Work place: Electrical Engineering Department, National Institute of Technology, Kurukshetra, Haryana, 136119, India

E-mail: pahuja.gl@gmail.com


Research Interests: Computer systems and computational processes, Data Structures and Algorithms, Combinatorial Optimization


Prof. G.L.Pahuja did his B.Sc. (Electrical Engineering), M. Tech (Control System), and PhD in the area of Reliability Engineering from REC Kurukshetra affiliated to Kurukshetra University, Kurukshetra. He is currently working as a professor in the Department of Electrical Engineering, National Institute of Technology, Kurukshetra. He has 32 years of teaching experience. His research interests include System and Reliability Engineering, Fault tolerant systems, Reliability evaluation and optimization of communication networks.

Author Articles
A Reliable Solution to Load Balancing with Trust Based Authentication Enhanced by Virtual Machines

By Rakhi G.L.Pahuja

DOI: https://doi.org/10.5815/ijitcs.2017.11.07, Pub. Date: 8 Nov. 2017

Vehicular Ad hoc network is the most fast growing which shape fresh  engineering opportunities like controlling traffic smartly, optimal resource maintenance and improved service for customers. Vehicular Ad hoc Network (VANET) is one of the most popular ad hoc networks. A vehicular ad hoc network generally faces the problems like trust modeling, congestion, and battery optimization issues. If the nodes are comparatively less than it can handle the traffic well when it comes to transferring the data at a rapid rate. But, when it comes to high-density traffic than a Vehicular network always faces congestion problem. This paper tried to find the reliable solution to the traffic management by adding up the virtual gears into the network and optimizes the congestion problem by using a trust queue which is updated with the broadcast concept of the hello packets in order to remove the unwanted nodes in the list. The network performance has been measured with QOS Parameters like delay, throughput, and other parameters to prove the authentication of the research.

[...] Read more.
Other Articles