CFP last date
20 January 2025
Reseach Article

Trusted Opportunistic Forwarding Model in VANET

by Mayuri Pophali, T. S. Yengantiwar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 15
Year of Publication: 2014
Authors: Mayuri Pophali, T. S. Yengantiwar
10.5120/15955-5304

Mayuri Pophali, T. S. Yengantiwar . Trusted Opportunistic Forwarding Model in VANET. International Journal of Computer Applications. 91, 15 ( April 2014), 8-13. DOI=10.5120/15955-5304

@article{ 10.5120/15955-5304,
author = { Mayuri Pophali, T. S. Yengantiwar },
title = { Trusted Opportunistic Forwarding Model in VANET },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 15 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number15/15955-5304/ },
doi = { 10.5120/15955-5304 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:48.284490+05:30
%A Mayuri Pophali
%A T. S. Yengantiwar
%T Trusted Opportunistic Forwarding Model in VANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 15
%P 8-13
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vehicular ad-hoc network (VANET) has created their importance in network area, because of their special characteristics. The important characteristics of VANET are high mobility, self organization, no restrictions on network size all these characteristics made VANET environment a challenging for developing efficient routing protocols. For the better performance in network VANET require a special support, which made a network fast, secure and efficient, the best solution to that is an Opportunistic routing. This paper build a trusted opportunistic forwarding model in VANET, it incorporates trust mechanism into OR and to enhance the security of routing and protect the network from malicious attack. This paper focuses on the ratio of throughput, delay and security must be good more than existing protocols. In this paper, TMCOR and TOMCOM routing protocol are proposed, which are trusted minimum cost opportunistic unicast routing protocol and multicast routing protocol.

References
  1. G. Theodorakopoulos and J. S. Baras, 2006. On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks, IEEE Journal on Selected Areas in Communications.
  2. Y. Sun, W. Yu, Z. Han and K. J. R. Liu, 2006. Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks, IEEE Journal on Selected Areas in Communications.
  3. M. M. Lu and J. Wu, 2009. Opportunistic Routing Algebra and its Applications. In the Proceedings of INFOCOM.
  4. Z. Zhong, J. Wang and S. Nelakuditi, 2006. Opportunistic Any- Path Forwarding in Multi-Hop Wireless Mesh Networks.
  5. K. Zeng, W. J. Lou, J. Yang and D. R. Brown III. 2007 On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks.
  6. K . Zeng, W. Luo and H. Zhai, 2008. On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Network . IEEE INFOCOM'08.
  7. K. Zeng, W. Lou and Y. Zhang, 2007. Multi-Rate Geographic Opportunistic Routing in Wireless Ad Hoc Networks . IEEE Milcom.
  8. S. Biswas and R. Morris, "ExOR: Opportunistic Multi-Hop Routing for Wireless Networks," ACM SIGCOMM, Vol. 35, No. 4, 2005, pp. 133-144.
  9. S. Chachulski, M. Jennings, S. Katti and D Katabi. 2007. Treading structure for the randomness in wireless opportunistic routing. ACM SIGCOMM computer communication.
  10. S. Marti, et al. , 2000. Mitigating Routing Misbehavior in mobile Ad Hoc Network. In the proceeding of MobiCom'00.
Index Terms

Computer Science
Information Sciences

Keywords

Trusted opportunistic routing VANET Degree of trust.