Skip to main content

Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

Adhoc networks are the networks, deployed in the areas where the needed infrastructure is not feasible to install. Mobile Adhoc Networks (MANETs) use wireless medium in which each node acts as both data terminal and router without the need of any centralized control. Vehicular Adhoc Networks (VANETs) are subset of MANETs. The successful deployment of vehicular communication requires Vehicle-to-Vehicle (V2V) & Vehicle–to-Infrastructure (V2I) communication with security which requires confidentiality, integrity, availability and authenticity to improve road safety and optimize road traffic. The technique used for secure communication in the presence of unauthorized parties (adversaries) is known as cryptography. Cryptography refers to encryption in which a plaintext message is converted into a ciphertext. Encryption can be done with private-key or public-key. In this paper, an algorithm based on private key encryption is used to make communication possible between two people with QualNet simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karp, B., Kung, H.T.: GPRS: Greedy Perimeter Stateless Routing for wireless networks. In: Proc. 6th Annual Int. Conf. on Mob. Computing and Netw., pp. 243–254 (2000)

    Google Scholar 

  2. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: Proc. of the 12th Annual Netw. and Distributed Syst. Security Symp., pp. 29–44 (2005)

    Google Scholar 

  3. Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing Vehicular Networks. J. IEEE Wirel. Commun. (2006)

    Google Scholar 

  4. Leinmuller, T., Buttyan, L., et al.: SEVECOM-Secure Vehicle Communication. In: Proc of IST Mob. Summit (2006)

    Google Scholar 

  5. Kamat, P., Baliga, A., Trappe, W.: An Identity-Based Security Framework for VANETs. In: Proc of the 3rd Int. Workshop on Vehicular Adhoc Netw., pp. 94–95 (2006)

    Google Scholar 

  6. Liu, X., Fang, Z., Shi, L.: Securing Vehicular Ad Hoc netw. IEEE (2007)

    Google Scholar 

  7. Department for Transport, Reported road casualties Great Britain: 2008 Annual Report. Road Casualties G. B. UK (2008)

    Google Scholar 

  8. Caballero-Gil, P., Hernandez-Goya, C., Fuster-Sabater, A.: Differentiated Services to Provide Efficient Node Authentication in VANETs (2009)

    Google Scholar 

  9. Zuowen, T.: A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks. J. of Convergence Inf. Technology (2010)

    Google Scholar 

  10. Mahajan, S., Jindal, A.: Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks. Int. J. of Comput. Applications (2010)

    Google Scholar 

  11. Hamad, H., Elkourd, S.: Data Encryption using the dynamic location and speed of mobile node. J. Media and Commun. Stud., pp. 067-075 (2010)

    Google Scholar 

  12. Minhas, U.F., et al.: A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks, pp. 407–420. IEEE (2011)

    Google Scholar 

  13. Wasef, A.N., Shen, X.: Mitigating the effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks. In: IEEE ICC Proc. (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manpreet Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kaur, M., Rajni, Singh, P. (2012). Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_77

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_77

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics