Though a topic of heavy theoretical research, in the real-world Vehicle Ad Hoc Networking (VANET) faces one great challenge: lack of hardware adoption. There are few vehicles manufactured today that ...have the On–Board Units (OBUs) necessary for vehicular networking. Most cities around the world are not yet equipped with Road Side Units (RSUs), which are required in many VANET schemes for basic functionality. Current literature tends to assume that the existence of RSUs, OBUs and other network infrastructure will become commonplace in the near future. This is simply not feasible from a monetary and manufacturing perspective, especially for rural or poorer areas.
In order to deal with this lack of hardware new approaches must be considered. One possible approach is to use smartphones in place of dedicated OBU hardware. To this end, a basic platform for a smartphone–based peer–to–peer VANET system is explored 1. Surprisingly, no real–world applications have yet been tested on it. In order to investigate the effectiveness of this platform in a real–world scenario and whether this solution to the hardware problem is viable, this paper is aimed to implement a forward collision detection system in Veins simulator. To test the feasibility of a smartphone VANET system in the real–world and demonstrate its feasibility, we utilized a real–world data gathered from published articles.
Emergency Electronic Brake Light (EEBL) is a VANET safety application designed to combat rear end crashes, which represent 398,000 incidents per year in the United States. Given the ubiquitous ...presence of smartphones in the population, the smartphone as a VANET platform has the potential for mass adoption. An EEBL application on a smartphone VANET could improve road safety significantly by reducing rear end crashes. However, there are many difficulties inherent in developing safety applications on the VANET, such as lack of sensors, noisy data, inaccurate GPS readings and poor networking capabilities. In this work, we have outlined the primary challenges of developing a smartphone Emergency Electronic Brake Light application, as well as potential solutions to these challenges found in the literature. This paper proposes an architecture for a novel smartphone VANET EEBL.
Over the last few decades, the attraction towards Vehicular Ad Hoc Network (VANET) has engrossed huge investigation, to upgrade road safety and entertainment for the traveler, by imparting real time ...information among vehicles. In order to accomplish this, network layer has attained significant attention; therefore, abundant routing protocols have been proposed. In VANET, frequent movement and rapid topological variation lead to repeated link breakage, causing loss in packet and delay. As compared to other VANET routing protocols proposed so far, location based routing methods provide one of the best solutions, by not relying on pre destination route entries. However, location based routing protocol also encounters several challenges such as local optimum problem, inaccurate positioning, optimum forwarder selection and broadcasting overheads. This paper analyzes these challenges in brief, and critically compares the existing solutions proposed so far. It also presents brief description of emerging WAVE+LTE based technology along with some viable direction for future improvement related to location based routing protocols.
In this paper, Quality of service based numerous mobility models with network performance parameters for optimization of HANETSs are reviewed, observed and analyzed. In smart cities, emergency ...services, traffic congestion and safety issues can be resolute by intelligent communication heuristic and transforming information between vehicles and transportation infrastructure. Self-organization and optimization in ICN, congestion, dynamic topology, high mobility, scalability and self-organization makes it difficult and costly to implement in real time deployment. Under multiple scenarios and conditions performance of different routing heuristics and network performance parameters are observed in literature by different authors using different simulation tools. Variable speed of vehicles, Road conditions, unpredictable driver behavior and obstacles influence the performance of different routing protocols. Data size and high mobility put a great influence on network lifetime. In this paper we analyzed the speed impact on VANET performance parameters like throughput and packet delivery ratio at different BSMs in different scenarios. Mobility and link awareness can enhance the network lifetime and other parameters like throughput, goodput and packet delivery ratio of vehicular ad hoc network observed under simulation
A vehicular ad hoc network (VANETs) is transforming public transport into a safer wireless network, increasing its safety and efficiency. The VANET consists of several nodes which include RSU ...(Roadside Units), vehicles, traffic signals, and other wireless communication devices that are communicating sensitive information in a network. Nevertheless, security threats are increasing day by day because of dependency on network infrastructure, dynamic nature, and control technologies used in VANET. The security threats could be addressed widely by using machine learning and artificial intelligence on the road transport nodes. In this paper, a comparison of trust and cryptography was presented based on applications and security requirements of VANET.
Vehicular ad hoc networks (VANETs) have become one of the most promising and fastest growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart vehicles and roadside units (RSU) ...which communicate through unreliable wireless media. By their very nature, they are very susceptible to attacks which may result in life-endangering situations. Due to the potential for serious consequences, it is vital to develop security mechanisms in order to detect such attacks against VANETs. This paper aims to survey such possible attacks and the corresponding detection mechanisms that are proposed in the literature. The attacks are classified and explained along with their effects, and the solutions are presented together with their advantages and disadvantages. An evaluation and summary table which provides a holistic view of the solutions surveyed is also presented.