2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) 2017
DOI: 10.1109/iceeccot.2017.8284584
|View full text |Cite
|
Sign up to set email alerts
|

Survey on cluster based routing protocol in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…Lin et al introduced the widely used lowest ID and highest degree (LID‐HD) clustering protocols for MANETs. Mobility clustering and the weighted clustering algorithm (WCA) were later proposed in an attempt to introduce mobility and weighted metrics to the clustering process. The significant improvements of these algorithms led to the design of several other algorithms, such as distributed group mobility adaptive clustering and the mobility‐aware highest degree (MobHiD) .…”
Section: Clustering In Vanets: An Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Lin et al introduced the widely used lowest ID and highest degree (LID‐HD) clustering protocols for MANETs. Mobility clustering and the weighted clustering algorithm (WCA) were later proposed in an attempt to introduce mobility and weighted metrics to the clustering process. The significant improvements of these algorithms led to the design of several other algorithms, such as distributed group mobility adaptive clustering and the mobility‐aware highest degree (MobHiD) .…”
Section: Clustering In Vanets: An Overviewmentioning
confidence: 99%
“…Several taxonomies for clustering algorithms have been proposed, where the algorithms are categorized based on different metric parameters. According to various key parameters, Bali et al proposed a classification into six categories: predictive clustering including three subcategories: position‐based, destination‐based, and lane‐based algorithms; backbone‐based clustering including k ‐hop based algorithms, medium access control (MAC)‐based clustering including Institute of Electrical and Electronics Engineers (IEEE) 802.11 MAC‐based, time‐division multiple access (TDMA)‐based, and space‐division multiple access (SDMA)‐based algorithms; traditional clustering including active and passive algorithms, hybrid clustering including intelligence‐based, distributed, and driver behavior‐based algorithms; and secure clustering including authentication‐based algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…This method aims at encoding the code in robust ways to ensure the confidentiality of the message by eliminating the access of illegitimate users (Mishra et al, 2016). The protocols falling under this class assist the Hashing mechanisms, Digital Signatures, Encoding, and Decoding techniques for assurance of the security traits (Hosmani and Mathpati, 2017). The Cryptographic techniques can be further be classified into Symmetric and Asymmetric methods (Li and Song, 2015) .…”
Section: Cryptography Based Security Solutionsmentioning
confidence: 99%
“…The Basic difference which exists between them is that the Symmetric Cryptographic methods utilize only one key and the Asymmetric methods utilize two keys, namely, public and private keys. In the first case consisting of only one key, the same key is applied for encoding as well as for the decoding purpose (Hosmani and Mathpati, 2017). But in the case of the second method, the public key is used for the encryption purpose, and for the decryption purpose, the private key is utilized (Mishra et al, 2016).…”
Section: Cryptography Based Security Solutionsmentioning
confidence: 99%
See 1 more Smart Citation