Limit search to available items
Book Cover
E-book
Author G., G

Title Vehicular ad-hoc networks : applications and technology / G. G. Md. Nawaz Ali, Md. Noor-A-Rahim and Pushpendu Kar, editors
Published New York : Nova Science Publishers, [2020]

Copies

Description 1 online resource (278 p.)
Series Computer Science, Technology and Applications Ser
Computer Science, Technology and Applications Ser
Contents Intro -- Contents -- Preface -- Chapter 1 -- Role of Position-Based Routing Protocols for Different Applications of VANET -- Abstract -- 1. Introduction -- 2. Communication Model for Vanet -- 3. Routing Protocol for Vanet -- 3.1. Topology Based Routing Protocol -- 3.1.1. Proactive Routing Protocols -- 3.1.2. Reactive Routing Protocols -- 3.1.3. Hybrid Routing Protocols -- 3.2. Position-Based Routing Protocols -- 3.3. Cluster-Based Routing Protocols -- 3.4. Geo Cast Based Routing Protocols -- 3.5. Broadcast Based Routing Protocols -- 4. Position-Based VANET Routing Protocol
4.1. Non-Delay Tolerant Network -- 4.1.1. Beacon Based Position-Based Routing Protocol -- 4.1.1.1. Greedy Perimeter Stateless Routing (GPSR) -- 4.1.1.2. Geographic Source Routing (GSR) -- 4.1.1.3. Anchor Based Street and Traffic-Aware Routing (A-STAR) -- 4.1.1.4. Greedy Perimeter Coordinator Routing (GPCR) -- 4.1.1.5. Connectivity Aware Routing protocol (CAR) -- 4.1.2. Non-Beacon Based Position-Based Routing Protocol -- 4.1.2.1. Contention Based Forwarding (CBF) -- 4.1.3. Hybrid Routing Protocol -- 4.1.3.1. Topology Assist Geo Opportunistic Routing (TO-GO) -- 4.2. Delay Tolerant Network
4.2.1. Vehicle Assisted Data Delivery (VADD) -- 4.2.2. Reactive Pseudo-Suboptimal-Path Selection Routing (RPS) -- 4.3. Hybrid Network -- 4.3.1. GeoDTN + NAV -- 4.3.2. Connectivity Aware Minimum Delay Geographic Routing Protocol (CMGR) -- Conclusion and Future Scope -- References -- Chapter 2 -- Elliptic Curve Cryptography in Intelligent Transport Systems -- Abstract -- Introduction -- ITS Applications and Security -- Security in ITS -- Elliptic Curve Cryptography -- Elliptic Curve -- Domain Parameters of the Elliptic Curve -- Point Addition and Point Multiplication
Different Multiplication Techniques -- Proposed Architecture -- Endomorphism -- Efficient Usage of Endomorphism in ECDSA -- Calculations Using Endomorphism -- Point Adder -- Point Multiplier -- LUT Main -- Proposed Architecture for ≤ -- Total Delay -- Architecture for ≤ -- U1-k Module -- Results -- Validation Results -- Computational Time Analysis -- Memory Utilization -- Comparison with Other Implementations -- Discussion -- Conclusion and Future Work -- References -- Chapter 3 -- Exploitation of Network Coding in On-Demand Wireless Data Broadcast -- Chapter 4
Fault Diagnosis Techniques for Mobile Wireless Networks -- Abstract -- Introduction -- Unreliable Wireless Connections -- Dynamic and Arbitrary Network Topology -- Resource Limitations -- Minimum Bandwidth Usage -- Distributed Diagnosis -- Adaptable -- Scalability -- Heterogeneous -- Self-Diagnosis -- Dependability: Attributes, Threats, and Means -- Availability -- Reliability -- Safety -- Integrity -- Maintainability -- Fault Prevention Techniques -- Fault Tolerance Techniques -- Fault Removal Techniques -- Fault Forecasting Techniques -- Fault Diagnosis -- Fault Diagnosis Techniques
Notes Description based upon print version of record
Test-Based Techniques
Subject Wireless communication systems.
Wireless power transmission.
Wireless communication systems
Wireless power transmission
Form Electronic book
Author Nawaz Ali, G. G. Md., editor
Noor-A-Rahim, Md., editor
Kar, Pushpendu, editor
ISBN 1536180394
9781536180398