Design and Analysis of Spawn Protocol for Secure Communication in VANET

  • Authors

    • Senthamil Selvan
    • Dr. Wahidabanu
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.19.22091
  • Vehicular Networks, Content Distribution, SPAWN Protocol, Data Dissemination, Broadcast, Spatial Range Suspicion, Suspicion Validation and Adjustable Gridlock Control Scheme.
  • Wireless Sensor Networks are seen as enormous accumulations of small sensor hubs that can order themselves in an Adhoc framework.  Energy efficiency and coverage sensing distance networks have increased an essential metrics for enhancing the Vehicular Adhoc Networks. Traffic density is an important metric in monitoring traffic conditions to improve free from risk and efficiency of roads. The upside of the spatial assorted qualities and communicate nature of wireless transmissions to embrace an agreeable approach. We propose SPAWN (Swarming Protocol for WANET), an easy way for content release in future WANET. The distribution involved in strategy from the standpoint of WANET. To address these issues, to propose a novel Grid based on road localization system, it develops an analytical model that accurately characterizes the maximum throughput rate performance achievable under a prescribed outage probability constraint. On the premise of formal set hypothesis, as appeared from the point of view of worldwide versatile WSN activities, and how neighbourhood movement adjustment is ensured. Enactment is hold using NS2 to appraise the action of the integrated network design.

     

     

  • References

    1. [1] A. L. Bertozzi, J. B. Garnett, and T. Laurent, “Characterization of radially symmetric nite time blowup in multidimensional aggregation equations," SIAM J. Math. Anal., vol. 44, no. 2, pp. 651681, 2012.

      [2] F. Boccardi, R.W. Heath, A. Lozano, T.L. Marzetta, and P. Popovski, “Five disruptive technology directions for 5Gâ€, IEEE Comm. Mag., vol. 52, no. 2, pp. 74{80, Feb. 2014.

      [3] G. Bresler, A. Parekh, and D.N.C. Tse, “The approximate capacity of the many-tone

      [4] and one-to-many Gaussian interference channels", IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4566{4592, Sep. 2010.

      [5] R. Cramer, Y. Dodis, S. Fehr, C. Padro, and D. Wichs, “Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors," Adv. Cryptology {EUROCRYPT 2008, Berlin, Germany: Springer Berlin-Heidelberg, pp. 471{488, 2008.

      [6] D. Wang, Q. Zhang, and J. Liu, “Partial Network Coding for Continuous Data Collection in Sensor Networksâ€, in Proc. of the Fourteenth IEEE International Workshop on Quality of Service (IWQoS), 2006.

      [7] N. di Pietro, “On innate and nite lattice constellations for the additive white Gaussian

      [8] noise channel," Ph.D. dissertation, Math. Dept., Univ. Bordeaux, Bordeaux, France, 2014.

      [9] Joshi H. P., M. Sichitiu, and M. Kihl, “Distributed robust Geocast multicast routing for inter-vehicle communicationâ€, in Proceedings of WEIRD Workshop on WiMax, Wireless and Mobility, 2007, pp. 9-21.

      [10] Swastik Brahma a, Mainak Chatterjee et. Al., “Traffic management in wireless sensor networks: Decoupling congestion control and fairnessâ€, Computer Communications 35 (2012) 670.681.

      [11] Vehicular Ad-hoc Networks (VANET), in Proceedings of “ACM International Symposium on Mobile Ad hoc Networking and Computingâ€, 2008, pp. 3020-3026.

      [12] Yang X., L. Liu, N.H. Vaidya, and F. Zhao, "A vehicle-to-vehicle communication protocol for cooperative collision warning in VANET", In Proceedings of the 1st International Conference on Networking and Services, 2004, pp.114-123.

      [13] Zong Da Chen, H.T. Kung, and Dario Vlah. “Ad hoc wireless networks over moving vehicles on highwaysâ€, In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, Oct. 2001, pp. 45-52.

      [14] I. Csiszar and P. Narayan, Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047{3061, Dec. 2004.

  • Downloads

  • How to Cite

    Selvan, S., & Wahidabanu, D. (2018). Design and Analysis of Spawn Protocol for Secure Communication in VANET. International Journal of Engineering & Technology, 7(4.19), 360-365. https://doi.org/10.14419/ijet.v7i4.19.22091