Abstract
The collection of information is one of the most crucial processes in many internet-enabled applications for multiple mix-zones over road networks. It is essential to use road networks for prolonged time duration in an energy efficient manner. However, network life time increases in response of reducing the stability period (i.e. time required before first node dies).The stability period reduces due to the high energy variance of nodes. In this paper, we present a protocol named as clustering based energy efficient and communication protocol (CEECP) for multiple mix-zones over road networks, which is proposed to reduce the loop holes of prevailing clustering protocols. Additionally, we present a novel CEECP for chain scenario to connect with the road side units for gaining benefits of V2V as well as, V2I communication for Cooperative Traffic Information Systems. The stability period is responsible to preserve coverage properties of the network. It analysis that as the stability period increases, the trustworthiness of the network increases. Hence, it is indispensable to articulate a clustering protocol that shall be energy efficient, low energy variant and of high stability. It has been proved that our scheme outperforms SEECP and VBN as well as, includes its variants with respect to stability period and energy variance.
Similar content being viewed by others
References
Bali, R. S., & Kumar, N. (2016). Secure clustering for efficient data dissemination in vehicular cyber–physical systems. Future Generation Computer Systems, 56, 476–492.
Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82, 1585–1600.
Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508. doi:10.1007/s11277-015-2699-1.
Tarhani, M., Kavian, Y. S., & Siavoshi, S. (2014). SEECH: Scalable energy efficient clustering hierarchy protocol in wireless sensor networks. IEEE Sensors Journal, 14(11), 3944–3954. doi:10.1109/JSEN.2014.2358567.
Cuomo, F., Rubin, I., Baiocchi, A., & Salvo, P. (2014). Enhanced VANET broadcast throughput capacity via a dynamic backbone architecture. Ad Hoc Networks, 21, 42–59.
Gustav, Y. H., Wang, Y., Kamenyi, D. M., Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) (pp. 433–436). doi:10.1109/ICCPS.2013.6893578.
Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys.
Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacy grid. In WWW.
Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In ICDCS.
Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). PRIVE: Anonymous location-based queries in distributed mobile systems. In WWW.
Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web,. doi:10.1007/s11280-016-0403-3.
Memon, M. H., Li, J.-P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: Multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications,. doi:10.1007/s11042-016-3834-z.
Hassanabadi, B., Shea, C., Zhang, L., & Valaee, S. (2014). Clustering in vehicular ad hoc net-works using affinity propagation. Ad Hoc Networks, Part B, 13, 535–548.
Rajini Girinath, S. S. D. (2013). A novel hierarchical model for vehicular traffic regulation. Telecommunication Systems, 52, 2101–2114.
Memon, I. (2016). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191. doi:10.1007/s11277-015-2833-0.
Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications: An International Journal, 80(4), 1347–1362. doi:10.1007/s11277-014-2082-7.
Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC).Wireless Personal Communications, 79(1), 661–686. doi:10.1007/s11277-014-1879-8.
Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96. doi:10.1007/s11277-014-1996-4.
Kamenyi, D. M., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.
Memon, I., Jamro, D. A., Mangi, A. F., Memon, M. H., & Basit, M. A. (2013). Source localization wireless sensor network using time difference of arrivals. International Journal of Scientific and Engineering Research, 4(7), 1046–1054.
Kamenyi, D., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. (2013). Preserving users’ privacy for continuous query services in road networks. In 2013 the 6th IEEE international conference on information management, innovation management and industrial engineering (ICIII2013) Xi’an, China (pp. 352–355).
Gustav, Y. H., Wang, Y., Domenic, M. K., Zhang, F., & Memon, I. (2013). Direction and velocity similarity anonymization in continuous query location based services. In 4th international conference on computational problem-solving (ICCP 2013) (pp. 433–436). Jiuzhai, China. doi:10.1109/ICCPS.2013.6893578.
Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006). Preserving user location privacy in mobile data management infrastructures. In Proceeding of the 6th workshop on privacy enhancing technologies (PETs) (pp. 393–412).
Barkhuus, L., & Dey, A. (2003). Location-based services for mobile telephony: A study of users’ privacy concerns. In Proceeding of the 9th IFIP TC13 international conference on human–computer interaction (INTERACT).
Dahl, M., Delaune, S., & Steel, G. (2010). Formal analysis of privacy for vehicular mix-zones. In Proceeding of the 15th European conference on research in computer security (ESORICS) (pp. 55–70).
Wang, T., & Liu, L. (2009). Privacy-aware mobile services over road networks. Proceedings VLDB Endowment, 2(1), 1042–1053.
Dahl, M., Delaune, S., & Steel, G. (2010). Formal analysis of privacy for vehicular mix-zones. In Proceedings of the 15th European conference on research in computer security (ESORICS’10) (pp. 55–70).
Simulation of urban mobility (SUMO). http://sumo.sourceforge.net.
U.S. Census Bureau.TIGER, TIGER/Line and TIGER-related products. http://www.census.gov/geo/www/tiger/.
U.S. Geological Survey. http://www.usgs.gov.
Acknowledgements
This research has been funded by The National High Technology Research and Development Program of China (Nos. 2014AA123103, 2015AA124103) and National Natural Science Foundation of China (Nos. 61401040, 61372110).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Arain, Q.A., Uqaili, M.A., Deng, Z. et al. Clustering Based Energy Efficient and Communication Protocol for Multiple Mix-Zones Over Road Networks. Wireless Pers Commun 95, 411–428 (2017). https://doi.org/10.1007/s11277-016-3900-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3900-x