Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication 2013
DOI: 10.1145/2448556.2448604
|View full text |Cite
|
Sign up to set email alerts
|

A comparison of various vehicular ad hoc routing protocols based on communication environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The Sybil attack is capable of destructive other mistake resistant techniques such as difference, multi path redirecting, redirecting methods, information gathering or amassing, voting, reasonable source allowance and topology servicing. This attack may also affect the regional redirecting methods, where the harmful node provides several details to other nodes in the network and thus seems to be in more than one site at once [20]. Hello Flood: At the beginning of connection, node has to declare itself to the network by transmitting hello message to their nearby nodes.…”
Section: Network Layer Sinkholementioning
confidence: 99%
See 1 more Smart Citation
“…The Sybil attack is capable of destructive other mistake resistant techniques such as difference, multi path redirecting, redirecting methods, information gathering or amassing, voting, reasonable source allowance and topology servicing. This attack may also affect the regional redirecting methods, where the harmful node provides several details to other nodes in the network and thus seems to be in more than one site at once [20]. Hello Flood: At the beginning of connection, node has to declare itself to the network by transmitting hello message to their nearby nodes.…”
Section: Network Layer Sinkholementioning
confidence: 99%
“…Verification is the effective defense measures for these assault i.e. routers will only approve redirecting details from legitimate routers [20] [21].…”
Section: Network Layer Sinkholementioning
confidence: 99%
“… Different communication environments -VANET has two types of environments i.e. highway environment & city environment [12].…”
Section: Characteristics Of Vanetmentioning
confidence: 99%
“…VANET supports two types of communication: Vehicle to vehicle and vehicle to infrastructure communication. In vehicular communication, information generation and distribution occur with the vehicle to vehicle and vehicle to infrastructure [2,3] a. The ability of moving vehicles is highly predictable because vehicles are moving with only two directions on the same road.…”
Section: Introductionmentioning
confidence: 99%