Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Clustering Based Energy Efficient and Communication Protocol for Multiple Mix-Zones Over Road Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The collection of information is one of the most crucial processes in many internet-enabled applications for multiple mix-zones over road networks. It is essential to use road networks for prolonged time duration in an energy efficient manner. However, network life time increases in response of reducing the stability period (i.e. time required before first node dies).The stability period reduces due to the high energy variance of nodes. In this paper, we present a protocol named as clustering based energy efficient and communication protocol (CEECP) for multiple mix-zones over road networks, which is proposed to reduce the loop holes of prevailing clustering protocols. Additionally, we present a novel CEECP for chain scenario to connect with the road side units for gaining benefits of V2V as well as, V2I communication for Cooperative Traffic Information Systems. The stability period is responsible to preserve coverage properties of the network. It analysis that as the stability period increases, the trustworthiness of the network increases. Hence, it is indispensable to articulate a clustering protocol that shall be energy efficient, low energy variant and of high stability. It has been proved that our scheme outperforms SEECP and VBN as well as, includes its variants with respect to stability period and energy variance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bali, R. S., & Kumar, N. (2016). Secure clustering for efficient data dissemination in vehicular cyber–physical systems. Future Generation Computer Systems, 56, 476–492.

    Article  Google Scholar 

  2. Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82, 1585–1600.

    Article  Google Scholar 

  3. Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508. doi:10.1007/s11277-015-2699-1.

    Article  Google Scholar 

  4. Tarhani, M., Kavian, Y. S., & Siavoshi, S. (2014). SEECH: Scalable energy efficient clustering hierarchy protocol in wireless sensor networks. IEEE Sensors Journal, 14(11), 3944–3954. doi:10.1109/JSEN.2014.2358567.

    Article  Google Scholar 

  5. Cuomo, F., Rubin, I., Baiocchi, A., & Salvo, P. (2014). Enhanced VANET broadcast throughput capacity via a dynamic backbone architecture. Ad Hoc Networks, 21, 42–59.

    Article  Google Scholar 

  6. Gustav, Y. H., Wang, Y., Kamenyi, D. M., Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) (pp. 433–436). doi:10.1109/ICCPS.2013.6893578.

  7. Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys.

  8. Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacy grid. In WWW.

  9. Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In ICDCS.

  10. Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). PRIVE: Anonymous location-based queries in distributed mobile systems. In WWW.

  11. Memon, I., & Arain, Q. A. (2016). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web,. doi:10.1007/s11280-016-0403-3.

    Google Scholar 

  12. Memon, M. H., Li, J.-P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: Multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications,. doi:10.1007/s11042-016-3834-z.

    Google Scholar 

  13. Hassanabadi, B., Shea, C., Zhang, L., & Valaee, S. (2014). Clustering in vehicular ad hoc net-works using affinity propagation. Ad Hoc Networks, Part B, 13, 535–548.

    Article  Google Scholar 

  14. Rajini Girinath, S. S. D. (2013). A novel hierarchical model for vehicular traffic regulation. Telecommunication Systems, 52, 2101–2114.

    Article  Google Scholar 

  15. Memon, I. (2016). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191. doi:10.1007/s11277-015-2833-0.

    Article  Google Scholar 

  16. Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications: An International Journal, 80(4), 1347–1362. doi:10.1007/s11277-014-2082-7.

    Article  Google Scholar 

  17. Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC).Wireless Personal Communications, 79(1), 661–686. doi:10.1007/s11277-014-1879-8.

    Article  Google Scholar 

  18. Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96. doi:10.1007/s11277-014-1996-4.

    Article  Google Scholar 

  19. Kamenyi, D. M., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.

    Google Scholar 

  20. Memon, I., Jamro, D. A., Mangi, A. F., Memon, M. H., & Basit, M. A. (2013). Source localization wireless sensor network using time difference of arrivals. International Journal of Scientific and Engineering Research, 4(7), 1046–1054.

    Google Scholar 

  21. Kamenyi, D., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. (2013). Preserving users’ privacy for continuous query services in road networks. In 2013 the 6th IEEE international conference on information management, innovation management and industrial engineering (ICIII2013) Xi’an, China (pp. 352–355).

  22. Gustav, Y. H., Wang, Y., Domenic, M. K., Zhang, F., & Memon, I. (2013). Direction and velocity similarity anonymization in continuous query location based services. In 4th international conference on computational problem-solving (ICCP 2013) (pp. 433–436). Jiuzhai, China. doi:10.1109/ICCPS.2013.6893578.

  23. Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006). Preserving user location privacy in mobile data management infrastructures. In Proceeding of the 6th workshop on privacy enhancing technologies (PETs) (pp. 393–412).

  24. Barkhuus, L., & Dey, A. (2003). Location-based services for mobile telephony: A study of users’ privacy concerns. In Proceeding of the 9th IFIP TC13 international conference on human–computer interaction (INTERACT).

  25. Dahl, M., Delaune, S., & Steel, G. (2010). Formal analysis of privacy for vehicular mix-zones. In Proceeding of the 15th European conference on research in computer security (ESORICS) (pp. 55–70).

  26. Wang, T., & Liu, L. (2009). Privacy-aware mobile services over road networks. Proceedings VLDB Endowment, 2(1), 1042–1053.

    Article  Google Scholar 

  27. Dahl, M., Delaune, S., & Steel, G. (2010). Formal analysis of privacy for vehicular mix-zones. In Proceedings of the 15th European conference on research in computer security (ESORICS’10) (pp. 55–70).

  28. Simulation of urban mobility (SUMO). http://sumo.sourceforge.net.

  29. U.S. Census Bureau.TIGER, TIGER/Line and TIGER-related products. http://www.census.gov/geo/www/tiger/.

  30. U.S. Geological Survey. http://www.usgs.gov.

Download references

Acknowledgements

This research has been funded by The National High Technology Research and Development Program of China (Nos. 2014AA123103, 2015AA124103) and National Natural Science Foundation of China (Nos. 61401040, 61372110).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qasim Ali Arain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arain, Q.A., Uqaili, M.A., Deng, Z. et al. Clustering Based Energy Efficient and Communication Protocol for Multiple Mix-Zones Over Road Networks. Wireless Pers Commun 95, 411–428 (2017). https://doi.org/10.1007/s11277-016-3900-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3900-x

Keywords

Navigation