Unity in Togetherness: A Review on Clustering Algorithms in Vehicular Ad-Hoc Networks

被引:2
|
作者
Kaur, Arshdeep [1 ]
Sindhwani, Manoj [1 ]
Arora, Sandeep Kumar [1 ]
机构
[1] Lovely Profess Univ, Sch Elect & Elect Engn, Phagwara, India
关键词
Vehicular ad-hoc networks (VANET); clustering; cluster head; clustering algorithm;
D O I
10.1109/ICICS.2018.00033
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a novel review of various clustering algorithms used in the vehicular ad hoc networks (VANET). VANET is an emerging technology sharing a plethora of applications providing safety and contentment to the vehicle users. It is a vital part of Intelligent Transport Systems (ITS) which provides coherent and well organized communication between the vehicles like sending warning messages to avoid the accidents and fatal conditions. Peculiar traffic conditions and the dynamic topology of the network can be challenging for the timely delivery of the messages. Though VANETs presents a unique range of challenges for routing, on the other hand it equally presents solutions via clustering algorithms. Clustering can be useful in maintaining the stability and reliability of an ad-hoc network that results in performance enhancement. Clustering is basically a key technology in VANET that outperform the MANET clustering algorithms like 0lowest ID algorithm, maximum degree algorithm etc. that does not perform well on the pitch of VANET. Adding to the merit of vehicular ad-hoc networks, they have a good hand in accident avoidance, congestion detection, information dissemination etc. This paper is a reviewed comparative study of various clustering algorithms researched in recent years hence making it an easy task to examine the best algorithm for clustering in a particular situation.
引用
收藏
页码:106 / 114
页数:9
相关论文
共 50 条
  • [1] A Survey on Clustering Algorithms for Vehicular Ad-Hoc Networks
    Vodopivec, Samo
    Bester, Janez
    Kos, Andrej
    [J]. 2012 35TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2012, : 52 - 56
  • [2] Traffic Model for Clustering Algorithms in Vehicular Ad-Hoc Networks
    Fan, Peng
    Haran, James
    Dillenburg, John
    Nelson, Peter C.
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 168 - 172
  • [3] Implementation of Clustering Metrics in Vehicular Ad-Hoc Networks
    Touil, Abdelali
    Ghadi, Fattehallah
    [J]. EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 441 - 449
  • [4] An Efficient Clustering Scheme in Vehicular Ad-Hoc Networks
    Kannekanti, Sudev Yaswanth
    Nunna, Gowri S. P.
    Bobba, Viswanath Koranjan Reddy
    Yadama, Anirudh Kumar
    Elleithy, Abdelrahman
    [J]. 2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 282 - 287
  • [5] Density Based Clustering algorithm for Vehicular Ad-Hoc Networks
    Kuklinski, Slawomir
    Wolny, Grzegorz
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2009, 4 (03) : 149 - 157
  • [6] Flag-Based Vehicular Clustering Scheme for Vehicular Ad-Hoc Networks
    Samann, Fady
    Askar, Shavan
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (03): : 2715 - 2734
  • [7] A Review of Security Aspects in Vehicular Ad-Hoc Networks
    Talavera, Edgar
    Diaz Alvarez, Alberto
    Naranjo, Jose E.
    [J]. IEEE ACCESS, 2019, 7 : 41981 - 41988
  • [8] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    [J]. ELECTRONICS, 2021, 10 (04)
  • [9] Localization in Vehicular Ad-Hoc Networks
    Benslimane, A
    [J]. 2005 SYSTEMS COMMUNICATIONS, PROCEEDINGS: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, : 19 - 25
  • [10] SECURING VEHICULAR AD-HOC NETWORKS
    Caballero-Gil, P.
    Hernandez-Goya, C.
    Fuster-Sabater, A.
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2009, 1 (01): : 25 - 35