Vehicular Ad-Hoc Networks: Applications and Technology

G. G. Md. Nawaz Ali (Editor)
Assistant Professor, Department of Applied Computer Science, University of Charleston, WV, US

Md. Noor-A-Rahim (Editor)
Senior Post-doctoral Researcher (MSCA Fellow), Schoole of Computer Science & IT, University College Cork, Ireland

Pushpendu Kar (Editor)
Assistant Professor, ERCIM Fellow, School of Computer Science, University of Nottingham, Ningbo, China

Series: Computer Science, Technology and Applications
BISAC: COM043000



Volume 10

Issue 1

Volume 2

Volume 3

Special issue: Resilience in breaking the cycle of children’s environmental health disparities
Edited by I Leslie Rubin, Robert J Geller, Abby Mutic, Benjamin A Gitterman, Nathan Mutic, Wayne Garfinkel, Claire D Coles, Kurt Martinuzzi, and Joav Merrick


Digitally watermarked, DRM-free.
Immediate eBook download after purchase.

Product price
Additional options total:
Order total:



From the past decade vehicular ad hoc networks got tremendous attention from the industry, academia and research community. According to US National Highway Traffic Safety Administration (NHTSA), there are more than 30 thousands fatalities caused by the vehicle accidents in the U.S. each year, which worth around $250 billion economic cost annually. Research shows that 82% of these accidents can be reduced by the successful deployment of vehicular networks, because nearly 75% percent of vehicular crashes are caused by inattentive drivers.

Literally, vehicular ad hoc networks means a network forms by the vehicles. But it has been evolved to network with the infrastructure as well due to the inherent intermittent nature of vehicle-to-vehicle (V2V) connection. The high mobility of vehicles, wireless communication loss and range constraints are the main reason for this intermittent V2V connection. So, now vehicular networks means communication between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). There are billions of dollars invested to research, deployment and testing of vehicular networks. For the emerging connected and autonomous vehicle (CAV), a stable vehicular networks is the foremost requirement. It is now very much visible that CAV will be the future of Intelligent Transportation System (ITS).

The book is dedicated to discuss for the techniques, applications and relevant technologies of vehicular ad hoc networks and its challenges. The first chapter discuss about the routing protocols of vehicular networks. It focuses on different position-based routing protocols and their mechanisms for the successful use of vehicular networks for different applications. The second chapter discusses on the security and privacy issues on vehicular networks. A well-known security technique called Elliptic Curve Cryptography (ECC) is discussed to secure vehicular data from various tampering attacks. The third chapter discusses on the on-demand wireless broadcasting mechanism for improving data dissemination performance in terms of data delivery ratio and response time.

A network-coding based approach has been investigated for improving the overall performance of existing classical data broadcast algorithms. The fourth chapter describes how to get a dependable system in the lossy communication medium. This chapter discusses on a number of fault diagnosis techniques, their strengths and weaknesses, and it reviews their implementations in mobile wireless networks. The fifth chapter discusses the basics of Blockchain technology, applications, research challenges and opportunities in the field. Finally, chapter six discuss about the identification and mitigation of the faulty nodes in the wireless network. (Imprint: Nova)


Chapter 1. Role of Position-Based Routing Protocols for Different Applications of VANET
(Biswa Ranjan Senapati and Pabitra Mohan Khilar , Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India)

Chapter 2. Elliptic Curve Cryptography in Intelligent Transport Systems
(Muhammad Faisal Siddiqui, Muhammad Awais Javed and Rida Fatima, Department of Electrical and Computer Engineering, COMSATS University Islamabad, Pakistan)

Chapter 3. Exploitation of Network Coding in On-Demand Wireless Data Broadcast
(G. G. Md. Nawaz Ali, Victor CS Lee, Yuxuan Meng, Peter H.J. Chong and Jun Chen. Department of Applied Computer Science, University of Charleston, WV, US, and others)

Chapter 4. Fault Diagnosis Techniques for Mobile Wireless Networks
(Hazim Jarrah, G. G. Md. Nawaz Ali and Peter H.J. Chong, Auckland University of Technology, Auckland, New Zealand, and others)

Chapter 5. Blockchain: Basics, Applications, Challenges & Opportunities
(Jaswant Arya, Arun Kumar, Akhilendra Pratap Singh, Tapas Kumar Mishra and Peter H. J. Chong, Department of Computer Science and Engineering, National Institute of Technology, Meghalaya, India, and others)

Chapter 6. Optimal Hole Coverage in the Presence of Dumb Node in Wireless Sensor Networks
(Pushpendu Kar, School of Computer Science, University of Nottingham, Ningbo, Zhejiang, China)


You have not viewed any product yet.