SlideShare a Scribd company logo
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 259
Paper Publications
Deterministic AODV Routing Protocol for
Vehicular Ad-Hoc Network
1
Dalbir Singh, 2
Amit Jain (Asst. Prof.)
1,2
Panchkula Engineering College, Mouli, Panchkula (Haryana), India
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications
such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless
communication. To function properly, these applications require efficient routing protocols. However, existing
mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This
dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such
as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure
to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion
we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by
selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time
and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the
end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet
delivery ratio.
Keywords: VANET, AODV, ROUTING, ROUT TABLE.
I. INTRODUCTION
Vehicular Ad Hoc Network (VANETs) is a mobile network where a short lived and self organizing network is formed
among the vehicles. Network operates either in an infrastructure network (V2X) or in an infrastructure less network
(V2V). In an infrastructure network, Road Side Units (RSUs) interacts with vehicles’ wireless equipments in a
sporadically mode when a vehicle passes by it. In an infrastructure less network, Vehicles communicate with other
vehicles’ on-Board Units (OBUs) to exchange security messages. Each vehicle is equipped with a set of sensors such as
GPS, Radar, and Directional antenna [1].
The characteristics of this network are: wireless medium, mobile nature, high mobility, absence of infrastructure, high
dynamic network topology [2].
Due to lack of fixed infrastructure, nodes are prone to varied attacks. Securing the communication among vehicles is the
main challenge that lies in the vehicular network. Deployment of network intrusion detection system helps in identifying
the attack taken place in vehicular network [3]. Nodes in VANET are subjected to various types of impersonation attacks,
few of which are hard to deal with, even if any security mechanisms are enforced. Some of which are Sybil attack, stolen
identity attack, Man-in-the- Middle attack. Identification of the node and its authentication are of fundamental importance
within a secure network [4].
Over the last few decades, many researches and efforts have been done to investigate various issues related to V2I, V2X
areas. Several approaches to deal with identification of the node and its authentication in VANET have been proposed in
the literature. Norbert Bibmeyer [9] et al proposes a scheme based on data plausibility check that ensures positional
reliability in order to assess the trustworthiness of the neighboring node. S. RoselinMary [3] et al proposes an attacked
packet detection algorithm to detect the position of the vehicle and checks whether the packet sent by the vehicle has been
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 260
Paper Publications
attacked or not. The proposed scheme floods the beacons into the network to discover the presence of the neighboring
vehicles and accurate position of the messaged vehicle is detected. It verifies the MD5 hashes assigned to the VANET
nodes and once a malicious node is detected, warning message will be broadcasted to all the trusted VANET nodes and
the malicious node is isolated from the communication environment. Authentication is done through VANET Content
Fragile Watermarking. In this paper
We focus on security, faulty node detection and authentication schemes. A city scenario is considered with 10 vehicles
and 3 RSUs and it is further analyzed on the basis of various performance metrics. In this section we thoroughly discussed
about different routing methods used for VANET. The reason of conducting detailed literature review for VANET routing
methods was to check how the VANET routing is influenced by routi ng protocols which are currently being used by
MANET and VANET. Furthermore, MANET routing protocols which are suitable to some extent for VANET were also
kept in context while conducting the literature review. In addition, it also assisted us in selecting the suitable routing
protocols in order to make comparison with VANET routing protocols. This comparison was based on evaluating the
performance of these routing protocols in VANET.
In general, there are two methods of vehicle detection: intrusive technologies (pneumatic road tubes, inductive loop
detectors, piezoelectric sensors) and non-intrusive technologies (video image processors, microwave radars, infrared
sensors, and ultrasonic sensors) [25]. An inductive loop detector consists of three components: a loop, a loop extension
cable and a detector [26]. Loop detectors are placed at specified locations on roadways to count vehicles and to estimate
vehicle speed based on the occupancy time of vehicles on the detectors. However, installing these detectors requires a
great number of saw-cuts on roadway surfaces, which makes them difficult to deploy and maintain. This work is much
more expensive on roadway sections which need a large number of loop detectors. Moreover, loop detectors can provide
data only from vehicle to infrastructure and not vice versa.
In order to improve the vehicle detection technique for ITS, wireless communication systems have already been studied.
Wireless communication systems used in ITS can be classified into 2 types: vehicle-to-vehicle communication (V2V) and
vehicle-to-infrastructure communication (V2I). Some systems such as VETRAC [14] and COC [15] which employ V2V
and V2I to provide more functions for roadway security and management are being developed.
Azzedine Boukerche et.al (2008) [17] paper proposes a vehicle volume and speed measurement method using wireless
communications between roadside equipment and vehicles. Vehicles are equipped with Global Positioning System (GPS)
receivers and wireless communication devices, to detect their geographical location and to provide ad-hoc network
connectivity with the roadside unit respectively. To carry out the functions of a loop detector, roadside equipment collects
data from vehicles to detect their locations periodically and then counts the number of vehicles passing a given position in
a period, but the authors have taken the scenario that the ranges of RSUs are set in such a way that they do not overlap
with each other but also there should not be any gap in the coverage range of the RSUs. This scenario gives a good
detection result but could not be applied to the sparse RSUs region where no of RSUs are less.
Rajendra Prasad et al. (2013) [18] the authors propose a novel RF-based Vehicle detection and Speed Estimation system
(ReVISE). It makes use of the fact that the wireless signal strength in an RF environment is affected by the presence and
motion of objects and hence the wireless signals can be used to infer the state of the environment and identify objects in
the area Of interest only, not in all regions. So a vehicle can move to any speed in the area where there is no existence of
RF signal. In order to overcome these all drawbacks we propose a novel detection system which can detect vehicles in all
regions.
SeonYeong Han et al. (2013) [19] coveys that in mobile ad-hoc networks, local link connectivity information is
extremely important for route establishment and maintenance. Periodic Hello messaging is a widely used scheme to
obtain local link connectivity information. However, unnecessary Hello messaging can drain batteries while mobile
devices are not in use. This paper proposes an adaptive Hello messaging scheme to suppress unnecessary Hello messages
without reduced detect ability of broken links. Simulation results show that the proposed scheme reduces energy
consumption and network overhead without any explicit difference in throughput. In this paper, they proposed an adaptive
Hello interval to reduce battery drain through practical suppression of unnecessary Hello messaging. Based on the event
interval of a node, the Hello interval can be enlarged without reduced detects ability of a broken link, which decreases
network overhead and hidden energy consumption.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 261
Paper Publications
Ehsan Mostajeran, RafidahMd Noor et al. (2013) [20] conveys that Ad-hoc On-Demand Distance Vector (AODV) is
one of the ad-hoc routing protocols utilized in MANET and VANET. On-Demand routing protocols find their destinations
based on the process of flooding a request to neighbors searching for their destinations. Neighbors of nodes are detected
based on the neighbor discovery method, which periodically broadcasts HELLO messages to detect available neighbors at
time. Generating routing packets and neighbor discovery messages produce high overhead in the On-Demand routing
protocol, such as AODV. In order to overcome such issues, a novel scheme in Ad-hoc networks based on Intelligent-
AODV (I-AODV) is proposed. This scheme functions to exploit neighbor discovery and reduce the overhead of neighbor
discovery processes. This paper introduced an innovative, improved neighbor discovery method for Mobile Ad-hoc
routing protocols, called Intelligent-AODV. It provides reasonable performance by updating the neighbor list based on
routing packets such as RREQ, RREP and RERR. Moreover, the broadcast of HELLO messages is filtered by checking
the destination node in the neighbor list to reduce overhead. Simulation results of the proposed neighbor discovery
method based on mobility in various scenarios and compared with the original AODV demonstrate that I-AODV performs
better.
II. PROBLEM EXPLANATION AND PROPOSED WORK
a) PROPOSED WORK:
The AODV maintains the neighbors which used in recently transmission sending event of the node. But AODV does not
validate next neighbor frequently as VANET are highly dynamic scenario so nodes changing its position very frequently.
To solve this problem of the AODV we have proposed a dynamic neighborhood expiry time so that whenever nodes
changing its position frequently they can dynamically update neighbor table and nodes transmitted its packet to the nodes
which is more trusted as compare to the nodes which already exist in the neighbor table, to solve this problem we
basically reduces the neighbor hood expiry time of protocol as well as improve the packet salvaging, in the next section of
the paper our results proves the effectiveness of our approach.
III. RESULTS AND DISCUSSIONS
The performance of I-AODV and OLSR routing protocol is compared against representatives from the main classes of
routing protocols that are AODV and OLSR. where AODV and OLSR are topology based routing protocols. A review of
these routing protocols already taken in previous chapters. In this chapter, we describe how simulation is done and what
the results of the simulation are. The simulation is done in 2 phases and two different simulator have been used One is
SUMO(Simulation of Urban Mobility) for road traffic simulation and Veins (Vehicular environment in Network
Simulation) for network simulation
We use simulation to evaluate the performance of the proposed I-AODV, AODV and OLSR routing protocols with
respect to PDR (packet delivery ratio) and end to end delay time features. We simulate network consisting of nodes field
of 2500m × 8000m square area. Nodes have different transmission rate 100,200,300,400,500,600,700 and 800. The
simplest and usually the first thing to setup a network is creating a node. A network is build up from its layers components
such as Link layer, MAC layer and PHY layer. The components have to be defined before a node can be configured.
Table 5.1 shows the parameters used in the simulation.
Table 1.1: Network parameter definition
Parameter Name Parameter Value
channel type Channel/Wireless Channel
mac protocol Mac/802_11
number of nodes 10, 20, 30, 40, 60
routing protocol AODV, IAODV,OLSR
grid size 2500 x 800 sq.m
packet size 1000
simulation time Different
traffic type Cbr
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 262
Paper Publications
Figure 1.1: This scenario shows that the initial position of the vehicle at time 316.2ms
Graphs Display
Figure 1.2: End to End delay comparison of AODV, OLSR and I-AODV
End to end delay in highway scenario: The simulation results of end to end delay in highway scenario vehicle
environment is shown in below figure 5.20 from this figure it is clear that I-AODV and OLSR are perform better than
AODV routing protocols. It means that end to end delay is reduced while we uses I-AODV and OLSR routing protocols
in highway scenario. In highway scenario it is clear from below figure 5.20 that AODV is worst routing protocol when we
considering end to end delay. AODV routing protocol working very well in MANET but in VANET area it is not give
optimum results as it give in MANET environment. When we talking about end to end delay then I-AODV has also better
perform than OLSR because I-AODV consumes some time in calculation of trust value of nodes.
Figure 1.3: Packet Delivery ratio of AODV, OLSR and I-AODV
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 263
Paper Publications
PDR in highway scenario: The simulation results of highway scenario vehicle environment is shown in below figure
5.21 from this figure it is clear that I-AODV is perform better than AODV and OLSR routing protocols. It means that
packet drop is reduced while we uses I-AODV routing protocol either in open scenario or highway scenario. In highway
scenario it is clear from below figure 5.21 that AODV is worst routing protocol when talking about PDR values.
Figure 1.4: Comparison of throughput between AODV, OLSR and I-AODV
Throughput in highway scenario: The simulation results of highway scenario vehicle environment is shown in below
figure 5.22 from this figure it is clear that I-AODV is perform better than AODV and OLSR routing protocols. It means
that throughput increases while we use I-AODV routing protocol either in open scenario or highway scenario. In highway
scenario it is clear from below figure 5.22 that OLSR is worst routing protocol when talking about THROUGHPUT
values.
This thesis work briefly describes about the four routing protocols for VANETS. It includes detailed discussion of
AODV, OLSR and I-AODV which is the most widely used protocols that perform better than the rest of protocols. These
are compared with our proposed routing protocol I-AODV which takes the benefit of AODV. I-AODV improves the PDR
as compared to AODV because I-AODV selects the node on basis of trust value and trust value for any node becomes low
if that node drops packets. If we have two equidistant nodes form source and destination, then we select the node with
higher trust value to forward the packet. This approach results in reducing the total number of packets dropped and hence
will result in increased packet delivery ratio of the network.
The advantage of I-AODV protocol is that it selects the most trustworthy node which drops less number of packets. So the
selection of the node with highest trust value increases packet delivery ratio of I-AODV in comparison to AODV and
OLSR.
The drawback of the I-AODV protocol is the computation required for calculating trust value of node, results in increase
of end to end delay. So end to end delay is slightly more than AODV but it is very less as compared to OLSR.
IV. CONCLUSION
In this paper briefly describes about the routing protocols for VANETS. It includes detailed discussion of AODV and
OLSR which are the most widely used protocols that perform better than the rest of protocols. In further we improved
AODV in terms PDR, End to End Delay and throughput and successfully compared with existing AODV and OLSR
protocol.
REFERENCES
[1] Manvi S.S., Kakkasageri M.S., Mahapurush C.V., “Performance Analysis of AODV, DSR, and Swarm Intelligence
Routing Protocols In Vehicular Ad hoc Network Environment” In International conference on future Computer and
Communication., pp. 31-35, April. 2009.
[2] Bernsen, J. Manivannan, D., “Routing Protocols for Vehicular Ad Hoc Networks That Ensure Quality of Service” In
the fourth international conference on Wireless and Mobile Communications., pp.1-6, Aug. 2008.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 264
Paper Publications
[3] Wex, P. Breuer, J. Held, A. Leinmuller, T. Delgrossi, L., “Trust Issues for Vehicular Ad Hoc Networks” IEEE,VTC
Spring 2008., pp. 2800-2804, May.2008.
[4] R. Lind et al, “The network vehicle. A glimpse into the future of mobile multimedia”, IEEE Aerosp. Electron. Syst.
Mag., 1999.
[5] Car-to-Car Communications, www.car-2-car.org.
[6] H Fussler, S Schnaufer, M Transier , W Effelsberg, ”Vehicular Ad-Hoc Networks: From Vision to Reality and
Back”, Proc. Of IEEE Wireless on Demand Network Systems and Services, 2007.
[7] Ghassan Samara, Wafaa A.H. Al-Salihy, R. Sures, “Security Analysis of Vehicular Ad Hoc Networks”, Second
International Conference on Network Applications, Protocols and Services, 2010.
[8] R. Parker, S.Valaee, "Vehicle localization in Vehicular Networks", Vehicular Technology Conference, 2006. VTC-
2006 Fall. 2006 IEEE 64th, 2006, pp. 1–5.
[9] A. Benslimane, "Localization in Vehicular Ad Hoc Networks", Proceedings Systems Communications, 2005.
[10] T. Taleb, E. Sakhaee, A. Jamalipour, K. Hashimoto, N. Kato, and Y. Nemoto, “A stable routing protocol to support
its services in vanet networks” IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3337–3347,
November 2007.
[11] C.Perkins and E. Royer, “Ad-hoc on-demand Distance Vector Routing”, IEEE Workshop. Mobile Comp.sys.App.,
pp. 90-100, Feb. 1999.
[12] David B. Johnson, David A. Maltz, and Josh Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop
WirelessAd Hoc Networks”, in Ad Hoc Networking, Editor: Charles E.Perkins, Chapter 5, pp. 139-172, Addison-
Wesley, 2001.
[13] Ding Y, Wang C, Xiao L “A static-node assisted adaptive routing protocol in vehicular networks” In Proceedings of
the Fourth ACM international Workshop on Vehicular Ad Hoc Networks VANET, pp 59–68, 2007.
[14] J. Chennikara-Varghese, W. Chen, O. Altintas, S. Cai, “Survey of routing protocols for inter-vehicle
communications,” 3rd Annual International Conference on Mobile and Ubiquitous Systems -Workshops, 2006.
[15] Kevin C. Lee, UCLA, USA Uichin Lee, UCLA, USA Mario Gerla, UCLA, USA,“Survey of Routing Protocols in
Vehicular Ad Hoc Networks”.
[16] R. Gass, J. Scott, and C. Diot, “Measurements of In-Motion 802.11 Networking”, In IEEE Workshop on Mobile
Computing System and Applications (Hotmobile 2006), April 2006.
[17] Boukerche, Azzedine, et al. "Vehicular ad hoc networks: A new challenge for localization-based
systems." Computer communications 31.12 (2008): 2838-2849.
[18] Nayak, Rajendra Prasad. High Speed Vehicle Detection in Vehicular Ad-hoc Network. Diss. 2013.
[19] Han, Seon Yeong, and Dongman Lee. "An adaptive hello messaging scheme for neighbor discovery in on-demand
MANET routing protocols."Communications Letters, IEEE 17.5 (2013): 1040-1043.
[20] Keshavarz, Hassan, Rafidah Md Noor, and Ehsan Mostajeran. "Using routing table flag to improve performance of
AODV routing protocol for VANETs environment." The 9th International Conference on Computing and
Information Technology (IC2IT2013). Springer Berlin Heidelberg, 2013.

More Related Content

What's hot

A Data Collection Scheme with Multi-Agent Based Approach for VSNS
A Data Collection Scheme with Multi-Agent Based Approach for VSNSA Data Collection Scheme with Multi-Agent Based Approach for VSNS
A Data Collection Scheme with Multi-Agent Based Approach for VSNS
IRJET Journal
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
cscpconf
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
DhruvMarothi
 
A Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc NetworksA Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc Networks
pijans
 
Q045058791
Q045058791Q045058791
Q045058791
IJERA Editor
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
IJARTES
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
IOSR Journals
 
Data Dissemination in VANET: A Review
Data Dissemination in VANET: A ReviewData Dissemination in VANET: A Review
Data Dissemination in VANET: A Review
IRJET Journal
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
IJLT EMAS
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...
ambitlick
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
IJCNCJournal
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
inventionjournals
 

What's hot (16)

A Data Collection Scheme with Multi-Agent Based Approach for VSNS
A Data Collection Scheme with Multi-Agent Based Approach for VSNSA Data Collection Scheme with Multi-Agent Based Approach for VSNS
A Data Collection Scheme with Multi-Agent Based Approach for VSNS
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
4315ijci01
4315ijci014315ijci01
4315ijci01
 
Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
A Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc NetworksA Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc Networks
 
Q045058791
Q045058791Q045058791
Q045058791
 
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
GPSR
GPSRGPSR
GPSR
 
Data Dissemination in VANET: A Review
Data Dissemination in VANET: A ReviewData Dissemination in VANET: A Review
Data Dissemination in VANET: A Review
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
 

Viewers also liked

Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
paperpublications3
 
Big Data on Implementation of Many to Many Clustering
Big Data on Implementation of Many to Many ClusteringBig Data on Implementation of Many to Many Clustering
Big Data on Implementation of Many to Many Clustering
paperpublications3
 
Co-Clustering For Cross-Domain Text Classification
Co-Clustering For Cross-Domain Text ClassificationCo-Clustering For Cross-Domain Text Classification
Co-Clustering For Cross-Domain Text Classification
paperpublications3
 
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
paperpublications3
 
Using ψ-Operator to Formulate a New Definition of Local Function
Using ψ-Operator to Formulate a New Definition of Local FunctionUsing ψ-Operator to Formulate a New Definition of Local Function
Using ψ-Operator to Formulate a New Definition of Local Function
paperpublications3
 
Applying Agile Methodologies on Large Software Projects
Applying Agile Methodologies on Large Software ProjectsApplying Agile Methodologies on Large Software Projects
Applying Agile Methodologies on Large Software Projects
paperpublications3
 
Research on Lexicographic Linear Goal Programming Problem Based on LINGO and ...
Research on Lexicographic Linear Goal Programming Problem Based on LINGO and ...Research on Lexicographic Linear Goal Programming Problem Based on LINGO and ...
Research on Lexicographic Linear Goal Programming Problem Based on LINGO and ...
paperpublications3
 
Study of Color Image Processing For Capturing and Comparing Images
Study of Color Image Processing For Capturing and Comparing ImagesStudy of Color Image Processing For Capturing and Comparing Images
Study of Color Image Processing For Capturing and Comparing Images
paperpublications3
 
On the Zeros of Polar Derivatives
On the Zeros of Polar DerivativesOn the Zeros of Polar Derivatives
On the Zeros of Polar Derivatives
paperpublications3
 
Study Kc - Spaces Via ω-Open Sets
Study Kc - Spaces Via ω-Open SetsStudy Kc - Spaces Via ω-Open Sets
Study Kc - Spaces Via ω-Open Sets
paperpublications3
 
Non Split Edge Domination in Fuzzy Graphs
Non Split Edge Domination in Fuzzy GraphsNon Split Edge Domination in Fuzzy Graphs
Non Split Edge Domination in Fuzzy Graphs
paperpublications3
 
Private Mobile Search Engine Using RSVM Training
Private Mobile Search Engine Using RSVM TrainingPrivate Mobile Search Engine Using RSVM Training
Private Mobile Search Engine Using RSVM Training
paperpublications3
 
Enhance The Technique For Searching Dimension Incomplete Databases
Enhance The Technique For Searching Dimension Incomplete DatabasesEnhance The Technique For Searching Dimension Incomplete Databases
Enhance The Technique For Searching Dimension Incomplete Databases
paperpublications3
 
An Algorithm Analysis on Data Mining
An Algorithm Analysis on Data MiningAn Algorithm Analysis on Data Mining
An Algorithm Analysis on Data Mining
paperpublications3
 
Delay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSNDelay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSN
paperpublications3
 
Analysis of Classification Approaches
Analysis of Classification ApproachesAnalysis of Classification Approaches
Analysis of Classification Approaches
paperpublications3
 
Comparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting AlgorithmComparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting Algorithm
paperpublications3
 
An Advanced IR System of Relational Keyword Search Technique
An Advanced IR System of Relational Keyword Search TechniqueAn Advanced IR System of Relational Keyword Search Technique
An Advanced IR System of Relational Keyword Search Technique
paperpublications3
 
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
paperpublications3
 
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETEntropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
paperpublications3
 

Viewers also liked (20)

Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Big Data on Implementation of Many to Many Clustering
Big Data on Implementation of Many to Many ClusteringBig Data on Implementation of Many to Many Clustering
Big Data on Implementation of Many to Many Clustering
 
Co-Clustering For Cross-Domain Text Classification
Co-Clustering For Cross-Domain Text ClassificationCo-Clustering For Cross-Domain Text Classification
Co-Clustering For Cross-Domain Text Classification
 
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
 
Using ψ-Operator to Formulate a New Definition of Local Function
Using ψ-Operator to Formulate a New Definition of Local FunctionUsing ψ-Operator to Formulate a New Definition of Local Function
Using ψ-Operator to Formulate a New Definition of Local Function
 
Applying Agile Methodologies on Large Software Projects
Applying Agile Methodologies on Large Software ProjectsApplying Agile Methodologies on Large Software Projects
Applying Agile Methodologies on Large Software Projects
 
Research on Lexicographic Linear Goal Programming Problem Based on LINGO and ...
Research on Lexicographic Linear Goal Programming Problem Based on LINGO and ...Research on Lexicographic Linear Goal Programming Problem Based on LINGO and ...
Research on Lexicographic Linear Goal Programming Problem Based on LINGO and ...
 
Study of Color Image Processing For Capturing and Comparing Images
Study of Color Image Processing For Capturing and Comparing ImagesStudy of Color Image Processing For Capturing and Comparing Images
Study of Color Image Processing For Capturing and Comparing Images
 
On the Zeros of Polar Derivatives
On the Zeros of Polar DerivativesOn the Zeros of Polar Derivatives
On the Zeros of Polar Derivatives
 
Study Kc - Spaces Via ω-Open Sets
Study Kc - Spaces Via ω-Open SetsStudy Kc - Spaces Via ω-Open Sets
Study Kc - Spaces Via ω-Open Sets
 
Non Split Edge Domination in Fuzzy Graphs
Non Split Edge Domination in Fuzzy GraphsNon Split Edge Domination in Fuzzy Graphs
Non Split Edge Domination in Fuzzy Graphs
 
Private Mobile Search Engine Using RSVM Training
Private Mobile Search Engine Using RSVM TrainingPrivate Mobile Search Engine Using RSVM Training
Private Mobile Search Engine Using RSVM Training
 
Enhance The Technique For Searching Dimension Incomplete Databases
Enhance The Technique For Searching Dimension Incomplete DatabasesEnhance The Technique For Searching Dimension Incomplete Databases
Enhance The Technique For Searching Dimension Incomplete Databases
 
An Algorithm Analysis on Data Mining
An Algorithm Analysis on Data MiningAn Algorithm Analysis on Data Mining
An Algorithm Analysis on Data Mining
 
Delay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSNDelay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSN
 
Analysis of Classification Approaches
Analysis of Classification ApproachesAnalysis of Classification Approaches
Analysis of Classification Approaches
 
Comparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting AlgorithmComparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting Algorithm
 
An Advanced IR System of Relational Keyword Search Technique
An Advanced IR System of Relational Keyword Search TechniqueAn Advanced IR System of Relational Keyword Search Technique
An Advanced IR System of Relational Keyword Search Technique
 
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
 
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETEntropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
 

Similar to Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network

Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
IJCSIS Research Publications
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
Pallavi Agarwal
 
VANET Clustering Survey
VANET Clustering SurveyVANET Clustering Survey
VANET Clustering Survey
ANKIT temurnikar
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
IJERA Editor
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
Pallavi Agarwal
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
Pallavi Agarwal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANET
paperpublications3
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
RK CONSULTANCY SERVICES
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Editor IJCATR
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
IOSR Journals
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
IJECEIAES
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
rifat1tasnim
 
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
IJMER
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018IJMER
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
IJCNCJournal
 

Similar to Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network (20)

Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 
Security and Trust Management in VANET
Security and Trust Management in VANETSecurity and Trust Management in VANET
Security and Trust Management in VANET
 
VANET Clustering Survey
VANET Clustering SurveyVANET Clustering Survey
VANET Clustering Survey
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANET
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
 
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 259 Paper Publications Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network 1 Dalbir Singh, 2 Amit Jain (Asst. Prof.) 1,2 Panchkula Engineering College, Mouli, Panchkula (Haryana), India Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications. Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio. Keywords: VANET, AODV, ROUTING, ROUT TABLE. I. INTRODUCTION Vehicular Ad Hoc Network (VANETs) is a mobile network where a short lived and self organizing network is formed among the vehicles. Network operates either in an infrastructure network (V2X) or in an infrastructure less network (V2V). In an infrastructure network, Road Side Units (RSUs) interacts with vehicles’ wireless equipments in a sporadically mode when a vehicle passes by it. In an infrastructure less network, Vehicles communicate with other vehicles’ on-Board Units (OBUs) to exchange security messages. Each vehicle is equipped with a set of sensors such as GPS, Radar, and Directional antenna [1]. The characteristics of this network are: wireless medium, mobile nature, high mobility, absence of infrastructure, high dynamic network topology [2]. Due to lack of fixed infrastructure, nodes are prone to varied attacks. Securing the communication among vehicles is the main challenge that lies in the vehicular network. Deployment of network intrusion detection system helps in identifying the attack taken place in vehicular network [3]. Nodes in VANET are subjected to various types of impersonation attacks, few of which are hard to deal with, even if any security mechanisms are enforced. Some of which are Sybil attack, stolen identity attack, Man-in-the- Middle attack. Identification of the node and its authentication are of fundamental importance within a secure network [4]. Over the last few decades, many researches and efforts have been done to investigate various issues related to V2I, V2X areas. Several approaches to deal with identification of the node and its authentication in VANET have been proposed in the literature. Norbert Bibmeyer [9] et al proposes a scheme based on data plausibility check that ensures positional reliability in order to assess the trustworthiness of the neighboring node. S. RoselinMary [3] et al proposes an attacked packet detection algorithm to detect the position of the vehicle and checks whether the packet sent by the vehicle has been
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 260 Paper Publications attacked or not. The proposed scheme floods the beacons into the network to discover the presence of the neighboring vehicles and accurate position of the messaged vehicle is detected. It verifies the MD5 hashes assigned to the VANET nodes and once a malicious node is detected, warning message will be broadcasted to all the trusted VANET nodes and the malicious node is isolated from the communication environment. Authentication is done through VANET Content Fragile Watermarking. In this paper We focus on security, faulty node detection and authentication schemes. A city scenario is considered with 10 vehicles and 3 RSUs and it is further analyzed on the basis of various performance metrics. In this section we thoroughly discussed about different routing methods used for VANET. The reason of conducting detailed literature review for VANET routing methods was to check how the VANET routing is influenced by routi ng protocols which are currently being used by MANET and VANET. Furthermore, MANET routing protocols which are suitable to some extent for VANET were also kept in context while conducting the literature review. In addition, it also assisted us in selecting the suitable routing protocols in order to make comparison with VANET routing protocols. This comparison was based on evaluating the performance of these routing protocols in VANET. In general, there are two methods of vehicle detection: intrusive technologies (pneumatic road tubes, inductive loop detectors, piezoelectric sensors) and non-intrusive technologies (video image processors, microwave radars, infrared sensors, and ultrasonic sensors) [25]. An inductive loop detector consists of three components: a loop, a loop extension cable and a detector [26]. Loop detectors are placed at specified locations on roadways to count vehicles and to estimate vehicle speed based on the occupancy time of vehicles on the detectors. However, installing these detectors requires a great number of saw-cuts on roadway surfaces, which makes them difficult to deploy and maintain. This work is much more expensive on roadway sections which need a large number of loop detectors. Moreover, loop detectors can provide data only from vehicle to infrastructure and not vice versa. In order to improve the vehicle detection technique for ITS, wireless communication systems have already been studied. Wireless communication systems used in ITS can be classified into 2 types: vehicle-to-vehicle communication (V2V) and vehicle-to-infrastructure communication (V2I). Some systems such as VETRAC [14] and COC [15] which employ V2V and V2I to provide more functions for roadway security and management are being developed. Azzedine Boukerche et.al (2008) [17] paper proposes a vehicle volume and speed measurement method using wireless communications between roadside equipment and vehicles. Vehicles are equipped with Global Positioning System (GPS) receivers and wireless communication devices, to detect their geographical location and to provide ad-hoc network connectivity with the roadside unit respectively. To carry out the functions of a loop detector, roadside equipment collects data from vehicles to detect their locations periodically and then counts the number of vehicles passing a given position in a period, but the authors have taken the scenario that the ranges of RSUs are set in such a way that they do not overlap with each other but also there should not be any gap in the coverage range of the RSUs. This scenario gives a good detection result but could not be applied to the sparse RSUs region where no of RSUs are less. Rajendra Prasad et al. (2013) [18] the authors propose a novel RF-based Vehicle detection and Speed Estimation system (ReVISE). It makes use of the fact that the wireless signal strength in an RF environment is affected by the presence and motion of objects and hence the wireless signals can be used to infer the state of the environment and identify objects in the area Of interest only, not in all regions. So a vehicle can move to any speed in the area where there is no existence of RF signal. In order to overcome these all drawbacks we propose a novel detection system which can detect vehicles in all regions. SeonYeong Han et al. (2013) [19] coveys that in mobile ad-hoc networks, local link connectivity information is extremely important for route establishment and maintenance. Periodic Hello messaging is a widely used scheme to obtain local link connectivity information. However, unnecessary Hello messaging can drain batteries while mobile devices are not in use. This paper proposes an adaptive Hello messaging scheme to suppress unnecessary Hello messages without reduced detect ability of broken links. Simulation results show that the proposed scheme reduces energy consumption and network overhead without any explicit difference in throughput. In this paper, they proposed an adaptive Hello interval to reduce battery drain through practical suppression of unnecessary Hello messaging. Based on the event interval of a node, the Hello interval can be enlarged without reduced detects ability of a broken link, which decreases network overhead and hidden energy consumption.
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 261 Paper Publications Ehsan Mostajeran, RafidahMd Noor et al. (2013) [20] conveys that Ad-hoc On-Demand Distance Vector (AODV) is one of the ad-hoc routing protocols utilized in MANET and VANET. On-Demand routing protocols find their destinations based on the process of flooding a request to neighbors searching for their destinations. Neighbors of nodes are detected based on the neighbor discovery method, which periodically broadcasts HELLO messages to detect available neighbors at time. Generating routing packets and neighbor discovery messages produce high overhead in the On-Demand routing protocol, such as AODV. In order to overcome such issues, a novel scheme in Ad-hoc networks based on Intelligent- AODV (I-AODV) is proposed. This scheme functions to exploit neighbor discovery and reduce the overhead of neighbor discovery processes. This paper introduced an innovative, improved neighbor discovery method for Mobile Ad-hoc routing protocols, called Intelligent-AODV. It provides reasonable performance by updating the neighbor list based on routing packets such as RREQ, RREP and RERR. Moreover, the broadcast of HELLO messages is filtered by checking the destination node in the neighbor list to reduce overhead. Simulation results of the proposed neighbor discovery method based on mobility in various scenarios and compared with the original AODV demonstrate that I-AODV performs better. II. PROBLEM EXPLANATION AND PROPOSED WORK a) PROPOSED WORK: The AODV maintains the neighbors which used in recently transmission sending event of the node. But AODV does not validate next neighbor frequently as VANET are highly dynamic scenario so nodes changing its position very frequently. To solve this problem of the AODV we have proposed a dynamic neighborhood expiry time so that whenever nodes changing its position frequently they can dynamically update neighbor table and nodes transmitted its packet to the nodes which is more trusted as compare to the nodes which already exist in the neighbor table, to solve this problem we basically reduces the neighbor hood expiry time of protocol as well as improve the packet salvaging, in the next section of the paper our results proves the effectiveness of our approach. III. RESULTS AND DISCUSSIONS The performance of I-AODV and OLSR routing protocol is compared against representatives from the main classes of routing protocols that are AODV and OLSR. where AODV and OLSR are topology based routing protocols. A review of these routing protocols already taken in previous chapters. In this chapter, we describe how simulation is done and what the results of the simulation are. The simulation is done in 2 phases and two different simulator have been used One is SUMO(Simulation of Urban Mobility) for road traffic simulation and Veins (Vehicular environment in Network Simulation) for network simulation We use simulation to evaluate the performance of the proposed I-AODV, AODV and OLSR routing protocols with respect to PDR (packet delivery ratio) and end to end delay time features. We simulate network consisting of nodes field of 2500m × 8000m square area. Nodes have different transmission rate 100,200,300,400,500,600,700 and 800. The simplest and usually the first thing to setup a network is creating a node. A network is build up from its layers components such as Link layer, MAC layer and PHY layer. The components have to be defined before a node can be configured. Table 5.1 shows the parameters used in the simulation. Table 1.1: Network parameter definition Parameter Name Parameter Value channel type Channel/Wireless Channel mac protocol Mac/802_11 number of nodes 10, 20, 30, 40, 60 routing protocol AODV, IAODV,OLSR grid size 2500 x 800 sq.m packet size 1000 simulation time Different traffic type Cbr
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 262 Paper Publications Figure 1.1: This scenario shows that the initial position of the vehicle at time 316.2ms Graphs Display Figure 1.2: End to End delay comparison of AODV, OLSR and I-AODV End to end delay in highway scenario: The simulation results of end to end delay in highway scenario vehicle environment is shown in below figure 5.20 from this figure it is clear that I-AODV and OLSR are perform better than AODV routing protocols. It means that end to end delay is reduced while we uses I-AODV and OLSR routing protocols in highway scenario. In highway scenario it is clear from below figure 5.20 that AODV is worst routing protocol when we considering end to end delay. AODV routing protocol working very well in MANET but in VANET area it is not give optimum results as it give in MANET environment. When we talking about end to end delay then I-AODV has also better perform than OLSR because I-AODV consumes some time in calculation of trust value of nodes. Figure 1.3: Packet Delivery ratio of AODV, OLSR and I-AODV
  • 5. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 263 Paper Publications PDR in highway scenario: The simulation results of highway scenario vehicle environment is shown in below figure 5.21 from this figure it is clear that I-AODV is perform better than AODV and OLSR routing protocols. It means that packet drop is reduced while we uses I-AODV routing protocol either in open scenario or highway scenario. In highway scenario it is clear from below figure 5.21 that AODV is worst routing protocol when talking about PDR values. Figure 1.4: Comparison of throughput between AODV, OLSR and I-AODV Throughput in highway scenario: The simulation results of highway scenario vehicle environment is shown in below figure 5.22 from this figure it is clear that I-AODV is perform better than AODV and OLSR routing protocols. It means that throughput increases while we use I-AODV routing protocol either in open scenario or highway scenario. In highway scenario it is clear from below figure 5.22 that OLSR is worst routing protocol when talking about THROUGHPUT values. This thesis work briefly describes about the four routing protocols for VANETS. It includes detailed discussion of AODV, OLSR and I-AODV which is the most widely used protocols that perform better than the rest of protocols. These are compared with our proposed routing protocol I-AODV which takes the benefit of AODV. I-AODV improves the PDR as compared to AODV because I-AODV selects the node on basis of trust value and trust value for any node becomes low if that node drops packets. If we have two equidistant nodes form source and destination, then we select the node with higher trust value to forward the packet. This approach results in reducing the total number of packets dropped and hence will result in increased packet delivery ratio of the network. The advantage of I-AODV protocol is that it selects the most trustworthy node which drops less number of packets. So the selection of the node with highest trust value increases packet delivery ratio of I-AODV in comparison to AODV and OLSR. The drawback of the I-AODV protocol is the computation required for calculating trust value of node, results in increase of end to end delay. So end to end delay is slightly more than AODV but it is very less as compared to OLSR. IV. CONCLUSION In this paper briefly describes about the routing protocols for VANETS. It includes detailed discussion of AODV and OLSR which are the most widely used protocols that perform better than the rest of protocols. In further we improved AODV in terms PDR, End to End Delay and throughput and successfully compared with existing AODV and OLSR protocol. REFERENCES [1] Manvi S.S., Kakkasageri M.S., Mahapurush C.V., “Performance Analysis of AODV, DSR, and Swarm Intelligence Routing Protocols In Vehicular Ad hoc Network Environment” In International conference on future Computer and Communication., pp. 31-35, April. 2009. [2] Bernsen, J. Manivannan, D., “Routing Protocols for Vehicular Ad Hoc Networks That Ensure Quality of Service” In the fourth international conference on Wireless and Mobile Communications., pp.1-6, Aug. 2008.
  • 6. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 264 Paper Publications [3] Wex, P. Breuer, J. Held, A. Leinmuller, T. Delgrossi, L., “Trust Issues for Vehicular Ad Hoc Networks” IEEE,VTC Spring 2008., pp. 2800-2804, May.2008. [4] R. Lind et al, “The network vehicle. A glimpse into the future of mobile multimedia”, IEEE Aerosp. Electron. Syst. Mag., 1999. [5] Car-to-Car Communications, www.car-2-car.org. [6] H Fussler, S Schnaufer, M Transier , W Effelsberg, ”Vehicular Ad-Hoc Networks: From Vision to Reality and Back”, Proc. Of IEEE Wireless on Demand Network Systems and Services, 2007. [7] Ghassan Samara, Wafaa A.H. Al-Salihy, R. Sures, “Security Analysis of Vehicular Ad Hoc Networks”, Second International Conference on Network Applications, Protocols and Services, 2010. [8] R. Parker, S.Valaee, "Vehicle localization in Vehicular Networks", Vehicular Technology Conference, 2006. VTC- 2006 Fall. 2006 IEEE 64th, 2006, pp. 1–5. [9] A. Benslimane, "Localization in Vehicular Ad Hoc Networks", Proceedings Systems Communications, 2005. [10] T. Taleb, E. Sakhaee, A. Jamalipour, K. Hashimoto, N. Kato, and Y. Nemoto, “A stable routing protocol to support its services in vanet networks” IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3337–3347, November 2007. [11] C.Perkins and E. Royer, “Ad-hoc on-demand Distance Vector Routing”, IEEE Workshop. Mobile Comp.sys.App., pp. 90-100, Feb. 1999. [12] David B. Johnson, David A. Maltz, and Josh Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop WirelessAd Hoc Networks”, in Ad Hoc Networking, Editor: Charles E.Perkins, Chapter 5, pp. 139-172, Addison- Wesley, 2001. [13] Ding Y, Wang C, Xiao L “A static-node assisted adaptive routing protocol in vehicular networks” In Proceedings of the Fourth ACM international Workshop on Vehicular Ad Hoc Networks VANET, pp 59–68, 2007. [14] J. Chennikara-Varghese, W. Chen, O. Altintas, S. Cai, “Survey of routing protocols for inter-vehicle communications,” 3rd Annual International Conference on Mobile and Ubiquitous Systems -Workshops, 2006. [15] Kevin C. Lee, UCLA, USA Uichin Lee, UCLA, USA Mario Gerla, UCLA, USA,“Survey of Routing Protocols in Vehicular Ad Hoc Networks”. [16] R. Gass, J. Scott, and C. Diot, “Measurements of In-Motion 802.11 Networking”, In IEEE Workshop on Mobile Computing System and Applications (Hotmobile 2006), April 2006. [17] Boukerche, Azzedine, et al. "Vehicular ad hoc networks: A new challenge for localization-based systems." Computer communications 31.12 (2008): 2838-2849. [18] Nayak, Rajendra Prasad. High Speed Vehicle Detection in Vehicular Ad-hoc Network. Diss. 2013. [19] Han, Seon Yeong, and Dongman Lee. "An adaptive hello messaging scheme for neighbor discovery in on-demand MANET routing protocols."Communications Letters, IEEE 17.5 (2013): 1040-1043. [20] Keshavarz, Hassan, Rafidah Md Noor, and Ehsan Mostajeran. "Using routing table flag to improve performance of AODV routing protocol for VANETs environment." The 9th International Conference on Computing and Information Technology (IC2IT2013). Springer Berlin Heidelberg, 2013.