2018
DOI: 10.4108/eai.10-4-2018.154458
|View full text |Cite
|
Sign up to set email alerts
|

Performance and Execution Evaluation of VANETs Routing Protocols in different Scenarios

Abstract: VANETs an application of MANETs, a fast growing, promising and emerging technology provides basis for ITS following IEEE 802.11p standard based on DSRC designed for WAVE. VANETs enable communication among vehicles (V2V) and road side infrastructure (V2I), disseminating alert messages regarding road conditions and any other critical situation to ensure safety and avoid losses of precious lives and property. Due to high velocity of moving vehicles and dynamic speedy topology change ultimate optimum routing proto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…The study [16] examined the performance of several routing protocols, including AODV, DSR, and DSDV, using different performance parameters, such as data throughput, PDR, end-to-end delay, and network stability. The authors stated that it is difficult to select a routing protocol that suits all requirements.…”
Section: Related Workmentioning
confidence: 99%
“…The study [16] examined the performance of several routing protocols, including AODV, DSR, and DSDV, using different performance parameters, such as data throughput, PDR, end-to-end delay, and network stability. The authors stated that it is difficult to select a routing protocol that suits all requirements.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, one real-world example is the spoofing of tire-pressure data from tire pressure sensors [97], [98], enabled by the lack of cryptographic mechanisms in communication protocols in-vehicle controller area networks (CANs). To disrupt emergency management, such as DAS, adversaries could inject false data in place of measurement data from in-vehicle sensors, such as the safe distance monitoring of adjacent vehicles, resulting in drivers making incorrect or unsafe decisions based on the false data [125]- [129]. To launch a large-scale attack, aggressive adversaries could inject false safe distance monitoring data to a number of vehicles simultaneously to cause the maximum number of accidents, which would be especially damaging during emergency scenarios.…”
Section: ) Attacks On Managementmentioning
confidence: 99%
“…and maximazing the end to end delay [6]. In this harmful attack, the malicious node behaves genuinely at the discovery phase to ensure its presence among the selected nodes to form the path that the packet will be transmitted on, afterwards, when a data packet passes through this node, it exibits its malicious intent and drops it.…”
Section: Research Articlementioning
confidence: 99%