Secure Multimedia Broadcast Framework (SMBF) Redundant Informatio

Secure Multimedia Broadcast Framework (SMBF).Redundant Information: Every node maintains a table of Message IDs of product info currently received messages. We assume that the Message ID is unique and on its basis we detect the redundant messages.Message Benefit: We calculate the priority of each message. Safety Messages get higher priority than any other messages.Malicious Node Verification: We detect the malicious nodes on the basis of signal strength.Malicious Data Verification: We detect the malicious data on the basis of existing messages from neighbors and also on the basis of the position of nodes.4.?Implementation and ResultsIn this study we evaluate the performance of multimedia streaming in a VANET scenario. The mobility model we use is the Manhattan Mobility Model [12] and EvalVid [13] generates the multimedia traffic.

We perform the simulation with help of NS-2 [14] on Cygwin [15] and the parameters used in the simulation are listed in Table 1.Table 1.Simulation Settings.4.1. Inhibitors,Modulators,Libraries Study IWe simulate the multimedia traffic in two different scenarios. First we measure the delay, PSNR and throughput in scenario where there is no mechanism exists for detection of malicious data and malicious node Inhibitors,Modulators,Libraries as shown in Figures 2�C4.Figure 2.PNSR.Figure 4.Throughput.In this study we have three Vehicles (V1, V2 and V3) that are moving at very high speed.V2 and V3 want to share multimedia traffic with V1 and V2 is a malicious node that sends malicious data to V1 and affects the performance of network. V1 has no framework to determine the validity of data and it considers both V2 and V3 as fair nodes.

The delay in this case is higher and throughput is lower because of the effect of malicious data.4.2. Study 2Now we consider Inhibitors,Modulators,Libraries the same scenario as the above one. But in this case V1 has the SMBF to determine the redundant messages, malicious nodes and malicious data. We measure the delay, PSNR and throughput by applying the SMBF as shown in Figures 5�C7.Figure 5.SMBF PSNR.Figure 7.SMBF throughput.Performance of the network is not affected in this case because MDV detects the malicious data on the basis of existing messages from neighbors and also on the basis of the position of nodes, so in this case the delay is lower and throughput is higher because the malicious data does not affect the network.4.3.

ComparisonNow we measure the comparison of study Inhibitors,Modulators,Libraries I and study II to determine how much delay increases and throughput decreases, when there is no framework for the detection of malicious data and malicious nodes. Figure 8 and Figure Anacetrapib 9 show that delay is much lower when SMBF is applied and throughputs also increase much more www.selleckchem.com/products/Trichostatin-A.html when using SMBF. All vehicles have sensors to detect the congestion and improve privacy [16].Figure 8.Delay Comparison.Figure 9.Throughput Comparison.5.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>