CFP last date
20 May 2024
Reseach Article

VANET- based Vehicle Tacking on Message Authentication and Secure Navigation Route

by T.s Vamsi Krishna, R.hariharan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 7
Year of Publication: 2015
Authors: T.s Vamsi Krishna, R.hariharan
10.5120/19840-1695

T.s Vamsi Krishna, R.hariharan . VANET- based Vehicle Tacking on Message Authentication and Secure Navigation Route. International Journal of Computer Applications. 113, 7 ( March 2015), 32-40. DOI=10.5120/19840-1695

@article{ 10.5120/19840-1695,
author = { T.s Vamsi Krishna, R.hariharan },
title = { VANET- based Vehicle Tacking on Message Authentication and Secure Navigation Route },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 7 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number7/19840-1695/ },
doi = { 10.5120/19840-1695 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:21.286667+05:30
%A T.s Vamsi Krishna
%A R.hariharan
%T VANET- based Vehicle Tacking on Message Authentication and Secure Navigation Route
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 7
%P 32-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Computing real-time road condition is really tough and it is not achieved using GPS. However, a malicious node can create multiple virtual identities for transmitting fake messages using different forged positions. A malicious vehicle can disseminate false traffic information in order to force other vehicles and vehicular authorities to take incorrect decisions. To overcome these difficulties we propose that vehicle should be authenticated by Trusted Authority (TA) via RSU, only then the navigation query sent to RSU through tamper proof device (in the Vehicle) for identifying best destination route. After authentication, TA generates a re-encryption key to requested vehicle for encrypting the query. Based on vehicle request, contacted RSU identifies the shortest path to reach the destination RSU by passing the vehicle request to neighbouring RSU's. After identification of shortest path, it sends the encrypted message to requested vehicle using re-encryption key. Finally it decrypts the message using its own private key. Moreover, the network checks each vehicle speed for avoid accident based on predecessor and successor vehicle's speed using chord algorithm. It also implementing priority based vehicle movement so, Network gives high priority in emergency vehicle, it gives medium priority for registered vehicle and it gives low priority for unregistered vehicle.

References
  1. T. W. Chim, S. M. Yiu, Lucas C. K. Hui, Senior Member, IEEE, and Victor O. K. Li, Fellow, IEEE "VSPN: VANET-Based Secure and Privacy-Preserving Navigation" on Vol. 63, No. 2, February 2014.
  2. C. Zhang, R. Lu, P. H. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," Proc. IEEE INFOCOM '08, pp. 816-824, Apr. 2008.
  3. Khalid Abdel Hafeez, Student Member, IEEE, Lian Zhao, Senior Member, IEEE,Bobby Ma, Senior Member, IEEE, and Jon W. Mark, Life Fellow, IEEE " Performance Analysis and Enhancement of the DSRC for VANET's Safety Applications" on Vol;. 62, No. 7, September 2013.
  4. I. Leontiadis, P. Costa, and C. Mascolo, "Extending Access Point Connectivity through Opportunistic Routing in Vehicular Networks," Proc. IEEE INFOCOM '10, Mar. 2010.
  5. Vaishali D. Khairnar and Dr. Ketan Kotecha "Performance of Vehicle-to-Vehicle Communication using IEEE 802. 11p in Vehicular Ad-hoc Network Environment" on Vol. 5, No. 2, March 2013.
  6. H. Oh, C. Yae, D. Ahn, and H. Cho, "5. 8 GHz DSRC Packet Communication System for ITS Services," Proc. IEEE VTS 50th Vehicular Technology Conf. (VTC '99), pp. 2223-2227, Sept. 1999.
  7. Lei Shi and Ki Won Sung "Spectrum Requirement for Vehicle-to-Vehicle Communication for Traffic Safety" on 2012.
  8. R. Lu, X. Lin, H. Zhu, and X. Shen, "SPARK: A New VANET Based Smart Parking Scheme for Large Parking Lots," Proc. IEEE INFOCOM '09, pp. 1413-1421, Apr. 2009.
  9. Yuchen Wu, Yanmin Zhu, and Bo Li "Infrastructure-Assisted Routing in Vehicular Networks" on 2012.
  10. A. Studer, E. Shi, F. Bai, and A. Perrig, "TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs," 2009.
  11. A. Euodial, P. Joyce Beryl Princess. "BVFG: Batch Verification Scheme for Filtering of Gang Injected False Data in Wireless Sensor Networks" on Volume 3, Issue 3, March 2013.
  12. A. Festag, W. Zhang, L. Le, and R. Baldessari, Vehicular Networks: Techniques, Standards and Applications, chapter Geocast in Vehicular Networks, Taylor&Francis, H. Moustafa and Y. Zhang (edts. ), December 2008.
  13. Patil V. P. "Design, Development and Testing of Parking Availability System Based on Vehicular Ad hoc Network" on Volume 2, Issue 10, October 2012.
  14. M. Raya and J. -P. Hubaux. The security of vehicular ad hoc networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Nov. 2005.
  15. Mostofa Kamal Nasir, A. S. M. Delowar Hossain, Md. Sazzad Hossain, Md. Mosaddik Hasan, Md. Belayet Ali. "Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network" on Volume 2, Issue 4, April 2013.
  16. K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. CARAVAN: Providing location privacy for VANET. In Proceedings of Embedded Security in Cars (ESCAR), Nov. 2005.
  17. L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Networks Special Issue on Network Security, 1999.
  18. Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yuguang Fang, Fellow, IEEE. "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks" on Vol. 21, No. 9, September 2010.
  19. X. Lin, X. Sun, P. -H. Ho, and X. chung, "Gsis: A secure and privacy preserving protocol for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442–3456, November 2007.
  20. Dr. Sumegha Sakhreliya, Prof. Neha Pandya. "A Review on Security Issues and Its Solution's overhead in VANETs" on Volume 3, Issue 11, November 2013.
  21. G. Badawy, J. Misic, T. Todd, and D. Zhao, "Performance modelling of safety message delivery in vehicular ad hoc networks," in Proc. IEEE 6th Int. Conf. WiMob, Oct. 2010.
  22. Su-Hyun Kim and Im-Yeong Lee. "A Secure and Efficient Vehicle-to-Vehicle Communication based on Sensor Network" on Vol. 7, No. 6 (2013).
  23. X. Ma and X. Chen, "Performance analysis of IEEE 802. 11 broadcast scheme in ad hoc wireless LANs," IEEE Trans. Veh. Technol. , vol. 57,Nov. 2008.
  24. M. Al-Qutayri, C. Yeun and F. Al-Hawi. "Security and Privacy of Intelligent VANETs, Computational Intelligence and Modern Heuristics" INTECH, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

DSRC protocol V2V communications V2I communications Traffic security MChord Message Authentication VANET Beaconing P2P network transmissions.