Comparison of Different Clustering Algorithms to Secured VANETs Communication

ITS (Intelligent Transportation Systems) are growing increasingly popular because of the necessity for superior cyber-physical systems and comfort applications and services required for usage in autonomous vehicles. There are two types of Vehicular Ad-Hoc Networks (VANETs) that are vital to ITS: V2I (Vehicle-to-Infrastructure) and V2V (Vehicle-to-Vehicle). VANETs are a new technology with several potential uses in the ITS. It comprises smart vehicles and roadside equipment that connect over open-access wireless networks. An attacker may disrupt vehicular communication which can lead to potentially life-threatening scenarios because of the significant expansion in the number of vehicles in use today. VANETs must use robust security and authentication procedures to provide safe vehicular communication. This paper provides a comprehensive analysis ofthe VANET system including its characteristics and challenges. There is a concept of data dissemination that has been provided in brief. Clustering is the most important topic in VANET that is used to cluster the vehicles to secure and safely message transmission over the network. There is a taxonomy of clustering techniques has provided in a detailed manner. Besides, it has also shown the comparison of different clustering parameters-based mechanisms and MAC protocols in VANET.


I. INTRODUCTION
Intelligent Transportation Systems (ITS) are made up of a network of vehicles that exchange data wirelessly. VANET is a specific type of MANET(Mobile Ad-hoc Network) that allows vehicles to share info without the support of permanent structures such as base stations or access points [2]. In VANET, mobility of vehicles results in dynamic variations to network architecture, that have a direct effect on the network's performance metrics like throughput, transmission latency, as well as packet loss rate. The study on topology & related routing procedures of VANET is based on reproducing actual traffic flow in a simulated environment. [3]. Thus, vehicular mobility modeling [4] has increasingly been a focus of VANET simulation research, intending to extract movement commonality of vehicle nodes to increase simulation's authenticity, ensuring that simulated findings can be applied to real-world deployments.
An emphasis is placed on the transmission of emergency messages between vehicles in this research report. For V2V and V2I communication, VANET employs DSRC at 5.9 GHz [5]. All seven channels of DSRC may transmit data at a maximum rate of 27Mbps over a distance of 1000 meters. A 5MHz guard band separates the seven channels each operating at 10MHz. All seven channels have one control channel &the other 6 are service networks for non-safety or commercial purposes. Short-range wireless networks may be established using either a radio interface or an On-Board unit. So that no safety- In VANET safety applications, providing an efficient and secure authentication method is a difficult problem. To meet their deadlines, these apps must respond to messages in a timely way. To protect the confidentiality of the communications sent, it is necessary to ensure that the information included in these messages is protected [6]. Having a nonrepudiation mechanism is essential in this situation. In addition to the safety of cars, VANETSs also guarantee the convenience of drivers and pedestrians on the road [7]. Safety characteristics include intrusion movement aid, road weather,blindspot warning, emergency electronic brake lights, forward collision warning, and left-turn help. Drivers might be alerted to their speed due to dynamic message signs. In the future, VANETS will be able to forecast which direction and how long drivers will have to wait at traffic signals. Another benefit of VANETS is dynamic transit operations & ride sharing.
In addition to communicating with other vehicles, VANETS allows your vehicle to interact with the driver as well. Any form of mishap may be avoided by activating an emergency alarm, which includes shaking of the seat and red indications on the indicator lights. Because the network has a huge number of nodes. Every node has to be verified and authenticated individually, which takes a lot of time.
Accidents may occur if all nodes are unable to interact with each other at the same time [8]. There are more vehicles on the road, which means more bandwidth is needed for the signals network, which may lead to signal interference and other concerns. It is difficult to interact with all the vehicles in the network because of the decentralized approach. Attackers may make use of its networking capabilities. They can tamper with the communications or insert dangerous material. VANETs must be implemented safely. The system's security has been hampered by an increase in the variety of assaults that may be launched, due to advancements in technology. VANET security is primarily threatened by Denial-of-Service (DoS) attacks, floods, spamming, and malicious software.
VANETs must be implemented quickly. As a matter of course, information must be sent on time. Even though VANETs are vulnerable to assaults such as jamming, which prevent radio waves from transmitting data, this is just one attack type. Malware injection may have a significant impact on the operation of network systems.The IoT and the Internet of Vehicles (IOV) [9] are already in the air, and they're both here to remain. Everywhere in the globe, there's been some kind of implementation of this principle up to this point.

A. VANET Characteristics
The following is a list of VANET features [10]: