You are on page 1of 8

Vehicular Ad Hoc Network

(VANET): Enabling Secure and


Efficient Transportation System
Saira Gillani
M. A. Jinnah University
Imran Khan
M. A. Jinnah University
Shahid Qureshi
Center for Advanced Studies in Engineering
Amir Qayyum
M. A. Jinnah University

concept of ubiquitous computing for future. Vehicles


ABSTRACT equipped with wireless communication technologies
and acting like computers will be on our roads soon and
An ad hoc network consisting of vehicles has
this will revolutionize our concept of traveling.
emerged as an interesting but challenging domain where
VANETs bring lot of possibilities for new range of
lot of new application may find their place. In this paper,
applications which will not only make our travel safer
a survey of potential applications, medium access control
but fun as well. Reaching to a destination or getting
schemes and routing protocols for VANETs is presented.
help will be much easier. The concept of VANETs is
Applicability of various medium access (MAC) schemes
quite simple: by incorporating the wireless
including IEEE 802.11p, which is the proposed MAC for
communication and data sharing capabilities, the
VANETs, is also given. In the routing area, various
vehicles can be turned into a network providing similar
protocols proposed for VANETs from the reactive,
services to the ones we are used to in our office or
proactive, hierarchical and position-based routing
home networks.
schemes are discussed and analyzed.
For the wide spread and ubiquitous use of VANETs, a
INTRODUCTION number of technical challenges exist. Several academic
and industrial projects were initiated to address these
VEHICULAR Ad Hoc Networks (VANETs) is a new challenges. One of the earliest European projects was
challenging network environment that pursues the FleetNet (Sep 2000 – Dec 2003) [1]. Its objectives were
to develop a platform for inter-vehicular
Manuscript received December 16, 2008; revised January 12, 2009. communication, implement demonstrator applications
S. Gillani is a member of Center of Research in Networks and Telecommunication
(CoReNeT) at M. A. Jinnah University, Islamabad (e-mail: sairagilani@yahoo.com).
and then to standardize the solutions. Some other
I. Khan is a member of Center of Research in Networks and Telecommunication prominent projects include Network on Wheels (NoW)
(CoReNeT) at M. A. Jinnah University, Islamabad 44000 Pakistan (phone: +92-300- [2] and CarTALK2000 [3]. Car-to-Car Communication
539-7149; e-mail: imrankhan1984@gmail.com). Consortium (C2C-CC) [4] is an umbrella organization
S. Qureshi is with the Center for Advanced Studies in Engineering, Islamabad,
44000, Pakistan and is a member of Center of Research in Networks and
overseeing VANET research activities in Europe. It
Telecommunication (CoReNeT) (e-mail: mshahidqureshi@gmail.com). includes many automobile industry members like
A. Qayyum is the head of Center of Research in Networks and Telecommunication Daimler, BMW, Audi, Fiat, Renault and some German
(CoReNeT) at M. A. Jinnah University, Islamabad, 44000, Pakistan (e-mail: universities. The overall objective of C2C-CC is to
aqayyum@ieee.org).
initiate, develop and oversee vehicle to vehicle system can alert the driver about the road scenario, e.g.,
communication standards, business models and an accident, thus giving the driver enough time to apply
regulatory matters in European Union. brakes well before hitting the accident place. According
to a study, if the driver gets a warning half a second
VANETs are considered as an off-shoot of Mobile Ad before the collision, more than half of the accidents can
hoc Networks (MANETs), however they have some be avoided [5]. Another study found that collisions at
distinguishing characteristics too. The solutions proposed intersections account for almost half of the overall road
for MANETs need to be evaluated carefully in order to collisions [6]. This number can also be reduced with
be used in VANET context. In many ways VANETs are the help of early warning system. Some other kind of
also similar to MANETs. For example, both networks are warning systems can also be deployed to avoid the
multi-hop mobile networks having dynamic topology. accidents, e.g., work zone warning, stopped vehicle
There is no central entity, and nodes themselves route warning, low bridge warning for trucks, etc.
data across the network. Both MANETs and VANETs
are rapidly deployable without the need of an Safety applications demand strict time delay bounds.
infrastructure. Even a fraction of a second is important in decision
making. Thus the requirement of hard deadline posed
MANET and VANET, both are mobile networks; by the safety applications requires special handling at
however, the mobility pattern of VANET nodes is such lower layers. As network layer is concerned, not much
that they move on specific paths (roads) and hence not in routing is involved in safety applications, because the
random direction. This gives VANETs some advantage target audiences for the messages are usually in the
over MANETs as the mobility pattern of VANET nodes neighbourhood. Therefore the messages need not to be
is predictable. MANETs are often characterized by sent to nodes more than one hop away. This fact puts
limited storage capacity, low battery and processing the whole burden on MAC layer, which needs to
power. VANETs, on the other hand, do not have such deliver the message with minimum delay. Detailed
limitations. Sufficient storage capacity and high discussion on MAC layer and routing is presented in
processing power can be easily made available in later sections.
vehicles. Moreover vehicles also have enough battery
power to allow for long range communication. Another TRAFFIC MANAGEMENT
difference is highly dynamic topology of VANETs Another application for VANETs is to tackle road
because vehicles may move at high velocities. This congestions and provide the best route to a driver with
makes the lifetime of communication links between updated road conditions. This can involve the use of
nodes quite short. Node density is also unpredictable; some road side equipment e.g., intelligent traffic
during rush hours the roads are crowded with vehicles, signals, e-sign boards etc. Information about the road
whereas at other times lesser vehicles are there. Similarly congestions ahead can definitely help in reducing the
some roads have more traffic than other roads. congestion and improving the capacity of roads. Some
other applications can also be envisioned like
The rest of the paper is organized as follows; section 2 automated call to emergency services, en-route and pre-
presents VANET applications and their requirements, trip traffic assistance etc. An interesting application is
section 3 describes the MAC layer schemes that can be eToll plaza, where vehicles don’t need to stop to pay
used in VANETs, section 4 surveys the various routing toll fee. Vehicles can communicate with the roadside
protocols proposed for VANETs and section 5 concludes infrastructure, where it can be recognized and a fee can
the paper. be charged against its account.

APPLICATIONS Congestion at road intersections can be handled in an


efficient manner using intelligent traffic signals. These
For the purpose of illustration, VANET applications traffic signals can adjust themselves in response to the
may be divided into following categories. traffic conditions at intersection and can even
communicate the status to neighbouring intersections.
SAFETY APPLICATIONS Neighbouring intersections can thus display this
Road safety applications can play an important role in information on the e-sign boards and adjust their traffic
avoiding accidents or at least minimizing the impact of signals accordingly.
accidents, if accident is unavoidable. An early warning
Traffic management applications extensively use the road Access (CSMA), in which there is a single shared
side infrastructure. Some infrastructure may be available broadcast channel. In these types of protocols, collision
to be used by any user while some will need may occur, and due to collisions, packets suffer
subscription. For example, e-Toll infrastructure will unbounded delays [7].
require a subscription to offer its services. For these
applications, the infrastructure needs to be managed and VANET protocols need to reduce the medium access
updated. For these applications to work, the delay for traffic safety applications that demand shorter
infrastructure with relevant information needs to be delay to transmit data [8]. In addition to this, the
managed and controlled. hidden and exposed terminal problem makes it
difficult to provide reliable communication in
USER APPLICATIONS wireless networks. Therefore, although deterministic
Besides road safety applications, information and MAC protocols appear to be more suitable for
entertainment applications are also envisioned for VANETs, the need of a central entity opposes the basic
VANETs. The passengers in a vehicle can enjoy the theme of VANETs (an ad-hoc network of vehicles).
facility of Internet connectivity where other traditional Hence, VANET must support contention based MAC
wireless internet connectivity options (Wi-Fi, Wi-MAX protocols.
etc.) are not available. Even in the presence of such
options, a node connected to internet through these There are many MAC issues in VANETs, like
options, can share its connectivity with other vehicles prioritized access, unpredictable response and
through VANET. Peer-to-peer applications can also find reliability. These should be assured because these are
their place in VANETs, e.g., gaming, chatting, file basic requirements of safety applications. The hidden
sharing, etc. terminal problem and exposed node problem make
it difficult to provide reliable transmission in
The messages sent by such type of applications usually wireless networks. Many MAC layer techniques are
need to be delivered over multiple hops, hence routing available to solve these problems. Some MAC
will be involved. However, routing in VANETs has its protocols have been evaluated in VANETs perspective.
own challenges which need to be addressed by the The European project FleetNet [1] proposes an
routing protocol of the VANET. Lot of research is being approach, Reliable R-Aloha (RR-Aloha) based on
done in the routing domain also, which will be covered slotted Aloha. It implements TDMA in a distributed
in the routing section. way where nodes perform a reservation to acquire slots
[9].
MEDIUM ACCESS CONTROL (MAC) SCHEMES
ADHOC MAC is a protocol based on the slotted time
FOR VANETS structure [10]. It was developed for the CarTALK2000
project [3]. It provides a distributed reservation
MAC layer protocols are responsible for maintaining protocol to dynamically establish a reliable single hop
order and managing use of a shared medium. These broadcast channel (BCH). A drawback of ADHOC-
protocols decide which node will access the medium at MAC is that the number of vehicles in same
any time. As previously mentioned, safety critical communication range must not be greater than the
applications demand tight delay bounds. These number of slots in the frame time [8]. Another MAC
applications are designed to alert drivers about protocol, Direct and Relay protocol for Vehicle
immediate danger. So, a MAC scheme is needed to take Communications (DRVC) has been developed for
care of these strict application requirements. higher reach ability than ordinary DSRC protocol [11].
There are two basic strategies for channel acquisition. IEEE 802.11 is most widely used wireless local area
One is contention free or controlled access protocols, like network standard. This standard is based on CSMA/CA
Time Division Multiplexing Access (TDMA) and and is employed in almost all variants of IEEE802.11
Frequency Division Multiplexing Access (FDMA), in like 802.11a, 802.11b, 802.11g and new coming
which access to the medium is pre-allocated. The standard 802.11p. IEEE 802.11b uses Direct Sequence
drawback of these protocols is that they need a central Spread Spectrum (DSSS) as modulation scheme which
entity responsible for fair distribution of channel reduces multi path fading. IEEE 802.11a/g both use
resources among nodes. The other is contention based or Orthogonal Frequency Division Multiplexing (OFDM)
random access protocols, like Carrier Sense Multiple as modulation scheme. IEEE 802.11 tackles hidden and
exposed node problem by using Request To Send (RTS) IEEE 802.11p starts from the allocation of 75MHz
and Clear To Send (CTS) mechanism. Both, 802.11b and Dedicated Short Range communication (DSRC)
802.11g standards are used in many VANET prototypes, spectrum at 5.9GHz band (U.S) and 5.8GHz band
e.g. NoW project used 802.11b standard in their (Japan and Europe) especially for vehicular
prototypes [2]. communication. This channel allocation is free but it
uses licensed frequency band. DSRC has seven
IEEE 802.11 variants like a/b/g/n are not suitable for channels each with 10 MHz frequency band. One of the
VANET because all these variants use unlicensed channels is control channel which is specific for safety
frequency bands that are not specified for vehicular applications and therefore is a high priority channel.
environments. Another drawback of these variants is the Other channels are service channels which can be used
latency involved due to channel access, association and for safety as well as non safety applications.
authentication processes. In VANET, due to high speed
of vehicles, safety applications become meaningless if TABLE 1
the connection setup delay before the start of OPERATIONS OF WAVE FUNCTIONAL ENTITIES
communication is too long.
1609.1 Specifies the services and interfaces of the WAVE
Currently, IEEE is working on the 802.11p - local area Resource Manager application
1609.2 Defines secure message formats and processing
network standard that is based on IEEE 802.11 Enhanced 1609.3 Defines network and transport layer services
Distributed Channel Access (EDCA). Wireless Access including addressing and routing, in support of
for Vehicular Environment (WAVE) is an architecture secure WAVE data exchange
that defines a new standard for vehicular communication 1609.4 Enables operation of upper layers across multiple
channels, without requiring knowledge of PHY
[12]. Figure 1 illustrates the WAVE architecture.
parameters
802.11p Define the WAVE signaling technique and interface
functions that are controlled by the IEEE 802.11
MAC

ROUTING STRATEGIES FOR VANETS


VANETs consist of mobile nodes having dynamic
topology; hence the mechanism of finding, maintaining
and using routes for communication is not trivial for
fast moving vehicles. Short lifetime of communication
link, less path redundancy, unpredictable node density
and strict application requirements make routing in
VANETs quite challenging. In the related and similar
domain of MANETs, there has been extensive research
about the routing protocols during the past decade.
Early VANET prototypes and studies have used
MANET routing protocols as such, but later on, these
protocols are adapted for the VANET environment.

Figure 1: Wireless Access Vehicular Environments (WAVE)


Architecture

Upper layer protocols and services requirements of


WAVE are described by IEEE 1609 standards. In Table
1 Operation of WAVE entities is briefly described. IEEE
802.11p provides foundation for WAVE signaling
technique and interface functions that are controlled by
the IEEE 802.11 MAC. It proposes to amend the overall
IEEE 802.11 standard [7]. It is envisioned to play an
anchor role for future inter-vehicular communication.
Figure 2: Categories of routing protocols proactive nature of OLSR allowed it to use another path
already present. AODV, on the other hand, first
discovered route and then used it. That’s why the PDR
In this survey, the routing protocols for VANETs are
of OLSR was higher, and ROR was lower than AODV.
classified into three main categories; ad hoc routing
protocols (developed for MANETs), position-based
In [21] AODV, DSR and OLSR are simulated to
routing protocols, and cluster-based routing protocols.
measure their performance in urban environment with
Additionally, a hybrid routing protocol, which combines
traffic signals and stop signs. The results again show
the first two approaches, is also discussed in brief. Figure
that OLSR out performs both AODV and DSR in the
2 illustrates the routing protocols categories.
urban environment. Better throughput, little or no delay
AD HOC ROUTING PROTOCOLS and jitter make OLSR a better choice over other ad hoc
routing protocols. This study again builds a favorable
Because MANETs and VANETs have many similar
case for OLSR. In urban environments, the reactive
characteristics, hence early studies about VANETs made
routing protocols suffer largely because of frequent link
use of the routing protocols developed for MANETs. Ad
failures, and network partitioning, while proactive
hoc routing protocols are classified into two main
routing protocols avoid these problems. From [20] and
categories: proactive and reactive.
[21], it can be concluded that proactive routing
protocols are a better choice for urban environments.
Proactive routing protocols continuously update the
routing table, thus generating sustained routing overhead, POSITION BASED ROUTING PROTOCOLS
whereas reactive routing protocols do not periodically
Constrained mobility of VANET nodes (restricted to
update the routing table. Instead, when there is some data
the roads) make it possible to leverage the benefits of
to send, they initiate route discovery process through
position based routing protocols. Many new vehicles
flooding which is their main routing overhead. Reactive
have on-board navigation system, which can be used to
routing protocols also suffer from the initial latency
obtain location information. Additionally, information
incurred in the route discovery process, which make
from digitized street maps can also provide location
them unsuitable for safety applications. AODV [13],
information. GPSR is quite well known position based
DSR [14] and TORA [15] are the examples of reactive
routing protocol. GPSR works best in open spaces,
routing protocols whereas OLSR [16], TBRPF [17] and
where there are no obstacles between the
FSR [18] are the examples of proactive routing
communication nodes.
protocols.
A study [22] shows that position based routing protocol
Several comparative studies [19], [20], [21] have been like Greedy Perimeter Stateless Routing (GPSR) [23] is
conducted to evaluate performance of the ad hoc routing able to perform better than ad hoc routing protocol like
protocols in VANETs. In [19] the performance of DSR. The study simulated GPSR against DSR in a
AODV, DSR, TORA and FSR is evaluated. The highway scenario and showed near 100% PDR for
simulation carried out depicts an urban scenario; it shows GPSR, whereas DSR performed poorly. However, the
that AODV performed better than others. TORA suffered performance of GPSR in urban scenario is not shown.
due to high routing overhead, resulting in low Another study addressed this point and showed that
throughput. DSR and FSR both had similar performance obstacles found in urban environment, and where some
expect that DSR had higher average delay than FSR. roads have more vehicles than others, often leads to
poor performance of GPSR [24]. Greedy Perimeter
Another study carried out performance comparison of Coordinator Routing (GPCR) [25] and Geographic
AODV and OLSR in urban environments and found that Source Routing (GSR) [26] are other two proposed
OLSR outperforms AODV in VANETs [20]. The study routing protocols, to improve the performance of GPSR
uses many performance metrics (such as Packet Delivery in urban environment.
Ratio (PDR) against average velocity, Constant Bit Rate
(CBR) data generation, node density, Routing Overhead Anchor-based Street and Traffic Aware Routing (A-
Ratio (ROR) against CBR data generation and node STAR) is another approach to overcome the problems
density, delay and average number of hops, etc.) and faced in the urban settings by position based routing
evaluated protocols on them. OLSR was able to cope protocols [27]. A-STAR uses street maps to compute
with node density, end-to-end delays and has less ROR the sequences of junctions, called Anchors, through
and high PDR than AODV. When a path failed, the which a packet must pass. Paths are computed with
traffic awareness using Dijkstra’s shortest path Another cluster-based routing protocol is Location
algorithm. If an anchor point is not reachable, it is based Routing Algorithm with Cluster Based Flooding
marked as ‘out-of-service’ temporarily, so that no other (LORA_CBF) [33]. In this algorithm two new network
node uses that particular anchor. In this study, A-STAR entities, gateway and cluster member, are introduced in
is compared with GPSR and GSR in urban environment. addition to the cluster-head. A gateway is a node
It shows that as the node density increases, A-STAR has connected to more than one clusters while cluster
better delivery ratio as compared to both GPSR and member is an ordinary node. Every cluster has only one
GSR. All three protocols have almost similar end-to-end cluster-head. Packets are sent from source to
delay as number of nodes increase. In another scenario, destination using greedy routing. If there is no route
as the number of hops increase, i.e. sender and receiver available then a request message is generated. Only
are far away from each other, A-STAR out performs both cluster-heads and gateway will forward this message
GPSR and GSR in terms of accumulated number of and the reply against it. Simulations show an improved
packets delivered. This performance gain is because of performance by LORA_CBF as compared to reactive
the presence of dedicated points (anchors), which are routing protocols like AODV and DSR. However, the
responsible for routing the packets. comparison between cluster-based techniques and
proactive routing protocols is not given in this study.
Location Aware Routing (LAR) [28] is another position
based routing algorithm. It uses location information and Many cluster-based routing protocols have been
average speed of the destination, to mark an expected proposed for MANETs [29], [30], [31]. These protocols
zone that may contain destination node. A route request may not be suitable for VANETs as they were
is flooded in this small expected zone, creating a request developed without considering the characteristics of
zone. Only the nodes inside the request zone participate VANETs, like highly dynamic topology, short link life
in routing of the data. In this study, LAR is compared time etc.
against pure flooding mechanism and it is shown that
LAR uses less routing packets per data packet as HYBRID ROUTING PROTOCOLS
compared to pure flooding, which is expected, as LAR Terminode Routing (TMNR) [34] is a hybrid approach
only floods a small portion of the network. of both location based and table-driven routing
technique. TMNR essentially stores location
CLUSTER BASED ROUTING PROTOCOLS information of one and two hop neighbors in routing
Cluster-based routing (CBR) protocols make use of table. Whenever there is some data to send, local
virtually created groups [24]. Vehicles travelling on routing table is consulted and data is sent to next hop.
highways often travel in segments. Hence vehicles When there is no information stored about the
moving in the same direction may form a cluster. Each destination node, then a ‘Direct Path Technique’ (DPT)
cluster has one cluster-head, which is responsible for is used. The ability of using position information and
intra and inter-cluster management functions. Intra- table-driven routing technique has improved the
cluster nodes communicate via direct links, whereas performance of TMNR.
inter-cluster communication is performed via cluster-
heads. An important issue in CBR is the formation of A study [35], evaluates the performance of ad hoc,
clusters and the selection of the cluster-head. position based and hybrid routing protocols. This study
has compiled comprehensive results of routing
Clustering for Open Inter Vehicular Communication protocols in high mobility and large obstacles
Networks (COIN) is a simple cluster-based routing environment. Overall it was found that position based
protocol [32]. The mechanism of forming cluster is same routing protocols and TMNR have better performance
as described above, except the selection of cluster-head. than ad hoc routing protocols as they offer better
This routing protocol uses an algorithm which makes use routing for fast moving vehicles. Moreover, position
of driver intentions and vehicular dynamics for selecting based and hybrid routing protocols can handle large
cluster-head. Simulation studies show that by using this number of communicating nodes and cover large
algorithm, cluster life time is increased and changes in terrain size than ad hoc routing protocols. In addition
cluster membership are reduced. This algorithm used to these protocols the study also compared two new
only those nodes as cluster heads that were able to lead protocols; a contention based [36] and a connectionless
the cluster for longer duration. Fewer changes in cluster protocol [37]. Both protocols performed better than
membership improved performance considerably. position-based, ad hoc and hybrid protocols.
Communication and its Extension,” in Proceedings of the 1st
CONCLUSION ACM international Workshop on Vehicular Ad Hoc Networks
We have presented VANETs by highlighting three of Philadelphia, PA, USA, Oct 01, 2004
[12] Task Group p, IEEE P802.11p: Wireless Access in Vehicular
its important areas: applications, MAC layer schemes and Environments (WAVE), draft standard ed., IEEE Computer
routing protocols. The applications envisioned are likely Society, 2006.
to find their place in inter-vehicular communication, [13] C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On-
hence making the widespread deployment of VANETs Demand Distance Vector (AODV) Routing,” RFC 3561,
Network Working Group, 2003
possible in near future. Although various MAC schemes [14] D. Johnson, B., D. A. Maltz, and Y.-C. Hu, “The Dynamic
are proposed for VANETs, but the key factors for their Source Routing Protocol for Mobile Ad Hoc Networks (DSR),”
success will be high reliability and minimum latency. draft-ietf-manet-dsr-10.txt, 2004
Several routing protocols, mostly the reactive and [15] V. Park, S. Corson, "Temporally-Ordered Routing Algorithm
(TORA) Version 1 Functional Specification", IETF Internet
position-based schemes are proposed for VANETs. draft, work in progress, draft-ietf-manet-tora-spec-04.txt, 2001
However we believe that proactive protocols will also [16] T. Clausen, et al., “Optimized Link State Routing Protocol
play a very important role in VANET scenario. (OLSR),” RFC 3626, Network Working Group, Oct. 2003
Moreover, there is lack of profound performance [17] R. Ogier, et al., “Topology Dissemination Based on Reverse-
Path Forwarding (TBRPF),” RFC 3684, Network Working
evaluation of routing protocols in VANET context. The
Group, Feb. 2004
few studies that are currently available are not only [18] M. Gerla, X. Hong, G. Pei, "Fisheye State Routing Protocol
limited in scope but also restricted to a specific scenario. (FSR)", IETF Internet Draft, work in progress, draft-ietf-manet-
fsr-03.txt, July 2002
REFERENCES [19] S. Jaap, M. Bechler, L. Wolf, "Evaluation of Routing Protocols
for Vehicular Ad Hoc Networks in City Traffic
Scenarios,"Proceedings of the 5th International Conference on
[1] Hartenstein, H. et al., “Position-Aware Ad Hoc Wireless Intelligent Transportation Systems Telecommunications
Networks for Inter-Vehicle Communications: The FleetNet (ITST), Brest, France, June 2005
Project,” MobiHoc ’01: Proc. 2nd ACM Int’l. Symp. Mobile Ad [20] J. Haerri, Filali, F., and Bonnet, C. "Performance Comparison
Hoc Networking & Computing, New York: ACM Press, pp. 259– of AODV and OLSR in VANETs Urban Environments Under
62, 2001 Realistic Mobility Patterns," Proceedings of the 5th IFIP
[2] M. Torrent-Moreno, S. Schnaufer, R. Eigner, C. Catrinescu, and Mediterranean Ad-Hoc Networking Workshop, June 14--17,
J. Kunisch, "’NoW – Network on Wheels’: Project Objectives, Lipari, Italy, 2006
Technology and Achievements,” 5th International Workshop on [21] W. F. Chan, Moh Lim Sim, and Sze Wei Lee, "Performance
Intelligent Transportation (WIT), pages 211 - 216, Hamburg, Analysis of Vehicular Ad Hoc Networks with Realistic
Germany, March 2008 Mobility Pattern," Proceedings of the 2007 IEEE International
[3] D. Reichardt, Miglietta, M. Moretti, L. Morsink, P. Schulz, Conference on Telecommunications and Malaysia
W. "CarTALK 2000: Safe and Comfortable Driving Based upon International Conference on Communications, 14-17, Penang,
Inter Vehicle Communication," Intelligent Vehicle Symposium, Malaysia, May 2007
2002. IEEE, volume 2, pp 545-550, Mar 2003 [22] H. Füßler, M. Mauve, H. Hartenstein, M. Kasemann, and D.
[4] “Car 2 Car Communiaction Consortium Manifesto,” version 1.1, Vollmer, “Location based Routing for Vehicular Ad Hoc
technical report, Aug 2007 Available: www.car-to-car.org Networks,” ACM SIGMOBILE Mobile Computing and
[5] C. D.Wang, and J. P. Thompson, “Apparatus and Method for Communications Review (MC2R), vol. 7, no. 1, pp. 47–49, Jan.
Motion Detection and Tracking of Objects in a Region for 2003
Collision Avoidance Utilizing a Real-Time Adaptive [23] B. Karp, and H.T. Kung, “GPSR: Greedy Perimeter Stateless
Probabilistic Neural Network”, U.S. patent no. 5,613,039, 1997 Routing for Wireless Networks,” in Proceedings of the
[6] Reducing Highway Fatalities, Federal Highway Administration, ACM/IEEE International Conference on Mobile Computing
U.S. Department of Transportation, and Networking (MobiCom), 2000.
http://safety.fhwa.dot.gov/facts/road factsheet.htm [24] F. Li, Yu Wang, "Routing in Vehicular Ad Hoc Networks: A
[7] K. Bilstrup, E. Uhlemann and E. G. Ström, “Medium Access survey," IEEE Vehicular Technology Magazine, vol. 2, issue 2,
Control in Vehicular Networks Based on the Upcoming IEEE pp. 12-22, Jun. 2007.
802.11p Standard,” in Proceedings of. World Congress on ITS, [25] C. Lochert, M. Mauve, H. Füßler, and H. Hartenstein,
New York City, NY, Nov. 2008, 12 pages,” 2008. “Geographic Routing in City Scenarios,” ACM SIGMOBILE
[8] H. Menouar,; Filali, Fethi and Lenardi, Massimiliano “A Survey Mobile Computing and Communications Review (MC2R), vol.
and Qualitative Analysis of MAC Protocols for Vehicular Ad 9, no. 1, pp. 69–72, Jan. 2005.
Hoc Networks,” IEEE wireless communications, volume 13, [26] C. Lochert, H. Hartenstein, J. Tian, D. Herrmann, H. Füßler,
issue 5, pp 30-35 Oct 2006 and M. Mauve, “A Routing Strategy for Vehicular Ad Hoc
[9] F. Borgonovo, A. Capone, M. Cesana, L. Fratta, "RR-ALOHA, a Networks in City Environments,” in Proceedings of IEEE
Reliable R-ALOHA Broadcast Channel for Ad Hoc Inter-Vehicle Intelligent Vehicles Symposium (IV2003), pp. 156–161, June
Communication Networks", Med-Hoc-Net, Baia Chia, Italy, 2002 2003.
[10] F. Borgonovo, A. Capone, M. Cesana, and L. Fratta. “ADHOC
MAC: A New Flexible and Reliable MAC Architecture for Ad [27] G. Liu, B.-S. Lee, B.-C. Seet, C.H. Foh, K.J. Wong, and K.-K.
Hoc Networks,” In Proc. of IEEE Wireless Communications and Lee, “A Routing Strategy for Metropolis Vehicular
Networking Conference (WCNC’03), 2003 Communications,” in International Conference on Information
[11] H. Daizo, Iwahashi, T., Bandai, M., and Watanabe, “An Inter- Networking (ICOIN), pp. 134–143, 2004.
Vehicle Communication MAC Protocol Supported by Roadside
[28] Y. B. Ko, N.H. Vaidy, Location-Aided Routing (LAR) in Mobile Research in Networks and Telecommunication (CoReNeT). His
Ad Hoc Network, Proceedings of ACM/IEEE MOBICOM’98, research interests include routing issues for wireless ad hoc
Dallas, Texas, United States, pp. 66–75. 1998 networks.
[29] C. R. Lin, and M. Gerla, “Adaptive Clustering for Mobile
Wireless Networks,” IEEE Journal of Selected Areas in Amir Qayyum (aqayyum@ieee.org) received his Bachelors in
Communications, vol. 15, no. 7, pp. 1265–1275, 1997. Electrical Engineering from U.E.T., Lahore, Pakistan in 1991,
[30] B. Das, and V. Bharghavan, “Routing in Ad Hoc Networks then M.S. in Computer Engineering from E.S.I.M., France in
Using Minimum Connected Dominating Sets,” in 1997 IEEE 1995, then D.E.A. from University of Paris-Sud, France in 1996
International Conference on on Communications (ICC’97), vol. and then Doctorate from University of Paris-Sud, France in
1, pp. 376–380, 1997. 2000. He is currently a professor at M. A. Jinnah University,
[31] J. Wu, and H. Li, “A Dominating Set Based Routing Scheme in Islamabad and also the head of the Center of Research in
Ad Hoc Wireless Networks,” the special issue on Wireless Networks and Telecommunication (CoReNeT). His current
Networks in the Telecommunication Systems Journal, vol. 3, pp. research interests include mobility management framework for
63–84, 2001. mobile devices, QoS and scalable multicast in IPv6 networks,
[32] J. Blum, A. Eskandarian, and L. Hoffman, “Mobility MANETs and VANETs, VoIP and network security.
Management in IVC Networks,” in IEEE Intelligent Vehicles
Symposium, 2003.
[33] R. Santos, A. Edwards, R. Edwards, and L. Seed, “Performance
Evaluation of Routing Protocols in Vehicular Ad Hoc Networks,”
The International Journal of Ad hoc and Ubiquitous Computing,
vol. 1, no. 1/2, pp. 80–91, 2005.
[34] L. Blazevic, J. Le Boudec, S. Giordano, A Location-Based
Routing Method for Mobile Ad Hoc Networks, IEEE
Transactions on Mobile Computing 4 (1) pp. 97-110 2005.
[35] H. Y. Ho, Ai H. Ho, and Kien A. Hua, “Routing Protocols for
Inter-Vehicular Networks: A Comparative Study in High-
Mobility and Large Obstacles Environments,” Computer
Communications Journal - Special Issue on Mobility Protocols
for ITS/VANET pp. 2767-2780. 2008.
[36] H. Fubler, J. Widmer, M. Kasemann, M. Mauve, H. Hartenstein,
Contention-Based Forwarding for Mobile Ad Hoc Networks,
Elsevier’s Ad-Hoc Networks 1 (4) 351–369. 2003
[37] Y. H. Ho, A.H. Ho, K.A. Hua, G.L. Hamza-Lup, A
Connectionless Approach to Mobile Ad Hoc Networks, in:
Proceedings of Ninth International Symposium on Computers
and Communications (ISCC), vol. 1, Alexandria, Egypt, pp. 188–
195. 2004

BIOGRAPHY OF AUTHORS
Saira Gillani (sairagilani@yahoo.com) received her M.IT degree
in Information Technology from Bolan University, Quetta,
Baluchistan, Pakistan in 2004. She is an MS student at M.A.
Jinnah University, Islamabad, Pakistan and is a member of
Center of Research in Networks and Telecommunication
(CoReNeT). Her current research activities include investigation
of MAC layer schemes for Vehicular Ad Hoc Networks.

Imran Khan (imrankhan1984@gmail.com) received his BCS


degree in Computer Science from COMSATS Institute of
Information Technology, Wah Campus, Punjab, Pakistan in 2005.
He is currently an MS student at M. A. Jinnah University,
Islamabad, Pakistan and is a member of Center of Research in
Networks and Telecommunication (CoReNeT). His research
interests include network, transport layer and mobility
management issues of wireless mobile ad hoc networks.

Shahid Qureshi (mshahidqureshi@gmail.com) received his BE


degree in Software Engineering from National University of
Science and Technology (NUST), Rawalpindi, Punjab, Pakistan
in 2001. Later he received his MS degree in Computer
Engineering from University of Engineering and Technology
(UET), Taxila, Punjab, Pakistan in 2006. Currently he is pursuing
his PhD from Center for Advanced Studies in Engineering
(C@SE), Islamabad, Pakistan, and is a member of Center of

You might also like