Share This Article:

Opportunistic Unicast and Multicast Routing Protocol for VANET

Abstract Full-Text HTML Download Download as PDF (Size:370KB) PP. 319-327
DOI: 10.4236/jsea.2013.66040    4,319 Downloads   6,670 Views   Citations


Vehicular Ad Hoc Network (VANET) is a new paradigm of wireless network. Reliable and efficient unicast and multicast routing protocols are critical for VANETs. As a possible solution, opportunistic routing (OR) has received much attention recently. This paper focuses on the aspect of soft security by building trust opportunistic forwarding model in VANET. It incorporates the trust mechanism into OR to enhance the security of routing in resisting malicious attacks. In this paper, we proposed a trusted minimum cost opportunistic unicast routing protocol (TMCOR) and a multicast routing protocol (TMCOM). The simulation results show TMCOR and TMCOM have good throughput, average delay and security gains compared with existing protocols.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Z. Jie, C. Huang, L. Xu, B. Wang, W. Yang and X. Chen, "Opportunistic Unicast and Multicast Routing Protocol for VANET," Journal of Software Engineering and Applications, Vol. 6 No. 6, 2013, pp. 319-327. doi: 10.4236/jsea.2013.66040.


[1] M. Li, K. Zeng and W. J. Lou, “Opportunistic Broadcast of Event-Driven Warning Messages in Vehicular Ad Hoc Networks with Lossy Links,” Computer Networks, Vol. 55, No. 10, 2011, pp. 2443-2464. doi:10.1016/j.comnet.2011.04.005
[2] X. Yu, H. Q. Guo and W.-C. Wong, “A Reliable Routing Protocol for VANET Communications,” 7th International Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, 4-8 July 2011, pp. 1748-1753.
[3] M. L. Zhang and R. S. Wolff, “A Border Node Based Routing Protocol for Partially Connected Vehicular Ad Hoc Networks,” Journal of Communications, Vol. 5, No. 2, 2010, pp. 130-143.
[4] S. Biswas and R. Morris, “ExOR: Opportunistic MultiHop Routing for Wireless Networks,” ACM SIGCOMM, Vol. 35, No. 4, 2005, pp. 133-144.
[5] Z. Zhong, J. Wang and S. Nelakuditi, “Opportunistic AnyPath Forwarding in Multi-Hop Wireless Mesh Networks,” Technical Report TR-2006-015, 2006.
[6] H. Dubois-Ferriere, M. Grossglauser and M. Vetterli, “LeastCost Opportunistic Routing,” Proceedings of 2007 Allerton Conference on Communication, Control, and Computing.
[7] K. Zeng, W. J. Lou, J. Yang and D. R. Brown III, “On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks,” Mobile Networks and Applications, Vol. 12, No. 5, 2007, pp. 347-357.
[8] E. Rozner, J. Seshadri, Y. A. Mehta and L. L. Qiu, “SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks,” IEEE Transactions on Mobile Computing, Vol. 8, No. 12, 2009, pp. 1622-1635.
[9] M. M. Lu, F. Li and J. Wu, “Efficient Opportunistic Routing in Utility-Based Ad Hoc Networks,” IEEE Transactions on Reliability, Vol. 58, No. 3, 2009, pp. 485-495.
[10] M. M. Lu and J. Wu, “Opportunistic Routing Algebra and its Applications,” Proceedings of INFOCOM, 2009, pp. 2374-2382.
[11] K. Zeng, W. Luo and H. Zhai, “On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks,” IEEE INFOCOM’08, Phoenix, 13-18 April 2008, pp. 816-824.
[12] K. Zeng, W. Lou and Y. Zhang, “Multi-Rate Geographic Opportunistic Routing in Wireless Ad Hoc Networks,” IEEE Milcom, Orlando, October 2007.
[13] Z. Zhong and S. Nelakuditi, “On the Efficacy of Opportunistic Routing,” Proceedings of SECON ’07, San Diego, 18-21 June 2007, pp. 441-450.
[14] K. Zeng, Z. Y. Yang and W. J. Lou, “Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks,” IEEE Transactions on Wireless Communications, Vol. 9, No. 11, 2010, pp. 3512-3521.
[15] S. Chachulski, M. Jennings, S. Katti and D. Katabi, “Trading Structure for Randomness in Wireless Opportunistic Routing,” ACM SIGCOMM Computer Communication Review, Vol. 37, No. 4, 2007, pp. 169-180.
[16] T. Cui, L. Chen, T. Ho and S. Low, “Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks,” Proceedings of MASS, ACM, New York, 2007, p. 26.
[17] Y. Sun, W. Yu, Z. Han and K. J. R. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, 2006, pp. 305-317. doi:10.1109/JSAC.2005.861389
[18] G. Theodorakopoulos and J. S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, 2006, pp. 318-328. doi:10.1109/JSAC.2005.861390
[19] S. Peng, W. Jia and G. Wang, “Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad-Hoc Networks,” Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, 17-20 December 2008, pp. 3-9. doi:10.1109/EUC.2008.93
[20] J. Luo, X. Liu, Y. Zhang and D. Ye, “Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-Hoc Networks,” Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN 2008), Montreal, 14-17 October 2008, pp. 305-311.
[21] J. Li, R. Li and J. Kato, “Future Trust Management Framework for Mobile Ad Hoc Networks,” IEEE Communications Magazine, Vol. 46, No. 4, 2008, pp. 108-114.
[22] S. Marti, et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proceedings of MobiCom’00. ACM, New York, 2000, pp. 255-265.
[23] S. Buchegger and B. J. Le, “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad Hoc Networks,” Proceedings of the IEEE ACM Symposium on Mobile Ad Hoc Networking and Computing, ACM, New York, 2002, pp. 226-236.
[24] A. Hassan, M. H. Ahmed and M. A. Rahman, “Performance Evaluation for Multicast Transmissions in Vanet,” IEEE CCECE, Niagara Falls, 8-11 May 2011, pp. 001105-001108.
[25] X. D. Hu, T. Shuai, X. H. Jia and M. H. Zhang, “Multicast Routing and Wavelength Assignment in WDM Networks with Limited Drop-Offs,” IEEE INFOCOM’04, 7-11 March 2004.
[26] H. Y. Wu and X. H. Jia, “QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad Hoc Networks,” Ad Hoc Networks, Vol. 5, No. 5, 2007, pp. 600-612. doi:10.1016/j.adhoc.2006.04.001
[27] A. Sebastian, M. L. Tang, Y. M. Feng and M. Looi, “A Multicast Routing Scheme for Efficient Safety Message Dissemination in VANET,” IEEE Wireless Communications and Networking Conference, Sydney, 18-21 April 2010, pp. 1-6.

comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.