.Vehicular Ad Hoc Networks (VANETs) are autonomous and self-configurable wireless ad hoc networks and considered as a subset of Mobile Ad Hoc Networks (MANETs). MANET is composed of self-organizing mobile nodes which communicate through a wireless link without any network infrastructure. A VANET uses vehicles as mobile nodes for creating a network within a range of 100 to 1000 meters. VANET is developed for improving road safety and for providing the latest services of intelligent transport system (ITS). The development and designing of efficient, self-organizing, and reliable VANET are a challenge because the node's mobility is highly dynamic which results in frequent network disconnections and partitioning. VANET protocols reduce the power consumption, transmission overhead, and network partitioning successfully by using multicast routing schemes. In multicasting, the messages are sent to multiple specified nodes from a single source. The novel aspect of this paper is that it categorizes all VANET multicast routing protocols into geocast and cluster-based routing. Moreover, the performance of all protocols is analyzed by comparing their routing techniques and approaches.
The work in this paper is about to detect and classify jamming attacks in 802.11b wireless networks. The number of jamming detection and classification techniques has been proposed in the literature. Majority of them model individual parameters like signal strength, carrier sensing time, and packet delivery ratio to detect the presence of a jammer and to classify the jamming attacks. The demonstrated results by the authors are often overlapping as most of the jamming regions are closely marked, and they do not help to clearly distinguish different jamming mechanisms. We investigate a multi-modal scheme that models different jamming attacks by discovering the correlation between three parameters: packet delivery ratio, signal strength variation, and pulse width of the received signal. Based on that, profiles are generated in normal scenarios during training sessions which are then compared with test sessions to detect and classify jamming attacks. Our proposed model helps in clearly differentiating the jammed regions for various types of jamming attacks. In addition, it is equally effective for both the protocol-aware and protocol-unaware jammers. The reported results are not based on simulations, but a test-bed was established to experiment real scenarios demonstrating significant enhancements in previous results reported in the literature.
In this contribution, we derive a novel parallel formulation of the standard Itoh-Tsujii algorithm for multiplicative inverse computation over GF(2 m ). The main building blocks used by our algorithm are: field multiplication, field squaring and field square root operators. It achieves its best performance when using a special class of irreducible trinomials, namely, P (X) = X m + X k + 1, with m and k odd numbers and when implemented in hardware platforms. Under these conditions, our experimental results show that our parallel version of the Itoh-Tsujii algorithm yields a speedup of about 30% when compared with the standard version of it. Implemented in a Virtex 3200E FPGA device, our design is able to compute multiplicative inversion over GF(2 193 ) after 20 clock cycles in about 0.94µS.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.