Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

Design and Analysis of Improved Dynamic Source Routing Protocol in Vehicular Ad-Hoc Network

Author(s): Ankit Kumar and Madhavi Sinha*

Volume 12, Issue 2, 2022

Published on: 30 December, 2020

Page: [142 - 151] Pages: 10

DOI: 10.2174/2210327910999201230105923

Price: $65

Abstract

Background and Objectives: The present issues faced by the transport systems include enormous traffic jams and congestion, unexpected road accidents, unwanted time delays, pedestrians' crossings on main roads, wastage of fuel, and many more. ITS and some other technologies work together to overcome such factors contributing to a much more desirable transport system. This paper aims to identify the security measures that could increase the security of the routing protocol and improve the performance of the DSR routing protocol. If the number of establishing links is frequently broken, then the performance of the DSR routing protocol is not very good. A new modified DSR algorithm has been designed that would help in reducing the network overhead and increase the network quality. A comparison between the performances of both algorithms has also been studied, and the results show that improved DSR routing protocol has better efficiency in parameters like end-to-end network load delays and packet delivery ratio.

Methods & Materials: The paper mainly focuses on securing the Dynamic Source routing algorithm by designing its modified version and simulating it. We have Proposed Modified DSR and discussed so far that the basic functionality of the DSR algorithm, its advantages and disadvantages. The main drawbacks include the end-to-end Delay, network overhead and packet delivery ratio. Following is a modified version of the dynamic source routing algorithm, which tries to overcome all the limitations of the basic algorithm at a certain level. In the Dynamic Source Routing algorithm, the Route Maintenance phase is used for the successful propagation of the packet within the network. The nodes that are involved in the transmission acknowledge the receiving of the packet to the preceding node.

Results and Discussion: The present study aims at modifying the existing algorithm and designing a new modified algorithm that has less routing overhead, less Delay in packet transmission and high network quality. Modified DSR routing algorithm is examined on the parameters like E-2-E delay, Normalize Routing Overhead, PDR. When we compare the performance of the proposed method with the Existing protocol AODV, and DSR at a number of nodes equal to 50 then we get the Proposed DSR, which has the least end-to-end delay among all the three protocols.

Conclusion: In this paper, acomparison of Exiting DSR and Modified DSR in terms of end-to-end Delay, routing load and packet delivery ratio is made. After studying the readings, the conclusion drawn was that there is less network overhead and a high delivery ratio in modified DSR as compared to the existing DSR algorithm. The corrupted and destroyed packets are detected by the receiver, and in DSR, the mobility of mobile nodes is moderate. Under certain conditions, bidirectional and unidirectional links can be accepted. DSR routing protocols are highly dependent on the parameters such as area size, packet size, packet type, and others.

Keywords: MANET, VANET, routing protocols, security attacks, authentication, verification node, disjoint paths, DSR.

Graphical Abstract
[1]
Meadows V, Zellner SN. Method and system for monitoring vehicular traffic using a wireless communications network. U.S. Patent No. 6,690,292, 2004.
[2]
Kumar A, Dadheech P, Kumari R, Singh V. An enhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm. Journal of Statistics and Management Systems 2019; 22(7): 1349-64.
[http://dx.doi.org/10.1080/09720510.2019.1618519]
[3]
Harsch C, Festag A, Papadimitratos P. Secure position-based routing for VANETs Proceedings of IEEE 66th vehicular technology conference (VTC-2007). 26-30.
[http://dx.doi.org/10.1109/VETECF.2007.22]
[4]
Dixit K, Joshi KK, Joshi N. A novel approach of trust based routing to select trusted location in AODV based VANET: a survey. Int J Hybrid Inform Technol 2015; 8(7): 335-44.
[http://dx.doi.org/10.14257/ijhit.2015.8.7.30]
[5]
He Y, Yu FR, Wei Z, Leung V. Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Netw 2019; 86: 154-65.
[http://dx.doi.org/10.1016/j.adhoc.2018.11.006]
[6]
Yao X, Zhang X, Ning H, Li P. Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Netw 2017; 55: 107-18.
[http://dx.doi.org/10.1016/j.adhoc.2016.10.011]
[7]
Salehi M, Boukerche A, Darehshoorzadeh A. Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw 2016; 50: 88-101.
[http://dx.doi.org/10.1016/j.adhoc.2016.07.004]
[8]
Lipinski B, Mazurczyk W, Szczypiorski K, Smietanka P. Towards Effective Security Framework for Vehicular Ad-Hoc Networks. Journal of Advances in Computer Networks 2015; 3(2): 134-40.
[http://dx.doi.org/10.7763/JACN.2015.V3.155]
[9]
Malik A, Pandey B. Asymmetric encryption based secure and efficient data gathering technique in VANET 7th International Conference on Cloud Computing, Data Science & Engineering – Confluence.
[http://dx.doi.org/10.1109/CONFLUENCE.2017.7943177]
[10]
Mehra R, Shrivastava G, Suman A. NAODV A Routing Protocol to Prevent Wormhole Attack in Ad-hoc Network HCTL Open Int J of Technology Innovations and Research. HCTL Open IJTIR 2013.
[11]
Liu H, Chen Y, Tian H, Wang T, Cai Y. A novel secure message delivery and authentication method for vehicular ad hoc networks First IEEE International Conference on Computer Communication and the Internet (ICCCI).
[http://dx.doi.org/10.1109/CCI.2016.7778893]
[12]
Barkouk H, El Mokhta E-N. A New Alert Message Dissemination Protocol for VANETs and Simulation in a Real Scenario International Conference on Information Technology and Communication Systems.
[http://dx.doi.org/10.1007/978-3-319-64719-7_18]
[13]
Kalinin M, Krundyshev V, Zegzhda P, Belenko V. Network security architectures for VANET Proceedings of the 10th International Conference on Security of Information and Networks - SIN ’17.
[14]
Zhong H, Wen J, Cui J, Zhang S. Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Sci Technol 2016; 21(6): 620-9.
[http://dx.doi.org/10.1109/TST.2016.7787005]
[15]
Kumar A. A Novel Framework for Performance Optimization of Routing Protocol in VANET Network. Journal of Advanced Research in Dynamical & Control Systems 2018; 10(2): 2110-21.
[16]
Dixit Prashant, Pillai Anuradha, Rishi Rahul. QoS Enabled Improved Location Aided Routing (QEILA). Recent Pat Eng 2019; 13: 28.
[http://dx.doi.org/10.2174/1872212112666180601090209]
[17]
Chugh Amit, Panda Supriya, Rishi Rahul. Energy Efficient Techniques in Wireless Sensor Networks. Recent Pat Eng 2019; 13: 13.
[http://dx.doi.org/10.2174/1872212112666180731114046]
[18]
Sharma N, Nayyar A. A comprehensive review of cluster based energy efficient routing protocols for wireless sensor networks. International Journal of Application or Innovation in Engineering & Management 2014; 3(1): 441-53. [IJAIEM]
[19]
Nayyar A, Singh R. A comprehensive review of simulation tools for wireless sensor networks (WSNs). Journal of Wireless Networking and Communications 2015; 5(1): 19-47.
[20]
Dadheech P. A Scalable Data Processing Using Hadoop & MapReduce for Big Data. Journal of Advanced Research in Dynamical & Control Systems 2018; 10(2): 2099-109.
[21]
Bhatia T, Verma AK, Sharma G, Bala S. A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks. Recent Pat Eng 2018; 12: 15.
[http://dx.doi.org/10.2174/1872212111666170614115605]
[22]
Tzeng S, Horng S, Li T, Wang X, Huang P, Khan MK. Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs. IEEE Trans Vehicular Technol 2017; 66(4): 3235-48.
[http://dx.doi.org/10.1109/TVT.2015.2406877]
[23]
Naresh Kumar, R. Mustary, R.P. Chander, Moghal Nisar Ahmed Baig, “A performance evaluation of VANET for intelligent transportation system” in World Journal of Science and Technology, Volume 2 Issue 10, January 2013.
[24]
Jiang S, Liu J, Wang L, Fang Y. A Secure Data Forwarding Scheme in Vehicular Named Data Networking 2018 IEEE Global Communications Conference (GLOBECOM). Abu Dhabi, United Arab Emirates. 2018; pp. 206-12.
[http://dx.doi.org/10.1109/GLOCOM.2018.8647216]
[25]
Dhaka VS, Poonia RC, Raja L. The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks International Journal of Ad hoc. Sensor & Ubiquitous Computing 2014; 5(2): 1.
[http://dx.doi.org/10.5121/ijasuc.2014.5201]
[26]
Raja L, Dhaka V S, Poonia R C. The Performance based Evaluation of Models and Routing Protocols for Indian Automotive Networks. Communications on Applied Electronics (CAE) 3(1): 6-11.
[http://dx.doi.org/10.5120/cae2015651598]
[27]
Kumar Ankit, Dadheech Pankaj, Goyal Dinesh, Pawan Kumar Patidar, Dogiwal SR, Janu Neha. A Novel Scheme for Prevention and Detection of Black Hole & Gray Hole Attack in VANET Network. Recent Pat Eng 2020; 14: 1.
[http://dx.doi.org/10.2174/1872212114999200512120211]
[28]
Poonia RC, Raja L. On-Demand Routing Protocols for Vehicular Cloud Computing. Vehicular Cloud Computing for Traffic Management and Systems 2018; pp. 151-77.
[http://dx.doi.org/10.4018/978-1-5225-3981-0.ch007]
[29]
Prabhat Kumar Md, Quadri Zafarul, Sharma Kavita, Nguyen Gia Nhu, Ranjan Preetish. Persistent Cellular Telephony: Enhanced Secure GSM Architecture. Recent Pat Eng 2018; 12: 23.
[http://dx.doi.org/10.2174/1872212111666170808104744]
[30]
Dadheech P, Goyal D, Srivastava S, Choudhary CM. An Efficient Approach for Big Data Processing Using Spatial Boolean Queries. Journal of Statistics and Management Systems 2018; 21(4): 583-91.
[http://dx.doi.org/10.1080/09720510.2018.1471258]
[31]
Kumar A, Sinha M. Overview on vehicular ad hoc network and its security issues International Conference on Computing for Sustainable Global Development (INDIACom). 792-7.
[http://dx.doi.org/10.1109/IndiaCom.2014.6828071]
[32]
Fafoutis X, Di Mauro A, Vithanage MD, Dragoni N. Receiver-initiated medium access control protocols for wireless sensor networks. Comput Netw 2015; 76: 55-74.
[http://dx.doi.org/10.1016/j.comnet.2014.11.002]
[33]
Kumar S, Goyal M, Goyal D, Poonia RC. Routing Protocols and Security Issues in MANET International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions), Dubai. 818-24.
[http://dx.doi.org/10.1109/ICTUS.2017.8286119]
[34]
Sagtani VK, Kumar S. Modern Approach to Enhance Routing Recitation in MANET. Int J Emerg Technol Adv Eng 2014; 4(7): 265.
[35]
Wang X, Lei X, Fan P, Hu RQ, Horng S. Cost Analysis of Movement-Based Location Management in PCS Networks: An Embedded Markov Chain Approach. IEEE Trans Vehicular Technol 2014; 63(4): 1886-902.
[http://dx.doi.org/10.1109/TVT.2013.2285118]
[36]
Horng S, et al. b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET. IEEE Trans Inf Forensics Security 2013; 8(11): 1860-75.
[http://dx.doi.org/10.1109/TIFS.2013.2277471]
[37]
Xiong H, et al. An efficient certificateless aggregate signature with constant pairing computations. Inf Sci 2013; 219: 225-35.
[http://dx.doi.org/10.1016/j.ins.2012.07.004]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy