SlideShare uma empresa Scribd logo
1 de 9
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
23
SIGNATURE SEEKING DRIVE FOR INCENTIVE BASED AD
DISSEMINATION IN VEHICULAR NETWORKS
Dr.S.Rajalakshmi1
, S.T.Tharani2
1
Associate Professor, Department of Computer Science and Engineering, Jay Shriram Group
of Institutions
2
Assistant Professor, Department of Computer Science and Engineering, Jay Shriram Group
of Institutions
ABSTRACT
This paper explores the concept of vehicular adhoc network (VANET).Here, the
communication nodes are vehicles. Each and every vehicle can communicate with each other
and also can communicate with infrastructure for some service. This infrastructure is
imagined to be presented along the roads. By using this vehicular adhoc network, the users
can have more benefits and services. A promising application over vehicular adhoc network
is, an advertiser can use this VANET to distribute their ads through vehicle to vehicle
communication. Due to the non-cooperative node (Selfish and malicious nodes), this ad
system cannot be realized until the correct incentives and security process are in place. The
work describes the Signature Seeking Drive which is the secure framework, which performs
the cooperative distribution of ad message between vehicular users in secure manner. The
Public Key Infrastructure provided incentive to cooperative nodes. Our proposed work also
search to develop an incentive system in which an ad provider can provides the rewards
directly to the users and pedestrians also distribute their ads through their smart PDAs.
Keywords - Vehicular Ad hoc Network (VANET), Ad Dissemination, Incentive, Public Key
Infrastructure (PKI).
I. INTRODUCTION
This work introduced the vehicular ad hoc network, which performs on the road
through the smart vehicle consists of computing resources, sensing devices and short range
radios for communicating with other vehicles and also roadside infrastructure.Here,the main
thing is networks on the road and it gives some services. An ad distribution through vehicle
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 3, May-June (2013), pp. 23-31
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
24
to vehicle communication is the most truthful application over the networks. By using this
system an ads can be distributed through vehicle to roadside communication by ad provider.
Then other vehicles start to distribute those ads by forwarding them to another vehicle while
moving when it received the information. Similarly each vehicle can forward those ads
continuously for a particular time period. In this, the selfish users don’t want to forward the
ads whenever it received the ads. The network by sending out dummy ads, without correct
security, that’s why the incentive and security process has been taken.
In such system, Public Key Infrastructure is the best way to satisfy the security
requirements in vehicle communication by digital signature. It gives its certified identity and
secure location verify scheme. By this authentication, security in VANETs becomes strong.
This paper presented one secure incentive framework for ad distribution in VANET which is
named as Signature Seeking Drive (SSD). It provides incentive to the users based on their ad
services. It just likes a reward which is provided by micropayment charging/rewarding
scheme. During the driving, it may collect many receipts. By using this receipt, user can
exchange the receipt to virtual cashier and get some cash from receipt-providing nodes. By
using this virtual cash, users can fill the gas for their vehicles in gas station.
Goal of the paper
Advertisers in all those types probably want to spread their ads in secure
manner.However,from a viewpoint of vehicle users, those commercial ads are only give the
benefit to the business companies and they are exploiting vehicle user’s resources for their
own profit. Users probably want some type of incentive to stimulate cooperation. Thus the
graceful compromise between these two sides is that advertisers pay charges for network
resources or advertising charges. Vehicular ad system projected secure incentive framework
for commercial ad spread in VANETs which is named as Signature Seeking Drive
(SSD).This framework stimulates cooperative distribution of ad messages among vehicular
users in a secure way and it also provided the secure ad distribution between the vehicles and
pedestrians PDAs.
II. SYSTEM MODEL
In this section to described our vehicular network module.
A.VANET Network module
We used SWANS (Scalable Wireless Ad hoc Network Simulation) vehicular network
simulator. SWANS have been shown to be scalable and efficient; it supported the large
number of mobile nodes. SWANS fully implemented the IEEE 802.11a protocol. All vehicles
in our simulations have a transmission range of 300m. The roadway is a four-lane divided
highway of length 100 km. Vehicles are entered into that highway according to the Poisson
distribution and travel at a maximum speed of 30 m/s. The simulation is run for 360 seconds
and generated the 500 vehicles. In the 360-second simulation runtime, the maximum distance
traveled by any vehicle is 10 km. In the high density case there are averages of 90 vehicles /
km. In medium density traffic, there is an average of 66 vehicles / km and in low density
there is an average of 53 vehicles / km.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
25
In this module we develop a VANET Network model. In that each node (vehicle) can
communicate with other nearby nodes (vehicles) to perform some useful applications. Our
vehicular network module assumes that, each registered node keeps its own certificate [i.e.,
public/private key pair issued by a certificate authority (CA)]
Certificate authority (CA)
The certificate authority has two roles:
1) Government Authority
2) Vehicle Manufacturer
In this the first one has many administrative problems, the vehicle manufacturer also
trustworthy one. So we need to give proper security to our VANET.
Vehicular Authority (VA)
The vehicular authority (VA) is the authority provider; it is given the authority to all the
vehicles to disseminate their ad in the VANET. The vehicle that get the permission from
VANET only disseminate ad in the network.VA also maintain the all ad payment transaction.
Utilize SWANS (Scalable Wireless Ad hoc
Network Simulation) vehicular network
simulator fully implements the IEEE
802.11a protocol
Vehicles are with transmission range of
300m and the roadway used is a four-lane
divided highway of length 100 km with total
simulation time 360 seconds.
A vehicle enters the highway according to a
Poisson distribution and travel at a
maximum speed of 30 m/s and the
maximum distance traveled by any vehicle
is 10 km.
Each node (vehicle) can communicate with
other nearby nodes (vehicles) or with fixed
roadside (fixed node) infrastructure
regarding safety-related warning functions,
traffic management, infotainment, payment
services, etc..,
Fig.1. Vehicular network module
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
26
B. One Level Advertisement
In one level advertisement the only one vehicle has the authority to disseminate the ad
in the VANET. Other vehicles are not having the authority to reuse the ad and this module
only suitable for local area communication.
Notations
Agreement with ADP
Advertisement dissemination
Approval for advertisement
Receipt redemption
One
level
advertis
ement
Fig. 2. One level advertisement
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
27
C. Multi Level Advertisement
In Multi level advertisement each every vehicles have the authority to disseminate the
ad in the VANET. The ad get by the one vehicle, it is nearer to the ad distribution point
(ADP).That ad should be reused by all the vehicles that have the vehicular authority over the
network. It is suitable for wide area communication.
I→VA: Commercial advertiser (I) get
permission from Vehicle authority (VA)
to disseminate ad for a certain period of
time and certain location
VA→I: After approval from VA, I
distribute its ad
I →u: Vehicle (u) agrees to
forward the ad of I at Ad
u → v: “u” continues to
advertise it to any newly
encountered vehicle or PDA
of pedestrian ”v” for a certain
Receiving vehicles returns digitally
signed reception for sending vehicle
These receipts are exchangeable at
Virtual Cashier (VC)
VC → VA: Virtual Cashier (VC)
sends the record to VA
VA → I: VA charges I for ad
dissemination of u as well as v
Similarly v → w, w → x, x
→ y, y → z
Multile
vel
Adverti
sement
Fig. 3 Multilevel Advertisement
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
28
Fig 4. Localized Advertisement
Localized advertisement
Provider S can specify/include its target
advertising area along with the ad, and S’s
ADP contacts with each approaching
vehicle u
LOCS is the center (location coordinates) of
S’ target advertising area, and RNS is the
intended adverting radius (from LOCS).
u is not able to obtain a valid receipt outside
the target area (as described below) it
forwards ADS only within the specified
target area.
Locating information
After the proper message exchange with
ADP (depending on the ad-model used), u is
ready to advertise ADS
GPS-Based Approach:
While in the target area
(by checking if d (LOCu,
LOCS) ≤ RNS, where d(i,
j) is the distance between
two locations i and j, and
LOCu is u’s location
coordinate available by
GPS), adverting vehicle
u may advertise ADS to
any newly approaching
vehicle v
Infrastructure Based Approach Vehicles
can obtain their location information from
the infrastructure that broadcasts beacon
signals. the existing cellular base stations
periodically broadcast one beacon signal
per second, and the signals carry
information such as a cellular network
identifier, location, timestamp, signature,
gateway address, paging area ID, and other
base station parameters. Using such
information, ad-receiving node v can react
to ADS forwarded from u
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
29
Start
Initial registration
of vehicles for VA
and CA public
key that becomes
Advertiser (I) who
needs to disseminate
their ad request
permission from
After approval Advertiser distribute
their ad for certain period and
certain area
A vehicle (u) agrees
to forward I’s ad at
Ad Distribution Point
(ADP)
Vehicle (u) continues
to advertise it to any
encountered vehicle or
road side pedestrian’s
PDA or smart phone
using localization
information
Receiving vehicle v,
returns digitally signed
receipt for u. This is
called single level ad
If then v transmits to
more nodes/vehicles
and digitally signed
receipt returned for
sender nodes. This is
called multilevel ad
These receipts are exchangeable at VC where
VC sends record to VA and it in turn charges
advertiser (I)
Stop
Initial registration of
pedestrian’s device
for PA and CA
public key that
becomes preloaded
Advertiser(I)
request
permission
from Pedestrian
Authority (PA)
The pedestrian
device (u) agrees to
forward I’s ad at Ad
Distribution Point
(ADP)
Pedestrian (u)
continues to
advertise it to any
encountered
vehicle or road
side pedestrian’s
PDA or smart
phone using
localization
Receiver,
returns
digitally
signed receipt
for u. This is
called single
level ad
dissemination
Fig. 5. Vanet with PDA
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
30
D. Localized Advertisement
In localized advertisement some advisers want to disseminate their ad in particular
geographic area, for that purpose we used the localized model. Here we used the Location
coordinates (LOCs), S is the ad distributor and RNs is the adverting radius. In this we used
two approaches
1) GPS based Approach
2) Infrastructure based Approach
In the GPS based approach to estimated the distance between the two locations, if that value
is less than or equal to the RNs, after that only it disseminate the ad otherwise ad is not
disseminated in the network. But in GPS based approach we have one disadvantage; in this
not verify the receipt providing node authority. It should be satisfied in Infrastructure based
approach; in this we verified the receipt providing node authority by using the beacon signal
from base station, it should be nearer to the receipt providing node.
E.VANET with PDA
In this implemented the vehicular network with pedestrians Smart PDAs. Whenever
the vehicle to vehicle communication (V2V) and vehicle to infrastructure communication
(V2I) is not possible that time the advertiser send their ads to the nearby pedestrians Smart
PDAs. Through those PDAs, that ad should be disseminating to the nearby vehicle. By using
this approach the ad dissemination speed will be increased. In this work also the security
overhead may be occurred and it should be managed by our Signature Seeking Drive
framework.
III CONCLUSION
The dissemination of commercial advertisements in VANETs is based on practical
aspects such as advertising intensity and dissemination locality. With both selfish users
(incentives) and malicious users (security) the developed SSD secure incentive framework
stimulates cooperative dissemination of ad messages among vehicular users in a secure way.
The SSD employs the concept of virtual cash to charge and reward the provision of
advertising service as an incentive for users in the network. The performance evaluation
results of SSD through analysis and simulation experiments reveal its robustness in both
incentive and security perspectives against various types of attacks and it showed the
effectiveness of our advertisement models.
REFERENCES
1. N. Ben Salem, L. Buttyan, J.-P. Hubaux, and M. Jakobsson, (2003), A Charging and
Rewarding Scheme for Packet Forwarding, in Proc. ACM
MobiHoc, pp. 13–24.
2. L. Buttyan and J. P. Hubaux, (2003), Stimulating cooperation in self organizing Mobile Ad
hoc Networks, ACM J. Mobile Netw., Vol. 8, No. 5, pp. 579–592.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
31
3. S. Buchegger and J.-Y. L. Boudec, (2002), Nodes bearing grudges: Towards Routing
security, fairness, and robustness in mobile ad hoc networks, in Proc. Eur. Workshop Parallel,
Distrib. Netw.-Based Process, pp. 403–410.
4. S. Eapkun, L. Buttyan, and J.-P. Hubaux, (2003), SECTOR: Secure tracking of Node
encounters in multi-hop Wireless Network”, in Proc. ACMWorkshop SASN, pp. 21–32.
5. S. Eapkun and J.-P. Hubaux, (2005) “Secure positioning of wireless devices with
Application to Sensor Networks”, in Proc. IEEE INFOCOM, Miami, FL, pp. 1917–1928.
6. J. Deng, R. Han, and S. Mishra, (2005), Defending against path-based DoS Attacks in
Wireless Sensor Networks”, in Proc. ACM Workshop SASN, pp. 89–96.
7. A.Garyfalos and K. C. Almeroth, (2008), Coupons: A Multilevel Incentive Scheme for
Information Dissemination in Mobile Networks”, IEEE Trans. Mobile Comput. Vol. 7, No. 6,
pp. 792–804.
8. M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, (2006), Nash equilibria of Packet
Forwarding strategies in Wireless Ad hoc Networks”, IEEE Trans. Mobile Comput., Vol. 5,
No. 5, pp. 463–476.
9. W. R. Heinzelman, J. Kulik, and H. Balakrishnan, (1999), Adaptive Protocols for
Information Dissemination in Wireless Sensor Networks”, in Proc. ACM MobiCom, pp.
174–185.
10. Mohd Umar Farooq and Dr .Khaleel Ur Rahman Khan, “The Novel Techniques for Data
Dissemination in Vehicular Networks to Triumph Over Broadcast Storm Problem”,
International Journal of Advanced Research in Engineering & Technology (IJARET),
Volume 4, Issue 3, 2013, pp. 264 - 272, ISSN Print: 0976-6480, ISSN Online: 0976-6499.
11. Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy
Constrained Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal
of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2,
2012, pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472

Mais conteúdo relacionado

Mais procurados

Dynamic Real time taxi ride-sharing android Application
Dynamic Real time taxi ride-sharing android Application  Dynamic Real time taxi ride-sharing android Application
Dynamic Real time taxi ride-sharing android Application IRJET Journal
 
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Dr. Amarjeet Singh
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
 
Cisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AICisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AICarl Jackson
 
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...Sivaram P
 
Inter vehicular communication
Inter vehicular communicationInter vehicular communication
Inter vehicular communicationMSharathRajan
 
Vehicle-2-Vehicle Communication Based on Wireless Sensor Network
Vehicle-2-Vehicle Communication Based on Wireless Sensor NetworkVehicle-2-Vehicle Communication Based on Wireless Sensor Network
Vehicle-2-Vehicle Communication Based on Wireless Sensor NetworkjournalBEEI
 
Introduction to the connected vehicle imsa 2015 annual conference
Introduction to the connected vehicle   imsa 2015 annual conferenceIntroduction to the connected vehicle   imsa 2015 annual conference
Introduction to the connected vehicle imsa 2015 annual conferenceJim Frazer
 
Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation designProf Ansari
 
Future mobile networks connected and autonomous cars
Future mobile networks  connected and autonomous carsFuture mobile networks  connected and autonomous cars
Future mobile networks connected and autonomous carslammya aa
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioHCL Technologies
 
The Autonomous Revolution of Vehicles & Transportation 6/12/19
The Autonomous Revolution of Vehicles & Transportation 6/12/19The Autonomous Revolution of Vehicles & Transportation 6/12/19
The Autonomous Revolution of Vehicles & Transportation 6/12/19Mark Goldstein
 
Smart Card: A study of new invention on bus fare in Dhaka city
Smart Card: A study of new invention on bus fare in Dhaka citySmart Card: A study of new invention on bus fare in Dhaka city
Smart Card: A study of new invention on bus fare in Dhaka cityMd. Abdul Munem
 
Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles Jeffrey Funk
 
Connected cars - Internet of Things Mumbai (IoTMUM)
Connected cars - Internet of Things Mumbai (IoTMUM)Connected cars - Internet of Things Mumbai (IoTMUM)
Connected cars - Internet of Things Mumbai (IoTMUM)Sachin Pukale
 
Vision-based real-time vehicle detection and vehicle speed measurement using ...
Vision-based real-time vehicle detection and vehicle speed measurement using ...Vision-based real-time vehicle detection and vehicle speed measurement using ...
Vision-based real-time vehicle detection and vehicle speed measurement using ...JANAK TRIVEDI
 
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...IOSR Journals
 

Mais procurados (20)

Dynamic Real time taxi ride-sharing android Application
Dynamic Real time taxi ride-sharing android Application  Dynamic Real time taxi ride-sharing android Application
Dynamic Real time taxi ride-sharing android Application
 
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
 
Cisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AICisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AI
 
Ivc sem doc
Ivc sem docIvc sem doc
Ivc sem doc
 
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
 
Inter vehicular communication
Inter vehicular communicationInter vehicular communication
Inter vehicular communication
 
Vehicle-2-Vehicle Communication Based on Wireless Sensor Network
Vehicle-2-Vehicle Communication Based on Wireless Sensor NetworkVehicle-2-Vehicle Communication Based on Wireless Sensor Network
Vehicle-2-Vehicle Communication Based on Wireless Sensor Network
 
Introduction to the connected vehicle imsa 2015 annual conference
Introduction to the connected vehicle   imsa 2015 annual conferenceIntroduction to the connected vehicle   imsa 2015 annual conference
Introduction to the connected vehicle imsa 2015 annual conference
 
Ijetr042176
Ijetr042176Ijetr042176
Ijetr042176
 
Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation design
 
Future mobile networks connected and autonomous cars
Future mobile networks  connected and autonomous carsFuture mobile networks  connected and autonomous cars
Future mobile networks connected and autonomous cars
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
 
Truck Platooning at TTI
Truck Platooning at TTI Truck Platooning at TTI
Truck Platooning at TTI
 
The Autonomous Revolution of Vehicles & Transportation 6/12/19
The Autonomous Revolution of Vehicles & Transportation 6/12/19The Autonomous Revolution of Vehicles & Transportation 6/12/19
The Autonomous Revolution of Vehicles & Transportation 6/12/19
 
Smart Card: A study of new invention on bus fare in Dhaka city
Smart Card: A study of new invention on bus fare in Dhaka citySmart Card: A study of new invention on bus fare in Dhaka city
Smart Card: A study of new invention on bus fare in Dhaka city
 
Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles
 
Connected cars - Internet of Things Mumbai (IoTMUM)
Connected cars - Internet of Things Mumbai (IoTMUM)Connected cars - Internet of Things Mumbai (IoTMUM)
Connected cars - Internet of Things Mumbai (IoTMUM)
 
Vision-based real-time vehicle detection and vehicle speed measurement using ...
Vision-based real-time vehicle detection and vehicle speed measurement using ...Vision-based real-time vehicle detection and vehicle speed measurement using ...
Vision-based real-time vehicle detection and vehicle speed measurement using ...
 
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
 

Destaque

Email Signatures For Business
Email Signatures For BusinessEmail Signatures For Business
Email Signatures For BusinessBruce Jones
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 
Implementing eichelay formula in govt. construction projects
Implementing eichelay formula in govt. construction projectsImplementing eichelay formula in govt. construction projects
Implementing eichelay formula in govt. construction projectsIAEME Publication
 
Brazil mobile market: an insight by Neomobile
Brazil mobile market: an insight by NeomobileBrazil mobile market: an insight by Neomobile
Brazil mobile market: an insight by NeomobileNeomobile
 
Brystforstørrelse hos nygart
Brystforstørrelse hos nygartBrystforstørrelse hos nygart
Brystforstørrelse hos nygartNygart
 
Criando e trabalhando com e mail
Criando e trabalhando com e mailCriando e trabalhando com e mail
Criando e trabalhando com e mailinfoeducativa
 
Microsoft power point originale
Microsoft power point originaleMicrosoft power point originale
Microsoft power point originaleGlenn Ortega
 

Destaque (7)

Email Signatures For Business
Email Signatures For BusinessEmail Signatures For Business
Email Signatures For Business
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
Implementing eichelay formula in govt. construction projects
Implementing eichelay formula in govt. construction projectsImplementing eichelay formula in govt. construction projects
Implementing eichelay formula in govt. construction projects
 
Brazil mobile market: an insight by Neomobile
Brazil mobile market: an insight by NeomobileBrazil mobile market: an insight by Neomobile
Brazil mobile market: an insight by Neomobile
 
Brystforstørrelse hos nygart
Brystforstørrelse hos nygartBrystforstørrelse hos nygart
Brystforstørrelse hos nygart
 
Criando e trabalhando com e mail
Criando e trabalhando com e mailCriando e trabalhando com e mail
Criando e trabalhando com e mail
 
Microsoft power point originale
Microsoft power point originaleMicrosoft power point originale
Microsoft power point originale
 

Semelhante a Signature seeking drive for incentive based ad dissemination

Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELSIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELpijans
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
T-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdfT-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdfssusera9ccce1
 
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...IRJET Journal
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
A Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANETA Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANETIJERA Editor
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography Pallavi Agarwal
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
 
Towards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networksTowards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networkscsandit
 
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKSTOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKScscpconf
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communicationathirayanpericse
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingEditor IJCATR
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationIRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationIRJET Journal
 

Semelhante a Signature seeking drive for incentive based ad dissemination (20)

Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELSIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
T-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdfT-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdf
 
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
 
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
A Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANETA Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANET
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
VANET for Security using Cryptography
VANET for Security using Cryptography VANET for Security using Cryptography
VANET for Security using Cryptography
 
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
 
Towards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networksTowards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networks
 
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKSTOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communication
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic Routing
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous CarsAlgorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Último (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Signature seeking drive for incentive based ad dissemination

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 23 SIGNATURE SEEKING DRIVE FOR INCENTIVE BASED AD DISSEMINATION IN VEHICULAR NETWORKS Dr.S.Rajalakshmi1 , S.T.Tharani2 1 Associate Professor, Department of Computer Science and Engineering, Jay Shriram Group of Institutions 2 Assistant Professor, Department of Computer Science and Engineering, Jay Shriram Group of Institutions ABSTRACT This paper explores the concept of vehicular adhoc network (VANET).Here, the communication nodes are vehicles. Each and every vehicle can communicate with each other and also can communicate with infrastructure for some service. This infrastructure is imagined to be presented along the roads. By using this vehicular adhoc network, the users can have more benefits and services. A promising application over vehicular adhoc network is, an advertiser can use this VANET to distribute their ads through vehicle to vehicle communication. Due to the non-cooperative node (Selfish and malicious nodes), this ad system cannot be realized until the correct incentives and security process are in place. The work describes the Signature Seeking Drive which is the secure framework, which performs the cooperative distribution of ad message between vehicular users in secure manner. The Public Key Infrastructure provided incentive to cooperative nodes. Our proposed work also search to develop an incentive system in which an ad provider can provides the rewards directly to the users and pedestrians also distribute their ads through their smart PDAs. Keywords - Vehicular Ad hoc Network (VANET), Ad Dissemination, Incentive, Public Key Infrastructure (PKI). I. INTRODUCTION This work introduced the vehicular ad hoc network, which performs on the road through the smart vehicle consists of computing resources, sensing devices and short range radios for communicating with other vehicles and also roadside infrastructure.Here,the main thing is networks on the road and it gives some services. An ad distribution through vehicle INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 23-31 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 24 to vehicle communication is the most truthful application over the networks. By using this system an ads can be distributed through vehicle to roadside communication by ad provider. Then other vehicles start to distribute those ads by forwarding them to another vehicle while moving when it received the information. Similarly each vehicle can forward those ads continuously for a particular time period. In this, the selfish users don’t want to forward the ads whenever it received the ads. The network by sending out dummy ads, without correct security, that’s why the incentive and security process has been taken. In such system, Public Key Infrastructure is the best way to satisfy the security requirements in vehicle communication by digital signature. It gives its certified identity and secure location verify scheme. By this authentication, security in VANETs becomes strong. This paper presented one secure incentive framework for ad distribution in VANET which is named as Signature Seeking Drive (SSD). It provides incentive to the users based on their ad services. It just likes a reward which is provided by micropayment charging/rewarding scheme. During the driving, it may collect many receipts. By using this receipt, user can exchange the receipt to virtual cashier and get some cash from receipt-providing nodes. By using this virtual cash, users can fill the gas for their vehicles in gas station. Goal of the paper Advertisers in all those types probably want to spread their ads in secure manner.However,from a viewpoint of vehicle users, those commercial ads are only give the benefit to the business companies and they are exploiting vehicle user’s resources for their own profit. Users probably want some type of incentive to stimulate cooperation. Thus the graceful compromise between these two sides is that advertisers pay charges for network resources or advertising charges. Vehicular ad system projected secure incentive framework for commercial ad spread in VANETs which is named as Signature Seeking Drive (SSD).This framework stimulates cooperative distribution of ad messages among vehicular users in a secure way and it also provided the secure ad distribution between the vehicles and pedestrians PDAs. II. SYSTEM MODEL In this section to described our vehicular network module. A.VANET Network module We used SWANS (Scalable Wireless Ad hoc Network Simulation) vehicular network simulator. SWANS have been shown to be scalable and efficient; it supported the large number of mobile nodes. SWANS fully implemented the IEEE 802.11a protocol. All vehicles in our simulations have a transmission range of 300m. The roadway is a four-lane divided highway of length 100 km. Vehicles are entered into that highway according to the Poisson distribution and travel at a maximum speed of 30 m/s. The simulation is run for 360 seconds and generated the 500 vehicles. In the 360-second simulation runtime, the maximum distance traveled by any vehicle is 10 km. In the high density case there are averages of 90 vehicles / km. In medium density traffic, there is an average of 66 vehicles / km and in low density there is an average of 53 vehicles / km.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 25 In this module we develop a VANET Network model. In that each node (vehicle) can communicate with other nearby nodes (vehicles) to perform some useful applications. Our vehicular network module assumes that, each registered node keeps its own certificate [i.e., public/private key pair issued by a certificate authority (CA)] Certificate authority (CA) The certificate authority has two roles: 1) Government Authority 2) Vehicle Manufacturer In this the first one has many administrative problems, the vehicle manufacturer also trustworthy one. So we need to give proper security to our VANET. Vehicular Authority (VA) The vehicular authority (VA) is the authority provider; it is given the authority to all the vehicles to disseminate their ad in the VANET. The vehicle that get the permission from VANET only disseminate ad in the network.VA also maintain the all ad payment transaction. Utilize SWANS (Scalable Wireless Ad hoc Network Simulation) vehicular network simulator fully implements the IEEE 802.11a protocol Vehicles are with transmission range of 300m and the roadway used is a four-lane divided highway of length 100 km with total simulation time 360 seconds. A vehicle enters the highway according to a Poisson distribution and travel at a maximum speed of 30 m/s and the maximum distance traveled by any vehicle is 10 km. Each node (vehicle) can communicate with other nearby nodes (vehicles) or with fixed roadside (fixed node) infrastructure regarding safety-related warning functions, traffic management, infotainment, payment services, etc.., Fig.1. Vehicular network module
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 26 B. One Level Advertisement In one level advertisement the only one vehicle has the authority to disseminate the ad in the VANET. Other vehicles are not having the authority to reuse the ad and this module only suitable for local area communication. Notations Agreement with ADP Advertisement dissemination Approval for advertisement Receipt redemption One level advertis ement Fig. 2. One level advertisement
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 27 C. Multi Level Advertisement In Multi level advertisement each every vehicles have the authority to disseminate the ad in the VANET. The ad get by the one vehicle, it is nearer to the ad distribution point (ADP).That ad should be reused by all the vehicles that have the vehicular authority over the network. It is suitable for wide area communication. I→VA: Commercial advertiser (I) get permission from Vehicle authority (VA) to disseminate ad for a certain period of time and certain location VA→I: After approval from VA, I distribute its ad I →u: Vehicle (u) agrees to forward the ad of I at Ad u → v: “u” continues to advertise it to any newly encountered vehicle or PDA of pedestrian ”v” for a certain Receiving vehicles returns digitally signed reception for sending vehicle These receipts are exchangeable at Virtual Cashier (VC) VC → VA: Virtual Cashier (VC) sends the record to VA VA → I: VA charges I for ad dissemination of u as well as v Similarly v → w, w → x, x → y, y → z Multile vel Adverti sement Fig. 3 Multilevel Advertisement
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 28 Fig 4. Localized Advertisement Localized advertisement Provider S can specify/include its target advertising area along with the ad, and S’s ADP contacts with each approaching vehicle u LOCS is the center (location coordinates) of S’ target advertising area, and RNS is the intended adverting radius (from LOCS). u is not able to obtain a valid receipt outside the target area (as described below) it forwards ADS only within the specified target area. Locating information After the proper message exchange with ADP (depending on the ad-model used), u is ready to advertise ADS GPS-Based Approach: While in the target area (by checking if d (LOCu, LOCS) ≤ RNS, where d(i, j) is the distance between two locations i and j, and LOCu is u’s location coordinate available by GPS), adverting vehicle u may advertise ADS to any newly approaching vehicle v Infrastructure Based Approach Vehicles can obtain their location information from the infrastructure that broadcasts beacon signals. the existing cellular base stations periodically broadcast one beacon signal per second, and the signals carry information such as a cellular network identifier, location, timestamp, signature, gateway address, paging area ID, and other base station parameters. Using such information, ad-receiving node v can react to ADS forwarded from u
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 29 Start Initial registration of vehicles for VA and CA public key that becomes Advertiser (I) who needs to disseminate their ad request permission from After approval Advertiser distribute their ad for certain period and certain area A vehicle (u) agrees to forward I’s ad at Ad Distribution Point (ADP) Vehicle (u) continues to advertise it to any encountered vehicle or road side pedestrian’s PDA or smart phone using localization information Receiving vehicle v, returns digitally signed receipt for u. This is called single level ad If then v transmits to more nodes/vehicles and digitally signed receipt returned for sender nodes. This is called multilevel ad These receipts are exchangeable at VC where VC sends record to VA and it in turn charges advertiser (I) Stop Initial registration of pedestrian’s device for PA and CA public key that becomes preloaded Advertiser(I) request permission from Pedestrian Authority (PA) The pedestrian device (u) agrees to forward I’s ad at Ad Distribution Point (ADP) Pedestrian (u) continues to advertise it to any encountered vehicle or road side pedestrian’s PDA or smart phone using localization Receiver, returns digitally signed receipt for u. This is called single level ad dissemination Fig. 5. Vanet with PDA
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 30 D. Localized Advertisement In localized advertisement some advisers want to disseminate their ad in particular geographic area, for that purpose we used the localized model. Here we used the Location coordinates (LOCs), S is the ad distributor and RNs is the adverting radius. In this we used two approaches 1) GPS based Approach 2) Infrastructure based Approach In the GPS based approach to estimated the distance between the two locations, if that value is less than or equal to the RNs, after that only it disseminate the ad otherwise ad is not disseminated in the network. But in GPS based approach we have one disadvantage; in this not verify the receipt providing node authority. It should be satisfied in Infrastructure based approach; in this we verified the receipt providing node authority by using the beacon signal from base station, it should be nearer to the receipt providing node. E.VANET with PDA In this implemented the vehicular network with pedestrians Smart PDAs. Whenever the vehicle to vehicle communication (V2V) and vehicle to infrastructure communication (V2I) is not possible that time the advertiser send their ads to the nearby pedestrians Smart PDAs. Through those PDAs, that ad should be disseminating to the nearby vehicle. By using this approach the ad dissemination speed will be increased. In this work also the security overhead may be occurred and it should be managed by our Signature Seeking Drive framework. III CONCLUSION The dissemination of commercial advertisements in VANETs is based on practical aspects such as advertising intensity and dissemination locality. With both selfish users (incentives) and malicious users (security) the developed SSD secure incentive framework stimulates cooperative dissemination of ad messages among vehicular users in a secure way. The SSD employs the concept of virtual cash to charge and reward the provision of advertising service as an incentive for users in the network. The performance evaluation results of SSD through analysis and simulation experiments reveal its robustness in both incentive and security perspectives against various types of attacks and it showed the effectiveness of our advertisement models. REFERENCES 1. N. Ben Salem, L. Buttyan, J.-P. Hubaux, and M. Jakobsson, (2003), A Charging and Rewarding Scheme for Packet Forwarding, in Proc. ACM MobiHoc, pp. 13–24. 2. L. Buttyan and J. P. Hubaux, (2003), Stimulating cooperation in self organizing Mobile Ad hoc Networks, ACM J. Mobile Netw., Vol. 8, No. 5, pp. 579–592.
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 31 3. S. Buchegger and J.-Y. L. Boudec, (2002), Nodes bearing grudges: Towards Routing security, fairness, and robustness in mobile ad hoc networks, in Proc. Eur. Workshop Parallel, Distrib. Netw.-Based Process, pp. 403–410. 4. S. Eapkun, L. Buttyan, and J.-P. Hubaux, (2003), SECTOR: Secure tracking of Node encounters in multi-hop Wireless Network”, in Proc. ACMWorkshop SASN, pp. 21–32. 5. S. Eapkun and J.-P. Hubaux, (2005) “Secure positioning of wireless devices with Application to Sensor Networks”, in Proc. IEEE INFOCOM, Miami, FL, pp. 1917–1928. 6. J. Deng, R. Han, and S. Mishra, (2005), Defending against path-based DoS Attacks in Wireless Sensor Networks”, in Proc. ACM Workshop SASN, pp. 89–96. 7. A.Garyfalos and K. C. Almeroth, (2008), Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks”, IEEE Trans. Mobile Comput. Vol. 7, No. 6, pp. 792–804. 8. M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, (2006), Nash equilibria of Packet Forwarding strategies in Wireless Ad hoc Networks”, IEEE Trans. Mobile Comput., Vol. 5, No. 5, pp. 463–476. 9. W. R. Heinzelman, J. Kulik, and H. Balakrishnan, (1999), Adaptive Protocols for Information Dissemination in Wireless Sensor Networks”, in Proc. ACM MobiCom, pp. 174–185. 10. Mohd Umar Farooq and Dr .Khaleel Ur Rahman Khan, “The Novel Techniques for Data Dissemination in Vehicular Networks to Triumph Over Broadcast Storm Problem”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 3, 2013, pp. 264 - 272, ISSN Print: 0976-6480, ISSN Online: 0976-6499. 11. Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy Constrained Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472