Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

Design a Cloud Security Model in VANET Communication: Implementation, Performance and Security Analysis

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Hatem M. Hamad, Alaaeddin B. AlQazzaz

Hatem M Hamad and Alaaeddin B AlQazzaz. Design a Cloud Security Model in VANET Communication: Implementation, Performance and Security Analysis. International Journal of Computer Applications 146(4):1-7, July 2016. BibTeX

	author = {Hatem M. Hamad and Alaaeddin B. AlQazzaz},
	title = {Design a Cloud Security Model in VANET Communication: Implementation, Performance and Security Analysis},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2016},
	volume = {146},
	number = {4},
	month = {Jul},
	year = {2016},
	issn = {0975-8887},
	pages = {1-7},
	numpages = {7},
	url = {},
	doi = {10.5120/ijca2016910666},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In the first paper of this work, the design and the architecture of our proposed model framework, VANET Security as a Service (VSaaS), was discussed. In this second paper, the performance metrics measurements will be investigated through the NS2, SUMO and Trans simulations, to evaluate the security overhead of the secure Vehicle Information Messages (VIMs), which are sent by the vehicles to the cloud as a coarse-grained information. Moreover, our proposed model framework (VSaaS) will be discussed against the security requirements in the VANET.


  1. M. Raya and J. P. Hubaux. The Security of Vehicular Ad Hoc Networks. In SASN ’05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pages 11–21, New York, NY, USA, 2005. ACM.
  2. V. Khairnar and K. Kotecha, Simulation-Based Performance Evaluation of Routing Protocols in Vehicular Ad-hoc Network. International Journal of Scientific and Research Publications. vol. 3, no. 10, October , 2013.
  3. Y. Khasa and Pooja, Performance Evaluation of Routing Protocols in MANET. International Journal of Computer Science Engineering andTechnology (IJCSET). vol . 6, no. 3,p.p 109-112, March , 2016.
  4. P. Rohal, R. Dahiya and P. Dahiya, Study and Analysis of Throughput, Delay and Packet Delivery Ratio in MANET for Topology Based Routing Protocols (AODV, DSR and DSDV), International Journal for Advance Research In Engineering And Technology (IJARET). vol. 1, no. 2, p.p 54-58 March. 2013.
  5. M. A. Al Mamun, K. Anam, M. F. Onik, A M Esfar- E- Alam, “Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture”, Proceedings of the World Congress on Engineering and Computer Science, USA, 2012, vol. 1, ISBN 978-988-19251-6-9
  6. Q. Xu, T. Mak, J. Ko, and R. Sengupta. Vehicle-to-vehicle safety messaging in DSRC. In Proceedings of the first ACM workshop on Vehicular ad hoc networks, pages 19–28. ACM Press, 2004.
  7. X. Yang, J. Liu, F. Zhao, and N. Vaidya. A vehicle-to-vehicle communication protocol for cooperative collision warning. In First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), August 2004.
  8. Crypto++ 5.6.0 Benchmarks, ,accessed Mar. 2012.


VANET, Cloud, VSaaS, Certified Authority, Cryptography, Vehicle Information Messages, Traffic Information Messages, Authentication, Privacy, Security Overhead