• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Review on Efficient Routing Mechanisms in Urban Scenario of Vehicular Ad-Hoc Networks

    2023-12-10 12:20:48KalpanaDeviandThenmozhi

    Kalpana Devi S and Thenmozhi R

    (Department of Computing Technologies, SRM Institute of Science and Technology, Kattankulathur,Chennai 603203, India)

    Abstract: Efficient routing protocols are crucial for enabling secure communication among the highly mobile and self-configurable nodes in Vehicular Ad-Hoc Networks (VANETs). In this work, we present a performance evaluation of different routing protocols in VANETs based on the currently available research. Our study focuses on analyzing the strength and weaknesses of the routing protocols, namely, Ad-Hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Destination-Sequenced Distance-Vector (DSDV), under varying network conditions. We examine the protocols’ performance based on key metrics such as throughput, delay, and energy consumption. We also highlight the advantages and limitations of each protocol in different scenarios, such as varying vehicular densities and mobility patterns. Our results show that AODV outperforms DSR and DSDV in terms of throughput and delay, while DSR consumes the least energy. We also observe that the performance of the routing protocols varies with the density of vehicles and the mobility patterns of the nodes. Our study highlights the importance of conducting real-world experiments to evaluate the performance of routing protocols in VANETs, as they provide more realistic and accurate results than simulation-based studies. Our findings can help in the selection and design of efficient and secure routing protocols for VANETs.

    Keywords: Routing; metrics; VANET; mobile nodes; simulation

    0 Introduction

    Communication networks have become an essential part of our daily lives, enabling us to connect with people and devices across the globe. These networks are used for various purposes, such as exchanging data, voice and video, and accessing online services. As the demand for communication services increases, the need for efficient and secure communication networks becomes more critical. One of the emerging areas in communication networks is Vehicular Ad-Hoc Networks (VANETs), which are designed for real-time applications through vehicles as nodes. VANETs are expected to play a significant role in improving road safety, traffic efficiency, and passenger comfort. In VANETs, reliability and safety are the primary metrics, and security is an essential aspect to ensure the safe and efficient functioning of the network[1-2].VANETs use two types of communication: one-hop and multi-hop communication. In one-hop communication, vehicles directly communicate with other vehicles in their proximity. In multi-hop communication, intermediate vehicles forward data packets to reach the destination vehicle. Road Side Units (RSUs) are also used for communication in VANETs, acting as routers to forward packets to their destination[3]. Fig. 1 shows the communication architecture of VANETs, which includes GPS, RSUs, vehicles for inter-vehicle communication, vehicle-to-RSU communication, and inter-RSU communication. Despite the potential benefits of VANETs, there are several challenges that need to be addressed, such as the lack of a centralized infrastructure, dynamic topological changes due to high vehicle speeds, and communication barriers in urban environments[4]. These challenges require the development of efficient routing protocols that can establish dynamic routes for the exchange of data in VANETs. Moreover, security is a critical aspect of VANETs that must be addressed to ensure the safe and secure functioning of the network[5]. This paper presents a review of the currently available routing techniques and the security challenges in VANETs. The paper also discusses the need for a trustworthy network architecture to address the current security challenges.

    Even though VANET is the buzz word to autonomous transportation of inter connected vehicles, there are some issues in the characteristics of VANET that need to be addressed. Since there is no fixed infrastructure, each vehicle in VANET should establish an ad hoc architecture without any centralized AP. Another important characteristic of VANET is that it should adapt to dynamic topological changes due to the high speed of the vehicles. Buildings are the barriers to communicate among vehicles when they are entering urban environments, and the exchange of data between vehicles may not be possible. Therefore, the routing protocols should be designed in an efficient way to handle the characteristics of the VANET[6]. There are many routing protocols emerged in recent years for efficient routing of information in the network. The primary requirements of the routing protocols are that they should establish dynamic routes for the exchange of data in VANET since there are many topological changes possible in the move[7]. VANET is different from other ad hoc networks because of their dynamic characteristics in mobility due to the fast movement of vehicles and the dynamic change of topology. To cope up with these characteristics, VANET is capable of self-configuring and self-organizing nature where all the nodes can act as a router to forward the packet to other nodes. One of the primary issues in VANET is to deal with high mobility. Since the nodes in VANET are moving fast, it is very difficult to protect the nodes and their locations to make the data transfer more secure. The following are some of the unique characteristics of VANET that need to be considered before designing the routing protocols for VANET.

    1)Because the nodes in VANET are frequently changing their position, many unpredictable topological changes might occur during the communication process which leads to too many connectivity issues that degrade the performance of the network.

    2)The network area of VANET could be unbounded since the area of VANET can be extended without limit. It can connect two or more cities or even countries for the establishment of communication in VANET. Therefore, exchange of information in VANET is a challenging task in this unbounded network size.

    3)The nodes in the VANET consume more power while transmitting the data from one node to another node. Therefore, the protocols should be designed with the consideration of this important characteristic so that exchange of information can be done with less power consumption. However, unlike MANET the power consumption is not a major challenge since the vehicles exhibit power via long life battery.

    4)Because the vehicles in VANET are moving with high speed up to 150 km/h, the network achieves high mobility and for this reason, the communication link exists between vehicles might be disconnected frequently that leads to packet loss and delay. Hence, transmission power should be increased to achieve uninterrupted communication. However, increase in transmission power might affect the throughput of the network that leads to performance degradation.

    5)VANETs are infrastructure less network that do not require any physical medium for communication among vehicles. When the vehicles cannot communicate directly and they are in the situation to communicate to an infrastructure, only few resources such as RSU and TAs are used in VANET. However, safety and physical protection should be considered to safeguard these resources.

    The main motivation behind this work is to present the detailed study of currently available routing techniques and security challenges in VANETs. The paper also discusses the need for trustworthy network architecture in order to address the current security challenges. The other parts of the paper are divided as follows: Previous studies and existing routing schemes are discussed in Section 1. In Section 2, routing protocols and their classifications are analysed. In Section 3, the major issues in the routing protocols are discussed. Section 4 describes the research challenges in VANWT. The work is concluded in Section 5.

    1 Literature Survey

    Authors in Ref.[8] proposed a centralized routing method for VANET with mobility prediction. The arrival rate of the vehicles is calculated using the non-homogeneous Poisson model. The routing table holds the global information to be utilized for the purpose of SDN controller. With the density of vehicle as the standing point, the transmission metrics increase variably using centralized routing. But, the work does not include the arrival time metric of the vehicle for accurate prediction in the network performance. Authors of Ref.[9] provided a model to examine the overall stall in a unidirectional stream. The probability that the overall latency is less than a particular threshold can be estimated using the probability distribution. The impacts of various parameters are studied to reduce latency time for gaining keen knowledge in data distribution of VANETs. But the proposed method does not fit for bi-directional VANETs. In Ref.[10], the authors proposed an Implicit Network of Trust (IWOT-V) trust model in VANET in which untrusted nodes are identified and avoided. The concept of IWOT-V is based on page ranking algorithms such as Page Rank. Although VANET lacks an explicit link structure due to its random topology and dynamic connections, social trust relationships do exist between vehicles and an implicit trust network can be derived. This paper also needs to study the random distribution of local trust values to avoid internal and external attacks. Authors of Ref.[11] discussed about the challenges in VANET. The work also proposed a novel idea for providing dynamic link where the topologies are constructed using unit disk graph model. To make the study and results more practical, a Dynamic Evolution Network (DEN) model is employed, which uses the real vehicle trajectories as input, such as node additions, deletions, and link losses. This work is not suitable for large-scale vehicle trajectory datasets in urban and rural scenarios. Authors in Ref.[12] proposed a fast and trusted transmission of sensitive data in an urban environment. The paper uses the Parking Area Assisted Spider Routing Protocol (PASRP) to handle fast message transactions. Using geographic information systems and digital maps, PASRP created a parking lot-based spider web transport model. The paper could be expanded further in generating the priority for urgent data during transmission. In Ref.[13], the authors proposed an architecture with a new optimization-based packet routing method that uses flow instantiation (FI) operations to accurately characterize link dynamics. However, research efforts have not focused on the nature of adaptive reactive protocols. Authors of Ref.[14] have presented a traffic data in real time, sharing the information using the distribution technique with road-side devices with minimal processing complexity and redundancy. But the paper does not focus on the important metrics of on load balancing and worldwide optimization in the traffic road network. In Ref.[15], the authors proposed an efficient routing method based on a flooding to improve data delivery reliability. The work does not reflect the load balance between VANET nodes and the urban transport infrastructure, as well as the presence of buildings, bridges, tunnels, etc. The research work does not include the real map scenario to evaluate the effectiveness of the method with no assumption. Authors of Ref.[16] proposed a technique to predict the false contents using a hidden Markov model. They found that their proposed model was too significant to the cut off value in different test conditions. However, there is no proper evidence that the proposed model is better than the other models and the results obtained in the work are not well established. Authors of Ref.[17] proposed a model for calculating the downlink delay in the suburban area. Significance over time and latency during node deployment plays a crucial factor in the model. The overall view of the work is to provide better services in the end point. The work does not focus on determining the urban delay calculation. The work in Ref.[18] proposed that during data transmission, when network issue occurs, it is envisaged that a temporal relay can recover the connection via store-carry-forward relay. An embedded Markov chain model is put forward to calculate the latency value using probability. However, the paper does not address the calculation of restoration delay in the downstream direction. Authors of Ref.[19] devised a model for large-scale transmission schemes with sensitive data. The paper proposed spider-web-like transmission to compare with the essential quality metrics used during transmission. The focus does not cover the task of normal data flow of the devised environment. In Ref.[20], authors proved that when the density of vehicle is high, the measure of distance between vehicle and the intersection increases naturally but the highness of message delivery decreases rapidly. It proves a major enhancement to the message dissemination. Message relaying is preferable to no relaying. But the work does not explore the significance of barriers on LOS communication performance. In Ref.[21], authors provided a verification mechanism to protect VANETs against rogue edge attackers who emit spoofing signals. During the same moving trace, the technique takes advantage over the onboard unit using the mobile’s radio signal. Authors of Ref.[22] provided a Traffic Aware Data Offloading strategy for autonomous vehicular system for massive congested information centred applications. The work also analyzed TRADING using real-world data sets of traffic values in order to further assess the approach’s trust and performance. Authors in Ref.[23] suggested the system which is proved to be very secure. An in-depth review of the alternatives demonstrates that the suggested approach provides superior security and usefulness. It can be extended to Internet of Vehicles systems for security measures as future development.

    From the literature review, we learned that all of the work is proportional to one another. More the performance more the computational complexity and vice versa. Even though many routing schemes are available, yet there is no efficient routing scheme to find the optimal route. Most of the existing schemes depend on topological based routing scheme which is not fit for rural areas and frequent disconnection may occur. Therefore, we propose a trust-based routing scheme that will select the node based on its trust values and the secure communication can be established in terms of security, trust and privacy.

    2 Routing Protocols of VANET

    Routing performs the transmission of packet from source node to destination node through the optimal route. The routing protocols are generally classified as topology based routing and geographical based routing. The important characteristics of these protocols are that they should be able to manage the mobility of nodes and the topological changes that occurs during the communication. Fig. 2 shows the classification of various VANET protocols.

    Fig. 2 VANET routing protocols

    2.1 Topology Based Routing

    Topology-based routing protocols perform packet transmission based on the link information received from the nodes in the network. In case of multi-hop communication, intermediate nodes are selected based on the information entered in the routing table to transmit the packet to the destination. This protocol is adapted from MANET and can be further classified into proactive and reactive protocols.

    Proactive protocol is a table-driven protocol where nodes are exchanged their routing table periodically in order to update the routing information. In this type, the paths for all the nodes are already built and the source node can immediately transfer the message to destination node without initiating any routing discovery process. Reactive protocol will start finding the path only upon the request received from the nodes. Here no decision is taken for selecting the best route for a node until the route request has arrived. Hence it reacts only upon request and it is also called on demand routing protocols[18]. Unlike reactive protocol, proactive will maintain the routing information for all the nodes connected in the network, and this information is updated periodically to select the best route. A combination of reactive and proactive protocol is the hybrid approach. This routing process must be secured and reliable in terms of energy consumption, computational overheads, packet loss, delay, and throughput to optimize IoT network.

    2.1.1Destinationsequencedistancevectorrouting

    The Destination-Sequenced Distance-Vector (DSDV) protocol is based on traditional distance vector routing scheme where all the nodes in the network share their distance information to the neighbours. In DSDV, the routing table of each node in the network consists of the details of the destination nodes and the next hop to each of its destination to transfer the message immediately from source to destination. This routing table is dynamically updated with latest information about the next hop node and the destination node through advertisement packets. However, this protocol is suitable only for the nodes in single hop and it is not suitable for multi hop nodes.

    2.1.2OLSR

    Optimized Link State Routing Protocol (OLSR) is based on link state information and the topology changes are updated periodically. This protocol guarantees the low latency while transferring the data. However, selecting alternate path is difficult during link failure, it requires more computational time than the other schemes.

    2.1.3DSR(DynamicSourceRouting)

    DSR protocol is a reactive-based protocol which will react upon the route request. The advantage of this protocol is that it will efficiently cope up with the network during the change of topology and the computational complexity is low when compared to other protocols. This protocol consists of two phases. First phase is for route discovery process and the second phase is for route maintenance. Sender will initiate route discovery process to find the destination node for message transportation. The intended recipient node will respond to the sender with the route for transferring the message. Therefore, DSR supports the establishment of ad hoc network, and each node has the capabilities of self-organization and self-configuration nature.

    One advantage of DSR is that it supports the establishment of ad hoc networks where each node has self-organization and self-configuration capabilities. This means that nodes can join or leave the network without requiring any centralized control. However, the protocol suffers from a high overhead due to the route discovery process, which can result in network congestion and reduced network performance.

    2.1.4AdHocOn-DemandDistanceVector(AODV)

    This is one of the reactive protocols and reacts only when the route request is arrived. This protocol consists of 3 phases: route discovery, route establishment, and route maintenance phase. RREQ is used in route discovery process, RREP is used in route establishment and RERR is used in route maintenance[19]. It supports multi hop routing. However, it required extra bandwidth for sending the network messages. The advantage of AODV is that it can adapt to changes in network topology by dynamically discovering and maintaining routes. It also supports multi-hop routing, which allows data to be transmitted over multiple nodes to reach the destination node. However, the protocol requires extra bandwidth for sending control messages like RREQ and RREP, which can lead to increased network congestion. The protocol also requires frequent route maintenance messages to be sent to maintain the established routes, which can cause additional overhead in the network.

    The advantage of AODV is that it can adapt to changes in network topology by dynamically discovering and maintaining routes. It also supports multi-hop routing, which allows data to be transmitted over multiple nodes to reach the destination node. However, the protocol requires extra bandwidth for sending control messages like RREQ and RREP, which can lead to increased network congestion. The protocol also requires frequent route maintenance messages to be sent to maintain the established routes, which can cause additional overhead in the network.

    2.1.5DynamicMANETon-demand(DYMO)

    This protocol is a hybrid protocol which supports both proactive and reactive processes and is an enhanced version of AODV. Unlike AODV, it contains only 2 phases: route discovery and route maintenance. Here intermediate nodes are used to carry the RREQ packet to find the destination node and these nodes are aware of backward path. Therefore, path accumulation is simple in DYMO than AODV. This protocol is used effectively in multi hop networks.

    DYMO is designed to support both unicast and multicast communication, making it suitable for applications such as mobile conference, gaming, and collaborative working. It can also handle high-mobility scenarios and can quickly adapt to topology changes in the network. In addition, DYMO is compatible with Internet Protocol version 6 (IPv6) and can be used in a range of MANET scenarios, including military and emergency response applications.

    2.2 Geographical Based Routing

    This protocol is a position-based routing protocol that will use the location information to forward a message instead of a network address. Unlike topology-based protocol, pre constructed routing is not required. Every node in the network is aware of its own location and the sender can forward the message to recipient using the position information of nodes. Therefore, the complex process of route discovery and prior knowledge topology is not required. A packet can be forwarded to road intersections to reach the gateway node using the real time information of individual vehicles[20]. The packet needs to be forwarded to RSU if no neighbour nodes in the network and the frequent dynamic routing is possible. Fig. 3 shows the selection of vehicles to forward the packet based on location information of vehicles. Here, vehicleAwill forward the packet to vehicleBsince it is closest toAin north direction.

    Fig. 3 Packet forwarding based on the position of vehicle

    2.2.1Non-delaytolerantnetwork

    N-DTN is based on geographical routing model that can transfer packets easily to the destination node with the knowledge of destination position. The knowledge about the position of destination node is acquired through neighbour node which is near to the destination node. Even though the message transfer process is quick, if there are no neighbour nodes near the target node, the forwarding of packets can be failed. This protocol follows the greedy technique and the main idea of this protocol is to reduce the delay for transporting the message from sender to receiver. GSR (Geographic Source Routing) is one of N-DTN which uses location-based services to identify the target node. This protocol is the combination of topological routing and position-based routing protocols[21]. The shortest route can be established by the source node using Dijkstra’s shortest route algorithm. Hence, packet forwarding is done based on the position of the target and the shortest route is established between source and destination. Here centralized mechanism such as coordinator is needed to pass the packets to the destination. First, the sender will request the location information through packet broadcasting, and the receiver node will reply with location information to the sender. The disadvantage of this method is that it uses beacon frame which causes routing overhead during the transmission of packets.

    2.2.2GreedyPerimeterStatelessRoutingProtocol(GPSR)

    GPSR is a position-based routing protocol which forwards the packet to the destination using greedy forwarding strategy based on the position of router and the target node. This decision is possible for a sender with the help of one hop router in the network. Perimeter of the area is used in the protocol through state information about the local topology when the packet cannot reach the destination and the position information is not known. Therefore, greedy forwarding and perimeter forwarding are the two important techniques used by GPSR to route the packets from source to destination[22]. It’s a dynamic protocol which can effectively handle the route information even in the mobility scenario. This protocol is well scalable when the size of the network is increased.

    GPSR is a stateless protocol, meaning that it does not require any global network state information to route packets. It also adapts to network changes dynamically, since it continuously updates the routing information based on the location of the nodes. However, one potential drawback of GPSR is that it may not always find the shortest path to the destination, especially in situations where the location information is not accurate or the network is highly dynamic.

    2.3 Cluster Based Routing Protocol

    The vehicles in a nearby region form a cluster and each vehicle is considered as a node in a network. All the nodes are communicated directly in case of intra cluster communication while all the nodes are communicated via coordinator node called cluster head in case of inter cluster communication. If any node sends data to other node inside the network, then it can be established via direct link. If a node wants to send data to nodes in other clusters, then it can be established via cluster head[23]. As far as VANET is concerned, establishment of route is difficult because of the mobility characteristics of each node in the network. Adaptable Mobility-Aware Clustering Algorithm based on destination (AMACAD) and MOBIC are used in inter cluster communication. AMACAD is used as an effective routing mechanism that prevents re-clustering of nodes by transmitting the data from source to destination without the complex overhead. MOBIC is used to compute the mobility of a node based on signal strength of the mobile node and the location information can be gathered with the help of neighbour nodes.

    In the Cluster-Based Routing Protocol, vehicles in a nearby region form a cluster, and each vehicle is considered a node in the network. The nodes communicate directly in case of intra-cluster communication, while communication between clusters is done through a coordinator node called the cluster head. This method of communication helps to reduce the number of messages transmitted, which in turn reduces the network overhead and improves network efficiency.

    When a node sends data to another node inside the same cluster, the communication takes place via a direct link. However, when a node wants to send data to nodes in other clusters, the communication takes place through the cluster head. This is because the establishment of a route in VANETs is difficult due to the mobility characteristics of each node in the network.

    To facilitate inter-cluster communication, the Cluster-Based Routing Protocol uses routing mechanisms like Adaptable Mobility-Aware Clustering Algorithm based on destination (AMACAD) and MOBIC. AMACAD is an effective routing mechanism that prevents re-clustering of nodes by transmitting data from the source to the destination without complex overhead. MOBIC, on the other hand, computes the mobility of a node based on the signal strength of the mobile node, and location information can be gathered with the help of neighbour nodes.

    Overall, the Cluster-Based Routing Protocol is an efficient and scalable solution for VANETs, which can handle the dynamic nature of the vehicular environment. It is particularly useful in dense urban areas where there are large number of vehicles and a high demand for efficient communication between them.

    3 Major Issues in Routing Protocols

    There are several factors such as high mobility, density of the network, environmental condition and many more that affect the performance of the VANET. In topology-based routing, proactive protocol supports the fast transmission of data from one vehicle to another vehicle since the routes are readily available prior to data transmission. But the routing tables need to be updated frequently so that transmission can be done smoothly without delay[24]. However, maintenance of updated routing information in VANET requires more control packets which each node in the network should broadcast to update its current status. This process of sending updated connectivity information on regular basis is tedious and it leads to additional overhead. Reactive protocol will allocate the route only upon request and they will not maintain any routing information in advance. Even though it minimizes the overhead of maintaining update information in proactive scheme, the route discovery process makes the data transmission complex even if one node faces link failure. The drawback of topology-based routing scheme is that it cannot cope up with the frequent topological changes due to the high velocity of vehicles. Therefore, this kind of routing is not suitable for highly dynamic environment.

    Location based routing in VANET does not maintain any route prior to data transmission rather it depends on the neighbour nodes to forward the packets using position related information. This kind of routing can be effective in dynamic environment since the routing of packets are done through location information whereas topology-based routing depends on current topological information that needs to be updated on regular basis otherwise frequent link failure will occur. Even though, location-based routing serves well, message delivery might be delayed if the optimal neighbour node is not chosen properly.

    The selection of best neighbour node is the challenging task in VANET and it is its own responsivity to carry the packets from sender to destination[25]. Each vehicle in a network should be aware of its neighbours and a beacon frame is broadcasted over the network periodically by a node to inform its current position related information[26-27]. This frame can be frequently broadcasted by each node in the network to confirm its updated position that may flood the network.

    On the other hand, cluster-based routing plays an important role in VANET for reducing the energy consumption of nodes in the network. To coordinate the vehicles, a cluster head should be there so that the nodes in the network can communicate with each other without interruption. However, the selection of cluster head is based on the stability of a node in the network.

    Therefore, a cluster head should be selected based on the node’s stability rate. But this could not be suitable of dynamic environment since the vehicles are moving fast to one or more location areas. Therefore, it is necessary to evaluate the performance of the routing protocols. The performance should be analysed in terms of packet drop and throughput since the VANET is highly mobile in nature. Summary of the previous schemes are given in Table 1.

    4 Simulation Tools

    There are many simulation tools used in various research works for the communication between RSU and vehicles in VANET. The simulation for the transmission power of the VANET can be done through SWAN (Scalable Wireless Ad hoc Network Simulator) which will be run over JIST. This simulation is arrived especially for VANET since the existing schemes cannot cope up with current research requirements.

    Table 1 Summary of existing schemes

    The benefit of SWAN is that it achieves high throughput by eliminating memory copy and context switch, it saves memory by sharing the single copy with multiple nodes, and supports existing applications such as web servers to run over the simulation without interruption.OMNET ++ is the other important discrete event simulator for VANET to deal with the components of the network such as routing. The components are required for wireless technologies and routing protocols are provided by INET while RSU and vehicle related components are provided by VEINS (Vehicles In Network Simulation). To support link layer, INET provides protocols such as OSPF(Open Source Shortest Path First) and BGP (Background Gateway Protocol). To provide communication in simulation environment, VEINS uses OMNET++ for interaction with INET. Simulation parameters used in the evaluations are routing protocols, bandwidth, radio type, radio band etc. SUMO is another simulator for the analysis of VANET which comprises many tools for the evaluation of traffic simulation to create road networks and route computation with emitted cost of the vehicles. Many VANET based algorithms were evaluated by SUMO for checking the effect of parking of autonomous vehicles and their traffic performance with enhanced throughput and packet drop. Some of the simulation parameters used in SUMO are vehicle class, traffic density, simulation time, departure time, car following model etc. Intelligent driver model can react to any environment changes such as changing the lane of the vehicles or going in wrong route. The pros and cons of the simulation tools are given in Table 2.

    Table 2 Analysis of VANET simulation tools

    5 Research Challenges in VANET

    There are many challenges that needs to be addressed to enhance the performance of the VANET despite many research have been emerged for improving the performance of VANET, still there are many challenges to be addressed in various areas of VANET to enhance the performance of the network. Basically, the challenges of VANET can be viewed as network challenges and security challenges. High mobility is one of the network challenges since the nodes in VANET are highly movable in their own direction. The important difficulty in the network is that it could not perform congestion control because of the frequent topological changes. All the nodes are communicated through EM signals and the data in the network could be easily corrupted or blocked by the attackers since EM signals are open in the environment. Another important challenge is the distribution of private keys for secret communication among the nodes in the network, and for this reason authentication of each node in this dynamic environment is difficult. Also, integrity of data is questionable since the correct sequence of data may not be possible for the recipient node. Environmental barriers are also possible since EM waves are used in the VANET for communication. Among all the challenges, the life critical application such as road safety in VANET should be protected with confidentiality and integrity. Therefore, our proposal is to establish a trust-based routing scheme that will isolate the malicious traffic from the network by selecting only the trusted nodes with less computational overhead.

    6 Conclusions

    Based on the investigation and analysis of the nomenclature of routing path in the VANET environment, this study has identified several non-performing tasks and provided various information related to the VANET environment. The results of this study can be useful for researchers who wish to implement their proposed work in both real-time and simulation scenarios. Additionally, this paper has described the nature of VANET, its characteristics, and highlighted the security challenges that need to be addressed to protect sensitive data.To evaluate the performance of these routing protocols, custom-built monitoring tools were used to record the performance metrics of the routing protocols. The work demonstrates that AODV outperforms DSR and DSDV in terms of throughput and delay, while DSR consumes the least energy. Additionally, we observed that the performance of the routing protocols varied with the density of vehicles and mobility patterns of the nodes. Our study highlights the importance of conducting real-world experiments to evaluate the performance of routing protocols in VANETs, as they provide more realistic and accurate results than simulation-based studies.

    Moving forward, our findings can aid in the selection and design of efficient and secure routing protocols for VANETs. However, more research is needed to address the security, trust, and privacy issues associated with current routing mechanisms. Future research can focus on developing trusted-based routing mechanisms for VANET that consider these issues. Additionally, more experiments can be conducted to evaluate the performance of routing protocols in various VANET environments with different traffic densities and mobility patterns. This can lead to the development of more robust and efficient routing protocols for VANET, which can significantly enhance the performance and security of VANET networks.

    在线免费十八禁| 国产黄色视频一区二区在线观看| 亚洲精品乱码久久久v下载方式| av在线亚洲专区| 欧美xxⅹ黑人| 看非洲黑人一级黄片| 偷拍熟女少妇极品色| 亚洲精品国产av成人精品| 九九爱精品视频在线观看| 亚洲精品一二三| 22中文网久久字幕| 久久久久久久午夜电影| 韩国av在线不卡| 国产精品麻豆人妻色哟哟久久| 久久久久久久久久久免费av| 97人妻精品一区二区三区麻豆| 各种免费的搞黄视频| 一本色道久久久久久精品综合| 3wmmmm亚洲av在线观看| 日本色播在线视频| 欧美bdsm另类| 亚洲伊人久久精品综合| 亚洲国产欧美在线一区| 亚洲av成人精品一二三区| 99久久精品热视频| 2018国产大陆天天弄谢| av在线天堂中文字幕| 国产成人a∨麻豆精品| 亚洲四区av| 老司机影院成人| 久久久久国产精品人妻一区二区| 久久精品久久久久久久性| 直男gayav资源| 亚洲丝袜综合中文字幕| 日韩成人伦理影院| av天堂中文字幕网| 人妻夜夜爽99麻豆av| 亚州av有码| 18禁裸乳无遮挡免费网站照片| 亚洲精品乱码久久久v下载方式| 欧美激情久久久久久爽电影| 国产精品av视频在线免费观看| 深爱激情五月婷婷| 婷婷色av中文字幕| 亚洲成色77777| 久久精品久久久久久噜噜老黄| 日本av手机在线免费观看| 干丝袜人妻中文字幕| 国产精品99久久久久久久久| 婷婷色综合大香蕉| 欧美xxxx黑人xx丫x性爽| 别揉我奶头 嗯啊视频| 国产黄片美女视频| 免费不卡的大黄色大毛片视频在线观看| 精品久久久精品久久久| 中文字幕久久专区| 亚洲精品日韩在线中文字幕| 在线观看美女被高潮喷水网站| 日本黄色片子视频| 九草在线视频观看| 久久久久久久久大av| 久久人人爽av亚洲精品天堂 | av女优亚洲男人天堂| 久久久久久久亚洲中文字幕| 亚洲精品aⅴ在线观看| 亚洲av福利一区| 99久久精品国产国产毛片| 最近最新中文字幕大全电影3| 九九在线视频观看精品| 国产av不卡久久| 亚洲精品日本国产第一区| 国产成人a区在线观看| 九九在线视频观看精品| a级毛片免费高清观看在线播放| 狂野欧美白嫩少妇大欣赏| 99久久精品一区二区三区| 制服丝袜香蕉在线| 九九在线视频观看精品| 大片电影免费在线观看免费| 久久人人爽人人片av| 午夜免费观看性视频| 日韩人妻高清精品专区| 麻豆国产97在线/欧美| 日韩 亚洲 欧美在线| 少妇的逼水好多| 亚洲精品亚洲一区二区| 色视频在线一区二区三区| 成人鲁丝片一二三区免费| 麻豆成人av视频| 少妇人妻一区二区三区视频| 亚洲高清免费不卡视频| 欧美97在线视频| 男的添女的下面高潮视频| 精品一区在线观看国产| 亚洲国产成人一精品久久久| 国产av码专区亚洲av| 免费不卡的大黄色大毛片视频在线观看| 日本欧美国产在线视频| 欧美老熟妇乱子伦牲交| 精品国产三级普通话版| 五月天丁香电影| 欧美潮喷喷水| 亚洲精品,欧美精品| 欧美一区二区亚洲| 亚洲人成网站在线播| 欧美日韩综合久久久久久| 丰满人妻一区二区三区视频av| 在现免费观看毛片| av在线亚洲专区| 日韩中字成人| 国产精品嫩草影院av在线观看| 亚洲三级黄色毛片| 97人妻精品一区二区三区麻豆| 男男h啪啪无遮挡| 亚洲国产精品国产精品| 日韩av不卡免费在线播放| 91久久精品国产一区二区三区| 国产亚洲一区二区精品| .国产精品久久| 免费电影在线观看免费观看| 久久久久精品性色| 亚洲性久久影院| 少妇被粗大猛烈的视频| 亚洲国产精品成人久久小说| 人妻一区二区av| 99热国产这里只有精品6| 成人无遮挡网站| 又黄又爽又刺激的免费视频.| av在线蜜桃| 激情五月婷婷亚洲| 国产在线一区二区三区精| 亚洲第一区二区三区不卡| 欧美精品国产亚洲| 国产精品久久久久久久久免| 精品国产露脸久久av麻豆| 有码 亚洲区| 99热这里只有是精品在线观看| 九草在线视频观看| 日韩大片免费观看网站| 国产69精品久久久久777片| 久久久久久久久久久免费av| 高清av免费在线| 麻豆乱淫一区二区| 久久久久久久久久人人人人人人| 国产亚洲午夜精品一区二区久久 | 91aial.com中文字幕在线观看| 女人十人毛片免费观看3o分钟| 97在线人人人人妻| 2022亚洲国产成人精品| 天天躁日日操中文字幕| 免费av观看视频| 精品久久久久久久久亚洲| 一区二区三区免费毛片| 国产精品不卡视频一区二区| 亚洲怡红院男人天堂| 久久久色成人| 亚洲精品一二三| 成人国产麻豆网| 免费观看的影片在线观看| 日韩一区二区视频免费看| 一区二区三区精品91| 亚洲国产精品成人综合色| 国产高清三级在线| 精品人妻视频免费看| 午夜老司机福利剧场| 成人欧美大片| 国产精品av视频在线免费观看| 中文乱码字字幕精品一区二区三区| 色5月婷婷丁香| 精品一区二区免费观看| 成人鲁丝片一二三区免费| av天堂中文字幕网| 久久综合国产亚洲精品| 国产成人a区在线观看| 免费看a级黄色片| 在线观看免费高清a一片| 国产成人精品一,二区| 神马国产精品三级电影在线观看| 午夜老司机福利剧场| 国产午夜精品一二区理论片| 精品一区二区免费观看| 51国产日韩欧美| 看免费成人av毛片| av免费在线看不卡| 91久久精品国产一区二区成人| 麻豆成人午夜福利视频| 在线观看人妻少妇| 国产一区二区三区av在线| 一级毛片我不卡| 少妇的逼水好多| 成人国产麻豆网| 人妻少妇偷人精品九色| 国产成人精品福利久久| 有码 亚洲区| 亚洲av不卡在线观看| 精品熟女少妇av免费看| 亚洲色图综合在线观看| 小蜜桃在线观看免费完整版高清| 26uuu在线亚洲综合色| 老司机影院成人| 国产午夜精品一二区理论片| 中国三级夫妇交换| 中文字幕制服av| 国内精品美女久久久久久| 青青草视频在线视频观看| av黄色大香蕉| 自拍偷自拍亚洲精品老妇| 亚洲婷婷狠狠爱综合网| 在线精品无人区一区二区三 | 99久国产av精品国产电影| 亚洲国产精品999| 色吧在线观看| 特大巨黑吊av在线直播| 日韩欧美 国产精品| 丝袜美腿在线中文| 国产探花在线观看一区二区| 国产伦精品一区二区三区视频9| 简卡轻食公司| 全区人妻精品视频| 69人妻影院| 精品一区二区三卡| 国产精品久久久久久精品电影| 51国产日韩欧美| av天堂中文字幕网| 最近中文字幕高清免费大全6| 亚洲av成人精品一区久久| 亚洲成人精品中文字幕电影| 日韩 亚洲 欧美在线| 免费av不卡在线播放| 丰满乱子伦码专区| 日韩视频在线欧美| 七月丁香在线播放| 国产一级毛片在线| 亚洲真实伦在线观看| 一级毛片我不卡| 亚洲,欧美,日韩| 国产精品人妻久久久影院| 热re99久久精品国产66热6| 永久网站在线| 精品久久久精品久久久| 白带黄色成豆腐渣| 校园人妻丝袜中文字幕| 午夜视频国产福利| 2018国产大陆天天弄谢| 久久久久久久亚洲中文字幕| 少妇人妻久久综合中文| 成人鲁丝片一二三区免费| 国内精品美女久久久久久| 日日摸夜夜添夜夜爱| 波多野结衣巨乳人妻| 国产精品久久久久久精品电影| 美女高潮的动态| 欧美xxⅹ黑人| 亚洲综合精品二区| h日本视频在线播放| 我要看日韩黄色一级片| 欧美潮喷喷水| 777米奇影视久久| 亚洲国产成人一精品久久久| 国产真实伦视频高清在线观看| 在现免费观看毛片| 在线a可以看的网站| 成人漫画全彩无遮挡| 亚洲在线观看片| 免费播放大片免费观看视频在线观看| 免费看日本二区| 国内少妇人妻偷人精品xxx网站| videossex国产| 人妻一区二区av| 国产男女内射视频| 久久久久久久亚洲中文字幕| av免费在线看不卡| 亚洲图色成人| 免费播放大片免费观看视频在线观看| 晚上一个人看的免费电影| 国产永久视频网站| 在线 av 中文字幕| 一级毛片黄色毛片免费观看视频| 欧美xxxx黑人xx丫x性爽| 在线精品无人区一区二区三 | 亚洲精品成人av观看孕妇| 国产有黄有色有爽视频| 天天躁日日操中文字幕| 伦理电影大哥的女人| 又粗又硬又长又爽又黄的视频| 熟妇人妻不卡中文字幕| 亚洲成人中文字幕在线播放| 色视频www国产| 在线看a的网站| 精品久久久久久久末码| 亚洲色图av天堂| 日韩成人av中文字幕在线观看| 秋霞伦理黄片| 又粗又硬又长又爽又黄的视频| 尤物成人国产欧美一区二区三区| 亚洲熟女精品中文字幕| 成人二区视频| 国产 一区精品| 国产精品99久久99久久久不卡 | 女人被狂操c到高潮| av网站免费在线观看视频| 最近手机中文字幕大全| 欧美日韩综合久久久久久| 久久6这里有精品| 91精品一卡2卡3卡4卡| 自拍欧美九色日韩亚洲蝌蚪91 | 午夜激情福利司机影院| 亚洲精品亚洲一区二区| 少妇人妻精品综合一区二区| 久久久久久九九精品二区国产| 18禁裸乳无遮挡免费网站照片| 亚洲国产日韩一区二区| 69人妻影院| 国产伦在线观看视频一区| 色哟哟·www| 99热这里只有是精品50| 97超视频在线观看视频| av在线老鸭窝| 大码成人一级视频| 99热这里只有是精品50| xxx大片免费视频| 尤物成人国产欧美一区二区三区| 亚洲av男天堂| 最近最新中文字幕大全电影3| 亚洲国产av新网站| 国产爽快片一区二区三区| 免费观看a级毛片全部| 日韩一区二区三区影片| 日本与韩国留学比较| 日韩 亚洲 欧美在线| 欧美精品一区二区大全| 久久久久精品性色| 国产乱人视频| 51国产日韩欧美| 男的添女的下面高潮视频| 一本一本综合久久| 寂寞人妻少妇视频99o| 精品久久久精品久久久| 免费观看在线日韩| 免费观看的影片在线观看| 国产老妇女一区| 国产精品久久久久久av不卡| av天堂中文字幕网| 久久久久九九精品影院| 99精国产麻豆久久婷婷| 免费观看的影片在线观看| 在线天堂最新版资源| 亚洲婷婷狠狠爱综合网| 国产熟女欧美一区二区| 一本久久精品| 天堂中文最新版在线下载 | 国产精品一区二区三区四区免费观看| 少妇猛男粗大的猛烈进出视频 | 国内精品宾馆在线| 我的老师免费观看完整版| 日本一二三区视频观看| 日本黄大片高清| 国内精品宾馆在线| 欧美精品一区二区大全| 51国产日韩欧美| 亚洲激情五月婷婷啪啪| 国产亚洲一区二区精品| 美女主播在线视频| 亚洲国产成人一精品久久久| 日韩制服骚丝袜av| tube8黄色片| 精品一区二区免费观看| 国产精品麻豆人妻色哟哟久久| 各种免费的搞黄视频| 国产综合懂色| 国产精品人妻久久久影院| 99热这里只有是精品50| 色哟哟·www| 精品久久久久久久人妻蜜臀av| 男女边吃奶边做爰视频| 黄色一级大片看看| av卡一久久| av福利片在线观看| 亚洲精品国产av成人精品| 肉色欧美久久久久久久蜜桃 | 免费看a级黄色片| 在线免费十八禁| 伦理电影大哥的女人| 欧美一区二区亚洲| 久久亚洲国产成人精品v| 久久影院123| 人人妻人人看人人澡| 久久久精品欧美日韩精品| 亚洲人成网站在线观看播放| 青青草视频在线视频观看| 一个人看视频在线观看www免费| 日本爱情动作片www.在线观看| 国产探花极品一区二区| 丝袜美腿在线中文| 国产精品.久久久| av卡一久久| av福利片在线观看| 一区二区三区乱码不卡18| 色网站视频免费| 欧美日韩国产mv在线观看视频 | 亚洲av免费在线观看| 国产成人精品一,二区| 亚洲精品乱久久久久久| 一级毛片aaaaaa免费看小| 精品久久国产蜜桃| 91狼人影院| 最近中文字幕高清免费大全6| 精品酒店卫生间| 精品久久久久久久末码| 寂寞人妻少妇视频99o| 亚洲欧美中文字幕日韩二区| 亚洲真实伦在线观看| 一级av片app| 看非洲黑人一级黄片| 国产在线一区二区三区精| 亚洲一级一片aⅴ在线观看| 国产色婷婷99| 中国国产av一级| 看黄色毛片网站| 中国国产av一级| 天天一区二区日本电影三级| 亚洲婷婷狠狠爱综合网| 国产免费一级a男人的天堂| 51国产日韩欧美| 久久99蜜桃精品久久| 亚洲精品中文字幕在线视频 | 人人妻人人澡人人爽人人夜夜| 亚洲综合精品二区| 国产永久视频网站| 一级av片app| 少妇人妻 视频| 真实男女啪啪啪动态图| 国产精品三级大全| 国产成人午夜福利电影在线观看| 啦啦啦中文免费视频观看日本| 国产黄片美女视频| 一本一本综合久久| 免费高清在线观看视频在线观看| 国产91av在线免费观看| 中国三级夫妇交换| 看黄色毛片网站| 日本av手机在线免费观看| 一个人看的www免费观看视频| 美女cb高潮喷水在线观看| 我的老师免费观看完整版| 久久人人爽人人片av| 免费观看a级毛片全部| 精品亚洲乱码少妇综合久久| 国产成人福利小说| 国产伦在线观看视频一区| 在线观看免费高清a一片| 国产精品久久久久久久电影| 乱系列少妇在线播放| 日本与韩国留学比较| 成年av动漫网址| 我的女老师完整版在线观看| 成人欧美大片| 校园人妻丝袜中文字幕| 老司机影院毛片| 国产老妇伦熟女老妇高清| 国产亚洲5aaaaa淫片| 欧美日韩亚洲高清精品| 我的女老师完整版在线观看| 小蜜桃在线观看免费完整版高清| 久久6这里有精品| 你懂的网址亚洲精品在线观看| 国产淫片久久久久久久久| 蜜臀久久99精品久久宅男| 亚洲av不卡在线观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 成人黄色视频免费在线看| 亚洲久久久久久中文字幕| 免费电影在线观看免费观看| 国产成人午夜福利电影在线观看| 国产免费视频播放在线视频| 成人毛片60女人毛片免费| 秋霞在线观看毛片| 一区二区av电影网| 午夜免费观看性视频| 校园人妻丝袜中文字幕| 免费观看av网站的网址| 国产中年淑女户外野战色| 亚洲美女搞黄在线观看| 最近最新中文字幕免费大全7| 99久久精品一区二区三区| 免费大片18禁| 色网站视频免费| 熟女人妻精品中文字幕| 五月伊人婷婷丁香| 国产成人精品一,二区| 我要看日韩黄色一级片| 三级男女做爰猛烈吃奶摸视频| 久久久久网色| 成人黄色视频免费在线看| 国产大屁股一区二区在线视频| 成人特级av手机在线观看| 久久久久国产网址| 在线 av 中文字幕| 哪个播放器可以免费观看大片| 丝袜喷水一区| 欧美性猛交╳xxx乱大交人| 国产精品一区二区在线观看99| 色婷婷久久久亚洲欧美| 黄片无遮挡物在线观看| 国产久久久一区二区三区| 777米奇影视久久| 欧美+日韩+精品| av国产精品久久久久影院| 黄色配什么色好看| 18禁在线无遮挡免费观看视频| 日韩欧美 国产精品| 99热这里只有是精品在线观看| 亚洲精品,欧美精品| 国产69精品久久久久777片| 亚洲伊人久久精品综合| 国产成人午夜福利电影在线观看| 精品久久久久久久末码| 亚洲精品视频女| 亚洲图色成人| 国产视频首页在线观看| 三级男女做爰猛烈吃奶摸视频| 国产黄色视频一区二区在线观看| 少妇人妻 视频| 久热这里只有精品99| 免费观看性生交大片5| 日本-黄色视频高清免费观看| 久久精品久久久久久久性| 日韩大片免费观看网站| 亚洲,欧美,日韩| 大香蕉97超碰在线| 日本色播在线视频| 亚洲三级黄色毛片| 欧美激情在线99| 欧美精品人与动牲交sv欧美| 午夜精品国产一区二区电影 | 国产综合懂色| 久久人人爽av亚洲精品天堂 | 国产亚洲91精品色在线| 一个人看视频在线观看www免费| 国内精品宾馆在线| 精华霜和精华液先用哪个| 亚洲三级黄色毛片| 一二三四中文在线观看免费高清| 永久免费av网站大全| 国产欧美日韩一区二区三区在线 | www.av在线官网国产| 在线免费十八禁| 久久久久精品久久久久真实原创| 99久久精品一区二区三区| 天天躁日日操中文字幕| 久久久午夜欧美精品| 尤物成人国产欧美一区二区三区| 青春草亚洲视频在线观看| 全区人妻精品视频| 婷婷色av中文字幕| 2018国产大陆天天弄谢| 三级经典国产精品| 免费在线观看成人毛片| 各种免费的搞黄视频| 国产成人freesex在线| 久久久久网色| 精品国产三级普通话版| 亚洲精华国产精华液的使用体验| 国产在视频线精品| 精品人妻视频免费看| 联通29元200g的流量卡| 男男h啪啪无遮挡| 午夜福利在线在线| 国产精品麻豆人妻色哟哟久久| 日本爱情动作片www.在线观看| 欧美精品一区二区大全| 国产在线一区二区三区精| 成人漫画全彩无遮挡| 欧美xxⅹ黑人| 精品99又大又爽又粗少妇毛片| 91久久精品国产一区二区三区| 美女脱内裤让男人舔精品视频| 又爽又黄无遮挡网站| 少妇的逼好多水| 国产白丝娇喘喷水9色精品| 97精品久久久久久久久久精品| 99久久精品热视频| 人人妻人人爽人人添夜夜欢视频 | 色哟哟·www| 三级男女做爰猛烈吃奶摸视频| 久久99热6这里只有精品| 国产一区亚洲一区在线观看| 天天一区二区日本电影三级| 下体分泌物呈黄色| 免费av毛片视频| 久久精品国产亚洲av涩爱| 成年人午夜在线观看视频| 亚洲av成人精品一二三区| 欧美日本视频| 国内精品宾馆在线| 成人国产麻豆网| 尾随美女入室| 亚洲国产精品成人久久小说| 久久99热这里只有精品18| 日日摸夜夜添夜夜添av毛片| 久久久色成人| 亚洲国产av新网站| 欧美+日韩+精品| 水蜜桃什么品种好| 亚洲一级一片aⅴ在线观看| 人妻制服诱惑在线中文字幕| 免费黄色在线免费观看| 亚洲自偷自拍三级| 成人亚洲精品一区在线观看 | 新久久久久国产一级毛片| 久久99热这里只频精品6学生| 亚洲精品亚洲一区二区| 亚洲人成网站高清观看| 国产精品久久久久久av不卡| 国产午夜精品久久久久久一区二区三区|