Cargando…

Vehicular ad-hoc networks : applications and technology /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: G., G.
Otros Autores: Nawaz Ali, G. G. Md (Editor ), Noor-A-Rahim, Md (Editor ), Kar, Pushpendu (Editor )
Formato: eBook
Idioma:Inglés
Publicado: New York : Nova Science Publishers, [2020]
Colección:Computer Science, Technology and Applications Ser.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Intro
  • Contents
  • Preface
  • Chapter 1
  • Role of Position-Based Routing Protocols for Different Applications of VANET
  • Abstract
  • 1. Introduction
  • 2. Communication Model for Vanet
  • 3. Routing Protocol for Vanet
  • 3.1. Topology Based Routing Protocol
  • 3.1.1. Proactive Routing Protocols
  • 3.1.2. Reactive Routing Protocols
  • 3.1.3. Hybrid Routing Protocols
  • 3.2. Position-Based Routing Protocols
  • 3.3. Cluster-Based Routing Protocols
  • 3.4. Geo Cast Based Routing Protocols
  • 3.5. Broadcast Based Routing Protocols
  • 4. Position-Based VANET Routing Protocol
  • 4.1. Non-Delay Tolerant Network
  • 4.1.1. Beacon Based Position-Based Routing Protocol
  • 4.1.1.1. Greedy Perimeter Stateless Routing (GPSR)
  • 4.1.1.2. Geographic Source Routing (GSR)
  • 4.1.1.3. Anchor Based Street and Traffic-Aware Routing (A-STAR)
  • 4.1.1.4. Greedy Perimeter Coordinator Routing (GPCR)
  • 4.1.1.5. Connectivity Aware Routing protocol (CAR)
  • 4.1.2. Non-Beacon Based Position-Based Routing Protocol
  • 4.1.2.1. Contention Based Forwarding (CBF)
  • 4.1.3. Hybrid Routing Protocol
  • 4.1.3.1. Topology Assist Geo Opportunistic Routing (TO-GO)
  • 4.2. Delay Tolerant Network
  • 4.2.1. Vehicle Assisted Data Delivery (VADD)
  • 4.2.2. Reactive Pseudo-Suboptimal-Path Selection Routing (RPS)
  • 4.3. Hybrid Network
  • 4.3.1. GeoDTN + NAV
  • 4.3.2. Connectivity Aware Minimum Delay Geographic Routing Protocol (CMGR)
  • Conclusion and Future Scope
  • References
  • Chapter 2
  • Elliptic Curve Cryptography in Intelligent Transport Systems
  • Abstract
  • Introduction
  • ITS Applications and Security
  • Security in ITS
  • Elliptic Curve Cryptography
  • Elliptic Curve
  • Domain Parameters of the Elliptic Curve
  • Point Addition and Point Multiplication
  • Different Multiplication Techniques
  • Proposed Architecture
  • Endomorphism
  • Efficient Usage of Endomorphism in ECDSA
  • Calculations Using Endomorphism
  • Point Adder
  • Point Multiplier
  • LUT Main
  • Proposed Architecture for ≤
  • Total Delay
  • Architecture for ≤
  • U1-k Module
  • Results
  • Validation Results
  • Computational Time Analysis
  • Memory Utilization
  • Comparison with Other Implementations
  • Discussion
  • Conclusion and Future Work
  • References
  • Chapter 3
  • Exploitation of Network Coding in On-Demand Wireless Data Broadcast
  • Chapter 4
  • Fault Diagnosis Techniques for Mobile Wireless Networks
  • Abstract
  • Introduction
  • Unreliable Wireless Connections
  • Dynamic and Arbitrary Network Topology
  • Resource Limitations
  • Minimum Bandwidth Usage
  • Distributed Diagnosis
  • Adaptable
  • Scalability
  • Heterogeneous
  • Self-Diagnosis
  • Dependability: Attributes, Threats, and Means
  • Availability
  • Reliability
  • Safety
  • Integrity
  • Maintainability
  • Fault Prevention Techniques
  • Fault Tolerance Techniques
  • Fault Removal Techniques
  • Fault Forecasting Techniques
  • Fault Diagnosis
  • Fault Diagnosis Techniques