Abstract
The evolution of the internet has led to the growth of smart application requirements on the go in the vehicular ad hoc network (). enables vehicles to communicate smartly among themselves wirelessly. Increasing usage of wireless technology induces many security vulnerabilities. Therefore, effective security and authentication mechanism is needed to prevent an intruder. However, authentication may breach user privacy such as location or identity. Cryptography-based approach aids in preserving the privacy of the user. However, the existing security models incur communication and key management overhead since they are designed considering a third-party server. To overcome the research issue, this work presents an efficient security model namely secure performance enriched channel allocation () by using commutative . This work further presents the commutative property of the proposed security scheme. Experiments conducted to evaluate the performance of the proposed over state-of-the-art models show significant improvement. The outcome shows that minimizes collision and maximizes system throughput considering different radio propagation environments.
Highlights
vehicular ad hoc network (VANET) is a special type of Mobile ad hoc Network (MANET) where vehicles/devices act mobile devices, and their mobility is defined by network road topologies [1]
A group of users shares channels between neighboring users. This algorithm utilizes bandwidth efficiently, which aids in minimizing collision and maximize system throughput we present a commutative RSA (CRSA) based security design S − Perform Enriched Channel Algorithm (PECA)
The proposed PECA, S − PECA, and existing enhanced non-cooperative cognitive division multiple access (ENCCMA) and S − ENCCMA algorithms are written in C# objectoriented programing language using Visual studio framework 4.5, 2012
Summary
VANET is a special type of Mobile ad hoc Network (MANET) where vehicles/devices act mobile devices, and their mobility is defined by network road topologies [1]. To prevent impersonation attacks, the data sender must be addition, user privacy [7,27] concerns must be taken care of, where the position, identity, authenticated. In VANET, it is not desired to have such an unconditional privathe malicious/intruder vehicles must be tracked and punished in case of any malicious cy-preserving scheme. We review the use of secure servers or third-party servers as traditional methods of computing and distributing the key to an authorized organization [34]. Post completion of the initialization phase, the message is secured using cryptography and is shared among vehicles. Our proposed scheme minimizes the computational overheads associated with preserving the privacy of the S − PECA model (namely key computation, exchange, and distribution using external entities). The last section provided and discussed the conclusion with future work
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have