Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

Contents lists available at SciVerse ScienceDirect

Journal of Network and Computer Applications


journal homepage: www.elsevier.com/locate/jnca

Review

Information management in vehicular ad hoc networks: A review


M.S. Kakkasageri a,n, S.S. Manvi b
a
Department of Electronics and Communication Engineering, Basaveshwar Engineering College, Bagalkot 587102, India
b
Department of Electronics and Communication Engineering, Reva Institute of Technology and Management, Bangalore 560064, India

art ic l e i nf o a b s t r a c t

Article history: Vehicular Ad Hoc Network (VANET) is a highly mobile self-organizing network based on Vehicle-to-
Received 22 December 2012 Vehicle (V2V), Vehicle-to-Infrastructure (V2I) and hybrid architecture. Recently VANETs have gained a lot
Received in revised form of attention by industry and academia due to wide range of applications including safety, convenience,
18 April 2013
commerce, entertainment and infotainment. Information management requires technologies and
Accepted 16 May 2013
techniques for communication, fault tolerance, storage, coding, multi-modal interactions, gathering,
aggregation, validation, dissemination, etc. In VANETs, information can be classified into safety and non-
Keywords: safety information. Driver or vehicle safety information is required in applications offering intelligent
VANETs transport services like identification of road bends, traffic congestion, accident spots, collision warning,
Information gathering
environmental conditions, approaching vehicles, etc. The major concerns in safety applications are
Information aggregation
reliability, security, trust, real time delivery, and latency. This paper brings out current research efforts on
Information validation
Information dissemination information management techniques employed for safety related applications in VANETs, which includes
gathering, aggregation, validation and dissemination, and also provide directions for future research and
development.
& 2013 Elsevier Ltd. All rights reserved.

Contents

1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Information management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Information gathering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.1. On-board devices/sensor based gathering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.2. Routing protocols based gathering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.3. Pull based gathering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.4. Other gathering mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.5. Open research problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4. Information aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.1. Centralized aggregation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2. Fully distributed aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.3. Group/Cluster based aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.4. Hierarchical based aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.5. Other aggregation mechanisms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.6. Open research problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
5. Information validation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.1. Authentication based validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.2. Threshold based validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.3. Other validation mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.4. Open research problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
6. Information dissemination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
6.1. Forwarding based dissemination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

n
Corresponding author. Tel.: +91 9880 7659 60.
E-mail addresses: mahabalesh_sk@yahoo.co.in (M.S. Kakkasageri),
sunil.manvi@revainstitution.org (S.S. Manvi).

1084-8045/$ - see front matter & 2013 Elsevier Ltd. All rights reserved.
http://dx.doi.org/10.1016/j.jnca.2013.05.015

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
2 M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

6.2. Broadcasting based dissemination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12


6.3. Push based dissemination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
6.4. Routing protocols based dissemination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
6.5. Other dissemination mechanisms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
6.6. Open research problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
7. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

1. Introduction
calling, establish a trip history model to predict vehicle movement,
Vehicular Ad hoc Network (VANET) is a class of Mobile Ad Hoc and develop typical query dissemination scheme to match the
Network (MANET) and a component of Intelligent Transportation target vehicle. With a realistic travel survey and simulation, the
work proves that vehicle calling is effective and efficient in casual
Systems (ITS) (Li and Wang, 2007; Hartenstein and Laberteaux,
carpooling and taxi calling.
2008; Boukerche et al., 2008; Rybicki et al., 2007). Some of the
Now, we will briefly present evolution of VANET concept and
unique characteristics of VANET like geographically constrained
technology. Initially, Inter-Vehicle Communication (IVC) was
topology, unpredictable mobility and vehicle density, varying
started by JSK (Association of Electronic Technology for Automo-
channel capacity, etc., constitute VANET as a distinct research field
bile Traffic and Driving) of Japan in the early 1980s (Luo and
in MANETs (Manvi and Kakkasageri, 2010, 2008; Yu and Xu, 2010).
Hubaux, 2008). Later, California Partners for Advanced Transporta-
These characteristics pose several challenges with respect to
tion TecHnology (PATH) (Hedrick et al., 1994) and Chauffeur of
media access, physical communication, coding, routing, congestion Europe (Gehring and Fritz, 1997) have also demonstrated the
control, fault tolerance, multi-modal interactions, end-to-end data technique of coupling two or more vehicles together electronically
transport, security, privacy, simulation and implementation plat- to form a train. In Europe, the International Organization for
forms, safety information management, etc. (Pigne et al., 2010; Standardization (ISO) set up Technical Committee (TC) to develop
Barberis et al., 2011; Schmidt et al., 2011; Wang et al., 2008; Manvi a framework for ITS including VANET standards from Institute of
et al., 2008a,b,c,d; Studer et al., 2007; Wu et al., 2010; de Fuentes Electrical and Electronics Engineers (IEEE), European Telecommu-
et al., 2009; Marmol and Perez, 2012; Leinmuller et al.; Ribagorda; nications Standards Institute (ETSI), European Committee for
Stampoulis and Chai; Schoch et al., 2008; Toor et al., 2008). This Standardization and the Society of Automotive Engineers (SAE)
paper focuses on some of the information management techni- (Booysen, 2011). European project CarTALK 2000 (Reichardt et al.,
ques, which is a pressing issue since VANETs have basically 2002) is investigating problems related to the safe and comfor-
evolved to provide safety measures and intelligent information table driving based on inter-vehicle communications. Several
to drivers, public and passengers. major automobile manufacturers have already begun to invest in
Information management can be discussed considering three inter-vehicle networks. Audi, BMW, Daimler Chrysler, Fiat, Renault
primary architectures for vehicular communication in VANETs: and Volkswagen have united to create a non-profit organization
Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and called Car to Car Communication Consortium (C2CCC) which is
hybrid architecture (Motsinger and Hubing). Recently, Vehicle- dedicated to the objective of further increasing road traffic safety
to-Passenger/Pedestrian communication (V2P) is being discussed, and efficiency by means of inter-vehicle communications. IEEE
which can be possible fourth architecture. These architectures are also formed the IEEE 802.11p task group and standard 1609 which
depicted in Fig. 1. Each architecture is explained as follows. focuses on providing Wireless Access for Vehicular Environment
V2V communication is an important component of the ITS. It (WAVE) (IEEE Standards Association; Rabadi, 2010; Wang, 2009).
enables the vehicle to communicate with other vehicles. Vehicles The simTDResearch Project aims at safe and intelligent mobility
may be located out of the range of line of sight (LOS) or even out of through researching and testing car-to-x communication and its
the radio range if a multi-hop network is built among several applications. Car-to-x communication is exchange of information
vehicles. V2V communication scenario is shown in Fig. 1(a). V2I between vehicles and between vehicles and the infrastructure. In
communication is the wireless exchange of information or data simTD realistic traffic scenarios are addressed in a large-scale test
between vehicles and highway/roadside infrastructure, intended field infrastructure around the Hessian city of Frankfurt. SCOREF
primarily to enable a wide range of safety, mobility, and environ- Project improves traffic flow and road safety by democratizing the
mental benefits. Communication architecture for V2I is depicted in use of communications technology infrastructure/vehicle and
Fig. 1(b). The vision of V2I communication is that a minimum level vehicle/vehicle. DRIVing Implementation and Evaluation of C2X
of infrastructure will be deployed to provide the maximum level of Communication (DriveC2X) (DRIVing Implementation and
safety applications (Kone et al., 2010). Hybrid architecture inte- Evaluation of C2X Communication) technology in Europe carry
grates both V2V and V2I communication architectures (Karim). out the comprehensive assessment of cooperative systems. The
Hybrid VANET communication architecture scenario is given in functions to be tested and evaluated on several European test sites
Fig. 1(c). for cooperative systems are related to traffic flow, traffic manage-
Vehicle-to-Passenger communication (V2P) allows direct, ment, local danger alert, driving assistance, Internet access and
instant, and flexible communication between moving vehicles local information services.
and roadside passengers (Liu et al., 2010). With pocket wireless In December 2003, the US Federal Communication Commission
devices, passengers can easily join VANETs as roadside nodes, and (FCC) approved 75 MHz of spectrum for Dedicated Short Range
express their travel demands, e.g., taking a free ride or calling a Communications (DSRC) and the resulting DSRC system is
taxi via radio queries over VANETs (as shown in Fig. 1(d)). Once a expected to be the first wide-scale vehicular network in North
matched vehicle is found through the disseminated queries, the America (Rizvi et al., 2007; Laurendeau and Barbeau; Lerchbaumer
driver can decide whether to provide corresponding services, et al.). DSRC was conceived to provide architecture for nodes
especially the carrying of passengers and goods. The research within a vehicular network to communicate with each other and
work presents detailed investigation of challenges like vehicle with the infrastructure (Ye et al., 2011). In DSRC, subsequently

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 3

RSU Passengers
RSU

RSU

RSU
Road Side Unit (RSU) Pedestrian
RSU

Fig. 1. VANET architectures.

specialized as WAVE (also referred as IEEE 802.11p), (Global Table 1


Positioning System) GPS-enabled vehicles are equipped with on Overview of safety application services in VANETs.
board units, which can communicate with each other to propagate
Safety application Application examples
information through V2V communications (Schmidt et al., 2010;
services
Qadri et al.).
The rest of the paper is organized as follows. We discuss Driver services Curve speed warning, low bridge warning,
information management for VANETs in Section 2. Information obstacle indication, vehicle-based road
gathering, aggregation, validation and dissemination mechanisms condition warning, infrastructure-based road
condition warning, visibility enhancer,
are presented in Sections 3,4,5,6 respectively. We conclude our
work zone warning, wrong way driver warning,
discussions in Section 7. blind spot warning, lane change warning,
intersection collision warning,
forward/rear collision warning,
rail collision warning, warning about
2. Information management
pedestrians crossing, blind merge warning,
pre-crash sensing, breakdown warning,
In this section, we discuss the concept and need of information highway merge assistant, left turn assistant,
management especially safety information management. Auto cooperative glare reduction, in-vehicle signage
safety has evolved from basic seat belts and lighting to high-tech Passenger services Post-crash warning, calling a taxi,
safety features that can help drivers avoid accidents altogether. emergency break warning, enhanced
Safe and secure transportation, where any one can move comfor- route guidance and navigation, map
download/update, parking spot locater
tably and freely is the requisite for facilitating safety information
service, cooperative adaptive cruise
in VANETs. Safety is a top priority for drivers and passengers. A control, adaptive drivetrain management
safe vehicle is obviously a necessity to keep the people inside safe.
Information services Notification of crash or road
Drivers, passengers and pedestrians safety are major challenges for
surface conditions to a traffic
automotive industry and governments in many countries. Increas- operation center, intelligent traffic flow
ing accidents on the road is a major reason to take safety very control, warning about violated
seriously. Safety information in VANETs is precisely associated traffic lights or stop signals
with time and geographical area where the information transfer Public services Electronic license plate, electronic brake lights
occurs. Hence safety information must be kept ‘sparkling’ (Zhu electronic drivers license, vehicle safety
et al., 2011; Sichitiu and Kihl, 2008; Andrisano et al., 2000; Pereira inspection,
stolen vehicles tracking, approaching
et al., 1999).
emergency vehicle warning, emergency vehicle
Classification of VANET safety application services in VANETs signal preemption, emergency vehicle at scene
with some examples is as shown in Table 1. Driver services are warning
considered as the typical and most desirable group of applications
for VANETs with direct impact on road safety. Passenger services
can be enhanced by using road assistance and warning informa- The information received from other vehicles must be reliable,
tion (Hafeez et al., 2010; Li et al., 2009). Information services authenticated and current. Hence the information needs to be
category contains applications that try to improve or simplify constantly verified and validated. Aggregated and validated safety
driving by means of communication. VANETs are also intended to information is propagated/disseminated to vehicles. Figure 2
support the work of public services such as police or emergency depicts a complete taxonomy of safety information management
recovery units. mechanisms to be discussed in this paper. To the best of our
In fact, the major design goal of VANETs is to enhance driving knowledge, we have listed and provided an overview of gathering,
safety and decrease traffic accidents (Zhang et al., 2008a,b; Killat). aggregation, validation and dissemination mechanisms proposed so
Very essential components of safety information management are far. The mechanisms are briefly explained in further sections.
gathering, aggregation, trust and security, validation and dissemi-
nation (Tamer et al., 2009; Bako and Weber; Paruchuri and
Durresi, 2005; Tsai et al., 2009). Now a day vehicles are equipped 3. Information gathering
with one or more communication or computation devices that are
capable of information gathering such as vehicle position and To provide drivers with useful information, accessing data in
speed, traffic density, accident occurrence, road conditions, etc. vehicular networks has become a major issue. Vehicles use
The information from nearby vehicles as well as from far-away different kind of sensing devices to gather information about the
vehicles received are to be aggregated in order to eliminate redun- driver's environment (speed, acceleration, temperature, seats
dant and duplicate data. This facilitates reduction of required amount occupations, etc.) in order to provide a safer, more efficient and
of information to be processed and also bandwidth consumption. more comfortable driving experience (Nekovee, 2005). Recent

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
4 M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

Mechanisms Methods Current Approaches

On−board devices/sensors based DGPS, MDC, EEBL


Gathering Routing protocols based RBVT, GeoVANET, XORi
Pull based Mutli agent system model
Others IP passing, CGP
Information management mechanisms in VANET

Centralized SLMA, VESPA, Structure−free


Fully distributed OLAP, Catch−Up

Aggregation Group/Cluster based CSP, CASCADE, RLSMP, BDI based,


Hierarchical based Probabilistic, Domain specific, ARIMA,
Others Syntactic, Semantic, SVD, In−network,
Message filtering model, AEMA,

Authentication based FastAuth, SelAuth, PoR, Pseudonym based,


AutoCore, RAISE
Validation Threshold based
Score based, TAA
Others Reliable reputation based,
Data cache based, NEMO

Forwarding based PCF, ICF, Utility driven, ATB


Broadcast based PACKs, Probabilistic, AutoNomos, CORNER
Dissemination Push based CVIS, BDI based
Routing protocols based Position based, MobEyes, SLOPE, LDW
Others LUD, FPAV, Multi agent system based,
Trust based
Fig. 2. Taxonomy of VANET information management mechanisms.

vehicles are equipped with sensors, GPS, navigation devices, sensed are sent to the server (Taleb and Benslimane, 2010). A
Personal Digital Assistant (PDA), etc. This enables to gather challenging issue in this context is that if significant number of
information from the environment in order to provide a safer, vehicles upload their GPS data points at the same time, wireless
more efficient and comfortable driving experience. network cannot offer enough network resources for simultaneous
To provide information for drivers and passengers, gathering network connections.
process is a major issue. Efficient information gathering mechan- Critical or safety VANET applications demand high position
ism should exhibit the following characteristics: (1) Information accuracy of vehicles. Radio-frequency identification (RFID)-
gathering process must not interfere with the network, e.g., assisted accurate localization system makes use of Differential
drivers and passengers should not be asked to initiate/gather the Global Positioning System (DGPS) concept to improve GPS accu-
data. (2) Heterogeneous mobility patterns of vehicles must be racy (Leea et al., 2012). In RFID assisted system, a vehicle obtains
considered. (3) Routing of safety information in a highly dynamic two types data for localization: GPS coordinate from GPS receiver,
network where the nodes move very quickly. (4) Usually safety and physical position via RFID communication. Then, it computes
information are not addressed to a particular destination. (5) Infor- GPS error and shares it with neighbors to help them correct
mation must rely on accurate and latest information of the inaccurate GPS coordinates.
surrounding environment. (6) After certain distance and/or time, A framework called as Model-based Data Collection (MDC) to
information becomes irrelevant. (7) Information gathering algo- reduce the amount of data transmission and the number of
rithms must be fault tolerant. (8) Efficient information gathering vehicles reporting their GPS data points is proposed in Hung and
algorithms without disruptions, even if some vehicles are Peng (2010). The MDC framework is executed at the server and
disconnected. vehicle side collaboratively. In the vehicle side, given a series of
In the following sections, we discuss some of the research GPS data points, model functions are derived to represent the raw
works and open research issues that need to be addressed. GPS data points. Each vehicle reports some coefficients that
describe its movements instead of reporting all position informa-
3.1. On-board devices/sensor based gathering tion. Vehicles move along with road segments that are usually a
set of line segments. Liner Regression (LR) algorithm is used to
Traffic data collection platforms with servers exist to collect determine a set of line functions to represent movements of
GPS data points of vehicles for traffic monitoring. In traffic data vehicles. By observing the spatial-temporal locality in traffic data,
collection platforms, each vehicle is equipped with GPS modules Kernel Regression (KR) algorithm is developed to derive a set of
and the wireless communication interfaces, and the GPS data kernel functions to model a series of speed readings. With the

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 5

spatial-temporal locality feature in traffic data, an in-network process to accommodate the specific dynamic nature of VANETs
aggregation mechanism are proposed to determine a set of groups topology.
and for each group, only one vehicle needs to report traffic data, A method to autonomously and cooperatively collect traffic jam
thereby further reducing the number of simultaneous connections. statistics to estimate arrival time to destination for each vehicle by
An emergency vehicle path clearing technique and the method using inter-vehicle communication is proposed in Shibata et al..
for getting real-time resource information are proposed in Rashid Optimal next-hop selection in a route between two vehicles on a
et al. (2007). Emergency Electronic Brake Lights (EEBL) safety highway scenario is proposed to enhance the route lifetime
application sends warning messages in case of an emergency (Kumar et al., 2006). In Johnson et al. (2006), problem of low-
brake (Segata and Cigno). The EEBL application is integrated latency content distribution (multicast streaming) to a dense
within a Collaborative Adaptive Cruise Control (CACC) which uses vehicular highway network from roadside info-stations using
network-provided information to automatically brake the car if efficient multi-hop V2V collaboration is explained.
the driver does not react to the warning. Moreover, an information
aggregation scheme is proposed to analyze the benefits of re- 3.3. Pull based gathering
propagation together with the consequent increase of network
load. This protocol is compared to a protocol without re- Pull mechanisms allow users to send queries to a set of cars in
propagation and to a rebroadcast protocol. order to find the desired information. Safety information gathering
The requirements for an efficient Wireless Sensor Network based on a pull strategy is discussed in Kakkasageri and Manvi
(WSN) architecture for gathering information in Intelligent Vehi- (2009). Multi agent system model is developed to pull the required
cular Systems (IVSs) are discussed in Mouftah et al.. Hybrid Sensor safety information from other vehicles in VANET. The crucial
and Vehicular Network (HSVN) allows Wireless Sensor Networks challenge in pull strategy is to route the information towards the
(WSNs) and VANETs to cooperate for providing road safety (Tripp requested vehicles in an aggressive VANET environment where the
et al., 2012). vehicles may move very quickly.
A driver warning system in which damaged vehicles send
3.2. Routing protocols based gathering warning messages, and the rest of the vehicles make diffusion of
the warning messages is presented in Martinez et al.. Diffusion of
Road-Based protocols using Vehicular Traffic information rout- warning messages sent by damaged vehicles is done in order to
ing (RBVT) are presented for city-based VANET in Nzouonta et al. inform the rest of vehicles in a scenario that uses 802.11p-based
(2009). RBVT protocols, i.e., a reactive protocol (RBVT-R) and a VANETs. The main objective is to send vehicle safety messages
proactive protocol (RBVT-P) create road-based paths consisting of with high reliability and low delay. A sensibility study is per-
successions of road intersections that have high probability and formed in this work to evaluate the impact of variation in the
network connectivity among the vehicles for real-time vehicular existing advertisement system of vehicles.
traffic information. Geographical forwarding is used to transfer
packets between intersections on the path. This mechanism 3.4. Other gathering mechanisms
reduces the path's sensitivity to individual node movements. In
dense networks where the contention is maximum, the forward- In VANETs, usually vehicles have short connections to the
ing mechanism is optimized using a distributed receiver-based Internet using wireless access points (AP). Major part of the
election of next hops. This is based on a multi-criteria prioritiza- connection time is required for acquiring an Internet Protocol
tion function taking into account non-uniform radio propagation. (IP) address via Dynamic Host Configuration Protocol (DHCP). IP
RBVT-R and RBVT-P protocols are compared with the protocols passing protocol can be used to reduce the overhead of obtaining
of MANETs like Ad hoc On-Demand Distance Vector (AODV), an IP address (Arnold et al., 2008). In IP passing protocol, a
Optimized Link State Routing Protocol (OLSR), Greedy Perimeter vehicle's usable connection time is increased by reducing IP
Stateless Routing (GPSR) and a protocol for VANETs, i.e., Geo- acquisition time and overhead.
graphic Source Routing (GSR). Performance of these protocols is Clustered Gathering Protocol (CGP) is a cross-layered protocol
analyzed using two scenarios: an urban environment with obsta- based on hierarchical and geographical data gathering (Salhi
cles and an urban environment without obstacles. The results et al.). CGP gathers data from all nodes in the VANET in order to
show that the RBVT protocols perform better in terms of data offer the following different kind of ITS services: (1) A real-time
delivery and average delay. Considering the performance analysis, traffic information service by gathering all node's positions and
RBVT-R is the better choice when throughput is the main require- velocities. (2) Geographical localization service for customers who
ment and RBVT-P if the VANET applications are delay sensitive. want to follow vehicles mobility (fleet management). (3) A parking
Performance analysis of AODV, DSR, and Swarm intelligence lot's availability service by detecting empty spaces in parking lots.
routing protocols in VANET environment are discussed in Manvi (4) Warning messages in a specific area, when an unusual event
et al. (2008a,b,c,d). GeoVanet, a distributed hash table (DHT) based happens, e.g., a sudden speed decrease of several vehicles. (5) A
geographic routing protocol to ensure the sender of a query can real-time fuel consumption and pollution indicators. (6) surveil-
get a consistent answer is presented in Delot et al. (2011). In lance applications where nodes make videos of the road and
GeoVanet, one driver is allowed to query information shared by detect and save the registration plates of vehicles around.
other vehicles. A query is disseminated in the network in a A model to predict parking lot occupancy based on information
bounded time. After computation on remote vehicles in the exchanged among vehicles is discussed in Caliskan et al. (2007). The
VANET, the results are delivered to the vehicle that issued the dynamics of multi-hop emergency message dissemination in VANETs
query. GeoVanet provides a solution for drivers to gather and is discussed in Resta et al. (2007). A comprehensive analysis of
share data in VANETs. An experimental evaluation of GeoVanet application requirements and difficulties of local danger warning in
shows that up to 80% of the available query results are delivered to VANETs is described in Adler and Strassberger (2006).
the user. Table 2 presents functional summary of above discussed informa-
Performance analysis of XOR-based flat routing protocols in tion gathering mechanisms based on the following criteria: objec-
high mobility conditions, considering VANET formed in a highway tives, characteristics, and assumptions. The performance comparison
scenario is discussed in Oliveira et al. (2011). XORi, an improved of the gathering protocols in terms of quality, priority, success ratio,
version of XOR modifies the protocol's information gathering delay, mobility and response time is given in Table 3.

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
6 M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

Table 2
Summary of gathering protocols.

Protocol Mechanism Architecture N/W Information type


type

Traffic chaos reduction (Paruchuri and Durresi, On board devices/sensor based vehicles V2V Dense Emergency service vehicle
2005) information
EEBL (Tsai et al., 2009) On board devices/sensors based V2V Sparse Emergency brake messages
messages
RBVT (Leea et al., 2012) Routing protocols based V2V Dense Real time vehicular traffic
GeoVanet (Rashid et al., 2007) Routing protocols based V2V Dense Query based safety information
Multiagent model (Manvi et al. 2008a,b,c,d) Pull based V2V Dense Vehicle safety information
Driver Warning System (Delot et al., 2011) Pull based V2V Dense Warning messages
CGP (Shibata et al.) Cross layered and clustered V2V, V2I and Hybrid Dense Traffic density unusual traffic
behavior, etc.

Table 3
Performance of gathering protocols.

Protocol Gathered data Safety information Gathering success Gathering Mobility Query response
quality priority ratio delay consideration time

MDC (Bako and Weber) High Low Medium Low Low Medium
Traffic Chaos Reduction (Paruchuri and Low High High Medium Low Low
Durresi, 2005)
EEBL (Tsai et al., 2009) Medium Low High Low Medium High
RBVT (Leea et al., 2012) Low Medium High High Medium Low
GeoVanet High Medium High High High Low
(Rashid et al., 2007) High Low High Medium High Low
Multiagent model (Delot et al., 2011) Medium High High High Low Low
Driver Warning System (Oliveira et al., 2011) High Low High Medium Low Low
CGP (Shibata et al.) High Medium Low Medium High Low

3.5. Open research problems Routing protocols based gathering: There are some routing pro-
tocols intended for communication between vehicles along with
Information gathering continues to be a strong research area of safety information gathering. VANETs offer unique challenges for
focus by VANET researchers because a significant number of routing combined with gathering because of its inherent character-
messages transmitted in VANETs are safety messages (Zeadally istics like mobility, short link lifetime, etc. The research community
et al., 2012). Novel information gathering algorithms are required has identified many routing strategies for VANETs, but there is a
to address the following specific issues: need to develop the gathering based routing protocols for VANETs.
On-board devices/sensor based gathering: VANET can be estab- Some of the specific open research issues are as follows:
lished by equipping vehicles with onboard devices and sensors.
Unlike traditional wireless networks, VANETs are not subject to  Routing protocols integrating with information gathering
the issues like memory, processing, storage, and energy limita- require accurate geographic information. Hence the collected
tions. But the factors like variation in network density, volume of information should be precise.
generated data and mobility of vehicles make it infeasible to adopt  Along with all routing mechanism issues, routing protocols
traditional wireless network solutions directly. In this regard, should gather geographic information of the vehicles which are
some specific issues that need still better solutions are as follows: close to destination in order to forward data packets and make
efficient communication.
 The onboard devices/sensor information arriving from different  Routing protocols combined with information gathering task
vehicles can be combined in order to eliminate redundancy, have some problems when evaluated for urban scenario,
minimize the number of transmissions, and improve the because the existence of obstacles in the city environments
quality of the onboard devices/sensor information. may interrupt the communication. Hence information gather-
 Onboard devices/sensor should have the protocols with the ing mechanism along with the routing should not be affected
intention of ‘low channel utilization’ to keep the vehicle system by such type of obstacles.
accessible for safety messages.  Prioritization of safety information messages is a major issue in
 Onboard devices/sensor must guarantee for accurate detection routing based gathering. Source vehicle should forward the
of information-type, vehicle location, dangerous road condi- safety information along the shortest path to all the destina-
tions, etc., and maintain reliable communication connectivity tions. Due to the vehicle dynamic mobility factor, the distance
when the network density is low. from a source vehicle to destination vehicle will no longer be
 Sensors deployed at Road Side Units (RSUs) should buffer and the same as that obtained by traditional shortest path routing.
deliver the information to the passing vehicles in a timely  Selection of efficient forwarding vehicles is also a major issue
fashion. for safety information gathering in VANETs. Although involving
 Intelligent on board devices and sensors are needed for all the neighboring vehicles with calculated cost to the destina-
vehicles to support data-oriented queries by assigning certain tion vehicle seems the most effective way, the overhead is
attributes like information-type, vehicle location, etc. This expected. In dense VANETs, this overhead might be higher due
minimizes the processing time of onboard devices and sensors. to repeated transmissions.

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 7

Pull based gathering: Pull based information gathering models should reduce the probability of redundant or duplicate informa-
allow users to send queries to a set of vehicles to find the desired tion. (4) Aggregation process should integrate the information
information. In order to have such query processing scheme, some according to the location of vehicle and time of information
of the challenges need to be addressed are as follows: generated. (5) Aggregation mechanism should be incremental in
nature. (6) Aggregated information should be exchangeable.
 Pull model stands on request-response strategy. For such In the following sections, we discuss some of the research
strategy main challenge to be addressed is routing different works on aggregation and open research issues that still need to
results towards their recipient in VANET where the nodes move be addressed.
very quickly. Push model should ensure that the sender of a
query can get a consistent answer instantaneously, i.e., within a 4.1. Centralized aggregation
bounded time.
 Intelligent searching mechanisms or query languages for quer- In centralized aggregation, a single node aggregates data
ied or interested information among large set of vehicles are centrally (Koubek et al., 2010a,b). This automatically leads to
needed. excessive communication overhead near the central node. some
 It is desired that all the vehicles in VANET need to be smart, i.e., of the approaches for centralized aggregation are as follows. Event
vehicles should be able to understand, route, and process the driven structure-less message aggregation (SLMA) for safety-
queries. relevant VANET applications is presented in Liu and Chigan
 Pulling of safety information in very sparse and in highly dense (2010). SLMA addresses information accuracy by reducing com-
networks is a challenging task. Efficient pull based information munication overhead with limited delay. SLMA uses multiple level
gathering protocol needs the considerations of active vehicles, parallel fusion model to provide high reliability and to eliminate
road scenario, vehicle mobility, etc. These factors have a greater packet exchanges for aggregation structure formation and main-
impact on scalability. tenance. Bayesian fusion algorithm is adopted to effectively
 After receiving a query message, the vehicle must be capable to achieve precise event detection on the road.
check the validation of a query message sent by a vehicle. Along Vehicular Event Sharing with a mobile P2P Architecture
with validation, pull based models critically need the security (VESPA) based data aggregation in VANETs is proposed in Defude
and privacy preservation mechanisms like authentication, data et al. (2008). Basically VESPA is used to process and disseminate
Integrity, anonymity, and availability. any type of event like accidents, emergency braking, available
 Wireless bandwidth availability in VANETs is scarce. Usually parking spaces, etc. VESPA based aggregation scheme focuses on
safety information gathering process based on pull mechanism how to exploit data exchanged among vehicles to produce knowl-
requires high bandwidth. Considering VANET specific con- edge to be used later on by drivers. The solution given in the work,
straints, pull based safety information gathering mechanisms aggregates the data once it becomes obsolete. This method helps
for applications like forward/backward collision warnings, lane the vehicles when no relevant data has been communicated by
change assistance, etc., must be aware of channel utilization. neighboring vehicles.
Because, these kind of applications require frequent gathering, Structure-free aggregation scheme that focuses on flexible
as they have bounded time. decision metrics is proposed in Dietzel et al. (2009). Fuzzy logic
rules are employed to base aggregation decisions on qualitative
4. Information aggregation metrics, such as induced quality loss due to aggregation. It is not
necessary to define aggregate structures like fixed road segments,
The vehicles have to pass on the information sent by the a hierarchy or a group of nodes. Hence the scheme is structure-
neighbors to other neighbors in its coverage area. This increases free. But the aggregation scheme allots more bandwidth to
the number of packets to be sent by a vehicle in case if packets stretches with high state entropy.
contain similar information. Therefore, information aggregation
techniques are applied to reduce such overheads. Information 4.2. Fully distributed aggregation
aggregation is an interesting approach, which reduces the number
of packets transmitted drastically by combining several informa- Each node aggregates data locally in a fully distributed aggre-
tion related to the same event into one aggregated information. gation mechanism. Fully distributed aggregation is very robust but
Aggregation allows the vehicles to merge, update or delete some leads to exponentially growing communication overhead with
information because they might be duplicated, similar or expired increasing numbers of nodes. Online analytical processing (OLAP)
(Diaconu). For example, the records about two vehicles can be of logistic regression analysis for raw data is proposed in Xi et al.
replaced by a single record with little error, if the vehicles are very (2009). Compression of the data and reconstruction of logistic
close to each other and move with relatively the same speed. regression models for OLAP query without accessing the raw data
Requirements, concept of a generic modeling approach and is discussed in this work. OLAP based compression scheme
identification of aggregation challenges are discussed in Dietzel compresses each base cell into a small compressed data block
et al., 2010a,b. Drawback of aggregation mechanism is reduction in with essential information to support the aggregation of logistic
information inaccuracy from the on-board sensors. Basically, regression models. OLAP based aggregation scheme supports real-
aggregation technique is a way of optimizing bandwidth/storage time logistic regression analysis of stream data.
usage. Information aggregation is a method of integrating different An adaptive forwarding delay control scheme called as Catch-
information sensed by different vehicles, with the compromise of Up is proposed in Yu et al. (2012). Catch-Up scheme dynamically
information accuracy. Because of the high mobility of vehicles and changes the forwarding speed of nearby reports, provides a better
the large number of vehicles in VANET, aggregation mechanism is chance to meet each other and be aggregated together. The Catch-
rendered as a difficult task. Some of the specific characteristics of Up scheme is designed based on a distributed learning algorithm.
information aggregation mechanisms with respect to the vehicular Each vehicle learns from local observations and chooses a delay
networks context are as follows. (1) The aggregation process based on learning results. Catch-Up scheme simulation results
should not be costly with respect to the computational and show that the number of redundant reports can be reduced to
communication cost. (2) The loss of information occurring because achieve a good trade-off between delay and communication
of the aggregation should be nominal. (3) Aggregated information overhead.

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
8 M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

4.3. Group/Cluster based aggregation and mobile agents. Aggregation of vehicle beliefs is done as
follows: (1) Generation of beliefs based on collected safety
In group/cluster based aggregation, multiple nodes aggregate information. (2) Aggregating the beliefs to develop desire using a
data in different groups. Group/cluster based aggregation is high- regression technique. (3) Revision of desire for better quality of
lighted as being the most suitable strategy for VANETs because it aggregation. (4) Finalizing the intention based on revised desire.
reduces data communication overhead by aggregating data in Message aggregation and group communication for safety
parallel. Clustering or grouping of vehicles in VANET is an related applications in VANETs are presented in Raya et al.
excogitate mechanism, as it improves the system performance (2006). In this approach, message is securely disseminated to
and makes the VANET topology less dynamic (Fan et al., 2006). selected vehicles who share a similar view of their environment.
Grouping of vehicles with similar mobility patterns by multi- With secure aggregation, the information dependability is also
metric Cluster Head (CH) election technique is proposed in increased. Grouping of several safety related messages provides
Rawshdeh and Mahmud. This technique can be used by vehicles the receiver with more evidence concerning a given event. Group
to determine their suitability on the fly to lead the cluster. This communication with secure aggregation scheme does not provide
approach takes the speed in addition to the location and direction, a complete solution for aggregation, but concentrates on security
into consideration to accurately identify nodes showing similar aspects.
mobility pattern and group them in one cluster. Clustering of
vehicles involves in the following phases: (1) Partitioning the 4.4. Hierarchical based aggregation
network into minimum number of clusters. (2) Vehicles are
distributed in the cluster based on their mobility pattern similar- A hierarchical data aggregation scheme for aggregating free
ity. (3) Multi-metric election technique is used by vehicles to parking slots using globally known map data for segmentation is
determine their suitability to become the CH. proposed in Lochert et al. (2007). Major benefit of using Flajolet–
Multiagent driven dynamic clustering scheme for aggregation Martin sketches in the work is to achieve a probabilistic but
of safety information in VANETS by considering vehicle speed, duplicate insensitive sum of free parking spaces. Aggregates can
direction, connectivity degree to other vehicles and mobility therefore be arbitrarily combined and re-combined without count-
pattern is proposed in Kakkasageri and Manvi and Kakkasageri ing free parking slots multiple times.
and Manvi (2012). Cluster members are identified based on Limited bandwidth and minimal initial deployment challenges
vehicle's relative speed and direction for dynamic clustering. for VANET based traffic information are studied in Lochert et al.
Cluster head is selected among the cluster members based on (2008). A domain specific aggregation scheme by means of a
stability metric derived from connectivity degree, average speed multi-layer hierarchy of approximations of the road network is
and time to leave the road intersection. Cluster head predicts presented in order to minimize the required overall bandwidth. A
future association of cluster members based on mobility patterns. genetic algorithm is proposed to identify good positions for static
The announcement of cluster mobility pattern to all cluster roadside units in order to cope with the highly partitioned nature
members is made by cluster head. The cluster members with of a VANET in an early deployment stage.
similar mobility pattern can reconnect with cluster head after Aggregation scheme for traffic flow prediction based on the
passing an intersection of the lane. moving average (MA), exponential smoothing (ES), autoregressive
Cluster-based Self-organizing Protocol (CSP) and Clustered MA (ARIMA), and neural network (NN) models is discussed in Tan
Gathering protocol (CGP) (proactive and reactive protocol) are et al. (2009). The MA, ES, and ARIMA models present predictions
discussed in Cherif et al. (2009). CSP and CGP are cross layer and of the three relevant time series. The predictions that result from
structured intelligently in the VANET in permanent manner by the different models are used as the basis of the aggregation stage.
portioning roads into adjacent segments seen as geographic fix
clusters. The proactive solution, CSP, can be used for security issues 4.5. Other aggregation mechanisms
or to provide a large panoply of services. The reactive solution,
CGP, is mainly used to perform data collection and aggregation. Two methods for aggregation, syntactic aggregation and
Cluster-based Accurate Syntactic Compression of Aggregated semantic aggregation have been proposed in Picconi et al.
Data in VANETs (CASCADE) forms vehicles into clusters (Ibrahim (2006). Syntactic aggregation reduces the overhead of message
and Weigle, 2008a,b). The cluster size estimates frame size used to headers and semantic aggregation is information-specific and
distribute aggregated data and the distance ahead vehicles are saves more bandwidth at the cost of loss of information. The
aware of. The main contribution of this work is to optimize the solution to detect attackers that purposely disseminate erroneous
cluster size to balance the trade-off between local view length and aggregated records is provided in the work. This work limits in
expected frame size. But CASCADE does not consider the vehicles consideration of the events only for information about vehicles
traveling in the opposite direction. Extension of CASCADE, i.e., like speed, location, etc., and not for events such as accidents.
accurate aggregation scheme of highway traffic information Security mechanisms for semantic data aggregation that are
VANETs is discussed in Ibrahim and Weigle (2008a,b)). CASCADE suitable for use in VANETs are reviewed in Dietzel et al. (2010a,b).
makes efficient use of the wireless channel while providing each Super Vehicle Detection (SVD) algorithm for speed and location
vehicle with data that is highly accurate, represents a large area in data aggregation for all the vehicles within zone to ensure an
front of the vehicle, and can be combined with aggregated data accurate representation of the network is discussed in Miller
from other vehicles to further extend the covered area. (2008). Theoretical scalability bound for aggregation protocols in
Region-based Location Service Management Protocol (RLSMP) VANETs is discussed in Scheuermann et al. (2009). In this work,
makes use of aggregation and geographical clustering to minimize authors have shown that the data rate will reduced asymptotically
the number of location updates and querying messages for location faster than the squared distance to the information source.
management of vehicles (Saleet and Basir, 2007). RLSMP improves In-network aggregation is an efficient scheme for privacy-
network scalability but suffers with the problem of increased number sensitive information only available in the direct vicinity of
of packet collisions, retransmissions and longer delays. vehicles instead of communicating it over larger areas. A metric
Safety information aggregation in VANETs using vehicle beliefs based framework to measure privacy enhancements provided by
is presented in Kakkasageri and Manvi (2011a,b). This scheme in-network aggregation is discussed in Dietzel (2011). Message
operates over logically clustered vehicles by using a set of static diffusion in VANETs using self organization and message benefit

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 9

Table 4
Summary of aggregation protocols.

Protocol Mechanism Architecture N/W type Information type

SLMA (Resta et al., 2007) Centralized aggregation V2V Dense Limited delay tolerable safety messages
VESPA (Adler and Strassberger, 2006) Centralized aggregation V2V Dense Accidents, emergency braking, available parking
spaces, etc.
Structure free aggregation (Zeadally et al., 2012) Centralized aggregation V2V Dense Any type of information
Catch-Up (Dietzel et al., 2010a) Fully distributed aggregation V2V Dense Any type of information
CASCADE (Yu et al., 2012; Fan et al., 2006) Group/cluster based V2V Dense Any type of aggregated messages
aggregation
RLSMP (Rawshdeh and Mahmud) Group/cluster based V2V/V2I Dense Location updates and querying messages
aggregation
BDI model based aggregation (Kakkasageri and Group/cluster based V2V Dense Accidents, heavy rain, fog, etc.
Manvi) aggregation
Probabilistic aggregation (Cherif et al., 2009) Hierarchical based Hybrid Sparse and Free parking slots
aggregation dense

Table 5
Performance metrics of aggregation protocols

Protocol Communication Aggregation Aggregation Channel Mobility


overhead delay accuracy utilization consideration

SLMA (Resta et al., 2007) Medium Medium High High Low


VESPA (Adler and Strassberger, 2006) Low Low High Medium Low
Structure free aggregation (Zeadally et al., 2012) Medium Low Medium Low High
Catch-Up (Dietzel et al., 2010a) Low Low Medium Medium Medium
CASCADE (Yu et al., 2012; Fan et al., 2006) High Medium Medium High High
RLSMP (Rawshdeh and Mahmud) Medium Medium Low High High
BDI model based aggregation (Kakkasageri and High Medium Medium High High
Manvi)
Probabilistic aggregation (Cherif et al., 2009) Medium Medium High Medium Low

determination techniques are presented in Adler et al. (2006). deployed, it picks up a role from the role set based on several
Utility evaluation concept for message content to select the sensing features. RD4 focuses only on the data quality without
messages most relevant to the overall network is used. In the security features.
paper, authors have shown that messages with higher relevance An aggregation scheme to aggregate any type of information
have a higher chance of being sent. like road incident, information related to driving more comforta-
In Kim et al. (2010), authors present filtering process of mal- ble, etc., is proposed in Molina-Gil et al. (2010). For aggregation
icious messages transmitted by a minority of misbehaving vehicles. different aspects of nodes functionality are considered. Vehicles on
Message filtering model leverages multiple complementary sources the road that find an obstacle automatically generate a warnings
of information to construct a multi-source detection model such message. This work also provides the security feature for the
that drivers are only alerted after some fraction of sources agree. aggregation by combining the signatures generated by different
Filtering model is based on a threshold curve and a Certainty of vehicles to alert about the same problem.
Event (CoE) curve. A threshold curve implies the importance of an Summary of current approaches for aggregation schemes in
event to a driver according to the relative position, and a CoE curve VANET is provided in Table 4. Performance metrics to evaluate
represents the confidence level of the received messages. An alert is aggregation protocols are summarized in Table 5.
triggered when the event certainty surpasses a threshold.
System for vehicle-generated announcements is developed in 4.6. Open research problems
Viejo et al. (2009). This system is secure against external and
internal attackers attempting to send fake messages. Internal Information aggregation mechanisms dramatically reduce the
attacks are thwarted by using an endorsement mechanism based transmission cost. Recently, information aggregation in VANETs
on multi-signatures. This system also ensures that vehicles volun- has attracted much research attention. But the issues like con-
teering to generate and/or endorse trustworthy announcements sideration of real world VANET scenario, efficient aggregator
do not have to sacrifice their privacy. Aggregated emergency vehicle selection, scalability, road scenario, trade-off between
message authentication (AEMA) scheme to validate an emergency delay and redundancy are still remained as unsolved issues.
event is developed in Zhu et al. (2008). AEMA makes use of Specific research considerations are as follows.
syntactic aggregation and cryptographic aggregation techniques to Centralized aggregation: Designing efficient centralized aggre-
reduce the transmission cost, and adopt batch verification techni- gation algorithms for VANETs is quite difficult, because of the
que for efficient emergency messages verification. following specific VANET characteristics: vehicle connectivity with
Aggregation of warning data if several messages present the neighbors, location of the vehicle, vehicle aggregation capability
same event is discussed in Eichler et al. (2006). This work makes and reliability, etc. Some of the centralized aggregation issues
use of revocation messages, i.e., when a vehicle does not detect a need to be tackled are as listed below:
hazard when entering an area which is dangerous according to a
stored aggregate. A role-differentiated cooperative deceptive data-  Intelligent aggregation algorithms at the central aggregator are
detection mechanism, i.e., RD4, to detect and filter false data in necessary to trade off the increased delay for reduced
VANETs is given in Sha et al. (2010). In RD4, when a sensor is redundancy.

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
10 M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

 Safety information is delay sensitive. In order to aggregate the (5) The computational overheads arising because of the validation
two safety information, they must be delivered to central process must be minimum. (6) For dense VANET scenario, the
aggregator vehicle at the same time. validation process should be quick and efficient.
 Selection of aggregator vehicles that offer the maximum
‘aggregation benefit’, is also a pressing issue for efficient safety 5.1. Authentication based validation
information aggregation task.
 For VANETs, the road scenarios are either city scenario or Two efficient broadcast authentication schemes, Fast Authenti-
highway scenario. Highways typically form a multi-lane road, cation (FastAuth) and Selective Authentication (SelAuth) for
which has very large segments. Mobility of the vehicles in VANETs are proposed in Hsiao et al. (2011a,b). FastAuth secures
highway scenario is more than that of the city scenario. The periodic single-hop beacon messages. SelAuth secures multi-hop
aggregation algorithms designed for city scenario may not be applications in which a bogus signature may spread out quickly
suitable for highway scenario, because of the network life time. and impact a significant number of vehicles. SelAuth provides fast
Hence efficient and quick decision centralized aggregation isolation of malicious senders.
algorithms are necessary for highway scenario based VANETs. A critical validation threat in VANETs is false data injection, i.e.,
an attacker disseminates false information to disrupt the behavior
Fully distributed aggregation: In VANETs, information is usually of the other drivers. Information driven operations of vehicular
‘periodic’ event-driven messages that are the result of the aware- networks make false data injection a very effective attack. Proof-
ness of an unsafe situation, not safety-of-life, during a certain time. of-Relevance (PoR), proving that the event reporter is authenti-
For distributed aggregation in sparse VANET scenarios, safety cally relevant to the event it has reported is discussed in Cao et al.
information will be repeatedly broadcasting in order to improve (2008). The PoR is accomplished by collecting authentic consensus
reliability and connectivity. This leads to the aggregation of on the event from witness vehicles in a cooperative way. Event
frequently disseminated data. Fully distributed aggregation algo- reports from attackers who fail to provide this PoR are disre-
rithms that are able to improve the scalability of the network and garded, making the network immune to bogus data.
avoid redundant repetitions are critically required for VANETs. Pseudonym based authentication mechanism is given in
Group/cluster based aggregation: Most of the recently proposed Calandriello et al. (2007). The mechanism reduces security over-
VANET clustering mechanisms are extracted from Mobile Ad-hoc head for safety beaconing, and retains robustness for transporta-
Networks (MANET). But, these mechanisms consider only position tion safety, even in adverse network settings. AutoCore, an
or direction regardless of the speed difference among vehicles. automated crash reporting application in VANETs to provide
Thus there is a need of re-investigating the clustering mechanisms authenticated digital video and telemetry data is presented in
for VANETs by considering the speed, location, and direction of Rahman and Hengartner. Data is recorded by vehicles either
vehicles. involved in or at the scene of a crash and can be used by
Hierarchical based aggregation: In hierarchical based aggrega- investigators to reconstruct the events that lead up to the crash.
tion usually all the vehicles participate in the aggregation process. RSU aided message authentication scheme called RAISE is
Vehicles may be smart or non-smart. A smart vehicle has relatively proposed in Zhang et al. (2008a,b). RSUs are responsible for
strong computational resources, typically access to on-board verifying the authenticity of messages sent from vehicles and for
sensors of cars, and executes a number of applications for traffic notifying the results back to vehicles. RAISE adopts the k-
safety and driving comfort. In contrast, a non-smart vehicle is a anonymity property for preserving user privacy, where a message
cost-efficient device with limited computational capabilities. Many cannot be associated with a common vehicle. In the case of the
of the research works on safety information aggregation assumes absence of an RSU, vehicles would cooperatively work to prob-
that all the vehicles in a VANET system are smart vehicles. abilistically verify only a small percentage of these message
Considering all the vehicles as smart vehicles in a VANET system signatures based on their own computing capacity.
is too idealistic.
Compatibility of non-smart vehicles with smart vehicles is an 5.2. Threshold based validation
important task for aggregation process in VANETs. In the applica-
tion and communication domain of a non-smart vehicle, aggrega- Most of the VANET applications rely on node-to-node commu-
tion logic execution is not available. Hence an efficient aggregation nication. This allows for malicious data traffic. At the same time,
scheme with the consideration of non-smart vehicles is required. easy access to information afforded by VANETs potentially enables
Such algorithms must provide a default application in non-smart the difficult security goal of data validation. An evaluation scheme
vehicles, that is able to identify the nearby aggregator vehicles and to check the validity of VANET data is proposed in Golle et al.
forwarding the cached data to it. (2004). In this approach a node searches for possible explanation
for the data it has collected based on the fact that malicious nodes
may be present. Explanations that are consistent with the node's
5. Information validation model of the VANET are scored and the node accepts the data as
dictated by the highest scoring explanations.
Validation of information is a process of ensuring that the To determine the validity of an event, or to prevent the abuse of
specified requirements of information are sufficiently correct and emergency alarms, determining whether the number of vehicles
complete. Reliable information exchange among the vehicles is reporting an event is above a threshold or not is an important
necessary for success of VANET applications. Also the protection of mechanism for VANETs. Because many applications rely on a
user privacy is a matter of great importance. Hence the validation threshold number of notifications to reach agreement among
of information prior to gathering, aggregation and dissemination vehicles. Efficient and secure threshold-based event validation
process is critical. Characteristics of information validation process protocol for VANETs is proposed in Hsiao et al. (2011a,b). A
are as follows. (1) Validation of information must be done by Threshold Anonymous Announcement (TAA) service using direct
legitimate/authenticated vehicle. (2) Identification process of vali- anonymous attestation and one-time anonymous authentication
dating vehicle should be simple. (3) After validation, the informa- to simultaneously achieve the seemingly contradictory goals of
tion should preserve its privacy. (4) Efficient validation process reliability, privacy and auditability in VANETs is proposed in Chen
must identify the source of defective or malicious information. et al. (2011).

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 11

Table 6
Summary of validation protocols.

Protocol Mechanism Architecture N/W Type Information Type

FastAuth and SelAuth schemes (Kim et al., 2010) Authentication V2V Dense Bogus signature
based validation identification
Proof-of-relevance (PoR) scheme (Viejo et al., Authentication based V2V Dense Bogus data detection
2009) validation
Pseudonym based validation (Zhu et al., 2008) Authentication based V2V Dense Safety beaconing messages
validation
AutoCore (Eichler et al., 2006) Authentication based V2V/V2I Sparse/ Providing authenticated digital video and telemetry
validation dense data
RAISE (Sha et al., 2010) Authentication based V2I Sparse/ Preserving user privacy
validation dense
Data validation scheme (Molina-Gil et al., 2010) Threshold based validation V2V Dense Detection of malicious nodes
Secure validation (Hsiao et al., 2011a,b) Threshold based validation V2V/V2I Dense Achieving reliability, privacy and auditability

Table 7
Performance metrics of validation protocols

Protocol Validation accuracy Computation time Computation overhead Robustness Mobility consideration

FastAuth and SelAuth schemes (Kim et al., 2010) High High Medium Low Medium
Proof-of-Relevance (PoR) scheme (Viejo et al., 2009) High Low High Medium Low
Pseudonym based validation (Zhu et al., 2008) Medium High Low High Low
AutoCore (Eichler et al., 2006) Medium Medium Low Low High
RAISE (Sha et al., 2010) Medium Low Low Low Medium
Data validation scheme (Molina-Gil et al., 2010) High Medium Medium Low Low
Secure validation (Hsiao et al., 2011a,b) High Medium Medium High Low

5.3. Other validation mechanisms the open research issues of validating the safety information are as
follows.
Practical ways to provide reliable reputation scores for vehicles Authentication based validation: In authentication mechanism,
in a vehicular network is provided in Park et al. (2011). Based on usually digital signatures or certificates are added to the safety
the phenomenon of predefined constant daily trajectories in information. The computational overhead of adding a digital
VANETs, roadside infrastructure rely on repeated daily observa- signature or certificate to each safety information must be small.
tions of the same set of passing-by vehicles. With this long-term Since the vehicle has to verify digital signatures or certificates at a
reputation, scores are developed. A system for vehicle-generated fast pace with hard real-time guarantees. In order to achieve this,
announcements is presented in Daza et al. (2009). The system is use of advanced cryptosystem algorithms is necessary.
secure against external and internal attackers attempting to send Applications in VANETs are vulnerable to false data injection
fake messages. Internal attacks are thwarted using an endorse- attacks and fake authentication, where misbehaving vehicles
ment mechanism based on threshold signatures. inject bogus information into the network to affect the behavior
A key optimization technique in VANETs is to cache frequently of the other drivers for their selfish objectives. Such kind of
accessed data items in a local storage of vehicles. Since vehicles are attackers may lead to intentional accidents. Hence intelligent
not critically limited by the storage space, it is a less of a problem and efficient security and privacy algorithms are needed to
which data items to cache. A cache invalidation algorithm that eliminate such type of false data injection attackers.
takes advantage of the underlying location management scheme Threshold based validation: Most of the threshold based valida-
to reduce the number of broadcast operations and the correspond- tion protocols for VANETs are from wireless networks. Such
ing query delay is given in Lim et al. (2008). protocols are inefficient, because they are designed for low
Validation and evaluation of NEtwork MObility (NEMO) in mobility devices. But VANET demands quick and accurate valida-
VANET using geographic routing is done in Jemaa et al.. The tion algorithms for safety information, considering the vehicles
combination of geographic-based routing protocols (GeoNetwork- speed, position, etc. The major issue is in employing a mechanism
ing) and IPv6 NEMO into a single communication architecture for validating safety information on the fly.
(IPv6 GeoNetworking) is key in Vehicular Ad-hoc Networks During threshold based validation process usually vehicle
(VANET). NEMO manages Internet access and session continuity considers only a subset of the information it receives. This may
between the vehicle and the Internet. Geographically based data lead to the introduction of malicious data from the misbehaving
forwarding allows an efficient dissemination of the information vehicle. Identification and removal of such type of malicious data
between vehicles and the infrastructure. producing vehicles are challenging issues.
Some of the data validation schemes in VANETs are summar-
ized in Table 6. Validation protocols performance metrics are listed
in Table 7. 6. Information dissemination

5.4. Open research problems Information dissemination can be defined as broadcasting


information about itself and the other vehicles it knows about.
Specific requirements of VANETs make hard to address valida- Each time a vehicle receives information broadcast by another
tion issues of safety information, which make the field of valida- vehicle, it updates its stored information accordingly and defers
tion as an interesting research topic. Validation of safety forwarding the information to the next broadcast period, at which
information is open and active research field. More particularly, time it broadcasts its updated information. VANET applications

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
12 M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

require that certain data be disseminated in a geographical area requirements for safety applications are discussed in Koubek et al.
under all conditions. The reason for this is that the relevance of (2010a,b). Pseudo-acknowledgments (PACKs) are used for multi-
information decreases with the distance to the location hop broadcast transmission through overhearing successive
(Krishnamurthy, 2008). Safety information dissemination methods rebroadcasts by its neighbors. As the broadcast packet traverses
in VANETs are discussed in Chen et al. (2008). Many of the the network, each hop creates dynamic time slots in order to
dissemination protocols for VANETs are based on the following rebroadcast. Intermediate hops that receive the broadcast wait
techniques:flooding, broadcasting, neighbor knowledge based until the dynamic slot time expires and then rebroadcasts thereby
exchange and cluster based approach (Dar et al., 2010). Recently, acknowledging a link between itself and a previous hop. If the
several dissemination and broadcasting protocols have been previous hop does not overhear the rebroadcast, it repeats the
proposed for mobile ubiquitous systems (Bellavista et al., 2013). rebroadcasting. The dynamic slots are created locally at individual
For data dissemination technique, vehicles must be able to nodes and do not require a global clock.
communicate with each other to ensure that safety and traffic A stochastic broadcast as a solution for VANET is discussed in
management applications function successfully. In a heteroge- Slavik and Mahgoub (2010). Stochastic broadcast instructs nodes
neous communications environment where multiple radio access to rebroadcast messages according to a retransmit probability. In
technologies are available, the manner in which information is this scheme the link between the mathematical science of con-
propagated between the key players is a major issue which tinuum percolation and stochastic broadcast is demonstrated.
ultimately impacts driver safety. The aim of data dissemination Specifically, that the critical percolation threshold in continuum
is to transport information to the intended recipients while percolation translates to the wireless broadcast context.
meeting a number of design requirements. The convergence time AutoNomos, a decentralized traffic information system, which
and lifetime of the data as well the reliability of data transporta- is suited for the evaluation of data dissemination protocol is
tion across the vehicular system are important considerations. presented in Wegener et al. (2007). Optimized and self-
Information exchange in VANETs occurs between vehicles adaptable AutoCast scheme is used for various dynamic topologies.
(inter-vehicle communications) in an ad hoc manner and also A piggybacked cooperative repetition approach for reliably broad-
with roadside base stations using the so-called DSRC links casting safety messages in VANETs is discussed in Yang et al..
(Zimmermann et al., 2005). Different types of information dis- Repetitions by neighbors that receive the original transmission
semination methods are discussed in Kakkasageri et al. (2012). cover the areas that are missed in the original transmissions.
Designing of robust and efficient dissemination strategy in VANET Repetitions are piggybacked by the newly generated messages so
is a challenging task because of the following characteristics: that no extra messages are injected into the network.
(1) Information must be kept alive. (2) Information mechanism Propagation model for urban VANETs, i.e., CORNER is discussed
must work efficiently for both dense and sparse VANETs. (3) Infor- in Giordano et al. (2010). CORNER implements a light weight
mation dissemination strategy should be robust against the varia- propagation model that only needs information about the road
tions in the transmitted signal power level of vehicles. (4) topology providing a good trade off between computational
Information dissemination process must be intelligent to identify complexity and verisimilitude of the simulation. CORNER provides
the target dissemination area, i.e., movement of vehicles in same the path loss as a function of the relative position of two nodes for
direction, in opposite direction and in both directions. urban scenarios. For each couple of vehicles the model takes into
account three possible cases: Line Of Sight (LOS), Non Line Of Sight
6.1. Forwarding based dissemination with one corner along the path (NLOS1) and Non Line Of Sight
with two corners along the path (NLOS2).
Data forwarding as a key responsibility of a VANET's communica- Exchanging status information by broadcasting among the
tion device is addressed in Moreno et al. (2006). Packet-centric vehicles enhances vehicular active safety (Yang et al., 2008). A
forwarding (PCF) and information-centric forwarding (ICF), aimed to channel adaptive broadcasting method is proposed in this work. It
disseminate information in a VANET environment are presented. relies solely on channel condition information available at each
Information forwarding responsibilities reside in the application vehicle by employing standard supported sequence number
protocol layer(s) and exploit the applications capability of informa- mechanisms.
tion modification, aggregation, and invalidation. Packet forwarding
functionalities are implemented in the network protocol layer to
rapidly disseminate information of very high priority (safety-of-life). 6.3. Push based dissemination
Low-cost nodes incapable of processing safety-related information
are used to increase network connectivity. A communication architecture for data dissemination in a
Utility driven information dissemination approach in vehicle heterogeneous vehicular wireless environment is discussed in
ad-hoc networks is presented in Greene et al.. This approach uses Brickley et al. (2007). Policy-based solution is provided to dis-
application specific utility descriptions, which are reduced to seminate the data for ITS application. Policy based solution
simpler and more compact micro-utility approximations. These considers the application requirements and the quality of the
micro-utilities travel with the data to guide critical in-transit wireless carrier. This determines how the information can be
resource decisions such as dropping data, access to infrastructure propagated to the relevant recipients in the most effective and
networks, and storing data for later forwarding. efficient manner. In this work, a push-based ITS application is
Adaptive Traffic Beacon (ATB), a distributed scheme is pre- considered for analysis of the dissemination policy. Applications
sented in Sommer et al. (2011). ATB uses adaptive beaconing and that require higher levels of cooperation may not get the benefits
based on metrics message utility and channel quality. ATB leads to from this dissemination scheme.
a much broader dissemination of messages (in terms of penetra- This work is a part of “Cooperative Vehicle Infrastructure Systems”
tion rate) than flooding-based approaches. project (CVIS) (www.cvisproject.org,). The CVIS project is based on a
hybrid architectural approach for ITS. In CVIS, the architecture is
6.2. Broadcasting based dissemination realized using the Continuous Air Interface for Long to Medium range
(CALM) communications standard (www.calm.hu). CALM aims
Mechanisms that improve the reliability of broadcasting pro- to provide user transparent, continuous communication in support
tocols in VANET, where the emphasis is on satisfying the delay of emerging ITS applications. It combines complementary media,

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 13

allowing vehicles to use the best combination in-vehicle and infra- by focusing on the impact of the Medium Access Control (MAC)
structure communications technology locally available. layer on the performances of the routing strategies is presented in
An agent based model that consists of heavy-weight static Campelli et al..
cognitive (based on Belief Desire Intention: BDI) and light-weight Replication of local road networks for regional information
mobile agents for integrated safety information gathering and dissemination in VANETS is discussed in Roessler and Bruns
dissemination is proposed in Kakkasageri et al., Kakkasageri and (2006). Reproduction of the relevant area is done using interpola-
Manvi (2011a,b), and Kakkasageri et al. (2011). Cognitive agent tion points. The approach is based on locally storing the sequence
based model executes push (gather/store and disseminate) and of the own current and recent position information for a defined
pull (gather/store) operations on information gathered based on period of time. Thus each vehicle has a good extract of its last
information relevance, criticalness and importance. driving path. This can be either a straight line (e.g., on motor-
ways) or a curve (e.g., on a motor-way exit or on a country road). If
6.4. Routing protocols based dissemination a situation occurs that necessitates to transfer a message to
preceding vehicles like a slippery road warning, the addressing
Routing scheme for highly dynamic networks like VANETs, region for this message can be specified with the stored position
relying on conditions-based communication is proposed in information.
Ducourthial et al. (2007). Instead of transporting addresses (or Sharing of limited wireless channel capacity scheme for the
positions), a message is sent with some conditions used for exchange of safety related information in a fully deployed VANET
retransmission or reception. Assessment of VANET multi-hop is discussed in Torrent-Moreno et al.. In this scheme, load sent to
routing over an experimental platform is described in Santa the channel is limited using a strict fairness criterion among the
et al. (2009). A review of recent routing protocols for both text nodes. A formal definition of this problem is presented in terms of
and video data transmission is done in Ghafoor et al. (2010). a max–min optimization problem with an extra condition on per-
Quality based comparison of routing protocols for video data node maximality. Then Fair Power Adjustment for Vehicular
streaming over VANET is studied in this work. Dissemination of environments (FPAV), a power control algorithm is used to find
multimedia type (e.g., video, audio) using network coding for the optimum transmission range of every node.
safety information in VANET is described in Park et al.. Multi agent based information dissemination model for appli-
Position-based routing algorithm for data dissemination in cations like safety information, location awareness service and
VANETs, that is able to exploit both street topology information entertainment services in VANETs is presented in Manvi et al.
achieved from geographic information systems and information (2008a,b,c,d) and Manvi et al. (2006, 2007). Multi agent model
about spatial distribution of vehicles along street and vehicular consists of ‘lightweight’, network-facing, mobile agents; and ‘hea-
traffic, in order to perform better routing decisions is proposed in vyweight’, application-facing, norm-aware agents. This model
Giudici. Self-Organizing Communication with Protocol Elements provides flexibility, adaptability and maintainability for traffic
(SLOPE) protocol to separate protocol functionality in application information dissemination in VANETs as well as supports robust
and communication domain leaving the common protocol practice and agile network management.
with network layering and sockets is proposed in Schnaufer et al. Collision avoidance/warning systems and automation of vehicle
(2006). lateral control tasks are discussed in Vahidi and Eskandarian
MobEyes, specifically designed for proactive urban monitoring, (2003). This work explains the initiatives for automation in
that exploits node mobility to opportunistically diffuse sensed different levels of transportation system with a specific emphasis
data summaries among neighbor vehicles and to create a low-cost on the vehicle-level automation. Auto and cross correlation
index to query monitoring data is presented in Lee et al. (2009, properties of various optical spreading codes are compared and
2006). MobEyes is evaluated in terms of indexing completeness, the infrared direct sequence spread spectrum (DSSS) inter-vehicle
harvesting time, and overhead. MobEyes presents the following ranging and vehicle-to-roadside communication systems are pro-
research findings: (1) Effects of concurrent exploitation of multiple posed in Kwak and Lee (2004).
harvesting agents with single/multi-hop communications. Trust-based message propagation and evaluation framework in
(2) Evaluation of network overhead and overall system stability. VANET, where peers share information regarding road condition
Information dissemination control for cooperative active safety or safety and others provide opinions about whether the informa-
applications in VANETs is discussed in Huang et al. (2009). An tion can be trusted or not is discussed in Chen et al. (2010). Trust
adaptive rate control algorithm based on network condition and based message propagation model collects and propagates peers
tracking error is proposed in this research work. Local Danger opinions in an efficient, secure and scalable way by dynamically
Warning (LDW) applications and important characteristics of controlling information dissemination. The trust-based message
information dissemination in VANETs are described in Rajwani. A evaluation model allows peers to evaluate the information in a
dynamic collision avoidance component for the standard vehicle- distributed and collaborative fashion by taking into account others
following approach has been introduced in Gehrig and Stein opinions.
(2007). The elastic-band framework is used to modify the initial Data dissemination schemes for VANETs are summarized in
path of the leader vehicle. Table 8. Some of the dissemination protocols performance metrics
are shown in Table 9.
6.5. Other dissemination mechanisms
6.6. Open research problems
Estimation of number of Dissemination Points (DPs) to be
deployed for disseminating information to vehicles traveling in From a network perspective, information dissemination is
an urban area is done in Trullols et al.. Maximum Coverage forwarding the information from source to one or several destina-
Problem (MCP) is formulated so as to maximize the number of tions without too much communication overhead and delay. Many
vehicles that get in contact with the DPs. Localized Urban of the information dissemination strategies in research and
Dissemination (LUD), a location aided gossiping protocol concen- development are ongoing. However, there are still open research
trates the information spreading to areas where it is most likely to issues exist. Some of them are as follows.
be useful (Mate and Vida). Design of position based routing Forwarding based dissemination: Due to dynamic variation in
solutions for the support of safety oriented applications in VANETs the mobility of vehicles, the topology of VANETs is continuously

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
14 M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

Table 8
Summary of dissemination protocols.

Protocol Mechanism Architecture N/W Type Information Type

PCF and ICF based scheme (Krishnamurthy, 2008) Forwarding based dissemination V2V Dense Safety applications
Utility driven dissemination (Chen et al., 2008) Forwarding based dissemination V2V/V2I Dense Infrastructure stored
messages
ATB (Dar et al., 2010) Forwarding based dissemination V2V Dense Any type of messages
PACKs based scheme (Bellavista et al., 2013) Broadcast based dissemination V2V Dense Any type of information
Stochastic mechanism (Zimmermann et al., 2005) Broadcast based dissemination V2V Dense Delay tolerant applications
AutoNomos (Kakkasageri et al., 2012) Broadcast based dissemination V2V Dense Safety messages
CVIS (Slavik and Mahgoub, 2010) Push based dissemination Hybrid Sparse/ ITS applications
Dense
Cognitive agent approach (Yang et al.; Giordano et al., 2010; Yang et al., Push based dissemination V2V Dense Safety information
2008)
Multimedia information dissemination (Kakkasageri et al.) Routing protocols based V2V Dense Safety information
dissemination
MobEyes (Ducourthial et al., 2007) Routing protocols based V2V Dense Urban monitoring
dissemination applications
Information dissemination (Ghafoor et al., 2010) Routing protocols based V2V Dense Safety information
dissemination

Table 9
Performance metrics of dissemination protocols.

Protocol Dissemination Dissemination success Packet Bandwidth usage Scalability


delay ratio delivery ratio

PCF and ICF based scheme (Krishnamurthy, 2008) Low Medium Medium High Medium
Utility driven dissemination (Chen et al., 2008) Medium Medium Low High Medium
ATB (Dar et al., 2010) High Medium High High Low
PACKs based scheme (Bellavista et al., 2013) Medium Medium Low Low Medium
Stochastic mechanism (Zimmermann et al., 2005) Low Medium High Low Medium
AutoNomos (Kakkasageri et al., 2012) High Medium Medium Low Low
CVIS (Slavik and Mahgoub, 2010) High Medium Medium Medium Medium
Cognitive agent approach (Yang et al.; Giordano et al., 2010; Yang Low Medium High High Medium
et al., 2008)
Multimedia information dissemination (Kakkasageri et al.) Medium Medium Medium High Low
MobEyes (Ducourthial et al., 2007) Medium Low Medium High Medium
Information dissemination (Ghafoor et al., 2010) Medium Low Medium Medium Low

changing. In dense networks, such as cities or major highways dissemination, the distribution of some state information will be
with a large portion of equipped vehicles, the data load on the repeated (e.g., periodically or at detection of a new neighboring
channel should be controlled in order not to exceed the limited vehicle) for a defined duration of time while being inside a specific
wireless bandwidth. In contrast, in sparse networks, channel geographical area. The specific strategy to optimize this repetition
saturation is not a critical issue. Moreover, messages should be process in push mechanism is to be developed.
repeated since equipped vehicles are most likely to be out of The transmitted signal power level of a vehicle may be too
wireless radio range of each other; vehicles inside the area of strong or too weak during certain times of the day and in certain
influence of a hazard, but not reachable at the time they are city environments. When the transmission range is too strong, it
detected and should also be notified. Note that in case of creates interference and lowers the system throughput. When
experiencing a dense network, the forwarding strategy is required transmitted signal power level is too low, the vehicle cannot reach
to be very efficient in terms of overhead while ensuring high other vehicles. Hence, push strategy with Smart algorithms for
reliability to priority messages with the most important payload, i. data dissemination that adjusts according to the transmitted signal
e., safety-of-life. Hence, devising of dissemination protocols with power level is needed.
minimum communication delay for varying dynamic topology is a Routing protocols based dissemination: For one way and two way
challenging task. in the context of traffic, a system for scalable routing of traffic data
Broadcasting based dissemination: The dissemination mechan- dissemination and visualization in VANETs is needed. Vehicles
ism can either broadcast information to vehicles in all directions, moving in both directions may yield the best performance. But
or perform a directed broadcast restricting information about a vehicles in the opposite direction needed better routing protocols
vehicle to other vehicles behind it. Further, the communication to increase the data dissemination performance. This is because
could be relayed using only vehicles traveling in the same direc- topological transmission range needs to maintain a path from the
tion, vehicles traveling in the opposite direction, or vehicles source to the destination.
traveling in both directions. The safety information dissemination Multi-hopping mechanism is used, when the information is
protocol must assure that all vehicles in the expected zone receive disseminated to destinations beyond the transmission range.
the disseminated information. Along with this task, the dissemi- Multi-hop techniques consume lot of wireless resources because
nation protocol should be capable to eliminate the message of redundant retransmissions and increase the communication
redundancy. delay. Hence, the designing of efficient and reliable safety infor-
Push based dissemination: Safety hazards can be associated mation dissemination algorithms is complicated.
with a time duration and geographical area while/where they The dissemination mechanism should be scalable. VANET
can potentially affect vehicles safety state. In push based characteristics like high-speed node movement, frequent topology

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 15

change and short connection lifetime, especially with multi-hop Chen C, et al. A trust modeling framework for message propagation and evaluation
paths need some typical data dissemination models for in VANETs. In: Proceedings of the IEEE conference on intelligent transportation
systems. Portugal; August 2010. p. 1–8.
VANETs. Chen L, Lynn S, Wang G. Threshold anonymous announcement in VANETs. IEEE J
Safety information applications require fast association and low Selected Areas Commun 2011;29(March (3)):605–15.
communication latency between communicating vehicles. The Cherif MO, Senouci SM, Ducourthial B. Vehicular network self-organizing archi-
tectures. In: Proceedings of the IEEE GCC conference and exhibition. Kuwait;
basic need of such type of applications is reliability and time March 2009. pp. 1–6.
sensitivity. Hence the future routing protocols based safety infor- 〈http://www.cvisproject.org〉.
mation dissemination protocols must be capable to provide the Dar K, et al. Evaluating information dissemination approaches in VANETs. In:
Proceedings of the 7th ACM international conference on pervasive services
QoS parameters like latency, reachability, etc. (ICPS 2010). Berlin, Germany; July 2010.
Daza V, et al. Trustworthy privacy-preserving car-generated announcements in
vehicular ad hoc networks. IEEE Trans Vehicular Technol 2009;58(May
(4)):1876–86.
7. Conclusions Defude B, et al. Data aggregation in VANETs: the VESPA approach. In: Proceedings
of the 5th annual international conference on mobile and ubiquitous systems:
computing, networking, and services. Dublin, Ireland; 2008.
VANET differs from other types of wireless networks in terms de Fuentes JM, Gonzalez-Tablas AI, Ribagorda A. Witness-based evidence genera-
of mobility, varying network topologies, communication patterns, tion in vehicular ad-hoc networks. In: Proceedings of the 7th embedded
etc. Because of the VANET constraints, providing the safety security in cars conference (ESCAR), Germany; 2009.
Delot T, et al. Decentralized pull-based information gathering in vehicular networks
information based applications in VANETs is a challenging task. using GeoVanet. In: Proceedings of the IEEE 12th international conference on
This paper presented a survey of the information management mobile data management. Lulea, Sweden; June 2011. p. 174–83.
techniques in VANET, especially with respect to vehicle/driver Diaconu V. Solutions for storing and aggregating traffic information in
VANET applications 〈http://cipsm.hpc.pub.ro/capim/docs/vdiaconu_scs_2011.
safety. Basically, information management involves gathering, pdf〉; [accessed 25.06.13].
aggregation, validation and dissemination techniques. Each tech- Dietzel S. Privacy implications of in-network aggregation mechanisms for VANETs.
nique possess different characteristics and requirements. Hence, In: Proceedings of the 8th international conference wireless on-demand net-
work systems and services (WONS). Italy; January 2011. p. 91–5.
the review focused on classification of techniques based on Dietzel S, et al. A fuzzy logic based approach for structure-free aggregation in
characteristics, in-depth analysis of a number of research solutions vehicular ad-hoc networks. In: Proceedings of the 6th ACM international
and future directions for research. To the best of our knowledge, an workshop on vehicular internetworking. Beijing, China; 2009. p. 79–88.
Dietzel S, et al. On the potential of generic modeling for VANET data aggregation
exhaustive literature survey of information management in
protocols. In: Proceedings of the IEEE vehicular networking conference (VNC).
VANETs is presented to give scope to the VANET researchers. New Jersey, USA; December 2010. p. 78–85.
Dietzel S, et al. Resilient secure aggregation for vehicular networks. IEEE Networks
2010b(January/February):26–31.
DRIVing Implementation and Evaluation of C2X Communication (DriveC2X) tech-
References nology in Europe 〈ertico.com/drive-c2x〉; [accessed 25.06.13].
Ducourthial B, Khaled Y, Shawky M. Conditional transmissions: performances study
Adler C, Strassberger M. Putting together the pieces—a comprehensive view on of a new communication strategy in VANET. IEEE Trans Vehicular Technol
cooperative local danger warning. In: Proceedings of the ITS World Congress. 2007;56(November (6)):3348–57.
London; 2006. p. 9–16. Eichler S, Merkle C, Strassberger M. Data aggregation system for distributing inter-
Adler C, et al. Self-organized and context-adaptive information diffusion in vehicle warning messages. In: Proceedings of the 31st IEEE conference on local
vehicular ad hoc networks. In: Proceedings of the 3rd international symposium computer networks. Florida, USA; November 2006. p. 543–4.
on wireless communication systems. Valencia, Spain; 2006. Fan P, et al. Traffic model for clustering algorithms in vehicular ad-hoc networks. In:
Andrisano O, Verdone R, Nakagawa M. Intelligent transportation systems: the role Proceedings of the 3rd IEEE consumer communications and networking
of third-generation mobile radio networks. IEEE Commun Mag 2000;38 conference. Las Vegas, Nevada, USA; January 2006. p. 168–72.
(9):144–51. Gehrig SK, Stein FJ. Collision avoidance for vehicle following systems. IEEE Trans
Arnold T, et al. IP address passing for VANETs. In: Proceedings of the IEEE Intell Transp Syst 2007;8(2):233–44.
international conference on pervasive computing and communications (Per- Gehring O, Fritz H. Practical results of a longitudinal control concept for truck platooning
Com). Hong Kong; March 2008. p. 70–9. with vehicle to vehicle communication. In: Proceedings of the IEEE conference on
Bako B, Weber M. Efficient information dissemination in VANETs, advances in intelligent transportation system (ITSC). Boston, USA; 1997. p. 117–22.
Vehicular networking technologies. InTech, April 2011, http://dx.doi.org/10. Ghafoor KZ, et al. Inter-vehicle communication protocols for multimedia transmis-
5772/15533. sion. In: Proceedings of the international multi conference of engineers and
Barberis C, et al. A customizable visualization framework for VANET application computer scientists. Hong Kong; March 2010.
design and development. In: Proceedings of the IEEE international conference Giordano E, et al. CORNER: a realistic urban propagation model for VANET. In:
on consumer electronics (ICCE). Chiang Mai, Thailand; 2011. p. 569–70. Proceedings of the 7th international conference on wireless on-demand network
Bellavista P, et al. A survey of context data distribution for mobile ubiquitous systems and services (WONS). Kranjska Gora, Slovenia; February 2010. p. 57–60.
systems. ACM Comput Surv 2013;45(March (1)):1–49. Giudici F. Elena Pagani. spatial and traffic-aware routing (STAR) for vehicular
Booysen MJ. Survey of media access control protocols for vehicular ad hoc systems, High performance computing and communications. Lecture notes in
networks. IET Commun 2011;5(11):1619–31. computer science 3726, 2005, p. 77–86 〈homes.di.unimi.it/pagae/elena/articoli/
Boukerche A, et al. Vehicular ad hoc networks: a new challenge for localization- HPCC05.pdf〉.
based systems. Comput Commun 2008;31(12):2838–49. Golle P, Greene D, Staddon J. Detecting and correcting malicious data in VANETs.
Brickley O, et al. A data dissemination strategy for cooperative vehicular systems. In: Proceedings of the VANET'04. Philadelphia, Pennsylvania, USA; October 2004.
In: Proceedings of the IEEE 65th vehicular technology conference. Baltimore, Greene D, et al. Utility-driven information dissemination in vehicle ad-hoc net-
MD, USA; April 2007. p. 2501–5. works 〈www2.parc.com/spl/members/jjliu/publication/ITSWorld07_VRID.pdf〉;
Calandriello G, et al. Efficient and robust pseudonymous authentication in VANET. [accessed 25.06.13].
In: Proceedings of the 4th ACM international workshop on vehicular ad hoc Hafeez KA, et al. Impact of mobility on VANET's safety applications. In: Proceedings
networks. Montreal, QC, Canada; September 2007. p. 19–28. of the IEEE global telecommunications conference (GLOBECOM). Miami, USA;
Caliskan M, et al. Predicting parking lot occupancy in vehicular ad hoc networks. In: 2010. p. 1–5.
Proceedings of the IEEE vehicular technology conference (VTC). Baltimore, USA; Hartenstein H, Laberteaux KP. A tutorial survey on vehicular ad hoc networks. IEEE
2007. p. 277–81. Commun Mag 2008;46(6):164–71.
Campelli L, et al. Directional Broadcast Forwarding of Alarm Messages in VANETs. Hedrick JK, Tomizuka M, Varaiya P. Control issues in automated highway systems.
In: Proceedings of the 4th annual conference on wireless on demand network IEEE Control Syst Mag 1994;14(6):21–32.
systems and services. Austria; January 2007. p. 72–9. Hsiao HC, et al. Flooding-resilient broadcast authentication for VANETs. In:
Cao Z, et al. Proof-of-relevance: filtering false data via authentic consensus in Proceedings of the 17th annual international conference on mobile computing
vehicle ad-hoc networks. In: Proceedings of the IEEE INFOCOM workshops. and networking (MobiCom'11). Las Vegas, Nevada, USA; September 2011.
Phoenix, Arizona, USA; April 2008. p. 1–6. Hsiao HC, et al. Efficient and secure threshold-based event validation for VANETs.
Car to Car Communication Consortium, CAR 2 CAR Communication Consortium In: Proceedings of the ACM conference on security and privacy in wireless and
Manifesto, Overview of the C2C-CC System 〈http://www.car-to-car.org〉; 28th mobile networks (WiSec'11). Hamburg, Germany; June 2011.
August, 2007. Huang C. et al. Information dissemination control for cooperative active safety
Chen W, et al. A survey and challenges in routing and data dissemination in applications in vehicular ad-hoc networks. In: Proceedings of the IEEE global
vehicular ad hoc networks. In: Proceedings of the IEEE international conference telecommunications conference (GLOBECOM). Honolulu, Hawaii, USA; Decem-
on vehicular electronics and safety (ICVES). USA; 2008. p. 328–33. ber 2009. p. 1–6.

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
16 M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎

Hung CC, Peng WC. model-driven traffic data acquisition in vehicular sensor Li Z, Wang Z, Chigan C. Security of vehicular ad hoc networks in intelligent
networks. In: Proceedings of the 39th international conference on parallel transportation systems. Wireless technologies for intelligent transportation
processing. San Diego, CA, USA; 2010. systems. Nova Science Publishers; 2009.
Ibrahim K, Weigle MC. Optimizing CASCADE data aggregation for VANETs. In: Lim S, et al. On cache invalidation for internet-based vehicular ad hoc networks. In:
Proceedings of the 5th IEEE international conference on mobile ad hoc and Proceedings of the 5th IEEE international conference on mobile ad hoc and
sensor systems. Atlanta, Georgia; October 2008. p. 724–9. sensor systems (MASS). Atlanta, Georgia; October 2008. p. 712–7.
Ibrahim K, Weigle MC. CASCADE: cluster-based accurate syntactic compression of Liu C. Chigan C. Structure-less message aggregation (SLMA): reliably and efficiently
aggregated data in VANETs. In: Proceedings of the IEEE GLOBECOM workshops. improve information precision and certainty for VANETs. In: Proceedings of the
New Orleans, LA, USA; December 2008. p. 1–10. IEEE global telecommunications conference (GLOBECOM 2010). Miami, Florida,
IEEE Standards Association. Wireless access in vehicular environments 〈http:// USA; December 2010. p. 1–6.
standards.ieee.org〉; [accessed 25.06.13]. Liu N, et al. When transportation meets communication: V2P over VANETs. In:
Jemaa IB, et al. Validation and evaluation of NEMO in VANET using geographic Proceedings of the 30th international conference on distributed computing
routing 〈hal.inria.fr/inria-00567786/PDF/ITST2010-3.0.pdf〉. systems (ICDCS2010). Genova (Genoa), Italy; June 2010.
Johnson M, Nardis LD, Ramchandran K. Collaborative content distribution for Lochert C, Scheuermann B, Mauve M. Probabilistic aggregation for data dissemina-
vehicular ad hoc networks. In: Proceedings of the Allerton conference on tion in VANETs. In: Proceedings of the international workshop on vehicular ad
communication, control, and computing. Monticello, Illinois, USA; September hoc networks. Montreal, Quebec, Canada; 2007. p. 1–8.
2006. p. 281–5. Lochert C, et al. Data aggregation and roadside unit placement for a VANET
Kakkasageri MS, Manvi SS. Multiagent driven dynamic clustering of vehicles in traffic information system. In: Proceedings of the ACM international work-
VANETs. J Network Comput Appl 2012;35(6):1771–1780. shop on vehicular inter-networking. San Francisco, California, USA; 2008.
Kakkasageri MS, Manvi SS. Push-pull based critical information gathering in vanets: p. 58–65.
multi agent system based approach. In: Proceedings of the IEEE international Luo J, Hubaux JP. A survey of inter-vehicle communication. In: Lemke K, et al.,
conference in vehicular electronics and safety (ICVES 2009). Pune, India; editors. Embedded Security in Cars-Securing Current and Future Automotive IT
November 2009. p. 1–6. applications. Leipzig; 2008. p. 164–79.
Kakkasageri MS, Manvi SS. Safety information aggregation in VANETs using vehicle Manvi SS, Kakkasageri MS. Issues in mobile ad hoc networks for vehicular
beliefs. In: IEEE 5th international symposium on advanced networks and tele- communication. IETE Tech Rev 2008;25(March–April (2)):59–72.
communication systems (ANTS 2011). Bangalore, India; December 19–21, 2011. Manvi SS, Kakkasageri MS. Wireless and mobile network concepts and protocols.
Kakkasageri MS, Manvi SS. Intelligent information dissemination in vehicular ad Wiley India; 2010 ISBN:978-81-265-2069-5.
hoc networks, international journal of ad hoc. Sensor Ubiquitous Comput Manvi SS, Kakkasageri MS, Pitt J, Rathmell A. Multi-agent systems as a platform for
(IJASUC) 2011b;2(March (1)):112–23. VANETs, In: Proceedings of the agents in traffic and transportation (ATT-06),
Kakkasageri MS, Manvi SS. Connectivity and mobility aware dynamic clustering in international conference on autonomous agents and multiagent systems
VANETs. In: Proceedings of the 4th IEEE international conference on electronics (AAMAS-06). Hakodate, Japan; May 2006. p. 35–42.
computer technology (ICECT 2012). Kanyakumari, India; April 2012. Manvi SS, Kakkasageri MS, Pitt J. Information search and access in vehicular ad-hoc
Kakkasageri MS, Manvi SS, Pitt J. Cognitive agent based critical information networks (VANETs): an agent based approach. In: Proceedings of the interna-
gathering and dissemination in vehicular ad hoc networks. Wireless personal tional conference on communication in computing (CIC-2007), The 2007 World
communications. DOI: http://dx.doi.org/10.1007/s11277-012-0623-5. congress in computer science, computer engineering, and applied computing.
Kakkasageri MS, Manvi SS. Safety information gathering and dissemination in Las Vegas, Nevada, USA; June 2007. p. 23–9.
vehicular ad hoc networks: cognitive agent based approach. In: Proceedings of Manvi SS, Kakkasageri MS. Emerging security issues in vehicular ad-hoc networks
the 1st international conference on computer science and information technol- (VANETs) for E business. In: Lee, editor. Chapter XXXIX, Handbook of research
ogy (CCIT 2011). Bangalore, India; January 2011. p. 254–64. on telecommunications planning and management for business. IGI Global
Kakkasageri MS, Manvi SS. A survey on information dissemination in VANETs”, publishers, USA; 2009. p. 599–614.
contributed chapter. In: Robil Daher, Alexey Vinel, editors. Roadside networks Manvi SS, Kakkasageri MS, Adiga DG. Message authentication in vehicular ad hoc
for vehicular communications: architectures, applications and test fields. IGI networks (VANETs): ECDSA based approach. In: Proceedings of the interna-
Global Publishers, USA; 2012. tional conference on future computer and communication. Kuala Lumpur,
Karim R. VANET: superior system for content distribution in vehicular network Malaysia; April 2009.
applications 〈http://www.cs.rutgers.edu/rmartin/teaching/fall08/cs552/posi Manvi SS, Kakkasageri MS, Mahapurush CV. Performance analysis of AODV, DSR,
tion-papers/011-01.pdf〉; [accessed 25.06.13]. and swarm intelligence routing protocols in vehicular ad hoc network (VANET)
Killat M. The impact of inter-vehicle communication on vehicular traffic. PhD environment. In: Proceedings of the international conference on future com-
thesis, Scientific Publishing 〈http://uvka.ubka.uni-karlsruhe.de/shop/download/ puter and communication. Kuala Lumpur, Malaysia; April 2009.
1000013827〉; [accessed 25.06.13]. Manvi SS, Kakkasageri MS, Pitt J. Multiagent based information dissemination in
Kim THJ, et al. VANET alert endorsement using multi-source filters. In: Proceedings vehicular ad-hoc networks (VANETs). Mobile Inf Syst J 2009d;5(November
of the 7th ACM international workshop on vehicular internetworking. Chicago, (4)):363–89.
IL, USA; 2010. p. 51–60. Marmol FG, Perez GM. TRIP, a trust and reputation infrastructure-based proposal
Kone V, et al. On infostation density of vehicular networks. In: Proceedings of the for vehicular ad hoc networks. J Network Comput Appl 2012;35(May
IEEE 5th annual international conference on wireless internet (WICON 2010). (3)):934–41.
Singapore; March 2010. p. 1–9. Martinez FJ, et al. A VANET solution to prevent car accidents 〈www.grc.upv.es/
Koubek M, Rea S, Pesch D. Event suppression for safety message dissemination in calafate/download/Jornadas_Paper_Paco.pdf〉; 2008.
VANETs. In: Proceedings of the IEEE vehicular technology conference (VTC). Miklos M, Vida R., Reliable gossiping in inter-vehicle communication. IEEE 72nd
Taipei, Taiwan; 2010. p. 1–5. vehicular technology conference fall (VTC 2010 – Fall); September 2010, p. 1-5
Koubek M, Rea S, Pesch D. Reliable delay constrained multihop broadcasting in 〈www.hiradastechnika.hu/data/upload/file/.../Pages_from_HT0901a_4.pdf〉.
VANETs. EURASIP J Adv Signal Process 2010. Doi:http://dx.doi.org/10.1155/2010/ Miller J. Aggregation algorithms in a vehicle-to-vehicle-to-infrastructure (V2V2I)
753256. intelligent transport system architecture. In: 3rd international symposium of
Krishnamurthy P. Information dissemination and information assurance in vehi- transport simulation. Queensland, Australia; August 2008.
cular networks: a survey. In: Proceedings of the conference. Los Angeles, USA; Molina-Gil JM, et al. Data aggregation for information authentication in VANETs. In:
2008. p. 1546–51. Proceedings of the 6th international conference on information assurance and
Kumar D, Kherani AA, Altman E. Route lifetime based optimal hop selection in security. Atlanta; August 2010. p. 282–7.
VANETs on highway: an analytical viewpoint. In: Proceedings of the interna- Moreno MT, et al. System design for information dissemination in VANETs. In:
tional federation for information processing (IFIP) networking. Coimbra, Proceedings of the 3rd international workshop on intelligent transportation
Portugal; 2006. p. 799–814. (WIT). Hamburg, Germany; March 2006. p. 27–33.
Kwak JS, Lee JH. Infrared transmission for inter vehicle ranging and vehicle-to- Motsinger C, Hubing T. A review of vehicle-to-vehicle and vehicle-to-infrastructure
roadside communication systems using spread spectrum technique. IEEE Trans initiatives”. Technical Report 〈www.cvel.clemson.edu/pdf/CVEL-07-003.pdf〉;
Intell Transp Syst 2004;5(1):12–9. [accessed 25.06.13].
Laurendeau C, Barbeau M. Threats to security in DSRC/WAVE. In: Proceedings of the 5th Mouftah HT, Khanafer M, Guennoun M. Wireless sensor network architectures for
international conference on ad-hoc networks. Ottawa, Canada; 2006. p. 266–79. intelligent vehicular systems 〈www.mcit.gov.sa/nr/rdonlyres/08880e2f-f4c9-
Leea E, Ohb SY, Gerlaa M. RFID assisted vehicle positioning in VANETs. Pervasive 4029-988f.../paper2.pdf〉; [accessed 25.06.13].
Mobile Comput 2012;8(April (2)):167–79. Nekovee M. Sensor networks on the road : the promises and challenges of vehicular
Lee U, et al. MOBEYES: smart mobs for urban monitoring with a vehicular sensor ad hoc networks and grids. In: Proceedings of the workshop on ubiquitous
network. IEEE Wireless Commun 2006;13(5):52–7. computing and e-Research. Edinburgh, UK; 2005. p. 30–9.
Lee U, et al. Dissemination and harvesting of urban data using vehicular sensing Nzouonta J, et al. VANET routing on city roads using real-time vehicular traffic
platforms. IEEE Trans Vehicular Technol 2009;58(February (2)):882–901. information. IEEE Trans Vehicular Technol 2009;58(September (7)):3609–26.
Leinmuller T, et al. SEVECOM—secure vehicle communication 〈www.hit.bme.hu/ Oliveira R, et al. Towards the use of XOR-based routing protocols in vehicular ad hoc
buttyan/publications/Leinmueller+06ist.pdf〉; 2006. networks. In: Proceedings of the IEEE vehicular technology conference. Buda-
Lerchbaumer P, Ochoa A, Uhlemann E. Test environment design for wireless vehicle pest, Hungary; May 2011.
communications 〈www2.hh.se/staff/bettan/Publications/LerOchUhlWiVeC07. Park J, et al. Emergency related video streaming in VANETs using network coding
pdf〉; 2007. 〈netlab.cs.ucla.edu/wiki/files/TR070016.pdf〉; [accessed 25.06.13].
Li F, Wang Y. Routing in vehicular ad hoc networks: a survey. IEEE Vehicular Park S, Aslam B, Zou CC. Long-term reputation system for vehicular networking
Technol Mag 2007;2(2):12–22. based on vehicle's daily commute routine. In: Proceedings of the IEEE consumer

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i
M.S. Kakkasageri, S.S. Manvi / Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 17

communications and networking conference (CCNC). Las Vegas, Nevada, USA; simTDResearch Project 〈Dsntm.kit.edu/english/2215_3090.php〉.
January 2011. p. 436–41. Slavik M, Mahgoub I. Stochastic broadcast for VANET. In: Proceedings of the 7th
Paruchuri V, Durresi A. PAAVE: protocol for anonymous authentication in vehicular IEEE consumer communications and networking conference (CCNC). Las Vegas,
networks using smart cards. In: Proceedings of the IEEE global telecommunica- Nevada, USA; January 2010. p. 1–5.
tions conference (GLOBECOM). Miami, USA; 2005. p. 1–5. Sommer C, Tonguz OK, Dressler F. Traffic information systems: efficient message
Pereira PR, et al. From delay-tolerant networks to vehicular delay-tolerant dissemination via adaptive beaconing. IEEE Commun Mag 2011;49(May (5)):173–9.
networks. IEEE Commun Surv Tutorials 1999:1–17. Stampoulis A, Chai Z. A survey of security in vehicular networks 〈zoo.cs.yale.edu/
Picconi F, et al. Probabilistic validation of aggregated data in vehicular ad-hoc networks. ams257/projects/wireless-survey.pdf〉; [accessed 25.06.13].
In: 3rd international workshop on vehicular ad hoc networks. USA; 2006. p. 76–85. Studer A, Luk M, Perrig A. Efficient mechanisms to provide convoy member and
Pigne Y, Danoy G, Bouvry P. A platform for realistic online vehicular network vehicle sequence authentication in VANETs. In: Proceedings of the 3rd inter-
management. In: Proceedings of the IEEE international workshop on management national conference on security and privacy in communication networks
of emerging networks and services. Miami, Florida; 2009 USA; 2010. p. 615-9. (SecureComm 2007). Nice, France; September 2007. p. 422–32.
Qadri N, et al. Resilient P2P multimedia exchange in a VANET. In: Proceedings of the Taleb T, Benslimane A. Design guidelines for a network architecture integrating
2nd IFIP conference on wireless days (WD'09). France; 2009, p. 18–23. VANET with 3G and beyond networks. In: IEEE global telecommunications
Rabadi NM. Implicit certificates support in IEEE 1609 security services for wireless conference (GLOBECOM). Miami, Florida, USA; 2010. p. 1–5.
access in vehicular environment (WAVE). In: Proceedings of the IEEE 7th Tamer N, Pravin S, Liviu I. A comparative study of data dissemination models for
international conference on mobile ad hoc and sensor systems (MASS). San VANETs. In: Proceedings of the third annual international conference on mobile
Francisco, CA, USA; 2010. p. 531–7. and ubiquitous systems: networking and services. San Jose, USA; 2006. p. 1–10.
Rahman SU, Hengartner U. Secure crash reporting in vehicular ad hoc networks Tan MC, et al. An aggregation approach to short-term traffic flow prediction. IEEE
〈https://koala.cs.pub.ro/redmine/attachments/70/JCS275.pdf〉. Trans Intell Transp Syst 2009;10(March (1)):60–9.
Rajwani S. Content dissemination mechanisms in VANETS: a comparative study Toor Y, Muhlethaler P, Laouiti A. Vehicle ad hoc networks: applications and related
〈www.isk.kth.se/rajwani/2G1330/FinalPaper.pdf〉. technical issues. IEEE Commun Surv Tutorials 2008;10(3):74–8.
Rashid S, et al. A traffic chaos reduction approach for emergency scenarios. In: Torrent-Moreno M, Santi P, Hartenstein H. Fair sharing of bandwidth in VANETs. In:
Proceedings of the 1st international workshop on research challenges in next Proceedings of the 2nd ACM international workshop on vehicular ad hoc
generation networks for first responders and critical infrastructures (NetCri). networks. Cologne, Germany; 2005, p. 49–58.
New Orleans, LA; April 2007. p. 576–8. Tripp C, et al. Performance evaluation of a hybrid sensor and vehicular network to
Rawshdeh ZY, Mahmud SM. Toward strongly connected clustering structure in improve road safety. In: Proceedings of the 7th ACM workshop on performance
vehicular ad hoc networks 〈www.eng.wayne.edu/smahmud/PersonalData/.../ evaluation of wireless ad hoc, sensor, and ubiquitous networks. Paphos, Cyprus;
IEEEVTC_Sep09.pdf〉. October 2012. p. 71–8.
Raya M, Aziz A, Hubaux JP. Efficient secure aggregation in VANETs. In: Proceedings Trullols O, et al. Information dissemination in VANETs: deployment strategies for
of the international workshop on vehicular ad hoc networks (VANET). Los maximizing coverage 〈upcommons.upc.edu/e-prints/bitstream/2117/9897/.../
Angeles, California, USA; 2006. p. 67–75. trullols-EuroNF09.pdf〉; 2009.
Reichardt D, et al. CarTALK 2000—safe and comfortable driving based upon inter- Tsai HW, Chen TS, Lin SK. Dissemination of data aggregation in vehicular ad hoc
vehicle-communication. In: Proceedings of the IEEE intelligent vehicle sympo- networks. In: Proceedings of the international symposium on pervasive systems,
sium. Versailles, France; 2002. p. 545–50. algorithms, and networks (ISPAN). Kaohsiung, Taiwan; 2009. p. 625–30.
Resta G, Santi P, Simon J. Analysis of multi-hop emergency message propagation in Vahidi A, Eskandarian A. Research advances in intelligent collision avoidance and
vehicular ad hoc networks. In: Proceedings of the ACM international sympo- adaptive cruise control. IEEE Trans Intell Transp Syst 2003;4(3):143–53.
sium on mobile ad hoc networking and computing (MobiHoc). Montreal, Viejo A, Sebe F, Ferrer JD. Aggregation of trustworthy announcement messages in
Canada; 2007. p. 140–9. vehicular ad hoc networks. In: Proceedings of the IEEE 69th vehicular
Ribagorda A. Overview Of security issues in vehicular ad-hoc networks 〈e-archivo. technology conference. Spain; April 2009. p. 1–5.
uc3m.es/.../9395/.../Overview-VANET-security-issues-earchivo.pdf〉; [accessed Wang SY. On multi-hop forwarding over WBSS-based IEEE 802.11(p)/1609 networks. In:
25.06.13]. Proceedings of the IEEE 20th international symposium on personal, indoor and
Rizvi SR, et al. A novel approach to reduce traffic chaos in emergency and mobile radio communications (PIMRC). Tokyo, Japan; 2009. p. 3040–4.
evacuation scenarios. In: IEEE vehicular technology conference (VTC). Balti- Wang NW, Huang YM, Chen WM. A novel secure communication scheme in
more, Maryland; 2007. p. 1937–41. vehicular ad hoc networks. J Comput Commun 2008;31(July (12)):2827–37.
Roessler B, Bruns C. Replication of local road networks for regional information Wegener A, et al. AutoCast: an adaptive data dissemination protocol for traffic
dissemination in VANETS. In: Proceedings of the the 3rd workshop on positioning, information systems. In: Proceedings of the IEEE 66th vehicular technology
navigation and communication (WPNC'06). Hannover, Germany; March 2006. conference. Baltimore, MD, USA; October 2007. p. 1947–51.
Rybicki J, et al. Challenge: peers on wheels a road to new traffic information systems. In: Wu Q, Domingo-Ferrer J, Gonzalez-Nicolas U. Balanced trustworthiness, safety and
Proceedings of the ACM international conference on mobile computing and privacy in vehicle-to-vehicle communications. IEEE Trans Vehicular Technol
networking (MobiCom). Montreal, Quebec, Canada; 2007. p. 215–21. 2010;59(February (2)):559–73.
Saleet H, Basir O. Location-based message aggregation in vehicular ad hoc net- Xi R, Lin N, Chen Y. Compression and aggregation for logistic regression analysis in
works. In: Proceedings of the IEEE global communications conference work- data cubes. IEEE Trans Knowl Eng 2009;21(April (4)):479–92.
shops. Washington, DC, USA; November 2007. p. 1–7. Yang L, Guo J, Wu Y. Piggyback cooperative repetition for reliable broadcasting of
Salhi I, Cherif M, Senouci SM. Data collection in vehicular networks 〈www.senouci. safety messages in VANETs. In: Proceedings of the 6th IEEE conference on
net/download/Publications/.../2008/Senouci_ASNS2008.pdf〉; 2008. consumer communications and networking conference (CCNC'09). Las Vegas,
Santa J, et al. Assessment of VANET multi-hop routing over an experimental Nevada; 2009, p. 1165–9.
platform. Int J Internet Protocol Technol 2009;4(3):158–72. Yang L, et al. Channel adaptive one hop broadcasting for VANETs. In: Proceedings of
Scheuermann B, et al. A fundamental scalability criterion for data aggregation in the IEEE conference on intelligent transportation systems. Beijing, China;
VANETs. In: Proceedings of the 15th annual international conference on mobile October 2008. p. 369–4.
computing and networking; September 2009. Ye F, et al. Efficiency and reliability of one-hop broadcasting in vehicular ad hoc
Schmidt RK, et al. Adapting the wireless carrier sensing for VANETs. In: Proceedings networks. IEEE J Selected Areas Commun 2011;29(1):151–60.
of the 7th international workshop on intelligent transportation (WIT 2010). Yu B, Xu C. Vehicular ad-hoc networks: an information-centric perspective. ZTE
Hamburg, Germany; March 2010. Commun 2010;8(September (3)):10–52.
Schmidt RK, et al. Degradation of communication range in VANETS caused by Yu B, Xu CZ, Guo M. Adaptive forwarding delay control for VANET data aggregation.
interference 2.0—real-world experiment. In: Proceedings of the 3rd international IEEE Trans Parallel Distributed Syst 2012;23(January (1)):11–8.
communication technologies for vehicles. Germany; March 2011. p. 176-88. Zeadally S, et al. Vehicular ad hoc networks (VANETS): status, results, and
Schnaufer S, et al. Vehicular ad-hoc networks: single-hop broadcast is not enough. challenges. Telecommun Syst 2012;51(October/November (2–3)).
In: Proceedings of the 3rd international workshop on intelligent transportation Zhang W, et al. Congestion control for safety messages in VANETs: concepts and
(WIT). Hamburg, Germany; March 2006. p. 49–54. framewor. In: Proceedings of the intelligent transport systems telecommunica-
Schoch E, et al. Communication patterns in VANETs. IEEE Commun Mag 2008;46 tions (ITST). Phuket, Thailand; 2008. p. 199–203.
(11):119–25. Zhang C, Lin X, Lu R. An efficient message authentication scheme for vehicular
SCOREF Project 〈wiki.fot-net.eu/index.php?title=SCOREF〉; [accessed 25.06.13]. communications. IEEE Trans Vehicular Technol 2008b;57(November (6)):3357–68.
Segata M, Cigno RL. Models and performance of VANET based emergency braking Zhu H, et al. AEMA: an aggregated emergency message authentication scheme for
eprints.biblio.unitn.it/1961/1/TR-DISI-11-354.pdf. enhancing the security of vehicular ad hoc networks. In: Proceedings of the
Sha K, Wang S, Shi W. RD4: role-differentiated cooperative deceptive data detection IEEE international conference on communications (ICC). Beijing, China; May
and filtering in VANETs. IEEE Trans Vehicular Technol 2010;59(3):1183–90. 2008. p. 1436–40.
Shibata N, et al. A method for sharing traffic jam information using inter- Zhu H, et al. Impact of traffic influxes: revealing exponential inter-contact time in urban
vehicle communication 〈http://ito-lab.naist.jp/themes/pdffiles/060725.shibata. VANETs. IEEE Trans Parallel Distributed Syst 2011;22(August (8)):1258–66.
v2vcom06.pdf〉; [accessed 25.06.13]. Zimmermann K, Egger L, Brunner M. Self-management of wireless base stations. In:
Sichitiu ML, Kihl M. Inter-vehicle communication systems: a survey. IEEE Commun Proceedings of the IEEE workshop on management issues and challenges in
Surv 2008;10(2):88–105. mobile computing. Nice; 2005. p. 119–123.

Please cite this article as: Kakkasageri MS, Manvi SS. Information management in vehicular ad hoc networks: A review. Journal of
Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.015i

You might also like