Figure 1 - uploaded by Gagangeet Singh Aujla
Content may be subject to copyright.
SUMO Simulation Environment 

SUMO Simulation Environment 

Source publication
Article
Full-text available
Past few decades have witnessed large increase in number of vehicles on roads due to which the traffic safety needs have also become complex and hence necessary to be taken care of. Vehicular ad hoc networks (VANETs) are becoming an asset for achieving all these goals. VANETs provide applications like driver assistance, passenger comfort and vehicl...

Context in source publication

Context 1
... of the foremost requirements while simulating VANETs is that we should keep the mobility model as real as possible. Real world traffic environment contains roads, junctions, traffic lights, dead ends and crossings. So these all real world aspects should be preserved in simulation. For this purpose we have chosen SUMO [17]. SUMO is a freeware simulator for simulation of real time traffic environments. It can import maps from various sources like OpenStreetMap, Tiger database and from many other sources. In our implementation we have taken map from OpenStreetMap. Many maps were shortlisted in beginning but in the end a map with good combination of straight lines and intersections has been chosen. Then mobility trace file for this traffic environment which could be run in NS-2 has been created with the help of MOVE which is built on top of SUMO. Because SUMO can create simulation environment for real road network but could not show communication among vehicles. Simulation screenshot of SUMO is given in following Figure 1. NS2 is a popular open source tool which based on 802.11 MAC layer of wireless communication networks. It is an object oriented tool which runs on occurrence of events in the network. We have used ns-2.35 version of NS-2 in which AODV is built in. NS2 can run .tcl files generated from real time traffic in SUMO and can show visual output of communication and message passing with the help of nam (network ...

Similar publications

Article
Full-text available
The networks that interconnect vehicles on road are called Vehicular Ad hoc Networks (VANETs). VANET is a unique type of network which comes under the shades of MANET, where the communication occurs between various vehicles moving on the paths. It is a different approach for intelligent transport system (ITS). The main target of research in VANETs...
Article
Full-text available
Routing in Mobile Ad Hoc Networks (MANETs) is critical. As such, there are many routing protocols that have been proposed over the years. Each routing protocol has weaknesses and strengths. Currently, much of research on routing protocols in MANETs concentrates on literature reviews, performance comparison and proposition of new protocols. However,...
Article
Full-text available
The demand of Mobile Ad hoc networks (MANETs) has received much attention in a recent year and many active research projects relevant with MANETs. MANETs are the wireless network that uses multi-hop routing to provide network connectivity. The network topology in MANETs is dynamic in nature. There are new challenges for routing protocols in MANETs...
Article
Full-text available
Routing protocol election in MANET (Mobile Ad Hoc Network) is a great challenge, because of its frequent topology changes and routing overhead. This paper compares performances of three routing protocols: Destination Sequenced Distance Vector (DSDV), Ad Hoc Ondemand Distance Vector (AODV) and Dynamic Source Routing (DSR), based on results analysis...
Article
Mobile Ad-hoc networks (MANET) are being installed in a wide range of applications like military scenarios, rescue operations, data and device networks etc. Many of these networks uses battery operated nodes. A major requirement of these networks is to wisely utilize the battery power of nodes, so that the nodes can actively participate in process...

Citations

... The technology transmits information using peer-to-peer (P2P) method of communication without any restriction unless the vehicles are not within the transmission range (Xiong, and Li, 2015). In MANET environment, the movement of nodes are not constrained by any spatial or geographical limits, and thereby moves in any direction (Singh and Aujla, 2014), and as there is similarity between MANET and VANET in terms of short communication range and random topology which indicates that routing protocol is needed in both MANET and VANET. ...
Conference Paper
Full-text available
The highly dynamic movement of vehicles in the highway environment brings frequent topology changes that make routing of data between vehicles a difficult task in a Vehicular Ad hoc Network (VANET) technology. When topology changes, there is a possibility of an increase or decrease in data traffic sent between source nodes and destination nodes which makes it difficult to determine the suitability and the most reliable routing protocols to deploy in this regard. To properly and adequately investigate this irregularity, we implement and evaluate this study by using a combination of two simulators tools; the vehicular mobility generator and network simulator based on some important network performance metrics in highway scenario, to examine the impact of varying the speed of node at a constant transmission range and constant node density on the behavior of two examples of position-based routing protocols when compared for effective message delivery. However, the simulated result shows that each protocol under investigation behaved differently in relation to network performance metrics studied.
... The drawback that has been found in this research is that no new game theoretical concepts have been introduced and all the analysis was done on the basis of older game theoretical concepts. In [15] game theory was applied to analyze physical layer security. In this research work, dependency and adversary relationships of the network nodes were analyzed and it was concluded that physical layer security has rational nature and so multi-objective optimization is needed. ...
... Security and privacy are the major addressable issues in VANETs [15]. The existing security solutions for VANETs are primarily focused on preventive solutions. ...
Conference Paper
Vehicular Ad-hoc Networks (VANETs) are prone to several types of attacks due to their decentralized nature and mobility. The involvement of traffic and human beings makes it important to secure VANETs to a maximum extent. There is an urgent need to move one step ahead of just preventing the attacks. We need to have a mechanism that can access and analyze the risk priority of an attacker's way of attacking and defender's way of defending. The attacker may have several ways for achieving his goal of causing damage and every way has a different severity and impact.. So, the assessment of all these ways can help the defender to get the insight into the psyche of attacker. This assessment will definitely help the society to get prevention from such unwanted attacks. In this paper, a risk priority assessment model of SSL SYN attack is designed using attack-defense tree model in VANETs. Attack-defense tree model is used to analyze and present the approaches used by attackers to achieve SSL SYN attack. A game theoretic approach is adopted by attacker and defender to maximize their objectives. The rationality of the attack defense model using game theory is investigated using risk priority number on the basis of severity, occurrence and detection ratings. The mathematical assessment shows the impact of this work.
... In Figure 6, shows the control overhead. In this graph overhead is giant because in LEACH protocol extra overheads due to cluster head change and calculation leading to energy incompetence for dynamic clustering in large networks [17]. ...
Article
Full-text available
The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way to systematize WSN in applications like surveillance, industrial monitoring, traffic monitoring, habitat monitoring, cropping monitoring, crowd including etc. The rising use of these networks is making engineers evolve novel and efficient ideas in this field. A group of research in data routing, data density and in network aggregation has been proposed in recent years. The energy consumption is the main apprehension in the wireless sensor network. There are many protocols in wireless sensor network to diminish the energy consumption and to put in to the network lifetime. Among a range of types of techniques, clustering is the most efficient technique to diminish the energy expenditure of network. In this effort, LEACH protocol has been second-hand for clustering in which cluster heads are nominated on the basis of distance and energy. The LEACH protocol is been implemented in a simulated environment and analyze their performance graphically.
... In Figure 6, calculates control overhead is the ratio between a total number of control packets and a total number of packets delivered successfully. From the graph, it is observed that LEACH has high overhead due to delay increase [15]. The control overhead is reduced in the contention Avoidance Algorithm because less packet loss in the network. ...
Article
Full-text available
Wireless Sensor Network is built of more than a few nodes where each node is linked to one sensor. The main challenging task in this network is lifetime and energy consumption. The LEACH protocol is energy efficient protocol to reduce their energy consumption different modes is applied on the sensor nodes. These modes are sleep, Active and ready mode. These modes are applied on LEACH protocol and this enhancement is called RFID protocol. The main problem exists in RFID protocol is of clock synchronization due which packet loss happened in the network which reduce network performance. To overcome this problem, proposed contention Avoidance Algorithm (RTS /CTS). In this technique cluster, head nodes send RTS packets containing a NONCE feed to all its cluster members. The member nodes would adjust their clocks according to the feed and revert back with CTS packets are synchronization their clocks. The proposed technique has been implemented in Network Simulator. The graphical results show that proposed technique performs batter than LEACH, RFID protocol in terms of throughput, energy and packet loss, Delay and control overhead in the network.
... In LEACH protocol throughput will be decrease due to high energy consumption, packet loss and overhead [15 ].In figure 7, calculates control overhead is the ratio between a total number of control packets and total number of packets delivered successfully. From the graph it is observed that LEACH has high overhead due to delay increase [18]. In table 2, calculates the Average of all parameters and R-LEACH is improved in comparison to the old that mean the latest edition of LEACH outperforms the original version of LEACH protocol. ...
Article
Full-text available
Wireless sensor networks are composed of numerous small charge, little power devices with sensing, local processing and wireless communication capabilities. Minimizing energy consumption and maximizing network lifespan are significant issues in the design of routing protocols for sensor networks. In this paper, we analyses the efficiency of LEACH protocol in extending the existence for energy-constrained wireless sensor networks. Based on LEACH protocol, an enhanced protocol termed as R- LEACH is proposed which aims to diminish energy consumption within the wireless sensor networks. The simulation results suggest R-LEACH protocol could equilibrium network energy consumption and extend the network lifecycle more successfully as compared to LEACH.
Article
This paper proposes the Optimized Road Condition and Azimuth Routing (ORCAR) based on VANET for Optimized Vehicular Traffic Flow. First, it measures the road condition in order to computes a risk for the efficient vehicular traffic flow. Second, it also proposes the Context Centric Network based Azimuth Routing (CCNAR) so that it may transfer accurately and rapidly to destination the traffic information message in which the computed risk is reflected. Therefore, the ORCAR not only reduces the scope of message transmission with the CCNAR, but also provides the vehicles that enter an urban intersection with traffic information apace by selecting the transmission paths having the least path disconnection by density. Compared to the existing CCN and AODV, the CCNAR diminishes the transmission times of request messages by density and azimuth by 2% and transfers it rapidly after receiving the traffic information stored in the Content Store of an intermediate vehicle. Besides, the ORCAR prevents traffic jam from happening by separating the transmission zones of traffic information according to congestion.