FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Bi-Usage Energy Efficient Techniques (BUEET) for Energizing the Vehicle and Broadcasting the Information in Highway Scenario

Author(s): Chinju R Nair1* and J. Abdul Samath2

Publisher : FOREX Publication

Published : 30 June 2023

e-ISSN : 2347-470X

Page(s) : 506-512




Chinju R Nair, Research Scholar, Department of Computer Science, Research and Development Centre, Bharathiar University, Coimbatore, India; Email: chinju.r.nair@gmail.com

J. Abdul Samath, Assistant Professor, Department of Computer Science, Chikkanna Government Arts College, Tiruppur, India; Email: abdulsamath.phd@gmail.com

    [1] Ribal Atallah, Chadi Assi, and Jia Yuan Yu “A Reinforcement Learning Technique for Optimizing Downlink Scheduling in an Energy-Limited Vehicular Network” in 2016 DOI 10.1109/TVT.2016.2622180, IEEE Transactions on Vehicular Technology. [Cross Ref]
    [2] Al-Tabbakh, S. M. (2017). Novel technique for data aggregation in wireless sensor networks. 2017 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC). doi:10.1109/iintec.2017.8325904. [Cross Ref]
    [3] Ashok V Sutagundar and Padmaja Kuruba “Energy Efficient Dynamic Navigation System” in 2018 Second International Conference on Advances in Electronics, Computer and Communications (ICAECC-2018) 978-1-5386-3785-2/18/$31.00 ©2018 IEEE Energy Efficient Dynamic Navigation System. [Cross Ref]
    [4] Hammouche Yassine and Merniz Salah “VANET Cross-Layer Routing” VANET Cross-Layer Routing. 2019 International Conference of Computer Science and Renewable Energies (ICCSRE). doi:10.1109/iccsre.2019.8807634. [Cross Ref]
    [5] Garg, S., Singh, A., Kaur, K., Aujla, G. S., Batra, S., Kumar, N., & Obaidat, M. S. (2019). Edge Computing-Based Security Framework for Big Data Analytics in VANETs. IEEE Network, 33(2), 72–81. doi:10.1109/mnet.2019.1800239. [Cross Ref]
    [6] SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention, First Edition. Abdulmohsen Almalawi, Zahir Tari, Adil Fahad and Xun Yi. © 2021 John Wiley & Sons, Inc. Published 2021 by John Wiley & Sons, Inc. [Cross Ref]
    [7] Zhan Xin, Wang Xiaodong and Yuan Huabing,” Research on Block Chain Network Intrusion Detection System”, 2019 International Conference on Computer Network, Electronic and Automation (ICCNEA), DOI 10.1109/ICCNEA.2019.00045, P No: 191-196. [Cross Ref]
    [8] Wang Chao, Wang Wenhui, Dong Jiahan , Guo Guangxin, “Research on Network Intrusion Detection Technology Based on DCGAN”, IAEAC 2021(ISSN 2689-6621), 978-1-7281-8028-1, P No: 1418 – 1422. [Cross Ref]
    [9] Zhang Lin and Du Hongle , “Research on SDN intrusion detection based on online ensemble learning algorithm, 2020 International Conference on Networking and Network Applications (NaNA), DOI 10.1109/NaNA51271.2020.00027, P No:114-118. [Cross Ref]
    [10] Meijie Li, Zhengyu Xie,Yong Qin and Yingqing Mai,” Research on Intrusion Detection Method of KeyMetro Areas Based on YOLOv3”, 2020 International Conference on SDPC, 978-1-7281-7050-3,DOI:10.1109/SDPC49476.2020.9353115. [Cross Ref]
    [11] Jiang D, Taliwal V, Meier A, Holfelder W, and Herrt wich R, “Design of 5.9 GHz DSRC-based vehicular safety communication,” IEEE Wireless Communication., vol. 13, no. 5, pp. 36– 43, 2006. [Cross Ref]
    [12] Liu Q, Wu Q and Yong L., “A hierarchical security architecture of VANET,” International Conference on Cyberspace Technology, pp. 6- 10, Nov.2013. [Cross Ref]
    [13] Al-Hilo, A., Samir, M., Assi, C., Sharafeddine, S., & Ebrahimi, D. (2021). UAV-Assisted Content Delivery in Intelligent Transportation Systems-Joint Trajectory Planning and Cache Management. IEEE Transactions on Intelligent Transportation Systems, 22(8), 5155–5167. doi:10.1109/tits.2020.3020220. [Cross Ref]
    [14] Raja, G., Anbalagan, S., Vijayaraghavan, G., Dhanasekaran, P., Al-Otaibi, Y. D., & Bashir, A. K. (2020). Energy-Efficient End-to-End Security for Software Defined Vehicular Networks. IEEE Transactions on Industrial Informatics, 1–1. doi:10.1109/tii.2020.3012166. [Cross Ref]
    [15] Liu, Y. (2021). VANET Routing Protocol Simulation Research Based on NS-3 and SUMO. 2021 IEEE 4th International Conference on Electronics Technology (ICET). doi:10.1109/icet51757.2021.945092. [Cross Ref]
    [16] Achour, I., Bejaoui, T., Busson, A., & Tabbane, S. (2016). SEAD: A simple and efficient adaptive data dissemination protocol in vehicular ad-hoc networks. Wireless Networks, 22, 1673-1683. [Cross Ref]
    [17] Behura, A., Srinivas, M., & Kabat, M. R. (2022). Giraffe kicking optimization algorithm provides efficient routing mechanism in the field of vehicular ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, 13(8), 3989-4008. [Cross Ref]
    [18] Abbas, A. H., Ahmed, A. J., & Rashid, S. A. (2022). A cross-layer approach MAC/NET with updated-GA (MNUG-CLA)-based routing protocol for VANET network. World Electric Vehicle Journal, 13(5), 87. [Cross Ref]
    [19] Ramamoorthy, R., & Thangavelu, M. (2022). An enhanced distance and residual energy‐based congestion aware ant colony optimization routing for vehicular ad hoc networks. International Journal of Communication Systems, 35(11), e5179. [Cross Ref]

Chinju R Nair and J. Abdul Samath (2023), Bi-Usage Energy Efficient Techniques (BUEET) for Energizing the Vehicle and Broadcasting the Information in Highway Scenario. IJEER 11(2), 506-512. DOI: 10.37391/IJEER.110236.