Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

23.11.2016

Clustering Based Energy Efficient and Communication Protocol for Multiple Mix-Zones Over Road Networks

verfasst von: Qasim Ali Arain, Muhammad Aslam Uqaili, Zhongliang Deng, Imran Memon, Jichao Jiao, Muhammad Akram Shaikh, Asma Zubedi, Aisha Ashraf, Usman Ali Arain

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The collection of information is one of the most crucial processes in many internet-enabled applications for multiple mix-zones over road networks. It is essential to use road networks for prolonged time duration in an energy efficient manner. However, network life time increases in response of reducing the stability period (i.e. time required before first node dies).The stability period reduces due to the high energy variance of nodes. In this paper, we present a protocol named as clustering based energy efficient and communication protocol (CEECP) for multiple mix-zones over road networks, which is proposed to reduce the loop holes of prevailing clustering protocols. Additionally, we present a novel CEECP for chain scenario to connect with the road side units for gaining benefits of V2V as well as, V2I communication for Cooperative Traffic Information Systems. The stability period is responsible to preserve coverage properties of the network. It analysis that as the stability period increases, the trustworthiness of the network increases. Hence, it is indispensable to articulate a clustering protocol that shall be energy efficient, low energy variant and of high stability. It has been proved that our scheme outperforms SEECP and VBN as well as, includes its variants with respect to stability period and energy variance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bali, R. S., & Kumar, N. (2016). Secure clustering for efficient data dissemination in vehicular cyber–physical systems. Future Generation Computer Systems, 56, 476–492.CrossRef Bali, R. S., & Kumar, N. (2016). Secure clustering for efficient data dissemination in vehicular cyber–physical systems. Future Generation Computer Systems, 56, 476–492.CrossRef
2.
Zurück zum Zitat Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82, 1585–1600.CrossRef Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82, 1585–1600.CrossRef
3.
Zurück zum Zitat Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508. doi:10.1007/s11277-015-2699-1.CrossRef Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508. doi:10.​1007/​s11277-015-2699-1.CrossRef
4.
5.
Zurück zum Zitat Cuomo, F., Rubin, I., Baiocchi, A., & Salvo, P. (2014). Enhanced VANET broadcast throughput capacity via a dynamic backbone architecture. Ad Hoc Networks, 21, 42–59.CrossRef Cuomo, F., Rubin, I., Baiocchi, A., & Salvo, P. (2014). Enhanced VANET broadcast throughput capacity via a dynamic backbone architecture. Ad Hoc Networks, 21, 42–59.CrossRef
6.
Zurück zum Zitat Gustav, Y. H., Wang, Y., Kamenyi, D. M., Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) (pp. 433–436). doi:10.1109/ICCPS.2013.6893578. Gustav, Y. H., Wang, Y., Kamenyi, D. M., Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) (pp. 433–436). doi:10.​1109/​ICCPS.​2013.​6893578.
7.
Zurück zum Zitat Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys. Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys.
8.
Zurück zum Zitat Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacy grid. In WWW. Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacy grid. In WWW.
9.
Zurück zum Zitat Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In ICDCS. Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In ICDCS.
10.
Zurück zum Zitat Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). PRIVE: Anonymous location-based queries in distributed mobile systems. In WWW. Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). PRIVE: Anonymous location-based queries in distributed mobile systems. In WWW.
11.
12.
Zurück zum Zitat Memon, M. H., Li, J.-P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: Multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications,. doi:10.1007/s11042-016-3834-z. Memon, M. H., Li, J.-P., Memon, I., & Arain, Q. A. (2016). GEO matching regions: Multiple regions of interests using content based image retrieval based on relative locations. Multimedia Tools and Applications,. doi:10.​1007/​s11042-016-3834-z.
13.
Zurück zum Zitat Hassanabadi, B., Shea, C., Zhang, L., & Valaee, S. (2014). Clustering in vehicular ad hoc net-works using affinity propagation. Ad Hoc Networks, Part B, 13, 535–548.CrossRef Hassanabadi, B., Shea, C., Zhang, L., & Valaee, S. (2014). Clustering in vehicular ad hoc net-works using affinity propagation. Ad Hoc Networks, Part B, 13, 535–548.CrossRef
14.
Zurück zum Zitat Rajini Girinath, S. S. D. (2013). A novel hierarchical model for vehicular traffic regulation. Telecommunication Systems, 52, 2101–2114.CrossRef Rajini Girinath, S. S. D. (2013). A novel hierarchical model for vehicular traffic regulation. Telecommunication Systems, 52, 2101–2114.CrossRef
15.
Zurück zum Zitat Memon, I. (2016). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191. doi:10.1007/s11277-015-2833-0.CrossRef Memon, I. (2016). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191. doi:10.​1007/​s11277-015-2833-0.CrossRef
16.
Zurück zum Zitat Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications: An International Journal, 80(4), 1347–1362. doi:10.1007/s11277-014-2082-7.CrossRef Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2015). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications: An International Journal, 80(4), 1347–1362. doi:10.​1007/​s11277-014-2082-7.CrossRef
17.
Zurück zum Zitat Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC).Wireless Personal Communications, 79(1), 661–686. doi:10.1007/s11277-014-1879-8.CrossRef Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC).Wireless Personal Communications, 79(1), 661–686. doi:10.​1007/​s11277-014-1879-8.CrossRef
18.
Zurück zum Zitat Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96. doi:10.1007/s11277-014-1996-4.CrossRef Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2015). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96. doi:10.​1007/​s11277-014-1996-4.CrossRef
19.
Zurück zum Zitat Kamenyi, D. M., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864. Kamenyi, D. M., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.
20.
Zurück zum Zitat Memon, I., Jamro, D. A., Mangi, A. F., Memon, M. H., & Basit, M. A. (2013). Source localization wireless sensor network using time difference of arrivals. International Journal of Scientific and Engineering Research, 4(7), 1046–1054. Memon, I., Jamro, D. A., Mangi, A. F., Memon, M. H., & Basit, M. A. (2013). Source localization wireless sensor network using time difference of arrivals. International Journal of Scientific and Engineering Research, 4(7), 1046–1054.
21.
Zurück zum Zitat Kamenyi, D., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. (2013). Preserving users’ privacy for continuous query services in road networks. In 2013 the 6th IEEE international conference on information management, innovation management and industrial engineering (ICIII2013) Xi’an, China (pp. 352–355). Kamenyi, D., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. (2013). Preserving users’ privacy for continuous query services in road networks. In 2013 the 6th IEEE international conference on information management, innovation management and industrial engineering (ICIII2013) Xi’an, China (pp. 352–355).
22.
Zurück zum Zitat Gustav, Y. H., Wang, Y., Domenic, M. K., Zhang, F., & Memon, I. (2013). Direction and velocity similarity anonymization in continuous query location based services. In 4th international conference on computational problem-solving (ICCP 2013) (pp. 433–436). Jiuzhai, China. doi:10.1109/ICCPS.2013.6893578. Gustav, Y. H., Wang, Y., Domenic, M. K., Zhang, F., & Memon, I. (2013). Direction and velocity similarity anonymization in continuous query location based services. In 4th international conference on computational problem-solving (ICCP 2013) (pp. 433–436). Jiuzhai, China. doi:10.​1109/​ICCPS.​2013.​6893578.
23.
Zurück zum Zitat Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006). Preserving user location privacy in mobile data management infrastructures. In Proceeding of the 6th workshop on privacy enhancing technologies (PETs) (pp. 393–412). Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006). Preserving user location privacy in mobile data management infrastructures. In Proceeding of the 6th workshop on privacy enhancing technologies (PETs) (pp. 393–412).
24.
Zurück zum Zitat Barkhuus, L., & Dey, A. (2003). Location-based services for mobile telephony: A study of users’ privacy concerns. In Proceeding of the 9th IFIP TC13 international conference on human–computer interaction (INTERACT). Barkhuus, L., & Dey, A. (2003). Location-based services for mobile telephony: A study of users’ privacy concerns. In Proceeding of the 9th IFIP TC13 international conference on human–computer interaction (INTERACT).
25.
Zurück zum Zitat Dahl, M., Delaune, S., & Steel, G. (2010). Formal analysis of privacy for vehicular mix-zones. In Proceeding of the 15th European conference on research in computer security (ESORICS) (pp. 55–70). Dahl, M., Delaune, S., & Steel, G. (2010). Formal analysis of privacy for vehicular mix-zones. In Proceeding of the 15th European conference on research in computer security (ESORICS) (pp. 55–70).
26.
Zurück zum Zitat Wang, T., & Liu, L. (2009). Privacy-aware mobile services over road networks. Proceedings VLDB Endowment, 2(1), 1042–1053.CrossRef Wang, T., & Liu, L. (2009). Privacy-aware mobile services over road networks. Proceedings VLDB Endowment, 2(1), 1042–1053.CrossRef
27.
Zurück zum Zitat Dahl, M., Delaune, S., & Steel, G. (2010). Formal analysis of privacy for vehicular mix-zones. In Proceedings of the 15th European conference on research in computer security (ESORICS’10) (pp. 55–70). Dahl, M., Delaune, S., & Steel, G. (2010). Formal analysis of privacy for vehicular mix-zones. In Proceedings of the 15th European conference on research in computer security (ESORICS’10) (pp. 55–70).
Metadaten
Titel
Clustering Based Energy Efficient and Communication Protocol for Multiple Mix-Zones Over Road Networks
verfasst von
Qasim Ali Arain
Muhammad Aslam Uqaili
Zhongliang Deng
Imran Memon
Jichao Jiao
Muhammad Akram Shaikh
Asma Zubedi
Aisha Ashraf
Usman Ali Arain
Publikationsdatum
23.11.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3900-x

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe

Neuer Inhalt