Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE
|
|
- Dwayne Lewis
- 5 years ago
- Views:
Transcription
1 IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 02 July 2015 ISSN (online): Improving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE Mrs. Dhakshu Sivan Department of Computer Science and Engineering NCERC, University of Calicut Thrissur, India Mrs. Jini K.M. Department of Computer Science and Engineering NCERC, University of Calicut Thrissur, India Abstract A navigation system which utilizes the online information gathered from the VANET to guide the drivers to desired destinations in a continuous and real time manner. Vanet based secure and privacy preserving navigation scheme (VSPN) helps to find a better route and also it satisfies all privacy and security requirements. For improving the energy efficiency of individual nodes in VSPN, Long Term Evolution (LTE) technique is introduced. LTE will help to achieve better data rates and content distribution delay can be minimized. This paper aims at describing the analysis and evaluation of VSPN navigation schemes and its enhancement using LTE. Keywords: Navigation, On Board Unit (OBU), Road Side Unit (RSU), Vehicular Adhoc Network (VANET), Long Term Evolution (LTE) I. INTRODUCTION Vehicular adhoc network (VANET) is emerging as a new promising field in wireless technology which aims to deploy vehicle to vehicle communication as well as vehicle to infrastructure communication. Many countries use this technology for efficient traffic management. It forms a core part of intelligent transportation system (ITS). In VANET system, each vehicle is equipped with an onboard unit (OBU), which is responsible for all communication and computation tasks. There are certain roadside units (RSU), which are the wireless infrastructures that are deployed on the roadside. Also, there is a trusted authority and underlying servers which are responsible for security related issues between the vehicle and the RSU unit. The OBUs and RSUs communicate over the wireless channel using the Dedicated Short Range Communications (DSRC) protocol while the RSUs, TA, and the application servers communicate using a wired structure (fixed internet).before entering the network, each vehicle has to register with the authority and preloaded sign in keys and credentials are obtained offline from authority. For ensuring security, filtering of messages is essential. One of the main applications of VANET is to broadcast the information collected from the vehicles which includes vehicles speed, turning direction, road condition, traffic accident information etc. This information will be passed to nearby vehicles and RSU units periodically such that other vehicles can change their travelling route whenever needed. Vanet can also be interpreted as a sensor network. One of the main challenge in the area of Vanet is that how to utilize the collected information for various applications. Fig. 1: Structure of Vanet Earlier, a hardcopy of atlas is used for finding a route from source to destination. But it is a tedious approach. Global positioning system (GPS)[1] system is introduced. By receiving GPS signals, device can determine its current location and finds All rights reserved by 196
2 the geographically shortest route to destination based on local map database. Here the real time road conditions are not considered while performing navigation. Then Traffic message channel (TMC)[2] is introduced.tmc uses an FM radio system to broadcast real time information. But it has its own limitations. Only special conditions are recorded and general fluency of vehicles cannot be obtained. So the requirement persists for an efficient navigation system. The rapid increase of vehicular traffic and congestion on the highways began hampering the safe and efficient movement of traffic. Vanet based secure and privacy preserving navigation (VSPN)[3] scheme utilizes online information collected from the RSU and helps to find the route to the destination. A driver can issue a query (e.g. road conditions along the roads to his destination) to a nearby RSU; this system will automatically collect the required information from the appropriate RSUs. The gathering process is done in a real-time and distributed manner. This system requires security and privacy requirements which includes sender authentication (to ensure that sender is the valid subscriber) and conditional identity privacy preserving (to ensure that a driver s travelling route cannot be traced by any third party except the trusted authority). And there are additional security and privacy requirements. Conditional identity privacy preserving implies that only the trusted authority is capable of knowing the real identity of a vehicle. Similar to other networks, security issues are common in Vanet. Here vehicle to vehicle authentication, vehicle to RSU authentication and RSU to TA authentication should be ensured. Privacy protection is essential as the vehicles onboard unit frequently communicate with RSU. One of the solutions to ensure privacy is by using pseudo identity for different RSU. Also different authentication mechanisms can be used. So that messages between the vehicles and RSUs cannot be linked and travelling route can be protected. Based on the pseudo identity, real identity of vehicle can be obtained from TA. Long Term Evolution (LTE) technique can be implemented with VSPN, hence the efficiency of individual node can be improved and high data rates can be achieved. LTE uses multiple input multiple output(mimo) antenna technology which is a similar technology that is used in IEEE n wireless local area network(wlan) standard. The higher signal to noise ratio at the receiver provides improved coverage and throughput, especially in dense urban areas. In this paper, analysis and evaluation of various navigation schemes are done. Related work is included in section 2. System Model is given in section 3. Section 4 describes the working of VSPN scheme. STE technique is done in section 5, Simulation results in section 6 and Conclusion in section 7. II. RELATED WORKS A similar navigation scheme is SPARK [4]. It is a navigation scheme which helps to find a vacant space in a parking lot. For providing parking convenience for the drivers, a parking guidance system consisting of dynamically updated guide signs has been created to properly guide drivers to park their vehicle in the free space. Earlier sensors were deployed at large parking lots, which was costly, inaccurate and had functionality problems. With the help of Vanet, vehicles communicate with each other and also with RSU from which real time information are collected. Hence this scheme ensures reliable and effective parking. This scheme covers a small parking area whereas the VSPN scheme covers a large city. SPARK scheme is controlled by three RSU whereas the VSPN scheme contains more number of RSU, as it covers the whole city. Providing security to VSPN is also a tedious task. In SPARK, due to limited number of RSU, security guards can monitor the whole system but this is not possible with VSPN.SPARK system could not solve the problem mentioned in this paper. In Vanet, all the vehicles will be moving so that its topology changes rapidly. Hence security issues are common. The Identity based batch verification scheme (IBV)[5] protocol was proposed for vehicle-to-rsu communications. Using three pairing operations, the RSU can verify a large number of signatures as a batch. Each vehicle is equipped with a tamperproof device, in which all the secret keys will be preloaded. If one device is compromised, them the whole system will be compromised. Its privacy requirement is not satisfied as its real identity can be traced by anyone. Anti-traceability attack and impersonation attack are likely to occur. Also this protocol is not suitable for Vehicle to vehicle communication. Another protocol called RSU-Aided Message Authentication Scheme (RAISE) [6] is proposed. It is a software based protocol. With the help of RSU, each vehicle is allowed to verify the signature of nearby vehicles. Here the RSU verifies the signatures one after the other. Hence each RSU need to verify thousands of signatures within a short interval of time. This causes heavy message overhead. Privacy preserving querying is based on the idea of anonymous credential [7][8]. The system allows a user to obtain a credential from one organization and later show the possession of the credential to another organization while the transactions at the two organizations are not linkable. In different applications, the idea of anonymous credential has been adopted. A group signature based communication scheme is proposed [9]. In conventional digital signature scheme, vehicles need to store an extensive number of public/private key pairs, and keys must be changed frequently. Secure distribution of keys, key management, and storage are extremely troublesome in this kind of plan. This novel group signature based security scheme which relies on tamper resistance devices (requiring password access) for preventing adversarial attacks on vehicular networks. This scheme achieves authenticity, data integrity, anonymity, and accountability. A single group public key is used to verify the signature. Security and privacy are key issues. The signature of any vehicle can be verified by the same group key but the actual signer can only be traced by a trusted party. Though privacy can be preserved, these schemes are rather complicated and may not be practical. All rights reserved by 197
3 III. SYSTEM MODEL We have discussed that a vehicular adhoc network consists of on-board units installed on vehicles, road-side units along the roads, and a trusted authority. A. Assumptions The following are some assumptions: 1) TA is trusted, as the real identity of vehicles should be known only by the TA. All the other vehicles and RSU are forbidden from knowing the real identity of the vehicle. All the cryptographic functions of key generation are done. Generation and management of anonymous credential should be trusted and is done by TA. Also, the real identity of vehicle is known only by TA. Redundant TAs is developed for avoiding a single point of failure. 2) RSUs are not trusted and inquisitive. Since they are set along roadside, they can be effortlessly bargained. Likewise they are interested about drivers' protection for example, route inquiries. There should be a fixed communication between RSUs and TA. 3) Public key infrastructure (PKI) is used for initial vehicle authentication. Each vehicle Vi has a conventional public key CPKi and a conventional private key CSKi and is given a TA-signed certificate.ta and RSU uses an identity based public key infrastructure. Public key is known by everyone. Also any RSU R i broadcasts its public key which is the same as its real identity RRID i periodically to vehicles that are travelling within the RSU-Vehicle Communications (RVC) range of it. The validity of RRID i can be ensured using a certificate issued by the TA. 4) Our VSPN scheme is assumed to have more number of navigation queries. Each RSU consist of a local database which stores current road conditions and important landmarks and also the directions and distance to nearby RSUs. 5) Each vehicle is equipped with a tamper proof device, in which all cryptographic functions are done. TA will send current time to all RSUs and RSUs will sent it to vehicles. B. Security Requirements The following are various needed security requirements: 1) Message Integrity and authentication: All vehicles and RSUs which sent out messages should be properly authenticated. 2) Identity privacy preserving: Real identity of vehicle should not be known to other vehicles and RSU units otherwise there is a possibility of hacking messages. 3) Traceability: Real identity of the vehicle should be known only to TA. 4) Confidentiality: Navigation query raised by the driver and also the query results should be kept confidential from third party. 5) Unlinkability: Real identity of vehicle should not be linked with query, even though RSUs and TA communicate. IV. VSPN-WORKING Vanet based secure and privacy preserving navigation (VSPN) utilizes the collected data to provide navigation services [3]. This scheme is based on the idea of anonymous credential. Based on the requirements of the driver, query is raised. System will search for the route with minimum travelling delay. TA will generate navigation credential. This will be refreshed periodically so that the security can be ensured. Summarization of the fundamental steps in VSPN working is shown below: 1) At first TA will setup parameters and generate anonymous credential. TA will generate a master secret key, s and it will be broadcasted to all RSU. Conventional public key and private key is used for master key re-encryption. 2) Vehicle V i login to the network using the username and password provided by TA. A master key request is passed to nearby RSU, Rc. 3) Vehicles tamperproof device will request for a navigation credential from RSU,Rj. 4) After verifying vehicle V i identity, RSU Rj send an anonymous credential to vehicles tamperproof device. 5) Vi s tamper-proof device will request for a navigation request from RSU, R k. As there are more number of requests, it will cause delay in processing the navigation query. 6) 6. Query generated by the vehicle, V i is propagated along the RSU network. RSU, R k initiates the route searching process till the query reaches the destination. RSU will check whether the destination is within the communication area. If it is, then the query will be passed to nearby RSU which are closer to destination. 7) A navigation reply message will be constructed by RSU, R d which will be passed along the reverse direction. The message contains the hop information which includes signatures, road condition and average speed of vehicles. 8) Up on receiving the reply message from RSU R k, the vehicle tamperproof device verifies the messages in the forward direction, till it reaches the destination. 9) Each RSU is provided with a navigation session number by which navigation path can be determined. 10) By using Vi s pseudo identity and master secret key, s TA can reveal Vi s real identity for billing purposes. All rights reserved by 198
4 Fig. 2: VSPN Steps Advantages of VSPN scheme is that, information provided by RSUs can properly authenticated before the route is being used and route blocking can be reduced. Navigation queries and results are protected from eavesdroppers. No one including TA can link up query and its identity. Also, it will satisfy all security requirements. One of the disadvantages is that, the existing method will search for all nodes and request of all nodes other than RSU area; it will take more time and more energy for request and data transmission. Also, data advertisement cannot guarantee the delivery of data. V. LTE TECHNIQUE AND WORKING LTE, an abbreviation for Long Term Evolution is a standard for wireless communication and is used for high speed data transmission. This 4G wireless broadband technology is developed by the Third Generation Partnership Project (3GPP). LTE provides significantly increased peak data rates, with the potential for 100 Mbps downstream and 30 Mbps upstream, reduced latency, scalable bandwidth capacity, and backwards compatibility with existing GSM and UMTS technology. LTE will support mixed data, voice, video and messaging traffic. Fig 3: Working of LTE In network Formation, vehicles form clusters. Vehicles in the range of an LTE base station(bs), should communicate a content of common interest (files, maps, live video from disaster area, etc.) to the vehicles, which can communicate with each other using IEEE p on the short range(sr). LTE communication is considered on the long range (LR) links. In LTE, the available spectrum is divided into resource blocks (RB) consisting of 12 adjacent subcarriers, allocated in a 0.5 ms time slot. Here unicasting and multicasting is done. Base station will unicast the message to the selected vehicle and by means of multicasting, message will be passed to nearby vehicles. Vehicles receive the messages on LTE and transmit on the SR p links. Hence content distribution delay can be minimized. The content distribution time is computed as the sum of the time needed to receive the content on the LR and the time needed to multicast it on the SR. For clustering, an hierarchical clustering algorithm, LEACH is used. Nodes calculate the participation standards of candidate Cluster Head (CH), and then nodes choose All rights reserved by 199
5 the best CH according to the ratio between the node s residual energy and the distance to the sink node. By means of unicasting, the messages will be passed to the cluster head. Vehicles take turn in transmitting a certain message. The message contains information about the transmitting vehicle (its ID, IP address, etc.), its channel state information (CSI) on the LR and a pilot sequence on the SR so that the other vehicles estimate their SR CSI with the transmitting vehicle. Unicasting and multicasting are implemented in each vehicle independently. To implement optimized collaborative content distribution, signaling information needs to be exchanged between the vehicles themselves, and between the vehicles and the BS. VI. SIMULATION RESULTS In this section, LTE technique and VSPN scheme is evaluated. Simulation results show that the content distribution delay can be minimized. Graph is plot with number of connections along X-axis and delay along Y-axis. Fig 4.1 illustrates the same. Fig. 4.1: Number of connections versus Delay LTE technique will help to reduce routing overhead. Graph is plot with number of connections along X-axis and routing overhead along Y-axis.Fig 4.2 clearly shows that the LTE technique dominates the existing VSPN scheme. Fig. 4.2: Number of connections versus Routing overhead Simulation result of LTE integrated architecture is given in Fig 4.3. Here all the parameters are computed and the results are evaluated. From results, it is clear that the energy efficiency of the whole network can be improved by means of LTE technique. All rights reserved by 200
6 VII. CONCLUSION Vanet based secure and privacy preserving navigation (VSPN) scheme help to find a better navigation path using the real time information collected from RSU. It will satisfy all security and privacy requirements. But there is no provision to improve the lifetime of the individual node. In many applications, the node closer to the sink are overburdened with huge traffic load as the data from the entire region are forwarded through them to reach to the destination. For long range communication, Long term evolution (LTE) technique is introduced. With the help of LTE, co-operative delay-sensitive content distribution in public safety vehicular ad hoc networks was investigated and high data rates can be achieved. Simulation results shows that the best performance was achieved when the base station unicasts the content to a selected vehicle on the long range, and that vehicle multicasts the data to other vehicles within its cooperating cluster. By means of LTE, throughput can be improved and delay can be minimized. Also, packet delivery ratio and data packet received can also be improved. REFERENCES [1] Global Positioning System Standard Positioning Service Signal Specification. Navtech GPS Supply, [2] TrafficMessageChannel (TMC), Available at the link: [3] T.W. Chim, S.M. Yiu, Lucas C.K. Hui and Victor O.K. Li, VSPN: VANET-Based Secure and Privacy-Preserving Navigation, IEEE TRANSACTIONS ON COMPUTERS, Vol. 63, No. 2, February 2014 [4] R. Lu, X. Lin, H. Zhu, and X. Shen, SPARK: A New VANET BasedSmart Parking Scheme for Large Parking Lots, Proc. IEEEINFOCOM 09, pp , Apr [5] C. Zhang, R. Lu, X. Lin, P.H. Ho, and X. Shen, An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks, Proc. IEEE INFOCOM 08, pp , Apr [6] C. Zhang, X. Lin, R. Lu, and P.H. Ho, RAISE: An Efficient RSU Aided Message Authentication Scheme in Vehicular Communication Networks, Proc. IEEE Int l Conf. Comm. (ICC 08), pp , May [7] E. Aimeur, H. Hage, and F. S. M. Onana Anonymous Credentials for Privacy-Preserving E-learning, In Proceedings of the IEEE MCETECH 08, pages 70 80, July [8] Z. Chen and L. Xu, Anti-Collusion Anonymous Credentials Scheme, In Proceedings of the IEEE CIT 06, pages , September [9] A. Wasef and X. Shen, PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks, In Proceedings of the IEEE ICC 08, pages , May All rights reserved by 201
Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network
Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,
More informationMLAS: Multiple level authentication scheme for VANETs
Title MLAS: Multiple level authentication scheme for VANETs Author(s) Chim, TW; Yiu, SM; Hui, LCK; Li, VOK Citation The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
More informationAd-hoc Trusted Information Exchange Scheme for Location Privacy in VANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationEFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS
EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of
More informationCOOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS
COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com
More informationOverview of Challenges in VANET
Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because
More informationA Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu
A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu Outline Introduction to Vehicular Networks Motivation
More informationAn Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs
An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology, Chennai rakeshkumarer@gmail.com,
More informationInternational Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 3, May - Jun 2016
RESEARCH ARTICLE OPEN ACCESS Proxy Based Batch Authentication Scheme for Vehicular Ad Hoc Network Godavari H. Kudlikar [1], Sunita S. Barve [2] Department of Computer Science and Engineering Savitribai
More informationSybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks
Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1
More informationEnhancing Security on Vehicular Adhoc Networks using EMAP-HMAC
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Page No.: 704-711 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Enhancing Security on Vehicular
More informationEXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION
EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.
More informationEnsuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks
Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationLTE and IEEE802.p for vehicular networking: a performance evaluation
LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationEnhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization
Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely
More informationAnalyzing Routing Protocols Performance in VANET Using p and g
Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University
More informationShort-term Linkable Group Signatures with Categorized Batch Verification
Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More informationCHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS
130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based
More informationEnhanced Management of Certificate Caching and Revocation Lists in VANET
Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationIEEE networking projects
IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,
More informationMitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks
Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University
More informationA Secure Routing Protocol for Wireless Adhoc Network Creation
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88
More informationMobile-Gateway Routing for Vehicular Networks 1
Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,
More informationSource Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network
Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationKeywords VANET, Routing protocols, AODV, DSR, DSDV.
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
More informationReliable and Efficient flooding Algorithm for Broadcasting in VANET
Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More informationMessage Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 1, January 2015 Message Authentication Scheme for Vehicular Ad-Hoc Wireless
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN
International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 831 Performance Analysis of Reactive and Proactive Routing Protocols for Vehicular Adhoc Network Ms. Monika
More informationPerformance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario
Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Uttara Vyas 1, Prof. Kamlesh Chopra 2, Prof. Prashant Lakkadwala 3 1 Computer Science and Engineering,Acropolis Technical
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationInternational Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:
Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationTO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL
TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,
More informationReliable Routing In VANET Using Cross Layer Approach
Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,
More informationAn Efficient Data Transmission in VANET Using Clustering Method
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission
More informationHMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks
HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks D.Thriveni 1, G.T.Prasanna Kumari 2 1 M.Tech Student, S.V.Engineering College for Women, Tirupati, India 2 Associate Professor, Dept.
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationSybil Attack Detection in Mobile Adhoc Network
Sybil Attack Detection in Mobile Adhoc Network 469 1 Yamini D. Malkhede, 2 Purnima Selokar 1 Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, Maharashtra, India
More informationEvaluation of Information Dissemination Characteristics in a PTS VANET
Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de
More informationPMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks
PMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks J.Sahana, PG Scholar Department of Computer Science and Engineering Sree Sowdambika College of Engineering Aruppukottai,
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationPERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET
PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,
More informationDESIGN AND DEVELOPMENT OF A WIRELESS SENSOR MODEL FOR VEHICULAR AREA NETWORKS
DESIGN AND DEVELOPMENT OF A WIRELESS SENSOR MODEL FOR VEHICULAR AREA NETWORKS Umesh P, G.Varaprasad Department of Computer Science and Engineering, B.M.S. College of Engineering, Bangalore 5600 19, India.
More informationReview on an Underwater Acoustic Networks
Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationDetection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-issn: 2394-0050, P-ISSN: 2394-0042.Volume 2, Issue 1. (Mar. - Apr. 2015), PP 01-05 www.iosrjournals.org Detection and Removal of Blackhole Attack
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationPrivacy in VANET using Shared Key Management
Privacy in VANET using Shared Key Management Jessy Paul 1, Elizabeth Saju 2, Mercy Joseph Poweth 3 Professor, Dept. of Civil Engineering, MACE, Kothamangalam, Kerala, India P.G Student, Dept. of Computer
More informationImpact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing
More informationSecurity of vehicular communications. Vehicular communication (VC) systems
Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationPseudonym Based Security Architecture for Wireless Mesh Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationConnected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use
Connected Car Dr. Sania Irwin Head of Systems & Applications May 27, 2015 1 Nokia Solutions and Networks 2014 For internal use Agenda Introduction Industry Landscape Industry Architecture & Implications
More informationPoonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)
An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationImproving Energy and Efficiency in cluster based VANETs through AODV Protocol
Improving Energy and Efficiency in cluster based VANETs through AODV Protocol Prerana Deshmukh PG Department of Computer Science and Engineering, J.D.College of Engineering & Managment, RTMNU, Maharashtra,
More informationISSN Vol.03,Issue.36 November-2014, Pages:
ISSN 2319-8885 Vol.03,Issue.36 November-2014, Pages:7151-7157 www.ijsetr.com Implementation of Expedite Message Authentication Protocol for Vehicular Ad-Hoc Networks SHAIK PATTA ABDUL KHAYUM 1, C. MD GULZAR
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationAanchal Walia #1, Pushparaj Pal *2
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,
More informationSURVEY OF VEHICLE AD-HOC NETWORK
SURVEY OF VEHICLE AD-HOC NETWORK DEESHA G. DEOTALE 1 & UMA NAGARAJ 2 1,2 Department of Computer Engineering M.A.E Alandi (D) Pune India E-mail : disha.deotale21@gmail.com & umanagaraj67.@gmail.com Abstract
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationA Review on Vehicular Ad-Hoc Network
A Review on Vehicular Ad-Hoc Network Arshdeep Kaur 1, Shilpa Sharma 2 M.Tech Student, Dept. of Computer Science Engineering, Lovely Professional University, Phagwara, Punjab, India 1 Assistant Professor,
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationA Surveying on Road Safety Using Vehicular Communication Networks
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 A Surveying on Road Safety Using Vehicular Communication Networks Padmavathi K Asst. Professor, Department
More informationPerformance Analysis of Aodv Protocol under Black Hole Attack
International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc
More informationA Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy
More informationA Priority based Congestion Prevention Technique for Vehicular Ad-Hoc Networks
Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Priority based Congestion Prevention Technique for Vehicular Ad-Hoc
More informationScalable privacy-enhanced traffic monitoring in vehicular ad hoc networks
Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks Yi Liu1,2,3 Jie Ling 1 Qianhong Wu4,6 Bo Qin5 Presented By Khaled Rabieh Introduction & Problem Statement In traffic monitoring
More informationInternational Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More informationChallenges in Mobile Ad Hoc Network
American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.
More informationAll Rights Reserved 2017 IJARCET
END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,
More informationA Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET
A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant
More informationIntroduction and Statement of the Problem
Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network
More informationInternational Journal of Computer & Organization Trends Volume 5 Issue 1 Jan to Feb 2015
Introducing Autonomous Car Methodology in WSN Promita Maitra 1, Sohini Nandi 2, Ipsita Saha 3, Poojarini Mitra 4, Sayani Chandra 5 1 Student, Dept. of Computer Science and Engineering, Gurunanak Institute
More informationAn Energy-Efficient Hierarchical Routing for Wireless Sensor Networks
Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless
More informationA Centralized Approaches for Location Management in Personal Communication Services Networks
A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,
More informationElimination Of Redundant Data using user Centric Data in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant
More informationMultiprotocol Label Switching in Vehicular Ad hoc Network for QoS
Information Management and Business Review Vol. 6, No. 3, pp. 115-120, Jun 2014 (ISSN 2220-3796) Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS * Kashif Naseer Qureshi, Abdul Hanan Abdullah
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationProxy Signature-based RSU Message Broadcasting in VANETs
Proxy Signature-based RSU Message Broadcasting in VANETs Subir Biswas Dept. of Computer Science University of Manitoba Winnipeg MB, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Dept. of Computer
More informationMethods to Resolve Traffic Jams using VANET
Methods to Resolve Traffic Jams using VANET Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab Abstract - In this paper we have proposed a method to avoid
More information