2015 22nd International Conference on Telecommunications (ICT) 2015
DOI: 10.1109/ict.2015.7124661
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of PUMA routing protocol for Manhattan mobility model on vehicular ad-hoc network

Abstract: The Quality of Service (QoS) on the traffic environment with high mobility, dynamic topology, and change trajectory is one of the challenges in the use of Vehicular Ad-Hoc Networks (VANET) Routing Protocols. PUMA routing protocol presents multicast work mechanism based on shared mesh topology. It always dynamically adapt to VANET traffic conditions.In this paper, we evaluated the PUMA routing protocol performance using the Manhattan Mobility Model with the effect of the Nakagami fading distribution in VANET. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…It assumes that vehicle has a numerical map using destination also source addresses to find the best route. Authors in [14] presented an approach in which each node has a weight. Weights are calculated using connection quality, mobility and so on.…”
Section: Literaturementioning
confidence: 99%
“…It assumes that vehicle has a numerical map using destination also source addresses to find the best route. Authors in [14] presented an approach in which each node has a weight. Weights are calculated using connection quality, mobility and so on.…”
Section: Literaturementioning
confidence: 99%
“…We also propose a comparison between static, dynamic and probabilistic algorithms used by the PRE-VE protocol. The parameters shown in Table V represent the main simulation environment while, as area map, we choose a portion of NYC (USA), because its particular road configuration has been already used in several works [40]. The simulation is performed by using two different types of load: the first one limits the number of vehicles across the city and the frequency of vehicle generation; the second one presents a huge number of vehicles generated with a higher frequency.…”
Section: B Simulation Campaignsmentioning
confidence: 99%
“…It can be used by attackers to perform the attack. The attack aims to destabilize a running cooperative algorithm [3]. It makes VANET network vulnerable to attacks that can cause problems even on small networks.…”
Section: Introductionmentioning
confidence: 99%