منابع مشابه
Position Based Adaptive Routing for Vanets
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks (VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery. In this mode, after broadcasting the request for route discovery the source node starts l...
متن کاملAn Improved Junction-Based Directional Routing Protocol (IJDRP) for VANETs
Vehicular Ad-Hoc Networks (VANETs) is a novel technology that has recently emerged and due to its swift changing topology and high mobility nature, it has become problematic to design an efficient routing protocol in VANETs’ amongst both moving and stationary units. Also, the existing routing algorithms are not very effective to satisfy all requirements of VANETs. This paper explores the need o...
متن کاملAdaptive Topology Based Gossiping in VANETs Using Position Information
Gossiping is a lightweight and simple technique for information dissemination in many application domains, be it in Wireless Sensor Networks (WSNs), Mobile Ad-hoc Networks (MANETs), or Vehicular Ad-hoc Networks (VANETs). Much research has been conducted in the past on probabilistic dissemination methods because of their efficiency compared with simple flooding and their simple application. Howe...
متن کاملOverhead-controlled contention-based routing for VANETs
Routing of VANETs is a challenging issue that has attracted many attentions of researchers recently. Contention based routing protocols have good congruity with high mobility of nodes in this kind of networks. Prevention from forwarding duplicate packets is an important challenge in such routing protocols. Indeed, such duplications can reduce scalability and efficiency of contention based routi...
متن کاملAdaptive Load Balanced Approach for Multi-path Routing in VANETS
The VANETs carry several security considerations. One in every of the popular and dangerous attacks is launched within the variety of Sybil, connectivity holes or cut-up attack, wherever associated in Nursing assaulter inserts a faux position inside within the cluster. The inserted faux node data is used by the hackers within the case of inconsiderate driver, traffic jams, selective collisions ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of Computer Networks & Communications
سال: 2017
ISSN: 0975-2293,0974-9322
DOI: 10.5121/ijcnc.2017.9105