Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Novel Clustering based Approach with Hybrid Cryptography to Secure Vehicular Adhoc Network

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Amandeep Singh, Sandeep Kad
10.5120/ijca2016910057

Amandeep Singh and Sandeep Kad. A Novel Clustering based Approach with Hybrid Cryptography to Secure Vehicular Adhoc Network. International Journal of Computer Applications 143(3):19-23, June 2016. BibTeX

@article{10.5120/ijca2016910057,
	author = {Amandeep Singh and Sandeep Kad},
	title = {A Novel Clustering based Approach with Hybrid Cryptography to Secure Vehicular Adhoc Network},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2016},
	volume = {143},
	number = {3},
	month = {Jun},
	year = {2016},
	issn = {0975-8887},
	pages = {19-23},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume143/number3/25057-2016910057},
	doi = {10.5120/ijca2016910057},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

VANETs (vehicular specially appointed systems) are developing as another system environment for wise transportation frameworks. Nowdays , security conservation is most critical viewpoint in vehicular specially appointed systems as vehicular correspondence is powerless against assaults. Assailants might misuse VANETs to send sham data to trick different vehicles which prompts significant issues. Already such a large number of procedures were utilized to give security. However, the issue is that a large portion of the hubs are in the same group and as a result of that there is blockage in that bunch just furthermore a straightforward information encryption is utilized which split effectively. Presently, to conquer this issue this work has a centre to utilize a novel bunching calculation called constraining part hub grouping (LmC) calculation to restrain the quantity of part hubs for every group head by utilizing a limit esteem. This grouping approach chooses a bunch head in light of another cost capacity which considers the remaining battery level, vitality utilization and separation to the base station. At that point will actualize a half breed cryptography in view of Diffie-Hellman and AES for secure correspondence. This methodology gives an enhanced state security than others.

References

  1. Xiaoyan Zhu, Shunrong Jiang, Liangmin Wang, Hui Li, Weidong Zhang, and Zan Li, “Privacy-preserving authentication based on group signature for VANETs,” 2013 IEEE Glob. Commun. Conf., pp. 4609–4614, 2013.
  2. S. Bitam, A. Mellouk, and S. Zeadally, “HyBR: A Hybrid Bio-inspired Bee swarm Routing protocol for safety applications in Vehicular Ad hoc NETworks (VANETs),” J. Syst. Archit., vol. 59, no. 10 PART B, pp. 953–957, 2013.
  3. L. He and W. T. Zhu, “Mitigating DoS attacks against signature-based authentication in VANETs,” CSAE 2012 - Proceedings, 2012 IEEE Int. Conf. Comput. Sci. Autom. Eng., vol. 3, pp. 261–265, 2012.
  4. J. Petit, M. Feiri, and F. Kargl, “Spoofed data detection in VANETs using dynamic thresholds,” IEEE Veh. Netw. Conf. VNC, pp. 25–32, 2011.
  5. K. Verma, H. Hasbullah, and H. K. Saini, “Reference broadcast synchronization-based prevention to DoS attacks in VANET,” 2014 7th Int. Conf. Contemp. Comput. IC3 2014, pp. 270–275, 2014.
  6. L. Chen, S. L. Ng, and G. Wang, “Threshold anonymous announcement in VANETs,” IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 605–615, 2011.
  7. O. Chakroun and S. Cherkaoui, “Overhead-free congestion control and data dissemination for 802.11p VANETs,” Veh. Commun., vol. 1, no. 3, pp. 123–133, 2014.
  8. R. S. Bali, N. Kumar, and J. J. P. C. Rodrigues, “Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions,” Veh. Commun., vol. 1, no. 3, pp. 134–152, 2014.
  9. M. Becker, A. Gupta, M. Marot, and H. Singh, “Improving Clustering Techniques in Wireless Sensor Networks Using Thinning Process,” Perform. Eval. Comput. Commun. Syst. Milestones Futur. Challenges, 2010.
  10. Y. A. Suryawanshi, A. Kapur, and M. D. Chawhan, “Analysis of Symmetric Key Cryptosystem in VANET,” vol. 7, no. 2, pp. 3–7, 2012.
  11. S. Neelavathy Pari, S. Jayapal, and S. Duraisamy, “A trust system in manet with secure key authentication mechanism,” Int. Conf. Recent Trends Inf. Technol. ICRTIT 2012, pp. 261–265, 2012.
  12. A. Katal, “A Cluster Based Detection and Prevention Mechanism against Novel Datagram Chunk Dropping Attack in MANET Multimedia Transmission,” no. Ict, pp. 479–484, 2013.
  13. I. K. Azogu, M. T. Ferreira, J. A. Larcom, and H. Liu, “A new anti-jamming strategy for VANET metrics-directed security defense,” 2013 IEEE Globecom Work. GC Wkshps 2013, pp. 1344–1349, 2013.
  14. J. Sun and Y. Fang, “A defense technique against misbehavior in VANETs based on threshold authentication,” Proc. - IEEE Mil. Commun. Conf. MILCOM, 2008.
  15. C. Song, M. Liu, H. G. Gong, G. H. Chen, and J. N. Cao, “Utilizing the dropped packets for data delivery in VANETs,” J. China Univ. Posts Telecommun., vol. 20, no. 3, pp. 48–52, 2013.

Keywords

LmC, Clustering, CA, CH, AES, Diffie-Hellman.