scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Vehicular ad hoc networks (VANETS): status, results, and challenges

TL;DR: Some of the VANET research challenges that still need to be addressed to enable the ubiquitous deployment and widespead adoption of scalable, reliable, robust, and secure VANet architectures, protocols, technologies, and services are outlined.
Abstract: Recent advances in hardware, software, and communication technologies are enabling the design and implementation of a whole range of different types of networks that are being deployed in various environments. One such network that has received a lot of interest in the last couple of years is the Vehicular Ad-Hoc Network (VANET). VANET has become an active area of research, standardization, and development because it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. Recent research efforts have placed a strong emphasis on novel VANET design architectures and implementations. A lot of VANET research work have focused on specific areas including routing, broadcasting, Quality of Service (QoS), and security. We survey some of the recent research results in these areas. We present a review of wireless access standards for VANETs, and describe some of the recent VANET trials and deployments in the US, Japan, and the European Union. In addition, we also briefly present some of the simulators currently available to VANET researchers for VANET simulations and we assess their benefits and limitations. Finally, we outline some of the VANET research challenges that still need to be addressed to enable the ubiquitous deployment and widespead adoption of scalable, reliable, robust, and secure VANET architectures, protocols, technologies, and services.
Citations
More filters
01 Jan 2007
TL;DR: In this paper, the authors provide updates to IEEE 802.16's MIB for the MAC, PHY and asso-ciated management procedures in order to accommodate recent extensions to the standard.
Abstract: This document provides updates to IEEE Std 802.16's MIB for the MAC, PHY and asso- ciated management procedures in order to accommodate recent extensions to the standard.

1,481 citations

Journal ArticleDOI
TL;DR: A taxonomy for vehicular cloud is presented in which special attention has been devoted to the extensive applications, cloud formations, key management, inter cloud communication systems, and broad aspects of privacy and security issues, which found that VCC is a technologically feasible and economically viable technological shifting paradigm for converging intelligent vehicular networks towards autonomous traffic, vehicle control and perception systems.

711 citations


Cites background from "Vehicular ad hoc networks (VANETS):..."

  • ...VANETs provide new arenas for collecting real-time information from onboard sensors on vehicles and for quick dissemination of information....

    [...]

  • ...List of acronyms Amazon EC2 Amazon Elastic Computing Cloud AVS Autonomous Vehicular Cloud CA Certificate Authority CaaS Cooperation as a Service CC Cloud Computing CRL Certificate Revocation List CRM Customer Relationship Management DoS Denial of Services DRP Distributed Revocation Protocol EBS Elastic Book Store EDR Event Data Recorder ENaaS Entertainment as a Service GPS Global Positioning System HOV High Occupancy Vehicle IaaS Infrastructure as a Service INaaS Information as a Service ITS Intelligent Transportation Systems MANET Mobile Adhoc Network MCC Mobile Cloud Computing NaaS Network as a Service OBU On Board Unit PaaS Platform as a Service PKI Public Key Infrastructure RSU Road Side Unit RTPD Revocation Protocol of the Tamper Proof Devices S3 Simple Storage Service SaaS Software as a Service STaaS Storage as a Service V2I Vehicle to Interface V2V Vehicle to Vehicle VANET Vehicular Adhoc Network VC Vehicular Cloud VCC Vehicular Cloud Computing V-Cloud Vehicular Cloud VM Virtual Machine VPKI Vehicular Public Key Infrastructure WSN Wireless Sensor Network showed that this solution is ineffective in the long run and may even increase congestion and pollution levels....

    [...]

  • ...Although a number of studies are performed to address this issue by leveraging VANETs and ITS, they are not able to report traffic problems quickly and usually cannot provide a traffic mitigation plan....

    [...]

  • ...The various ITS stakeholders working together to make VANETs based ITS a reality....

    [...]

  • ...In VANETs, Content based data dissemination, where information is routed based on the content rather than the destination address....

    [...]

Journal ArticleDOI
TL;DR: This work proposes a CPPA scheme for VANETs that does not use bilinear paring and demonstrates that it could supports both the mutual authentication and the privacy protection simultaneously and yields a better performance in terms of computation cost and communication cost.
Abstract: By broadcasting messages about traffic status to vehicles wirelessly, a vehicular ad hoc network (VANET) can improve traffic safety and efficiency. To guarantee secure communication in VANETs, security and privacy issues must be addressed before their deployment. The conditional privacy-preserving authentication (CPPA) scheme is suitable for solving security and privacy-preserving problems in VANETs, because it supports both mutual authentication and privacy protection simultaneously. Many identity-based CPPA schemes for VANETs using bilinear pairings have been proposed over the last few years to enhance security or to improve performance. However, it is well known that the bilinear pairing operation is one of the most complex operations in modern cryptography. To achieve better performance and reduce computational complexity of information processing in VANET, the design of a CPPA scheme for the VANET environment that does not use bilinear paring becomes a challenge. To address this challenge, we propose a CPPA scheme for VANETs that does not use bilinear paring and we demonstrate that it could supports both the mutual authentication and the privacy protection simultaneously. Our proposed CPPA scheme retains most of the benefits obtained with the previously proposed CPPA schemes. Moreover, the proposed CPPA scheme yields a better performance in terms of computation cost and communication cost making it be suitable for use by the VANET safety-related applications.

625 citations

Journal ArticleDOI
TL;DR: This work discusses the benefits of IoV along with recent industry standards developed to promote its implementation, and presents recently proposed communication protocols to enable the seamless integration and operation of the IoV.
Abstract: Today, vehicles are increasingly being connected to the Internet of Things which enable them to provide ubiquitous access to information to drivers and passengers while on the move. However, as the number of connected vehicles keeps increasing, new requirements (such as seamless, secure, robust, scalable information exchange among vehicles, humans, and roadside infrastructures) of vehicular networks are emerging. In this context, the original concept of vehicular ad-hoc networks is being transformed into a new concept called the Internet of Vehicles (IoV). We discuss the benefits of IoV along with recent industry standards developed to promote its implementation. We further present recently proposed communication protocols to enable the seamless integration and operation of the IoV. Finally, we present future research directions of IoV that require further consideration from the vehicular research community.

471 citations


Cites background from "Vehicular ad hoc networks (VANETS):..."

  • ...The concept of vehicular ad-hoc networks (VANETs) was conceived over a decade ago and has since then been a very active area of research both in academia and industry [6]–[9]....

    [...]

Journal ArticleDOI
TL;DR: This paper presents an extensive overview of VANET security characteristics and challenges as well as requirements, and gives the details of the recent security architectures and the well-known security standards protocols.

471 citations

References
More filters
Proceedings ArticleDOI
01 Aug 2000
TL;DR: Greedy Perimeter Stateless Routing is presented, a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet's destination to make packet forwarding decisions and its scalability on densely deployed wireless networks is demonstrated.
Abstract: We present Greedy Perimeter Stateless Routing (GPSR), a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet's destination to make packet forwarding decisions. GPSR makes greedy forwarding decisions using only information about a router's immediate neighbors in the network topology. When a packet reaches a region where greedy forwarding is impossible, the algorithm recovers by routing around the perimeter of the region. By keeping state only about the local topology, GPSR scales better in per-router state than shortest-path and ad-hoc routing protocols as the number of network destinations increases. Under mobility's frequent topology changes, GPSR can use local topology information to find correct new routes quickly. We describe the GPSR protocol, and use extensive simulation of mobile wireless networks to compare its performance with that of Dynamic Source Routing. Our simulations demonstrate GPSR's scalability on densely deployed wireless networks.

7,384 citations

Journal ArticleDOI
24 Jan 2005
TL;DR: It is shown that such an approach can yield an implementation of the discrete Fourier transform that is competitive with hand-optimized libraries, and the software structure that makes the current FFTW3 version flexible and adaptive is described.
Abstract: FFTW is an implementation of the discrete Fourier transform (DFT) that adapts to the hardware in order to maximize performance. This paper shows that such an approach can yield an implementation that is competitive with hand-optimized libraries, and describes the software structure that makes our current FFTW3 version flexible and adaptive. We further discuss a new algorithm for real-data DFTs of prime size, a new way of implementing DFTs by means of machine-specific single-instruction, multiple-data (SIMD) instructions, and how a special-purpose compiler can derive optimized implementations of the discrete cosine and sine transforms automatically from a DFT algorithm.

5,172 citations

Proceedings ArticleDOI
25 Oct 1998
TL;DR: A new routing protocol for ad hoc networks built around two novel observations, one of triggering the sending of location updates by the moving nodes autonomously, based on a node's mobility rate, and the other of minting the overhead used for maintaining routes using the two new principlw of update message frequency and distance.
Abstract: 1 Introduction h this paper we introduce a new routing protocol for ad hoc networks built around two novel observations. One, called the distance eflect, usw the fmt that the greater the distance separating two nodes, the slower they appear to be moving with respect to each other. Accor@gly, the location information in routing tables can be updated as a function of the distance separating nodes without compromising the routing accuracy. The second idea is that of triggering the sending of location updates by the moving nodes autonomously, based ody on a node's mobility rate. htuitively, it is clear that in a direction routing dgorithrn, routing information about the slower moving nodes needs to be updated less frequently than that about hig~y mobtie nodw. h this way e~ node can optimize the frequency at which it sends updates to the networks and correspondingly r~ duce the bandwidth and energy used, leading to a fully distributed and self-optimizing system. B~ed on thwe routing tablw, the proposed direction algorithm sends messages in the " recorded dwectionn of the destination node, guaranteeing detivery by following the direction with a given probability. We show by detailed simda-tion that our protocol always delivers more than 80% of the data messages by following the direction computed, without using any recovery procedure. In addition, it mintilzes the overhead used for maintaining routes using the two new principlw of update message frequency and distance. Lastly, the dgorithrn is fully distributed, provides loop-free paths, and is robust, since it suppfies multiple routes. Pemlissiontomakedigitalorhsrdcopiesof allorpartof this\vorkfor personal or classroom use is granted without fee provided that copies are not mzde or dis~.buted for prolit or commercial ad~arrtageand that copies bcwrthis notice and the full citation on the first page. To copy othm}tise, to republish, to post on senrers or to redistribute to lists, requires prior specific permission an&'ora fee. 76 Rom a routing perspective, an ad hoc network is a packet radio network in which the mobile nodes perform the routing functions. Generdy, routing is multi-hop since nodes may not be within the wireless transmission range of one another and thus depend on each other to forward packets to a given destination. Since the topology of an ad hoc network changes frequently, a routing protocol should be a distributed algorithm that computes multiple, cycle free routes while keeping the communication overhead to a minimum (see, e.g., [4]). One way to …

1,593 citations

Journal ArticleDOI
TL;DR: An overview of the field of vehicular ad hoc networks is given, providing motivations, challenges, and a snapshot of proposed solutions.
Abstract: There has been significant interest and progress in the field of vehicular ad hoc networks over the last several years. VANETs comprise vehicle-to-vehicle and vehicle-to-infrastructure communications based on wireless local area network technologies. The distinctive set of candidate applications (e.g., collision warning and local traffic information for drivers), resources (licensed spectrum, rechargeable power source), and the environment (e.g., vehicular traffic flow patterns, privacy concerns) make the VANET a unique area of wireless communication. This article gives an overview of the field, providing motivations, challenges, and a snapshot of proposed solutions.

1,545 citations


"Vehicular ad hoc networks (VANETS):..." refers background in this paper

  • ...This might allow the signer to send certificates in a subset of data messages or in separate certificate-sharing messages [42]....

    [...]

  • ...5, we present some of recent VANET projects undertaken by various groups and organizations in the US, Japan, and the European Union....

    [...]

  • ...We present a review of wireless access standards for VANETs, and describe some of the recent VANET trials and deployments in the US, Japan, and the European Union....

    [...]

  • ...6 VANET Trials supported by consortia in the USA, European Union, and Japan [42]...

    [...]

  • ...The following sections provide a brief overview of recent and current key projects that have been, or are in progress, under the auspice of agencies in USA, Europe, and Japan....

    [...]