212 research outputs found

    A novel k-means powered algorithm for an efficient clustering in vehicular ad-hoc networks

    Get PDF
    Considerable attention has recently been given to the routing issue in vehicular ad-hoc networks (VANET). Indeed, the repetitive communication failures and high velocity of vehicles reduce the efficacy of routing protocols in VANET. The clustering technique is considered an important solution to overcome these difficulties. In this paper, an efficient clustering approach using an adapted k-means algorithm for VANET has been introduced to enhance network stability in a highway environment. Our approach relies on a clustering scheme that accounts for the network characteristics and the number of connected vehicles. The simulation indicates that the proposed approach is more efficient than similar schemes. The results obtained appear an overall increase in constancy, proven by an increase in cluster head lifetime by 66%, and an improvement in robustness clear in the overall reduction of the end-to-end delay by 46% as well as an increase in throughput by 74%

    Connectivity Analysis in Vehicular Ad-hoc Network based on VDTN

    Get PDF
    In the last decade, user demand has been increasing exponentially based on modern communication systems. One of these new technologies is known as mobile ad-hoc networking (MANET). One part of MANET is called a vehicular ad-hoc network (VANET). It has different types such as vehicle-to-vehicle (V2V), vehicular delay-tolerant networks, and vehicle-to-infrastructure (V2I). To provide sufficient quality of communication service in the Vehicular Delay-Tolerant Network (VDTN), it is important to present a comprehensive survey that shows the challenges and limitations of VANET. In this paper, we focus on one type of VANET, which is known as VDTNs. To investigate realistic communication systems based on VANET, we considered intelligent transportation systems (ITSs) and the possibility of replacing the roadside unit with VDTN. Many factors can affect the message propagation delay. When road-side units (RSUs) are present, which leads to an increase in the message delivery efficiency since RSUs can collaborate with vehicles on the road to increase the throughput of the network, we propose new methods based on environment and vehicle traffic and present a comprehensive evaluation of the newly suggested VDTN routing method. Furthermore, challenges and prospects are presented to stimulate interest in the scientific community

    Networks, Communication, and Computing Vol. 2

    Get PDF
    Networks, communications, and computing have become ubiquitous and inseparable parts of everyday life. This book is based on a Special Issue of the Algorithms journal, and it is devoted to the exploration of the many-faceted relationship of networks, communications, and computing. The included papers explore the current state-of-the-art research in these areas, with a particular interest in the interactions among the fields

    An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm

    Get PDF
    Improving wireless communication and artificial intelligence technologies by using Internet of Things (Itoh) paradigm has been contributed in developing a wide range of different applications. However, the exponential growth of smart phones and Internet of Things (IoT) devices in wireless sensor networks (WSNs) is becoming an emerging challenge that adds some limitations on Quality of Service (QoS) requirements. End-to-end latency, energy consumption, and packet loss during transmission are the main QoS requirements that could be affected by increasing the number of IoT applications connected through WSNs. To address these limitations, an effective routing protocol needs to be designed for boosting the performance of WSNs and QoS metrics. In this paper, an optimization approach using Particle Swarm Optimization (PSO) algorithm is proposed to develop a multipath protocol, called a Particle Swarm Optimization Routing Protocol (MPSORP). The MPSORP is used for WSN-based IoT applications with a large volume of traffic loads and unfairness in network flow. For evaluating the developed protocol, an experiment is conducted using NS-2 simulator with different configurations and parameters. Furthermore, the performance of MPSORP is compared with AODV and DSDV routing protocols. The experimental results of this comparison demonstrated that the proposed approach achieves several advantages such as saving energy, low end-to-end delay, high packet delivery ratio, high throughput, and low normalization load.publishedVersio

    Efficient Message Dissemination on Curve Road in Vehicular Networks

    Get PDF
    Effective emergency message dissemination is a great importance on a specific road in vehicular networks (VN). The existing methods are not most efficient solutions for message dissemination on the curve road, which primarily focus on highway and urban road. In order to improve the efficiency of message dissemination on the curved road, the paper proposed a message dissemination method based on bidirectional relay nodes. The message can be disseminated in two directions simultaneously. The paper designed a relay node selection method based on the neighbor nodes’ coverage length of the road. Different waiting delays are assigned to the neighbor nodes according to the cover capability of the road in which the message has not arrived. Simulation results demonstrated that the efficiency of the proposed method is superior to the common solutions in terms of the contention delay and the propagation velocity

    A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols

    Get PDF
    Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore susceptible to a variety of assaults. Routing technologies such as AODV and dynamic source routing are quite common. Both however are susceptible to a variety of network layer attacks, including black holes, wormholes, rushing, byzantine, information disclosure. The mobility of the nodes and the open architecture in which the nodes are free to join or leave the network keep changing the topology of the network. The routing in such scenarios becomes a challenging task since it has to take into account the constraints of resources of mobile devices. In this  an analysis of these protocols indicates that, though proactive routing protocols maintain a route to every destination and have low latency, they suffer from high routing overheads and inability to keep up with the dynamic topology in a large sized network. The reactive routing protocols in contrast have low routing overheads, better throughput and higher packet delivery ratio. AODVACO-PSO-DHKE Methodology boosts throughput by 10% while reducing routing overhead by 7%, latency by 8% and energy consumption by 5%. To avoid nodes always being on, a duty cycle procedure that's also paired with the hybrid method is used ACO-FDR PSO is applied to a 100-node network and NS-3 is used to measure various metrics such as throughput, latency, overhead, energy consumption and packet delivery ratio

    A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols

    Get PDF
    Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore susceptible to a variety of assaults. Routing technologies such as AODV and dynamic source routing are quite common. Both however are susceptible to a variety of network layer attacks, including black holes, wormholes, rushing, byzantine, information disclosure. The mobility of the nodes and the open architecture in which the nodes are free to join or leave the network keep changing the topology of the network. The routing in such scenarios becomes a challenging task since it has to take into account the constraints of resources of mobile devices. In this an analysis of these protocols indicates that, though proactive routing protocols maintain a route to every destination and have low latency, they suffer from high routing overheads and inability to keep up with the dynamic topology in a large sized network. The reactive routing protocols in contrast have low routing overheads, better throughput and higher packet delivery ratio. AODVACO-PSO-DHKE Methodology boosts throughput by 10% while reducing routing overhead by 7%, latency by 8% and energy consumption by 5%. To avoid nodes always being on, a duty cycle procedure that's also paired with the hybrid method is used ACO-FDR PSO is applied to a 100-node network and NS-3 is used to measure various metrics such as throughput, latency, overhead, energy consumption and packet delivery ratio
    • …
    corecore