SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 4, August 2021, pp. 3193~3200
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i4.pp3193-3200  3193
Journal homepage: http://ijece.iaescore.com
VANET-based traffic monitoring and incident detection system:
A review
Mustafa Maad Hamdi1
, Lukman Audah2
, Sami Abduljabbar Rashid3
, Sameer Alani4
1,2,3
Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia, Batu Pahat, Johor, Malaysia
4
Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka, Durian Tunggal,
Melaka, Malaysia
Article Info ABSTRACT
Article history:
Received Jul 9, 2020
Revised Mar 11, 2021
Accepted Mar 21, 2021
As a component of intelligent transport systems (ITS), vehicular ad hoc
network (VANET), which is a subform of manet, has been identified. It is
established on the roads based on available vehicles and supporting road
infrastructure, such as base stations. An accident can be defined as any
activity in the environment that may be harmful to human life or dangerous
to human life. In terms of early detection, and broadcast delay. VANET has
shown various problems. The available technologies for incident detection
and the corresponding algorithms for processing. The present problem and
challenges of incident detection in VANET technology are discussed in this
paper. The paper also reviews the recently proposed methods for early
incident techniques and studies them.
Keywords:
Early detection
Incident detection
Incident management
Traffic monitoring centre
VANET This is an open access article under the CC BY-SA license.
Corresponding Author:
Lukman Audah
Faculty of Electrical and Electronic Engineering
Universiti Tun Hussein Onn Malaysia
86400 Parit Raja, Batu Pahat, Johor, Malaysia
Email: hanif@uthm.edu.my
1. INTRODUCTION
Nowadays, network technology is rapidly developing and widely applied. Vehicular ad hoc network
(VANET) is a technology that uses cars as mobile nodes in mobile ad-hoc network (MANET) [1]. VANET
converts all participating cars into a router or wireless node, allowing cars 100 to 300 meters away to connect
to an extensive network. Because cars are out of the signal range and out of network, other cars can connect
and connect vehicles to create a mobile internetwork as shown in Figure 1. VANET is a sophisticated
technology that integrates ad hoc networks, wireless LANs, mobile technology, and sensor networks to
provide advanced intelligent communications between vehicles, roadside sensors, and infrastructure [2].
VANETs are self-organizing and decentralized systems. VANET enables dedicated short-range communication
(DSRC) of vehicles in the 5.9 GHz band through the IEEE 802.11 p standard. Moreover, VANET has a
different scenario of communications such as vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)
communications for near and remote environments. Recently, VANET has been widely used in intelligent
transportation systems (ITS) applications. Therefore, VANET is a technology that enables the integration of a
single framework for conventional ITS applications [3].
The basic idea of the ITS environment is to use VANET technology to communicate vehicles to
each other and communicate the infrastructure of the roadside unit to share information through the network.
In safety applications and user applications, ITS applications can be divided. The number of traffic accidents
will be significantly decreased, with the consequence that 60% of incidents could be prevented if the driver
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3193 - 3200
3194
were warned within 0.5 seconds of the collision. Throughout the meantime, safety applications may be used
to alert drivers that the path to the next is too close. According to the US department of transportation, 45%
of all registered cars and 21% of road accidents accounted for accidents at intersections in 2003 [4]. VANET
can control the rate of data dissemination, which facilitates the transmission of only relevant data (for
example, the traffic status of nearby roads) to each vehicle and send data to the traffic monitoring centre
(TMC) [5]. Since traffic data can be distributed by multiple hops broadcasting, remote managers are likely to
receive traffic data well in advance. This allows the driver to respond to the traffic information they receive
in traffic monitoring [6]. Different scenarios will happen and affect the flow of data to TMC, such as wither
conditions, accidents, and rush hours. These incidents will impact traffic flow and influence system
performance. Hence, a new incident technique is required to be built in such a system [7]. Collecting data and
detect incidents in ITS can be done by different techniques that we will discuss in the next section. An early
warning performs frequent surveys when road accidents occur and produce alerts providing concise
information about the type of accident designation. A method of accident prediction attempts to identify an
unexpected event and its location as quickly as reliably as possible automatically [8]. However, identifying
non-blocking collisions and incidents under light load is still a challenge as a difference from standard
patterns of traffic may be negligible. Therefore, the limitations are that most of these algorithms do not know
exactly when or what occurred [9]. We organized this paper as follow: Section 2, present all issue and
challenges that implemented in incident detection and showing the points of the strength and weakness to all
of them. In section 3, we will explain the recent advancement in the early incident detection system and
summary of existing related work done in the past with the conclusion of this paper.
Figure 1. VANET model [10]
2. ISSUE AND CHALLENGES IN INCIDENT DETECTION
Road incidents can be made up of many factors; some are (somehow) predictable, such as road
construction, rush hour, and others are unpredictable, such as accidents, weather conditions, human behavior,
and other unusual or special events affecting roadways. Without having any prior information to the drivers,
road accidents, traffic congestion, and other road incidents are the most serious possible problem. As a result,
the more serious the incident, the longer it will take to rectify it once the cause has been eliminated or
repaired. During an incident, normal road capacity is limited, and there are often queues and delays, like in
case of traffic congestions. Incidents are primarily responsible for delays and have far-reaching consequences
for safety, congestion, pollution, and travel costs [11]. Earlier research has shown that incidents are one of
the main causes of lost time and the increase in avoidable costs for transportation networks [12].
 The irrelevancy of incident information: Only relevant information should be provided to drivers.
Independent and unnecessary information should be filtered out. This includes using accurate information
dissemination. In many cases, irrelevant information transmitted by encircled vehicles or the detector
node has a significant impact on traffic management. There have been cases where false alarms have been
activated, and the same information has been transmitted to every node in the vehicle, which changes the
direction of the traffic and obstructs the unnecessary traffic at the roadside, which complicates the ITS
system. Therefore, the information to be transmitted to vehicles is an important aspect of the detection of
VANET-based incidents in ITS.
Int J Elec & Comp Eng ISSN: 2088-8708 
VANET-based traffic monitoring and incident detection system: A review (Mustafa Maad Hamdi)
3195
 Real-time inaccessibility of information: Traffic information must be accessible in real-time. In other
words, the necessary traffic information must be available to high-speed drivers. It is often the case that
information transmitted by a sensor or vehicle node arrives late at other nodes. In many cases, when an
emergency alert is required to prevent fatal accidents, it is transmitted late and causes an undesired
accident. Therefore, access to real-time information is critical in VANET-based ITS.
Detecting and managing incidents offers better traffic monitoring. Many forms of traffic monitoring
can detect an incident. The current techniques of the incident detection such as inductive loop detectors,
video detection system, microwave radar sensors, automatic vehicle identification, automatic vehicle
location, and wireless location technology. Table 1 present the points of strength and weakness for
techniques implemented in incident detection.
Table 1. Simulation parameters for the baseline
Technique Strength Limitation Characteristics
Inductive loop detectors Data for traffic with
volume, occupancy.
Maintenance, Installation,
and replacement of ILDs.
Intrusive, comprising a wire coiled.
Video detection system A single controller a
combination of cameras.
Some periodic maintenance. Non-intrusive, Software for image
and camera processing.
Microwave radar sensors Measure speed directly. Accuracy is not good. Non-intrusive
Automatic vehicle
identification
Provide effective vehicles
with data collection.
Include important
infrastructure on the roads.
Non-intrusive
Automatic vehicle location Few fixed infrastructure
components are
necessary.
Sample size limitations. Relies on a global positioning system
(GPS) data.
Wireless location
Technology
Some vehicle owners
include cell phones.
Produce reliable speed and
travel time measurements.
The use of cell phones is mainly
based on vehicles.
3. RECENT ADVANCEMENT IN EARLY INCIDENT DETECTION SYSTEM
In the past, many attempts have been made to invent an early incident detection system that can
detect errors in intelligent transport systems as quickly as possible, to provide people with accurate primary
information about alert data, and possible response times to resistance. The measures adopted to develop
these systems took into account; i) the information on the accident is irrelevant drivers should only be given
the applicable information. Non-relevant and redundant information should be provided. This includes the
dissemination of accurate information, ii) the inaccessibility of information in real-time traffic information
must be immediately accessible. In other words, basic traffic information should be accessible to drivers at
high speed and iii) No timely information available Road accident information should be made available to
drivers as soon as possible so that they have sufficient time to act (for example, to make a decision ahead or
at the beginning). However, the implementation of the existing system could hardly produce these desirable
properties. These features can save time in obtaining information on expected road accidents alongside end-
user fuel. The following section discusses different research studies to develop an early incident detection
system. Baiocchi et al. [5] have developed a traffic flow estimation method with GPS data and promising
performance. Hojati et al. [13] have provided a model to estimate the time interval between accidents and
clean-up based on road and infrastructure differences. Even IT technology has been included in traffic,
incident detection, and more. The neural networks [14], supporting vector machines [15] or hidden Markov
models [16] are used in these studies. In a study, Lee et al. [17] evaluated the quality of exploited data
collected mostly through various roadside sensors. They pointed out that reliable and error-free data was
difficult to obtain. He suggested the use of Microwave Sensors (RTSS) to obtain more reliable traffic data for
traffic management systems and provided several examples in Ontario. He also introduced methods for
identifying these mistakes and evaluating such models with real data. Masters et al. [18] analyzed the
integrated Toronto COMPASS traffic accident detection system based on distance, road use, and speed
parameters to detect data anomalies.
Feng et al. [19] calculated the corresponding data using the Bayes model to calculate the average
travel time. Pascale et al. [20] focused on calculating road capacity and suggested increasing efficiency.
Some studies process images and videos based on data from CCTV cameras [21]. The consequence of these
systems is the ability to monitor various vehicles and their activities. Ad hoc vehicle networks are also
utilized in traffic data grouping models [22], but communication and data transmission are not particularly
easy in various road situations. Researchers also analyze the flow of traffic and incidents detection. The
researcher [23] presented the architectural prototype e-NOTIFICATION, a new proposal aimed at improving
the survival chances of passengers involved in road accidents. By using the automotive information
infrastructure systems, the planned device immediately identifies warnings and assists, incident passengers.
This method is built to include; i) a car immediately involved in an incident; ii) the automated transmission of
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3193 - 3200
3196
the file containing important crash details for controlling onboard devices; and, iii) a summary and automated
classification, depending on information appropriate to the vehicles affected, of the losses incurred by the
automobile and its occupants; The system decides on the rescue services needed to maximize support in the
event of an accident, based on transmitted information and the approximate estimation of accidents.
The method aims at having the vehicle's location from the GPS receiver, transmitting the location
data from SMS to the mobile number of the vehicle owner, and through GPRS to the telematic operator's
server. It comprises modules; i) that require a GPS transmitter for accurate GPS GSM/GPRS satellite details;
ii) The GSM/GPRS modem transfers incident position information and other information through the GSM
network. The modem can be controlled using the AT commands using a microcontroller; iii) The GPS data is
received, all data are analyzed, and a vehicle location is transmitted to the owner and server by the
microcontroller (MCU). The scientists have suggested a safety prototype [24]. The main aim is the development
of some various programs which would affect the comprehensive application and preparation of the ITS
cooperatives. This also seeks to facilitate the introduction of European road cooperation programs, focusing
on all issues relating to connectivity between V2V and vehicle infrastructure (V2I). The initiative aims to
promote the establishment of cooperation structures on European roads. In another work carried out in [25],
with a proposed automatic accident prevention system and a safety system using the integrated GSM
interface, this designed system is automatic collision detection and warning system, from the GPS module
and a GSM using a modem. A reliable scheme must ensure successful mechanical interaction with the entire
structure of the vehicle to be secured. Throughout the case of a crash, the device can sense a rapid
deceleration of the car. The accelerometer measures vehicle speed continuously, detects speeds beyond the
threshold and transmits information through ADC to the microcontroller. The controller contrasts this with a
collection of thresholds and delivers the pre-defined numbers automatically to the SOS message. This
communication also conveys the GPS co-ordination for the vehicle, which it receives from the GPS module
on a continuing process. This device can be a great benefit to find and save vehicles for accidents.
Other authors [26] have implemented a working incident prevention system and a GPS and GSM
modem messaging framework. This research aims to recognize the condition of the car accident by
transmitting a message through the vehicle network. The main challenge is to preserve vehicle protection at
very reasonable costs. The main benefit of this check is that when the detector is activated, the GSM modem
is detected immediately on the cell phone numbers stored in the EEPROM. This device reliably determines the
incident location, automates the occurrence detection and communications method. The researchers from [27]
proposed an emergency call notification system via the Internet of Things and the cloud. The proposed
system has been Implemented using the XBee WiFi module, Xbee Shield, GPS module, Seeeduino, and the
shock sensors. The basic idea is to use shock sensors to discover an accident, identify the exact location of
the accident, and transmit the location coordinates via XBee WiFi to the nearest hospital via the cloud. The
aim was to suggest a system that would enable the Internet and the cloud to be connected abroad. Given the
above limitations, the framework represents a move forward to encourage participation in the broader
Internet of Things process. Data may be transmitted over long distances utilizing the application in the cloud.
This functionality may be further improved by designing the device to notify the victim's immediate family.
In another work [28], a prototype system specifically designed to detect and render quick resources to victims
of road accidents. The system requires that each vehicle be equipped with a control unit (CU) and an onboard
unit (OBU), which indicates the location of the accident to provide the rescue operation with the necessary
resources. The proposed system allows for the identification of road accidents to improve assistance to
injured passengers by reducing the response time of emergency services by effectively communicating
information on major accidents. The above section discusses the various related works and methods applied
to the system and techniques for the early detection of incidents. The following section summarizes the
researchers' current work in this area, as shown in Table 2 (see in Appendix).
4. CONCLUSION
This review paper provides an exhaustive study of existing incident detection techniques. Current
techniques have been studied based on traffic monitoring and incident detection. The paper presented a
relative study on roadways incident detection methods in terms of working with the pros and cons. Also,
proprietary incident detection techniques have been explored to determine applications for incident detection
and management. The review paper presented a comprehensive overview of field related research work.
However, the literature has provided a systematic overview of related work such as traffic monitoring
techniques, incident detection methods, VANET data dissemination, VANET safety, and traffic data. The
study compared all available accident detection techniques and presented a comparative study of strength and
weakness related to available incident detection techniques.
Int J Elec & Comp Eng ISSN: 2088-8708 
VANET-based traffic monitoring and incident detection system: A review (Mustafa Maad Hamdi)
3197
APPENDIX
Table 2. Summary of existing related work done in the past
Authors Proposed scheme methodology Issues identified Benefits Simulation tool
[29] A new model for the dissemination of data
based on Clustering and Probabilistic
Broadcasting (CPB).
Frequent changes in topology
due to increasing node mobility.
Efficient utilization of
communication modes.
NS-3, SUMO
[30] An emergency message dissemination system
based on the VANET and FoG vehicle
technology congestion reduction scenario.
The speed, direction, and
density of the moving neighbors
are not compatible.
Reduces accessibility
delays and congestion.
MATLAB
[31] A modeling language based on the actor is used
and fitted with various model control engines.
Frameworks focused on
simulations cannot have assured
analyses.
Behavior and
performance were
outstanding.
Afra -modeling and
verification IDE
[32] The approach suggested is based on the concept
of a supernode for timely communication.
Moreover, the time barrier strategy is modified
to deal with this issue to prevent the
unnecessary broadcast, which can also cause
the diffusion storm.
Broadcast congestion or partial
broadcast.
Overhead message
reduction, transmitting
latency, better
coverage, and packet
delivery ratio.
OMNeT++, SUMO
[33] Vehicles are dynamically clustered to tackle the
storm issue and a location-based strategy aimed
at reducing communication gaps is proposed
that emergency messages are disseminated in
time.
The frequently changed network
topology contributing to
network instability is caused by
high mobility in-vehicle
networks.
Increased transmission
latency, coverage, and
delivery of packets.
OMNeT++, VEINS,
and SUMO
[34] A new security-related communications
protocol based on the non-redundant
Communication Range (NRCR, for short),
which can manage safety-relevant multi-hop
messages broadcast within the non-isomeric
area of communication vehicle scenario,
specifically heterogeneous VANET topology.
Effective messages broadcast
related to safety.
The protocol is perfect
for packet receiving
ratio, end-to-end delay,
and overhead network.
NS-2, SUMO
[35] A new technique to improve VANET
dissemination systems to prevent further cases
of emergencies and hazards by utilizing a
heuristic, fast and real-time method.
Network efficiency, based on
several variables including
bandwidth consumption,
transmission latency, and
quality of service (QoS).
Improved performance
of cluster duration,
delivery rate, and the
overhead.
NS3, VEINS, and
SUMO
[36] Across layer autonomous route recovery
(CLARR) system for enhancing routing activity
by decreasing the connectivity breaks for the
increased multimedia dissemination of data.
High-speed vehicles often
interrupted connections and loss
of data packets at minimum
latency.
The overall delay is
highly improved
efficiency.
NS3, SUMO
[37] A reliable emergency message dissemination
(REMD) framework is suggested which ensures
a pre-defined reliability of messages
dissemination in a variety of channel conditions
while serving the delay requirements.
Recent emergency message
dissemination schemes do not
reach pre-defined loss channel
reliability.
REMD satisfies latency
requirements.
NS3, VEINS, and
SUMO
[38] A method for the dissemination of performance
safety messages and detailed physical channel
synchronization measurements are suggested
for the connection. The organization of conflict
between CFs is suggested through a score-
based priority allocation mechanism for
candidate forwarders (CFs).
Signal propagation is highly
enhanced by obstacles at
intersections in specific.
The method exceeds
existing schemes for
multi-hop broadcasting.
OMNeT++, VEINS,
and SUMO
[39] Also, to ensure efficient bandwidth utilization,
the warning message scheme has been
developed for low priority messages. During
harsh weather conditions, the network provides
the highest high and low priority messaging.
The processing speed of drivers
as such conditions arise.
Message delay dissemination.
The efficient utilization
of bandwidth is less
delayed.
NS-2.34
[40] When the unexpected behavior is detected by
the RSU, send an EM message to all the
vehicles that are inside the RSU network. To
avoid traffic collisions, an EW message will be
received at the same moment.
Warning messages are timely.
The message broadcast was
delayed.
Low delay. NS-2.0
[41] The car selects the best carrier and
communicates the emergency message. The
transmitting of the emergency message to the
RSU by the transmitter vehicle.
The probability of accidents to
determine communication with
messages in VANETs.
Fewer overhead
message.
MATLAB, R2011b
Version
[42] The emergency message is broadcast by an
RSU to the other RSUs in its network. It
prevents an emergency message from
duplicating. Such messages enable the driver to
select a different route to prevent accidents.
Distribution of network capacity
broadcast-storm issue Network
congestion detection.
High throughput. End-
to-end High delivery
rate of the packet
NS-2.0
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3193 - 3200
3198
Table 2. Summary of existing related work done in the past (continue)
Authors Proposed scheme methodology Issues identified Benefits Simulation tool
[43] The message is secured by all vehicles in the
cluster to provide specific information. A traffic
accident in the same cluster is identified and
incident information is transmitted to the other
of the cluster vehicles.
Simple Flooding. Transmission range
cluster size. Driver
reaction time.
SUMO, OMNET++
VEINS, Clustering
Algorithm
Techniques
[44] The drivers of vehicles have the intensity and
location of the vehicle when the traffic
congestion has been detected. The vehicle
affected by the incident transmits the warning
message to the RSU.
Bandwidth efficiency
transmission. Traffic detection
congestion. Transmission.
Efficient utilization of
bandwidth Low
overhead message
Net Beans IDE 7.0
Java
ACKNOWLEDGEMENTS
The authors would like to thank the Research Management Cntre (RMC), Universiti Tun Hussein
Onn Malaysia for the generous financial support under the RMC Research Fun (E15501).
REFERENCES
[1] S. Alani, Z. Zakaria, and M. Hamdi, "A study review on mobile ad-hoc network: Characteristics, applications,
challenges and routing protocols classification," International Journal of Advanced Science and Technology,
vol. 28, no. 1, pp. 394-405, 2019.
[2] M. M. Hamdi, L. Audah, S. A. Rashid, and M. A. Al-shareeda, "Techniques of Early Incident Detection and Traffic
Monitoring Centre in VANETs: A Review," Journal of Communications, vol. 15, no. 12, 2020.
[3] M. Hamdi, L. Audah, S. Rashid, A. Mustafa, and M. Abood, "A survey on data dissemination and routing protocol
in VANET: Types challenges opportunistic and future role," Int. J. Adv. Sci. Technol, vol. 29, no. 5, pp. 6473-6482,
2020.
[4] A. Baiocchi, F. Cuomo, M. De Felice, and G. Fusco, "Vehicular ad-hoc networks sampling protocols for traffic
monitoring and incident detection in intelligent transportation systems," Transportation Research Part C:
Emerging Technologies, vol. 56, pp. 177-194, 2015.
[5] G. Xu, Q. Wu, M. Daneshmand, Y. Liu, and M. Wang, "A data privacy protective mechanism for wireless body
area networks," Wireless communications and mobile computing, vol. 16, no. 13, pp. 1746-1758, 2016.
[6] H. Lu, J. Li, and M. Guizani, "A novel ID-based authentication framework with adaptive privacy preservation for
VANETs," in 2012 Computing, Communications and Applications Conference, 2012, pp. 345-350.
[7] S. Alani, Z. Zakaria, and H. Lago, "A new energy consumption technique for mobile ad hoc networks,"
International Journal of Electrical and Computer Engineering, vol. 9, no. 5, p. 4147, 2019.
[8] H. F. Mahdi, M. S. Abood, and M. M. Hamdi, "Performance evaluation for vehicular ad-hoc networks based
routing protocols," Bulletin of Electrical Engineering and Informatics, vol. 10, no. 2, pp. 1080-1091, 2021,
doi: 10.11591/eei.v10i2.2943.
[9] O. S. Al-Heety, Z. Zakaria, M. Ismail, M. M. Shakir, S. Alani, and H. Alsariera, "A comprehensive survey:
Benefits, services, recent works, challenges, security, and use cases for sdn-vanet," IEEE Access, vol. 8, pp. 91028-
91047, 2020.
[10] H. Pishro-Nik, S. Valaee, and M. Nekovee, "Vehicular ad hoc networks," ed: Springer, 2010.
[11] H. S. Mahmassain, C. Haas, S. Zhou, and J. Peterman, "Evaluation of incident detection methodologies,"
University of Texas at Austin. Center for Transportation Research, 1999.
[12] J. A. Lindley, "Urban freeway congestion: quantification of the problem and effectiveness of potential solutions,"
ITE journal, vol. 57, no. 1, pp. 27-32, 1987.
[13] A. T. Hojati, L. Ferreira, S. Washington, P. Charles, and A. Shobeirinejad, "Modelling total duration of traffic
incidents including incident detection and recovery time," Accident Analysis & Prevention, vol. 71, pp. 296-305,
2014.
[14] H. Lee, "Algorithms to Improve the Quality of Freeway Traffic Detector Data," The Ohio State University, 2012.
[15] J. Wang, E. Case, and D. Manor, "The road traffic microwave sensor (RTMS)," in The 3rd International
Conference on Vehicle Navigation and Information Systems, 1992, pp. 83-90.
[16] M. Shahgholian and D. Gharavian, "Advanced traffic management systems: an overview and a development
strategy," arXiv preprint arXiv:1810.02530, 2018.
[17] H. Lee, "Algorithms to Improve the Quality of Freeway Traffic Detector Data," The Ohio State University, 2012.
[18] P. H. Masters, J. K. Lam, and K. Wong, "Incident detection algorithms for compass-an advanced traffic
management system," in Vehicle Navigation and Information Systems Conference, vol. 2, 1991, pp. 295-310,
doi: 10.1109/VNIS.1991.205776.
[19] Y. Feng, J. Hourdos, and G. A. Davis, "Probe vehicle based real-time traffic monitoring on urban roadways,"
Transportation Research Part C: Emerging Technologies, vol. 40, pp. 160-178, 2014,
doi: 10.1016/j.trc.2014.01.010.
[20] A. Pascale, H. T. Lam, and R. Nair, "Characterization of network traffic processes under adaptive traffic control
systems," Transportation Research Procedia, vol. 9, pp. 205-224, 2015.
Int J Elec & Comp Eng ISSN: 2088-8708 
VANET-based traffic monitoring and incident detection system: A review (Mustafa Maad Hamdi)
3199
[21] M. Fogue, P. Garrido, F. Martínez, J.-C. Cano, C. Calafate, and P. Manzoni, "A realistic prototype for automatic
accident detection and assistance through vehicular networks," IEEE Vehicular Technology Magazine, vol. 7,
pp. 90-100, 2012.
[22] T. Dalai, "Emergency Alert and Service for Automotives for India," International Journal of Advanced Trends in
Computer Science and Engineering (IJATCSE), Mysore, India, vol. 2, no. 5, pp. 08-12, 2013.
[23] D. P. Mohapatra and S. Patnaik, "Intelligent computing, networking, and informatics," Advances in Intelligent
Systems & Computing, vol. 243, pp. 1047-1054, 2013.
[24] C. Prabha, R. Sunitha, and R. Anitha, "Automatic vehicle accident detection and messaging system using GSM and
GPS modem," International Journal of Advanced Research in Electrical, Electronics and Instrumentation
Engineering, vol. 3, no. 7, pp. 10723-10727, 2014.
[25] P. Javale, S. Gadgil, C. Bhargave, Y. Kharwandikar, and V. Nandedkar, "Accident detection and surveillance
system using wireless technologies," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 2, pp. 38-43,
2014.
[26] H. Ghafoor and I. Koo, "Spectrum-aware geographic routing in cognitive vehicular ad hoc network using a Kalman
filter," Journal of Sensors, vol. 2016, 2016.
[27] V. Praveena, A. R. Sankar, S. Jeyabalaji, and V. Srivatsan, "Efficient accident detection and rescue system using
ABEONA algorithm," International Journal of Emerging Trends and Technology in Computer Science, vol. 3,
no. 5, pp. 222-225, 2014.
[28] O. Abedi, R. Berangi, and M. A. Azgomi, "Improving route stability and overhead on AODV routing protocol and
make it usable for VANET," in 2009 29th ieee international conference on distributed computing systems
workshops, 2009, pp. 464-467.
[29] H. Feng, C. Liu, Y. Shu, and O. W. Yang, "Location prediction of vehicles in VANETs using a Kalman filter,"
Wireless personal communications, vol. 80, no. 2, pp. 543-559, 2015, doi: 10.1007/s11277-014-2025-3.
[30] L. Liu, C. Chen, T. Qiu, M. Zhang, S. Li, and B. Zhou, "A data dissemination scheme based on clustering and
probabilistic broadcasting in VANETs," Vehicular Communications, vol. 13, pp. 78-88, 2018,
doi: 10.1016/j.vehcom.2018.05.002.
[31] A. Ullah, S. Yaqoob, M. Imran, and H. Ning, "Emergency message dissemination schemes based on congestion
avoidance in VANET and vehicular FoG computing," IEEE Access, vol. 7, pp. 1570-1585, 2018,
doi: 10.1109/ACCESS.2018.2887075.
[32] F. Yousefi, E. Khamespanah, M. Gharib, M. Sirjani, and A. Movaghar, "VeriVANca: an actor-based framework for
formal verification of warning message dissemination schemes in VANETs," in International Symposium on Model
Checking Software, 2019, pp. 244-259.
[33] S. S. Shah, A. W. Malik, A. U. Rahman, S. Iqbal, and S. U. Khan, "Time barrier-based emergency message
dissemination in vehicular ad-hoc networks," IEEE Access, vol. 7, pp. 16494-16503, 2019,
doi: 10.1109/ACCESS.2019.2895114.
[34] M. Ali, A. W. Malik, A. U. Rahman, S. Iqbal, and M. M. Hamayun, "Position-based emergency message
dissemination for Internet of vehicles," International Journal of Distributed Sensor Networks, vol. 15, no. 7,
p. 1550147719861585, 2019.
[35] W. Liu, X. Tang, S. Jia, and J. Pu, "Safety message dissemination using edge computing in heterogeneous
VANETs," in 2018 IEEE 27th International Symposium on Industrial Electronics (ISIE), 2018, pp. 1276-1281.
[36] S. Benkerdagh and C. Duvallet, "Cluster‐based emergency message dissemination strategy for VANET using V2V
communication," International Journal of Communication Systems, vol. 32, no. 5, p. e3897, 2019.
[37] S. Shafi and D. V. Ratnam, "A cross layer cluster based routing approach for efficient multimedia data
dissemination with improved reliability in VANETs," Wireless Personal Communications, vol. 107, no. 4,
pp. 2173-2190, 2019.
[38] W. Benrhaiem, A. Hafid, and P. K. Sahu, "Reliable Emergency Message Dissemination Scheme for Urban
Vehicular Networks," IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 3, pp. 1154-1166,
2019.
[39] X. Zhang, Q. Miao, and Y. Li, "An adaptive link quality-based safety message dissemination scheme for urban
VANETs," IEEE Communications Letters, vol. 22, no. 10, pp. 2104-2107, 2018.
[40] E. Garcia-Lozano, C. T. Barba, M. A. Igartua, and C. Campo, "A distributed, bandwidth-efficient accident
prevention system for interurban VANETs," in 2013 International Conference on Smart Communications in
Network Technologies (SaCoNeT), 2013, vol. 1, pp. 1-5.
[41] P. Gokulakrishnan and P. Ganeshkumar, "Road accident prevention with instant emergency warning message
dissemination in vehicular ad-hoc network," PloS one, vol. 10, no. 12, p. e0143383, 2015.
[42] H. S. Dawood and Y. Wang, "An efficient emergency message broadcasting scheme in vehicular ad hoc networks,"
International journal of distributed sensor networks, vol. 9, no. 11, p. 232916, 2013.
[43] A. Roy and J. Chakraborty, "Communication based accident avoidance and congestion control mechanism in
VANETs," in 2015 International Symposium on Advanced Computing and Communication (ISACC), 2015,
pp. 320-327.
[44] J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, "VANET routing on city roads using real-time vehicular traffic
information," IEEE Transactions on Vehicular technology, vol. 58, no. 7, pp. 3609-3626, 2009,
doi: 10.1109/TVT.2009.2014455.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3193 - 3200
3200
BIOGRAPHIES OF AUTHORS
Mustafa Maad Hamdi was born in Al-Anbar, Iraq. He received the B.Eng. degree in Computer
Engineering Technology from Al-Maarif University College, Iraq. And the M.Sc. degree in
Communication and Computer Engineering from University Kebangsaan Malaysia (UKM),
Malaysia. He is currently pursuing the Ph.D. degree in the department of communication
engineering, University Tun Hussein Onn Malaysia (UTHM), Malaysia. His research interests include
Wireless and Mobile Communications, VANET, MANET, and satellite Communication, and
Cryptographics.
Lukman Audah was born in Kuala Lumpur, Malaysia. He received the B.Eng. degree in
telecommunications from Universiti Teknologi Malaysia, in 2005, and the M.Sc. degree in
communication networks and software and the Ph.D. degree in electronic engineering from the
university of Surrey, U.K. He is currently a lecturer with the communication engineering
Department, University Tun Hussein Onn Malaysia. His research interests include wireless and
Mobile Communications, Internet Traffic Engineering, Network System Management, Data Security,
and Satellite Communication.
Sami Abduljabbar Rashid was born in Al-Anbar, Iraq. He received the B.Eng. degree in
computer engineering technology from Al-Maarif University College, Iraq, and the M.Sc. degree
in communication and computer engineering from University Kebangsaan Malaysia (UKM),
Malaysia. He is currently pursuing the Ph.D. degree in the department of communication
engineering, University Tun Hussein Onn Malaysia (UTHM), Malaysia. His research interests
include wireless and mobile communications and VANET.
Sameer Alani was born in Iraq, in 1989. He received the B.S. degree in computer engineering
and the M.Sc. degree in wireless communication and Computer networking technology from The
Universiti Kebangsaan Malaysia (UKM), in 2017. He is currently pursuing the Ph.D. degree in
wireless communication and networking. His research interests include antenna applications,
wireless communication, and networking Technology.

More Related Content

What's hot

Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation designProf Ansari
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communicationNitish Tanwar
 
Cooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETCooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETMayuresh Bhagat
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal ToutouhJamal Toutouh, PhD
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsjournalBEEI
 

What's hot (20)

VANET
VANETVANET
VANET
 
Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation design
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communication
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
VANET (BY-VEDANT)
VANET (BY-VEDANT)VANET (BY-VEDANT)
VANET (BY-VEDANT)
 
Vehicular ad hoc network
Vehicular ad hoc networkVehicular ad hoc network
Vehicular ad hoc network
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Cooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETCooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANET
 
VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
VANET
VANETVANET
VANET
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal Toutouh
 
Performance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocolsPerformance evaluation for vehicular ad-hoc networks based routing protocols
Performance evaluation for vehicular ad-hoc networks based routing protocols
 

Similar to VANET-based traffic monitoring and incident detection system: A review

ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)IRJET Journal
 
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A SurveyIRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A SurveyIRJET Journal
 
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES ijasuc
 
Real–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANETReal–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANETIRJET Journal
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONRK CONSULTANCY SERVICES
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...IJERA Editor
 
Online Accessable Traffic Control System for Urban Areas Using Embedded Syste...
Online Accessable Traffic Control System for Urban Areas Using Embedded Syste...Online Accessable Traffic Control System for Urban Areas Using Embedded Syste...
Online Accessable Traffic Control System for Urban Areas Using Embedded Syste...IJSRD
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksIRJET Journal
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsIJCSIS Research Publications
 
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...IOSR Journals
 
VEHICLE COLLISION DETECTION & PREVENTION USING VANET BASED IOT WITH V2V
VEHICLE COLLISION DETECTION & PREVENTION USING VANET BASED IOT WITH V2VVEHICLE COLLISION DETECTION & PREVENTION USING VANET BASED IOT WITH V2V
VEHICLE COLLISION DETECTION & PREVENTION USING VANET BASED IOT WITH V2Vijwmn
 
Vehicle Collision Detection & Prevention using VANET Based IoT With V2V
Vehicle Collision Detection & Prevention using VANET Based IoT With V2VVehicle Collision Detection & Prevention using VANET Based IoT With V2V
Vehicle Collision Detection & Prevention using VANET Based IoT With V2Vijwmn
 
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetWay to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetIAEME Publication
 
Intelligent Collision avoidance and monitoring system for railway using wirel...
Intelligent Collision avoidance and monitoring system for railway using wirel...Intelligent Collision avoidance and monitoring system for railway using wirel...
Intelligent Collision avoidance and monitoring system for railway using wirel...Editor IJMTER
 
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers Yayah Zakaria
 
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers IJECEIAES
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANETPallavi Agarwal
 

Similar to VANET-based traffic monitoring and incident detection system: A review (20)

ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
ACCIDENT DETECTION AND AVOIDANCE USING VEHICLE TO VEHICLE COMMUNICATION (V2V)
 
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A SurveyIRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
IRJET - Integrated VLC with Wi-Fi for Smartway Transportation System: A Survey
 
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES
 
Real–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANETReal–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANET
 
Ijetr042176
Ijetr042176Ijetr042176
Ijetr042176
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
 
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
 
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
 
Online Accessable Traffic Control System for Urban Areas Using Embedded Syste...
Online Accessable Traffic Control System for Urban Areas Using Embedded Syste...Online Accessable Traffic Control System for Urban Areas Using Embedded Syste...
Online Accessable Traffic Control System for Urban Areas Using Embedded Syste...
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security Attacks
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...
 
VEHICLE COLLISION DETECTION & PREVENTION USING VANET BASED IOT WITH V2V
VEHICLE COLLISION DETECTION & PREVENTION USING VANET BASED IOT WITH V2VVEHICLE COLLISION DETECTION & PREVENTION USING VANET BASED IOT WITH V2V
VEHICLE COLLISION DETECTION & PREVENTION USING VANET BASED IOT WITH V2V
 
Vehicle Collision Detection & Prevention using VANET Based IoT With V2V
Vehicle Collision Detection & Prevention using VANET Based IoT With V2VVehicle Collision Detection & Prevention using VANET Based IoT With V2V
Vehicle Collision Detection & Prevention using VANET Based IoT With V2V
 
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetWay to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanet
 
Intelligent Collision avoidance and monitoring system for railway using wirel...
Intelligent Collision avoidance and monitoring system for railway using wirel...Intelligent Collision avoidance and monitoring system for railway using wirel...
Intelligent Collision avoidance and monitoring system for railway using wirel...
 
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
 
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

VANET-based traffic monitoring and incident detection system: A review

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 4, August 2021, pp. 3193~3200 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i4.pp3193-3200  3193 Journal homepage: http://ijece.iaescore.com VANET-based traffic monitoring and incident detection system: A review Mustafa Maad Hamdi1 , Lukman Audah2 , Sami Abduljabbar Rashid3 , Sameer Alani4 1,2,3 Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia, Batu Pahat, Johor, Malaysia 4 Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka, Malaysia Article Info ABSTRACT Article history: Received Jul 9, 2020 Revised Mar 11, 2021 Accepted Mar 21, 2021 As a component of intelligent transport systems (ITS), vehicular ad hoc network (VANET), which is a subform of manet, has been identified. It is established on the roads based on available vehicles and supporting road infrastructure, such as base stations. An accident can be defined as any activity in the environment that may be harmful to human life or dangerous to human life. In terms of early detection, and broadcast delay. VANET has shown various problems. The available technologies for incident detection and the corresponding algorithms for processing. The present problem and challenges of incident detection in VANET technology are discussed in this paper. The paper also reviews the recently proposed methods for early incident techniques and studies them. Keywords: Early detection Incident detection Incident management Traffic monitoring centre VANET This is an open access article under the CC BY-SA license. Corresponding Author: Lukman Audah Faculty of Electrical and Electronic Engineering Universiti Tun Hussein Onn Malaysia 86400 Parit Raja, Batu Pahat, Johor, Malaysia Email: hanif@uthm.edu.my 1. INTRODUCTION Nowadays, network technology is rapidly developing and widely applied. Vehicular ad hoc network (VANET) is a technology that uses cars as mobile nodes in mobile ad-hoc network (MANET) [1]. VANET converts all participating cars into a router or wireless node, allowing cars 100 to 300 meters away to connect to an extensive network. Because cars are out of the signal range and out of network, other cars can connect and connect vehicles to create a mobile internetwork as shown in Figure 1. VANET is a sophisticated technology that integrates ad hoc networks, wireless LANs, mobile technology, and sensor networks to provide advanced intelligent communications between vehicles, roadside sensors, and infrastructure [2]. VANETs are self-organizing and decentralized systems. VANET enables dedicated short-range communication (DSRC) of vehicles in the 5.9 GHz band through the IEEE 802.11 p standard. Moreover, VANET has a different scenario of communications such as vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications for near and remote environments. Recently, VANET has been widely used in intelligent transportation systems (ITS) applications. Therefore, VANET is a technology that enables the integration of a single framework for conventional ITS applications [3]. The basic idea of the ITS environment is to use VANET technology to communicate vehicles to each other and communicate the infrastructure of the roadside unit to share information through the network. In safety applications and user applications, ITS applications can be divided. The number of traffic accidents will be significantly decreased, with the consequence that 60% of incidents could be prevented if the driver
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3193 - 3200 3194 were warned within 0.5 seconds of the collision. Throughout the meantime, safety applications may be used to alert drivers that the path to the next is too close. According to the US department of transportation, 45% of all registered cars and 21% of road accidents accounted for accidents at intersections in 2003 [4]. VANET can control the rate of data dissemination, which facilitates the transmission of only relevant data (for example, the traffic status of nearby roads) to each vehicle and send data to the traffic monitoring centre (TMC) [5]. Since traffic data can be distributed by multiple hops broadcasting, remote managers are likely to receive traffic data well in advance. This allows the driver to respond to the traffic information they receive in traffic monitoring [6]. Different scenarios will happen and affect the flow of data to TMC, such as wither conditions, accidents, and rush hours. These incidents will impact traffic flow and influence system performance. Hence, a new incident technique is required to be built in such a system [7]. Collecting data and detect incidents in ITS can be done by different techniques that we will discuss in the next section. An early warning performs frequent surveys when road accidents occur and produce alerts providing concise information about the type of accident designation. A method of accident prediction attempts to identify an unexpected event and its location as quickly as reliably as possible automatically [8]. However, identifying non-blocking collisions and incidents under light load is still a challenge as a difference from standard patterns of traffic may be negligible. Therefore, the limitations are that most of these algorithms do not know exactly when or what occurred [9]. We organized this paper as follow: Section 2, present all issue and challenges that implemented in incident detection and showing the points of the strength and weakness to all of them. In section 3, we will explain the recent advancement in the early incident detection system and summary of existing related work done in the past with the conclusion of this paper. Figure 1. VANET model [10] 2. ISSUE AND CHALLENGES IN INCIDENT DETECTION Road incidents can be made up of many factors; some are (somehow) predictable, such as road construction, rush hour, and others are unpredictable, such as accidents, weather conditions, human behavior, and other unusual or special events affecting roadways. Without having any prior information to the drivers, road accidents, traffic congestion, and other road incidents are the most serious possible problem. As a result, the more serious the incident, the longer it will take to rectify it once the cause has been eliminated or repaired. During an incident, normal road capacity is limited, and there are often queues and delays, like in case of traffic congestions. Incidents are primarily responsible for delays and have far-reaching consequences for safety, congestion, pollution, and travel costs [11]. Earlier research has shown that incidents are one of the main causes of lost time and the increase in avoidable costs for transportation networks [12].  The irrelevancy of incident information: Only relevant information should be provided to drivers. Independent and unnecessary information should be filtered out. This includes using accurate information dissemination. In many cases, irrelevant information transmitted by encircled vehicles or the detector node has a significant impact on traffic management. There have been cases where false alarms have been activated, and the same information has been transmitted to every node in the vehicle, which changes the direction of the traffic and obstructs the unnecessary traffic at the roadside, which complicates the ITS system. Therefore, the information to be transmitted to vehicles is an important aspect of the detection of VANET-based incidents in ITS.
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  VANET-based traffic monitoring and incident detection system: A review (Mustafa Maad Hamdi) 3195  Real-time inaccessibility of information: Traffic information must be accessible in real-time. In other words, the necessary traffic information must be available to high-speed drivers. It is often the case that information transmitted by a sensor or vehicle node arrives late at other nodes. In many cases, when an emergency alert is required to prevent fatal accidents, it is transmitted late and causes an undesired accident. Therefore, access to real-time information is critical in VANET-based ITS. Detecting and managing incidents offers better traffic monitoring. Many forms of traffic monitoring can detect an incident. The current techniques of the incident detection such as inductive loop detectors, video detection system, microwave radar sensors, automatic vehicle identification, automatic vehicle location, and wireless location technology. Table 1 present the points of strength and weakness for techniques implemented in incident detection. Table 1. Simulation parameters for the baseline Technique Strength Limitation Characteristics Inductive loop detectors Data for traffic with volume, occupancy. Maintenance, Installation, and replacement of ILDs. Intrusive, comprising a wire coiled. Video detection system A single controller a combination of cameras. Some periodic maintenance. Non-intrusive, Software for image and camera processing. Microwave radar sensors Measure speed directly. Accuracy is not good. Non-intrusive Automatic vehicle identification Provide effective vehicles with data collection. Include important infrastructure on the roads. Non-intrusive Automatic vehicle location Few fixed infrastructure components are necessary. Sample size limitations. Relies on a global positioning system (GPS) data. Wireless location Technology Some vehicle owners include cell phones. Produce reliable speed and travel time measurements. The use of cell phones is mainly based on vehicles. 3. RECENT ADVANCEMENT IN EARLY INCIDENT DETECTION SYSTEM In the past, many attempts have been made to invent an early incident detection system that can detect errors in intelligent transport systems as quickly as possible, to provide people with accurate primary information about alert data, and possible response times to resistance. The measures adopted to develop these systems took into account; i) the information on the accident is irrelevant drivers should only be given the applicable information. Non-relevant and redundant information should be provided. This includes the dissemination of accurate information, ii) the inaccessibility of information in real-time traffic information must be immediately accessible. In other words, basic traffic information should be accessible to drivers at high speed and iii) No timely information available Road accident information should be made available to drivers as soon as possible so that they have sufficient time to act (for example, to make a decision ahead or at the beginning). However, the implementation of the existing system could hardly produce these desirable properties. These features can save time in obtaining information on expected road accidents alongside end- user fuel. The following section discusses different research studies to develop an early incident detection system. Baiocchi et al. [5] have developed a traffic flow estimation method with GPS data and promising performance. Hojati et al. [13] have provided a model to estimate the time interval between accidents and clean-up based on road and infrastructure differences. Even IT technology has been included in traffic, incident detection, and more. The neural networks [14], supporting vector machines [15] or hidden Markov models [16] are used in these studies. In a study, Lee et al. [17] evaluated the quality of exploited data collected mostly through various roadside sensors. They pointed out that reliable and error-free data was difficult to obtain. He suggested the use of Microwave Sensors (RTSS) to obtain more reliable traffic data for traffic management systems and provided several examples in Ontario. He also introduced methods for identifying these mistakes and evaluating such models with real data. Masters et al. [18] analyzed the integrated Toronto COMPASS traffic accident detection system based on distance, road use, and speed parameters to detect data anomalies. Feng et al. [19] calculated the corresponding data using the Bayes model to calculate the average travel time. Pascale et al. [20] focused on calculating road capacity and suggested increasing efficiency. Some studies process images and videos based on data from CCTV cameras [21]. The consequence of these systems is the ability to monitor various vehicles and their activities. Ad hoc vehicle networks are also utilized in traffic data grouping models [22], but communication and data transmission are not particularly easy in various road situations. Researchers also analyze the flow of traffic and incidents detection. The researcher [23] presented the architectural prototype e-NOTIFICATION, a new proposal aimed at improving the survival chances of passengers involved in road accidents. By using the automotive information infrastructure systems, the planned device immediately identifies warnings and assists, incident passengers. This method is built to include; i) a car immediately involved in an incident; ii) the automated transmission of
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3193 - 3200 3196 the file containing important crash details for controlling onboard devices; and, iii) a summary and automated classification, depending on information appropriate to the vehicles affected, of the losses incurred by the automobile and its occupants; The system decides on the rescue services needed to maximize support in the event of an accident, based on transmitted information and the approximate estimation of accidents. The method aims at having the vehicle's location from the GPS receiver, transmitting the location data from SMS to the mobile number of the vehicle owner, and through GPRS to the telematic operator's server. It comprises modules; i) that require a GPS transmitter for accurate GPS GSM/GPRS satellite details; ii) The GSM/GPRS modem transfers incident position information and other information through the GSM network. The modem can be controlled using the AT commands using a microcontroller; iii) The GPS data is received, all data are analyzed, and a vehicle location is transmitted to the owner and server by the microcontroller (MCU). The scientists have suggested a safety prototype [24]. The main aim is the development of some various programs which would affect the comprehensive application and preparation of the ITS cooperatives. This also seeks to facilitate the introduction of European road cooperation programs, focusing on all issues relating to connectivity between V2V and vehicle infrastructure (V2I). The initiative aims to promote the establishment of cooperation structures on European roads. In another work carried out in [25], with a proposed automatic accident prevention system and a safety system using the integrated GSM interface, this designed system is automatic collision detection and warning system, from the GPS module and a GSM using a modem. A reliable scheme must ensure successful mechanical interaction with the entire structure of the vehicle to be secured. Throughout the case of a crash, the device can sense a rapid deceleration of the car. The accelerometer measures vehicle speed continuously, detects speeds beyond the threshold and transmits information through ADC to the microcontroller. The controller contrasts this with a collection of thresholds and delivers the pre-defined numbers automatically to the SOS message. This communication also conveys the GPS co-ordination for the vehicle, which it receives from the GPS module on a continuing process. This device can be a great benefit to find and save vehicles for accidents. Other authors [26] have implemented a working incident prevention system and a GPS and GSM modem messaging framework. This research aims to recognize the condition of the car accident by transmitting a message through the vehicle network. The main challenge is to preserve vehicle protection at very reasonable costs. The main benefit of this check is that when the detector is activated, the GSM modem is detected immediately on the cell phone numbers stored in the EEPROM. This device reliably determines the incident location, automates the occurrence detection and communications method. The researchers from [27] proposed an emergency call notification system via the Internet of Things and the cloud. The proposed system has been Implemented using the XBee WiFi module, Xbee Shield, GPS module, Seeeduino, and the shock sensors. The basic idea is to use shock sensors to discover an accident, identify the exact location of the accident, and transmit the location coordinates via XBee WiFi to the nearest hospital via the cloud. The aim was to suggest a system that would enable the Internet and the cloud to be connected abroad. Given the above limitations, the framework represents a move forward to encourage participation in the broader Internet of Things process. Data may be transmitted over long distances utilizing the application in the cloud. This functionality may be further improved by designing the device to notify the victim's immediate family. In another work [28], a prototype system specifically designed to detect and render quick resources to victims of road accidents. The system requires that each vehicle be equipped with a control unit (CU) and an onboard unit (OBU), which indicates the location of the accident to provide the rescue operation with the necessary resources. The proposed system allows for the identification of road accidents to improve assistance to injured passengers by reducing the response time of emergency services by effectively communicating information on major accidents. The above section discusses the various related works and methods applied to the system and techniques for the early detection of incidents. The following section summarizes the researchers' current work in this area, as shown in Table 2 (see in Appendix). 4. CONCLUSION This review paper provides an exhaustive study of existing incident detection techniques. Current techniques have been studied based on traffic monitoring and incident detection. The paper presented a relative study on roadways incident detection methods in terms of working with the pros and cons. Also, proprietary incident detection techniques have been explored to determine applications for incident detection and management. The review paper presented a comprehensive overview of field related research work. However, the literature has provided a systematic overview of related work such as traffic monitoring techniques, incident detection methods, VANET data dissemination, VANET safety, and traffic data. The study compared all available accident detection techniques and presented a comparative study of strength and weakness related to available incident detection techniques.
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  VANET-based traffic monitoring and incident detection system: A review (Mustafa Maad Hamdi) 3197 APPENDIX Table 2. Summary of existing related work done in the past Authors Proposed scheme methodology Issues identified Benefits Simulation tool [29] A new model for the dissemination of data based on Clustering and Probabilistic Broadcasting (CPB). Frequent changes in topology due to increasing node mobility. Efficient utilization of communication modes. NS-3, SUMO [30] An emergency message dissemination system based on the VANET and FoG vehicle technology congestion reduction scenario. The speed, direction, and density of the moving neighbors are not compatible. Reduces accessibility delays and congestion. MATLAB [31] A modeling language based on the actor is used and fitted with various model control engines. Frameworks focused on simulations cannot have assured analyses. Behavior and performance were outstanding. Afra -modeling and verification IDE [32] The approach suggested is based on the concept of a supernode for timely communication. Moreover, the time barrier strategy is modified to deal with this issue to prevent the unnecessary broadcast, which can also cause the diffusion storm. Broadcast congestion or partial broadcast. Overhead message reduction, transmitting latency, better coverage, and packet delivery ratio. OMNeT++, SUMO [33] Vehicles are dynamically clustered to tackle the storm issue and a location-based strategy aimed at reducing communication gaps is proposed that emergency messages are disseminated in time. The frequently changed network topology contributing to network instability is caused by high mobility in-vehicle networks. Increased transmission latency, coverage, and delivery of packets. OMNeT++, VEINS, and SUMO [34] A new security-related communications protocol based on the non-redundant Communication Range (NRCR, for short), which can manage safety-relevant multi-hop messages broadcast within the non-isomeric area of communication vehicle scenario, specifically heterogeneous VANET topology. Effective messages broadcast related to safety. The protocol is perfect for packet receiving ratio, end-to-end delay, and overhead network. NS-2, SUMO [35] A new technique to improve VANET dissemination systems to prevent further cases of emergencies and hazards by utilizing a heuristic, fast and real-time method. Network efficiency, based on several variables including bandwidth consumption, transmission latency, and quality of service (QoS). Improved performance of cluster duration, delivery rate, and the overhead. NS3, VEINS, and SUMO [36] Across layer autonomous route recovery (CLARR) system for enhancing routing activity by decreasing the connectivity breaks for the increased multimedia dissemination of data. High-speed vehicles often interrupted connections and loss of data packets at minimum latency. The overall delay is highly improved efficiency. NS3, SUMO [37] A reliable emergency message dissemination (REMD) framework is suggested which ensures a pre-defined reliability of messages dissemination in a variety of channel conditions while serving the delay requirements. Recent emergency message dissemination schemes do not reach pre-defined loss channel reliability. REMD satisfies latency requirements. NS3, VEINS, and SUMO [38] A method for the dissemination of performance safety messages and detailed physical channel synchronization measurements are suggested for the connection. The organization of conflict between CFs is suggested through a score- based priority allocation mechanism for candidate forwarders (CFs). Signal propagation is highly enhanced by obstacles at intersections in specific. The method exceeds existing schemes for multi-hop broadcasting. OMNeT++, VEINS, and SUMO [39] Also, to ensure efficient bandwidth utilization, the warning message scheme has been developed for low priority messages. During harsh weather conditions, the network provides the highest high and low priority messaging. The processing speed of drivers as such conditions arise. Message delay dissemination. The efficient utilization of bandwidth is less delayed. NS-2.34 [40] When the unexpected behavior is detected by the RSU, send an EM message to all the vehicles that are inside the RSU network. To avoid traffic collisions, an EW message will be received at the same moment. Warning messages are timely. The message broadcast was delayed. Low delay. NS-2.0 [41] The car selects the best carrier and communicates the emergency message. The transmitting of the emergency message to the RSU by the transmitter vehicle. The probability of accidents to determine communication with messages in VANETs. Fewer overhead message. MATLAB, R2011b Version [42] The emergency message is broadcast by an RSU to the other RSUs in its network. It prevents an emergency message from duplicating. Such messages enable the driver to select a different route to prevent accidents. Distribution of network capacity broadcast-storm issue Network congestion detection. High throughput. End- to-end High delivery rate of the packet NS-2.0
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3193 - 3200 3198 Table 2. Summary of existing related work done in the past (continue) Authors Proposed scheme methodology Issues identified Benefits Simulation tool [43] The message is secured by all vehicles in the cluster to provide specific information. A traffic accident in the same cluster is identified and incident information is transmitted to the other of the cluster vehicles. Simple Flooding. Transmission range cluster size. Driver reaction time. SUMO, OMNET++ VEINS, Clustering Algorithm Techniques [44] The drivers of vehicles have the intensity and location of the vehicle when the traffic congestion has been detected. The vehicle affected by the incident transmits the warning message to the RSU. Bandwidth efficiency transmission. Traffic detection congestion. Transmission. Efficient utilization of bandwidth Low overhead message Net Beans IDE 7.0 Java ACKNOWLEDGEMENTS The authors would like to thank the Research Management Cntre (RMC), Universiti Tun Hussein Onn Malaysia for the generous financial support under the RMC Research Fun (E15501). REFERENCES [1] S. Alani, Z. Zakaria, and M. Hamdi, "A study review on mobile ad-hoc network: Characteristics, applications, challenges and routing protocols classification," International Journal of Advanced Science and Technology, vol. 28, no. 1, pp. 394-405, 2019. [2] M. M. Hamdi, L. Audah, S. A. Rashid, and M. A. Al-shareeda, "Techniques of Early Incident Detection and Traffic Monitoring Centre in VANETs: A Review," Journal of Communications, vol. 15, no. 12, 2020. [3] M. Hamdi, L. Audah, S. Rashid, A. Mustafa, and M. Abood, "A survey on data dissemination and routing protocol in VANET: Types challenges opportunistic and future role," Int. J. Adv. Sci. Technol, vol. 29, no. 5, pp. 6473-6482, 2020. [4] A. Baiocchi, F. Cuomo, M. De Felice, and G. Fusco, "Vehicular ad-hoc networks sampling protocols for traffic monitoring and incident detection in intelligent transportation systems," Transportation Research Part C: Emerging Technologies, vol. 56, pp. 177-194, 2015. [5] G. Xu, Q. Wu, M. Daneshmand, Y. Liu, and M. Wang, "A data privacy protective mechanism for wireless body area networks," Wireless communications and mobile computing, vol. 16, no. 13, pp. 1746-1758, 2016. [6] H. Lu, J. Li, and M. Guizani, "A novel ID-based authentication framework with adaptive privacy preservation for VANETs," in 2012 Computing, Communications and Applications Conference, 2012, pp. 345-350. [7] S. Alani, Z. Zakaria, and H. Lago, "A new energy consumption technique for mobile ad hoc networks," International Journal of Electrical and Computer Engineering, vol. 9, no. 5, p. 4147, 2019. [8] H. F. Mahdi, M. S. Abood, and M. M. Hamdi, "Performance evaluation for vehicular ad-hoc networks based routing protocols," Bulletin of Electrical Engineering and Informatics, vol. 10, no. 2, pp. 1080-1091, 2021, doi: 10.11591/eei.v10i2.2943. [9] O. S. Al-Heety, Z. Zakaria, M. Ismail, M. M. Shakir, S. Alani, and H. Alsariera, "A comprehensive survey: Benefits, services, recent works, challenges, security, and use cases for sdn-vanet," IEEE Access, vol. 8, pp. 91028- 91047, 2020. [10] H. Pishro-Nik, S. Valaee, and M. Nekovee, "Vehicular ad hoc networks," ed: Springer, 2010. [11] H. S. Mahmassain, C. Haas, S. Zhou, and J. Peterman, "Evaluation of incident detection methodologies," University of Texas at Austin. Center for Transportation Research, 1999. [12] J. A. Lindley, "Urban freeway congestion: quantification of the problem and effectiveness of potential solutions," ITE journal, vol. 57, no. 1, pp. 27-32, 1987. [13] A. T. Hojati, L. Ferreira, S. Washington, P. Charles, and A. Shobeirinejad, "Modelling total duration of traffic incidents including incident detection and recovery time," Accident Analysis & Prevention, vol. 71, pp. 296-305, 2014. [14] H. Lee, "Algorithms to Improve the Quality of Freeway Traffic Detector Data," The Ohio State University, 2012. [15] J. Wang, E. Case, and D. Manor, "The road traffic microwave sensor (RTMS)," in The 3rd International Conference on Vehicle Navigation and Information Systems, 1992, pp. 83-90. [16] M. Shahgholian and D. Gharavian, "Advanced traffic management systems: an overview and a development strategy," arXiv preprint arXiv:1810.02530, 2018. [17] H. Lee, "Algorithms to Improve the Quality of Freeway Traffic Detector Data," The Ohio State University, 2012. [18] P. H. Masters, J. K. Lam, and K. Wong, "Incident detection algorithms for compass-an advanced traffic management system," in Vehicle Navigation and Information Systems Conference, vol. 2, 1991, pp. 295-310, doi: 10.1109/VNIS.1991.205776. [19] Y. Feng, J. Hourdos, and G. A. Davis, "Probe vehicle based real-time traffic monitoring on urban roadways," Transportation Research Part C: Emerging Technologies, vol. 40, pp. 160-178, 2014, doi: 10.1016/j.trc.2014.01.010. [20] A. Pascale, H. T. Lam, and R. Nair, "Characterization of network traffic processes under adaptive traffic control systems," Transportation Research Procedia, vol. 9, pp. 205-224, 2015.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  VANET-based traffic monitoring and incident detection system: A review (Mustafa Maad Hamdi) 3199 [21] M. Fogue, P. Garrido, F. Martínez, J.-C. Cano, C. Calafate, and P. Manzoni, "A realistic prototype for automatic accident detection and assistance through vehicular networks," IEEE Vehicular Technology Magazine, vol. 7, pp. 90-100, 2012. [22] T. Dalai, "Emergency Alert and Service for Automotives for India," International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), Mysore, India, vol. 2, no. 5, pp. 08-12, 2013. [23] D. P. Mohapatra and S. Patnaik, "Intelligent computing, networking, and informatics," Advances in Intelligent Systems & Computing, vol. 243, pp. 1047-1054, 2013. [24] C. Prabha, R. Sunitha, and R. Anitha, "Automatic vehicle accident detection and messaging system using GSM and GPS modem," International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 3, no. 7, pp. 10723-10727, 2014. [25] P. Javale, S. Gadgil, C. Bhargave, Y. Kharwandikar, and V. Nandedkar, "Accident detection and surveillance system using wireless technologies," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 2, pp. 38-43, 2014. [26] H. Ghafoor and I. Koo, "Spectrum-aware geographic routing in cognitive vehicular ad hoc network using a Kalman filter," Journal of Sensors, vol. 2016, 2016. [27] V. Praveena, A. R. Sankar, S. Jeyabalaji, and V. Srivatsan, "Efficient accident detection and rescue system using ABEONA algorithm," International Journal of Emerging Trends and Technology in Computer Science, vol. 3, no. 5, pp. 222-225, 2014. [28] O. Abedi, R. Berangi, and M. A. Azgomi, "Improving route stability and overhead on AODV routing protocol and make it usable for VANET," in 2009 29th ieee international conference on distributed computing systems workshops, 2009, pp. 464-467. [29] H. Feng, C. Liu, Y. Shu, and O. W. Yang, "Location prediction of vehicles in VANETs using a Kalman filter," Wireless personal communications, vol. 80, no. 2, pp. 543-559, 2015, doi: 10.1007/s11277-014-2025-3. [30] L. Liu, C. Chen, T. Qiu, M. Zhang, S. Li, and B. Zhou, "A data dissemination scheme based on clustering and probabilistic broadcasting in VANETs," Vehicular Communications, vol. 13, pp. 78-88, 2018, doi: 10.1016/j.vehcom.2018.05.002. [31] A. Ullah, S. Yaqoob, M. Imran, and H. Ning, "Emergency message dissemination schemes based on congestion avoidance in VANET and vehicular FoG computing," IEEE Access, vol. 7, pp. 1570-1585, 2018, doi: 10.1109/ACCESS.2018.2887075. [32] F. Yousefi, E. Khamespanah, M. Gharib, M. Sirjani, and A. Movaghar, "VeriVANca: an actor-based framework for formal verification of warning message dissemination schemes in VANETs," in International Symposium on Model Checking Software, 2019, pp. 244-259. [33] S. S. Shah, A. W. Malik, A. U. Rahman, S. Iqbal, and S. U. Khan, "Time barrier-based emergency message dissemination in vehicular ad-hoc networks," IEEE Access, vol. 7, pp. 16494-16503, 2019, doi: 10.1109/ACCESS.2019.2895114. [34] M. Ali, A. W. Malik, A. U. Rahman, S. Iqbal, and M. M. Hamayun, "Position-based emergency message dissemination for Internet of vehicles," International Journal of Distributed Sensor Networks, vol. 15, no. 7, p. 1550147719861585, 2019. [35] W. Liu, X. Tang, S. Jia, and J. Pu, "Safety message dissemination using edge computing in heterogeneous VANETs," in 2018 IEEE 27th International Symposium on Industrial Electronics (ISIE), 2018, pp. 1276-1281. [36] S. Benkerdagh and C. Duvallet, "Cluster‐based emergency message dissemination strategy for VANET using V2V communication," International Journal of Communication Systems, vol. 32, no. 5, p. e3897, 2019. [37] S. Shafi and D. V. Ratnam, "A cross layer cluster based routing approach for efficient multimedia data dissemination with improved reliability in VANETs," Wireless Personal Communications, vol. 107, no. 4, pp. 2173-2190, 2019. [38] W. Benrhaiem, A. Hafid, and P. K. Sahu, "Reliable Emergency Message Dissemination Scheme for Urban Vehicular Networks," IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 3, pp. 1154-1166, 2019. [39] X. Zhang, Q. Miao, and Y. Li, "An adaptive link quality-based safety message dissemination scheme for urban VANETs," IEEE Communications Letters, vol. 22, no. 10, pp. 2104-2107, 2018. [40] E. Garcia-Lozano, C. T. Barba, M. A. Igartua, and C. Campo, "A distributed, bandwidth-efficient accident prevention system for interurban VANETs," in 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT), 2013, vol. 1, pp. 1-5. [41] P. Gokulakrishnan and P. Ganeshkumar, "Road accident prevention with instant emergency warning message dissemination in vehicular ad-hoc network," PloS one, vol. 10, no. 12, p. e0143383, 2015. [42] H. S. Dawood and Y. Wang, "An efficient emergency message broadcasting scheme in vehicular ad hoc networks," International journal of distributed sensor networks, vol. 9, no. 11, p. 232916, 2013. [43] A. Roy and J. Chakraborty, "Communication based accident avoidance and congestion control mechanism in VANETs," in 2015 International Symposium on Advanced Computing and Communication (ISACC), 2015, pp. 320-327. [44] J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, "VANET routing on city roads using real-time vehicular traffic information," IEEE Transactions on Vehicular technology, vol. 58, no. 7, pp. 3609-3626, 2009, doi: 10.1109/TVT.2009.2014455.
  • 8.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3193 - 3200 3200 BIOGRAPHIES OF AUTHORS Mustafa Maad Hamdi was born in Al-Anbar, Iraq. He received the B.Eng. degree in Computer Engineering Technology from Al-Maarif University College, Iraq. And the M.Sc. degree in Communication and Computer Engineering from University Kebangsaan Malaysia (UKM), Malaysia. He is currently pursuing the Ph.D. degree in the department of communication engineering, University Tun Hussein Onn Malaysia (UTHM), Malaysia. His research interests include Wireless and Mobile Communications, VANET, MANET, and satellite Communication, and Cryptographics. Lukman Audah was born in Kuala Lumpur, Malaysia. He received the B.Eng. degree in telecommunications from Universiti Teknologi Malaysia, in 2005, and the M.Sc. degree in communication networks and software and the Ph.D. degree in electronic engineering from the university of Surrey, U.K. He is currently a lecturer with the communication engineering Department, University Tun Hussein Onn Malaysia. His research interests include wireless and Mobile Communications, Internet Traffic Engineering, Network System Management, Data Security, and Satellite Communication. Sami Abduljabbar Rashid was born in Al-Anbar, Iraq. He received the B.Eng. degree in computer engineering technology from Al-Maarif University College, Iraq, and the M.Sc. degree in communication and computer engineering from University Kebangsaan Malaysia (UKM), Malaysia. He is currently pursuing the Ph.D. degree in the department of communication engineering, University Tun Hussein Onn Malaysia (UTHM), Malaysia. His research interests include wireless and mobile communications and VANET. Sameer Alani was born in Iraq, in 1989. He received the B.S. degree in computer engineering and the M.Sc. degree in wireless communication and Computer networking technology from The Universiti Kebangsaan Malaysia (UKM), in 2017. He is currently pursuing the Ph.D. degree in wireless communication and networking. His research interests include antenna applications, wireless communication, and networking Technology.