Ann Mary Jacob et al, International Journal of Computer Science and Mobile Computing, ICMIC13, December- 2013, pg. 108-113
© 2013, IJCSMC All Rights Reserved 108
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
International Conference on Mobility in Computing- ICMiC13, Organized by Mar Baselios College of
Engineering and Technology during December 17-18, 2013 at Trivandrum, Kerala, India, pg.108 – 113
SURVEY ARTICLE
Security Enabled Junction-Based Multipath
Source Routing Algorithm for VANETs
Ann Mary Jacob
1
, Saritha S
2
Dept. of Information Technology
Rajagiri School of Engineering & Technology, Kochi, India
1
annmaryjac@yahoo.co.in;
2
saritha_s@rajagiritech.ac.in
Abstract— Junction Based Multipath Source Routing Algorithm(JMSR) is a geographic routing protocol, in
the sense that it exploits the location of the nodes and also of the street junctions, known via digital street
maps. JMSR is characterized as junction-based because it is a geographic or position-based routing protocol,
where the junctions’ positions are of much higher importance than the positions of the nodes themselves.
The disadvantage of JMSR is that it does not specify how routing happens in presence of a malicious node.
An improvement of JMSR is proposed through this paper. In this paper a method is discussed to deal with
malicious nodes in VANETs.
Keywords— VANETs; Junction-based Routing; Malicious nodes; Security attack; Packet duplication; Ranking.
I. INTRODUCTION
Vehicular Ad hoc Networks (VANETs) are a subclass of Mobile Ad hoc Network
(MANET).VANET assists vehicle drivers to communicate and to coordinate among
themselves in order to avoid any critical situation. It aims to provide:
(1)Connectivity while on the road to mobile users.
(2)Efficient vehicle-to-vehicle communications that enable the Intelligent Transportation
Systems (ITS).
Some of the unique features of VANET include the following. The major feature is the
geographically constrained topology. This means that unlike in MANETs the nodes in
VANETs are not free to move around an area or surface. Rather they could only move within
the roads formed by obstacles around them. An interesting feature of VANET is the large
scale of the network, i.e, a network may consist of a large number of nodes that may either be
too close or too far away. Finally power consumption is not a critical factor for VANETs [1].
Most widely used routing protocols in VANETs are Greedy Perimeter Coordinator Routing
[3], Geographic Source Routing [4] or Connectivity-Aware Routing [5], use only one single
route from the source to destination [6] handles each packet separately. The major conclusion