CFP last date
22 April 2024
Reseach Article

A Novel Clustering based Approach with Hybrid Cryptography to Secure Vehicular Adhoc Network

by Amandeep Singh, Sandeep Kad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 143 - Number 3
Year of Publication: 2016
Authors: Amandeep Singh, Sandeep Kad
10.5120/ijca2016910057

Amandeep Singh, Sandeep Kad . A Novel Clustering based Approach with Hybrid Cryptography to Secure Vehicular Adhoc Network. International Journal of Computer Applications. 143, 3 ( Jun 2016), 19-23. DOI=10.5120/ijca2016910057

@article{ 10.5120/ijca2016910057,
author = { Amandeep Singh, Sandeep Kad },
title = { A Novel Clustering based Approach with Hybrid Cryptography to Secure Vehicular Adhoc Network },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 143 },
number = { 3 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume143/number3/25057-2016910057/ },
doi = { 10.5120/ijca2016910057 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:45:21.859968+05:30
%A Amandeep Singh
%A Sandeep Kad
%T A Novel Clustering based Approach with Hybrid Cryptography to Secure Vehicular Adhoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 143
%N 3
%P 19-23
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

VANETs (vehicular specially appointed systems) are developing as another system environment for wise transportation frameworks. Nowdays , security conservation is most critical viewpoint in vehicular specially appointed systems as vehicular correspondence is powerless against assaults. Assailants might misuse VANETs to send sham data to trick different vehicles which prompts significant issues. Already such a large number of procedures were utilized to give security. However, the issue is that a large portion of the hubs are in the same group and as a result of that there is blockage in that bunch just furthermore a straightforward information encryption is utilized which split effectively. Presently, to conquer this issue this work has a centre to utilize a novel bunching calculation called constraining part hub grouping (LmC) calculation to restrain the quantity of part hubs for every group head by utilizing a limit esteem. This grouping approach chooses a bunch head in light of another cost capacity which considers the remaining battery level, vitality utilization and separation to the base station. At that point will actualize a half breed cryptography in view of Diffie-Hellman and AES for secure correspondence. This methodology gives an enhanced state security than others.

References
  1. Xiaoyan Zhu, Shunrong Jiang, Liangmin Wang, Hui Li, Weidong Zhang, and Zan Li, “Privacy-preserving authentication based on group signature for VANETs,” 2013 IEEE Glob. Commun. Conf., pp. 4609–4614, 2013.
  2. S. Bitam, A. Mellouk, and S. Zeadally, “HyBR: A Hybrid Bio-inspired Bee swarm Routing protocol for safety applications in Vehicular Ad hoc NETworks (VANETs),” J. Syst. Archit., vol. 59, no. 10 PART B, pp. 953–957, 2013.
  3. L. He and W. T. Zhu, “Mitigating DoS attacks against signature-based authentication in VANETs,” CSAE 2012 - Proceedings, 2012 IEEE Int. Conf. Comput. Sci. Autom. Eng., vol. 3, pp. 261–265, 2012.
  4. J. Petit, M. Feiri, and F. Kargl, “Spoofed data detection in VANETs using dynamic thresholds,” IEEE Veh. Netw. Conf. VNC, pp. 25–32, 2011.
  5. K. Verma, H. Hasbullah, and H. K. Saini, “Reference broadcast synchronization-based prevention to DoS attacks in VANET,” 2014 7th Int. Conf. Contemp. Comput. IC3 2014, pp. 270–275, 2014.
  6. L. Chen, S. L. Ng, and G. Wang, “Threshold anonymous announcement in VANETs,” IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 605–615, 2011.
  7. O. Chakroun and S. Cherkaoui, “Overhead-free congestion control and data dissemination for 802.11p VANETs,” Veh. Commun., vol. 1, no. 3, pp. 123–133, 2014.
  8. R. S. Bali, N. Kumar, and J. J. P. C. Rodrigues, “Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions,” Veh. Commun., vol. 1, no. 3, pp. 134–152, 2014.
  9. M. Becker, A. Gupta, M. Marot, and H. Singh, “Improving Clustering Techniques in Wireless Sensor Networks Using Thinning Process,” Perform. Eval. Comput. Commun. Syst. Milestones Futur. Challenges, 2010.
  10. Y. A. Suryawanshi, A. Kapur, and M. D. Chawhan, “Analysis of Symmetric Key Cryptosystem in VANET,” vol. 7, no. 2, pp. 3–7, 2012.
  11. S. Neelavathy Pari, S. Jayapal, and S. Duraisamy, “A trust system in manet with secure key authentication mechanism,” Int. Conf. Recent Trends Inf. Technol. ICRTIT 2012, pp. 261–265, 2012.
  12. A. Katal, “A Cluster Based Detection and Prevention Mechanism against Novel Datagram Chunk Dropping Attack in MANET Multimedia Transmission,” no. Ict, pp. 479–484, 2013.
  13. I. K. Azogu, M. T. Ferreira, J. A. Larcom, and H. Liu, “A new anti-jamming strategy for VANET metrics-directed security defense,” 2013 IEEE Globecom Work. GC Wkshps 2013, pp. 1344–1349, 2013.
  14. J. Sun and Y. Fang, “A defense technique against misbehavior in VANETs based on threshold authentication,” Proc. - IEEE Mil. Commun. Conf. MILCOM, 2008.
  15. C. Song, M. Liu, H. G. Gong, G. H. Chen, and J. N. Cao, “Utilizing the dropped packets for data delivery in VANETs,” J. China Univ. Posts Telecommun., vol. 20, no. 3, pp. 48–52, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

LmC Clustering CA CH AES Diffie-Hellman.