Abstract

The evolution of the internet has led to the growth of smart application requirements on the go in the vehicular ad hoc network (). enables vehicles to communicate smartly among themselves wirelessly. Increasing usage of wireless technology induces many security vulnerabilities. Therefore, effective security and authentication mechanism is needed to prevent an intruder. However, authentication may breach user privacy such as location or identity. Cryptography-based approach aids in preserving the privacy of the user. However, the existing security models incur communication and key management overhead since they are designed considering a third-party server. To overcome the research issue, this work presents an efficient security model namely secure performance enriched channel allocation () by using commutative . This work further presents the commutative property of the proposed security scheme. Experiments conducted to evaluate the performance of the proposed over state-of-the-art models show significant improvement. The outcome shows that minimizes collision and maximizes system throughput considering different radio propagation environments.

Highlights

  • vehicular ad hoc network (VANET) is a special type of Mobile ad hoc Network (MANET) where vehicles/devices act mobile devices, and their mobility is defined by network road topologies [1]

  • A group of users shares channels between neighboring users. This algorithm utilizes bandwidth efficiently, which aids in minimizing collision and maximize system throughput we present a commutative RSA (CRSA) based security design S − Perform Enriched Channel Algorithm (PECA)

  • The proposed PECA, S − PECA, and existing enhanced non-cooperative cognitive division multiple access (ENCCMA) and S − ENCCMA algorithms are written in C# objectoriented programing language using Visual studio framework 4.5, 2012

Read more

Summary

Introduction

VANET is a special type of Mobile ad hoc Network (MANET) where vehicles/devices act mobile devices, and their mobility is defined by network road topologies [1]. To prevent impersonation attacks, the data sender must be addition, user privacy [7,27] concerns must be taken care of, where the position, identity, authenticated. In VANET, it is not desired to have such an unconditional privathe malicious/intruder vehicles must be tracked and punished in case of any malicious cy-preserving scheme. We review the use of secure servers or third-party servers as traditional methods of computing and distributing the key to an authorized organization [34]. Post completion of the initialization phase, the message is secured using cryptography and is shared among vehicles. Our proposed scheme minimizes the computational overheads associated with preserving the privacy of the S − PECA model (namely key computation, exchange, and distribution using external entities). The last section provided and discussed the conclusion with future work

Literature Review
Encryption
D C property is evaluated as follows:
Example
Results
Throughput
35 Collision performance for city environmnet
60 Collision performance for highway environmnet
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call