is compared to that of the baseline
mechanism. Overall, the experiments can be divided into two
phases: first phase is used SUMO for simulating vehicles as
real world street condition and in second phase using NS-3
pcap utility used for capture packets form this vehicle network
to identify malicious node in network according to its behavior
as explained in proposed work.
A. Simulation Setup
This work is implemented in linux environment using
ubutu 12.04 GUI versions. For VANET SOMU version 0.14.0
is used and also need to configure NS-3 [12] as the simulation
platform. SUMO is an open source, highly portable,
microscopic and continuous road traffic simulation package
designed to handle large road networks. It is mainly developed
by employees of the Institute of Transportation Systems at the
German Aerospace Center, SUMO is open source. table II list
the parameters used in the simulation scenarios.
TABLE II. PARAMETER LIST
Parameter Value
Mobility Model Waypoint model
Nodes (Wi-fi Node's) 50 nodes
Simulation Time 100s
Packet Size 1000 bytes
Sink Nodes 17
Update Interval 15s
Node Speed 10 m/s
Settling Time 6
Routing Protocols AODV/DSDV
Each simulation scenario has 30 runs with distinct random
seeds, which ensures a unique initial node placement for each
run. Each experimental result is the average over the 30 runs
for this simulation scenario. Table III shows statics capture by
pap utility of NS-3 for 25 nodes ID starting from 0 to 24 total
no. of packets transmitted, total no. of packets received and
packet drop ration(PDR) for each node during simulation. This
statics graph can be observed in figure 4.
TABLE III. SIMULATION CLASSIFICATION DATA
Node ID PDR PMIR PMOR
0 0 0 0
1 0 0 0
2 0 0 0.028169
3 0 0 0
4 0 0 0
5 0 0 0
6 0.621984 0.276145711 0.135135
7 0 0 0
8 0 0 0
9 0 0 0
10 0 0 0
11 0 0 0
12 0.433566 0.297327813 0.079037
13 0.117188 0.03968254 0
14 0.194175 0.1 0.066667
15 0.23569 0.069444444 0
16 0.036765 0 0
17 0.147059 0.120845921 0.030211
18 0.183486 0 0
19 0.184049 0.031347962 0
20 0.222222 0.0456621 0
21 0.209059 0.071684588 0.071685
22 0.13289 0 0
23 0.516416 0.240029542 0.070162
24 0 0 0
Fig. 4. PDR, PMIR and PMOR ratio for every node during simulation
We have perform VANET simulation many time for
detecting malicious node in network for which first three
detection data is shown in following graph for different no. of
INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY
OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED
All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 17
node. This graph shows for example 10 node network size in
first simulation result 1 malicious node found such next time
no node is malicious and for third simulation it gives 2 nodes
are abnormal because of PDR greater than 0.5 value, PMIR
greater than 0.1 and PMOR greater than 0.1.
0
5
10
15
10 20 30 40 50
No.ofabnormalnode
VANET Size
Abnormal nodes for different network size
First
Sim.
Second
Sim.
Third
Sim.
Fig. 5. Abnormality of nodes for different network size during simulation
V. CONCLUSION USING THE TEMPLATE
VANET could be a capable wireless communication
technology for up main road protection and data services. This
paper has calculable two completely different algorithms
applicable for VANET in main road. First, rule have projected
VWCA as a brand new transport cluster method supported the
WCA technique in two half 1st one for formation of cluster and
second for maintain of cluster properly for fewer overheads.
The VWCA technique primarily focuses on up the CH period,
membership length and security and second for maintaining
cluster stability as potential. Using VWCA, communication
value for change of integrity to a brand new cluster in network
decreases as a result of the membership period for each vehicle
has improved. Additionally, applying the entropy word within
the weighted total procedure, VWCA will minimize the
quantity of overheads created by high speed vehicles. VWCA
be ready to enhance network link whereas choosing cluster-
heads.
VWCA create use of not reliable price within the weighted
total operation. The not believe parameter has been obtained
from this work next given observation malicious vehicle
(MMV) algorithmic rule. Exploitation not believe parameter,
vehicles that have lower not believe cost than their neighbors
are hand-picked as cluster-heads. Therefore, cluster-heads are
additional reliable vehicles than alternative vehicles within the
network victimization their PDR worth.
In future works developing algorithmic rules for a town
state of affairs supported the techniques projected here for
highways and introducing a brand new security algorithmic
rule supported key distribution and therefore the projected
clustering algorithm.
REFERENCES
[1] Lightweight Anonymous Authentication Scheme for VANET
Based on Bilinear Pairing”, INCoS, Page(s): 222 – 228, 4th
International Conference, 2012,
[2] Rongxing Lu, Xiaodong Lin ; Haojin Zhu ; Xuemin Shen,
“SPARK: A New VANET-Based Smart Parking Scheme for
Large Parking Lots”, Page(s): 1413 – 1421, INFOCOM 2009,
IEEE
[3] Suriyapaiboonwattana, K., Pornavalai, C. ; Chakraborty, G.,
“An adaptive alert message dissemination protocol for VANET
to improve road safety”, Page(s): 1639 - 1644 FUZZ-IEEE
2009.
[4] Hao Jiang, Hao Guo, Lijia Chen, “Reliable and Efficient Alarm
Message Routing in VANET”, Distributed Computing Systems
Workshops, 2008, Page(s): 186 - 191
[5] Mainak Ghosh, Anitha Varghese, Arobinda Gupta, “Detecting
misbehaviors in VANET with integrated root-cause analysis”,
India 2010
[6] H. Deng, Q.-A. Zeng, and D. Agrawal, “Svm-based intrusion
detection system for wireless ad hoc networks,” in Proceedings
of 2003 IEEE 58th Vehicular Technology Conference, 2003.
VTC 2003-Fall.,vol.3, Oct. 2003, pp. 2147–2151.
[7] C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J.
Rowe,and K. Levitt, “A specification-based intrusion detection
system for aodv,” inSASN ’03: Proceedings of the 1st ACM
workshop on Security of ad hoc and sensor networks. New
York, NY, USA: ACM, 2003, pp. 125–134.
[8] S. Buchegger and J.-Y. Le Boudec, “Performance analysis of the
confidant protocol,” in MobiHoc ’02: Proceedings of the 3rd
ACM international symposium on Mobile ad hoc networking &
computing. New York, NY, USA: ACM, 2002, pp. 226–236.
[9] Liu X, Fan Zh, Shi L., “Securing vehicular ad hoc networks”.
In: Proceedings of the second conference on international
pervasive computing and applications. July 2007, p. 424–9.
[10] Ameneh Daeinabi, Akbar Ghaffar Pour Rahbar, Ahmad
Khademzadeh “VWCA: An efficient clustering algorithm in
vehicular ad hoc networks”, Journal of Network and Computer
Applications 207–222, 2011.
[11] Wenjia Li, Anupam Joshi, Tim Finin, “SAT: an SVM-based
Automated Trust Management System for Mobile Ad-hoc
Networks”, Proceedings of the Military Communications
Conference, 2011.
[12] S. Muthuramalingam, R. Viveka, B. Steffi Diana and R.
Rajaram, “A Modified Weighted Clustering Algorithm for
Stable Clustering using Mobility Prediction Scheme”,
Internetworking Indonesia Journal, 9-16, 2010.

More Related Content

What's hot

Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
ijtsrd
 
Study of Congestion Control Scheme with Decentralized Threshold Function in V...
Study of Congestion Control Scheme with Decentralized Threshold Function in V...Study of Congestion Control Scheme with Decentralized Threshold Function in V...
Study of Congestion Control Scheme with Decentralized Threshold Function in V...
ijtsrd
 
A novel character segmentation reconstruction approach for license plate reco...
A novel character segmentation reconstruction approach for license plate reco...A novel character segmentation reconstruction approach for license plate reco...
A novel character segmentation reconstruction approach for license plate reco...
Journal Papers
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
ijgca
 
19.robust railway crack detection scheme (rrcds)
19.robust railway crack detection scheme (rrcds)19.robust railway crack detection scheme (rrcds)
19.robust railway crack detection scheme (rrcds)
Suresh Ssbn
 

What's hot (19)

Dynamic multiagent method to avoid duplicated information at intersections in...
Dynamic multiagent method to avoid duplicated information at intersections in...Dynamic multiagent method to avoid duplicated information at intersections in...
Dynamic multiagent method to avoid duplicated information at intersections in...
 
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
 
Ijsrdv9 i20118
Ijsrdv9 i20118Ijsrdv9 i20118
Ijsrdv9 i20118
 
Group based algorithm to manage access
Group based algorithm to manage accessGroup based algorithm to manage access
Group based algorithm to manage access
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular Networks
 
Review Paper on Intelligent Traffic Control system using Computer Vision for ...
Review Paper on Intelligent Traffic Control system using Computer Vision for ...Review Paper on Intelligent Traffic Control system using Computer Vision for ...
Review Paper on Intelligent Traffic Control system using Computer Vision for ...
 
Intra-vehicular Wireless Sensor Networks
Intra-vehicular Wireless Sensor NetworksIntra-vehicular Wireless Sensor Networks
Intra-vehicular Wireless Sensor Networks
 
Study of Congestion Control Scheme with Decentralized Threshold Function in V...
Study of Congestion Control Scheme with Decentralized Threshold Function in V...Study of Congestion Control Scheme with Decentralized Threshold Function in V...
Study of Congestion Control Scheme with Decentralized Threshold Function in V...
 
A novel character segmentation reconstruction approach for license plate reco...
A novel character segmentation reconstruction approach for license plate reco...A novel character segmentation reconstruction approach for license plate reco...
A novel character segmentation reconstruction approach for license plate reco...
 
A Data Collection Scheme with Multi-Agent Based Approach for VSNS
A Data Collection Scheme with Multi-Agent Based Approach for VSNSA Data Collection Scheme with Multi-Agent Based Approach for VSNS
A Data Collection Scheme with Multi-Agent Based Approach for VSNS
 
A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
A Cloud-Based Smart-Parking System Based on Internet-of-Things TechnologiesA Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic Routing
 
19.robust railway crack detection scheme (rrcds)
19.robust railway crack detection scheme (rrcds)19.robust railway crack detection scheme (rrcds)
19.robust railway crack detection scheme (rrcds)
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 
Lh3420492054
Lh3420492054Lh3420492054
Lh3420492054
 
V2V design presentation final
V2V design presentation finalV2V design presentation final
V2V design presentation final
 

Viewers also liked

Ijartes v2-i4-001
Ijartes v2-i4-001Ijartes v2-i4-001
Ijartes v2-i4-001
IJARTES
 
Dasaralamsekitaryu copy-130420045943-phpapp02
Dasaralamsekitaryu copy-130420045943-phpapp02Dasaralamsekitaryu copy-130420045943-phpapp02
Dasaralamsekitaryu copy-130420045943-phpapp02
Kamal Habib
 
Staegiaeri 1 0
Staegiaeri 1 0Staegiaeri 1 0
Staegiaeri 1 0
luamira247
 
Mon amour, j’aimerais te dire
Mon amour, j’aimerais te direMon amour, j’aimerais te dire
Mon amour, j’aimerais te dire
guestb6d615
 

Viewers also liked (17)

Ijartes v2-i4-001
Ijartes v2-i4-001Ijartes v2-i4-001
Ijartes v2-i4-001
 
Ijartes v1-i2-005
Ijartes v1-i2-005Ijartes v1-i2-005
Ijartes v1-i2-005
 
Ijartes v1-i1-003
Ijartes v1-i1-003Ijartes v1-i1-003
Ijartes v1-i1-003
 
Dasaralamsekitaryu copy-130420045943-phpapp02
Dasaralamsekitaryu copy-130420045943-phpapp02Dasaralamsekitaryu copy-130420045943-phpapp02
Dasaralamsekitaryu copy-130420045943-phpapp02
 
Ijartes v1-i2-006
Ijartes v1-i2-006Ijartes v1-i2-006
Ijartes v1-i2-006
 
Ijartes v1-i3-001
Ijartes v1-i3-001Ijartes v1-i3-001
Ijartes v1-i3-001
 
Newsfb.zn.uz
Newsfb.zn.uzNewsfb.zn.uz
Newsfb.zn.uz
 
Ijartes v1-i1-005
Ijartes v1-i1-005Ijartes v1-i1-005
Ijartes v1-i1-005
 
Surface Traping in Silicon Nanowire Dual material engineered Cylindrical gate...
Surface Traping in Silicon Nanowire Dual material engineered Cylindrical gate...Surface Traping in Silicon Nanowire Dual material engineered Cylindrical gate...
Surface Traping in Silicon Nanowire Dual material engineered Cylindrical gate...
 
Ijartes v2-i2-002
Ijartes v2-i2-002Ijartes v2-i2-002
Ijartes v2-i2-002
 
Staegiaeri 1 0
Staegiaeri 1 0Staegiaeri 1 0
Staegiaeri 1 0
 
Security Issues in Biomedical Wireless Sensor Networks Applications: A Survey
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveySecurity Issues in Biomedical Wireless Sensor Networks Applications: A Survey
Security Issues in Biomedical Wireless Sensor Networks Applications: A Survey
 
Study and Analysis on Heat Treatment Process and Microstructure of Low Carbon...
Study and Analysis on Heat Treatment Process and Microstructure of Low Carbon...Study and Analysis on Heat Treatment Process and Microstructure of Low Carbon...
Study and Analysis on Heat Treatment Process and Microstructure of Low Carbon...
 
Mon amour, j’aimerais te dire
Mon amour, j’aimerais te direMon amour, j’aimerais te dire
Mon amour, j’aimerais te dire
 
Rapport annuel 2011
Rapport annuel 2011Rapport annuel 2011
Rapport annuel 2011
 
Power Generation from Speed Breaker Using Crank Shaft
Power Generation from Speed Breaker Using Crank ShaftPower Generation from Speed Breaker Using Crank Shaft
Power Generation from Speed Breaker Using Crank Shaft
 
Marketing d'influence - Alhena
Marketing d'influence - AlhenaMarketing d'influence - Alhena
Marketing d'influence - Alhena
 

Similar to Ijartes v1-i1-004

Traffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachTraffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding Approach
CSCJournals
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
rifat1tasnim
 
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELSIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
pijans
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
ijsrd.com
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
nooriasukmaningtyas
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
IJERA Editor
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 

Similar to Ijartes v1-i1-004 (20)

Traffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachTraffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding Approach
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELSIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
Real–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANETReal–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANET
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Big data traffic management in vehicular ad-hoc network
Big data traffic management in vehicular ad-hoc network Big data traffic management in vehicular ad-hoc network
Big data traffic management in vehicular ad-hoc network
 
IRJET- Automatic Vehicle Monitoring System based on Wireless Sensor Network
IRJET-  	  Automatic Vehicle Monitoring System based on Wireless Sensor NetworkIRJET-  	  Automatic Vehicle Monitoring System based on Wireless Sensor Network
IRJET- Automatic Vehicle Monitoring System based on Wireless Sensor Network
 
H046405864
H046405864H046405864
H046405864
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
 

More from IJARTES

Integrated Air Conditioning Unit for Automobiles
Integrated Air Conditioning Unit for AutomobilesIntegrated Air Conditioning Unit for Automobiles
Integrated Air Conditioning Unit for Automobiles
IJARTES
 
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
IJARTES
 

More from IJARTES (15)

Integration of Other Software Components with the Agricultural Expert Systems...
Integration of Other Software Components with the Agricultural Expert Systems...Integration of Other Software Components with the Agricultural Expert Systems...
Integration of Other Software Components with the Agricultural Expert Systems...
 
Short term Multi Chain Hydrothermal Scheduling Using Modified Gravitational S...
Short term Multi Chain Hydrothermal Scheduling Using Modified Gravitational S...Short term Multi Chain Hydrothermal Scheduling Using Modified Gravitational S...
Short term Multi Chain Hydrothermal Scheduling Using Modified Gravitational S...
 
Investigation of Heat Dissipation in Petrol Engine Cylinder during Explosion ...
Investigation of Heat Dissipation in Petrol Engine Cylinder during Explosion ...Investigation of Heat Dissipation in Petrol Engine Cylinder during Explosion ...
Investigation of Heat Dissipation in Petrol Engine Cylinder during Explosion ...
 
Integrated Air Conditioning Unit for Automobiles
Integrated Air Conditioning Unit for AutomobilesIntegrated Air Conditioning Unit for Automobiles
Integrated Air Conditioning Unit for Automobiles
 
Influence of Process Parameters on AA7075 in TIG Welding
Influence of Process Parameters on AA7075 in TIG WeldingInfluence of Process Parameters on AA7075 in TIG Welding
Influence of Process Parameters on AA7075 in TIG Welding
 
Ijartes v2-i2-003
Ijartes v2-i2-003Ijartes v2-i2-003
Ijartes v2-i2-003
 
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
 
Ijartes v1-i3-002
Ijartes v1-i3-002Ijartes v1-i3-002
Ijartes v1-i3-002
 
Higher Order Mutant Generation to Decrease the Cost of Mutation Testing Sudhi...
Higher Order Mutant Generation to Decrease the Cost of Mutation Testing Sudhi...Higher Order Mutant Generation to Decrease the Cost of Mutation Testing Sudhi...
Higher Order Mutant Generation to Decrease the Cost of Mutation Testing Sudhi...
 
Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008
 
Ijartes v1-i2-007
Ijartes v1-i2-007Ijartes v1-i2-007
Ijartes v1-i2-007
 
Ijartes v1-i2-004
Ijartes v1-i2-004Ijartes v1-i2-004
Ijartes v1-i2-004
 
Ijartes v1-i2-001
Ijartes v1-i2-001Ijartes v1-i2-001
Ijartes v1-i2-001
 
Ijartes v1-i1-001
Ijartes v1-i1-001Ijartes v1-i1-001
Ijartes v1-i1-001
 
Ijartes v1-i1-002
Ijartes v1-i1-002Ijartes v1-i1-002
Ijartes v1-i1-002
 

Recently uploaded

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Ijartes v1-i1-004

  • 1. INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 12 VANET Clustering for Protected and Steady Network Mukesh Bathre1 , Alok Sahelay2 ___________________________________________________ Abstract— Vehicular on demand ad-hoc network (VANET) is understood as a necessary issue of good Transportation systems. The key advantage of VANET communication is looked in dynamic protection systems, that objective to improve security of travelers by exchanging caution messages between vehicles. Alternative applications and private services also are allowed so as to lower management expenses and to market VANET exploitation. To effectively established VANET, security is one amongst key challenges that has got to be tackled. Another vital concern is measurability could be a serious issue for a network designer a way to maintain stable communication and services in VANET. Extraordinarily dynamic atmosphere of VANETs looks it troublesome. This paper introduced an automatic reliability management method for VANETs that uses machine learning to categories nodes as malicious. Cluster creation is one effective method for the measurability drawback. Here conjointly given associate entropy-based WCA (EWCA) cluster maintained method which may handle the steady of the automobile network. _______________________________________________________ Index Terms— Vehicular ad hoc network, Monitoring, Attackers, Stable clustering, Link expiration time. _______________________________________________________ I. INTRODUCTION Vehicular Ad-Hoc Networks (VANET) are becoming an important technology for concerning latest computer world. It can be help to get better the driving skill both in terms of security and effectiveness. Figure 1 describes VANET, when multi-hop communication is apply VANET allow a automobile to communicate through other automobiles which are away of radio transmission range. It as well enables vehicles to correspond with roadside unit. VANET will to be expected be a crucial part of upcoming Intelligent Transportation Systems (ITS). _______________________________________________ First Author: Mukesh Bathre, Assistant Professor, Department of Computer Science & Engineering, Government College of Engineering, Keonjhar, Odisha, India,mukesh.bathre@gmail.com Second Author: Alok Sahelay, Dept. of Information Technology, Oriental College of Technology, Bhopal, India,aloksahelay@gmail.com __________________________________________________________ Fig. 1. Vehicular ad-hoc networks. Presently, ITS relies greatly on communications deployment. Electromagnetic sensors are set into road outside; traffic cameras are set up at major junction; and Radio Frequency Identification (RFID) readers are organize at main road doorways. A usual method for gathering and give out traffic information is as follows. First, traffic sample are collected by road side sensors and send to local transportation center. After statistics handing, traffic information can then be distributes to a user’s communication unit via cellular networks. This is an costly and ineffective mode of distribute location-based information, mainly when the information of concern is just a hardly hundred meters from the user’s location. Because of its limited communication ability, VANET might modify this paradigm, generating and disseminating information very simple. The develop and execution of Vehicular Ad Hoc Networks (VANETs) stay representing an key research challenge, which, if resolved, could show the way to the development of the after that key breakthrough after the Internet and cellular network technologies. Vehicles could participate the role of an allowing structure for a number of vastly used apps (e.g., disaster warning systems, traffic information control and prevention systems, climate and weather conditions observing, etc.), as well as enjoying ones (e.g., online entertainments, ad and promotion, etc.). In addition, every vehicle, associates in a peer-to-peer approach, can enhance the bandwidth resources that are currently available, as well offering connectivity to novel geographical regions. It shows importance of research on VANETs has proliferated for the duration of these two decades, dealing with all most important different phases that engage their devise: communication protocol layers, applications, and mobility/channel models. The enough short quantity of vehicles allows with communication lines that maintain VANET-based networking has so distant prevented the run of any extensive trial, thus primarily to a proliferation of simulative and logical studies. Simulations, in particular, have been applied to check how
  • 2. INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 13 function and protocols can perform when implemented on a huge amount of vehicles, while determined to resemble as closely as probable the actions and the situation that each solo car would face in real word. So, complete simulative models have been devising to replicate the expected movements of cars on lanes, in addition to the behavior of wireless lines in vehicular background. In essence, the common ground of the great majority of the research that has been carried out in the space of vehicular-based networking and applications is that of finding ways of testing apps and protocols while reproducing, as closely as possible in simulation, the situation that would be found by a real VANET. Now, although research efforts on VANETs continuously work on increasing the stage of detail and accuracy of all underlying simulation models, it is well understood that not being able to test protocols and systems on reasonable size vehicular networks represents an important handicap. Unlike peer-to-peer or cellular networks, in fact, VANET technologies that involve a large number of vehicles never find a way of being deployed and tested. In literature it is possible to find a number of works that try to fill this gap, by analyzing the exchange of data for only a few hops between two or three vehicles. However, a clear awareness emerges, from most of these studies, of the inadequacy of the proposed experimental scenarios, due to the use of a too limited number of vehicles and devices. II. RELATED WORK In paper [1], author proposed a lightweight anonymous method based on bilinear pairing to resolve the privacy preserving problem of vehicular ad hoc network (VANET). This scheme can protect drivers' privacy not only between vehicles, but also among vehicles and road side units (RSUs). Meanwhile, this scheme does not ask for vehicles to conduct any bilinear pairing procedures, thus significantly ease the computational complexity of vehicles. Authors demonstrate this scheme through protection analysis and evaluate its computational performance by simulations. The results show that this work scheme performs well in providing secure communications and anonymous authentication among RSUs and vehicles. Looking for a parking space in a overcrowded area or a large parking lot and preventing auto theft are major anxiety to this work everyday lives. In paper [2], authors propose a new smart parking scheme for large parking lots through vehicular communication. The proposed scheme can provide the drivers with real-time parking navigation service, intelligent anti-theft protection, and friendly parking information dissemination. Performance analysis via extensive simulations demonstrates its efficiency and practicality. Vehicular ad-hoc network (VANET) is getting more awareness lately because of its lots of essential applications in transportation, to get better road protection, reduce traffic jamming, to enable competent traffic management etc. However, there are several technical problems to be addressed for its effective exploitation. Steadiness in communication in VANET is hard to accomplish due to quick network changes. Restoration is ineffective while using conventional protocols based on broadcast storm. In paper [3], authors propose a new adaptive protocol to improve performance for on road safety alert application in VANET. It can alleviate the broadcast storm problem using adaptive wait-windows and adaptive probability to transmit. Simulation shows that this work proposed approach has better performances in terms of number of collision, success rate, and delay, when compared with other existing protocols. In paper [4], a trustworthy and effective alarm message broadcast routing is proposed for VANET. Distinct other comparable routing algorithms, REAR are based on the actual wireless channel in VANET. REAR utilizes a lesser amount of broadcast packets to spread alarm message. According to the theory model of wireless medium, it estimates the reception possibility of alarm messages for nodes. The contention scheme based on the reception probability is used to choose the optimized relay. Two approaches for utilizing the receipt probability and three functions for calculating contention delay are discussed and analyzed. The simulation and theory analysis are confirmed that REAR has a higher reliability and uses less broadcast packets than the location-based algorithm. Misbehavior detection schemes (MDSs) form an integral part of misbehaving node eviction in vehicular ad hoc networks (VANETs). A misbehaving node can send messages corresponding to an event that either has not occurred (possibly out of malicious intent), or incorrect information corresponding to an actual event (for example, faulty sensor reading), or both, causing applications to malfunction. While identifying the presence of misbehavior, it is also imperative to extract the root-cause of the observed misbehavior in order to properly assess the misbehavior’s impact, which in turn determines the action to be taken. This paper [5] uses the Post Crash Notification (PCN) application to illustrate the basic considerations and the key factors affecting the reliability performance of such schemes. The basic cause-tree approach is illustrated and used effectively to jointly achieve misbehavior detection as well as identification of its root-cause. The considerations regarding parameter tuning and impact of mobility on the performance of the MDS are studied. The performance of the proposed MDS is found to be not very sensitive to slight errors in parameter estimation. III. PROPOSED WORK We present the proposed Enhanced vehicular clustering based on weighted clustering algorithm (VWCA). EVWCA consists of the clustering formation and clustering maintenance phases. Before describing this work clustering algorithm in detail, we make the following assumptions: 1) The network topology is static during the execution of the clustering algorithm. 2) Each mobile node joins exactly one cluster-head.
  • 3. INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 14 A. The new vehicular clustering based on weighted clustering algorithm (VWCA) 1) Phase-I: Clustering Formation Pr For effective cluster formation and remain cluster stable during frequently change topology in highway this paper proposed new VWCA more reliable algorithm. In clustering techniques, clusters should be formed in such manner that it not be very large or very small. In a very large cluster, traffic of transmitted information from members to their cluster-head is increased so cluster-head have lost of overheads, and then the cluster-head could not deliver messages on efficient time limit. If cluster formation is very small clusters may not be stable and changed frequently in network because the re-affiliation of network rose. In new VWCA, this work use two other techniques to cluster creation and cluster maintain. We propose to use disbelieve value, number of neighbors based on dynamic transmission range and direction of vehicles in weighted clustering. In addition, we use the entropy model proposed in Liu et [9]. In order to select a trustier node as a cluster-head, we consider the disbelieve value (Td) in VWCA. The disbelieve value (Td) for vehicle V represents disbelieve value of behavior of vehicle V when it forwards messages. Each vehicle maintains two lists: one white list and one black list. The white list of vehicle V, represented by WLV, includes the list of neighbors of vehicle V that their Td values are lower than the threshold values. Note that value of sis equal for all vehicles inside the certain certificate authentication (CA) in VANET. On the other hand, the black list of vehicle V, denoted by BLV, consists of neighbors of vehicle V that their Td values are higher than the threshold values. The black list BLV is the copy of the main black list created by the relevant CA. Each CA broadcasts its main black list periodically to all cluster-heads which are placed inside its region and then each cluster-head broadcasts the main black list to the vehicles located inside its cluster. Firstly, each vehicle announces itself as a cluster-head by putting its own address and ID in a beacon to be broadcast. After receiving beacons from its neighbors, each vehicle has complete information from its current neighbors, and it can make decision whether to change its current cluster status or not. For this purpose, vehicles execute VWCA in order to select their cluster-heads. The VWCA algorithm has five steps to choose its required parameters as: Step 1: Determining the neighborhood list for vehicles Step 2: Determining the vehicles priority based on their disbelieve values Step 3: Determining the direction of vehicles 2) Phase-II: Clustering Maintenance Using Mobility prediction The mobility of nodes coupled with the transient nature of wireless media often results in a highly dynamic network topology. Due to mobility some nodes will detach from the current cluster and attach itself to some other cluster. The process of joining a new cluster is known as re-affiliation. If the re-affiliation fails, the whole network will recall the cluster head selection routine. One disadvantage of WCA is high re- affiliation frequency. High frequency of re-affiliation will increase the communication overhead. Thus, reducing the amount of re-affiliation is necessary in ad hoc networks. To prevent this we go for mobility prediction schemes. The impact of mobility prediction schemes on the temporal stability of the clusters obtained using a mobility-aware clustering framework. We propose a simple framework for a mobility prediction-based clustering to enhance the cluster stability. One way to predict the mobility of nodes is using the Link Expiration Time [6]. The impact of mobility prediction schemes on the stability of the clusters obtained using a mobility-aware clustering framework. Compute the Link Expiration Time (LET) to predict the duration of a wireless link between two nodes in the network. The approach assumes that the direction and speed of motion of the mobile nodes does not change during the prediction interval. Link Expiration Time (LET) The Link Expiration Time (LET) is a simple prediction scheme that determines the duration of a wireless link between two mobile nodes. Dynamic clustering in ad hoc networks has also been extensively studied in the literature. Several distributed clustering algorithms for MANETs have been proposed. While some schemes try to balance the energy consumption for mobile nodes, others aim to minimize the clustering-related maintenance costs. Combined metrics based clustering schemes take a number of metrics into account for cluster configuration. The Weighted Clustering Algorithm (WCA) [8] is one such scheme, where four parameters are considered for the cluster head selection procedure, which are representative of the degree, the sum of the distances to other nodes in its radio distance, mobility, and battery power of the mobile nodes. Here we propose an enhanced WCA which can enhance the stability of the network. Such a scheme can be tuned flexibly the parameters to suit to different scenarios. To calculate the duration of link between two mobile nodes, we assume that their location, speed and direction of movement remain constant. Here let: • Location of node i and node j at time t be given by (xi , yi) and (xj ,yj). • Vi and Vj be the speeds, • θi and θj be the directions of the nodes i and j respectively. • If the transmission range of the nodes is r, then the link expiration time Dt is given by the formula given below Where The LET gives an upper bound on the estimate of the residence time of a node in a cluster. In the proposed clustering framework, when LET-based prediction is used, a node is
  • 4. INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 15 allowed to join a cluster only if the predicted LET of the link between the node and the cluster head is greater than the cluster‟s admission criteria Tj [6, 7]. For every node N that detach from current cluster we check whether the node is a Cluster Head (or) Cluster member. 1. If it is a Cluster Head then call for cluster head selection within the particular cluster and form a new cluster. 2. If it is a Cluster member then calculate Link Expiration Time with Cluster Head of each cluster and the node that re- affiliates must be within transmission range of cluster head where transmission range is fixed. Check whether LET is greater than threshold value (Tj), Here Tj is average of all LET, and if it is greater than the Node is eligible to join the particular cluster which shares greater LET. B. The monitoring of malicious vehicles (MMV) algorithm Considering the lack of coordinating unit in VANET, vehicles should cooperate with each other in order to increase security in the network. In order to verify behavior of vehicles and detect abnormal behavior in the network, the following algorithm (see Fig. 2) is proposed: Step 1: Distributing cluster keys Step 2: Allocating initial disbelieve value Step 3: Determining threshold valueσ. Step 4: Monitoring Algorithm. a) NS-3 Simulation 1. Design Wi-Fi topology 2. Install MAC, IP and Application protocol on each node. 3. Select VANET routing protocol (AODV) start simulation 4. For each node i a. do b. RREQ start (in case of AODV) c. Flooding of RREQ d. Build routing table (AODV. route file) i) Collect behaviors statistics such as No. of packet transmitted, received, lost, delay time, modified etc. ii) Calculate PDR, PMR, PMIR iii) Serialize into .xml or .csv file format b) Behavior Classification 1. Input .xml/.csv data file Generated by NS-3 2. Extract PDR, PMR and PMIR using DOM a. For each node i repeat b. Input .xml onto DOM (Data Object Module) c. Extract behavior from file. Step 5: Determining abnormality of vehicles Step 6: Modifying disbelieve value Step 7: Updating black and white lists based on Td Step 8: Repeating monitoring after increasing Td 2) Behavioral Data Collection The behavioral data collection module is responsible for the collection of node behaviors and formation of behavioral dataset. In this paper, a node’s behavior is described in terms of the ratio of the amount of this behavior over the total amount of packets that the node has received, such as packet drop rate (PDR), packet modification rate (PMR). An example training dataset is shown in Table I. Here, we create a m-dimensional feature vector for each node. In the example shown in Table I, m = 3. During the testing stage, the Behavioral Data Collection module on each node first observes and records the behaviors of their neighbors. It also receives and integrates node behaviors reported by other nodes. TABLE I. AN EXAMPLE OF THE TRAINING DATASET USED TO CLASSIFY VANET NODES AS MALICIOUS OR NON- MALICIOUS. Node ID PDR PMR 1 90% 10% 2 2% 0 3 30% 60% 4 5% 0 5 10% 0 · · · · · · · · · Fig. 2. Flowchart of the MMV algorithm MMV Algorithm Distributing cluster keys Allocating initial distrust value Determining threshold value σ Monitoring Determining abnormality of vehicles using PDR Modifying distrust Value Isolate Malicious Vehicles
  • 5. INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 16 Fig. 3. Clustering Example IV. PERFORMANCE EVALUATION AND ANALYSIS In this section, we examine the performance of the SAT scheme, and its performance is compared to that of the baseline mechanism. Overall, the experiments can be divided into two phases: first phase is used SUMO for simulating vehicles as real world street condition and in second phase using NS-3 pcap utility used for capture packets form this vehicle network to identify malicious node in network according to its behavior as explained in proposed work. A. Simulation Setup This work is implemented in linux environment using ubutu 12.04 GUI versions. For VANET SOMU version 0.14.0 is used and also need to configure NS-3 [12] as the simulation platform. SUMO is an open source, highly portable, microscopic and continuous road traffic simulation package designed to handle large road networks. It is mainly developed by employees of the Institute of Transportation Systems at the German Aerospace Center, SUMO is open source. table II list the parameters used in the simulation scenarios. TABLE II. PARAMETER LIST Parameter Value Mobility Model Waypoint model Nodes (Wi-fi Node's) 50 nodes Simulation Time 100s Packet Size 1000 bytes Sink Nodes 17 Update Interval 15s Node Speed 10 m/s Settling Time 6 Routing Protocols AODV/DSDV Each simulation scenario has 30 runs with distinct random seeds, which ensures a unique initial node placement for each run. Each experimental result is the average over the 30 runs for this simulation scenario. Table III shows statics capture by pap utility of NS-3 for 25 nodes ID starting from 0 to 24 total no. of packets transmitted, total no. of packets received and packet drop ration(PDR) for each node during simulation. This statics graph can be observed in figure 4. TABLE III. SIMULATION CLASSIFICATION DATA Node ID PDR PMIR PMOR 0 0 0 0 1 0 0 0 2 0 0 0.028169 3 0 0 0 4 0 0 0 5 0 0 0 6 0.621984 0.276145711 0.135135 7 0 0 0 8 0 0 0 9 0 0 0 10 0 0 0 11 0 0 0 12 0.433566 0.297327813 0.079037 13 0.117188 0.03968254 0 14 0.194175 0.1 0.066667 15 0.23569 0.069444444 0 16 0.036765 0 0 17 0.147059 0.120845921 0.030211 18 0.183486 0 0 19 0.184049 0.031347962 0 20 0.222222 0.0456621 0 21 0.209059 0.071684588 0.071685 22 0.13289 0 0 23 0.516416 0.240029542 0.070162 24 0 0 0 Fig. 4. PDR, PMIR and PMOR ratio for every node during simulation We have perform VANET simulation many time for detecting malicious node in network for which first three detection data is shown in following graph for different no. of
  • 6. INTERNATIONAL JOURNAL OF ADVANCED RESEACH IN TECHNOLOGY, ENGINEERING AND SCIENCE (A BIMONTHLY OPEN ACCESS ONLINE JOURNAL) VOLUME1, ISSUE1, JULY-AUG, 2014 ISSN: APPLIED All Rights Reserved © 2014 IJARTES visit: www.ijartes.org Page 17 node. This graph shows for example 10 node network size in first simulation result 1 malicious node found such next time no node is malicious and for third simulation it gives 2 nodes are abnormal because of PDR greater than 0.5 value, PMIR greater than 0.1 and PMOR greater than 0.1. 0 5 10 15 10 20 30 40 50 No.ofabnormalnode VANET Size Abnormal nodes for different network size First Sim. Second Sim. Third Sim. Fig. 5. Abnormality of nodes for different network size during simulation V. CONCLUSION USING THE TEMPLATE VANET could be a capable wireless communication technology for up main road protection and data services. This paper has calculable two completely different algorithms applicable for VANET in main road. First, rule have projected VWCA as a brand new transport cluster method supported the WCA technique in two half 1st one for formation of cluster and second for maintain of cluster properly for fewer overheads. The VWCA technique primarily focuses on up the CH period, membership length and security and second for maintaining cluster stability as potential. Using VWCA, communication value for change of integrity to a brand new cluster in network decreases as a result of the membership period for each vehicle has improved. Additionally, applying the entropy word within the weighted total procedure, VWCA will minimize the quantity of overheads created by high speed vehicles. VWCA be ready to enhance network link whereas choosing cluster- heads. VWCA create use of not reliable price within the weighted total operation. The not believe parameter has been obtained from this work next given observation malicious vehicle (MMV) algorithmic rule. Exploitation not believe parameter, vehicles that have lower not believe cost than their neighbors are hand-picked as cluster-heads. Therefore, cluster-heads are additional reliable vehicles than alternative vehicles within the network victimization their PDR worth. In future works developing algorithmic rules for a town state of affairs supported the techniques projected here for highways and introducing a brand new security algorithmic rule supported key distribution and therefore the projected clustering algorithm. REFERENCES [1] Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing”, INCoS, Page(s): 222 – 228, 4th International Conference, 2012, [2] Rongxing Lu, Xiaodong Lin ; Haojin Zhu ; Xuemin Shen, “SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots”, Page(s): 1413 – 1421, INFOCOM 2009, IEEE [3] Suriyapaiboonwattana, K., Pornavalai, C. ; Chakraborty, G., “An adaptive alert message dissemination protocol for VANET to improve road safety”, Page(s): 1639 - 1644 FUZZ-IEEE 2009. [4] Hao Jiang, Hao Guo, Lijia Chen, “Reliable and Efficient Alarm Message Routing in VANET”, Distributed Computing Systems Workshops, 2008, Page(s): 186 - 191 [5] Mainak Ghosh, Anitha Varghese, Arobinda Gupta, “Detecting misbehaviors in VANET with integrated root-cause analysis”, India 2010 [6] H. Deng, Q.-A. Zeng, and D. Agrawal, “Svm-based intrusion detection system for wireless ad hoc networks,” in Proceedings of 2003 IEEE 58th Vehicular Technology Conference, 2003. VTC 2003-Fall.,vol.3, Oct. 2003, pp. 2147–2151. [7] C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe,and K. Levitt, “A specification-based intrusion detection system for aodv,” inSASN ’03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2003, pp. 125–134. [8] S. Buchegger and J.-Y. Le Boudec, “Performance analysis of the confidant protocol,” in MobiHoc ’02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM, 2002, pp. 226–236. [9] Liu X, Fan Zh, Shi L., “Securing vehicular ad hoc networks”. In: Proceedings of the second conference on international pervasive computing and applications. July 2007, p. 424–9. [10] Ameneh Daeinabi, Akbar Ghaffar Pour Rahbar, Ahmad Khademzadeh “VWCA: An efficient clustering algorithm in vehicular ad hoc networks”, Journal of Network and Computer Applications 207–222, 2011. [11] Wenjia Li, Anupam Joshi, Tim Finin, “SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks”, Proceedings of the Military Communications Conference, 2011. [12] S. Muthuramalingam, R. Viveka, B. Steffi Diana and R. Rajaram, “A Modified Weighted Clustering Algorithm for Stable Clustering using Mobility Prediction Scheme”, Internetworking Indonesia Journal, 9-16, 2010.