Vehicular Adhoc Networks Research Papers (original) (raw)

The issue of noise pollution is very paramount in India, especially cites with huge traffic. One of the major reasons for noise pollution is increasing vehicular honking. Therefore we intend to aid in vehicular honking by bringing in a... more

The issue of noise pollution is very paramount in India, especially cites with huge traffic. One of the major reasons for noise pollution is increasing vehicular honking. Therefore we intend to aid in vehicular honking by bringing in a hardware that involves an individual vehicle to communicate with the other vehicle and blow the horn for the vehicle in front but the horn’s sound will be heard only by the person inside the vehicle. The implementation of directing the horn is achieved through sensors mounted on the vehicles. The vehicles will communicate using Vehicular AdHoc Network (VANET). The use of microcontroller, LCD Display, keypad, sensors and some other electronic devices coupled together will help in accomplishment of our project. Here, we are using transmitters and receivers to form network. Each transmitter and receiver has its own power, range and angle for transmitting and receiving signals. The transmitter will send a signal to the receiver, if the signal is received by the receiver then an acknowledgement is sent to the transmitter, which is indicated by the blinking of a light. On the receiver side, sound is generated by the speaker. If acknowledgement is not received then secondary horn is blown for the concerned person. LCD Display is used for communication between the two vehicles with a standard set of options defined.

In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on... more

In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.

To support diversified quality of service (QoS) demands and dynamic resource requirements of users in 5G driven VANETs, network resources need flexible and scalable resource allocation strategies. Current heterogeneous vehicular networks... more

To support diversified quality of service (QoS) demands and dynamic resource requirements of users in 5G driven VANETs, network resources need flexible and scalable resource allocation strategies. Current heterogeneous vehicular networks are designed and deployed with a connection-centric mindset with fixed resource allocation to a cell regardless of traffic conditions, static coverage and capacity. In this paper, we propose a Hybrid-Fuzzy Logic guided Genetic Algorithm (H-FLGA) approach for the SDN controller, to solve a multi-objective resource optimization problem for 5G driven VANETs. Realizing the service oriented view, the proposed approach formulates five different scenarios of network resource optimization in 5G VANETs. Furthermore, the proposed Fuzzy Inference system (FIS) is used to optimize weights of multi-objectives, depending on the Type of Service (ToS) requirements of customers. The proposed approach shows the minimized value of multi-objective cost function when compared with the GA. The simulation results show the minimized value of end-to-end delay as compared to other schemes. The proposed approach will help the network service providers to implement a customer-centric network infrastructure , depending on dynamic customer needs of users.

The automotive industry has been incorporating various technological advancement on top-end versions of the vehicle order to improvise the degree of comfortability as well as enhancing the safer driving system. Infotainment system is one... more

The automotive industry has been incorporating various technological advancement on top-end versions of the vehicle order to improvise the degree of comfortability as well as enhancing the safer driving system. Infotainment system is one such pivotal system which not only makes the vehicle smart but also offers abundance of information as well as entertainment to the driver and passenger. The capability to offer extensive relay of service through infotainment system is highly dependent on vehicular adhoc network as well as back end support of cloud environment. However, it is know that such legacy system of vehicular adhoc network is also characterized by various problems associated with channel capacity, latency, heterogeneous network processing, and many more. Therefore, this paper offers a comprehensive insight to the research work being carried out towards leveraging the infotainment system in order to obtain the true picture of strength, limitation, and open end problems associated with infotainment system. Keywords: Cloud Infotainment system Internet of vehicle Vehicular adhoc network Vehicular network

Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped... more

Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.

Recent research studies prove that contention-based forwarding (CBF) algorithms are preferable in highly- dynamic vehicular environments. CBF algorithms are beaconless, whereas position-based algorithms rely on periodic beacon information... more

Recent research studies prove that contention-based forwarding (CBF) algorithms are preferable in highly- dynamic vehicular environments. CBF algorithms are beaconless, whereas position-based algorithms rely on periodic beacon information to make forwarding decisions. Considering the store-carry-forward paradigm of delay-tolerant networks, which relies on mobility of vehicles to deliver packets when next forwarding vehicle is unreachable, we proposed a new recovery strategy and enhanced the CBF algorithm to tackle the network disconnection problem that frequently occurs in vehicular wireless networks. This enhanced CBF with a store-carry-forward capability is referred to as CBF-SCF algorithm. The algorithm was simulated, and the results indicate that CBF-SCF outperforms normal CBF in terms of packet delivery ratio and routing overhead.

Cognitive radio based inter vehicle communication system was proposed by the researchers in 2010. They have proposed cognitive radio site (CR-Site) inside the vehicle to solve the problems associated with the single radio access... more

Cognitive radio based inter vehicle communication system was proposed by the researchers in 2010. They
have proposed cognitive radio site (CR-Site) inside the vehicle to solve the problems associated with the
single radio access technologies (GSM/GPRS, CDMA, Wi-Fi) based IVC systems. Our main work is
regarding the introduction of multi-homing module in CR-Site. After receiving quality of service (QoS)
parameters from application cognitive system monitor (CSM) initiates white space optimization module to
optimize the white spaces package according to the requested QoS parameters. GA optimizes the white
spaces and sends them into the optimized white spaces pool. On the reception of admission acceptance,
application sends the data for transmission to the scheduler via CSM. Scheduler initiates its sub module
devisor to divide the data into the packets according to the smallest bandwidth in the optimized whitespace
package. Then these packets are sent using multi white spaces in parallel fashion. Simulation and
analytical experiments reveal that using multi-homing heavy files (videos and text) can be transmitted in
less time as compared to the non multi-homed single RAT (GSM or CDMA or LTE) based V2V
communication systems.

I. ABSTRACT Delay or Disruption Tolerant Networks (DTN)architecture is particularly intended for scenarios in which it is difficult to build infrastructure and for networks characterized by one or more of i)lack of end-to-end... more

I. ABSTRACT Delay or Disruption Tolerant Networks (DTN)architecture is particularly intended for scenarios in which it is difficult to build infrastructure and for networks characterized by one or more of i)lack of end-to-end connectivity, ii)frequent channel errors, ii)limited transmission opportunities, iv)highly asymmetric links, v)low data rates(high delivery delay), vi)heterogeneous network environments and vii)high RTT.DTN architecture is assumed to be implemented in any data network type from legacy connected to challenged intermittently connected mobile adhoc networks (IC-MANETs), from underwater to deep space communication via its adaption layer called Convergence Layer(CL). Despite its generic features, DTN lacks well defined generic routing protocol. There are some papers on routing approaches, especially on georouting, in DTN.These proposed georouting approaches, however, have one or more of the following limitations: simulation based, lack details, genericity, practical applicability and conformance to standard frameworks, and/or are packet based. This paper discusses an approach to a routing protocol based on information given by geographic receivers.Although implementation scope of this paper is DTN, the author assumes its possible adaptability to other MANETs and future adaptability to other types of data networks.Sensor networks, vehicular communications, Intelligent Transport Systems(ITS), etc. benefit much from this approach.

Platooning is both a challenging and rewarding application. Challenging since strict timing and reliability requirements are imposed by the distributed control system. Rewarding since considerable fuel reductions are possible. As... more

Platooning is both a challenging and rewarding application. Challenging since strict timing and reliability requirements are imposed by the distributed control system. Rewarding since considerable fuel reductions are possible. As platooning takes place in a vehicular ad hoc network, the use of IEEE 802.11p is close to mandatory. IEEE 802.11p has problems with its medium access method causing packet collisions and random delays. Therefore, we suggest a token-passing medium access method, where the next token holder is selected based on beacon data age. This has the advantage of allowing beacons to be re-broadcasted in case of extra time in each beacon interval. We show that our token-based method is able to reduce the data age and increase reliability considerably compared to the standard.

the main Theme of this project entitled communication on Adhoc (VLAN) Network is to design and implement a telephony program that uses Wi-Fi in LAN as means of communication between mobile phones. The technology for creating mobile campus... more

the main Theme of this project entitled communication on Adhoc (VLAN) Network is to design and implement a telephony program that uses Wi-Fi in LAN as means of communication between mobile phones. The technology for creating mobile campus network via Wi-Fi. The VLAN is a wireless local area network (VLAN) links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access. The technology of Mobile Virtual LAN, where multiple Mobiles used to create mobile network via Wi-Fi is discussed. In this mobile Wireless network , the single mobile is configured as Server and rest of Mobile phones as clients. The implementation goals includes the several features including, file sharing, browsing and push message notification etc.

The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM) schemes for grayscale image transmission... more

The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM) schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission.

The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs) in order to describe next generation... more

The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as forest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergency workers with intelligent devices such as smart phones and PDAs. This technology allows communication " islets " to be established between the members of the same or different emergency teams (policemen, firemen, paramedics). In this article, we discuss an adaptive and secure routing protocol developed for the purposes of eMANETs. We evaluate the performance of the protocol by comparing it with other widely used routing protocols for MANETs. We finally show that the overhead introduced due to security considerations is affordable to support secure ad-hoc communications among lightweight devices.

This paper presents a review on a major category of coordinated attacks i.e. cooperative blackhole / grayhole attack which are a serious threat to ad hoc network security. In cooperative blackhole attack multiple nodes collude to hide the... more

This paper presents a review on a major category of coordinated attacks i.e. cooperative blackhole /
grayhole attack which are a serious threat to ad hoc network security. In cooperative blackhole attack
multiple nodes collude to hide the malicious activity of other nodes; hence such attacks are more difficult to
detect. In this paper a survey of various security mechanisms that have been proposed in the literature for
diction of such attacks is presented.

MU-MIMO (Multi-User MIMO) has been a promising technique for vehicular networks to achieve faster communication. Conventional MU-MIMO transceiver is designed with One-dimensional (1-D) improper modulation schemes such as Binary Phase... more

MU-MIMO (Multi-User MIMO) has been a promising technique for vehicular networks to achieve faster communication. Conventional MU-MIMO transceiver is designed with One-dimensional (1-D) improper modulation schemes such as Binary Phase Shift Keying (BPSK) and Multilevel Amplitude Shift Keying (M-ASK) failed to yield standard ABER (average bit error rate). To achieve high reliability, a novel MU-MIMO uplink transceiver system is designed under PAPC (Per-Antenna Power Constraint) by assuming perfect and imperfect channel state information (CSI). MIMO communication channels are perceptible. Hence, security of the proposed system is improved by novel pseudorandom key generation technique using randomized synthetic colour image. Analytical design for proposed systems is carried and simulated for various p-norm constraints. Simulation results show higher reliability and security than the existing system. It also satisfies the linearity constraint of a power amplifier, which makes the system more suitable for practical applications.

Spotting Opportunity today and recognizing the same is the vision of the expert. The wireless communication network regime is one such environment that offers such a platform for many working scientific, academic and engineering experts.... more

Spotting Opportunity today and recognizing the same is the vision of the expert. The wireless communication network regime is one such environment that offers such a platform for many working scientific, academic and engineering experts. Henceforth, “Opportunistic-network” is a recent evolution of the above said phenomena in the wireless community. They function by spontaneous cooperation &
coordination giving birth to a special type network called wireless-mobile-adhoc-network (W-MAN). As said, these networks are formed instantaneously in a random manner – breaking the conventional mathematically evolved algorithms’, and provided the quintessential of a network(s) that exist in neighbourhood(s) or approachable limits. Is more of situational based, exploited for specialized purpose or advantage, which mimics all the characteristic of a well evolved network. Such networks, lack an endto-end path, contact, cooperation and coordination; which is mainly opportunity based, and break or even disintegrate soon after discovery, thus the challenge lay in integration, construction and probable sustenance or even mid-way reconstruction till purpose. One can cite many realistic scenarios fitting to this situation. For example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks to mention a few. To transmit information under such circumstances/scenarios researchers have proposed various efficient forwarding (single copy), replication routing and controlled based schemes. In this paper, we propose to explore, investigate and analyze most of the schemes [1] [2] [3] [4] [5] [6] and
present the findings of the said scheme by consolidating critical parameters and issues and towards the end of this paper, algorithms, possible solutions to deal with such complex and dynamic situations through W-MAN scheme suggested by us.

The architecture of Delay or Disruption Tolerant Networks (DTN) is particularly intended for scenarios in which it is difficult to build infrastructure and for networks characterized by one or more of i)lack of end-to-end connectivity,... more

The architecture of Delay or Disruption Tolerant Networks (DTN) is particularly intended for scenarios in which it is difficult to build infrastructure and for networks characterized by one or more of i)lack of end-to-end connectivity, ii)frequent channel errors, ii)limited transmission opportunities, iv)highly asymmetric links, v)low data rates(high delivery delay), vi)heterogeneous network environments and vii)high RTT.DTN architecture is assumed to be implemented in any data network type from legacy connected to challenged intermittently connected mobile adhoc networks (IC-MANETs), from underwater to deep space communication via its adaption layer called Convergence Layer(CL). Despite the genericity of DTN architecture, DTN lacks well defined generic routing protocol. There are some papers on routing approaches, especially on georouting, in DTN.These proposed georouting approaches, however, have one or more of the following limitations: simulation based, lack details, genericity,...

A cellular network is an asymmetric radio network which is made up of fixed transceivers or nodes,maintain the signal while the mobile transceiver which is using the network is in the vicinity of the node.An ad-hoc network is a local area... more

A cellular network is an asymmetric radio network which is made up of fixed transceivers or nodes,maintain the signal while the mobile transceiver which is using the network is in the vicinity of the node.An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other.This paper focuses on various issues, architecture and routing protocols in cellular, adhoc and sensor networks. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.