A deep comprehensive research architecture, characteristics, challenges, issues, and benefits of routing protocol for vehicular ad-hoc networks

N Hussain, P Rani, N Kumar… - International Journal of …, 2022 - igi-global.com
VANETs or vehicular ad hoc networks are essential & promising research areas in the ad
hoc networks field. The core objective to set up VANET can upgrade road safety & diminish …

Attack resilient and efficient protocol based on greedy perimeter coordinator routing—mobility awareness for preventing the attack in the VANET

N Hussain, P Maheshwary, PK Shukla… - Wireless Personal …, 2022 - Springer
Abstract A Greedy Perimeter Coordinator Routing and Mobility Awareness (GPCR-MA)
vehicular routing is a widely accepted routing protocol for VANET (Vehicular Ad hoc …

Mobility-aware GPCR-MA for vehicular ad hoc routing protocol for highways scenario

N Hussain, P Maheshwary, PK Shukla… - International Journal of …, 2018 - igi-global.com
Vehicular ad hoc network systems are highly important experiments because of
enthusiastically exchanging information and symmetric relations of systems. The best …

Manhattan & RPGM parameters based mobility aware GPCR-MA routing protocol for highway scenario in VANET

N Hussain, P Maheshwary, PK Shukla… - Proceedings of Recent …, 2019 - papers.ssrn.com
A high experiment scenario can be seen in Vehicular Ad-hoc Network (VANET) systems due
to rhapsodic exchange of information and coherent system relation. The ace transmitting …

[PDF][PDF] GPCR MA: An Adaptive Approach Over GPCR For Vehicular Ad-hoc Network

N Hussain, P Maheshwary, PK Shukla… - International Journal of …, 2017 - academia.edu
The term VANET developed regularly synonymous with additional broad term IVC (inter-
vehicle communication), while the focus on remains feature of spontaneous networking …

[PDF][PDF] Detection of Sybil attack in vehicular network based on GPCR-MA routing protocol

N Hussain, P Shukla, A Singh - J. Curr. Sci, 2019 - researchgate.net
Because of the cumulative number of attacks in the networks, equipping the network with an
IDS (intrusion detection system). The capability of the networks should be deal enough to …