Fuzzy Risk-based Decision Method for Vehicular Ad Hoc Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 9
Abstract
A vehicular ad hoc network (VANET) is an emerging technology that has the potential to improve road safety and traveler comfort. In VANETs, mobile vehicles communicate with each other for the purpose of sharing various kinds of information. This information is very useful for preventing road accidents and traffic jams. On Contrary, bogus and inaccurate information may cause undesirable things, such as automobile fatalities and traffic congestion. Therefore, it is highly beneficial to consider risk before vehicle takes any decision based on the received information from the surrounding vehicles. To overcome these issues, we propose a new risk-based decision method for vehicular ad hoc networks. It determines a risk-based the three key elements: 1) application type and sensitivity level, 2) vehicle context and 3) driver’s attitude. This paper also provides theoretical analysis and evaluation of the proposed method, and it also discusses the applications of the proposed model.
Authors and Affiliations
Riaz Shaikh
Agent based Bandwidth Reservation Routing Technique in Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), inefficient resource allocation causes heavy losses to the service providers and results in inadequate user proficiency. For improving and automating the quality of service of MA...
Implementation of Intelligent Automated Gate System with QR Code
This paper is about QR code-based automated gate system. The aim of the research is to develop and implement a type of medium-level security gate system especially for small companies that cannot afford to install high-t...
Smart Sustainable Agriculture (SSA) Solution Underpinned by Internet of Things (IoT) and Artificial Intelligence (AI)
The Internet of Things (IoT) and Artificial Intelligence (AI) have been employed in agriculture over a long period of time, alongside other advanced computing technologies. However, increased attention is currently being...
Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect
The prolific growth of network communication system entails high risk of breach in information security. This substantiates the need for higher security for electronic information. Cryptography is one of the ways to secu...
Dominating Sets and Spanning Tree based Clustering Algorithms for Mobile Ad hoc Networks
The infrastructure less and dynamic nature of mobile ad hoc networks (MANET) needs efficient clustering algorithms to improve network management and to design hierarchical routing protocols. Clustering algorithms in mob...