“…For instance, a multigroup can refine the geocast area if only vehicles and buses inside the geocast area are to be addressed instead of pedestrians. Nevertheless, geocast-based routing protocol is still the key mechanism for transmitting messages from a sender to a geographical area [79,80,81].…”
In recent times, peer-to-peer (P2P) has evolved, where it leverages the capability to scale compared to server-based networks. Consequently, P2P has appeared to be the future distributed systems in emerging several applications. P2P is actually a disruptive technology for setting up applications that scale to numerous concurrent individuals. Thus, in a P2P distributed system, individuals become themselves as peers through contributing, sharing, and managing the resources in a network. In this paper, P2P for vehicular communication is explored. A comprehensive of the functioning concept of both P2P along with vehicular communication is examined. In addition, the advantages are furthermore conversed for a far better understanding on the implementation.
“…For instance, a multigroup can refine the geocast area if only vehicles and buses inside the geocast area are to be addressed instead of pedestrians. Nevertheless, geocast-based routing protocol is still the key mechanism for transmitting messages from a sender to a geographical area [79,80,81].…”
In recent times, peer-to-peer (P2P) has evolved, where it leverages the capability to scale compared to server-based networks. Consequently, P2P has appeared to be the future distributed systems in emerging several applications. P2P is actually a disruptive technology for setting up applications that scale to numerous concurrent individuals. Thus, in a P2P distributed system, individuals become themselves as peers through contributing, sharing, and managing the resources in a network. In this paper, P2P for vehicular communication is explored. A comprehensive of the functioning concept of both P2P along with vehicular communication is examined. In addition, the advantages are furthermore conversed for a far better understanding on the implementation.
“…Yadav et al [53] and Devangavi and Gupta [54] summarised the routing procols along with stating their merits and demerits. Those works presented comparative study on all the active routing protocols.…”
Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V) communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial Intelligence (AI) awareness of other vehicles and their actions. IoV is connected in an adhoc networking environment which utilizes each vehicle in the network as a node, called Vehicular Ad Hoc Network (VANET), where the vehicles may be also connected to the public Internet. It is specifically important for the autonomous vehicles because they can instantaneously communicate with other vehicles surrounding them. In addition, safely avoiding accident prone zones is crucial in order to continue secure and smart transportation. Since the communication among various entities involved in the IoV environment is via open channel, it gives an opportunity to a passive/active adversary to intercept, modify, delete or even insert fake information during communication. It is then a serious concern for the vehicles users to determine whether the received information is genuine. In this survey paper, various security aspects, threats and attacks, network and threat models related to the IoV environment are discussed. Next, a taxonomy of security protocols is given that is essential to provide IoV data security. In particular, focus on various authentication protocols is given that is needed for mutual authentication among the involved entities in the IoV environment for secure communication. A detailed comparative analysis among various state-of-art authentication protocols proposed in the related IoV environment is provided to show their effectiveness as well as security and functionality features. Moreover, some testbeds are described that were designed and implemented for the IoV environment. In addition, some future challenges for IoV security protocols are also highlighted that are necessary to address in the future. INDEX TERMS Internet of Vehicles (IoV), vehicular adhoc networks (VANETs), authentication, batch verification, security.
“…Routing protocols in VANETs can be classified into five categories based on the route creation technique used; these include topology-based, positionbased, geocast-based, cluster-based and broadcast-based routing [34,54,55]. Broadcast based schemes waste resources such as bandwidth [54]. Also, these schemes works well in low density scenarios [54].…”
Section: Broadcasting Communication Schemes In Vanetsmentioning
A Vehicular Ad hoc Network (VANET) is a special type of Mobile Ad hoc Network (MANET). One of the main applications of VANETs is safety. This is accomplished by disseminating an Early Warning Message (EWM) to all vehicles in an emergency zone. However, broadcasting an EWM in a multihop environment, such as a VANET, introduces many challenges. The main challenge is the broadcast storm problem. In this paper, we propose a novel broadcasting communication scheme for VANETs. During an emergency situation a congested scenario is possible when vehicle density on the road is high. This causes contention at the MAC layer, which leads to collisions and increases the number of rebroadcasts, hence reducing packet dissemination, increasing delay and network resource use. Our proposed communication scheme is an SNR-based dynamic suppression scheme that aims to significantly reduce the effects of the broadcast storm problem by minimizing the number of rebroadcasting vehicles. The proposed scheme achieves this by considering the physical layer characteristics and the number of times a vehicle receives an EWM. Moreover, we correlate vehicle density and suppression range through a formula to determine the effective suppression range. The proposed scheme maintains network connectivity and achieves almost 100% reachability to all vehicles throughout the zone. Furthermore, the proposed scheme minimizes delay by 0.4 sec in high density scenarios.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.