CFP last date
20 May 2024
Reseach Article

Adaptive Load Balanced Approach for Multi-path Routing in VANETS

by Harpreet Kaur, Amit Grover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 1
Year of Publication: 2016
Authors: Harpreet Kaur, Amit Grover
10.5120/ijca2016910969

Harpreet Kaur, Amit Grover . Adaptive Load Balanced Approach for Multi-path Routing in VANETS. International Journal of Computer Applications. 147, 1 ( Aug 2016), 26-29. DOI=10.5120/ijca2016910969

@article{ 10.5120/ijca2016910969,
author = { Harpreet Kaur, Amit Grover },
title = { Adaptive Load Balanced Approach for Multi-path Routing in VANETS },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 1 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number1/25618-2016910969/ },
doi = { 10.5120/ijca2016910969 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:44.669765+05:30
%A Harpreet Kaur
%A Amit Grover
%T Adaptive Load Balanced Approach for Multi-path Routing in VANETS
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 1
%P 26-29
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The VANETs carry several security considerations. One in every of the popular and dangerous attacks is launched within the variety of Sybil, connectivity holes or cut-up attack, wherever associated in Nursing assaulter inserts a faux position inside within the cluster. The inserted faux node data is used by the hackers within the case of inconsiderate driver, traffic jams, selective collisions and different similar dangerous things. To avoid such things the VANETs should be protected against such attacks. During this paper, a completely unique answer has been projected to beat the Sybil and cut-up attacks on the VANETs. The game theoretic approach has been designed to calculate per user resource requirement and the total load of the cell in order to calculate the utility, which denotes the resource consumption on the WSN cluster or cell. In this research, the load measurement is the primary concern in order to perform the load balancing using the game theoretic approach. The proposed model has removed the attack by the means of load balancing mechanism based upon the pushback algorithm. The proposed model shows the improved results than the existing models for the VANET data propagation.

References
  1. Agah, A., Asadi, M., & Das, S. K. (2006). Prevention of DoS Attack in Sensor Networks using Repeated Game Theory. In ICWN (pp. 29-36).
  2. Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad hoc networks, 3(3),(pp. 325-349).
  3. Alain Bertrand, B., & Jean Frédéric, M. (2010). An energy-efficient clique-based geocast algorithm for dense sensor networks. Communications and Network, 2010(pp.125-133).
  4. Al-Karaki, J. N., & Kamal, A. E. (2004). Routing techniques in wireless sensor networks: a survey. Wireless communications, IEEE, 11(6),(pp. 6-28).
  5. Ben Alla, S., Ezzati, A., Beni Hssane, A., & Hasnaoui, M. L. (2011, April). Hierarchical adaptive balanced energy efficient routing protocol (HABRP) for heterogeneous wireless sensor networks. In Multimedia Computing and Systems (ICMCS), 2011 International Conference on (pp. 1-6). IEEE.
  6. Briles, S., Arrowood, J., Turcotte, D., & Fiset, E. (2005, May). Hardware-In-The-Loop Demonstration of a Radio Frequency Geolocation Algorithm. In Proceedings of the Mathworks International Aerospace and Defense Conference.
  7. Byers, J., & Nasser, G. (2000). Utility-based decision-making in wireless sensor networks. In Mobile and Ad Hoc Networking and Computing, 2000. MobiHOC. 2000 First Annual Workshop on (pp. 143-144). IEEE.
  8. Closas, P., Zamora, A. P., & Rubio, J. A. F. (2009, April). A game theoretical algorithm for joint power and topology control in distributed WSN. In Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on (pp. 2765-2768). IEEE.
  9. Dai, H., & Han, R. (2003, December). A node-centric load balancing algorithm for wireless sensor networks. In Global Telecommunications Conference, 2003. GLOBECOM'03. IEEE (Vol. 1, pp. 548-552). IEEE.
  10. Dufwenberg, M., & Kirchsteiger, G. (2004). A theory of sequential reciprocity. Games and economic behavior, 47(2),(pp- 268-298).
  11. Han, Z. (2012). Game theory in wireless and communication networks: theory, models, and applications. Cambridge University Press.
  12. Ishmanov, F., Malik, A. S., & Kim, S. W. (2011). Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview. European Transactions on Telecommunications, 22(4),(pp- 151-167).
  13. Machado, R., & Tekinay, S. (2008). A survey of game-theoretic approaches in wireless sensor networks. Computer Networks, 52(16),(pp- 3047-3061).
  14. MacKenzie, A. B., & DaSilva, L. A. (2006). Game theory for wireless engineers. Synthesis Lectures on Communications, 1(1), (pp-1-86).
  15. Meshkati, F., Poor, H. V., & Schwartz, S. C. (2007). Energy-efficient resource allocation in wireless networks. Signal Processing Magazine, IEEE, 24(3), (pp-58-68).
  16. Park, G. Y., Kim, H., Jeong, H. W., & Youn, H. Y. (2013, March). A novel cluster head selection method based on K-means algorithm for energy efficient wireless sensor network. In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on (pp. 910-915). IEEE.
  17. Petrovic, D., Shah, R. C., Ramchandran, K., & Rabaey, J. (2003, May). Data funneling: Routing with aggregation and compression for wireless sensor networks. In Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE. 2003 IEEE International Workshop on (pp. 156-162). IEEE.
  18. Reddy, Y. B., & Srivathsan, S. (2009, June). Game theory model for selective forward attacks in wireless sensor networks. In Control and Automation, 2009. MED'09. 17th Mediterranean Conference on (pp. 458-463). IEEE.
  19. Sakarindr, P., & Ansari, N. (2007). Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. Wireless Communications, IEEE, 14(5), (pp-8-20).
  20. Sarkar, S., & Datta, R. (2014, February). A secure and energy-efficient stochastic routing protocol for wireless mobile ad-hoc networks. In Communications (NCC), 2014 Twentieth National Conference on (pp. 1-6). IEEE.
  21. Seada, K., Helmy, A., & Govindan, R. (2004, April). On the effect of localization errors on geographic face routing in sensor networks. In Proceedings of the 3rd international symposium on Information processing in sensor networks (pp. 71-80). ACM.
  22. Seada, K., Zuniga, M., Helmy, A., & Krishnamachari, B. (2004, November). Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 108-121). ACM.
  23. Shi, H. Y., Wang, W. L., Kwok, N. M., & Chen, S. Y. (2012). Game theory for wireless sensor networks: a survey. Sensors, 12(7),(pp- 9055-9097).
  24. Stojmenovic, I., & Lin, X. (2001). Power-aware localized routing in wireless networks. Parallel and Distributed Systems, IEEE Transactions on, 12(11), (pp-1122-1133).
  25. Upadhyayula, S., & Gupta, S. K. (2007). Spanning tree based algorithms for low latency and energy efficient data aggregation enhanced convergecast (dac) in wireless sensor networks. Ad Hoc Networks, 5(5),(pp- 626-648).
  26. Wagner, R., Sarvotham, S., Choi, H., & Baraniuk, R. (2005). Distributed multiscale data analysis and processing for sensor networks. RICE UNIV HOUSTON TX DEPT OF ELECTRICAL AND COMPUTER ENGINEERING.
  27. Xu, J. Q., Wang, H. C., Lang, F. G., Wang, P., & Hou, Z. P. (2011, June). Study on WSN topology division and lifetime. In Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on (Vol. 1, pp. 380-384). IEEE.
  28. Yadav, S., & Lakhani, K. (2013). A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET. International Journal of Distributed and Parallel Systems, 4(2), 17.
  29. Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3),(pp- 867-880).
  30. Zhao, L., Zhang, H., & Zhang, J. (2008, March). Using incompletely cooperative game theory in wireless sensor networks. In Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE (pp. 1483-1488). IEEE.
  31. .
Index Terms

Computer Science
Information Sciences

Keywords

VANET security VANET secure mobility connectivity hole avoidance wormhole detection.