Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Key Management Techniques for VANETs

IJCA Special Issue on International Conference on Electronics, Communication and Information systems
© 2012 by IJCA Journal
ICECI - Number 2
Year of Publication: 2012
G. Sasikala
K. S. Dhanalakshmi

G Sasikala and K S Dhanalakshmi. Article: Key Management Techniques for VANETs. IJCA Special Issue on International Conference on Electronics, Communication and Information systems ICECI(2):13-16, November 2012. Full text available. BibTeX

	author = {G. Sasikala and K. S. Dhanalakshmi},
	title = {Article: Key Management Techniques for VANETs},
	journal = {IJCA Special Issue on International Conference on Electronics, Communication and Information systems},
	year = {2012},
	volume = {ICECI},
	number = {2},
	pages = {13-16},
	month = {November},
	note = {Full text available}


Vehicular adhoc network is commonly used network among the vehicles in a centralized way. This network is built in order to send and receive messages from the vehicles which are present in the network. Since it is a centralized network, hence many problems have be occurs in the network. The main issues of vanet are maintaintenance of the system and revocation of malicious vehicles. The new efficient management frameworks that have been framed to overcome the above said problems. It is known as the shared key management technique. The road side unit (RSU) which is present distributes the keys to the various key. The framework is assisting the above said three major problems. This framework can be simulated using NS2. The major architecture of this framework is built in order to get the desired output like avoiding road traffic blockage, safe and secure travel and a volume of high security is imposed in sending and receiving the messages. The message is send and receives without any blockages by the means of cooperative message authentication.


  • Youg Hao ,Yu Cheng ,Chi Zhou and Wei Song, "A Distributed key management framework with cooperative message authentication in VANETs" IEEE Journal on selected areas in communications, vol. 29, no. 3, march 2011
  • Bo Yu, Cheng-Zhong Xu,and Minyi Guo, "Adaptive forwarding delay control for VANET data aggregation"IEEE Transaction vol . 23,no. 1,january2012
  • Irshad Ahmed Sumra, halabi hasbullah, Jamalul-Iail Ab Manan "VANET Security Research and Development Ecosystem "International conference 2011
  • Vighnesh N V,N Kavita, Dr. Shalini R. Urs "A Novel Sender authentication Scheme Based On Hash chain For Vehicular Ad-hoc Networks " IEEE Transaction 2011
  • Vineetha Paruchuri , "Inter-vehicular communications: Security and reliability issues" International conference2011
  • J. Molina-Gil, C. Caballero-Gil, and p. Caballero-Gil "Cooperative Approach to Self-managed VANETS" International conference2010
  • Ali Osman Bayrak, Tankut Acarman "S3P: A Secure and Privacy Protecting Protocol for VANET" International conference2010
  • Marshall Riley, Kemal Akkaya and kenny Fong "Delay- efficient geodynamic group-based authentication in VANETs"International conference2010
  • Cristina Gil,Leticia Gonzalez,Neftis Atallah,Juan Antonio Abanades,Nicolas Jean Leconte, " Self-Recusation Protocol for Blockage of Misbehaving Applications in Vehicular Networks" International conference2010
  • Chenxi Zhange ,Xiaodong Lin,Rongxing Lu, "An efficient message Authentication scheme for vehicular communications" IEEE Transaction on vehicular technology", vol. 57, no. 6, nov2008
  • Y. Hao, Y. Cheng and K. Ren, "Distributed key management with protection against RSU compromise in group signature base VANETs," In Proc. IEEE Globecom, New Orleans, Nov. , 2008.
  • S. Park and C. C. Zou, "Reliable traffic information propagation in vehicular ad-hoc networks," IEEE Sarnoff Symposium, Apr. 2008
  • Sampigethava, L. Huang, M. Li, R. Poovendran, K. Matsuura and K. Sezaki,"AMOEBA: Robust location privacy scheme for VANET,"in IEEE J. Sel. Areas Commun. , vol. 25,no. 8, pp. 1569-1589, 2007.
  • M. Raya and J. -P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007
  • B. Xiao, B. Yu and C. Gao, "Detection and localization of sybil nodes in VANETs," in Proc. ACM/SIGMOBILE Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, 2006.