A Novel SCMAC Protocol for Vehicular Network to Access Control Channel

International Journal of Computer Trends and Technology (IJCTT)          
© 2018 by IJCTT Journal
Volume-60 Number-1
Year of Publication : 2018
Authors : S.J.Sujitha ,Dr.U.Kumaran, Mr. J. P. Jayan


S.J.Sujitha ,Dr.U.Kumaran, Mr. J. P. Jayan "A Novel SCMAC Protocol for Vehicular Network to Access Control Channel". International Journal of Computer Trends and Technology (IJCTT) V60(1):35-40 June 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

A multiple number of queries from the user are processed by the server nowadays. A secure query processing in data sharing is a major issue. It is necessary to secure the data sharing scheme. There are several techniques that are implemented to overcome this issue. Thus the traditional system implemented is a data sharing by third party. The third party channel is used to transmit the data from the data owner is used to ask the information from the user. Here the privacy is not preserved and the data user must provide the secrecy information the information stored in the third party channel. This leads to lots of misbehaving activities. This should be concern and then overcome in the proposed system. The proposed model consists of different techniques to design the model to overcome the issue. The propose model is designed with server which is referred as data owner. Data owner is supposed to store lots of data in the server. Generate lots of user to fetch the data from the data owner and then the party channel client is implemented as the intermediate between the server and the user. Data owner provides a Secure ID to the registered user. Now the registered user information is only view to the data owner. The client login is not possible in this mechanism. User gives the ID to the client, and then the query is stored with the basic mechanism. After that client side do the formation of Count, Sum and maximum. This is used to find the same query and grouped as one. Then the aggregate query is then sending to the server. The server is then used to transmit the response regarding with the same ID is masked and transmitted to the client. The clients view the response and then processed with query request. Thus the user information and their privacy details are protected using the proposed mechanism.

[1] E. Lee, E.-K. Lee, M. Gerla, and S. Y. Oh, “Vehicular Cloud Networking: Architecture and Design Principles,” IEEE Commun. Mag., vol. 52, no. 2, pp. 148–155, Feb. 2014.
[2] D. Jia, K. Lu, J. Wang, X. Zhang, and X. Shen, “A Survey on Platoon- Based Vehicular Cyber-Physical Systems,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 263–284, 2016.
[3] IEEE Standard for Wireless Access in Vehicular Environments (WAVE) - Multi-Channel Operation, IEEE Vehicular Technology Society, Mar. 2016.
[4] W. Zhe and H. Mahbub, “How Much of DSRC is Available for Non-Safety Use?” in ACM International Workshop on Vehicular Inter- Networking, San Francisco, USA, Sep. 2008, pp. 23–29.
[5] D. N. M. Dang, H. N. Dang, P. L. Vo, and Q. T. Ngo, “A Cooperative - Efficient - Reliable MAC Protocol for Vehicular Ad hoc Networks,” in 2015 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, Oct. 2015, Oct. 2015, pp. 383–388.
[6] V. Nguyen, T. Z. Oo, P. Chuan, and C. S. Hong, “An Efficient Time Slot Acquisition on the Hybrid TDMA/CSMA Multichannel MAC in VANETs,” IEEE Commun.Lett., vol. 20, no. 5, pp. 970–973, May 2016.
[7] Q. Wang, S. Leng, H. Fu, and Y. Zhang, “An IEEE 802.11p-Based Multichannel MAC Scheme with Channel Coordination
[8] for Vehicular Ad Hoc Networks,” IEEE Trans. Intell. Transp. Syst., vol. 13, no. 2, pp. 449–458, Jun. 2012.
[9] C. Shao, S. Leng, B. Fan, Y. Zhang, A. Vinel, and M. Jonsson, “Connectivity-aware Medium Access Control in Platoon-based Vehicular Ad Hoc Networks,” in 2015 IEEE International Conference on Communications (ICC), London, UK, Jun. 2015, pp. 3305–3310.
[10] N. Lu, Y. Ji, F. Liu, and X. Wang, “A Dedicated Multi-Channel MAC Protocol Design for VANET with Adaptive Broadcasting,” in 2010 IEEE Wireless Communication and Networking Conference (WCNC), Sydney, Australia, Apr. 2010, pp. 1–6.
[11] C. Han, M. Dianati, R. Tafazolli, X. Liu, and X. Shen, “A Novel Distributed Asynchronous Multichannel MAC Scheme for Large-Scale Vehicular Ad Hoc Networks,” IEEE Trans. Veh. Technol., vol. 61, no. 7, pp. 3125–3138, Sep. 2012.
[12] H. A. Omar, W. Zhuang, and L. Li, “VeMAC: A TDMA-Based MAC Protocol for Reliable Broadcast in VANETs,” IEEE Trans. Mobile Comput., vol. 12, no. 9, pp. 1724–1736, Sep. 2013.
[13] D. B. Rawat, D. C. Popescu, G. Yan, and S. Olariu, “Enhancing VANET Performance by Joint Adaptation of Transmission Power and Contention Window Size,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 9, pp. 1528–1535, Sep. 2011.
[14] B. Roman, I. Wassell, and I. Chatzigeorgiou, “Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention,” IEEE J. Sel. Areas Commun., vol. 29, no. 1, pp. 113–128, Jan. 2011.
[15] Y. Bi, K.-H. Liu, L. X. Cai, X. Shen, and H. Zhao, “A Multi- Channel Token Ring Protocol for QoS Provisioning in Inter-Vehicle Communications,” IEEE Trans. Wireless Commun., vol. 8, no. 11, pp. 5621–5631, Nov. 2009.
[16] Y. G˙unter, B. Wiegel, and H. P. Grossmann, “Cluster-based Medium Access Scheme for VANETs,” in 2007 IEEE Intelligent Transportation Systems Conference (ITSC 2007), Washington, USA, Oct. 2007, pp. 343– 348.
[17] M. S. Almalag, S. Olariu, and M. C. Weigle, “TDMA cluster-based MAC for VANETs (TC-MAC),” in IEEE 13th International Symposium on ”A World of Wireless, Mobile and Multimedia Networks” (WoWMoM 2012), San Francisco, CA, USA, June 2012, pp. 1–6.
[18] Y.-C. Lai, P. Lin, W. Liao, and C.-M. Chen, “A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks,” IEEE J. Sel. Areas Commun., vol. 29, no. 1, pp. 83–93, Jan. 2011.
[19] G. M. Abdalla, M. A. Abu-Rgheff, and S.-M.Senouci, “Space- Orthogonal Frequency-Time Medium Access Control (SOFT MAC) for VANET,” in 2009 Global Information Infrastructure Symposium (GIIS), Hammemet, Tunisia, Jun. 2009, pp. 1–8.
[20] J. J. Blum and A. Eskandarian, “A Reliable Link-Layer Protocol for Robust and Scalable Intervehicle Communications,” IEEE Trans. Intell. Transp. Syst., vol. 8, no. 1, pp. 4–13, Mar. 2007.
[21] R. S. Tomar and S. Verma, “Enhanced SDMA for VANET Communication,”in IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), Fukuoka, Japan, Mar. 2012, pp. 688–693.
[22] H. Wu, R. Yu, C. Liu, H. Chen, and Y. Lai, “Distributed LocationassistedMultiple Access Scheme for Vehicular Ad Hoc Networks,” in 2013 8th International ICST Conference on Communications and Networking in China (CHINACOM), Guilin, China, Aug. 2013, pp. 528– 533.
[23] Q. Pang, S. C. Liew, and V. C. M. Leung, “Design of an effective lossdistinguishable MAC protocol for 802.11 WLAN,” IEEE Commun.Lett.,vol. 9, no. 9, pp. 781–783, Sep. 2005.
[24] H.-H. Choi, J.-M.Moon, I.-H.Lee, and H. Lee, “Carrier Sense Multiple Access with Collision Resolution,” IEEE Commun.Lett., vol. 17, no. 6, pp. 1284–1287, Jun. 2013.
[25] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments, IEEE Computer Society, Jul. 2010.
[26] SUMO - Simulation of Urban Mobility, http://sumo-sim.org/.

Collision , Reliability Comparison , Average Beaconing Periods , Average Access Time