Skip to main content

Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network

  • Conference paper
  • First Online:
Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

Abstract

Currently, VANETs are becoming more and more popular and have been applied in many different applications. However, because the feature of VANETs’ topologies is relatively stable, the routing protocol designed for VANET can be more efficient from a macro perspective. Specifically, the concept of incompletely predictable networks (IPNs), where nodes travel around the basic positions, can be used to model stable VANETs, as the ones related to taxis during our daily lives. In this paper, we propose a new protocol, named Greedy Probability-based Routing Protocol, for rather stable VANETs. A new concept named “anti-pheromone” is put forward to achieve high energy efficiency. Simulation results illustrate that GPRP has proper utilization ratio of nodes to achieve energy efficiency and has a stable performance when network size changes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akhtar, N., Ergen, S.C., Ozkasap, O.: Vehicle mobility and communication channel models for realistic and efficient highway vanet simulation. IEEE Trans. Veh. Technol. 64(1), 248–262 (2015)

    Article  Google Scholar 

  2. Al-Ani, A.D., Seitz, J.: Qos-aware routing in multi-rate ad hoc networks based on ant colony optimization. Netw. Protoc. Algorithms 7(4), 1–25 (2016)

    Article  Google Scholar 

  3. Baiocchi, A., Salvo, P., Cuomo, F., Rubin, I.: Understanding spurious message forwarding in vanet beaconless dissemination protocols: An analytical approach. IEEE Trans. Veh. Technol. 65(4), 2243–2258 (2016)

    Article  Google Scholar 

  4. Bitam, S., Mellouk, A., Zeadally, S.: Vanet-cloud: a generic cloud computing model for vehicular ad hoc networks. IEEE Wireless Commun. 22(1), 96–102 (2015)

    Article  Google Scholar 

  5. Carrabs, F., Cerulli, R., Ambrosio, C.D., Gentili, M., Raiconi, A.: Maximizing lifetime in wireless sensor networks with multiple sensor families. Comput. Oper. Res. 54, 121–137 (2015)

    Article  MathSciNet  Google Scholar 

  6. Carrabs, F., Cerulli, R., Ambrosio, C.D., Raiconi, A.: A hybrid exact approach for maximizing lifetime in sensor networks with complete and partial coverage constraints. J. Netw. Comput. Appl. 58, 12–22 (2015)

    Article  Google Scholar 

  7. Carrabs, F., Cerulli, R., DAmbrosio, C., Raiconi, A.: An exact algorithm to extend lifetime through roles allocation in sensor networks with connectivity constraints. Optimization Lett., 1–16 (2016)

    Google Scholar 

  8. Castiglione, A., Prisco, R.D., Santis, A.D., Fiore, U., Palmieri, F.: A botnet-based command and control approach relying on swarm intelligence. J. Netw. Comput. Appl. 38(38), 22–33 (2014)

    Article  Google Scholar 

  9. Cerrone, C., Cerulli, R., Gentili, M.: Vehicle-id sensor location for route flow recognition: Models and algorithms. Eur. J. Oper. Res. 247(2), 618–629 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  10. Cerrone, C., Cerulli, R., Raiconi, A.: Relations, models and a memetic approach for three degree-dependent spanning tree problems. Eur. J. Oper. Res. 232(3), 442–453 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  11. Chen, H., Shi, K., Wu, C.: Spanning tree based topology control for data collecting in predictable delay-tolerant networks. Ad Hoc Netw. 46, 48–60 (2016)

    Article  Google Scholar 

  12. Colella, A., Castiglione, A., De Santis, A., Esposito, C., Palmieri, F.: Privacy aware routing for sharing sensitive information across wide-area networks. In: 2016 IEEE 19th International Conference on Network-Based Information Systems, NBiS, pp. 70–75, September 2016

    Google Scholar 

  13. Coskun, C.C., Ayanoglu, E.: A greedy algorithm for energy-efficient base station deployment in heterogeneous networks. In: 2015 IEEE International Conference on Communications (ICC), pp. 7–12. IEEE (2015)

    Google Scholar 

  14. Huang, C.M., Lin, S.Y.: Timer-based greedy forwarding algorithm in vehicular ad hoc networks. IET Intel. Transport Syst. 8(4), 333–344 (2013)

    Article  Google Scholar 

  15. Li, F., Yin, Z., Tang, S., Cheng, Y., Wang, Y.: Optimization problems in throwbox-assisted delay tolerant networks: Which throwboxes to activate? how many active ones i need? IEEE Trans. Comput. 65(5), 1663–1670 (2016)

    Article  MathSciNet  Google Scholar 

  16. Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)

    Article  Google Scholar 

  17. Messerschmitt, D.G.: Interstellar communication: The case for spread spectrum. Acta Astronaut. 81(1), 227–238 (2012)

    Article  Google Scholar 

  18. de Oliveira, H.A., Boukerche, A., Guidoni, D.L., Nakamura, E.F., Mini, R.A., Loureiro, A.A.: An enhanced location-free greedy forward algorithm with hole bypass capability in wireless sensor networks. J. Parallel Distrib. Comput. 77, 1–10 (2015)

    Article  Google Scholar 

  19. Palmieri, F., Ricciardi, S., Fiore, U., Castiglione, A.: A multiobjective wavelength routing approach combining network and traffic engineering with energy awareness. IEEE Syst. J. PP(99), 1–12 (2015)

    Article  Google Scholar 

  20. Palmieri, F., Castiglione, A.: Condensation-based routing in mobile ad-hoc networks. Mobile Inf. Syst. 8(3), 199–211 (2012)

    Article  Google Scholar 

  21. Pan, Z., Zhang, Y., Kwong, S.: Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans. Broadcast. 61(2), 1 (2015)

    Article  Google Scholar 

  22. Papazoglou, P.M., Laskari, T.I., Fourlas, G.K.: Towards a low cost open architecture wearable sensor network for health care applications. In: Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments, pp. 1–8 (2014)

    Google Scholar 

  23. Patel, D., Faisal, M., Batavia, P., Makhija, S., Mani, M.: Overview of routing protocols in vanet. Int. J. Comput. Appl. 136(9), 4–7 (2016)

    Google Scholar 

  24. Prabaharan, S.B., Ponnusamy, R.: Energy aware ant colony optimization based dynamic random routing strategy for MANET. Energy 5(2), 1–5 (2016)

    Google Scholar 

  25. Qin, Y., Yuan, B., Pi, S.: Research on framework and key technologies of urban rail intelligent transportation system. In: Qin, Y., Jia, L., Feng, J., An, M., Diao, L. (eds.) Proceedings of the 2015 International Conference on Electrical and Information Technologies for Rail Transportation. LNEE, vol. 378, pp. 729–736. Springer, Heidelberg (2016). doi:10.1007/978-3-662-49370-0_76

    Chapter  Google Scholar 

  26. Shaheen, A., Gaamel, A., Bahaj, A.: Comparison and analysis study between AODV and DSR routing protocols in vanet with IEEE 802.11b. J. Ubiquit. Syst. Pervasive Netw. 7(1), 07–12 (2016)

    Google Scholar 

  27. Shen, J., Moh, S., Chung, I.: Comment: “enhanced novel access control protocol over wireless sensor networks”. IEEE Trans. Consum. Electron. 56(3), 2019–2021 (2010)

    Article  Google Scholar 

  28. Shen, J., Tan, H., Moh, S., Chung, I.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453–462 (2015)

    Article  Google Scholar 

  29. Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)

    Google Scholar 

  30. Shinde, R., Mulinti, M., Shinde, P., Kadam, S.: Intelligent transportation system (apps): GPS based tracking. Int. J. Res. Eng. 3(1), 6–7 (2016)

    Google Scholar 

  31. Wang, M., Liang, H., Zhang, R., Deng, R.: Mobility-aware coordinated charging for electric vehicles in vanet-enhanced smart grid. IEEE J. Sel. Areas Commun. 32(7), 1344–1360 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Science Foundation of China under Grant No. 61300237, No. U1536206, No. U1405254, No. 61232016 and No. 61402234, the National Basic Research Program 973 under Grant No. 2011CB311808, the Natural Science Foundation of Jiangsu province under Grant No. BK2012461, the research fund from Jiangsu Technology & Engineering Center of Meteorological Sensor Network in NUIST under Grant No. KDXG1301, the research fund from Jiangsu Engineering Center of Network Monitoring in NUIST under Grant No. KJR1302, the research fund from Nanjing University of Information Science and Technology under Grant No. S8113003001, the 2013 Nanjing Project of Science and Technology Activities for Returning from Overseas, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund, and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Shen, J., Wang, C., Castiglione, A., Liu, D., Esposito, C. (2016). Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49145-5_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49144-8

  • Online ISBN: 978-3-319-49145-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics