Vehicular ad-hoc networks : applications and technology /
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , , |
Formato: | eBook |
Idioma: | Inglés |
Publicado: |
New York :
Nova Science Publishers,
[2020]
|
Colección: | Computer Science, Technology and Applications Ser.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Intro
- Contents
- Preface
- Chapter 1
- Role of Position-Based Routing Protocols for Different Applications of VANET
- Abstract
- 1. Introduction
- 2. Communication Model for Vanet
- 3. Routing Protocol for Vanet
- 3.1. Topology Based Routing Protocol
- 3.1.1. Proactive Routing Protocols
- 3.1.2. Reactive Routing Protocols
- 3.1.3. Hybrid Routing Protocols
- 3.2. Position-Based Routing Protocols
- 3.3. Cluster-Based Routing Protocols
- 3.4. Geo Cast Based Routing Protocols
- 3.5. Broadcast Based Routing Protocols
- 4. Position-Based VANET Routing Protocol
- 4.1. Non-Delay Tolerant Network
- 4.1.1. Beacon Based Position-Based Routing Protocol
- 4.1.1.1. Greedy Perimeter Stateless Routing (GPSR)
- 4.1.1.2. Geographic Source Routing (GSR)
- 4.1.1.3. Anchor Based Street and Traffic-Aware Routing (A-STAR)
- 4.1.1.4. Greedy Perimeter Coordinator Routing (GPCR)
- 4.1.1.5. Connectivity Aware Routing protocol (CAR)
- 4.1.2. Non-Beacon Based Position-Based Routing Protocol
- 4.1.2.1. Contention Based Forwarding (CBF)
- 4.1.3. Hybrid Routing Protocol
- 4.1.3.1. Topology Assist Geo Opportunistic Routing (TO-GO)
- 4.2. Delay Tolerant Network
- 4.2.1. Vehicle Assisted Data Delivery (VADD)
- 4.2.2. Reactive Pseudo-Suboptimal-Path Selection Routing (RPS)
- 4.3. Hybrid Network
- 4.3.1. GeoDTN + NAV
- 4.3.2. Connectivity Aware Minimum Delay Geographic Routing Protocol (CMGR)
- Conclusion and Future Scope
- References
- Chapter 2
- Elliptic Curve Cryptography in Intelligent Transport Systems
- Abstract
- Introduction
- ITS Applications and Security
- Security in ITS
- Elliptic Curve Cryptography
- Elliptic Curve
- Domain Parameters of the Elliptic Curve
- Point Addition and Point Multiplication
- Different Multiplication Techniques
- Proposed Architecture
- Endomorphism
- Efficient Usage of Endomorphism in ECDSA
- Calculations Using Endomorphism
- Point Adder
- Point Multiplier
- LUT Main
- Proposed Architecture for ≤
- Total Delay
- Architecture for ≤
- U1-k Module
- Results
- Validation Results
- Computational Time Analysis
- Memory Utilization
- Comparison with Other Implementations
- Discussion
- Conclusion and Future Work
- References
- Chapter 3
- Exploitation of Network Coding in On-Demand Wireless Data Broadcast
- Chapter 4
- Fault Diagnosis Techniques for Mobile Wireless Networks
- Abstract
- Introduction
- Unreliable Wireless Connections
- Dynamic and Arbitrary Network Topology
- Resource Limitations
- Minimum Bandwidth Usage
- Distributed Diagnosis
- Adaptable
- Scalability
- Heterogeneous
- Self-Diagnosis
- Dependability: Attributes, Threats, and Means
- Availability
- Reliability
- Safety
- Integrity
- Maintainability
- Fault Prevention Techniques
- Fault Tolerance Techniques
- Fault Removal Techniques
- Fault Forecasting Techniques
- Fault Diagnosis
- Fault Diagnosis Techniques