4.7 Review

A systematic review on routing protocols for Vehicular Ad Hoc Networks

期刊

VEHICULAR COMMUNICATIONS
卷 1, 期 1, 页码 33-52

出版社

ELSEVIER SCIENCE BV
DOI: 10.1016/j.vehcom.2014.01.001

关键词

Vehicular Ad Hoc Networks; Routing; Mobility

资金

  1. TCS, New Delhi

向作者/读者索取更多资源

Vehicular Ad Hoc Networks (VANETs) have emerged as a new powerful technology with an aim of providing safety for the persons sitting in the vehicles. Vehicles may be connected to the Internet with/without the existing infrastructure using various IEEE standards such as IEEE 802.11p. But as nodes in VANETs have very high mobility, so there are lots of challenges to route the packets to their final destination which need to be addressed by existing/proposing new solutions for the same. Keeping in view of the above, this paper provides a detailed description of various existing routing techniques in literature with an aim of selecting a particular strategy depending upon its applicability in a particular application. A detailed categorization of various routing techniques is provided in the paper with critical discussion on each categorization with respect to its advantages, disadvantages, various constraints and applications. Finally, numbers of parameters are selected for comparison and analysis of all the existing routing schemes in the literature. (C) 2014 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

An enhanced whale optimization algorithm for clustering

Hakam Singh, Vipin Rai, Neeraj Kumar, Pankaj Dadheech, Ketan Kotecha, Ganeshsree Selvachandran, Ajith Abraham

Summary: This study introduces an enhanced whale optimization algorithm (EWOA) for clustering problems. By incorporating the position update equations from the water wave optimization algorithm and adding tabu and neighbourhood search mechanisms, the algorithm improves the search space and accelerates the convergence rate. Experimental results demonstrate the applicability and feasibility of the enhancements and the superiority of the proposed EWOA clustering algorithm.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

An overview of violence detection techniques: current challenges and future directions

Nadia Mumtaz, Naveed Ejaz, Shabana Habib, Syed Muhammad Mohsin, Prayag Tiwari, Shahab S. Band, Neeraj Kumar

Summary: This paper discusses the generation of big video data in smart cities and focuses on violence detection using deep learning approaches. The paper provides an overview of deep sequence learning methods and localization strategies for violence detection. It also explores the initial image processing and machine learning-based violence detection literature and their advantages and disadvantages. Additionally, the paper discusses datasets and proposes future directions in the violence detection domain based on in-depth analysis of previous methods.

ARTIFICIAL INTELLIGENCE REVIEW (2023)

Review Computer Science, Information Systems

A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues

Deepanshi, Ishan Budhiraja, Deepak Garg, Neeraj Kumar, Rohit Sharma

Summary: SARS-CoV-2 is an infected disease caused by one of the variants of Coronavirus which emerged in December 2019. It is declared a pandemic by WHO in March 2020. COVID-19 outbreak has put the world on a halt and is a major threat to the public health system. Despite of numerous efforts, precautions and vaccination the infection has grown rapidly in the world.

COMPUTER COMMUNICATIONS (2023)

Article Computer Science, Theory & Methods

On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives

Anichur Rahman, Kamrul Hasan, Dipanjali Kundu, Md. Jahidul Islam, Tanoy Debnath, Shahab S. Band, Neeraj Kumar

Summary: The individual and integrated use of IoT, ICN, and FL in network-related scenarios has gained significant attention in the research community. FL addresses privacy and security issues in a decentralized manner, while ICN retrieves and stores content based on content names rather than addresses. The upcoming 6G networks are expected to support massive IoT devices, and this research highlights the potential of ICN for IoT applications. This study provides a comprehensive survey of FL, IoT, and ICN, and discusses their integration and future directions.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Engineering, Electrical & Electronic

SanJeeVni: Secure UAV-Envisioned Massive Vaccine Distribution for COVID-19 Underlying 6G Network

Ashwin Verma, Pronaya Bhattacharya, Deepti Saraswat, Sudeep Tanwar, Neeraj Kumar, Ravi Sharma

Summary: Recently, UAVs have been used for COVID-19 vaccine distribution to address fake vaccine issues. The authors propose a blockchain-assisted UAV vaccine distribution scheme based on sixth-generation enhanced ultra-reliable low latency communication (6G-eRLLC). The scheme utilizes a public Solana blockchain setup for user registration, vaccine request, and distribution, ensuring scalable transactions. With an intelligent edge offloading scheme, UAV swarms are deployed to deliver vaccines to nodal centers, showing significant improvements in service latency, energy reduction, UAV coverage, and storage cost compared to 5G uRLLC communication and Ethereum network.

IEEE SENSORS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks

Dan Tang, Xiyin Wang, Xiong Li, Pandi Vijayakumar, Neeraj Kumar

Summary: Low-rate denial of service (LDoS) attacks exploit network protocol vulnerabilities to launch periodic bursts, severely impacting TCP application quality of service. Current coarse-scale detection methods are ineffective. To accurately detect LDoS attacks, an adaptive Kohonen Network based fine-grained detection (AKN-FGD) model is proposed. The AKN-FGD scheme achieves accurate detection with high detection performance and adaptability, outperforming other methods.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Artificial Intelligence

FHC-NDS: Fuzzy Hierarchical Clustering of Multiple Nominal Data Streams

Jerry W. Sangma, Yogita, Vipin Pal, Neeraj Kumar, Riti Kushwaha

Summary: This article proposes a fuzzy hierarchical clustering method for clustering multiple nominal data streams using the clustering-by-variable approach. The method calculates the fuzzy affinity of data streams to different clusters using normalized cosine similarity and updates the hierarchical clustering structure based on changes in node entropy. Experimental results show that the proposed method outperforms other methods in terms of cluster quality and has great potential in capturing fuzzy clusters.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2023)

Article Automation & Control Systems

Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things

Yajie Wang, Yu-an Tan, Thar Baker, Neeraj Kumar, Quanxin Zhang

Summary: Industry 5.0 aims to merge the cognitive computing capabilities of DNNs with human resourcefulness in collaborative operations. However, DNNs are vulnerable to adversarial attacks, bringing risks to Industrial AIoT systems. To solve these problems, we propose two novel deep fusion methods.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

SecGreen: Secrecy Ensured Power Optimization Scheme for Software-Defined Connected IoV

Rajat Chaudhary, Neeraj Kumar

Summary: Software-Defined Internet of Vehicles (SD-IoV) is an emerging technology used in modern intelligent transportation systems. The goal of SD-IoV is to provide seamless connectivity with low latency and high-speed data transfer. However, the challenges of high power consumption and secure data transfer arise due to the increased density of connected vehicles using the Internet. In this paper, a joint power optimization and secrecy ensured scheme known as SecGreen is proposed to address these issues.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Engineering, Electrical & Electronic

ALPS: An Adaptive Link-State Perception Scheme for Software-Defined Vehicular Networks

Na Lin, Dewei Zhao, Liang Zhao, Ammar Hawbani, Mohsen Guizani, Neeraj Kumar

Summary: The software-defined vehicular networking (SDVN) paradigm alleviates the deficiencies brought on by distributed vehicular. In this paper, we propose an adaptive link-state perception scheme (ALPS) for SDVN, which enables the controller to timely obtain the link-state within the beacon interval. ALPS obtains the link-state by detecting packet loss on a link, and includes a link quality evaluation method based on fuzzy logic and an adaptive threshold adjustment method to decrease the detection cost. Simulation results demonstrate that ALPS can effectively reduce packet loss ratio at a low cost.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

FIMBISAE: A Multimodal Biometric Secured Data Access Framework for Internet of Medical Things Ecosystem

Tauheed Ahmed, Shabnam Samima, Mohd Zuhair, Hemant Ghayvat, Muhammad Ahmed Khan, Neeraj Kumar

Summary: Safeguards against illegitimate access and identification are necessary in the Internet of Medical Things (IoMT) domain. Existing user identification schemes struggle with impersonation attacks, leaving systems vulnerable. This study explores the use of multimodal biometrics, specifically fingerprint and iris modalities, to develop an identification and access control system for the healthcare ecosystem.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Secure Smart Healthcare Framework Using Lightweight DNA Sequence and Chaos for Mobile-Edge Computing

Ashish Singh, Kakali Chatterjee, Anish Kumar Singh, Neeraj Kumar

Summary: Mobile-edge computing (MEC) is a new architecture providing services at the network edge, with potential applications in healthcare for remote patient monitoring, diagnosis, and treatment. However, there are security and privacy concerns related to remote data access, including unauthorized access and data leakage, which can make the system inconvenient, untrusted, less suitable, and vulnerable.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Deep Reinforcement Learning Algorithm for Latency-Oriented IIoT Resource Orchestration

Peiying Zhang, Yi Zhang, Neeraj Kumar, Ching-Hsien Hsu

Summary: Due to geographical factors and resource constraints, the traditional Internet architecture cannot meet the needs of the space-air-ground-integrated network (SAGIN) resource layout in the Industrial Internet of Things (IIoT) service. This article proposes a latency-sensitive VNE algorithm based on deep reinforcement learning (DDRL-VNE) in the SAGIN environment to efficiently arrange network resources and meet the quality of service requirements of users. Experimental results effectively illustrate the effectiveness of the algorithm in the SAGIN resource allocation problem.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

A cryptographic security framework for hybrid Cloud-Internet of Things network

Sameer Farooq, Priyanka Chawla, Neeraj Kumar

Summary: Cloud technology has revolutionized the computer paradigm by transforming offline systems into powerful interactive ones. However, ensuring security and accessibility of cloud-stored data remains a challenge. This article presents a four-phased security paradigm for safeguarding data from IoT devices transmitted to fog servers.

SECURITY AND PRIVACY (2023)

Article Engineering, Civil

MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs

Muhammad Ayzed Mirza, Junsheng Yu, Salman Raza, Manzoor Ahmed, Muhammad Asif, Azeem Irshad, Neeraj Kumar

Summary: This paper proposes a mobility, contact, and computational load-aware (MCLA) task offloading scheme for heterogeneous vehicular edge computing networks, which integrates different wireless technologies to improve network performance and meet low-latency and cost constraints. The scheme leverages the computational power of public vehicles and shareable computations from passengers' mobile equipment to enhance computation capacity. Extensive evaluations show that the MCLA scheme significantly improves task turnover ratio by 4%-15% with lower transmission and computation costs of 4.7%-29.8%.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

暂无数据