scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

SBRPV: Security Based Routing Protocol for Vehicular Ad hoc Networks

TL;DR: This proposal deals with the certificate based authentication mechanism which is executed on user request and the proposed SBRPV technique is used to accomplish privacy and traceability, besides, satisfying elementary security requirements.
Abstract: Security and privacy are one of the most challenging issues related to the deployment of the Vehicular Ad hoc Networks. Different security proposals have been introduced to address the security of the data those are reliant on the centralized architecture based solutions along with the popular hardware based security techniques. In this proposal the existing state-of-the-art diverse security based solutions have analyzed which leads to the research gap analysis. Authors have presented new secure certificate based scheme to address several obtainable problems. We have proposed a hierarchical architecture for VANET. This proposal deals with the certificate based authentication mechanism which is executed on user request. The unique message identifier technique has taken a pivot role for avoiding the message deception. The proposed SBRPV technique is used to accomplish privacy and traceability, besides, satisfying elementary security requirements.
Citations
More filters
Journal ArticleDOI
TL;DR: In this paper, a proactive flexible interval intermittent jamming (FIJ) approach is proposed which predicts the time length of the physical layer packet to be transmitted by the legitimate user and designs flexible jamming interval (JI) and jamming-free interval based on the predicted.
Abstract: In this paper, we deal with the eavesdropping issue in Wireless Access in Vehicular Environments- (WAVE-) based vehicular networks. A proactive flexible interval intermittent jamming (FIJ) approach is proposed which predicts the time length of the physical layer packet to be transmitted by the legitimate user and designs flexible jamming interval (JI) and jamming-free interval (JF) based on the predicted . Our design prevents eavesdroppers from overhearing the information with low energy cost since the jamming signal is transmitted only within JI. Numerical analysis and simulation study validate the performance of our proactive FIJ, in terms of jamming energy cost and overhearing defense, by comparing with the existing intermittent jamming (IJ) and FIJ.
Proceedings ArticleDOI
14 Dec 2022
TL;DR: In this paper , the authors elaborate different attacks over VANET and conclude how block chain based VANet will perform better and less error prone, they also conclude that block chain can be used to improve the security of V2I and V2V communications.
Abstract: A sub group of mobile ad hoc network(MANET) that is vehicular Ad Hoc Network (VANET) that assists in, vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) intercommunications. An important characteristics of VANET consists of, highly dynamic, distributed networking and self-organizing topologies. In safeguarding billions of human live features of VANET and its uses regarding safety on roads drew attention towards huge amount of interest in academic fields and industries, moreover with study and development on enhancing the facilities of transport transit infrastructure. Major challenging and crucial security problems takes place during information transmission with open-access surrounding such as VANET. Non-repudiation, data confidentiality, Authentication, data availability and data integrity behave as a critical part of VANET’s security. Privacy preservation over VANET is major concern, in this research we will elaborate different attacks over VANET and will conclude how block chain based VANET will perform better and less error prone.
Book ChapterDOI
11 Dec 2020
TL;DR: In this paper, a flexible interval intermittent jamming (IJ) scheme was proposed to reduce the energy cost of the existing IJ scheme while preventing eavesdropper sniffing acute information.
Abstract: In this paper, we are focusing on the eavesdropping issue in Wireless Access in Vehicular Environments (WAVE) based vehicular networks. We proposed a flexible interval intermittent jamming (IJ) approach against the eavesdropper. This approach makes further improvement in reducing the energy cost of the existing IJ scheme while preventing eavesdropper sniffing acute information. We conducted a numerical analysis to explore and performed a simulation to compare the performance of our flexible interval IJ with the existing IJ scheme. The results show that our strategy is nearly saving 10% energy and guarantees the same security level as IJ can provide.
Proceedings ArticleDOI
14 Dec 2022
TL;DR: In this paper , the authors elaborate different attacks over VANET and conclude how block chain based VANet will perform better and less error prone, they also conclude that block chain can be used to improve the security of V2V communications.
Abstract: A sub group of mobile ad hoc network(MANET) that is vehicular Ad Hoc Network (VANET) that assists in, vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) intercommunications. An important characteristics of VANET consists of, highly dynamic, distributed networking and self-organizing topologies. In safeguarding billions of human live features of VANET and its uses regarding safety on roads drew attention towards huge amount of interest in academic fields and industries, moreover with study and development on enhancing the facilities of transport transit infrastructure. Major challenging and crucial security problems takes place during information transmission with open-access surrounding such as VANET. Non-repudiation, data confidentiality, Authentication, data availability and data integrity behave as a critical part of VANET’s security. Privacy preservation over VANET is major concern, in this research we will elaborate different attacks over VANET and will conclude how block chain based VANET will perform better and less error prone.
References
More filters
Journal ArticleDOI
TL;DR: In this paper, it is shown that in order to communicate independent sources between various users over an unknown medium to within various distortion levels, it is sufficient to consider source-channel separation based architectures.

2 citations