Vehicular ad-hoc networks: applications and technology

G. G. Md. Nawaz Ali (Editor), Md. Noor-A-Rahim (Editor), Pushpendu Kar (Editor)

Research output: Book/ReportBookpeer-review

Abstract

From the past decade vehicular ad hoc networks got tremendous attention from the industry, academia and research community. According to US National Highway Traffic Safety Administration (NHTSA), there are more than 30 thousands fatalities caused by the vehicle accidents in the U.S. each year, which worth around $250 billion economic cost annually. Research shows that 82% of these accidents can be reduced by the successful deployment of vehicular networks, because nearly 75% percent of vehicular crashes are caused by inattentive drivers.
Literally, vehicular ad hoc networks means a network forms by the vehicles. But it has been evolved to network with the infrastructure as well due to the inherent intermittent nature of vehicle-to-vehicle (V2V) connection. The high mobility of vehicles, wireless communication loss and range constraints are the main reason for this intermittent V2V connection. So, now vehicular networks means communication between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). There are billions of dollars invested to research, deployment and testing of vehicular networks. For the emerging connected and autonomous vehicle (CAV), a stable vehicular networks is the foremost requirement. It is now very much visible that CAV will be the future of Intelligent Transportation System (ITS).
The book is dedicated to discuss for the techniques, applications and relevant technologies of vehicular ad hoc networks and its challenges. The first chapter discusses about the routing protocols of vehicular networks. It focuses on different position-based routing protocols and their mechanisms for the successful use of vehicular networks for different applications. The second chapter discusses on the security and privacy issues on vehicular networks. A well-known security technique called Elliptic Curve Cryptography (ECC) is discussed to secure vehicular data from various tampering attacks. The third chapter discusses on the on-demand wireless broadcasting mechanism for improving data dissemination performance in terms of data delivery ratio and response time.
A network-coding based approach has been investigated for improving the overall performance of existing classical data broadcast algorithms. The fourth chapter describes how to get a dependable system in the lossy communication medium. This chapter discusses on a number of fault diagnosis techniques, their strengths and weaknesses, and it reviews their implementations in mobile wireless networks. The fifth chapter discusses the basics of Blockchain technology, applications, research challenges and opportunities in the field. Finally, chapter six discuss about the identification and mitigation of the faulty nodes in the wireless network.
Original languageEnglish
Place of PublicationNew York
PublisherNova Science Publishing
Edition1st
ISBN (Electronic)9781536180398
Publication statusPublished - Sept 2020

Publication series

NameComputer Science, Technology and Applications
PublisherNova Science Publishing

Fingerprint

Dive into the research topics of 'Vehicular ad-hoc networks: applications and technology'. Together they form a unique fingerprint.

Cite this