Open Access   Article Go Back

Invention and Implementation of NTBS Clustering Protocol for VANET

Venkatamangarao Nampally1 , M. Raghavender Sharma2

  1. Department of Computer Science, University College of Science, Telangana, India.
  2. University College of Science, Saifabad, Telangana, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 1100-1110, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.11001110

Online published on May 31, 2018

Copyright © Venkatamangarao Nampally, M. Raghavender Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Venkatamangarao Nampally, M. Raghavender Sharma, “Invention and Implementation of NTBS Clustering Protocol for VANET,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1100-1110, 2018.

MLA Style Citation: Venkatamangarao Nampally, M. Raghavender Sharma "Invention and Implementation of NTBS Clustering Protocol for VANET." International Journal of Computer Sciences and Engineering 6.5 (2018): 1100-1110.

APA Style Citation: Venkatamangarao Nampally, M. Raghavender Sharma, (2018). Invention and Implementation of NTBS Clustering Protocol for VANET. International Journal of Computer Sciences and Engineering, 6(5), 1100-1110.

BibTex Style Citation:
@article{Nampally_2018,
author = {Venkatamangarao Nampally, M. Raghavender Sharma},
title = {Invention and Implementation of NTBS Clustering Protocol for VANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {1100-1110},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2115},
doi = {https://doi.org/10.26438/ijcse/v6i5.11001110}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.11001110}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2115
TI - Invention and Implementation of NTBS Clustering Protocol for VANET
T2 - International Journal of Computer Sciences and Engineering
AU - Venkatamangarao Nampally, M. Raghavender Sharma
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 1100-1110
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
879 376 downloads 219 downloads
  
  
           

Abstract

Vehicular Ad hoc Networks (VANETs) are the promising approach to provide traffic, safety and other applications to the drivers as well as passengers. It becomes a key component of the intelligent transport system. Communication is not for only reliable data delivery but also the achieving the reliability. In this paper, we present how to obtain best communication in VANET system by using Transitive Trust Relationships concept and thus improving the performance of the authentication procedure of the whole network in a cluster. Proposed NTBS protocol not only adapts the concept of Transitive Trust Relationships but also improves the performance of the authentication procedure and it provides best communication with good security. We implement NTBS protocol in NS2 Simulator. NS2 is open source and discrete event-driven, object-oriented and freely available simulation tool to simulate and analyze dynamic nature of communication networks. it is also a powerful tool to develop new protocols and functions. It provides support for OSI and TCP/IP protocols stack and many standard routing and application protocols for wire and wireless networks. NAM is used to display the process of simulation.

Key-Words / Index Term

VANET, TTR, NS2, NAM, TCL, NTBS, OBU, RSU, AS, Clustering Protocol

References

[1] C. Siva Ram Murthy, and B. S. Manoj, “Ad Hoc Wireless Networks:Architectures and Protocols”, Prentice hall PTR, 2004.
[2] Yousefi. S, Mousavi M. S, and Fathy M, “Vehicular ad hoc networks (VANETs): challenges and perspectives”, In the Proceedings of the 6th international conference on ITS telecommunications, pp.761-766, 2006.
[3] Kosch. T, Scroth. C, Strassberger. M, and Bechler. M, “Automative Internetworking:The Evolution towards Connected and Coperative vehicles”, John & Wesley Sons Ld., USA, 2012.
[4] Rasmeet S Bali, Neeraj Kumar, and Joel JPC Rodrigues, “clustering in vehicular ad hoc networks:taxonomy, challenges and solutions”, Vehicular communications, Vol.1, Issue.3, pp.134-152, 2014.
[5] Wenshuang liang, Zhuorong Li, and Hongyong Zhang, “Vehicular Ad Hoc Networks:Architectures, Research Isses,Methodologies, Challenges and Trends” Sage journals, Vol.11, Issue.8, 2015.
[6] M. Gerlach, A. Festag, T. Leinmller, G. Goldacker, and C. Harsch, “Secure architecture for Vehicular Communications”, 5 th international Workshop on Intellegent Transportation (WIT), March 2007.
[7] M. Raya and J. P. Hubaex, “Securing Vehicular ad hoc networks”, J. Compute. Security, Vol.15, Issue.1, pp.39-68, 2007.
[8] J. P. Hubaux, S. Capkun, and J. Leo, “The Seurity and Privacy of Smart Vehicles”, IEEE Security and Privacy Magazine, Vol. 2, Issue.4, pp.49-55,2004.
[9] M. El Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramaniam, “Security Issues in a future Vehicular network”, In the Proceedings of Europen Wireless’02, 2002.
[10] C. Zhang, X. Lin, R. Lu, and P. H. Ho, “RAISE: An Efficient RSU-aided message authentication scheme in vehicular communication networks”, In the Proceedings of the IEEE Int. Conf. Commun., pp.1451-1457, 2008.
[11] G. Gowtham, E. Samlison, “A Secured Trust Creation in VANET Environment Using Random Password Generator”, International Conference on Comp. Elect. And Elect. Technologies, pp.781-784,2012.
[12] T. Isaac, S. Zeadally, and J. S. Camera, “ Security attacks and solutions for vehicular ad hoc networks”, In IET Communications, pp.894-903, 2009.
[13] Menezes, S. Vnstone, and D. Hankerson, “Guide to elliptic curve cryptography”, Springer Professional Computing, Springer, New York, 2004.
[14] Sirwan A Mohammad and Dr. Sattar, “Design of wireless network based on ns2”, Journal of Global Research in Computer Science, Vol.3, Issue.4, pp.1-8, 2012.
[15] Z. Wang, L. Liu, M. Zhou, N. Ansari, “A position based clustering technique for ad hoc intervehicle communication”, IEEE Trans. Syst. Man Cybern., Part C, Appl.Rev. 38(2), pp.201-208, 2008.
[16] W. Fan, Y. Shi, S. Chen, L. Zou, “A Mobility based dynamic clustering algorithm (DCA) for VANETs”, In the International Conference on Communication Technology and Application, Beijing, pp.752-756, 2011.
[17] Grzegorz Wolny, “Modified DMAC Clustering Algorithm for VANET”, In the Procedings of the 2008 Third International Conference on Systems and Networks Communications, Washington, DC, USA, pp.268-273.
[18] Farhan ahammed, javed Taheri, and Albert Zomaya, “LICA:Robust Localization using cluster Analysis to improve GPS Coordinates”,
[19] Blum J, Eskandan A, Hoffman L, “Challenges of Intervehicle ad hoc networks”, IEEE Transactions on Intelligent Transport System, Vol.5, Issue.4, pp.347-351, 2004.
[20] S. Sivagurunathan, P. Subathra, V. Mohan, N. Ramraj, “Authentic Vehicular Environment Using a cluster based key management”, Eur. J. Sci. Res.36,pp. 299-307, 2009.
[21] Cheng, S.-T., G.-J. Horng, and C.-L. Chou, “using cellular automata to form car soceity in vehicular ad hoc networks”, Intelligent Transport Systems, IEEE Transactions, Vol.12, Issue.4,pp.1374-1384, 2011.
[22] Almalag, M. S., and Weigle, M. C., “Using traffic flow for cluster formation in vehicular ad hoc networks”, In Local Computer Networks (LCN), 35th conference on, IEEE, pp.631-636, 2010.
[23] Souza. E, Nikolaidis. I, and Gburzynski, P. , “A new aggregate local mobility (ALM) clustering algorithm for VANETs” In comm. (ICC), International Conference on, IEEE, pp.1-5, 2010.
[24] Rawshdeh, Z. Y., and Mahmud. S. M, “Toward strongly concerned clustering structure in vehicular a hoc networks”, In Vehicular Technology Conference Fall, IEEE 70th , IEEE, pp.1-5, 2009.
[25] Shea. C, Hassanabadi, and Valaee, S., “ Mobility based clustering in VANETs using affinity propagation”, In Global Telecommuniccations Conference, IEEE, GLOBECOM, pp. 1-6, 2009.
[26] Kayis. O., Acarman. T., “clustering for inter vehicle communication”, In Intelligent Transportation Systems Conference, IEEE, pp.636-641, 2007.
[27] W. Fan, Y. Shi, S.chen, and L. Zou, “A mobility metric based dynamic clustering algorithm (DCA) for VAETS”, in International Conference on Communication Technology and Application, Beijing, pp.752-756, 2011.
[28] Zhenxia Zhang, Azzedine Boukerche, and Richards Pazzi, “A novel multi-hop clustering scheme for vehicular ad hoc networks”, In the Ptoceedings of the 9th ACM international symposium on Mobility management and wireless access, ACM, pp.19-26, 2011.
[29] Mohamed Nidhal Merji, Jalel Ben-Othman, Mohamed Hamdi, “A Survey on VANET security challenges and possible cryptographic solutions”, Vehicular Communications, Vol.1, Issue.2, pp.53-66, 2014.
[30] Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yaguang Fang, “An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks”, Parallel and Distributed Systems, IEEE Transactions on, Vol.21, Issue.9, pp.1227-1239, 2010.
[31] Azogu. I. K, Ferreira. M. T, and Hong Liu, “A security metric for VANET content delivery”, Global Communications Conference, IEEE, Vol.3, Issue.7, pp.991-996, 2012.
[32] Leinmuller T, Buttyan L et al., “SEVECOM-Secure Vehicle Communication”, in the Proceedings of IST Mob Summit.
[33] Zuowen, Tan , “A Privacy Preserving Mutual Authentication Protocol for Vehiular Ad Hoc Networks”, Journal of Convergence Inf. Technology Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.