Performance Analysis of ECDSA Based SE-AODV Routing Protocol In VANETS

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Vehicular ad hoc networks is an emerging area for researchers to provide intelligent transportation system to the society. It is due to the wide area of applications of VANETs interest is developed among the people from different countries to be a part of it. Therefore many projects had been started and also presently working to implement VANETs in real world scenario. The main challenge in its implementation is to provide a secure mechanism against the various attacks and threats that have the capability to bring the network performance significantly down. In this paper to overcome different types of authentication based attacks in VANETs an ECDSA based secure routing protocol SE-AODV is proposed with security features incorporated in already existing AODV routing protocol. The performance of SE-AODV is evaluated and compared with original AODV and AODV with black hole attack (BH-AODV). The SE-AODV shows better performance with the parameters used for comparison with the variation in vehicle density, speed of vehicles and simulation time.

     


  • Keywords


    AODV; BH-AODV; ECDSA; NS3; SE-AODV; VANETs.

  • References


      [1] Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, (2012), “Vehicular Ad Hoc Networks (VANETS): Status, Results, and challenges”, Telecommunication Systems, Vol.50, no. 4, pp. 217,241.

      [2] Connected vehicles: The future of transportation; official website: https://www.its.dot.gov/ (last visit: 11.03.2018).

      [3] Xiaomin Ma; Jinsong Zhang; Xiaoyan Yin; Trivedi, K.S, (2012), “Design and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Services”, IEEE Transactions on Vehicular Technology. vol.61, no.1, pp.46, 61.

      [4] Sumra, I.A.; Ahmad, I.; Hasbullah, H.; bin Ab Manan, J.-L. (2011) “Classes of attacks in VANET”, Electronics, Communications and Photonics Conference (SIECPC), 2011 Saudi International , vol. no. pp.1,5, 24-26.

      [5] Nzouonta, J.; Rajgure, N.; Guiling Wang; Borcea, C (2009), “VANET Routing on City Roads Using Real-Time Vehicular Traffic Information”, IEEE Transactions on Vehicular Technology. vol.58, no.7, pp.3609, 3626.

      [6] W. Liang, Z. Li, H. Zhang, Y. Sun, and R. Bie (2014), “Vehicular ad hoc networks: Architectures, research issues, challenges and trends”. https://link.springer.com/chapter/10.1007/978-3-319-07782-6_10 (last visit: 11.03.2018).

      [7] Awerbuch, Baruch, and Amitabh Mishra. "Introduction to Ad Hoc Networks." http://www.cs.jhu.edu/~cs647/intro_adhoc. (last visit 12.04.2018)

      [8] Shie-Yuan Wang, Chih-Che Lin, Wei-Jyun Hong and Kuang-Che Liu (2011), “On the performances of forwarding multihop unicast traffic in WBSS-based 802.11(p)/1609 networks”, Computer Networks. Volume 55, Issue 11, Pages 2592-2607.

      [9] Gadkari, Mushtak Y., and Nitin B. Sambre, (2012), “VANET: Routing Protocols, Security Issues and Simulation Tools”, IOSR Journal of Computer Engineering, vol.3, no.3, pp. 28, 38.

      [10] Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, (2012), “Vehicular Ad Hoc Networks (VANETS): Status, Results, and challenges. Telecommunication Systems”, Vol.50, no. 4, pp. 217-241.

      [11] Fatih Sakiz and Sevil Sen (2017), “A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV”, Ad Hoc Networks.Vol. 61, pp. 33-50

      [12] Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil and Anis Laouiti (2017), “VANET security, challenges and solutions: A survey”, Vehicular Communications,Vol. 7 pp. 7-20

      [13] Richard Gilles Engoulou, Martine Bellaïche, Samuel Pierre, Alejandro Quintero(2014), “VANET security surveys. Computer Communications” vol. 44, pp. 1-13.

      [14] Bassem Mokhtar and Mohamed Azab (2015), “Survey on security issues in Vehicular Ad hoc Networks”, Alexandria Engineering Journal. https://doi.org/10.1016/j.aej.2015.07.011 pp 1115-1126.

      [15] Hau Hu, Rongxing Lu and Zonghua Zhang (2016), “VTrust: A robust trust framework for relay selection in hybrid vehicular communications”,IEEE Global Communications Conference (GLOBECOM). DOI 10.1109/GLOCOM.2015.7417027

      [16] C. Gentry and Z. Ramzan (2006), “Identity-based aggregate signatures”, Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA,April24-26, 2006, Proceedings, pp. 257–273,

      [17] R. Sugumar, A.Rengarajan and C.Jayakumar (2016), “Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)”, Wireless Netw.DOI 10.1007/s11276-016-1336-6

      [18] Chengzhe Lai, Kuan Zhang, Nan Cheng, Hui Li and Xuemin Shen (2016), “SIRC: A Secure Incentive Scheme for Reliable
      Cooperative Downloading in Highway VANETs”, IEEE transactions on intelligent transportation systems. pp 1-16

      [19] Parul Tyagi, Deepak Dembla (2018), “Advanced secured outing Algorithm of Vehicular ad hoc Network”, Wireless Pers Commun. Springer. https://doi.org/10.1007/s11277-018-5824-0

      [20] Joon-Sang Park and Seung Jun Beak (2012), “Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks”, Peer-to-Peer Netw. Appl.. DOI 10.1007/s12083-012-0178-y

      [21] Suguo Du, Xiaolong Li, Junbo Du, Haojin Zhu (2012), “An attack-and-defence game for security assessment in vehicular ad hoc networks”, Peer-to-Peer Netw. Appl. DOI 10.1007/s12083-012-0127-9


 

View

Download

Article ID: 16187
 
DOI: 10.14419/ijet.v7i3.16.16187




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.