CHARACTERISTICS AND CHALLENGES OF VANET
1.1 Characteristics of VANET [2, 5]:
Dynamic topology-One of the most important characteristics of VANET is dynamic topology. In this nodes or vehicles move with high speed in respect to each other.
No power constraints and adequate storage -In VANET, we are using vehicles as nodes instead of other devices so vehicles have sufficient amount of energy and power including both processing and storage; so the battery power and storage is not an issue in VANET.
Frequent network disconnection-In VANET, vehicles move very frequently on the roads, in the network due to this the link connectivity in VANET also change frequently. The chances of network disconnection are high when the density of vehicle is low.
Mobility modeling and prediction-Due to high dynamic topology, mobility modeling and prediction play very important role for designing the data dissemination in VANET.
Different communication environments-VANET has two types of environments i.e. highway environment & city environment. In highway traffic environment, the communication is comparatively simpler and straight forward. But in city traffic environment It become quite complex as compare to highway traffic environment.
1.2 Challenges of VANET [6, 7]:
Hidden terminal problem- This problem may occurs when two or more objects sends packets, these packets are not within the direct transmission range of each other. Collide at the common receiver node.
Error prone shared ratio- In VANET, during propagation the radio wave go through several impairments such as attenuation, multipath propagation and interference.
Insecure medium- In VANET, due to broadcasting nature communication is not secure. It is hard for these networks to support different ...
... middle of paper ...
...warding. This protocol also adopt periodic broadcast i.e. used for reduced network fragmentation. In this protocol, a busted vehicle disseminate an alert message to all vehicles in the group and the neighbor which received alert message analyze its applicability based on their location informing to the risk area.
Robust Vehicular Routing Protocol (ROVER) [9] is geographical multicast protocol. In ROVER, control packets are using broadcasting and data packets are using unicasting mechanism. The main goal of this protocol is to broadcast a message to all presented vehicles in the specified zone of relevance (ZOR). ZOR can be designate as a rectangle specified by its corner coordinates. In this, a message can be described by using three terms called triplet (application, message, ZOR). If the vehicle within its ZOR and received a message then it accepts that message.
Troubleshooting media problems on a bus networks can be very tedious, since a break in the backbone will bring down the entire LAN. For this reason, bus topology is not considered one of the more robust network topologies, compared with star or mesh. A loose or missing terminating resistor can also bring down a LAN.
...ch Transportation Institute Provides Insight into Cell Phone Use and Driving Distraction." Virginia Tech News. Virginia Tech Transportation Institute, Virginia Tech, 2009. Web. 09 Apr. 2014.
The fast population growth rate of humans means that the necessity for transportation vehicles is also enormously increasing. Studies have shown that in 1999 the worldwide number of vehicles registered was 700 million. From this huge number of vehicles, the US has a
...and it may be helpful, but the analysis has not revealed it yet. A speed and curve warning is a different system that uses someone’s GPS. The current GPS system might offer a warning feature if someone will go over the speed limit. More significant examples of GPS based automobile technology are just around the turn. Already being tested in different countries that Europe is the built-in Intelligent Speed Adaptation, which subjects speeding alerts and can also make it harder to press further down on the accelerator or it can even automatically stop the automobile. Taking curves too careless, another common cause of accidents is also the focus of warning device research and field testing. Such a device would warn someone to slow down when a sharp curve coming before it is too late. It is another request of GPS technology that could improve the safety of the driver.
Ways that driverless cars will reduce delays is that they will prevent collisions (Winston), they will drive in harmony with one another, and they have the ability to maneuver around certain roads. Statistics say that the driverless cars are safer than human driving, even with their small errors (Symonds). About 1.3 million people are killed in car accidents each year (Pollette). This number will be drastically reduced since driverless cars are operated by a computer that processes information ten times per second, which is faster than human comprehension, and is sourced from surrounding cars and roads (Winston). These cars can communicate to each other to reduce traffic jams (Symonds). Driverless c...
3.) Texting and driving causes an interruption in driving allowing the eyes to drift off the road for a minimum of 5 seconds.
Lv, X., Li, H., Wang, B. (2012) Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks ISSN: 19390114
War driving initially originated from the term war dialing a technique that was popularized by the character in the movie ‘WarGames’. War driving emerged as the practice of moving around in a vehicle and hunting wireless access points with weak security. Years later, it is still practiced on a large scale however the difference is that now it has became easier to exploit (even script kiddies are doing it at ease) as there’s a plethora of tutorials on breaking wireless authentication
Modern internet technology is introduced into new vehicles as a safety feature. One recent idea is to have connectivity between vehicles. Ankeeta Patel of Parul Institute of Engineering and Technology presents the congestion control scheme for Vehicular Ad-Hoc Network, or VANET. Seatbelts have been around since the 1950s and have proven to save lives over the years. The teenage stigma is that they do not need to wear one because they will be fine.
Deer crossings are more frequent. In addition, the only barrier between your bike and oncoming high-speed traffic is a painted line. Rural highways also lack the large breakdown lanes of interstates. Some rural shoulders are so small, they're unsafe for pedestrian
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
This paper is going to discuss wireless security from a broad view where I will go into why wireless security is so important, especially today as the ways in which we communicate is changing dramatically. From there I will discuss the multiple wireless security options that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G network to connect to an open wireless network.
In today's changing business environment, information technology plays an incredibly important role in almost every aspect of the day to day life of almost every industry. The transportation industry is, of course, no different. From the transport of goods from manufacture, to warehousing, to retail, to end-user, the industry relies on information technology to get things done. The transportation of people is the exact same; incredibly important to get done yet impossible without the impact of information technology.
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...
U.S. Department of Transportation. 2005. Traffic Congestion and Reliability: Trends and Advanced Strategies for Congestion Mitigation (2008, December 1).