Skip to main content
Log in

An Emergency Message Broadcasting Technique Using Transmission Power Based Clustering Algorithm for Vehicular Ad Hoc Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Broadcasting is the foremost crisis services of vehicular ad hoc network (VANET), because the amount of vehicles augments on a daily basis. In order to avoid traffic jam and accidents, the emergency messages will be transmitted to all the vehicles in the network. While VANETs are exposed to different sort of assault, there is require to accomplish the protection needs like message confidentiality, reliability, and validation. The validation procedure is assumed to be competent if it distinguishes negotiation nodes precisely by means of less complication, condensed validation postponement, and keying transparency. In this document, a trust-oriented validation format for cluster-oriented VANETs is projected. The presentation of the projected scheme is contrasted by existing procedure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Qin, H., Li, Z., Wang, Y., Lu, X., Zhang, W., & Wang, G. (2010). An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments. In IEEE international conference on pervasive computing and communications (PerCom).

  2. Feng, W., Alshaer, H., & Elmirghani, J. M. H. (2010). Green information and communication technology: Energy efficiency in a motorway model. IET Communications, 4(7), 850–860.

    Article  Google Scholar 

  3. Pradeep, B., Pai, M. M. M, Boussedjra, M., & Mouzna, J. (2009). Global public key algorithm for secure location service in VANET. In 9th international conference on intelligent transport systems Telecommunications (ITST).

  4. Rivas, D. A., Barcelo-Ordinas, J. M., Zapata, M. G., & Morillo-Pozo, J. D. (2011). Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation. Journal of Network and Computer Applications, 34, 1942–1955.

    Article  Google Scholar 

  5. Feng, W., & Elmirghani, J. M. H. (2009). Green ICT: Energy efficiency in a motorway model. In Third international conference on next generation mobile applications, services and technologies.

  6. Plößl, K., & Federrath, H. (2008). A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards & Interfaces, 30, 390–397.

    Article  Google Scholar 

  7. Qian, Y., & Moayeri, N. (2008). Design secure and application-oriented VANET. In IEEE vehicular technology conference, VTC Spring.

  8. Daeinabi, A., & Rahbar, A. G. (2013). An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks. Computers and Electrical Engineering40(2), 517–529.

    Article  Google Scholar 

  9. Gañán, C., Muñoz, J. L., Esparza, O., Mata-Díaz, J., & Alins, J. (2014). PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Computer Standards & Interfaces, 36, 513–523.

    Article  Google Scholar 

  10. Zhizhong, J., Chuanhe, H., Liya, X., Bo, W., Xi, C., & Xiying, F. (2012). A trusted opportunistic routing algorithm for VANET. In IEEE third international conference on in networking and distributed computing (ICNDC), pp. 86–90.

  11. Chen, T., Mehani, O., & Boreli, R. (2009). Trusted routing for VANET. In IEEE 9th international conference on intelligent transport systems telecommunications (ITST).

  12. Chim, T. W., Yiu, S. M., Hui, L. C. K., & Li, V. O. K. (2014). VSPN: VANET-based secure and privacy-preserving navigation. IEEE Transactions on Computers, 63(2), 510–524.

    Article  MathSciNet  Google Scholar 

  13. Barba, C. T., Aguiar, L. U., Igartua, M. A., Parra-Arnau, J., Rebollo-Monedero, D., Forné, J., et al. (2013). A collaborative protocol for anonymous reporting in vehicular ad hoc networks. Computer Standards & Interfaces, 36, 188–197.

    Article  Google Scholar 

  14. Nayyar, Z., Khattak, M. A. K., Saqib, N. A., & Rafique N. (2015). Secure clustering in vehicular ad hoc networks. International Journal of Advanced Computer Science and Applications, 6(9), 285–291.

    Article  Google Scholar 

  15. Mokhtara, B., & Azab, M. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal, 54(4), 1115–1126.

    Article  Google Scholar 

  16. Fathian, M., & Jafarian-Moghaddam, A. R. (2015). New clustering algorithms for vehicular ad-hoc network in a highway communication environment. Wireless Networks, 21(8), 2765–2780.

    Article  Google Scholar 

  17. Nasir, M. K., Hossain, A. S. M. D., Hossain, M. S., Hasan, M., & Belayet, M. A. (2013). Security challenges and implementation mechanism for vehicular ad hoc network. International Journal of Scientific & Technology Research, 2(4), 156–161.

    Google Scholar 

  18. Liu, X., Shan, Z., Ye, W., Yan, R., & Wang, Z. (2014). An efficient message access quality model in vehicular communication networks. Journal on Signal Processing120, 682–690.

    Article  Google Scholar 

  19. Milton Joe, M., & Ramakrishnan, B. (2015). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wireless Networks, 22(7), 2369–2386.

    Google Scholar 

  20. Milton Joe, M., & Ramakrishnan, B. (2015). WVANET: Modelling a novel web based communication architecture for vehicular network. Wireless Pers Communications, 85(4), 1987–2001.

    Article  Google Scholar 

  21. Milton Joe, M., & Ramakrishnan, B. (2016). Novel authentication procedures for preventing unauthorized access in social networks. Peer-to-Peer Networking and Applications, 1–11.

  22. Ramakrishnan, B., Bhagavath Nishanth R., Milton Joe, M., & Selvi, M. (2015). Cluster based emergency message broadcasting technique for vehicular ad hoc network. Wireless Networks, 1–16.

  23. Selvi, M, Ramakrishnan, B., & Bhagavath Nishanth, R. (2015). Efficiency measure of routing protocols in vehicular ad hoc network using freeway mobility model. Wireless Networks, 1–11.

  24. Ramakrishnan, B., Rajesh, D. R. S., & Shaji, R. S. (2010). An intelligent routing protocol for vehicle safety communication in highway environments. Journal of Computing, 2(11), 65–72.

    Google Scholar 

  25. Ramakrishnan, B. (2009). Performance analysis of AODV routing protocol in vehicular ad-hoc network service discovery architecture. Network, 13(14), 65–72.

    Google Scholar 

  26. Ramakrishnan, B., Sreedivya, S. R., & Selvi, M. (2015). Adaptive routing protocol based on cuckoo search algorithm (ARP-CS) for secured vehicular ad hoc network (VANET). International Journal of Computer Networks and Applications (IJCNA), 2(4), 173–178.

    Google Scholar 

  27. Ramakrishnan, B., Rajesh, R. S., & Namesh, C. (2010). A study on service procedure in clustered vehicular communication. International Journal of Advanced Research in Computer Science, 1(4), 535–542.

    Google Scholar 

  28. Ramakrishnan, B. (2010). Analytical study of cluster and sans cluster vehicular ad hoc network communication. International Journal of Computer Engineering and Information Technology, 25(1), 01–11.

    MathSciNet  Google Scholar 

  29. Ramakrishnan, B., Rajesh, R. S., & Shaji, R. S. (2010). An efficient vehicular communication outside the city environments. International Journal of Next-Generation Networks (IJNGN), 2(4), 1.

    Article  Google Scholar 

  30. Nishanth, R. B., Ramakrishnan, B., & Selvi, M. (2015). Improved signcryption algorithm for information security in networks. International Journal of Computer Networks and Applications (IJCNA), 2(3), 151–157.

    Google Scholar 

  31. Network simulator. http://www.isi.edu/nsnam/ns.

  32. Taleb, T., Benslimane, A., & Letaief, K. B. (2010). Toward an effective risk conscious and collaborative vehicular collision avoidance system. IEEE Transactions on Vehicular Technology, 59(3), 1474–1486.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Ramakrishnan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramakrishnan, B., Selvi, M., Bhagavath Nishanth, R. et al. An Emergency Message Broadcasting Technique Using Transmission Power Based Clustering Algorithm for Vehicular Ad Hoc Network. Wireless Pers Commun 94, 3197–3216 (2017). https://doi.org/10.1007/s11277-016-3772-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3772-0

Keywords