Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058295
K. Anusha
Nearby future, thing-thing communication form will be the main form along with human-human, and human-thing. To make the things communicate among themselves Internet of Things (IoT) concept is needed. An overview of IoT and why it is going to be formulated will be given. IoT has two attributes and four differential features. The semantic analysis of Internet of things is "the Internet relating to things", will be discussed. A new concept of energy-efficient routing protocol, Weighted Election Protocol based on Redundancy (R-WEP), in order to enhance the stability period along with network life time of cluster based Wireless Sensor Networks (WSN) for thing-thing communication will be developed. This paper focuses specifically on a case-monitoring weighted sensor networks based on the weighted election protocol and the reconfiguration of nodes with the principle redundancy to keep coverage of the area and ensure a long life of the network. Flow chart of the new conceptual routing protocol, R-WEP, and the simulation results will be shown comparing with its basic protocol. An idea for application of IoT which mainly concentrates on power minimization will be discussed.
{"title":"Redundancy based WEP routing technology (IoT-WSN)","authors":"K. Anusha","doi":"10.1109/SPACES.2015.7058295","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058295","url":null,"abstract":"Nearby future, thing-thing communication form will be the main form along with human-human, and human-thing. To make the things communicate among themselves Internet of Things (IoT) concept is needed. An overview of IoT and why it is going to be formulated will be given. IoT has two attributes and four differential features. The semantic analysis of Internet of things is \"the Internet relating to things\", will be discussed. A new concept of energy-efficient routing protocol, Weighted Election Protocol based on Redundancy (R-WEP), in order to enhance the stability period along with network life time of cluster based Wireless Sensor Networks (WSN) for thing-thing communication will be developed. This paper focuses specifically on a case-monitoring weighted sensor networks based on the weighted election protocol and the reconfiguration of nodes with the principle redundancy to keep coverage of the area and ensure a long life of the network. Flow chart of the new conceptual routing protocol, R-WEP, and the simulation results will be shown comparing with its basic protocol. An idea for application of IoT which mainly concentrates on power minimization will be discussed.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058308
Nirav J. Patel, R. Jhaveri
Mobile ad-hoc networks have to suffer with different types of packet dropping attacks. Therefore, we need strong mechanism to detect these malevolent nodes and to classify normal and abnormal nodes as per the behavior of nodes. Machine learning techniques distinguish outlier nodes quickly and accurately provide classification by observing behavior of those nodes in the network. In this paper, we study various machine learning techniques as artificial neural network, support vector machine, decision tree, Q-learning, Bayesian network for identifying the malicious nodes. These techniques are able to detect black hole, gray hole, flooding attacks and other packet dropping attacks. These types of misbehaving nodes are identified and future behaviors of the nodes are predicted with supervised, un-supervised, reinforcement machine learning techniques.
{"title":"Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey","authors":"Nirav J. Patel, R. Jhaveri","doi":"10.1109/SPACES.2015.7058308","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058308","url":null,"abstract":"Mobile ad-hoc networks have to suffer with different types of packet dropping attacks. Therefore, we need strong mechanism to detect these malevolent nodes and to classify normal and abnormal nodes as per the behavior of nodes. Machine learning techniques distinguish outlier nodes quickly and accurately provide classification by observing behavior of those nodes in the network. In this paper, we study various machine learning techniques as artificial neural network, support vector machine, decision tree, Q-learning, Bayesian network for identifying the malicious nodes. These techniques are able to detect black hole, gray hole, flooding attacks and other packet dropping attacks. These types of misbehaving nodes are identified and future behaviors of the nodes are predicted with supervised, un-supervised, reinforcement machine learning techniques.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121681430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058281
N. D. Kumar, A. R. Reddy
As biological databases are growing in terms of numbers, size and complexity, managing these databases is becoming very complex. Most of these databases emerged as the output of experimental research by scientists. However, many of the scientists were not trained on the informatics side of research and also there were few standards available to be followed in defining these databases. This resulted in a hydra-like haphazard growth of biological databases and a lack of integration continues to be a major bottleneck. Integration of data from various sources can be a valuable instrument in understanding and research. This information is conveniently presented individual pieces of informations are put in context with respect to other data.
{"title":"Some studies on access the protein information from various databases","authors":"N. D. Kumar, A. R. Reddy","doi":"10.1109/SPACES.2015.7058281","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058281","url":null,"abstract":"As biological databases are growing in terms of numbers, size and complexity, managing these databases is becoming very complex. Most of these databases emerged as the output of experimental research by scientists. However, many of the scientists were not trained on the informatics side of research and also there were few standards available to be followed in defining these databases. This resulted in a hydra-like haphazard growth of biological databases and a lack of integration continues to be a major bottleneck. Integration of data from various sources can be a valuable instrument in understanding and research. This information is conveniently presented individual pieces of informations are put in context with respect to other data.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058273
S. Dey, Sanjukta Tamang, Pankaj Sarkar, Manimala Pal, R. Ghatak
In this paper, a new method of forming an UWB BPF with notch band functionality has been presented. The design uses a multi stub loaded resonator on a Uniform Impedance Resonator (UIR) to form an Ultra Wideband (UWB) range and a rectangular spiral resonator to form a notch band at 5.55 GHz to avoid interference from existing narrow band radio signals. The passband insertion loss is within 0.5 dB. The filter exhibits a wide stop band till 15 GHz. Presence of a proper UWB range along with notch band and stop band characteristics are the ideal characteristics.
{"title":"An ultra-wideband bandpass filter using multi stub resonator with notch band functionality","authors":"S. Dey, Sanjukta Tamang, Pankaj Sarkar, Manimala Pal, R. Ghatak","doi":"10.1109/SPACES.2015.7058273","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058273","url":null,"abstract":"In this paper, a new method of forming an UWB BPF with notch band functionality has been presented. The design uses a multi stub loaded resonator on a Uniform Impedance Resonator (UIR) to form an Ultra Wideband (UWB) range and a rectangular spiral resonator to form a notch band at 5.55 GHz to avoid interference from existing narrow band radio signals. The passband insertion loss is within 0.5 dB. The filter exhibits a wide stop band till 15 GHz. Presence of a proper UWB range along with notch band and stop band characteristics are the ideal characteristics.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126619923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058309
P. R. Lasya, M. Kumar
One of the interesting features of cognitive radio (CR) systems is their ability to provide dynamic spectrum access even in the licensed spectral bands; wherein they should be strictly causing no interference to the licensed users or among themselves. Orthogonal frequency-division multiplexing (OFDM) is considered for CR user transmission because of its flexible operation in frequency band switching; but suffers from high peak-to-average power ratio (PAPR). Hence, a transmission method where it can cause minimum interference with lower PAPR is obtained. In this paper, a better method to reduce out-of-band (OOB) power as well as PAPR is modeled by combining spectral precoding which aims at OOB radiation suppression; and PAPR reduction techniques such as selected mapping (SLM) technique and iterative clipping and filtering (ICF). The performance of these methods are discussed in terms of power spectral densities (PSD) and complementary cumulative distribution function (CCDF) of PAPR.
{"title":"PAPR and out-of-band power reduction in OFDM-based cognitive radios","authors":"P. R. Lasya, M. Kumar","doi":"10.1109/SPACES.2015.7058309","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058309","url":null,"abstract":"One of the interesting features of cognitive radio (CR) systems is their ability to provide dynamic spectrum access even in the licensed spectral bands; wherein they should be strictly causing no interference to the licensed users or among themselves. Orthogonal frequency-division multiplexing (OFDM) is considered for CR user transmission because of its flexible operation in frequency band switching; but suffers from high peak-to-average power ratio (PAPR). Hence, a transmission method where it can cause minimum interference with lower PAPR is obtained. In this paper, a better method to reduce out-of-band (OOB) power as well as PAPR is modeled by combining spectral precoding which aims at OOB radiation suppression; and PAPR reduction techniques such as selected mapping (SLM) technique and iterative clipping and filtering (ICF). The performance of these methods are discussed in terms of power spectral densities (PSD) and complementary cumulative distribution function (CCDF) of PAPR.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127573837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058203
G. Verma, O. P. Sahu
In this paper, we have proposed a Cognitive Radio system where primary users uses the precautionary measures against the possible interferences that may disturb their quality of service (QOS), these interferences may be originated from any other primary user itself, possibly due to the effect of the hidden terminal problem or may be received from the secondary user end. The proposed approach is carried with the cooperation of the primary users where they perform the task of data transmission and spectrum sensing simultaneously, using our proposed receiver and frame structures. The proposed cognitive radio system works beyond the sensing-throughput tradeoff, overcomes the hidden terminal problem of the secondary as well as the primary users and increases awareness of the primary users against the interferences that can harm their performance, hence facilitates them with the maximum quality of service. More specifically, the probability of detection of the secondary users is increased dramatically even for the low signal to noise ratio (SNR) of the primary user received at the secondary user end. In other words, the licensed spectrum can be best exploited in an unlicensed manner even for the low SNR region, while allowing maximum protection to the primary users.
{"title":"Throughput enhancement to the Cognitive Radio networks under the precaution is better than the cure (PBC) approach","authors":"G. Verma, O. P. Sahu","doi":"10.1109/SPACES.2015.7058203","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058203","url":null,"abstract":"In this paper, we have proposed a Cognitive Radio system where primary users uses the precautionary measures against the possible interferences that may disturb their quality of service (QOS), these interferences may be originated from any other primary user itself, possibly due to the effect of the hidden terminal problem or may be received from the secondary user end. The proposed approach is carried with the cooperation of the primary users where they perform the task of data transmission and spectrum sensing simultaneously, using our proposed receiver and frame structures. The proposed cognitive radio system works beyond the sensing-throughput tradeoff, overcomes the hidden terminal problem of the secondary as well as the primary users and increases awareness of the primary users against the interferences that can harm their performance, hence facilitates them with the maximum quality of service. More specifically, the probability of detection of the secondary users is increased dramatically even for the low signal to noise ratio (SNR) of the primary user received at the secondary user end. In other words, the licensed spectrum can be best exploited in an unlicensed manner even for the low SNR region, while allowing maximum protection to the primary users.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121406418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058198
Nidhi Choudhary, L. Tharani
Mobile ad hoc networks (MANET) are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. MANET do not have centralized administration, here nodes act as both host as well as router and communicate by forwarding packets for each other in multi hop way, because of the fundamental characteristics like, the open medium, dynamic network topology, lack of centralized monitoring and management these networks are particularly vulnerable to various types of attacks. One of the routing protocol being used for wireless network is Ad hoc on demand distance vector (AODV). Black hole is one of the attack that is launched on AODV. In this attack, the attacker claims the shortest route to the destination and hinders the communication by dropping all the packets. In this paper, a new solution against the Black Hole attack is proposed. This paper demonstrates a timer based detection approach for identifying black hole node. In network layer we proposed a Timer based method to overhear the next node action. The simulation results using EXata-Cyber shows that in a dynamic network most of the malicious nodes can be detected and that results in an improved packet delivery ratio.
{"title":"Preventing Black Hole Attack in AODV using timer-based detection mechanism","authors":"Nidhi Choudhary, L. Tharani","doi":"10.1109/SPACES.2015.7058198","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058198","url":null,"abstract":"Mobile ad hoc networks (MANET) are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. MANET do not have centralized administration, here nodes act as both host as well as router and communicate by forwarding packets for each other in multi hop way, because of the fundamental characteristics like, the open medium, dynamic network topology, lack of centralized monitoring and management these networks are particularly vulnerable to various types of attacks. One of the routing protocol being used for wireless network is Ad hoc on demand distance vector (AODV). Black hole is one of the attack that is launched on AODV. In this attack, the attacker claims the shortest route to the destination and hinders the communication by dropping all the packets. In this paper, a new solution against the Black Hole attack is proposed. This paper demonstrates a timer based detection approach for identifying black hole node. In network layer we proposed a Timer based method to overhear the next node action. The simulation results using EXata-Cyber shows that in a dynamic network most of the malicious nodes can be detected and that results in an improved packet delivery ratio.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130354223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058245
Pritika Bhatt, P. Akram, T. Ramana
In wireless communication, the broadcast server serves numerous clients. The exchange of information from server and access by the clients takes place in a cyclic path using the directional antennas. But directional antennas have several drawbacks. So the multiple directional antennas were used to replace the fixed directional antenna systems. When using the multiple antennas to get the desired improved performance, we need to consider the geographical distribution of all the clients present in the coverage area of system. All these disadvantages motivate us to develop a technique named as a wireless push system developed using adaptive smart antenna with rescheduling application to be used at broadcasting server. Smart antennas can vary the beam widths according to client position using suitable algorithms. Beam width of the antenna is changed as per the changing position of the client and appropriate changes are introduced in the broadcasting schedules. This approach will bring the desired improvement in system performance.
{"title":"A novel on smart antennas to improve performance in wireless communications","authors":"Pritika Bhatt, P. Akram, T. Ramana","doi":"10.1109/SPACES.2015.7058245","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058245","url":null,"abstract":"In wireless communication, the broadcast server serves numerous clients. The exchange of information from server and access by the clients takes place in a cyclic path using the directional antennas. But directional antennas have several drawbacks. So the multiple directional antennas were used to replace the fixed directional antenna systems. When using the multiple antennas to get the desired improved performance, we need to consider the geographical distribution of all the clients present in the coverage area of system. All these disadvantages motivate us to develop a technique named as a wireless push system developed using adaptive smart antenna with rescheduling application to be used at broadcasting server. Smart antennas can vary the beam widths according to client position using suitable algorithms. Beam width of the antenna is changed as per the changing position of the client and appropriate changes are introduced in the broadcasting schedules. This approach will bring the desired improvement in system performance.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132764824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058304
P. Laxmikanth, L. Surendra, D. Ratnam, S. Babu, S. Suparshya Babu
Smart antenna technology in cellular communication is an auspicious method to enhance the potential of communications networks. One of the problematic issues in smart antenna is the inaccurate detection of the arrival signal with different angles of arrival in multipath Rayleigh fading channel. In this paper, a new smart antenna signal processing method has been proposed for estimating the angle-of-arrival (AOA) of signals using the MUSIC method for wireless communication applications. MUSIC is a well-known high resolution eigen-structure method. This paper also describes how the performance of the estimation process can be enhanced by changing various parameters of the array antenna. The simulation has been conducted under different random signal arrivals and space between array elements. The achieved results show that the proposed method can estimate the AOA with higher efficiency.
{"title":"Enhancing the performance of AOA estimation in wireless communication using the MUSIC algorithm","authors":"P. Laxmikanth, L. Surendra, D. Ratnam, S. Babu, S. Suparshya Babu","doi":"10.1109/SPACES.2015.7058304","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058304","url":null,"abstract":"Smart antenna technology in cellular communication is an auspicious method to enhance the potential of communications networks. One of the problematic issues in smart antenna is the inaccurate detection of the arrival signal with different angles of arrival in multipath Rayleigh fading channel. In this paper, a new smart antenna signal processing method has been proposed for estimating the angle-of-arrival (AOA) of signals using the MUSIC method for wireless communication applications. MUSIC is a well-known high resolution eigen-structure method. This paper also describes how the performance of the estimation process can be enhanced by changing various parameters of the array antenna. The simulation has been conducted under different random signal arrivals and space between array elements. The achieved results show that the proposed method can estimate the AOA with higher efficiency.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114164302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-12DOI: 10.1109/SPACES.2015.7058293
R. Poonia, D. Bhargava, B. Kumar
Over the last few decades, the researchers have been fascinated towards vehicular networks. Vehicular ad-hoc network (VANET) is a highly dynamic wheeled network where the on road vehicles and road - side units considered as nodes to allow the wireless communication. Each node acts as the host in VANETs. Due to high dynamic nature of VANETs the mobility pattern and the network topologies change frequently, that make it differ from the other type of ad-hoc network The challenge of this research is a crucial designing for dynamic routing protocol in VANETs. This paper proposes a cluster-based approach for dynamic routing in VANETs. This new routing approach have an aim of increasing the overall network throughput, delivery ratio with less normalized routing load in comparison of AODV Extensive simulations are carried out in NS2 to appraise the efficiency of the proposed cluster-based routing approach.
{"title":"CDRA: Cluster-based dynamic routing approach as a development of the AODV in vehicular ad-hoc networks","authors":"R. Poonia, D. Bhargava, B. Kumar","doi":"10.1109/SPACES.2015.7058293","DOIUrl":"https://doi.org/10.1109/SPACES.2015.7058293","url":null,"abstract":"Over the last few decades, the researchers have been fascinated towards vehicular networks. Vehicular ad-hoc network (VANET) is a highly dynamic wheeled network where the on road vehicles and road - side units considered as nodes to allow the wireless communication. Each node acts as the host in VANETs. Due to high dynamic nature of VANETs the mobility pattern and the network topologies change frequently, that make it differ from the other type of ad-hoc network The challenge of this research is a crucial designing for dynamic routing protocol in VANETs. This paper proposes a cluster-based approach for dynamic routing in VANETs. This new routing approach have an aim of increasing the overall network throughput, delivery ratio with less normalized routing load in comparison of AODV Extensive simulations are carried out in NS2 to appraise the efficiency of the proposed cluster-based routing approach.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}