Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Study of Improved Security in VANET by using a Digital Signature and Hash Chain

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 108 - Number 20
Year of Publication: 2014
Authors:
Nazrul Islam
Sajjad Waheed
Abul Hasnat Anik
Sudarsan Pal
10.5120/19145-0343

Nazrul Islam, Sajjad Waheed, Abul Hasnat Anik and Sudarsan Pal. Article: A Study of Improved Security in VANET by using a Digital Signature and Hash Chain. International Journal of Computer Applications 108(20):20-23, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Nazrul Islam and Sajjad Waheed and Abul Hasnat Anik and Sudarsan Pal},
	title = {Article: A Study of Improved Security in VANET by using a Digital Signature and Hash Chain},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {108},
	number = {20},
	pages = {20-23},
	month = {December},
	note = {Full text available}
}

Abstract

Day by day the total number of vehicles around the world is increasing enormously. It needs to control the vehicles for road safety. The vast development of technologies, especially the wireless technologies provide a new type of networks, such as Vehicular Ad Hoc Networks (VANETs) which provides communication between vehicle to vehicle, vehicles to server. A numerous number of new approaches are proposed such as smart cities, Intelligent Traffic System (ITS), Intelligent Light System (ILS) etc. It is difficult to control the urban traffic system by manual method. In this paper proposes an inter vehicular routing protocol using digital signature and hash chain. The inter vehicular communication using digital signature and hash function reduces this delay. Through its extensive simulation the traffic of a city environment may be controlled. The result shows that the data passing rate of inter vehicular communication decreases. As a result, each vehicle can communicate to others more quickly, which improve the road safety as well.

References

  • Jerbi, M., Senouci, S. M., Meraihi, R., & Ghamri-Doudane, Y. (2007, June). An improved vehicular ad hoc routing protocol for city environments. In IEEE International Conference on Communications, 2007. ICC'07. (pp. 3972-3979). IEEE.
  • Abedi, O., Berangi, R., & Azgomi, M. A. (2009, June). Improving route stability and overhead on AODV routing protocol and make it usable for VANET. In 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009. ICDCS Workshops' 09. (pp. 464-467). IEEE.
  • Shulman, M., & Deering, R. K. (2005). Third Annual Report of the Crash Avoidance Metrics Partnership, April 2003-March 2004 (No. HS-809 837).
  • Andreone, L., & Ricerche, C. (2005). Activities and applications of the vehicle to vehicle and vehicle to infrastructure communication to enhance road safety.Proc. 5th Eur. Congr. Exhib. ITS, Hannover, Germany.
  • Krüger, R., Füßler, H., Torrent-Moreno, M., Transier, M., Hartenstein, H., & Effelsberg, W. (2005). Statistical analysis of the FleetNet highway movement patterns.
  • Sivavakeesar, S., & Pavlou, G. (2002, September). A prediction-based clustering algorithm to achieve quality of service in mulithop ad hoc networks. In Proc. of the London Communications Symposium (LCS) (pp. 157-160).
  • Project, V. The network simulator NS-2 http://www.isi.edu/nsnam/ns/ [Online; Accessed: 28-July-2014]
  • Perkins, C. E., & Royer, E. M. (1999, February). Ad-hoc on-demand distance vector routing. In Second IEEE Workshop on Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. (pp. 90-100). IEEE.
  • Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153-181). Springer US.
  • Bose, P., Morin, P., Stojmenovic, I., & Urrutia, J. (2001). Routing with guaranteed delivery in ad hoc wireless networks. Wireless networks, 7(6), 609-616.
  • Karp, B., & Kung, H. T. (2000, August). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243-254). ACM.
  • Basagni, S., Chlamtac, I., Syrotiuk, V. R., & Woodward, B. A. (1998, October). A distance routing effect algorithm for mobility (DREAM). In Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking (pp. 76-84). ACM.
  • Lochert, C., Hartenstein, H., Tian, J., Fussler, H., Hermann, D., & Mauve, M. (2003, June). A routing strategy for vehicular ad hoc networks in city environments. In Intelligent Vehicles Symposium, 2003. Proceedings. IEEE (pp. 156-161). IEEE.
  • Zhao, J., & Cao, G. (2008). VADD: Vehicle-assisted data delivery in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 57(3), 1910-1922.