CFP last date
20 December 2024
Reseach Article

Simulating VANET Scenario in NCTUns-6.0

Published on May 2012 by Shivani Singh, B. V. R. Reddy
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 15
May 2012
Authors: Shivani Singh, B. V. R. Reddy
fe0dd39a-676d-451c-b505-58b5a47a04d7

Shivani Singh, B. V. R. Reddy . Simulating VANET Scenario in NCTUns-6.0. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 15 (May 2012), 1-2.

@article{
author = { Shivani Singh, B. V. R. Reddy },
title = { Simulating VANET Scenario in NCTUns-6.0 },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 15 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 1-2 },
numpages = 2,
url = { /proceedings/rtmc/number15/7140-1088/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Shivani Singh
%A B. V. R. Reddy
%T Simulating VANET Scenario in NCTUns-6.0
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 15
%P 1-2
%D 2012
%I International Journal of Computer Applications
Abstract

A Vehicular Ad-Hoc Network ( VANET) is a form of Mobile Ad-Hoc Network (MANET) which provides safety to vehicle drivers by communicating with nearby vehicles. A vehicle in VANET is considered to be an intelligent mobile node capable of communicating with its neighbours in the network. VANET is different from MANET due to high mobility of nodes and the large scale of networks. In this paper, we implement a VANET scenario in NCTUns-6. 0 simulator. We implement two types of communication in VANET: (1) Vehicle to Vehicle (V2V) and (2) Vehicle to Road Side Unit (V2R) communication. The preliminary efforts were focused on the potential applications and the literature review. Our present work in progress is to model and implement various misbehaviours in VANET.

References
  1. R. Parker and S. Valaee,"Vehicular node localization using received signal strength indicator"IEEE Transactions on Vehicular Technology, vol. 56,no. 6,part 1,pp 3371-3380,2007.
  2. C. Laurendeau and M. Barbeau,"Insider attack attribution using signal strength based hyperbolic location estimation,"IEEE Transactions on Vehicular Technology, vol. 56,no. 6,part 1,pp 3371- 3380,2007.
  3. B. -C. Liu, K. -H. Lin, and J. -C. Wu,"Analysis of hyperbolic and circular positioning algorithms using stationary 1. Leinmller T, Schoch E, Kargl F. Position signal-strength-difference measurements in wireless communications,"IEEE Transactions on Vehicular Technology, vol. 55, no. Acknowledgments 2, pp. 499509, 2006.
  4. Rizwanul Karim Sakib , Bisway Reza "Security issues in VANET" Department of Electronics and Communication Engineering April 16, 2010, BRAC University, Dhaka, Bangladesh
  5. NCTUns 6. 0, Network Simulator and Emulator. http://NSL. csie. nctu. edu. tw/nctuns. html.
Index Terms

Computer Science
Information Sciences

Keywords

Vanet Security Attacks