0% found this document useful (0 votes)
53 views8 pages

MANET For Smart Transportation

Uploaded by

ayene
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views8 pages

MANET For Smart Transportation

Uploaded by

ayene
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Available online at www.sciencedirect.

com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com

ScienceDirect
Procedia Computer Science 00 (2018) 000–000
Procedia
Procedia Computer
Computer Science
Science 16000 (2018)
(2019) 000–000
758–765 www.elsevier.com/locate/procedia
www.elsevier.com/locate/procedia

International Workshop on Emerging Networks and Communications


International Workshop on Emerging Networks and Communications
(IWENC)
November 4-7, (IWENC)
2019, Coimbra, Portugal
November 4-7, 2019, Coimbra, Portugal
Mobile
Mobile AdHoc
AdHoc networks
networks for
for Intelligent
Intelligent Transportation
Transportation System:
System:
Comparative Analysis of the Routing protocols
Comparative Analysis of the Routing protocols
Hamza ZEMRANEa,∗ b
a,∗, Youssef BADDIb , Abderrahim HASBIa
a
Hamza ZEMRANE
a
, Youssef BADDI , Abderrahim HASBI
Lab RIME, Mohammadia School of engineering, UM5, Rabat, Morroco
a Lab RIME, Mohammadia School of engineering, UM5, Rabat, Morroco
b lab STIC, High School of Technology Sidi Bennour, UCD, El Jadida, Morroco
b lab STIC, High School of Technology Sidi Bennour, UCD, El Jadida, Morroco

Abstract
Abstract
Communication networks knew a lot of development from their first creation, from wired networks, to wireless communication
Communication networks knew
networks with infrastructure, and anow
lot we
of development from communication
talk about wireless their first creation, from wired
networks withoutnetworks, to wireless
infrastructure, communication
also called MANETs.
networks withcommunication
The wireless infrastructure, and now wewithout
networks talk about wireless communication
infrastructure, allows a quick, networks without
easy and infrastructure,
efficient also called MANETs.
network deployment, often used
The wireless
in rescue communication
operations, networks
after a natural without
disaster, infrastructure,
to replace allows
the existing a quick,
network easy and efficient
infrastructure, network
or in the deployment,
military ofteninused
field. We focus our
in rescue operations, after a natural disaster, to replace the existing network infrastructure, or in the military field.
work on the intelligent transport system, that improve the traditional transport system, with reducing the risk of human errors We focus in our
to
work on the
save lives, intelligent
and with the transport system, that improve
effective management of traffic the traditional
congestion transport
to save system,
time and with reducing
minimize the energytheconsumption.
risk of human errors to
save lives, and have
The MANETs with athe
loteffective management
of different of trafficincongestion
routing protocols, this articletowe
save time and
compare theminimize the energy
performance of someconsumption.
of this routing protocols
The
in case of using different communication applications based on HTTP, FTP and Voice protocols. of some of this routing protocols
MANETs have a lot of different routing protocols, in this article we compare the performance
in case of using different communication applications based on HTTP, FTP and Voice protocols.

©c 2019
2018 The
The Authors.
Authors. Published
Published by
by Elsevier
Elsevier B.V.
B.V.
c 2018
This The Authors. Published by Elsevier B.V.
This is an open access article under the CC BY-NC-ND license
is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
(http://creativecommons.org/licenses/by-nc-nd/4.0/)
This is an open
Peer-review access
under article under
responsibility
responsibility theConference
ofthe
of the CC BY-NC-ND
Conference license
Program
Program (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Chairs.
Chairs.
Peer-review under responsibility of the Conference Program Chairs.
Keywords: Mobile AdHoc Networks (MANET); Intelligent Transportation Systems (ITS); Cybercars; Mobile routing protocols; Mobile routing
Keywords:
constraints. Mobile AdHoc Networks (MANET); Intelligent Transportation Systems (ITS); Cybercars; Mobile routing protocols; Mobile routing
constraints.

1. Introduction
1. Introduction
Nowadays, the use of wireless technology has invaded the network market. Several technologies have emerged,
for Nowadays, the use[1],
example: ZigBee of WiFi
wireless
[1],technology
WIMAX [2]. hasThese
invaded the network
technologies market.
equip a wideSeveral
range technologies have emerged,
of mobile devices like: lap-
for example: ZigBee [1], WiFi [1], WIMAX [2]. These technologies equip a wide range of mobile devices
tops, mobile phones, smart cars, and others. This technological advancement means that wireless telecommunications like: lap-
tops, mobile phones, smart cars, and others. This technological advancement means that wireless telecommunications
networks are currently among the most active areas of computer research. There are two main families of wireless
networks
networks: are currently
networks withamong the most and
infrastructure active areas ofwithout
networks computer research. There
infrastructure are two
or AdHoc. In main families
networks with of wireless
infrastruc-
networks: networks with infrastructure and networks without infrastructure or AdHoc. In networks with
ture, communications are made via a fixed base station. This approach is used in traditional wireless networks such infrastruc-
ture, communications
as Global are made
System for Mobile via a fixed base(GSM)
Communications station. This approach
networks is used
and wireless in traditional
LANs. However,wireless networks in
communications such
an
as
AdHoc network occur in the absence of any fixed communication infrastructure. If the communicating devices are an
Global System for Mobile Communications (GSM) networks and wireless LANs. However, communications in in
AdHoc network occur in the absence of any fixed communication infrastructure. If the communicating devices are in

∗ Corresponding author. Tel.: +212 670 86 52 88.


∗ Corresponding
E-mail address:author. Tel.: +212 670 86 52 88.
[email protected]
E-mail address: [email protected]
1877-0509  c 2018 The Authors. Published by Elsevier B.V.
1877-0509
This c 2018

is an open Thearticle
access Authors.
underPublished by Elsevier B.V.
the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
1877-0509
This © 2019
is an open Thearticle
access Authors.
underPublished by Elsevier B.V.
the Conference
CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Peer-review
This is an under
open responsibility
access article of the
under the CC Program
BY-NC-ND Chairs.
license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Peer-review under responsibility of the Conference Program Chairs.
Peer-review under responsibility of the Conference Program Chairs.
10.1016/j.procs.2019.11.014
Hamza Zemrane et al. / Procedia Computer Science 160 (2019) 758–765 759
2 ZEMRANE Hamza / Procedia Computer Science 00 (2018) 000–000

the transmission zone of each other, the communication is carried out in point-to-point mode, and if the communicat-
ing nodes are far apart, several intermediate nodes participate in the routing of the data to their destinations. In this
case, we speak of the ”multi jumps” routing.
AdHoc mobile networks [3] are fast and easy to deploy, they are particularly interesting for military applications
where the installation of fixed infrastructure is often impossible, they can also be used in search and rescue opera-
tions, train stations and airports for communication and collaboration between staff members, in our work we focus
particularly on the intelligent transportation system that improves the transport domain by reducing the error rate of
drivers, and minimizing the production of greenhouse gases. Several routing protocols for mobile AdHoc networks
(MANET) have been developed, depending on how routes are created and maintained during data routing, and can
be classified into five categories: reactive, proactive, hybrid, hierarchical and geographical protocols. Our work is part
of the study of the behavior of some selected MANET routing protocols (AODV [4], DSR [5], OLSR [6] and TORA
[7]) in the case of using applications that are based on HTTP, FTP and Voice communication protocols as well as the
rate of control messages generated by these protocols.
In section two we define the mobile AdHoc network its characteristic, and types, in section three we talk about the
intelligent transport system as an application of the MANETs, we give the context of ITS and the migration to the
Cybercars, in section four we talk about the constraints of routing in the MANETs, description and representation of
different types of protocols, and simulation with performance comparison between selected MANET routing proto-
cols.
2. AdHoc mobile networks
2.1. Definition of AdHoc networks
An AdHoc network [3] is a set of hosts equipped with antennas that can communicate with each other without any
centralized administration, using wireless communication technology such as: ZigBee [1], WiFi [1], WiMAX [2] and
others. In contrast to wired networks where only certain nodes called ”routers” are responsible for the routing of data,
in an AdHoc network all nodes are both routers and terminals. The choice of nodes that will ensure a communication
session in an AdHoc network is done dynamically according to the connectivity of the network, hence the name
”AdHoc”. In an AdHoc network, a node can communicate directly (point-to-point mode) with any node if its in
the same transmission zone, while communication with a node outside its transmission zone is done via several
intermediate nodes (multi-hop mode).

Fig. 1. Network in AdHoc mode


Formally, an Ad-Hoc network can be represented by a non-oriented graph G = (V, E) where V denotes the set of
nodes and E ∈ V 2 denotes the set of arcs corresponding to the possible direct communications. Let i and j be two
nodes of V, the arc(i, j) exists, if and only if, i can directly send a message to j, we say that j is close to i. The pairs
belonging to E depend on the position of the nodes and their communication range. If we assume the hypothesis that
all nodes have an identical R-range, and if d(i, j) denotes the distance between nodes i and j, then set E can be defined
as follows: E = (i, j) ∈ V 2 |d(i, j)R.
2.2. Characteristics of mobile AdHoc networks
Mobile AdHoc networks have several characteristics, the most important are:
• Dynamic topology: The mobile units of the network, move in a free and arbitrary way. As a result, the network
topology can change, at unpredictable times, in a fast and random way, as we can see in the figure below. The
links in the topology can be plain or bidirectional.
• Limited bandwidth: one of the primary characteristics of wireless networks is the use of a shared medium of
communication. This sharing means that the bandwidth reserved for a host is modest.
760 Hamza Zemrane et al. / Procedia Computer Science 160 (2019) 758–765
ZEMRANE Hamza / Procedia Computer Science 00 (2018) 000–000 3

• Energy constraints: mobile hosts are powered by autonomous energy sources such as batteries or other consum-
able sources. The energy parameter must be taken into consideration in any control made by the system.
• Limited physical security: AdHoc mobile networks are more affected by the security parameter than conven-
tional wired networks. This is justified by the physical constraints, and limitations, that make the control of
transferred data to be minimized.
• Lack of infrastructure: mobile AdHoc networks are distinguished from other wireless networks by the absence
of pre-existing infrastructure and any kind of centralized administration. Mobile hosts are responsible for estab-
lishing and maintaining network connectivity in a continuous manner.

Fig. 2. Changing the topology of an AdHoc network

2.3. Types of mobile AdHoc networks


The types of mobile AdHoc networks are diverse, we can find:
• Personal networks: PAN (Personal Area Network) [8] refers to a small network of computer equipment usually
used for personal use. Among the wireless technologies used by PAN networks, we can mention Bluetooth [9],
infrared (IR) [10], or ZigBee (IEEE 802.15.4 technology) [1].
• Peer-to-peer networks [11]:Are networks, with decentralized operation between different users of the network,
the machines in the network are simultaneously, client and servers (router).
• Sensor networks : Are networks composed of nodes, incorporating a changed measurement unit to capture
physical quantities (heat, humidity, vibration) and transform it into digital magnitudes, the nodes have also a
computer data storage, processing unit and a wireless transmission module, used a lot in the Internet of Things
[12] applications, like the IoT Smart Home Ecosystem [13][14], IoT Ehealth ecosystem [15] and others.
• Vehicular networks: Cars today are carrying more and more technology, and have more and more, need to
communicate with the outside world. Cars equipped with sensors on rooftops and bumpers are able to create
platforms based on AdHoc mobile networks [1] and to network cars passing close to each other. Prototypes
have already been developed for emergency vehicles (ambulances, fire engines, etc.).

3. Application area: Intelligent Transport Systems ITS


3.1. ITS context
The purpose of ITS is to respond to societal problems targeted at the use of transport. They are therefore anchored
in a context of systems improvement for both users, drivers and managers, using mobile AdHoc networks. Thus, ITS
are present mainly in the management of traffic congestion and in the development of new information technologies
embedded in vehicles. ITS therefore make it possible to improve the operation of the transportation system with
different ways, by saving time, minimizing costs, mainly on the energy to use. ITS are present all over the world
and are constantly being improved. In the transport industry or as consumers, we sometimes use ITS without even
knowing it (GPS, ADAS ...). The introduction of these new transport systems [16] is encouraged, among other things,
to reduce the risk of human errors and thus improve the safety of all. These systems are very popular in our society,
so it is normal to find it in the field of transport. For example, speed regulators or collision sensors are often present
in new car models. Systems that improve vehicle safety and so called cooperative vehicle infrastructure based on
mobile AdHoc networks are still evolving today. The goal is to implant them in new generations of vehicles. Another
objective of the ITS is the reduction of pollution caused by vehicles. This involves better control of releases and the
introduction of engines that consume less fuel.
Hamza Zemrane et al. / Procedia Computer Science 160 (2019) 758–765 761
4 ZEMRANE Hamza / Procedia Computer Science 00 (2018) 000–000

3.2. To Cybercars
ITS are composed of a wide range of technologies aimed at improving the quality of the different types of existing
transport systems. The ITS evolution is continuous, rapid and ultimately aims at the complete automation of these
systems. This outcome is already named and under development, it is called Cybercars [17]. The concept of Cybercar
[17] was born in the early 90s in Europe. The first Cybercars related system was set up in the Netherlands in 1997 for
the transit of passengers at Schiphol airport. To more formally define Cybercars, we can say that these are road vehicles
that operate completely autonomously apart from maintenance. Therefore, no driver is needed in such vehicles. They
are intended for the transport of people and goods on well defined road networks, and are supposed to be able to
adapt to various traffic conditions (bad weather, traffic jams, obstacles on the road, etc.). However, several levels of
automation can be defined for autonomous vehicles:
• level 0: classic vehicle, without automatic character.
• level 1: the driver directs, but he is assisted in his driving (parking assistance, cruise control for example).
• level 2: the automation is partial but the driver must still manage the pipe (the system can take over for example
in traffic jams).
• level 3: automation is real under certain predefined conditions. The driver is sometimes required to resume
manual control of his vehicle (automatic system adapted to highways for example).
• level 4: high automation, ie: that the vehicle operates autonomously in a large field of defined conditions (even
in urban areas), but a driver must be present and can theoretically regain control.
• level 5: the automation is complete and the vehicle can operate alone under all conditions that may be encoun-
tered. The presence of a driver is not necessary.
According to this scale, the Cybercar [17] is level 5 since it does not require the presence of any driver. However, in
the current state of the advance of research, such vehicles exist only for particular conditions, whether they are well
defined urban areas (as was done in La Rochelle or Clermont-Ferrand) etc. To date, a number of projects exist around
the world. We obviously think of the Google Car developed by the Google company, but many in Europe, including
the INRIA (National Institute of Research in Computer Science and Automation) and their project CyCab developed
by the RITS team.

Fig. 3. CyCab of INRIA

4. Routing in mobile AdHoc networks


In order to ensure network connectivity, in spite of the absence of fixed infrastructure and the mobility of the
stations, each node is used to participate in routing [1] and to transmit the packets of a node which is unable to
reach its destination, any node thus plays the role of station and router. The fact that the size of an AdHoc network
can be huge, emphasizes that the routing management [18] must be completely different from the approaches used
in conventional routing. The problem that arises in the context of mobile AdHoc networks, is the adaptation of the
routing method used with the large number of existing ones in an environment characterized by modest computing
and backup capabilities.
4.1. Routing constraints in mobile AdHoc networks
To provide the connection in mobile AdHoc networks, several routing algorithms are implemented, but the proper
change in network topology remains a problem to be solved, so it is important that any design a routing protocol [18]
consider the following issues:
762 Hamza Zemrane et al. / Procedia Computer Science 160 (2019) 758–765
ZEMRANE Hamza / Procedia Computer Science 00 (2018) 000–000 5

• Network load minimization: is achieved by improving network resources to reduce the number of routing loops
and the concentration of traffic around certain nodes or links.
• Provide support for reliable multipoint communications: the fact that the paths used to route data packets can
evolve should not have any problem with the proper routing of data. The elimination of a link, due to breakdown
or mobility should, ideally, increase the latency as little as possible.
• Ensure optimal routing: the routing strategy must create optimal paths and be able to take into account different
cost metrics (bandwidth, number of links, network resources, etc.). If the construction of optimal paths is a hard
problem, the maintenance of such paths can become even more complex, so the routing strategy must ensure
efficient road maintenance with the least possible cost.
• Latency: Increasing network connectivity affects the increase in latency quality.

4.2. Description and presentation of the different types of routing protocols


Several routing protocols [18] have been proposed in the literature for MANETs, the list of routing protocols
presented in the figure below is far from exhaustive. The existing types of MANET routing protocols are:
• Proactive routing [19]: In this class of protocols, a system of periodic exchange of control packets is set up so
that each node can build in a distributed manner the topology of the network. There may be several types of
control packets. Typically, we distinguishes packets that are sent locally to a hop and packets that are broadcast
throughout the network. The first allow to acquire the knowledge of the neighborhood. The second allows a
given node to broadcast in the network the state of the neighborhood, which is usually reduced to neighboring
nodes or a subset of them. In a proactive protocol, a node periodically updates its routing tables when receiving
control packets. We can find: DSDV, OLSR, GSR, FSR,...
• Reactive routing [20]: Routing protocols belonging to this category create and maintain routes as needed. When
the network needs a road, a global route discovery procedure is started, in order to obtain information. The
protocol attempts to discover a route only at the request of an application that wants to send a packet to a
destination, and this by the dissemination of a request throughout the network. The response to this broadcast
request allows the source to obtain topological information about this route. During this route search phase, the
IP packet is put on hold for a response from the routing protocol until a route is available. We can find: AODV,
DSR, LMR, TORA,...
• Hybrid routing [21]: these protocols, which usually mix the proactive and reactive modes, work in both modes
according to predefined conditions. In this system, we can keep the local knowledge of the topology up to
a predefined number, a priori small, of jump by a periodic exchange of control frames, in other words by a
proactive technique. The routes to more distant nodes are obtained by reactive scheme, that is to say by the use
of broadcast request packets. We can find: ZRP, ZHLS, SHARP, CAMA,...
• Hierarchical routing [22]: work by entrusting mobile roles that vary from one to the other. Some nodes are
elected and assume particular functions that lead to a multi-level view of the network topology. For example, a
mobile can serve as a gateway for a number of nodes that will be attached to him. The routing will be simplified,
since it will be gateway to gateway, to that directly attached to the recipient. In this type of protocol, the gateways
support the bulk of the routing load (the mobiles attached to it know that if the recipient is not in their direct
vicinity, its sufficient to send to the gateway that will manage). We can find: CGSR, HSR, MMWN, CBRP,...
• Geographic routing [23]: The idea is to use geographic information to route packets. To simplify the presenta-
tion, we will assume that all nodes know their position and that they also know the position of all other nodes in
the network. With these assumptions, it is easy for a node to choose from its neighbors a relay to route a packet
to the correct destination. We can find: LAR, DREAM, GPSR, GRID,...

4.3. Simulation and performance comparison between selected MANET routing protocols
4.3.1. The simulation scenario
The following scenario simulates the behavior of 20 mobile nodes that exchange HTTP, FTP, and Voice data over a
period of 50 minutes using a Mobile AdHoc network. Our job is to study and compare the performance of our network
when it uses the AODV [4], DSR [5], OLSR [6] and TORA [7] protocols for routing information. The simulation is
done the June 12 2019 it starts at 05:56:40 pm and ends at 06:50:00 pm.
Hamza Zemrane et al. / Procedia Computer Science 160 (2019) 758–765 763
6 ZEMRANE Hamza / Procedia Computer Science 00 (2018) 000–000

Fig. 4. Simulation scenario of our MANET network

4.3.2. In case of using an HTTP application


The following graph represents the traffic exchange between the different nodes in motion when using an HTTP
application by bytes/sec.
The curve that represents the AODV [4] protocol increases rapidly in comparison with the other curves, it receives
more than 200 bytes/sec around 06:10:00 pm, then it continue its evolution in a variable manner to receive 350
bytes/sec towards the end of the simulation. For the curve that represents the OLSR [6] protocol, it grow continuously,
its at more than 200 bytes/sec around 06:20:00 pm, then it continues to grow to reach more than 350 bytes/sec towards
the end of the simulation. The curve which represents the behavior of the TORA [7] protocol makes a fast increase at
the beginning to receive a little more than 230 bytes/sec, then she falls in a variable way to receive 70 bytes/sec until
the end of the simulation. For the DSR [5] protocol, the curve makes an increase that receives 125 bytes/sec and then
decreases to reach 65 bytes/sec towards the end of the simulation.
To conclude we can classify the routing protocols according to their performance in the case of utilisation an applica-
tion based on the HTTP protocol as follows: AODV, OLSR, TORA, then DSR.

Fig. 5. Average of the HTTP traffic sent

4.3.3. In case of using a FTP application


The following graph represents the FTP traffic exchange between the different nodes in motion during the simula-
tion by bytes/sec.
This time the curve representing the OLSR [6] protocol is in the first position, it starts with a fast increase which
holds more than 3750 bytes/sec, then it continues its evolution by making a variable decrease to receive a little less
than 1000 bytes/sec at the end of the simulation. The curve that represents the AODV [4] protocol increases to 2600
bytes/sec towards 06:01:00 pm, then it makes a fall to arrive at a more than 1000 bytes/sec towards the end of the
764 Hamza Zemrane et al. / Procedia Computer Science 160 (2019) 758–765
ZEMRANE Hamza / Procedia Computer Science 00 (2018) 000–000 7

simulation. The curve that represents the TORA [7] protocol reaches 2500 bits/sec at the beginning and then it turns
out slowly to arrive at less than 500 bytes/sec towards the end of the simulation. The curve representing the DSR [5]
protocol is at the end of the ranking, it is at 2000 bytes/sec at the beginning then it makes a slow decay that goes to
less than 500 bytes/sec at the end of the simulation.
To conclude we classify the performance of protocols in the case of use of the FTP protocol: OLSR, AODV, TORA,
then DSR.

Fig. 6. Average of the FTP traffic sent

4.3.4. In case of using a Voice application


The following graph represents the voice packet end to end delay: Its the time interval between when the voice
packet is queued for transmission at the physical layer until received at the receiving node, in our mobile AdHoc
network by seconds.
The curve that represents the OLSR [6] protocol starts at less than 1 sec and then it decrease to tries to stabilize on
0.10 sec until the end of the simulation. The curve that represents the TORA [7] protocol starts with a slight increase
that is more than 1 sec and then it decreases very slowly to reach 0.20 sec towards the end of the simulation. The curve
that represents the AODV [4] protocol starts with 0.20 sec then it makes a brief increase that reach 1.8 sec after that
the curve tries to stabilize on the same value until the end of the simulation. The curve that represents the protocol
DSR [5] makes a big growth which holds 11 sec towards 06:10:00 pm then it stabilizes on this value until the end of
the simulation.
To conclude we classify the performance of the protocols used in our mobile AdHoc network in the case of using of
a voice application: OLSR, TORA, AODV then DSR.

Fig. 7. Average of the Voice packet end to end delay


Hamza Zemrane et al. / Procedia Computer Science 160 (2019) 758–765 765
8 ZEMRANE Hamza / Procedia Computer Science 00 (2018) 000–000

5. Conclusion
MANET is a new network technology based on wireless communication protocols without any pre-existent in-
frastructure used a lot on train station and airport for communication and collaboration between staff members and
military applications. In our work we focus especially on the intelligent transportation systems that save lives by
reducing the risk of human errors, it can also minimise the energy consummation by the efficient management of
the traffic congestion. The diversity on the existing routing protocols in the MANETs make the choice of the most
efficient protocol to route the information a real problem. Our performance study of some selected routing protocol
results by advantage AODV then OLSR in case of using an HTTP application, in using a FTP application OLSR and
then AODV, and in using a Voice application OLSR then TORA.
References
[1] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. Comparison between IOT protocols: ZigBee and WiFi using the OPNET
simulator. In : Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications. ACM, 2018. p. 22.
[2] ZEMRANE, Hamza, ABBOU, Aiman Nait, BADDI, Youssef, et al. Wireless Sensor Networks as part of IOT: Performance study of WiMax-
Mobil protocol. In : 2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech). IEEE, 2018. p.
1-8.
[3] SHEN, Chen, YUN, Mira, ARORA, Amrinder, et al. Efficient Mobile Base Station Placement for First Responders in Public Safety Networks.
In : Future of Information and Communication Conference. Springer, Cham, 2019. p. 634-644.
[4] WU, Jianze, SHI, Shuo, LIU, Zhongyue, et al. Optimization of AODV Routing Protocol in UAV Ad Hoc Network. In : International Conference
on Artificial Intelligence for Communications and Networks. Springer, Cham, 2019. p. 472-478.
[5] SHARMA, Vivek, ALAM, Bashir, et DOJA, M. N. An Improvement in DSR Routing Protocol of MANETs Using ANFIS. In : Applications
of Artificial Intelligence Techniques in Engineering. Springer, Singapore, 2019. p. 569-576.
[6] SCHWEITZER, Nadav, STULMAN, Ariel, HIRST, Tirza, et al. Network bottlenecks in OLSR based ad-hoc networks. Ad Hoc Networks,
2019, vol. 88, p. 36-54.
[7] PRATAMA, Dikky Bagus. ANALISA PERBANDINGAN PERFORMANSI VOD (VIDEO ON DEMAND) DAN VOIP (VOICE OVER IN-
TERNET PROTOCOL) PADA JARINGAN MANET MENGGUNAKAN ALGORITMA ROUTING TORA. 2019. Thse de doctorat. Univer-
sity of Muhammadiyah Malang.
[8] LUONG, Le, HAVERINEN, Anssi, FUKUOKA, Yoshiro, et al. Wireless personal area network transmit beamforming. U.S. Patent Applica-
tion No 15/640,410, 3 janv. 2019.LUONG, Le, HAVERINEN, Anssi, FUKUOKA, Yoshiro, et al. Wireless personal area network transmit
beamforming. U.S. Patent Application No 15/640,410, 3 janv. 2019.
[9] THOMAS, Kvin, FOUCHAL, Hacne, CORMIER, Stephane, et al. Intelligent Transport System Based on Bluetooth. In : International Work-
shop on Communication Technologies for Vehicles. Springer, Cham, 2019. p. 50-59.
[10] SCHLESSINGER, Monroe. Infrared technology fundamentals. Routledge, 2019.
[11] GONG, Michelle X. Peer to peer networking and sharing systems and methods. U.S. Patent Application No 16/103,563, 1 aot 2019.
[12] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. SDN-Based Solutions to Improve IOT: Survey. In : 2018 IEEE 5th International
Congress on Information Science and Technology (CiSt). IEEE, 2018. p. 588-593.
[13] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. Internet of Things Smart Home Ecosystem. In : Emerging Technologies for
Connected Internet of Vehicles and Intelligent Transportation System Networks. Springer, Cham, 2020. p. 101-125.
[14] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. IoT Smart Home Ecosystem: Architecture and Communication Protocols. In
: 2019 International Conference of Computer Science and Renewable Energies (ICCSRE). IEEE, 2019. p. 1-8.
[15] ZEMRANE, Hamza, BADDI, Youssef, et HASBI, Abderrahim. Ehealth smart application of WSN on WWAN. In : Proceedings of the 2nd
International Conference on Networking, Information Systems Security. ACM, 2019. p. 26.
[16] GANIN, Alexander A., MERSKY, Avi C., JIN, Andrew S., et al. Resilience in Intelligent Transportation Systems (ITS). Transportation Re-
search Part C: Emerging Technologies, 2019, vol. 100, p. 318-329.
[17] MONTANARO, Umberto, DIXIT, Shilp, FALLAH, Saber, et al. Towards connected autonomous driving: review of use-cases. Vehicle System
Dynamics, 2019, vol. 57, no 6, p. 779-814.
[18] DESAI, Aneri Mukeshbhai et JHAVERI, Rutvij H. Secure routing in mobile Ad hoc networks: A predictive approach. International Journal of
Information Technology, 2019, vol. 11, no 2, p. 345-356.
[19] SHAMAEE, Mahsa Soheil, SHIRI, Mohammad Ebrahim, et SABAEI, Masoud. A smart proactive routing protocol in cognitive radio networks.
International Journal of Ad Hoc and Ubiquitous Computing, 2019, vol. 31, no 2, p. 83-102.
[20] RANI, Sudesh et ASERI, Trilok C. Randomized Link Repair Reactive Routing Protocol for Vehicular Ad Hoc Network. International Journal
of Sensors Wireless Communications and Control, 2019, vol. 9, no 1, p. 64-79.
[21] SINHA, Sumana, SAHA, Snehanshu, et MISHRA, Sudeepta. COR-HR: an efficient hybrid routing approach using coefficient of restitution in
MANET. In : Proceedings of the 20th International Conference on Distributed Computing and Networking. ACM, 2019. p. 455-459.
[22] HAMZAH, Abdulmughni, SHURMAN, Mohammad, AL-JARRAH, Omar, et al. Energy-Efficient Fuzzy-Logic-Based Clustering Technique
for Hierarchical Routing Protocols in Wireless Sensor Networks. Sensors, 2019, vol. 19, no 3, p. 561.
[23] ZAIMI, Imane, BOUSHABA, Abdelali, HOUSSAINI, Zineb Squalli, et al. A fuzzy geographical routing approach to support real-time multi-
media transmission for vehicular ad hoc networks. Wireless Networks, 2019, vol. 25, no 3, p. 1289-1311.

You might also like