Enhanced Hybrid Dual Channel Algorithm (EHDC) for Data Dissemination in VANETs

International Journal of Computer Science and Engineering
© 2021 by SSRG - IJCSE Journal
Volume 8 Issue 7
Year of Publication : 2021
Authors : Dr S.Jenicka, T.Grace Shalini

How to Cite?

Dr S.Jenicka, T.Grace Shalini, "Enhanced Hybrid Dual Channel Algorithm (EHDC) for Data Dissemination in VANETs," SSRG International Journal of Computer Science and Engineering , vol. 8,  no. 7, pp. 1-9, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I7P101


Vehicular ad hoc network (VANET) is regarded as the most upcoming and demanding technology for transportation system revolutionizing at which the vehicles can transfer information on sending a message among one another through a wireless means. VANET gives the structure of communication on behalf of safety-critical message dissemination like emergency messages and beacons. VANET is a subdivision of MANET, which offers a distinguished approach for Intelligent Transport System (ITS). Oncehugeamount of vehicles transmits beaconon a high bandwidth; the frequency could be pooped very simply. So packet collision occurs. To avoid the occurrence, an adaptive beacon broadcast and adaptive congestion control conception are presented in this paper. This paper discusses the broadcasting of critical messages in VANET through the Cognitive agent approach. Its collated emergency message from vehicles minimizes the transmission speed and also spreads it out to a large area. Most of the existing systems only consider the message sending speed and aggregation. In this proposed system focus is on the receiver side process that addresses “How to spread Message and How to receive a message in a large number of vehicles”. So the work focuses on accident vehicles and accident areas. When an accident occurs in a vehicle, it generates messages frequently depending on the sensors. The message will be checked by regression mechanism to find out it is critical or not; either is critical this goes Road Side Unit (RSU). Then RSU will dive into the area with multiple sectors depending upon the vehicle density because of the fast transition. It provides faster and reliable communication through vehicle-to-vehicle (VV) and vehicle-to-interface (VI). In VANETs, Vehicle to Vehicle communication, it tacks more interfaces likes RSU OBU SERVER. Performance of the proposed system is evaluated by delay and throughput.




[1] Kakkasageri · S. S. Manvi · Jeremy Pitt., Cognitive Agent Based Critical Information Gathering and Dissemination in Vehicular Ad hoc Networks, Springer Science +Business Media, LLC,(2012).
[2] S. Kakkasageri, S.S. Manvi., Regression based critical information aggregation and dissemination in VANETs: A cognitive agent approach Vehicular Communications 1 (2014) 168–180
[3] Caliskan, M., Mauve, M., Rech, B., &Luebke, A., Collection of dedicated information in vehicular ad hoc networks. In 12th orld congress on intelligent transport systems. San Francisco, USA (2005) 1–12.
[4] Fubler, H., Moreno, T., Transier, M., Kruger, R., Hartenstein, H., &Effelsberg, W., Studying vehicle movements on highways and their impact on ad-hoc connectivity. In ACM international conference on mobile Computing and Networking (MobiCom). Cologne, Germany, (2005) 26–27.
[5] Schnaufer, S., Fubler, H., Transier, M., &Effelsberg, W., Vehicular ad-hoc networks: Single-hop broadcast is not enough. In 3rd International workshop on intelligent transportation (WIT), Hamburg, Germany, (2006) 49–54.
[6] Balon, N., &Guo, J., Increasing broadcast reliability in vehicular ad hoc networks. In 3rd International workshop on vehicular ad hoc networks (VANET). Los Angeles, USA (2006) 1–2.
[7] Mobile Information Systems, IOS Press, 5(4) 363–389.
[8] 8.Manvi, S., &Kakkasageri, M., Issues in mobile ad hoc networks for vehicular communication. IETE Technical Review, 25(2) (2008) 59–72.
[9] Shibata, N. et al., A method for sharing traffic jam information using inter-vehicle communication, (2006). http://ito- ab.naist.jp/themes/pdffiles/060725.shibata.v2vcom06.pdf. Accessed 12 October 2009
[10] Raya, M. and Hubaux, J., The Security of Vehicular Ad Hoc Networks, in proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN),Alexandria, VA, (2005) 1 – 1.
[11] Harsch, C., Festag, A. &Papadimitratos, P., Secure Position-Based Routing forVANETs, in Proceedings of IEEE 66th Vehicular Technology Conference (VTC), Fall. 2007,September, (2007) 26 – 30.
[12] Gerlach, M., Full Paper: Assessing and Improving Privacy in VANETs, www.networkon-wheels.de/downloads/escar2006gerlach.pdf (accessed: May 29, 2010).
[13] Jinyuan, S., Chi, Z. &Yuguang, F., An ID-based Framework Achieving Privacy and Non-Repudiation, In Proceedings of IEEE Vehicular Ad Hoc Networks, Military Communications Conference (MILCOM), October, (2007) 1 – 7.
[14] Balon, N., Introduction to Vehicular Ad Hoc Networks and the Broadcast Storm Problem,http://www.csie.ntpu.edu.tw/~yschen/course/96-2/Wireless/papers/broadcast-5.pdf (accessed: May 29,2010).
[15] Bickel, G., Inter/Intra-Vehicle Wireless Communication.http://userfs.cec.wustl.edu/~gsb1/index.html#toc (accessed: May 29, 2010).
[16] R. Soua and P. Minet., Multichannel assignment protocols in wireless sensor networks: A comprehensive survey, Pervasive and Mobile Computing, (2014).
[17] O. D. Incel., A survey on multi-channel communication in wireless sensor networks, Computer Networks, 55(13) (2011) 3081–3099.
[18] G. K. Audhya, K. Sinha, S. C. Ghosh, and B. P. Sinha., A survey on the channel assignment problem in wireless networks, Wireless Communications, and Mobile Computing,11(5) (2011) 583–609.
[19] Chieochan, E. Hossain, and J. Diamond, Channel assignment schemes for infrastructure-based 802.11 WLANs: A survey, Communications Surveys & Tutorials, IEEE, 12(1) (2010) 124–136.
[20] E. Tragos, S. Zeadally, A. Fragkiadakis, and V. Siris, Spectrum assignment in cognitive radio networks: A comprehensive survey, IEEE Communications Surveys & Tutorials, 15(3) (2013) 1108–1135.
[21] M. Mishra and P. Saxena., Survey of channel allocation algorithms research for cellular systems, International Journal of Networks and Communications, 2(5) (2012) 75–104.
[22] J. Kolodziej, S. U. Khan, L. Wang, and D. Chen., Game-based models of grid user’s decisions in security-aware scheduling, Large Scale Network-Centric Distributed Systems, (2013) 431–462.
[23] S. U. Khan., Mosaic-net: a game theoretical method for selection and allocation of replicas in ad hoc networks, TheJournal of Supercomputing, 55(3) (2011) 321–366.
[24] S. U. Khan and I. Ahmad., Replicating data objects in large distributed database systems: an axiomatic game theoretic mechanism design approach, Distributed and Parallel Databases, 28(2-3) (2010)187–218.
[25] A cooperative game theoretical replica placement technique, in Proc. of 13th International Conference on Parallel and Distributed Systems (ICPADS’07), Hsinchu, Taiwan.IEEE, (2007) 1–8.
[26] A pure nash equilibrium guaranteeing game theoretical replica allocation method for reducing web access time, in Proc. of 12th International Conference on Parallel and Distributed Systems, (ICPADS 2006), Minneapolis, MN, USA.,IEEE,1(2006) 169–176.
[27] A semi-distributed axiomatic game theoretical mechanism for replicating data objects in large distributed computing systems, in Proc. of 21st IEEE International Parallel and Distributed Processing Symposium, (IPDPS’07), Long Beach, CA, USA. IEEE, (2007) 1–10.
[28] A cooperative game theoretical technique for joint optimization of energy consumption and response time in computational grids, IEEE Transactions on Parallel and Distributed Systems, 20(3) (2009) 346–360.
[29] S. Khan., On a game theoretical methodology for data replication in ad hoc networks, in Proc. of International Conference on Parallel and Distributed Processing Techniques and Applications DPTA,09), Las Vegas, NV, USA., (2009) 232–238.
[30] S. U. Khan and I. Ahmad., A pure nash equilibrium-based game theoretical method for data replication across multiple servers,
Dr S.Jenicka & T.Grace Shalini / IJCSE, 8(7), 1-9, 2021
IEEE Transactions on Knowledge and Data Engineering, 21(4) (2009) 537–553.
[31] S. Shamshirband, A. Patel, N. B. Anuar, M. L. M. Kiah and A. Abraham., Cooperative game-theoretic approach using fuzzy q-learning for detecting and preventing intrusions in wireless sensor networks, Engineering Applications of Artificial Intelligence, 32 (2014) 228–241.
[32] M. T. Hassan, E. Ahmed, J. Qadir, and A. Baig, Quantifying the multiple cognitive radio e on Advanced Information Networking and Applications Workshops (WAINA), IEEE, (2013) 511–516.
[33] L. T. Tan and L. B. Le., Channel assignment with access contention resolution for cognitive radio networks, IEEE transactions on Vehicular Technology, 61(6) (2012) 2808–2823.
[34] Wang and Y. Huang., A cross-layer design of channel assignment and routing in cognitive radio networks, in Proc. Of 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT’10), Beijing, China, IEEE, 7(2010) 542–547.
[35] R. Irwin, A. MacKenzie, and L. DaSilva, Resource minimized channel assignment for multi-transceiver cognitive radio networks, IEEE Journal on Selected Areas in Communications, 31(3) (2013) 442–450.