79 1520674884 - 10-03-2018 PDF
79 1520674884 - 10-03-2018 PDF
79 1520674884 - 10-03-2018 PDF
Abstract: Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks. It is a developing new technology in which
vehicles interchange the information from one vehicle to another vehicle within a network. VANET is responsible for providing an illustrated
approach for Intelligent Transport System (ITS). The main use of VANET is to save life and prevent the accidents. This Paper describes a
survey of routing protocols in vehicular ad hoc networks. The survey of routing protocols in VANET is significant and essential for smart ITS.
The routing protocols are divided into two categories of topology-based and position-based routing for VANETs. This review discusses the
advantages and disadvantages of these routing protocols
__________________________________________________*****_________________________________________________
other latest technology to allowing intelligent transport
1. INTRODUCTION
system. VANET indorse peerless characteristics compared to
Vehicular ad hoc network (VANET) is a network of moving mobile ad hoc network (MANET) that provide opportunities
vehicles, in this network moving vehicles can communicate to increase performance of the network. In VANET
and share information between others moving vehicles. The participating nodes are equipped with wireless onboard units
main purpose behind VANET is to provide safety, in daily (OBUs) to allow communication between vehicles and with
life we can see lots of vehicles run on the road, and in some road side unit (RSUs). Figure1 show the complete scenario
cases, the collision happened due to lack of proper of the vehicular ad hoc network (VANET), each node and
communication to overcome this problem researchers infrastructure communicating with each other. VANETs
introduce VANET. VANET uses wireless technology for applications are used to aware the drivers for traffic jams,
making the network in ad hoc nature; each node is capable of situations of the road to avoid vehicle collision. It is also used
sharing information and considering as packet forwarder in to broadcast warning messages to the drivers of rear vehicles
the network. Packet forwards through the nodes which come to avoid rear end collision on highways. VANET differ from
between source and destination (called intermediate nodes). the Mobile Ad hoc Network (MANETs) by some of its
VANET play crucial role in converting normal transportation characteristics, such as high speed of moving vehicles in
system into intelligent transport system (ITS). Now many VANET, which makes it a challenging of Ad hoc network.
automobile companies manufacture vehicles with OBUs and
Previously the broad used of this is ramp metering; infrastructure less network; with the support of sensors the
consuming needs is restricted sensors and actuators (extents direct communication among vehicles is possible. The kind
of traffic density on a highway and traffic lights on ramps).In of this communication is vehicle to vehicle (V2V).InV2V,
a further cultured consequence, the speeds and accelerations because of the decentralized structure it is more problematic
of vehicles and inter vehicle distances would be proposed by to recognize, objectives at establishing the communication
the infrastructure on the basis of traffic situations, with the among vehicles and probably emerging collaborations
goal of adjusting overall radiations, fuel ingestion, and traffic among them. At this level, information is exchanged and
speeds. Recommendations to vehicles might be transmitted to outcomes through a “local” basis (that is, among a cluster
drivers via road displays or straight to vehicles via wireless of vehicles in closeness to each other). The introduction of
networks. these information exchanges needs a settlement among car
industrialists and contractors in terms of communication
2.2 Pure Ad hoc (V2V) technology, protocols, and the similar, and exertions are
In pure Ad hoc architecture, the communication among under the technique in this route (the CAR2CAR
vehicles doesn’t need the comfort of RSUs (Fig2). V2I is an Consortium).
433
IJFRCSCE | February 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 4 Issue: 2 432 – 440
_______________________________________________________________________________________________
The basis of this communication technology is IEEE iv. Unbounded network size: In VANET the
802.11, which is also known as Wireless LAN. The concept implementation can be done for one city, more than
of V2V is that, within the radio communication range, two one city or for countries. The meaning of that
or more vehicles or roadside stations exist then they can network size in VANET is unbounded
connect spontaneously and can create an ad hoc network geographically.
allowing the sharing of position, speed, and direction data.
Each and every vehicle acts as a router and permits v. Frequent disconnected network: In VANET the
transferring packets over multi-hop to additional distant high speed of the vehicles expresses the dynamic
vehicles and roadside stations. topology due to this dynamic topology of networks
the link between the two communicating vehicle are
3. CHARACTERISTICS OF VANET disconnected frequently which is termed as
Usually VANET is an application of MANET so some intermittent connectivity.
characteristics of VANETs are similar to the characteristics
of MANETs but it has some own different characteristics vi. Time Critical: In VANET there should be the time
which can be explained as follows: limit to deliver the information to the vehicles thus a
choice can be completed by the Vehicles and
i. Highly dynamic topology: Usually in VANETs the execute actions consequently.
nodes are moving at very high speed due to this the
network topology of the vehicles is continuously vii. Sufficient Energy: In VANET vehicles do not have
different. So the prediction of node’s position is any issue of energy and computation resources. This
very hard to calculate. permits VANET procedure of challenging
techniques such as RSA, ECDSA execution and also
ii. Frequent exchange of information: In VANET the delivers unlimited transmission power.
ad hoc nature stimulates the nodes to collect
information from the other vehicles and road side viii. Better Physical Protection: In VANET the
units. Hence among vehicles the exchange of vehicles are physically better protected. Therefore,
information becomes frequent. Vehicles in VANET are more problematic to
compromise physically and reduction in the
iii. Wireless Communication: The design of VANET consequence of infrastructure attack.
is really for the wireless environment. The
connection of Vehicles and information exchange is ix. Unlimited Battery Power and Storage: As in
done through wireless. Then certain security size sensor networks; the Vehicles in VANETs do not
must be measured in communication. have lack of power and storage limitation thus
434
IJFRCSCE | February 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 4 Issue: 2 432 – 440
_______________________________________________________________________________________________
enhancing accountability sequence is not as v. Security: The road safety applications provided in
appropriate as in sensor networks. VANET which are life critical Hence security of
x. Hard delay constraints: In case of emergency, a these messages needs to be satisfied.
critical problem is to deliver the messages on time.
Hence, handle such conditions rather talking only 4.2. Security Challenges in VANET: During the design of
about high data rates in not appropriate. VANET architecture, the challenges of security must be
considered which are security protocols, cryptographic
4. CHALLENGING ISSUE IN VANET algorithm etc. The list of some security challenges are as
follows:
Although there is some discrimination in the characteristics i. Real time Constraint: The safety related message
of VANET with different networks but few characteristics must be delivered with 100ms transmission delay in
inflicts some challenges to categorize the VANET. These VANET because it is time critical. So the fast
challenges can be characterized into following categories: cryptographic algorithm should be used to achieve
real time constraint.
4.1. Technical Challenges :The technical challenges in ii. Data Consistency Liability: The network can
VANET deals with the technical problems and those disturb or can cause to accidents because even
problems must be resolved before the Organization of authenticate node can perform malicious activities
VANET. The few challenges are following: in VANET. Therefore to avoid this inconsistency a
mechanism should be designed. Connection among
i. Network Management: The topology of network the received data from different vehicles on specific
and channel Condition change rapidly due to high information may avoid this type of inconsistency.
mobility of Vehicles in VANET. Because of this, iii. Low tolerance for error: In VANET on the basis
we can’t use communication structures like tree of probability certain protocols are designed.
because these structures can’t be set up and VANET uses life critical information on which
maintained as rapidly as the topology changed. stroke is completed in very small period. It may
ii. Congestion and collision Control: In VANET the cause harm which is small error in probabilistic
challenge creates because of unbounded network algorithm.
size. in rural areas the traffic load is low and in night iv. Key Distribution: In VANET all the implemented
it is even in urban areas. Due to this, the network security mechanisms are depend on keys. To
partitions frequently happens although in rush hours decrypt the encrypted message at receiver end there
the traffic load is very high and hence network is is a need of different key or either the same key.
congested and collision occurs in the network. And different manufacturer can also install keys in
iii. Environmental Impact: In VANETs the different ways.
electromagnetic used waves for communication
Hence the major challenge in designing a security protocols
among Vehicles. These waves are distributed by the
is the distribution of keys among vehicles. Section Headings.
obstacles like building, tree etc. Hence the
environmental impact must be considered to deploy 5. ROUTING PROTOCOLS
the VANET Communication and information sharing between two nodes
iv. MAC Design: Usually in VANET the shared is depending on the routing protocols. Routing Protocols in
medium is used to communicate vehicles therefore VANET environment are similar to MANET technology.
the key issue is MAC design. Several approaches VANET and MANET environments are not same, there is
have been specified like CSMA, TDMA and SDMA less mobility in MANET as compared to VANET, due to
etc. IEEE 802.11 implemented the CSMA based high mobility in VANET routing is challenging task. Routing
Mac for VANET. In order to communication among protocols mainly classified into two major categories
the vehicles Protocols have to be design. topology based and position based.
435
IJFRCSCE | February 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 4 Issue: 2 432 – 440
_______________________________________________________________________________________________
5.1 Topology based protocol- In computer networks the routing protocol that has been modified to the wireless ad-
topology is an arrangement of a network, containing its hoc network. As a base it communicates on link state
nodes and connecting lines or it is defined as “the way by protocol, and at each node FSR has the capacity to deliver
which fundamental parts are interconnected or organized”. route information immediately by maintaining a topology
The routing information is stored in the form of routing map. In the link state table the updated information of the
table. To transfer the data the routing protocols use the links neighboring node will be available. The full topology map is
which are already available in network. In VANET the stored and utilized in every node. Fisheye State Routing
topology based routing protocols try to find the shortest path uses the fish eye technique means that it will diminish the
from source to destination. Topology based routing size of information needed to denote graphical data. In
Protocols are classified into three categories they are: routing the fish eye method translate to maintaining exact
distance and route excellence information about the
a) Proactive routing protocols immediate neighborhood of a node with gradually less detail
The Proactive routing has some different features: the as the distance increases.
routing information such as the next sending hop is Advantages:
maintained in the background irrespective of It reduces the overhead in routing.
communication requests. Control packets are continuously Forward the Path information by maintaining a topology
transmitted and flooded among nodes to maintain the routes map.
or the connection between any pair of nodes even though Disadvantages:
some of paths are never used. A table is then created within If the network size will increase processing overhead will
a node such that each entry in the table specifies the next also increase.
hop node in the direction of a certain target node. Proactive Insufficient knowledge for finding the route.
Routing is also called the Table-driven routing and the main
Advantage of table driven routing is for the destination path ii) Destination-Sequenced Distance-Vector Routing
which is already maintained in background no searching or (DSDV): DSDV is a table-driven routing scheme for ad-hoc
route discovery is needed but the disadvantage of this it mobile networks based on the Bellman- Ford algorithm. It
delivers minimal potential for real time applications, most removes route looping, increases convergence speed, and
of its bandwidth is disbursed by new paths, which creates decreases control message overhead. In DSDV, each node
overhead mostly in high mobility. Shortest path algorithms maintains a next-hop table of all other nodes, which it
are the basis of this protocol. There are two types of exchanges with its neighbors. In packet header it carries
proactive routing protocols are: FSR, DSDV. destination sequence number. Full dump and Incremental
i) Fisheye State Routing (FSR): FSR protocol is packets are used to carry this protocol. Full dump packets
considered as proactive protocol and is a link state based hold routing information of all nodes which are broadcasted
436
IJFRCSCE | February 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 4 Issue: 2 432 – 440
_______________________________________________________________________________________________
destination. The node will go for route searching by
to neighbors and incremental packet deliver updates. broadcasting RREQ (Route Request) with a unique ID from
Bandwidth is affected in full dump packets and the source. When the packet is received by the nodes in the
incremental packets affect overhead in networks. Both types network it will find where the data packet required to be
make DSDV unsuitable for highly Dynamic VANETs. sending in the network and broadcasting till it is received at
exact target node. The packet will back to source with
Advantages: unique ID when the target node receives the data packet and
It carries the destination sequence number so the Path is broadcast a RREP (Route Reply). The main task of this
loop free. protocol is to maintaining the route information. If any
Reduces the latency for finding the Routes. broken link or unused route found then the information will
Disadvantages: be handled by route maintenance, and in case finding any
The sleeping nodes are not available. route error then the nodes will forward a RERR (Route
The major issue is Scalability. Error) message to the network.
b) Reactive routing protocols: Advantages:
Reactive routing opens the route only when it needs to It does not interchange updates in routing periodically
forward packets to its target node to communicate with each due to which it is on-demand.
other. It keeps only the routes that are currently in use till In case of the failure it can refers to cache for new route.
the target node becomes unreachable beside each path from
the source as an outcome it diminishes the load of the Disadvantages:
network. Reactive routing contains the path finding part in There will be high route latency for finding the path in
which the request packets are flooded into the network for case of the large network.
the path search and this part end when route is found. The The more Traffic overhead is there.
types of reactive routing protocols are AODV, DSR and c) Hybrid routing protocols
TORA. Hybrid routing protocols uses the advantages of both
i) Ad hoc On Demand Distance Vector (AODV): proactive and reactive routing. In hybrid protocols, there is
In Ad hoc On Demand Distance Vector (AODV) routing, the division of network is in two levels. The division levels
upon receiving of a transmission request (RREQ), nodes are the inner layer and the outer layer. The inner layer is
record the address of the node sending the query in their proactive, which is used to maintain and updates
routing table. This process of recording its earlier hop is information on routing among all the nodes at all times in a
called backward learning. Upon arriving at the target node, network. The outer layer is reactive which is used to
a reply packet (RREP) is then sent over the complete route maintain and updates the information on routing between
found from backward learning to the source. At every end currently used nodes on the basis of need. Finally the hybrid
of the path, the node would record its earlier hop, therefore protocols are used to reduce the control overhead of
creating the forward path from the source. The flooding of proactive routing protocols and decrease the initial route
request and sending of reply create a full duplex path. After discovery delay in reactive routing protocols. The hybrid
the path has been established, it is maintained as long as the protocol discussed here are ZRP and ZHLS.
source uses it. A link disappointment will be conveyed i) Zone Routing Protocol ZRP:
recursively to the source and will in turn trigger another In ZRP there is a division of network into two overlapping
query-response process to find a new path. zones. The zone is a collection of nodes and the nodes
should be in a zone radius. In intra-zone routing the data
Advantages: packets are forwarded within the routing zone of the source
For the large scale Ad-Hoc networks it may be useful. node to reach the outlying node. In inter-zone routing the
This protocol provide loop free path. data packet is forwarded from the outlying node to the target
Disadvantages: node. There is restriction to a small neighborhood of a node
The demand for processing is very high. in the proactive part of the protocol and for the reactive part
To create the routing table it takes more time. is that it is used for routing across the network. This reduces
ii) Dynamic Source Routing DSR: the latency in path finding and reduces the number of
Dynamic Source Routing (DSR) is a reactive routing control messages.
protocol. In case of forwarding a data packet from one node Advantages:
to another node in the network first it will search route when Minimizes control overhead for longer routes.
required and then forward the data from source to Eliminating the delays within zone.
437
IJFRCSCE | February 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 4 Issue: 2 432 – 440
_______________________________________________________________________________________________
High delivery ratio
Disadvantages: Ratio of delivery is depending on the mobility of
It's not suitable for high density and rapidly changing pattern.
topology of VANETs.
5.2) Geographic Based protocol Disadvantage of GeOpps-
Geographic Based protocols are known as position based Privacy is big issue due to navigation system.
protocol or geo-protocols, nodes are decided where packet
b) Non-Delay Tolerant Network (Non-DTN) protocols-
will travel based on geographical coordinates of neighbor
Main motive of Non-DTN protocols is to reduce the packet
nodes. Topology Based protocols fails in the dynamically
delivery communication time between source and
change in node connectivity, position based protocols
destination node. It is also known as Min-Delay protocols.
resolved this problem. Beacon messages are sends
Non-DTN protocols are dividing into beacon based, non-
periodically for informing neighbor nodes. If node gives
beacon based and hybrid protocols. To reduce the packet
response of beacon messages that mean node is neighbor
delivery ratio uses the shortest path in the network. In
node and fall under in the same coverage area. The main
beacon routing protocols "“HELLO”” message plays an
advantages of position based protocol are there is need of
important role for discovering the neighbor node in the
route discovery, scalability, Efficient in rapidly changing
network. ““HELLO”” messages periodically send for
mobility pattern, low overhead. And disadvantages are
maintaining information of the neighbor node.
obtaining exact location; obstacle on highways, there is no
guarantee of connectivity in indoors and underground
i)Greedy Perimeter Stateless Routing (GPSR)-
locations.
Beacon messages use for selecting neighbor node, it use
greedy techniques for forwarding the packets to the nodes
a) Delay tolerant network (DTN) protocol
[14]. If this techniques is not work than GPSR use perimeter
These protocols enable communication where connectivity
forwarding mechanism to select the next forwarding node.
issues there like high routing, more latency, error rates and
GPSR also give the recovery mechanism through nearest
no end to end connectivity. These protocols based on store
vehicles. GPSR is best for the wireless datagram networks.
and forward method. Main motive of these protocols are to
Planarization is used to remove cross links in the network.
reduce the latency of messages and increase the message
delivery rates.
Advantages of GPSR-
i) Vehicle-assisted data delivery (VADD)
Forwarding of packets is simple and easy because node
It uses the concept of carry and forward concept for
has to be remembering only one hop neighbor
forwarding the data packets to a moving vehicle node. In
information.
VADD protocol node doesn’t send the data until get
Planarization is used to remove cross links in the
confirm response from neighbor node that is in the coverage
network.
area, after getting the confirmation it send the quickly.
Advantages of VADD
Disadvantages of GPSR-
It good in multi hop data delivery.
1. Maintenance is difficult if length of route is increase
Low data transmission and it perform better compare to
in the network because of mobility environment.
GPSR and DSR.
438
IJFRCSCE | February 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 4 Issue: 2 432 – 440
_______________________________________________________________________________________________
Scalability is good compare to AODV and DSR. position based protocol used beacon message in order to
select next neighbor node for routing and selecting the path.
Disadvantages of GSR-
Performance is not better in sparse network. Yong Xiang [13] present geographic stateless VANET
Higher routing overhead because of beacon messages. unicast routing – Geo SVR. Geo SVR solved the problem of
local maximum and sparse connectivity by estimate vehicle
iii) Connectivity Aware Routing (CAR) – density on given road type. GeoSVR protocol is able to
CAR is mainly focus on the inter vehicle communication it provide high packet delivery ratio with low latency. Geo
better work on highway scenario. CAR is different from SVR used multi-path to avoid selecting an improper path
other position based protocol because it finds both position when the routing encounters multiple paths with identical
of the destination node and connected path between source sum of type and deviation.
and destination also. It also works in city area environment.
Omar Sami Oubbati[11] in this paper UVAR protocol is
Advantages of the CAR- proposed, UVAR protocols are consider for urban vehicular
CAR finds the path which exists in real, not prediction environments, main objective of this protocol is to enhance
based. the performance of routing based on the UAVs awareness of
It gives algorithm based on inter vehicle the road traffic in the ground. In this paper two protocol is
communication which work in city and highway proposed UVAR-G for ground-to-air communication and
scenario. UVAR-S for air-to-air communication.
Disadvantages of CAR-
If changes done in traffic environment then CAR is not Parminder Singh et al [1] did the comparison between
work properly. Unicast routing and Multicast routing using varied data rates
in VANET. Using the parameters like packet delivery ratio,
CAR considers unnecessary nodes also.
delay metrics and routing overhead they evaluate
performance of both the protocols.
c) Hybrid Protocols-
The hybrid protocols use considers both beacon based
Bara T. Sharef et al [7] conversed about several VANET
mechanism and non-beacon based mechanism.
protocols and proposed taxonomy of these protocols by
classifying them in two categories. i.e. V2V routing
i) TO-GO (Topology-assist Geo-Opportunistic) routing-
protocols and V2I routing protocols. According to him these
TO-GO protocol enhances the packet delivery ratio by
protocols cannot address the dynamic network and
including the opportunistic forwarding technique. In TO-
frequently discontinuation in network. Finally the
GO packet is marked for an anchor node, determined by the
distinctive issues among VANET protocols is unifying and
Next-hop Prediction Algorithm (NPA), and broadcasted.
identifying paths between the source node and destination
node.
6. RELATED WORKS
In VANETs, vehicles communicate with each other or with
In VANET several issues are there but the Handoff is major
the road side units (RSU) to provide safety by avoiding
concern because the vehicles are continuously moving so it
accident and traffic. In VANET routing is one of a major
challenge due to high mobility and dynamic topology. will become tougher to transfer the data packets when the
vehicles are out of the communication range. But here Yibo
Routing protocols of VANET is classified into two
Yang et al [5] discussed that for the applications of VANET
categories topology based and position based.
VMIPv6 schemes and MIP diminishes the handoff latency
Topology based protocol are categorized into three category
and recovers the performance of MIP.
proactive, reactive and hybrid. Proactive protocol also
known as Table-Driven, all information of available routes
According to Osama M. Hussain Rahman et al [3] a new
are maintain in tables and based on these tables protocol
sender-oriented broadcasting scheme i.e. bi-directional
make decision for selecting the route for forwarding the
stable communication (BDSC) protocols is proposed. Over
packets between the nodes. Main feature of table driven
densely populated vehicular network; it shows that how
routing is that ,there is no searching or route discovery as
destination path is already maintained in background. BDCS protocols accomplishes lower end-to-end delays and
increases reachability of alert messages.
Position based routing protocols used geo coordinates for
Many proposed position based protocols are available in
forwarding the packets one node to another node. Mostly
439
IJFRCSCE | February 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 4 Issue: 2 432 – 440
_______________________________________________________________________________________________
VANET but the requirement of these protocols for selecting IEEE Cyber, Physical and Social Computing (CPSCom)
the vehicles are vehicle position coordinates. Mohamed and IEEE Smart Data (SmartData).
SaadaBoba and Suleiman MohdNor [7] compared the [5] Y. Yang, H. Li, and Q. Huang, “Mobility management in
VANET,” 2013 22nd Wirel. Opt. Commun. Conf., pp.
various greedy algorithm in urban scenarios and gives
298–303, 2013.
details about various problems concerning routing and
[6] Boban, M., Misek, G., & Tonguz, O. K. (2008). What is
design strategy. the best achievable QoS for unicast routing in VANET?
Sanjay Batish et al [12] discusses comparison among the 2008 IEEE Globecom Workshops, GLOBECOM 2008,
AODV, DSR and DSDV routing protocols. According to 1–10. http://doi.org/10.1109/GLOCOMW.2008.ECP.69
him when the RSU are not used then DSR protocols [7] B. T. Sharef, R. a. Alsaqour, and M. Ismail, “Vehicular
performs better than AODV protocols and the throughput is communication ad hoc routing protocols: A survey,” J.
always higher than AODV which make it well-organized in Netw. Comput.Appl., vol. 40, no. 1, pp. 363–396, 2014.
real city scenario. [8] A. Fonseca, T. Vazão, Applicability of position-based
routing for VANET in high- ways and urban
environment, J. Netw. Comput. Appl. 36 (3) (2013) 961–
According to James Bernsen, D.Manivannan [10] there is
973, doi: 10.1016/j.jnca.2012.03.009 .
various unicast based routing protocols and the included [9] “Non-DTN Geographic Unicast Routing Protocol for
design factors in that routing protocols, and the potential VANET : State of the,” vol. 5, no. 5, pp. 3418–3425,
application for the technology for VANET environment. 2015.
7. CONCLUSION [10] J. Bernsen and D. Manivannan, “Unicast routing
In this paper we discussed introduction of VANET, types of protocols for vehicular ad hoc networks: A critical
communications, characteristics, challenges and different comparison and classification,” Pervasive Mob.
routing protocols in VANET. In this paper routing protocols Comput., vol. 5, no. 1, pp. 1–18, 2009.
[11] Omar Sami Oubbati , Abderrahmane Lakas , Fen Zhou “
are categorized into two major category topology based and
Intelligent UAV-assisted routing protocol for urban
position based protocols. Topology based protocol also
VANETs” Computer Communications 107 (2017) 93–
categorized into three categories proactive, reactive and 111.
hybrid protocols. Protocols are discussed with advantages [12] S. Batish, H. Singh, S. Sofat, and A. Dhiman,
and disadvantages. Position based protocols also “Analytical Study of AODV , DSR and DSDV Routing
categorized into three categories Delay tolerant network Protocols in VANET simulating City scenario using
protocols (DTN), Non-DTN (Non-Delay Tolerant Network) EstiNet Simulator,” pp. 978–981, 2013.
and Hybrid protocols. Also discuss some research work [13] Yong Xiang a, Zheng Liu b, Ruilin Liu “GeoSVR: A
proposed by researchers. This literature survey mainly map-based stateless VANET routing,” Ad Hoc Networks
11 (2013) 2125–2135.
focused on different type challenges in VANET and routing
[14] B. Karp, H.T. Kung, GPSR: greedy perimeter stateless
protocols. VANET is play major role in converting
routing for wireless networks, in: Proceedings of the 6th
traditional transportation system into intelligent annual international conference on Mobile computing
transportation system (ITS). and networking (MobiCom ’00), ACM, New York, NY,
USA, 2000, pp. 243–254.
8. REFERENCES [15] Madhusudhan, M. (2013). International Journal of
Advanced Research in Computer Science and Software
[1] P. Singh, “Comparative Study Between Unicast and Engineering, 3(5), 991–996.
Multicast Routing Protocols in Different Data Rates [16] H. Moustafa, Y. Zhang, Vehicular networks: techniques,
Using Vanet,” Int. Conf. Issues Challenges Intell. standards, and applications, CRC Press, 2009.
Comput.Tech., pp. 278–284, 2014. [17] T. Rappaport et al., Wireless communications: principles
[2] N.V. Dharani Kumari , B.S. Shylaja “AMGRP: AHP- and practice, vol. 207, Prentice Hall PTR, New Jersey,
based Multimetric Geographical Routing Protocol for 1996.
Urban environment of VANETs” Journal of King Saud [18] C. Chiasserini, R. Gaeta, M. Garetto, M. Gribaudo, and
University – Computer and Information Sciences (2017). M. Sereno, Efficient broadcasting of safety messages in
[3] O. M. H. Rehman and H. Bourdoucen, “Improving multihop vehicular networks, In Proc. of the 20th IPDPS
Reachability of Multi-Hop Alert Messages 2006, pp.8
Dissemination in VANETs,” pp. 510–515, 2014. [19] B. Williams, T. Camp, “Comparison of broadcasting
[4] Jia Li, Ping Wang, Chao Wang “Comprehensive GPSR techniques for mobile ad hoc networks”, The 3rd ACM
Routing in VANET Communications with Adaptive international symposium on Mobile ad hoc networking
Beacon Interval” 2016 IEEE International & computing (MobiHOC02), Jun. 2002.
Conference on Internet of Things (iThings) and IEEE
Green Computing and Communications (GreenCom) and
440
IJFRCSCE | February 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________