RESEARCH AND DEVELOPMENT IN INFORMATION TECHNOLOGY (SIT 740) FACULTY OF SCIENCE AND TECHNOLOGY ASSIGNMENT: 01 LITERATURE REPORT ON “USING VANET (VEHICULAR ADHOC NETWORK) FOR SAFETY OF VEHICLES” GURVEER KAUR ST ID: 217005207 Using VANET (Vehicular Ad Hoc Network) for Safety of Vehicles 1. INTRODUCTION: 1.1 DESCRIPTION ABOUT THE TOPIC From the last decade, the demand of the wireless technology is increasing drastically. As the demand is reaching the sky, the development in the wireless technology is leading to research in the field of networks, which are self-organizing and can be set up at any remote place without the use of any pre-defined infrastructure around it. This research and development has given birth to a new technology called VANET (Vehicular Ad hoc Network) that is catching the attention of many people now a days. So “What is VANET?” It is a new technique which has consolidated the trending features of wireless technology to the vehicles by providing an ad-hoc network which is robust and making the communication possible between the vehicles and the roadside units in a decentralized manner (Chadha and Reena, March 2015). Importance of VANETS may be seen in the context of safety and comfort applications of vehicles moving on the road. These may include Violation Warning, Back up route information, Electronic Brake warning, Collision warning etc. Worldwide vehicle manufacturing companies like Audi, BMW, Fiat, Mercedes, Daimler Chrysler and Volkswagen united together and form an organization, the Consortium (C2CCC). The C2CCC works on making smart vehicles which are lashed with life saving features which make roads safer, secure and comfortable for users. So the road security in VANETs is more as there is a communication between the drivers or we can say nodes i.e. vehicles and concerned system in episodic approach. 1.1.1 VANET COMMUNICATION: In VANETs, there are two strategies to help with the communication process which are listed below: a) Vehicle-to-vehicle (V2V): If the required destination is available within the range of destination node then a direct communication occurs else the intermediate nodes are used to deliver the information up to destination node. These are also called single-hop and multi-hop packet forwarding techniques. Figure A: V2V Communication The V2V communication is mainly used for the safety applications like Road blockade alarm, Collision warning, Lane change warning, Electronic brake warning, Oncoming traffic warning etc. b) Vehicle-to-Roadside (V2R) Communication: It is only single hop communication between vehicle and road side units in which a broadcast message is delivered to all the vehicles in a specific area and depending on the requirement of data rates the units can be placed accordingly. Figure B: V2R Communication 1.1.2 VANET APPLICATIONS VANETs are developed for the safety of the human life and there are various applications of VANETs which are listed in table below: Table A: Applications of V2R & V2V Vehicle-to-Roadside (V2R) Applications Vehicle-to-Vehicle (V2V)Applications Traffic & Speed Violation Warning Lane Change Warning Location Information Electronic Brake Warning Route Information Collision Warning Road Block or Barrier Alarm Upcoming Traffic Warning 1.2 MOTIVATION The number of vehicles keep increasing every day, hence the number of accidents also keep escalating with the situation. These accidents and crimes are an issue of concern worldwide and make the road more vulnerable and threatening as 50 million people die on the roads all over the world every year as per World Health Organization (WHO). Most of them lose their precious lives as a victim to the injuries they suffer from the accidents. The researchers and academicians are interested in VANET technology to overcome the unpayable loss in the form of human life. One of the major causes of these accidents is the result of the violation of the traffic rules on the road. VANET is the technology which will help to reduce large number of road accidents, by improving safety and managing the traffic control system with high and reliable efficiency. VANET technology is presently in the developing phase. There are number of different issues in VANET which needs to be addressed. The estimation of Path span is a major factor which can contribute in the success of the VANETs and also help to save the lives of millions of people around the world every year. 2. EXISTING METHODOLOGIES 2.1 BACKGROUND A number of literary papers and review articles have been searched out and read. Quite a massive study has been performed on the VANETs and MANETs, which are as follows: Saha and Johnson (2004) says VANETs have received an expanding attention from communities of both research and business. The VANET is an emerging and promising technology. In this paper, they have introduced a prudent and auspicious model for safety of vehicles. Many different routing protocols have been used in the process such as AODV and DSR. The results demonstrate the performance of the various routing protocols used in different aspects like packet delay and network overhead. In Yang, Lim & Aggarwal (2008) a mechanism called multi-hop communication is used to provide safety and security to the drivers. It is a challenging problem to develop multi-hop communication in VANETs; the reasons being the briskly changing network topology and recurrent disconnections in the network. A protocol named ACAR (Adaptive Connectivity Aware Routing) protocol has been proposed to address these problems. This protocol flexibly selects the best route available for the transmission of data. There are two parts comprising the protocol. In the first part, an optimal route is selected and in next part, each road division of the selected path and a multi-hop path is chosen that will enhance the performance. The results disclose that the given protocol ACAR protocol performs extremely well in aspects like performance and delivering the data. Das and Raw (2010) discusses a new location based routing method is proposed which is known as P-GEDIR (Peripheral node based Geographic Distance Routing). It may not be possible to find a node at the ends of the given geographical range. Therefore that particular area is chosen in a given geographical range. MATLAB software is used to simulate the protocol. The results were very convincing on the part that the peripheral node can be used in order to boost the throughput of routing protocol regarding number of hops used. Whereas the study of Hartenstein & Laberteaux (2008) reflects there have been a number of attractive research topics in the area of Intelligent Traffic Control. In V2V (vehicle-to-vehicle) communication, each vehicle acts as a node can communicate with other vehicles using wireless technology. The idea of this communication has been incorporated to aware the drivers regarding different issues involved and providing them a safe and secure environment. In this paper, the focus is on the routing concept for the VANET i.e. principles for routing, decomposition of the routing function and requirement. However Kamaruzaman and Hasbullah (2008) talks about rising vehicle crime which has been considered as one of the major problem nowadays. A proposed solution to this problem is through the development of VANETs through which vehicles are enabled to exchange information in the form of messages within a network without any need of infrastructure being installed along the roadside. The vehicles need to be installed with conventional alarm and Geographical Position System (GPS). In this paper, focus is on the need for detailed planning to ensure optimal design and implementation of the VANET. Research problem been formulated when there is a choice of multiple routes, to choose the route that has optimal route lifetime within two directions node movements with minimum latency will be achieved within node transmission range. 2.2 ROUTING TECHNIQUES USED IN VANETS The two main routing techniques which are used in VANETs are topology based and position-based routing protocols. In the first type, every node forwards the data in packets to all the other nodes which are present in the network. Unlikely, in the second case it must know the locations of the nodes present to send the packets forward. 2.2.1 TOPOLOGY-BASED ROUTING PROTOCOLS The basic idea behind its functioning is forwarding packets from one node to another on basis of information stored in the routing table of each node. This protocol was traditionally used by Manets. There are three different subclasses for this routing protocol which are listed below: 2.2.1.1 PROACTIVE ROUTING PROTOCOLS In this type of routing protocol routing table of each network node plays an important role as all the information regarding the other nodes like the next hops and the different paths available is stored in it. The information about all the available paths is updated frequently leading to more overhead in the network. 2.2.1.2 REACTIVE ROUTING PROTOCOLS In this protocol a broadcast message is forwarded to all the nodes to reach to its destination node and then it replies back with a unicast message. It searches for the path only when required by using route discovery mechanism and ultimately decreases the overhead in the network. 2.2.1.3 HYBRID ROUTING PROTOCOLS: When both the reactive routing and proactive routing protocols are combined together it forms Hybrid protocol. For maintaining the routes in interior region proactive routing mechanism is performed and for reaching out to the exterior regions a route discovery mechanism is used. 2.2.2 POSITION-BASED ROUTING PROTOCOL Unlike topology protocol, this protocol is more appropriate for VANET with an environment which is highly mobile. In this routing protocol all the data transfer takes place based on geographic location of the node itself and finding other nodes with the help of the Geographic Position System. Further these are categorised in three different types which are, Hybrid protocols, and Non delay Tolerant Network and Delay Tolerant Network protocols. 2.2.3 TRANSMISSION STRATEGIES USED There are three different types of transmission methods which are listed below: a) Unicast b) Multicast c) Broadcast 2.2.3.1 UNICAST ROUTING PROTOCOLS In this type of routing protocols, a mechanism called store and forward is implemented in which the frame is first received by switch and then a CRC(Cyclic Redundancy Check) is performed on the frame stored. There are different topology based protocols that fall under the category of unicast routing such as DSR, VADD, AODV and many more. 2.2.3.2 BROADCAST ROUTING PROTOCOLS Talking about Broadcast routing protocols, the data is send to all the nodes present in the network which is an efficient method for protocols like AODV. The major drawback for this protocol is that it is mandatory for each node to identify the replica packets so that they can be discarded. 2.2.3.3 MULTICAST-BASED ROUTING PROTOCOL In multicast routing the packets are send by multi hop communication from single source to some specific members in the group. It is classified in two types which are explained in more detail in the next section. 2.2.3.3.1 GEOCAST-BASED ROUTING PROTOCOL Some publishers claim that in Geocast routing protocol a vehicle in a particular geographic area send the packets to all other vehicles in the same area which is termed as ZOR (Zone of Relevance). It aims to provide reliable delivery of packets in a network through ZOF (Zone of Forwarding) which means the packets in one defined geographic area must send the packets to other vehicles through ZOR. The only demerit in this Scenario is the delay caused in packet retransmission by disconnection or failure in the network. 2.2.3.3.2 CLUSTER-BASED ROUTING PROTOCOL In this case two types of communications are maintained which are internal and external. External communication is managed by cluster header and the internal communication is done through direct paths available. The drawbacks of this technique are delay in network communication and the increased overhead in the network whereas it could prove to be a very good solution for providing scalability in the network. 2.3 RESEARCH ANALYSIS The given table tells us about the different protocols, the methods used, the merits and the demerits of each technique. Routing Protocol Definition Pros Cons Examples 1. Topology • Proactive Works on shortest path mechanisms No route discovery overhead Bandwidth wastage OLSR FSR • Reactive Use route-discovery mechanism to find another nodes (demand routing) Less bandwidth consumption Route discover and maintaining delays DSR AODV 2. Position-based (DTN) Works on store and forward technique Solves problem of frequent network disconnection Deadlock problem in location server MOV GEOPPS 3. Unicast Connects single source to single destination Minimum packet delay Packet loss - 4. Multicast Packets from single source to group of destinations Minimum network consumption Routes loop ROVER • Geocast Each node delivers message to nodes in different geographical locations Easy scalability Consumes bandwidth MOBICAST ROVER • Cluster Cluster Head is used to make interior and exterior communications Easy implementation More overhead CBDRP COIN 5. Broadcast Floods packet to all nodes present in network More reliability Packet collisions DECA DV-CAST 3. RESEARCH PROBLEM Over the last Decade number of research work have been proposed to develop the efficient and reliable Vehicular ad hoc Network. High mobility of the vehicles, frequent change in the network topology, road layout, different traffic scenarios such as highway and city are the characteristics of VANETs. These characteristics make the development and the research work challenging in this network. The Path span of the routes mainly depends on the routing protocols design and algorithm. Although there are many different routing techniques available but they lack in some aspect or the other. So we need to look for a new routing technique which would help us to overcome these shortcomings and provide us an efficient solution considering all the aspects of VANETs. So the proposed idea which would solve these problems would be discussed in the next paper. 4. CONCLUSION With the coming together of telecommunications, computing and various other techniques the deployment of different kinds of VANET technologies is being enabled. In this paper I have given an introduction about what VANETs is and how it would be beneficial for the safety and security of people. I have also discussed about the two main communication methods used in VANETs. In the next part I have thrown some light on the applications of VANETS and how they could be used for safety purposes like Lane Change warnings, Traffic violations. In this paper I have also mentioned about the different routing techniques which are being used in VANETs and the merits and demerits of each technique has also been analysed so that it could help us to develop a new technique which can resolve these existing issues. 5. REFERENCES • Yang Q, Lim A, and Aggarwal P, 2008, “Connectivity aware routing in vehicular networks,” In Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, pp.2218-2223. • Raw R.S, Das S, 2011, “Performance comparison of position based routing protocols in vehicle-to-vehicle communication,” International Journal of Engineering Science and Technology (IJEST), Vol. 3 No. 1, pp 435-444. • Kamaruzaman N.N.S and Hasbullah H, 2008, “Silent Alarm: Path Optimization Route Lifetime for VANET Multi-Hop Routing Protocol,” International Conference on network applications, protocols and Services (Netapps 2008). • Saha A.K and Johnson D.B, 2004, “Modelling mobility for vehicular ad-hoc networks,” in ACM International Workshop on Vehicular Ad Hoc Networks, pp.91-92. • Paul B, Islam M, 2012 “Survey over VANET Routing Protocols for Vehicle to Vehicle Communication,” IOSR Journal of Computer Engineering (IOSRJCE), ISSN: 2278-0661, ISBN: 2278-8727, vol. 7, Issue 5, pp. 01-09. • Al-Doori M, 2011 "Directional Routing Techniques in VANET," PhD Thesis, Software Technology Research Laboratory, De Montfort University, Leicester United Kingdom. • Kumar R and Dave M, July 2011 "A Comparative Study of Various Routing Protocols in VANET," International Journal of Computer Science Issues (IJCSI), vol. 8, Issue 4, no. 1. • Sharma Y and Mukherjee S, July 2012, "A Contemporary Proportional Exploration of Numerous Routing Protocol in VANET", International Journal of Computer Applications, vol. 50, no. 21, pp. 14-21. • Abolhasan. M, Wysocki. T and Dutkiewicz.E, 2004, “A review of routing protocols for mobile ad hoc networks”, Ad Hoc Networks 2, Elsevier, pp. 1–22. • http://www.csie.ntpu.edu.tw/~yschen/mypapers/TS-2010-1-2.pdf • https://www.researchgate.net/publication/258248007_Vehicular_ad-Hoc_networks_VANETs-An_overview_and_challenges • https://www.rroij.com/open-access/vehicular-ad-hoc-network-vanets-a-review.pdf • https://emergingtechnology.wordpress.com/2007/10/03/vanet-the-vehicular-ad-hoc-network/ • http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.674.795&rep=rep1&type=pdf • http://www.sciencedirect.com/science/article/pii/S014036640700518X • http://ieeexplore.ieee.org/abstract/document/6296873/ • http://dl.acm.org/citation.cfm?id=1161076 • http://www.sciencedirect.com/science/article/pii/S2214209614000187 • http://ieeexplore.ieee.org/abstract/document/4657084/