Eliminating Broadcast Storming in Vehicular Ad-Hoc Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
VANETs (Vehicular Ad-hoc Networks) offer diversity of appealing applications. A lot of applications offered by VANETs depend upon the propagation of messages from one vehicle to another vehicle in the network. Several algorithms for useful broadcasting of safety/ warning messages in the network have been presented by different researchers. Vehicles on roads are increasing day by day. Due to this increased number of vehicles and especially during the crest hours, when the networks become very dense, dissemination of the messages blindly in the network causes problems like packet collisions, data thrashing and broadcast storming. In this research, a relative speed based waiting time algorithm has been presented for avoiding broadcast storming problem in the VANETS especially in dense environment. This proposed algorithm calculates the waiting time for each vehicle after receiving the safety/ warning messages according to the relative speed of the vehicles, the distance between the vehicles and range of vehicles. The results show that the proposed relative speed based algorithm is better than already existing algorithms like blind flooding and dynamically broadcasting waiting time algorithm which uses number of neighbors and distance between the vehicles for calculating the waiting time.
Authors and Affiliations
Umar Hayat, Razi Iqbal, Jamal Diab
The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework
The risk of sensitive information disclosure and modification through the use of online services has increased considerably and may result in significant damage. As the management and assessment of such risks is a well-k...
Automating the Collection of Object Relational Database Metrics
The quality of software systems is the most important factor to consider when designing and using these systems. The quality of the database or the database management system is particularly important as it is the backbo...
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Now-a-days smartphones have been used worldwide for an effective communication which makes our life easier. Unfortunately, currently most of the cyber threats such as identity theft and mobile malwares are targeting smar...
Critical Path Reduction of Distributed Arithmetic Based FIR Filter
Operating speed, which is reciprocal of critical path computation time, is one of the prominent design matrices of finite impulse response (FIR) filters. It is largely affected by both, system architecture as well as tec...
Studying the Influence of Static Converters’ Current Harmonics on a PEM Fuel Cell using Bond Graph Modeling Technique
This paper shows the results of adding static converters (Boost, Buck and Buck-Boost converters) as an adaptation solution between a PEM Fuel Cell generator and a resistive load in order to study different effects of the...